Searched refs:subject (Results 1 – 16 of 16) sorted by relevance
/mbedtls-latest/library/ |
D | x509write_csr.c | 50 mbedtls_asn1_free_named_data_list(&ctx->subject); in mbedtls_x509write_csr_free() 69 return mbedtls_x509_string_to_names(&ctx->subject, subject_name); in mbedtls_x509write_csr_set_subject_name() 200 ctx->subject)); in x509write_csr_der_internal()
|
D | x509_csr.c | 360 if ((ret = mbedtls_x509_get_name(&p, p + len, &csr->subject)) != 0) { in mbedtls_x509_csr_parse_der_internal() 545 ret = mbedtls_x509_dn_gets(p, n, &csr->subject); in mbedtls_x509_csr_info() 629 mbedtls_asn1_free_named_data_list_shallow(csr->subject.next); in mbedtls_x509_csr_free()
|
D | x509write_crt.c | 53 mbedtls_asn1_free_named_data_list(&ctx->subject); in mbedtls_x509write_crt_free() 87 return mbedtls_x509_string_to_names(&ctx->subject, subject_name); in mbedtls_x509write_crt_set_subject_name() 498 ctx->subject)); in mbedtls_x509write_crt_der()
|
D | x509_crt.c | 1216 if (len && (ret = mbedtls_x509_get_name(&p, p + len, &crt->subject)) != 0) { in x509_crt_parse_der_core() 1786 ret = mbedtls_x509_dn_gets(p, n, &crt->subject); in mbedtls_x509_crt_info() 2030 x509_name_cmp(&crl_list->issuer, &ca->subject) != 0) { in x509_crt_verifycrl() 2187 if (x509_name_cmp(&child->issuer, &parent->subject) != 0) { in x509_crt_check_parent() 2450 if (x509_name_cmp(&crt->issuer, &crt->subject) != 0) { in x509_crt_check_ee_locally_trusted() 2651 x509_name_cmp(&child->issuer, &child->subject) == 0) { in x509_crt_verify_chain() 2996 for (name = &crt->subject; name != NULL; name = name->next) { in x509_crt_verify_name() 3242 mbedtls_asn1_free_named_data_list_shallow(cert_cur->subject.next); in mbedtls_x509_crt_free()
|
/mbedtls-latest/include/mbedtls/ |
D | x509_csr.h | 45 mbedtls_x509_name subject; /**< The parsed subject data (named information object). */ member 68 mbedtls_asn1_named_data *MBEDTLS_PRIVATE(subject);
|
D | x509_crt.h | 55 mbedtls_x509_name subject; /**< The parsed subject data (named information object). */ member 223 mbedtls_asn1_named_data *MBEDTLS_PRIVATE(subject);
|
/mbedtls-latest/tests/suites/ |
D | test_suite_x509parse.data | 185 X509 CRT information Bitstring in subject name 189 X509 CRT information Non-ASCII string in issuer name and subject name 225 X509 SAN parsing, no subject alt name 432 mbedtls_x509_dn_gets:"../framework/data_files/server1.crt":"subject":"C=NL, O=PolarSSL, CN=PolarSSL… 440 mbedtls_x509_dn_gets:"../framework/data_files/server2.crt":"subject":"C=NL, O=PolarSSL, CN=localhos… 448 mbedtls_x509_dn_gets:"../framework/data_files/server1.commas.crt":"subject":"C=NL, O=PolarSSL\\, Co… 452 mbedtls_x509_dn_gets:"../framework/data_files/server1.hashsymbol.crt":"subject":"C=NL, O=\\#PolarSS… 456 mbedtls_x509_dn_gets:"../framework/data_files/server1.spaces.crt":"subject":"C=NL, O=\\ PolarSSL\\ … 460 mbedtls_x509_dn_gets:"../framework/data_files/server1.asciichars.crt":"subject":"C=NL, O=\\E6\\9E\\… 1187 …\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\nde… [all …]
|
D | test_suite_x509parse.function | 218 ret = mbedtls_snprintf(p, n, " - subject "); 221 ret = mbedtls_x509_dn_gets(p, n, &crt->subject); 887 crt.subject.next->val.p = (unsigned char *) new_subject_ou; 888 crt.subject.next->val.len = strlen(new_subject_ou); 890 res = mbedtls_x509_dn_gets(buf, 2000, &crt.subject); 918 if (strcmp(entity, "subject") == 0) { 919 res = mbedtls_x509_dn_gets(buf, 2000, &crt.subject);
|
D | test_suite_debug.data | 63 …suer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nMyFile(0999)\: subject name \: C=NL… 67 …r name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nMyFile(0999)\: subject name \: C=NL…
|
/mbedtls-latest/programs/x509/ |
D | cert_write.c | 727 &issuer_crt.subject); in main() 758 &csr.subject); in main()
|
/mbedtls-latest/docs/architecture/ |
D | alternative-implementations.md | 24 …f the form 3.x. The interface of PSA drivers is currently still experimental and subject to change. 30 As of Mbed TLS 3.0, this interface is still experimental and subject to change, and not all operati…
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | md-cipher-dispatch.md | 6 This document discusses a migration strategy for code that is not subject to `MBEDTLS_USE_PSA_CRYPT… 102 * Code that's subject to `MBEDTLS_USE_PSA_CRYPTO`: `pk.h`, X.509, TLS (excluding parts specific TLS…
|
/mbedtls-latest/ |
D | LICENSE | 405 original licensor to copy, distribute or modify the Program subject to
|
D | ChangeLog | 731 * Fix an issue when parsing an otherName subject alternative name into a 1515 These restrictions may be subject to change. 3230 name and the CA's subject name differed in their string encoding (e.g., 3337 signing CA used UTF8Strings in its subject field; while X.509 compliant, 3767 parsing the subject alternative names. 3972 identifier, subject identifier and basic constraints extensions. 5043 * cert_write app should use subject of issuer certificate as issuer of cert 5701 * Handle empty certificate subject names
|
/mbedtls-latest/programs/ssl/ |
D | ssl_server2.c | 1167 if (mbedtls_x509_dn_gets(dn, sizeof(dn), &cert->subject) > 0) { in ssl_async_start()
|
/mbedtls-latest/docs/ |
D | psa-transition.md | 1036 Beware that PKCS#1v1.5 decryption is subject to padding oracle attacks. Revealing when `psa_asymmet…
|