Home
last modified time | relevance | path

Searched refs:subject (Results 1 – 25 of 32) sorted by relevance

12

/hostap-latest/src/tls/
Dtlsv1_client_read.c287 char subject[128]; in tls_peer_cert_event() local
312 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_peer_cert_event()
313 ev.peer_cert.subject = subject; in tls_peer_cert_event()
335 char subject[128]; in tls_cert_chain_failure_event() local
342 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_cert_chain_failure_event()
343 ev.peer_cert.subject = subject; in tls_cert_chain_failure_event()
515 x509_name_string(&chain->subject, buf, sizeof(buf)); in tls_process_certificate()
532 ev.cert_fail.subject = buf; in tls_process_certificate()
553 x509_name_string(&chain->subject, buf, in tls_process_certificate()
555 ev.cert_fail.subject = buf; in tls_process_certificate()
Dx509v3.c55 x509_free_name(&cert->subject); in x509_certificate_free()
1068 return x509_parse_ext_alt_name(&cert->subject, hdr.payload, in x509_parse_ext_subject_alt_name()
1554 if (x509_parse_name(pos, end - pos, &cert->subject, &pos)) in x509_parse_tbs_certificate()
1561 x509_name_string(&cert->subject, sbuf, sizeof(sbuf)); in x509_parse_tbs_certificate()
2155 x509_name_string(&cert->subject, buf, sizeof(buf)); in x509_certificate_chain_validate()
2175 &cert->next->subject) != 0) { in x509_certificate_chain_validate()
2182 x509_name_string(&cert->next->subject, buf, in x509_certificate_chain_validate()
2217 if (x509_name_compare(&cert->issuer, &trust->subject) in x509_certificate_chain_validate()
2276 if (x509_name_compare(&cert->subject, name) == 0) in x509_certificate_get_subject()
2290 return x509_name_compare(&cert->issuer, &cert->subject) == 0; in x509_certificate_self_signed()
Dtlsv1_client_ocsp.c63 return x509_name_compare(&signer->subject, name) == 0; in ocsp_responder_id_match()
582 &issuer->subject) == 0) in tls_process_basic_ocsp_response()
600 &issuer->subject) != 0 || in tls_process_basic_ocsp_response()
743 x509_name_string(&cert->subject, sbuf, sizeof(sbuf)); in tls_process_ocsp_response()
Dx509v3.h57 struct x509_name subject; member
Dtlsv1_cred.c61 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { in tlsv1_add_cert_der()
73 x509_name_string(&cert->subject, name, sizeof(name)); in tlsv1_add_cert_der()
/hostap-latest/src/crypto/
Dtls_mbedtls_alt.c2566 int buflen = mbedtls_x509_dn_gets(buf, sizeof(buf), &crt->subject); in tls_mbedtls_set_peer_subject()
2785 const mbedtls_x509_name *name = &crt->subject; in tls_mbedtls_match_suffixes()
2907 const mbedtls_x509_name *name = &crt->subject; in tls_mbedtls_match_dn_field()
2953 char subject[MBEDTLS_X509_MAX_DN_NAME_SIZE * 2]; in tls_mbedtls_verify_fail_event() local
2954 if (mbedtls_x509_dn_gets(subject, sizeof(subject), &crt->subject) < 0) in tls_mbedtls_verify_fail_event()
2955 subject[0] = '\0'; in tls_mbedtls_verify_fail_event()
2960 ev.cert_fail.subject = subject; in tls_mbedtls_verify_fail_event()
2991 char subject[MBEDTLS_X509_MAX_DN_NAME_SIZE * 2]; in tls_mbedtls_verify_cert_event() local
2993 ev.peer_cert.subject = conn->peer_subject; in tls_mbedtls_verify_cert_event()
2994 if (ev.peer_cert.subject == NULL) in tls_mbedtls_verify_cert_event()
[all …]
Dtls.h54 const char *subject; member
67 const char *subject; member
Dtls_wolfssl.c857 const char *subject, const char *err_str, in wolfssl_tls_fail_event() argument
872 ev.cert_fail.subject = subject; in wolfssl_tls_fail_event()
882 const char *subject) in wolfssl_tls_cert_event() argument
921 ev.peer_cert.subject = subject; in wolfssl_tls_cert_event()
Dtls_gnutls.c930 const char *subject, const char *err_str, in gnutls_tls_fail_event() argument
942 ev.cert_fail.subject = subject ? subject : ""; in gnutls_tls_fail_event()
1322 ev.peer_cert.subject = buf; in tls_connection_verify_peer()
Dcrypto_wolfssl.c3356 dest = csr->req.c.subject.commonName; in crypto_csr_set_name()
3359 dest = csr->req.c.subject.sur; in crypto_csr_set_name()
3362 dest = csr->req.c.subject.country; in crypto_csr_set_name()
3365 dest = csr->req.c.subject.org; in crypto_csr_set_name()
3368 dest = csr->req.c.subject.unit; in crypto_csr_set_name()
Dtls_openssl.c2307 const char *subject, const char *err_str, in openssl_tls_fail_event() argument
2322 ev.cert_fail.subject = subject; in openssl_tls_fail_event()
2363 const char *subject) in openssl_tls_cert_event() argument
2401 ev.peer_cert.subject = subject; in openssl_tls_cert_event()
/hostap-latest/wpa_supplicant/
Dnotify.c852 cert->depth, cert->subject, cert_hash ? " hash=" : "", in wpas_notify_certification()
867 cert->depth, cert->subject, cert_hex); in wpas_notify_certification()
877 wpas_dbus_signal_certification(wpa_s, cert->depth, cert->subject, in wpas_notify_certification()
Deapol_test.c443 static void eapol_test_write_cert(FILE *f, const char *subject, in eapol_test_write_cert() argument
452 "-----END CERTIFICATE-----\n\n", subject, encoded); in eapol_test_write_cert()
513 cert->depth, cert->subject, in eapol_test_cert_cb()
527 cert->depth, cert->subject, cert_hex); in eapol_test_cert_cb()
533 cert->subject, cert->cert); in eapol_test_cert_cb()
Drrm.c312 u8 subject; in wpas_rrm_build_lci_report() local
326 subject = *request++; in wpas_rrm_build_lci_report()
330 subject); in wpas_rrm_build_lci_report()
332 if (subject != LOCATION_SUBJECT_REMOTE) { in wpas_rrm_build_lci_report()
Ddefconfig511 # subject to change and this should not be expected to interoperate with the
656 # release under this optional build parameter. This functionality is subject to
665 # support for this by default, but that functionality is subject to be removed
671 # design is still subject to change. As such, this should not yet be enabled in
/hostap-latest/wpa_supplicant/dbus/
Ddbus_new.h248 int depth, const char *subject,
572 const char *subject, in wpas_dbus_signal_certification() argument
Ddbus_new.c1064 int depth, const char *subject, in wpas_dbus_signal_certification() argument
1089 !wpa_dbus_dict_append_string(&dict_iter, "subject", subject) || in wpas_dbus_signal_certification()
/hostap-latest/src/eap_server/
Deap_server_teap.c512 const char *subject; in eap_teap_phase1_done() local
514 subject = tls_connection_get_peer_subject(data->ssl.conn); in eap_teap_phase1_done()
515 if (subject) { in eap_teap_phase1_done()
518 subject); in eap_teap_phase1_done()
519 data->identity = (u8 *) os_strdup(subject); in eap_teap_phase1_done()
520 data->identity_len = os_strlen(subject); in eap_teap_phase1_done()
/hostap-latest/src/ap/
Dauthsrv.c171 data->cert_fail.subject, in authsrv_tls_event()
178 data->peer_cert.subject); in authsrv_tls_event()
/hostap-latest/hostapd/
Ddefconfig167 # subject to change and this should not be expected to interoperate with the
401 # release under this optional build parameter. This functionality is subject to
409 # that functionality is subject to be removed in the future.
414 # design is still subject to change. As such, this should not yet be enabled in
Dandroid.config215 # release under this optional build parameter. This functionality is subject to
/hostap-latest/hs20/server/ca/
Dopenssl-root.cnf23 # several certificates with same subject
Dopenssl.cnf23 # several certificates with same subject
/hostap-latest/tests/hwsim/
Dtest_cert_check.py64 b"hash", subject=cert),
/hostap-latest/tests/
DREADME32 the older fuzz testing tools that are subject to removal once the same

12