Home
last modified time | relevance | path

Searched refs:subject (Results 1 – 25 of 30) sorted by relevance

12

/hostap-3.6.0/src/tls/
Dtlsv1_client_read.c287 char subject[128]; in tls_peer_cert_event() local
312 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_peer_cert_event()
313 ev.peer_cert.subject = subject; in tls_peer_cert_event()
335 char subject[128]; in tls_cert_chain_failure_event() local
342 x509_name_string(&cert->subject, subject, sizeof(subject)); in tls_cert_chain_failure_event()
343 ev.peer_cert.subject = subject; in tls_cert_chain_failure_event()
515 x509_name_string(&chain->subject, buf, sizeof(buf)); in tls_process_certificate()
532 ev.cert_fail.subject = buf; in tls_process_certificate()
553 x509_name_string(&chain->subject, buf, in tls_process_certificate()
555 ev.cert_fail.subject = buf; in tls_process_certificate()
Dx509v3.c55 x509_free_name(&cert->subject); in x509_certificate_free()
1068 return x509_parse_ext_alt_name(&cert->subject, hdr.payload, in x509_parse_ext_subject_alt_name()
1554 if (x509_parse_name(pos, end - pos, &cert->subject, &pos)) in x509_parse_tbs_certificate()
1561 x509_name_string(&cert->subject, sbuf, sizeof(sbuf)); in x509_parse_tbs_certificate()
2155 x509_name_string(&cert->subject, buf, sizeof(buf)); in x509_certificate_chain_validate()
2175 &cert->next->subject) != 0) { in x509_certificate_chain_validate()
2182 x509_name_string(&cert->next->subject, buf, in x509_certificate_chain_validate()
2217 if (x509_name_compare(&cert->issuer, &trust->subject) in x509_certificate_chain_validate()
2276 if (x509_name_compare(&cert->subject, name) == 0) in x509_certificate_get_subject()
2290 return x509_name_compare(&cert->issuer, &cert->subject) == 0; in x509_certificate_self_signed()
Dtlsv1_client_ocsp.c63 return x509_name_compare(&signer->subject, name) == 0; in ocsp_responder_id_match()
582 &issuer->subject) == 0) in tls_process_basic_ocsp_response()
600 &issuer->subject) != 0 || in tls_process_basic_ocsp_response()
743 x509_name_string(&cert->subject, sbuf, sizeof(sbuf)); in tls_process_ocsp_response()
Dx509v3.h57 struct x509_name subject; member
Dtlsv1_cred.c61 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { in tlsv1_add_cert_der()
73 x509_name_string(&cert->subject, name, sizeof(name)); in tlsv1_add_cert_der()
/hostap-3.6.0/src/crypto/
Dtls.h53 const char *subject; member
66 const char *subject; member
Dtls_wolfssl.c833 const char *subject, const char *err_str, in wolfssl_tls_fail_event() argument
848 ev.cert_fail.subject = subject; in wolfssl_tls_fail_event()
858 const char *subject) in wolfssl_tls_cert_event() argument
897 ev.peer_cert.subject = subject; in wolfssl_tls_cert_event()
Dtls_gnutls.c930 const char *subject, const char *err_str, in gnutls_tls_fail_event() argument
942 ev.cert_fail.subject = subject ? subject : ""; in gnutls_tls_fail_event()
1322 ev.peer_cert.subject = buf; in tls_connection_verify_peer()
Dtls_openssl.c2153 const char *subject, const char *err_str, in openssl_tls_fail_event() argument
2168 ev.cert_fail.subject = subject; in openssl_tls_fail_event()
2209 const char *subject) in openssl_tls_cert_event() argument
2247 ev.peer_cert.subject = subject; in openssl_tls_cert_event()
/hostap-3.6.0/wpa_supplicant/
Dnotify.c814 cert->depth, cert->subject, cert_hash ? " hash=" : "", in wpas_notify_certification()
829 cert->depth, cert->subject, cert_hex); in wpas_notify_certification()
839 wpas_dbus_signal_certification(wpa_s, cert->depth, cert->subject, in wpas_notify_certification()
Deapol_test.c439 static void eapol_test_write_cert(FILE *f, const char *subject, in eapol_test_write_cert() argument
448 "-----END CERTIFICATE-----\n\n", subject, encoded); in eapol_test_write_cert()
509 cert->depth, cert->subject, in eapol_test_cert_cb()
523 cert->depth, cert->subject, cert_hex); in eapol_test_cert_cb()
529 cert->subject, cert->cert); in eapol_test_cert_cb()
Drrm.c312 u8 subject; in wpas_rrm_build_lci_report() local
326 subject = *request++; in wpas_rrm_build_lci_report()
330 subject); in wpas_rrm_build_lci_report()
332 if (subject != LOCATION_SUBJECT_REMOTE) { in wpas_rrm_build_lci_report()
Ddefconfig618 # release under this optional build parameter. This functionality is subject to
627 # support for this by default, but that functionality is subject to be removed
633 # design is still subject to change. As such, this should not yet be enabled in
Dandroid.config541 # release under this optional build parameter. This functionality is subject to
/hostap-3.6.0/src/ap/
Dauthsrv.c154 data->cert_fail.subject, in authsrv_tls_event()
161 data->peer_cert.subject); in authsrv_tls_event()
/hostap-3.6.0/wpa_supplicant/dbus/
Ddbus_new.h245 int depth, const char *subject,
564 const char *subject, in wpas_dbus_signal_certification() argument
Ddbus_new.c1030 int depth, const char *subject, in wpas_dbus_signal_certification() argument
1055 !wpa_dbus_dict_append_string(&dict_iter, "subject", subject) || in wpas_dbus_signal_certification()
/hostap-3.6.0/hostapd/
Ddefconfig160 # subject to change and this should not be expected to interoperate with the
388 # release under this optional build parameter. This functionality is subject to
396 # that functionality is subject to be removed in the future.
401 # design is still subject to change. As such, this should not yet be enabled in
Dandroid.config212 # release under this optional build parameter. This functionality is subject to
/hostap-3.6.0/src/eap_server/
Deap_server_teap.c508 const char *subject; in eap_teap_phase1_done() local
510 subject = tls_connection_get_peer_subject(data->ssl.conn); in eap_teap_phase1_done()
511 if (subject) { in eap_teap_phase1_done()
514 subject); in eap_teap_phase1_done()
515 data->identity = (u8 *) os_strdup(subject); in eap_teap_phase1_done()
516 data->identity_len = os_strlen(subject); in eap_teap_phase1_done()
/hostap-3.6.0/hs20/server/ca/
Dopenssl-root.cnf23 # several certificates with same subject
Dopenssl.cnf23 # several certificates with same subject
/hostap-3.6.0/tests/hwsim/
Dtest_cert_check.py64 b"hash", subject=cert),
/hostap-3.6.0/tests/
DREADME32 the older fuzz testing tools that are subject to removal once the same
/hostap-3.6.0/src/eap_peer/
Deap.c2119 data->cert_fail.subject, in eap_peer_sm_tls_event()

12