/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_config.h | 233 * domain_match - Constraint for server domain name 245 char *domain_match; member in struct:eap_peer_config 353 * This field is like domain_match, but used for phase 2 (inside
|
H A D | eap_tls_common.c | 102 params->domain_match = config->domain_match; 125 params->domain_match = config->domain_match2;
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_config.h | 233 * domain_match - Constraint for server domain name 245 char *domain_match; member in struct:eap_peer_config 353 * This field is like domain_match, but used for phase 2 (inside
|
H A D | eap_tls_common.c | 102 params->domain_match = config->domain_match; 125 params->domain_match = config->domain_match2;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_config.h | 233 * domain_match - Constraint for server domain name 245 char *domain_match; member in struct:eap_peer_config 353 * This field is like domain_match, but used for phase 2 (inside
|
H A D | eap_tls_common.c | 102 params->domain_match = config->domain_match; 125 params->domain_match = config->domain_match2;
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_gnutls.c | 63 char *domain_match; member in struct:tls_connection 287 os_free(conn->domain_match); 384 os_free(conn->domain_match); 385 conn->domain_match = NULL; 386 if (params->domain_match) { 387 conn->domain_match = os_strdup(params->domain_match); 388 if (conn->domain_match == NULL) 392 if (params->domain_match) { 393 wpa_printf(MSG_INFO, "GnuTLS: domain_match no [all...] |
H A D | tls.h | 115 * @domain_match: String to match in the dNSName or CN of the peer 164 const char *domain_match; member in struct:tls_connection_params
|
H A D | tls_openssl.c | 198 char *subject_match, *altsubject_match, *suffix_match, *domain_match; member in struct:tls_connection 1382 os_free(conn->domain_match); 1763 char *match, *altmatch, *suffix_match, *domain_match; local 1791 domain_match = conn->domain_match; 1880 } else if (depth == 0 && domain_match && 1881 !tls_match_suffix(err_cert, domain_match, 1)) { 1883 domain_match); 2195 const char *domain_match) 2221 os_free(conn->domain_match); 2191 tls_connection_set_subject_match(struct tls_connection *conn, const char *subject_match, const char *altsubject_match, const char *suffix_match, const char *domain_match) argument [all...] |
H A D | tls_internal.c | 231 if (params->domain_match) { 232 wpa_printf(MSG_INFO, "TLS: domain_match not supported");
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_gnutls.c | 63 char *domain_match; member in struct:tls_connection 287 os_free(conn->domain_match); 384 os_free(conn->domain_match); 385 conn->domain_match = NULL; 386 if (params->domain_match) { 387 conn->domain_match = os_strdup(params->domain_match); 388 if (conn->domain_match == NULL) 392 if (params->domain_match) { 393 wpa_printf(MSG_INFO, "GnuTLS: domain_match no [all...] |
H A D | tls.h | 115 * @domain_match: String to match in the dNSName or CN of the peer 164 const char *domain_match; member in struct:tls_connection_params
|
H A D | tls_openssl.c | 198 char *subject_match, *altsubject_match, *suffix_match, *domain_match; member in struct:tls_connection 1382 os_free(conn->domain_match); 1763 char *match, *altmatch, *suffix_match, *domain_match; local 1791 domain_match = conn->domain_match; 1880 } else if (depth == 0 && domain_match && 1881 !tls_match_suffix(err_cert, domain_match, 1)) { 1883 domain_match); 2195 const char *domain_match) 2221 os_free(conn->domain_match); 2191 tls_connection_set_subject_match(struct tls_connection *conn, const char *subject_match, const char *altsubject_match, const char *suffix_match, const char *domain_match) argument [all...] |
H A D | tls_internal.c | 231 if (params->domain_match) { 232 wpa_printf(MSG_INFO, "TLS: domain_match not supported");
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_gnutls.c | 63 char *domain_match; member in struct:tls_connection 287 os_free(conn->domain_match); 384 os_free(conn->domain_match); 385 conn->domain_match = NULL; 386 if (params->domain_match) { 387 conn->domain_match = os_strdup(params->domain_match); 388 if (conn->domain_match == NULL) 392 if (params->domain_match) { 393 wpa_printf(MSG_INFO, "GnuTLS: domain_match no [all...] |
H A D | tls.h | 115 * @domain_match: String to match in the dNSName or CN of the peer 164 const char *domain_match; member in struct:tls_connection_params
|
H A D | tls_openssl.c | 198 char *subject_match, *altsubject_match, *suffix_match, *domain_match; member in struct:tls_connection 1382 os_free(conn->domain_match); 1763 char *match, *altmatch, *suffix_match, *domain_match; local 1791 domain_match = conn->domain_match; 1880 } else if (depth == 0 && domain_match && 1881 !tls_match_suffix(err_cert, domain_match, 1)) { 1883 domain_match); 2195 const char *domain_match) 2221 os_free(conn->domain_match); 2191 tls_connection_set_subject_match(struct tls_connection *conn, const char *subject_match, const char *altsubject_match, const char *suffix_match, const char *domain_match) argument [all...] |
H A D | tls_internal.c | 231 if (params->domain_match) { 232 wpa_printf(MSG_INFO, "TLS: domain_match not supported");
|
/external/v8/tools/gyp/pylib/gyp/generator/ |
H A D | msvs.py | 130 domain_match = domain_re.search(config) 131 if domain_match: 132 domain = domain_match.group(1)
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | config_file.c | 705 STR(domain_match);
|
H A D | config.c | 1932 { STRe(domain_match) }, 2173 os_free(eap->domain_match);
|