/hostap-latest/src/crypto/ |
D | tls_wolfssl.c | 856 WOLFSSL_X509 *err_cert, int err, int depth, in wolfssl_tls_fail_event() argument 871 ev.cert_fail.depth = depth; in wolfssl_tls_fail_event() 881 WOLFSSL_X509 *err_cert, int depth, in wolfssl_tls_cert_event() argument 920 ev.peer_cert.depth = depth; in wolfssl_tls_cert_event() 979 int err, depth; in tls_verify_cb() local 993 depth = wolfSSL_X509_STORE_CTX_get_error_depth(x509_ctx); in tls_verify_cb() 1005 if (depth == 0) in tls_verify_cb() 1007 else if (depth == 1) in tls_verify_cb() 1009 else if (depth == 2) in tls_verify_cb() 1020 if (!preverify_ok && depth > 0 && conn->server_cert_only) in tls_verify_cb() [all …]
|
D | tls_mbedtls_alt.c | 647 static int tls_mbedtls_verify_cb(void *arg, mbedtls_x509_crt *crt, int depth, uint32_t *flags); 2944 int depth, in tls_mbedtls_verify_fail_event() argument 2959 ev.cert_fail.depth = depth; in tls_mbedtls_verify_fail_event() 2971 int depth) in tls_mbedtls_verify_cert_event() argument 2990 ev.peer_cert.depth = depth; in tls_mbedtls_verify_cert_event() 2992 if (depth == 0) in tls_mbedtls_verify_cert_event() 3090 static int tls_mbedtls_verify_cb(void *arg, mbedtls_x509_crt *crt, int depth, uint32_t *flags) in tls_mbedtls_verify_cb() argument 3108 if (depth > 8) in tls_mbedtls_verify_cb() 3112 … tls_mbedtls_verify_fail_event(crt, depth, "client cert chain too long", TLS_FAIL_BAD_CERTIFICATE); in tls_mbedtls_verify_cb() 3116 if (depth > 0) in tls_mbedtls_verify_cb() [all …]
|
D | tls_openssl.c | 2306 X509 *err_cert, int err, int depth, in openssl_tls_fail_event() argument 2321 ev.cert_fail.depth = depth; in openssl_tls_fail_event() 2362 X509 *err_cert, int depth, in openssl_tls_cert_event() argument 2400 ev.peer_cert.depth = depth; in openssl_tls_cert_event() 2498 int err, depth; in tls_verify_cb() local 2511 depth = X509_STORE_CTX_get_error_depth(x509_ctx); in tls_verify_cb() 2514 os_snprintf(buf, sizeof(buf), "Peer certificate - depth %d", depth); in tls_verify_cb() 2522 if (depth == 0) in tls_verify_cb() 2524 else if (depth == 1) in tls_verify_cb() 2526 else if (depth == 2) in tls_verify_cb() [all …]
|
D | tls.h | 53 int depth; member 66 int depth; member
|
D | tls_gnutls.c | 929 const gnutls_datum_t *cert, int depth, in gnutls_tls_fail_event() argument 941 ev.cert_fail.depth = depth; in gnutls_tls_fail_event() 1321 ev.peer_cert.depth = i; in tls_connection_verify_peer()
|
/hostap-latest/src/utils/ |
D | json.c | 226 unsigned int depth = 0; in json_parse() local 254 depth++; in json_parse() 255 if (depth > JSON_MAX_DEPTH) { in json_parse() 277 depth--; in json_parse() 575 static void json_print_token(struct json_token *token, int depth, in json_print_token() argument 585 depth, json_type_str(token->type), in json_print_token() 591 json_print_token(token->child, depth + 1, buf, buflen); in json_print_token() 592 json_print_token(token->sibling, depth, buf, buflen); in json_print_token()
|
D | http_curl.c | 976 int err, depth; in curl_cb_ssl_verify() local 993 depth = X509_STORE_CTX_get_error_depth(x509_ctx); in curl_cb_ssl_verify() 1001 if (depth == 0) in curl_cb_ssl_verify() 1003 else if (depth == 1) in curl_cb_ssl_verify() 1005 else if (depth == 2) in curl_cb_ssl_verify() 1011 depth, err, err_str, buf); in curl_cb_ssl_verify() 1014 if (depth == 0 && preverify_ok && validate_server_cert(ctx, cert) < 0) in curl_cb_ssl_verify() 1018 if (depth == 0 && ctx->ocsp != NO_OCSP && preverify_ok) { in curl_cb_ssl_verify()
|
/hostap-latest/src/tls/ |
D | tlsv1_client_read.c | 279 static void tls_peer_cert_event(struct tlsv1_client *conn, int depth, in tls_peer_cert_event() argument 311 ev.peer_cert.depth = depth; in tls_peer_cert_event() 328 static void tls_cert_chain_failure_event(struct tlsv1_client *conn, int depth, in tls_cert_chain_failure_event() argument 341 ev.cert_fail.depth = depth; in tls_cert_chain_failure_event() 832 int depth; in tls_process_certificate_status() local 966 for (cert = conn->server_cert, depth = 0; cert; in tls_process_certificate_status() 967 cert = cert->next, depth++) { in tls_process_certificate_status() 970 conn, depth, cert, TLS_FAIL_REVOKED, in tls_process_certificate_status() 983 for (cert = conn->server_cert, depth = 0; cert; in tls_process_certificate_status() 984 cert = cert->next, depth++) { in tls_process_certificate_status() [all …]
|
/hostap-latest/wpa_supplicant/ |
D | notify.c | 852 cert->depth, cert->subject, cert_hash ? " hash=" : "", in wpas_notify_certification() 867 cert->depth, cert->subject, cert_hex); in wpas_notify_certification() 874 "depth=%d %s", cert->depth, cert->altsubject[i]); in wpas_notify_certification() 877 wpas_dbus_signal_certification(wpa_s, cert->depth, cert->subject, in wpas_notify_certification()
|
D | eapol_test.c | 513 cert->depth, cert->subject, in eapol_test_cert_cb() 527 cert->depth, cert->subject, cert_hex); in eapol_test_cert_cb() 538 "depth=%d %s", cert->depth, cert->altsubject[i]); in eapol_test_cert_cb()
|
/hostap-latest/wpa_supplicant/dbus/ |
D | dbus_new.h | 248 int depth, const char *subject, 571 int depth, in wpas_dbus_signal_certification() argument
|
D | dbus_new.c | 1064 int depth, const char *subject, in wpas_dbus_signal_certification() argument 1088 !wpa_dbus_dict_append_uint32(&dict_iter, "depth", depth) || in wpas_dbus_signal_certification()
|
/hostap-latest/src/ap/ |
D | authsrv.c | 170 data->cert_fail.depth, in authsrv_tls_event() 176 data->peer_cert.depth, in authsrv_tls_event()
|
/hostap-latest/tests/hwsim/ |
D | test_ap_eap.py | 7370 depth = None 7375 depth = int(v.split('=')[1]) 7378 if depth is not None and cert: 7379 certs[depth] = binascii.unhexlify(cert)
|
/hostap-latest/src/eap_peer/ |
D | eap.c | 2150 data->cert_fail.depth, in eap_peer_sm_tls_event()
|
/hostap-latest/doc/ |
D | dbus.doxygen | 1311 …ith pairs of field names and their values. Possible dictionary keys are: "depth", "subject", "alts…
|