/hostap-latest/src/tls/ |
D | tlsv1_client_read.c | 287 char subject[128]; in tls_peer_cert_event() local 312 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_peer_cert_event() 313 ev.peer_cert.subject = subject; in tls_peer_cert_event() 335 char subject[128]; in tls_cert_chain_failure_event() local 342 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_cert_chain_failure_event() 343 ev.peer_cert.subject = subject; in tls_cert_chain_failure_event() 515 x509_name_string(&chain->subject, buf, sizeof(buf)); in tls_process_certificate() 532 ev.cert_fail.subject = buf; in tls_process_certificate() 553 x509_name_string(&chain->subject, buf, in tls_process_certificate() 555 ev.cert_fail.subject = buf; in tls_process_certificate()
|
D | x509v3.c | 55 x509_free_name(&cert->subject); in x509_certificate_free() 1068 return x509_parse_ext_alt_name(&cert->subject, hdr.payload, in x509_parse_ext_subject_alt_name() 1554 if (x509_parse_name(pos, end - pos, &cert->subject, &pos)) in x509_parse_tbs_certificate() 1561 x509_name_string(&cert->subject, sbuf, sizeof(sbuf)); in x509_parse_tbs_certificate() 2155 x509_name_string(&cert->subject, buf, sizeof(buf)); in x509_certificate_chain_validate() 2175 &cert->next->subject) != 0) { in x509_certificate_chain_validate() 2182 x509_name_string(&cert->next->subject, buf, in x509_certificate_chain_validate() 2217 if (x509_name_compare(&cert->issuer, &trust->subject) in x509_certificate_chain_validate() 2276 if (x509_name_compare(&cert->subject, name) == 0) in x509_certificate_get_subject() 2290 return x509_name_compare(&cert->issuer, &cert->subject) == 0; in x509_certificate_self_signed()
|
D | tlsv1_client_ocsp.c | 63 return x509_name_compare(&signer->subject, name) == 0; in ocsp_responder_id_match() 582 &issuer->subject) == 0) in tls_process_basic_ocsp_response() 600 &issuer->subject) != 0 || in tls_process_basic_ocsp_response() 743 x509_name_string(&cert->subject, sbuf, sizeof(sbuf)); in tls_process_ocsp_response()
|
D | x509v3.h | 57 struct x509_name subject; member
|
D | tlsv1_cred.c | 61 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { in tlsv1_add_cert_der() 73 x509_name_string(&cert->subject, name, sizeof(name)); in tlsv1_add_cert_der()
|
/hostap-latest/src/crypto/ |
D | tls_mbedtls_alt.c | 2566 int buflen = mbedtls_x509_dn_gets(buf, sizeof(buf), &crt->subject); in tls_mbedtls_set_peer_subject() 2785 const mbedtls_x509_name *name = &crt->subject; in tls_mbedtls_match_suffixes() 2907 const mbedtls_x509_name *name = &crt->subject; in tls_mbedtls_match_dn_field() 2953 char subject[MBEDTLS_X509_MAX_DN_NAME_SIZE * 2]; in tls_mbedtls_verify_fail_event() local 2954 if (mbedtls_x509_dn_gets(subject, sizeof(subject), &crt->subject) < 0) in tls_mbedtls_verify_fail_event() 2955 subject[0] = '\0'; in tls_mbedtls_verify_fail_event() 2960 ev.cert_fail.subject = subject; in tls_mbedtls_verify_fail_event() 2991 char subject[MBEDTLS_X509_MAX_DN_NAME_SIZE * 2]; in tls_mbedtls_verify_cert_event() local 2993 ev.peer_cert.subject = conn->peer_subject; in tls_mbedtls_verify_cert_event() 2994 if (ev.peer_cert.subject == NULL) in tls_mbedtls_verify_cert_event() [all …]
|
D | tls.h | 54 const char *subject; member 67 const char *subject; member
|
D | tls_wolfssl.c | 857 const char *subject, const char *err_str, in wolfssl_tls_fail_event() argument 872 ev.cert_fail.subject = subject; in wolfssl_tls_fail_event() 882 const char *subject) in wolfssl_tls_cert_event() argument 921 ev.peer_cert.subject = subject; in wolfssl_tls_cert_event()
|
D | tls_gnutls.c | 930 const char *subject, const char *err_str, in gnutls_tls_fail_event() argument 942 ev.cert_fail.subject = subject ? subject : ""; in gnutls_tls_fail_event() 1322 ev.peer_cert.subject = buf; in tls_connection_verify_peer()
|
D | crypto_wolfssl.c | 3356 dest = csr->req.c.subject.commonName; in crypto_csr_set_name() 3359 dest = csr->req.c.subject.sur; in crypto_csr_set_name() 3362 dest = csr->req.c.subject.country; in crypto_csr_set_name() 3365 dest = csr->req.c.subject.org; in crypto_csr_set_name() 3368 dest = csr->req.c.subject.unit; in crypto_csr_set_name()
|
D | tls_openssl.c | 2307 const char *subject, const char *err_str, in openssl_tls_fail_event() argument 2322 ev.cert_fail.subject = subject; in openssl_tls_fail_event() 2363 const char *subject) in openssl_tls_cert_event() argument 2401 ev.peer_cert.subject = subject; in openssl_tls_cert_event()
|
/hostap-latest/wpa_supplicant/ |
D | notify.c | 852 cert->depth, cert->subject, cert_hash ? " hash=" : "", in wpas_notify_certification() 867 cert->depth, cert->subject, cert_hex); in wpas_notify_certification() 877 wpas_dbus_signal_certification(wpa_s, cert->depth, cert->subject, in wpas_notify_certification()
|
D | eapol_test.c | 443 static void eapol_test_write_cert(FILE *f, const char *subject, in eapol_test_write_cert() argument 452 "-----END CERTIFICATE-----\n\n", subject, encoded); in eapol_test_write_cert() 513 cert->depth, cert->subject, in eapol_test_cert_cb() 527 cert->depth, cert->subject, cert_hex); in eapol_test_cert_cb() 533 cert->subject, cert->cert); in eapol_test_cert_cb()
|
D | rrm.c | 312 u8 subject; in wpas_rrm_build_lci_report() local 326 subject = *request++; in wpas_rrm_build_lci_report() 330 subject); in wpas_rrm_build_lci_report() 332 if (subject != LOCATION_SUBJECT_REMOTE) { in wpas_rrm_build_lci_report()
|
D | defconfig | 511 # subject to change and this should not be expected to interoperate with the 656 # release under this optional build parameter. This functionality is subject to 665 # support for this by default, but that functionality is subject to be removed 671 # design is still subject to change. As such, this should not yet be enabled in
|
/hostap-latest/wpa_supplicant/dbus/ |
D | dbus_new.h | 248 int depth, const char *subject, 572 const char *subject, in wpas_dbus_signal_certification() argument
|
D | dbus_new.c | 1064 int depth, const char *subject, in wpas_dbus_signal_certification() argument 1089 !wpa_dbus_dict_append_string(&dict_iter, "subject", subject) || in wpas_dbus_signal_certification()
|
/hostap-latest/src/eap_server/ |
D | eap_server_teap.c | 512 const char *subject; in eap_teap_phase1_done() local 514 subject = tls_connection_get_peer_subject(data->ssl.conn); in eap_teap_phase1_done() 515 if (subject) { in eap_teap_phase1_done() 518 subject); in eap_teap_phase1_done() 519 data->identity = (u8 *) os_strdup(subject); in eap_teap_phase1_done() 520 data->identity_len = os_strlen(subject); in eap_teap_phase1_done()
|
/hostap-latest/src/ap/ |
D | authsrv.c | 171 data->cert_fail.subject, in authsrv_tls_event() 178 data->peer_cert.subject); in authsrv_tls_event()
|
/hostap-latest/hostapd/ |
D | defconfig | 167 # subject to change and this should not be expected to interoperate with the 401 # release under this optional build parameter. This functionality is subject to 409 # that functionality is subject to be removed in the future. 414 # design is still subject to change. As such, this should not yet be enabled in
|
D | android.config | 215 # release under this optional build parameter. This functionality is subject to
|
/hostap-latest/hs20/server/ca/ |
D | openssl-root.cnf | 23 # several certificates with same subject
|
D | openssl.cnf | 23 # several certificates with same subject
|
/hostap-latest/tests/hwsim/ |
D | test_cert_check.py | 64 b"hash", subject=cert),
|
/hostap-latest/tests/ |
D | README | 32 the older fuzz testing tools that are subject to removal once the same
|