/hostap-3.6.0/src/tls/ |
D | tlsv1_client_read.c | 287 char subject[128]; in tls_peer_cert_event() local 312 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_peer_cert_event() 313 ev.peer_cert.subject = subject; in tls_peer_cert_event() 335 char subject[128]; in tls_cert_chain_failure_event() local 342 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_cert_chain_failure_event() 343 ev.peer_cert.subject = subject; in tls_cert_chain_failure_event() 515 x509_name_string(&chain->subject, buf, sizeof(buf)); in tls_process_certificate() 532 ev.cert_fail.subject = buf; in tls_process_certificate() 553 x509_name_string(&chain->subject, buf, in tls_process_certificate() 555 ev.cert_fail.subject = buf; in tls_process_certificate()
|
D | x509v3.c | 55 x509_free_name(&cert->subject); in x509_certificate_free() 1068 return x509_parse_ext_alt_name(&cert->subject, hdr.payload, in x509_parse_ext_subject_alt_name() 1554 if (x509_parse_name(pos, end - pos, &cert->subject, &pos)) in x509_parse_tbs_certificate() 1561 x509_name_string(&cert->subject, sbuf, sizeof(sbuf)); in x509_parse_tbs_certificate() 2155 x509_name_string(&cert->subject, buf, sizeof(buf)); in x509_certificate_chain_validate() 2175 &cert->next->subject) != 0) { in x509_certificate_chain_validate() 2182 x509_name_string(&cert->next->subject, buf, in x509_certificate_chain_validate() 2217 if (x509_name_compare(&cert->issuer, &trust->subject) in x509_certificate_chain_validate() 2276 if (x509_name_compare(&cert->subject, name) == 0) in x509_certificate_get_subject() 2290 return x509_name_compare(&cert->issuer, &cert->subject) == 0; in x509_certificate_self_signed()
|
D | tlsv1_client_ocsp.c | 63 return x509_name_compare(&signer->subject, name) == 0; in ocsp_responder_id_match() 582 &issuer->subject) == 0) in tls_process_basic_ocsp_response() 600 &issuer->subject) != 0 || in tls_process_basic_ocsp_response() 743 x509_name_string(&cert->subject, sbuf, sizeof(sbuf)); in tls_process_ocsp_response()
|
D | x509v3.h | 57 struct x509_name subject; member
|
D | tlsv1_cred.c | 61 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { in tlsv1_add_cert_der() 73 x509_name_string(&cert->subject, name, sizeof(name)); in tlsv1_add_cert_der()
|
/hostap-3.6.0/src/crypto/ |
D | tls.h | 53 const char *subject; member 66 const char *subject; member
|
D | tls_wolfssl.c | 833 const char *subject, const char *err_str, in wolfssl_tls_fail_event() argument 848 ev.cert_fail.subject = subject; in wolfssl_tls_fail_event() 858 const char *subject) in wolfssl_tls_cert_event() argument 897 ev.peer_cert.subject = subject; in wolfssl_tls_cert_event()
|
D | tls_gnutls.c | 930 const char *subject, const char *err_str, in gnutls_tls_fail_event() argument 942 ev.cert_fail.subject = subject ? subject : ""; in gnutls_tls_fail_event() 1322 ev.peer_cert.subject = buf; in tls_connection_verify_peer()
|
D | tls_openssl.c | 2153 const char *subject, const char *err_str, in openssl_tls_fail_event() argument 2168 ev.cert_fail.subject = subject; in openssl_tls_fail_event() 2209 const char *subject) in openssl_tls_cert_event() argument 2247 ev.peer_cert.subject = subject; in openssl_tls_cert_event()
|
/hostap-3.6.0/wpa_supplicant/ |
D | notify.c | 814 cert->depth, cert->subject, cert_hash ? " hash=" : "", in wpas_notify_certification() 829 cert->depth, cert->subject, cert_hex); in wpas_notify_certification() 839 wpas_dbus_signal_certification(wpa_s, cert->depth, cert->subject, in wpas_notify_certification()
|
D | eapol_test.c | 439 static void eapol_test_write_cert(FILE *f, const char *subject, in eapol_test_write_cert() argument 448 "-----END CERTIFICATE-----\n\n", subject, encoded); in eapol_test_write_cert() 509 cert->depth, cert->subject, in eapol_test_cert_cb() 523 cert->depth, cert->subject, cert_hex); in eapol_test_cert_cb() 529 cert->subject, cert->cert); in eapol_test_cert_cb()
|
D | rrm.c | 312 u8 subject; in wpas_rrm_build_lci_report() local 326 subject = *request++; in wpas_rrm_build_lci_report() 330 subject); in wpas_rrm_build_lci_report() 332 if (subject != LOCATION_SUBJECT_REMOTE) { in wpas_rrm_build_lci_report()
|
D | defconfig | 618 # release under this optional build parameter. This functionality is subject to 627 # support for this by default, but that functionality is subject to be removed 633 # design is still subject to change. As such, this should not yet be enabled in
|
D | android.config | 541 # release under this optional build parameter. This functionality is subject to
|
/hostap-3.6.0/src/ap/ |
D | authsrv.c | 154 data->cert_fail.subject, in authsrv_tls_event() 161 data->peer_cert.subject); in authsrv_tls_event()
|
/hostap-3.6.0/wpa_supplicant/dbus/ |
D | dbus_new.h | 245 int depth, const char *subject, 564 const char *subject, in wpas_dbus_signal_certification() argument
|
D | dbus_new.c | 1030 int depth, const char *subject, in wpas_dbus_signal_certification() argument 1055 !wpa_dbus_dict_append_string(&dict_iter, "subject", subject) || in wpas_dbus_signal_certification()
|
/hostap-3.6.0/hostapd/ |
D | defconfig | 160 # subject to change and this should not be expected to interoperate with the 388 # release under this optional build parameter. This functionality is subject to 396 # that functionality is subject to be removed in the future. 401 # design is still subject to change. As such, this should not yet be enabled in
|
D | android.config | 212 # release under this optional build parameter. This functionality is subject to
|
/hostap-3.6.0/src/eap_server/ |
D | eap_server_teap.c | 508 const char *subject; in eap_teap_phase1_done() local 510 subject = tls_connection_get_peer_subject(data->ssl.conn); in eap_teap_phase1_done() 511 if (subject) { in eap_teap_phase1_done() 514 subject); in eap_teap_phase1_done() 515 data->identity = (u8 *) os_strdup(subject); in eap_teap_phase1_done() 516 data->identity_len = os_strlen(subject); in eap_teap_phase1_done()
|
/hostap-3.6.0/hs20/server/ca/ |
D | openssl-root.cnf | 23 # several certificates with same subject
|
D | openssl.cnf | 23 # several certificates with same subject
|
/hostap-3.6.0/tests/hwsim/ |
D | test_cert_check.py | 64 b"hash", subject=cert),
|
/hostap-3.6.0/tests/ |
D | README | 32 the older fuzz testing tools that are subject to removal once the same
|
/hostap-3.6.0/src/eap_peer/ |
D | eap.c | 2119 data->cert_fail.subject, in eap_peer_sm_tls_event()
|