/external/wpa_supplicant_8/hs20/client/ |
osu_client.c | 488 "Checking suffix match against server dNSName %s", 508 /* None of the dNSName(s) matched */ 547 wpa_printf(MSG_INFO, "FQDN '%s' for new PPS MO did not have suffix match with server's dNSName values", 549 write_result(ctx, "FQDN '%s' for new PPS MO did not have suffix match with server's dNSName values", [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
config.h | 163 * server certificate in SubjectAltName dNSName element(s). If a 164 * matching dNSName is found, this constraint is met. If no dNSName [all...] |
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/x509/ |
GeneralNameTest.java | 46 GeneralName san2 = new GeneralName(2, "dNSName");
|
/external/apache-http/src/org/apache/http/conn/ssl/ |
AbstractVerifier.java | 247 // If type is 2, then we've got a dNSName
|
/external/chromium_org/net/cert/ |
x509_certificate.h | 227 // type dNSName, this method gets the DNS names in that extension. 427 // from the dNSName and iPAddress components of the subject alternative name
|
x509_certificate_mac.cc | 258 // DNSName and IPAddress are encoded as IA5String and OCTET STRINGs
|
x509_certificate_win.cc | 185 // dNSName is an ASN.1 IA5String representing a string of ASCII
|
x509_util_nss.cc | 471 // DNSName and IPAddress are encoded as IA5String and OCTET STRINGs
|
/external/chromium_org/third_party/openssl/openssl/crypto/x509v3/ |
x509v3.h | 190 ASN1_IA5STRING *dNSName; 201 ASN1_IA5STRING *ia5;/* rfc822Name, dNSName, uniformResourceIdentifier */
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
x509v3.h | 190 ASN1_IA5STRING *dNSName; 201 ASN1_IA5STRING *ia5;/* rfc822Name, dNSName, uniformResourceIdentifier */
|
/external/openssl/crypto/x509v3/ |
x509v3.h | 190 ASN1_IA5STRING *dNSName; 201 ASN1_IA5STRING *ia5;/* rfc822Name, dNSName, uniformResourceIdentifier */
|
/external/openssl/include/openssl/ |
x509v3.h | 190 ASN1_IA5STRING *dNSName; 201 ASN1_IA5STRING *ia5;/* rfc822Name, dNSName, uniformResourceIdentifier */
|
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 1219 wpa_hexdump_ascii(MSG_DEBUG, "TLS: Certificate dNSName", 1220 gen->d.dNSName->data, 1221 gen->d.dNSName->length); 1222 if (domain_suffix_match(gen->d.dNSName->data, 1223 gen->d.dNSName->length, match) == 1) { 1224 wpa_printf(MSG_DEBUG, "TLS: Suffix match in dNSName found"); 1230 wpa_printf(MSG_DEBUG, "TLS: None of the dNSName(s) matched"); [all...] |
tls.h | 102 * @suffix_match: String to suffix match in the dNSName or CN of the peer
|
/external/iputils/ninfod/ |
ninfod_core.c | 201 .name = "DnsName",
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.c | 871 /* dNSName IA5String */ 872 wpa_hexdump_ascii(MSG_MSGDUMP, "X509: altName - dNSName", pos, len); 880 "embedded NUL byte in dNSName (%s[NUL])", 957 * dNSName [2] IA5String, [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/cert/ |
TrustAnchorTest.java | 393 * dNSName [2] IA5String,
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/cert/ |
TrustAnchor_ImplTest.java | 586 * dNSName [2] IA5String,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CertificateObject.java | 878 case GeneralName.dNSName:
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CertificateObject.java | 876 case GeneralName.dNSName:
|
/libcore/luni/src/test/java/tests/security/cert/ |
TrustAnchorTest.java | 599 * dNSName [2] IA5String,
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
ntsecapi.h | 414 LSA_UNICODE_STRING DnsName; [all...] |
/libcore/luni/src/main/java/java/security/cert/ |
X509CertSelector.java | 782 * dNSName [2] IA5String, [all...] |
/libcore/luni/src/test/java/libcore/java/security/cert/ |
X509CertificateTest.java | [all...] |
/external/ipsec-tools/src/racoon/ |
crypto_openssl.c | 717 /* read DNSName / Email */ [all...] |