/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls.h | 53 const struct wpabuf *cert; member in struct:tls_event_data::__anon33597 59 const struct wpabuf *cert; member in struct:tls_event_data::__anon33598
|
H A D | tls_gnutls.c | 407 static int tls_match_altsubject(X509 *cert, const char *match) 415 ext = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL); 536 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 543 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 571 wpa_printf(MSG_DEBUG, "Failed to read client cert/key " 578 "cert/key in DER format: %s", 646 wpa_printf(MSG_DEBUG, "Failed to read CA cert '%s' " 653 wpa_printf(MSG_DEBUG, "Failed to read CA cert " 682 wpa_printf(MSG_DEBUG, "Failed to read client cert/key " 689 "cert/ke 809 gnutls_x509_crt_t cert; local [all...] |
H A D | tls_nss.c | 291 CERTCertificate *cert; local 301 cert = SSL_PeerCertificate(fd); 302 subject = CERT_NameToAscii(&cert->subject); 303 issuer = CERT_NameToAscii(&cert->issuer); 306 CERT_DestroyCertificate(cert);
|
H A D | tls_openssl.c | 194 const CERT_CONTEXT *cert; member in struct:cryptoapi_rsa_data 317 if (priv->cert) 318 CertFreeCertificateContext(priv->cert); 345 if (strncmp(name, "cert://", 7) == 0) { 380 X509 *cert = NULL; local 386 (strncmp(name, "cert://", 7) != 0 && 400 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER); 401 if (priv->cert == NULL) { 402 priv->cert = cryptoapi_find_cert( 405 if (priv->cert 482 X509 *cert; local 1112 tls_match_altsubject_component(X509 *cert, int type, const char *value, size_t len) argument 1135 tls_match_altsubject(X509 *cert, const char *match) argument 1211 tls_match_suffix(X509 *cert, const char *match) argument 1315 get_x509_cert(X509 *cert) argument 1340 struct wpabuf *cert = NULL; local 1363 struct wpabuf *cert = NULL; local 1450 struct wpabuf *cert; local 1622 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob, local 1945 X509 *cert; local 2070 tls_engine_get_cert(struct tls_connection *conn, const char *cert_id, X509 **cert) argument 2077 X509 *cert; member in struct:__anon33604 2104 X509 *cert; local 2131 X509 *cert; local 2985 debug_print_cert(X509 *cert, const char *title) argument 3071 X509 *cert; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | ikev2_common.c | 303 payloads->cert = pdata;
|
H A D | ikev2_common.h | 304 const u8 *cert; member in struct:ikev2_payloads
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 1371 hash_hex, data->peer_cert.cert);
|
H A D | eap.h | 225 * @cert: Peer certificate 228 const char *cert_hash, const struct wpabuf *cert);
|
H A D | ikev2.c | 491 const u8 *cert, size_t cert_len) 495 if (cert == NULL) { 508 cert_encoding = cert[0]; 509 cert++; 513 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 638 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 490 ikev2_process_cert(struct ikev2_responder_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.c | 559 const u8 *cert, size_t cert_len) 563 if (cert == NULL) { 576 cert_encoding = cert[0]; 577 cert++; 581 wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 704 ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 558 ikev2_process_cert(struct ikev2_initiator_data *data, const u8 *cert, size_t cert_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1952 const struct wpabuf *cert) 1957 cert_hash, cert); 1950 eapol_sm_notify_cert(void *ctx, int depth, const char *subject, const char *cert_hash, const struct wpabuf *cert) argument
|
H A D | eapol_supp_sm.h | 241 * @cert: Peer certificate 244 const char *cert_hash, const struct wpabuf *cert);
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_read.c | 220 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 347 cert = x509_certificate_parse(pos, cert_len); 348 if (cert == NULL) { 358 chain = cert; 360 last->next = cert; 361 last = cert;
|
H A D | tlsv1_client_write.c | 27 struct x509_certificate *cert; local 32 cert = conn->cred->cert; 33 while (cert) { 34 len += 3 + cert->cert_len; 35 if (x509_certificate_self_signed(cert)) 37 cert = x509_certificate_get_subject(conn->cred->trusted_certs, 38 &cert->issuer); 134 struct x509_certificate *cert; local 155 cert [all...] |
H A D | tlsv1_common.c | 165 struct x509_certificate *cert; local 174 cert = x509_certificate_parse(buf, len); 175 if (cert == NULL) { 193 *pk = crypto_public_key_import(cert->public_key, cert->public_key_len); 194 x509_certificate_free(cert);
|
H A D | tlsv1_cred.c | 32 x509_certificate_chain_free(cred->cert); 43 struct x509_certificate *cert, *p; local 46 cert = x509_certificate_parse(buf, len); 47 if (cert == NULL) { 56 if (p && x509_name_compare(&cert->subject, &p->issuer) == 0) { 61 p->next = cert; 64 cert->next = *chain; 65 *chain = cert; 68 x509_name_string(&cert->subject, name, sizeof(name)); 153 const char *cert, cons 152 tlsv1_set_cert_chain(struct x509_certificate **chain, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument 189 tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len, const char *path) argument 216 tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert, const u8 *cert_blob, size_t cert_blob_len) argument [all...] |
H A D | tlsv1_cred.h | 14 struct x509_certificate *cert; member in struct:tlsv1_credentials 27 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert, 30 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
|
H A D | tlsv1_server_read.c | 297 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 422 cert = x509_certificate_parse(pos, cert_len); 423 if (cert == NULL) { 432 chain = cert; 434 last->next = cert; 435 last = cert;
|
H A D | tlsv1_server_write.c | 27 struct x509_certificate *cert; local 29 cert = conn->cred->cert; 30 while (cert) { 31 len += 3 + cert->cert_len; 32 if (x509_certificate_self_signed(cert)) 34 cert = x509_certificate_get_subject(conn->cred->trusted_certs, 35 &cert->issuer); 160 struct x509_certificate *cert; local 189 cert [all...] |
H A D | x509v3.c | 43 * @cert: Certificate to be freed 45 void x509_certificate_free(struct x509_certificate *cert) argument 47 if (cert == NULL) 49 if (cert->next) { 52 cert, cert->next); 54 x509_free_name(&cert->issuer); 55 x509_free_name(&cert->subject); 56 os_free(cert->public_key); 57 os_free(cert 66 x509_certificate_chain_free(struct x509_certificate *cert) argument 219 x509_parse_public_key(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 650 x509_parse_validity(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 724 x509_parse_ext_key_usage(struct x509_certificate *cert, const u8 *pos, size_t len) argument 761 x509_parse_ext_basic_constraints(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1023 x509_parse_ext_subject_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1050 x509_parse_ext_issuer_alt_name(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1077 x509_parse_extension_data(struct x509_certificate *cert, struct asn1_oid *oid, const u8 *pos, size_t len) argument 1106 x509_parse_extension(struct x509_certificate *cert, const u8 *pos, size_t len, const u8 **next) argument 1188 x509_parse_extensions(struct x509_certificate *cert, const u8 *pos, size_t len) argument 1218 x509_parse_tbs_certificate(const u8 *buf, size_t len, struct x509_certificate *cert, const u8 **next) argument 1480 struct x509_certificate *cert; local 1582 x509_certificate_check_signature(struct x509_certificate *issuer, struct x509_certificate *cert) argument 1804 x509_valid_issuer(const struct x509_certificate *cert) argument 1845 struct x509_certificate *cert, *trust; local 1972 struct x509_certificate *cert; local 1987 x509_certificate_self_signed(struct x509_certificate *cert) argument [all...] |
H A D | x509v3.h | 108 void x509_certificate_free(struct x509_certificate *cert); 112 void x509_certificate_chain_free(struct x509_certificate *cert); 114 struct x509_certificate *cert); 121 int x509_certificate_self_signed(struct x509_certificate *cert);
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | http-utils.h | 58 int (*cb)(void *ctx, struct http_cert *cert),
|
H A D | http_curl.c | 45 int (*cert_cb)(void *ctx, struct http_cert *cert); 168 static void debug_dump_cert(const char *title, X509 *cert) argument 178 X509_print_ex(out, cert, XN_FLAG_COMPAT, X509_FLAG_COMPAT); 193 static void add_alt_name_othername(struct http_ctx *ctx, struct http_cert *cert, argument 201 on = os_realloc_array(cert->othername, cert->num_othername + 1, 205 cert->othername = on; 206 on = &on[cert->num_othername]; 221 cert->num_othername++; 225 static void add_alt_name_dns(struct http_ctx *ctx, struct http_cert *cert, argument 246 add_alt_name(struct http_ctx *ctx, struct http_cert *cert, const GENERAL_NAME *name) argument 260 add_alt_names(struct http_ctx *ctx, struct http_cert *cert, GENERAL_NAMES *names) argument 745 add_logotype_ext(struct http_ctx *ctx, struct http_cert *hcert, X509 *cert) argument 816 parse_cert(struct http_ctx *ctx, struct http_cert *hcert, X509 *cert, GENERAL_NAMES **names) argument 852 validate_server_cert(struct http_ctx *ctx, X509 *cert) argument 879 X509 *cert; local 940 X509 *cert; local 1091 X509 *cert; local 1629 http_set_cert_cb(struct http_ctx *ctx, int (*cb)(void *ctx, struct http_cert *cert), void *cb_ctx) argument [all...] |
/external/wpa_supplicant_8/hs20/client/ |
H A D | est.c | 46 certs = p7->d.sign->cert; 49 certs = p7->d.signed_and_enveloped->cert; 77 X509 *cert = sk_X509_value(certs, i); local 78 X509_print(out, cert); 79 PEM_write_bio_X509(out, cert); 387 X509 *cert; local 393 cert = PEM_read_X509(f, NULL, NULL, NULL); 396 if (cert == NULL) 399 X509_get_subject_name(cert)); 400 X509_free(cert); [all...] |
H A D | osu_client.c | 182 static int process_est_cert(struct hs20_osu_client *ctx, xml_node_t *cert, argument 193 fingerprint = xml_node_get_text(ctx->xml, cert); 234 os_snprintf(buf, sizeof(buf), "SP/%s/client-cert.pem", fqdn); 236 wpa_printf(MSG_INFO, "Could not move est_cert.pem to client-cert.pem: %s", 267 #define TMP_CERT_DL_FILE "tmp-cert-download" 274 char *cert; local 315 cert = os_readfile(TMP_CERT_DL_FILE, &len); 317 if (cert == NULL) 320 if (sha256_vector(1, (const u8 **) &cert, &len, digest2) < 0) { 321 os_free(cert); 518 xml_node_t *tnds, *mo, *cert; local 658 xml_node_t *cert; local 2693 osu_cert_cb(void *_ctx, struct http_cert *cert) argument [all...] |