Home
last modified time | relevance | path

Searched refs:subject (Results 1 – 16 of 16) sorted by relevance

/mbedtls-latest/library/
Dx509write_csr.c50 mbedtls_asn1_free_named_data_list(&ctx->subject); in mbedtls_x509write_csr_free()
69 return mbedtls_x509_string_to_names(&ctx->subject, subject_name); in mbedtls_x509write_csr_set_subject_name()
200 ctx->subject)); in x509write_csr_der_internal()
Dx509_csr.c360 if ((ret = mbedtls_x509_get_name(&p, p + len, &csr->subject)) != 0) { in mbedtls_x509_csr_parse_der_internal()
545 ret = mbedtls_x509_dn_gets(p, n, &csr->subject); in mbedtls_x509_csr_info()
629 mbedtls_asn1_free_named_data_list_shallow(csr->subject.next); in mbedtls_x509_csr_free()
Dx509write_crt.c53 mbedtls_asn1_free_named_data_list(&ctx->subject); in mbedtls_x509write_crt_free()
87 return mbedtls_x509_string_to_names(&ctx->subject, subject_name); in mbedtls_x509write_crt_set_subject_name()
498 ctx->subject)); in mbedtls_x509write_crt_der()
Dx509_crt.c1216 if (len && (ret = mbedtls_x509_get_name(&p, p + len, &crt->subject)) != 0) { in x509_crt_parse_der_core()
1786 ret = mbedtls_x509_dn_gets(p, n, &crt->subject); in mbedtls_x509_crt_info()
2030 x509_name_cmp(&crl_list->issuer, &ca->subject) != 0) { in x509_crt_verifycrl()
2187 if (x509_name_cmp(&child->issuer, &parent->subject) != 0) { in x509_crt_check_parent()
2450 if (x509_name_cmp(&crt->issuer, &crt->subject) != 0) { in x509_crt_check_ee_locally_trusted()
2651 x509_name_cmp(&child->issuer, &child->subject) == 0) { in x509_crt_verify_chain()
2996 for (name = &crt->subject; name != NULL; name = name->next) { in x509_crt_verify_name()
3242 mbedtls_asn1_free_named_data_list_shallow(cert_cur->subject.next); in mbedtls_x509_crt_free()
/mbedtls-latest/include/mbedtls/
Dx509_csr.h45 mbedtls_x509_name subject; /**< The parsed subject data (named information object). */ member
68 mbedtls_asn1_named_data *MBEDTLS_PRIVATE(subject);
Dx509_crt.h55 mbedtls_x509_name subject; /**< The parsed subject data (named information object). */ member
223 mbedtls_asn1_named_data *MBEDTLS_PRIVATE(subject);
/mbedtls-latest/tests/suites/
Dtest_suite_x509parse.data185 X509 CRT information Bitstring in subject name
189 X509 CRT information Non-ASCII string in issuer name and subject name
225 X509 SAN parsing, no subject alt name
432 mbedtls_x509_dn_gets:"../framework/data_files/server1.crt":"subject":"C=NL, O=PolarSSL, CN=PolarSSL…
440 mbedtls_x509_dn_gets:"../framework/data_files/server2.crt":"subject":"C=NL, O=PolarSSL, CN=localhos…
448 mbedtls_x509_dn_gets:"../framework/data_files/server1.commas.crt":"subject":"C=NL, O=PolarSSL\\, Co…
452 mbedtls_x509_dn_gets:"../framework/data_files/server1.hashsymbol.crt":"subject":"C=NL, O=\\#PolarSS…
456 mbedtls_x509_dn_gets:"../framework/data_files/server1.spaces.crt":"subject":"C=NL, O=\\ PolarSSL\\ …
460 mbedtls_x509_dn_gets:"../framework/data_files/server1.asciichars.crt":"subject":"C=NL, O=\\E6\\9E\\…
1187 …\:E2\:7E\:62\:43\:CC\:E8 - subject C=NL, O=PolarSSL, CN=Polarssl Test EC CA - flags 0x00000000\nde…
[all …]
Dtest_suite_x509parse.function218 ret = mbedtls_snprintf(p, n, " - subject ");
221 ret = mbedtls_x509_dn_gets(p, n, &crt->subject);
887 crt.subject.next->val.p = (unsigned char *) new_subject_ou;
888 crt.subject.next->val.len = strlen(new_subject_ou);
890 res = mbedtls_x509_dn_gets(buf, 2000, &crt.subject);
918 if (strcmp(entity, "subject") == 0) {
919 res = mbedtls_x509_dn_gets(buf, 2000, &crt.subject);
Dtest_suite_debug.data63 …suer name \: C=NL, O=PolarSSL, CN=PolarSSL Test CA\nMyFile(0999)\: subject name \: C=NL…
67 …r name \: C=NL, O=PolarSSL, CN=Polarssl Test EC CA\nMyFile(0999)\: subject name \: C=NL…
/mbedtls-latest/programs/x509/
Dcert_write.c727 &issuer_crt.subject); in main()
758 &csr.subject); in main()
/mbedtls-latest/docs/architecture/
Dalternative-implementations.md24 …f the form 3.x. The interface of PSA drivers is currently still experimental and subject to change.
30 As of Mbed TLS 3.0, this interface is still experimental and subject to change, and not all operati…
/mbedtls-latest/docs/architecture/psa-migration/
Dmd-cipher-dispatch.md6 This document discusses a migration strategy for code that is not subject to `MBEDTLS_USE_PSA_CRYPT…
102 * Code that's subject to `MBEDTLS_USE_PSA_CRYPTO`: `pk.h`, X.509, TLS (excluding parts specific TLS…
/mbedtls-latest/
DLICENSE405 original licensor to copy, distribute or modify the Program subject to
DChangeLog731 * Fix an issue when parsing an otherName subject alternative name into a
1515 These restrictions may be subject to change.
3230 name and the CA's subject name differed in their string encoding (e.g.,
3337 signing CA used UTF8Strings in its subject field; while X.509 compliant,
3767 parsing the subject alternative names.
3972 identifier, subject identifier and basic constraints extensions.
5043 * cert_write app should use subject of issuer certificate as issuer of cert
5701 * Handle empty certificate subject names
/mbedtls-latest/programs/ssl/
Dssl_server2.c1167 if (mbedtls_x509_dn_gets(dn, sizeof(dn), &cert->subject) > 0) { in ssl_async_start()
/mbedtls-latest/docs/
Dpsa-transition.md1036 Beware that PKCS#1v1.5 decryption is subject to padding oracle attacks. Revealing when `psa_asymmet…