Home
last modified time | relevance | path

Searched refs:depth (Results 1 – 16 of 16) sorted by relevance

/hostap-latest/src/crypto/
Dtls_wolfssl.c856 WOLFSSL_X509 *err_cert, int err, int depth, in wolfssl_tls_fail_event() argument
871 ev.cert_fail.depth = depth; in wolfssl_tls_fail_event()
881 WOLFSSL_X509 *err_cert, int depth, in wolfssl_tls_cert_event() argument
920 ev.peer_cert.depth = depth; in wolfssl_tls_cert_event()
979 int err, depth; in tls_verify_cb() local
993 depth = wolfSSL_X509_STORE_CTX_get_error_depth(x509_ctx); in tls_verify_cb()
1005 if (depth == 0) in tls_verify_cb()
1007 else if (depth == 1) in tls_verify_cb()
1009 else if (depth == 2) in tls_verify_cb()
1020 if (!preverify_ok && depth > 0 && conn->server_cert_only) in tls_verify_cb()
[all …]
Dtls_mbedtls_alt.c647 static int tls_mbedtls_verify_cb(void *arg, mbedtls_x509_crt *crt, int depth, uint32_t *flags);
2944 int depth, in tls_mbedtls_verify_fail_event() argument
2959 ev.cert_fail.depth = depth; in tls_mbedtls_verify_fail_event()
2971 int depth) in tls_mbedtls_verify_cert_event() argument
2990 ev.peer_cert.depth = depth; in tls_mbedtls_verify_cert_event()
2992 if (depth == 0) in tls_mbedtls_verify_cert_event()
3090 static int tls_mbedtls_verify_cb(void *arg, mbedtls_x509_crt *crt, int depth, uint32_t *flags) in tls_mbedtls_verify_cb() argument
3108 if (depth > 8) in tls_mbedtls_verify_cb()
3112 … tls_mbedtls_verify_fail_event(crt, depth, "client cert chain too long", TLS_FAIL_BAD_CERTIFICATE); in tls_mbedtls_verify_cb()
3116 if (depth > 0) in tls_mbedtls_verify_cb()
[all …]
Dtls_openssl.c2306 X509 *err_cert, int err, int depth, in openssl_tls_fail_event() argument
2321 ev.cert_fail.depth = depth; in openssl_tls_fail_event()
2362 X509 *err_cert, int depth, in openssl_tls_cert_event() argument
2400 ev.peer_cert.depth = depth; in openssl_tls_cert_event()
2498 int err, depth; in tls_verify_cb() local
2511 depth = X509_STORE_CTX_get_error_depth(x509_ctx); in tls_verify_cb()
2514 os_snprintf(buf, sizeof(buf), "Peer certificate - depth %d", depth); in tls_verify_cb()
2522 if (depth == 0) in tls_verify_cb()
2524 else if (depth == 1) in tls_verify_cb()
2526 else if (depth == 2) in tls_verify_cb()
[all …]
Dtls.h53 int depth; member
66 int depth; member
Dtls_gnutls.c929 const gnutls_datum_t *cert, int depth, in gnutls_tls_fail_event() argument
941 ev.cert_fail.depth = depth; in gnutls_tls_fail_event()
1321 ev.peer_cert.depth = i; in tls_connection_verify_peer()
/hostap-latest/src/utils/
Djson.c226 unsigned int depth = 0; in json_parse() local
254 depth++; in json_parse()
255 if (depth > JSON_MAX_DEPTH) { in json_parse()
277 depth--; in json_parse()
575 static void json_print_token(struct json_token *token, int depth, in json_print_token() argument
585 depth, json_type_str(token->type), in json_print_token()
591 json_print_token(token->child, depth + 1, buf, buflen); in json_print_token()
592 json_print_token(token->sibling, depth, buf, buflen); in json_print_token()
Dhttp_curl.c976 int err, depth; in curl_cb_ssl_verify() local
993 depth = X509_STORE_CTX_get_error_depth(x509_ctx); in curl_cb_ssl_verify()
1001 if (depth == 0) in curl_cb_ssl_verify()
1003 else if (depth == 1) in curl_cb_ssl_verify()
1005 else if (depth == 2) in curl_cb_ssl_verify()
1011 depth, err, err_str, buf); in curl_cb_ssl_verify()
1014 if (depth == 0 && preverify_ok && validate_server_cert(ctx, cert) < 0) in curl_cb_ssl_verify()
1018 if (depth == 0 && ctx->ocsp != NO_OCSP && preverify_ok) { in curl_cb_ssl_verify()
/hostap-latest/src/tls/
Dtlsv1_client_read.c279 static void tls_peer_cert_event(struct tlsv1_client *conn, int depth, in tls_peer_cert_event() argument
311 ev.peer_cert.depth = depth; in tls_peer_cert_event()
328 static void tls_cert_chain_failure_event(struct tlsv1_client *conn, int depth, in tls_cert_chain_failure_event() argument
341 ev.cert_fail.depth = depth; in tls_cert_chain_failure_event()
832 int depth; in tls_process_certificate_status() local
966 for (cert = conn->server_cert, depth = 0; cert; in tls_process_certificate_status()
967 cert = cert->next, depth++) { in tls_process_certificate_status()
970 conn, depth, cert, TLS_FAIL_REVOKED, in tls_process_certificate_status()
983 for (cert = conn->server_cert, depth = 0; cert; in tls_process_certificate_status()
984 cert = cert->next, depth++) { in tls_process_certificate_status()
[all …]
/hostap-latest/wpa_supplicant/
Dnotify.c852 cert->depth, cert->subject, cert_hash ? " hash=" : "", in wpas_notify_certification()
867 cert->depth, cert->subject, cert_hex); in wpas_notify_certification()
874 "depth=%d %s", cert->depth, cert->altsubject[i]); in wpas_notify_certification()
877 wpas_dbus_signal_certification(wpa_s, cert->depth, cert->subject, in wpas_notify_certification()
Deapol_test.c513 cert->depth, cert->subject, in eapol_test_cert_cb()
527 cert->depth, cert->subject, cert_hex); in eapol_test_cert_cb()
538 "depth=%d %s", cert->depth, cert->altsubject[i]); in eapol_test_cert_cb()
/hostap-latest/wpa_supplicant/dbus/
Ddbus_new.h248 int depth, const char *subject,
571 int depth, in wpas_dbus_signal_certification() argument
Ddbus_new.c1064 int depth, const char *subject, in wpas_dbus_signal_certification() argument
1088 !wpa_dbus_dict_append_uint32(&dict_iter, "depth", depth) || in wpas_dbus_signal_certification()
/hostap-latest/src/ap/
Dauthsrv.c170 data->cert_fail.depth, in authsrv_tls_event()
176 data->peer_cert.depth, in authsrv_tls_event()
/hostap-latest/tests/hwsim/
Dtest_ap_eap.py7370 depth = None
7375 depth = int(v.split('=')[1])
7378 if depth is not None and cert:
7379 certs[depth] = binascii.unhexlify(cert)
/hostap-latest/src/eap_peer/
Deap.c2150 data->cert_fail.depth, in eap_peer_sm_tls_event()
/hostap-latest/doc/
Ddbus.doxygen1311 …ith pairs of field names and their values. Possible dictionary keys are: "depth", "subject", "alts…