/external/wpa_supplicant_8/src/ap/ |
D | authsrv.c | 176 data->peer_cert.depth, in authsrv_tls_event() 177 data->peer_cert.serial_num ? data->peer_cert.serial_num : "N/A", in authsrv_tls_event() 178 data->peer_cert.subject); in authsrv_tls_event()
|
/external/grpc-grpc/src/ruby/spec/ |
D | client_auth_spec.rb | 51 error_msg = "want:\n#{client_cert}\n\ngot:\n#{call.peer_cert}" 52 fail(error_msg) unless call.peer_cert == client_cert
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_wolfssl.c | 93 WOLFSSL_X509 *peer_cert; member 875 ev.peer_cert.cert = cert; in wolfssl_tls_cert_event() 886 ev.peer_cert.hash = hash; in wolfssl_tls_cert_event() 887 ev.peer_cert.hash_len = sizeof(hash); in wolfssl_tls_cert_event() 892 ev.peer_cert.depth = depth; in wolfssl_tls_cert_event() 893 ev.peer_cert.subject = subject; in wolfssl_tls_cert_event() 934 ev.peer_cert.altsubject[alt] = alt_subject[alt]; in wolfssl_tls_cert_event() 935 ev.peer_cert.num_altsubject = num_alt_subject; in wolfssl_tls_cert_event() 975 conn->peer_cert = err_cert; in tls_verify_cb()
|
D | tls_openssl.c | 272 X509 *peer_cert; member 1650 if (!conn->peer_cert) in tls_connection_peer_serial_num() 1653 ser = X509_get_serialNumber(conn->peer_cert); in tls_connection_peer_serial_num() 2198 ev.peer_cert.cert = cert; in openssl_tls_cert_event() 2207 ev.peer_cert.hash = hash; in openssl_tls_cert_event() 2208 ev.peer_cert.hash_len = sizeof(hash); in openssl_tls_cert_event() 2212 ev.peer_cert.depth = depth; in openssl_tls_cert_event() 2213 ev.peer_cert.subject = subject; in openssl_tls_cert_event() 2220 ev.peer_cert.serial_num = serial_num; in openssl_tls_cert_event() 2262 ev.peer_cert.altsubject[alt] = altsubject[alt]; in openssl_tls_cert_event() [all …]
|
D | tls_gnutls.c | 1311 ev.peer_cert.cert = cert_buf; in tls_connection_verify_peer() 1317 ev.peer_cert.hash = hash; in tls_connection_verify_peer() 1318 ev.peer_cert.hash_len = sizeof(hash); in tls_connection_verify_peer() 1321 ev.peer_cert.depth = i; in tls_connection_verify_peer() 1322 ev.peer_cert.subject = buf; in tls_connection_verify_peer()
|
D | tls.h | 69 } peer_cert; member
|
/external/libevent/test/ |
D | regress_ssl.c | 312 X509 *peer_cert; in eventcb() local 316 peer_cert = SSL_get_peer_certificate(ssl); in eventcb() 318 tt_assert(peer_cert == NULL); in eventcb() 320 tt_assert(peer_cert != NULL); in eventcb()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_client_read.c | 296 ev.peer_cert.cert = cert_buf; in tls_peer_cert_event() 305 ev.peer_cert.hash = hash; in tls_peer_cert_event() 306 ev.peer_cert.hash_len = sizeof(hash); in tls_peer_cert_event() 311 ev.peer_cert.depth = depth; in tls_peer_cert_event() 313 ev.peer_cert.subject = subject; in tls_peer_cert_event() 335 ev.peer_cert.subject = subject; in tls_cert_chain_failure_event()
|
/external/grpc-grpc/src/ruby/lib/grpc/generic/ |
D | active_call.rb | 579 def attach_peer_cert(peer_cert) argument 580 @peer_cert = peer_cert
|
D | rpc_server.rb | 450 c.attach_peer_cert(an_rpc.call.peer_cert)
|
/external/webrtc/webrtc/base/ |
D | opensslstreamadapter.h | 166 const X509* peer_cert,
|
D | opensslstreamadapter.cc | 1081 const X509* peer_cert, in SSLPostConnectionCheck() argument 1094 ASSERT((peer_cert != NULL) || (!peer_digest.empty())); in SSLPostConnectionCheck()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap.c | 2090 if (data->peer_cert.hash) { in eap_peer_sm_tls_event() 2091 size_t len = data->peer_cert.hash_len * 2 + 1; in eap_peer_sm_tls_event() 2095 data->peer_cert.hash, in eap_peer_sm_tls_event() 2096 data->peer_cert.hash_len); in eap_peer_sm_tls_event() 2101 data->peer_cert.depth, in eap_peer_sm_tls_event() 2102 data->peer_cert.subject, in eap_peer_sm_tls_event() 2103 data->peer_cert.altsubject, in eap_peer_sm_tls_event() 2104 data->peer_cert.num_altsubject, in eap_peer_sm_tls_event() 2105 hash_hex, data->peer_cert.cert); in eap_peer_sm_tls_event()
|
/external/python/cpython2/Modules/ |
D | _ssl.c | 334 X509 *peer_cert; member 584 self->peer_cert = NULL; in newPySSLSocket() 730 if (self->peer_cert) in PySSL_SSLdo_handshake() 731 X509_free (self->peer_cert); in PySSL_SSLdo_handshake() 733 self->peer_cert = SSL_get_peer_certificate(self->ssl); in PySSL_SSLdo_handshake() 1500 if (!self->peer_cert) in PySSL_peercert() 1508 return _certificate_to_der(self->peer_cert); in PySSL_peercert() 1514 return _decode_certificate(self->peer_cert); in PySSL_peercert() 1674 if (self->peer_cert) /* Possible not to have one? */ in PySSL_dealloc() 1675 X509_free (self->peer_cert); in PySSL_dealloc()
|
/external/wpa_supplicant_8/src/utils/ |
D | http_curl.c | 62 X509 *peer_cert; member 1023 ctx->peer_cert = cert; in curl_cb_ssl_verify() 1203 if (!ctx->peer_cert) { in ocsp_resp_cb() 1219 id = OCSP_cert_to_id(EVP_sha256(), ctx->peer_cert, ctx->peer_issuer); in ocsp_resp_cb() 1232 id = OCSP_cert_to_id(NULL, ctx->peer_cert, ctx->peer_issuer); in ocsp_resp_cb()
|
/external/grpc-grpc/src/core/tsi/ |
D | ssl_transport_security.cc | 1018 X509* peer_cert = SSL_get_peer_certificate(impl->ssl); in ssl_handshaker_result_extract_peer() local 1019 if (peer_cert != nullptr) { in ssl_handshaker_result_extract_peer() 1020 result = peer_from_x509(peer_cert, 1, peer); in ssl_handshaker_result_extract_peer() 1021 X509_free(peer_cert); in ssl_handshaker_result_extract_peer()
|
/external/python/cpython3/Modules/ |
D | _ssl.c | 1810 X509 *peer_cert; in _ssl__SSLSocket_getpeercert_impl() local 1818 peer_cert = SSL_get_peer_certificate(self->ssl); in _ssl__SSLSocket_getpeercert_impl() 1819 if (peer_cert == NULL) in _ssl__SSLSocket_getpeercert_impl() 1824 result = _certificate_to_der(peer_cert); in _ssl__SSLSocket_getpeercert_impl() 1830 result = _decode_certificate(peer_cert); in _ssl__SSLSocket_getpeercert_impl() 1832 X509_free(peer_cert); in _ssl__SSLSocket_getpeercert_impl()
|
/external/grpc-grpc/src/ruby/spec/generic/ |
D | rpc_server_spec.rb | 643 expect(call.peer_cert).to be(nil)
|