Searched refs:domain_match (Results 1 - 21 of 21) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_config.h233 * domain_match - Constraint for server domain name
245 char *domain_match; member in struct:eap_peer_config
353 * This field is like domain_match, but used for phase 2 (inside
H A Deap_tls_common.c102 params->domain_match = config->domain_match;
125 params->domain_match = config->domain_match2;
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_config.h233 * domain_match - Constraint for server domain name
245 char *domain_match; member in struct:eap_peer_config
353 * This field is like domain_match, but used for phase 2 (inside
H A Deap_tls_common.c102 params->domain_match = config->domain_match;
125 params->domain_match = config->domain_match2;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_config.h233 * domain_match - Constraint for server domain name
245 char *domain_match; member in struct:eap_peer_config
353 * This field is like domain_match, but used for phase 2 (inside
H A Deap_tls_common.c102 params->domain_match = config->domain_match;
125 params->domain_match = config->domain_match2;
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_gnutls.c63 char *domain_match; member in struct:tls_connection
287 os_free(conn->domain_match);
384 os_free(conn->domain_match);
385 conn->domain_match = NULL;
386 if (params->domain_match) {
387 conn->domain_match = os_strdup(params->domain_match);
388 if (conn->domain_match == NULL)
392 if (params->domain_match) {
393 wpa_printf(MSG_INFO, "GnuTLS: domain_match no
[all...]
H A Dtls.h115 * @domain_match: String to match in the dNSName or CN of the peer
164 const char *domain_match; member in struct:tls_connection_params
H A Dtls_openssl.c198 char *subject_match, *altsubject_match, *suffix_match, *domain_match; member in struct:tls_connection
1382 os_free(conn->domain_match);
1763 char *match, *altmatch, *suffix_match, *domain_match; local
1791 domain_match = conn->domain_match;
1880 } else if (depth == 0 && domain_match &&
1881 !tls_match_suffix(err_cert, domain_match, 1)) {
1883 domain_match);
2195 const char *domain_match)
2221 os_free(conn->domain_match);
2191 tls_connection_set_subject_match(struct tls_connection *conn, const char *subject_match, const char *altsubject_match, const char *suffix_match, const char *domain_match) argument
[all...]
H A Dtls_internal.c231 if (params->domain_match) {
232 wpa_printf(MSG_INFO, "TLS: domain_match not supported");
/external/wpa_supplicant_8/src/crypto/
H A Dtls_gnutls.c63 char *domain_match; member in struct:tls_connection
287 os_free(conn->domain_match);
384 os_free(conn->domain_match);
385 conn->domain_match = NULL;
386 if (params->domain_match) {
387 conn->domain_match = os_strdup(params->domain_match);
388 if (conn->domain_match == NULL)
392 if (params->domain_match) {
393 wpa_printf(MSG_INFO, "GnuTLS: domain_match no
[all...]
H A Dtls.h115 * @domain_match: String to match in the dNSName or CN of the peer
164 const char *domain_match; member in struct:tls_connection_params
H A Dtls_openssl.c198 char *subject_match, *altsubject_match, *suffix_match, *domain_match; member in struct:tls_connection
1382 os_free(conn->domain_match);
1763 char *match, *altmatch, *suffix_match, *domain_match; local
1791 domain_match = conn->domain_match;
1880 } else if (depth == 0 && domain_match &&
1881 !tls_match_suffix(err_cert, domain_match, 1)) {
1883 domain_match);
2195 const char *domain_match)
2221 os_free(conn->domain_match);
2191 tls_connection_set_subject_match(struct tls_connection *conn, const char *subject_match, const char *altsubject_match, const char *suffix_match, const char *domain_match) argument
[all...]
H A Dtls_internal.c231 if (params->domain_match) {
232 wpa_printf(MSG_INFO, "TLS: domain_match not supported");
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_gnutls.c63 char *domain_match; member in struct:tls_connection
287 os_free(conn->domain_match);
384 os_free(conn->domain_match);
385 conn->domain_match = NULL;
386 if (params->domain_match) {
387 conn->domain_match = os_strdup(params->domain_match);
388 if (conn->domain_match == NULL)
392 if (params->domain_match) {
393 wpa_printf(MSG_INFO, "GnuTLS: domain_match no
[all...]
H A Dtls.h115 * @domain_match: String to match in the dNSName or CN of the peer
164 const char *domain_match; member in struct:tls_connection_params
H A Dtls_openssl.c198 char *subject_match, *altsubject_match, *suffix_match, *domain_match; member in struct:tls_connection
1382 os_free(conn->domain_match);
1763 char *match, *altmatch, *suffix_match, *domain_match; local
1791 domain_match = conn->domain_match;
1880 } else if (depth == 0 && domain_match &&
1881 !tls_match_suffix(err_cert, domain_match, 1)) {
1883 domain_match);
2195 const char *domain_match)
2221 os_free(conn->domain_match);
2191 tls_connection_set_subject_match(struct tls_connection *conn, const char *subject_match, const char *altsubject_match, const char *suffix_match, const char *domain_match) argument
[all...]
H A Dtls_internal.c231 if (params->domain_match) {
232 wpa_printf(MSG_INFO, "TLS: domain_match not supported");
/external/v8/tools/gyp/pylib/gyp/generator/
H A Dmsvs.py130 domain_match = domain_re.search(config)
131 if domain_match:
132 domain = domain_match.group(1)
/external/wpa_supplicant_8/wpa_supplicant/
H A Dconfig_file.c705 STR(domain_match);
H A Dconfig.c1932 { STRe(domain_match) },
2173 os_free(eap->domain_match);

Completed in 283 milliseconds