Home | History | Annotate | Download | only in tls

Lines Matching full:certificate

2  * X.509v3 certificate parsing and processing (RFC 3280 profile)
42 * x509_certificate_free - Free an X.509 certificate
43 * @cert: Certificate to be freed
63 * x509_certificate_free - Free an X.509 certificate chain
64 * @cert: Pointer to the first certificate in the chain
141 * x509_name_compare - Compare X.509 certificate names
142 * @a: Certificate name
143 * @b: Certificate name
452 wpa_printf(MSG_INFO, "X509: Reject certificate with "
494 * x509_name_string - Convert an X.509 certificate name into a string
664 * CAs conforming to this profile MUST always encode certificate
665 * validity dates through the year 2049 as UTCTime; certificate
857 wpa_printf(MSG_INFO, "X509: Reject certificate with "
879 wpa_printf(MSG_INFO, "X509: Reject certificate with "
903 wpa_printf(MSG_INFO, "X509: Reject certificate with "
1085 * certificate policies (section 4.2.1.5)
1394 wpa_printf(MSG_DEBUG, "X509: X.509%d certificate and "
1468 * x509_certificate_parse - Parse a X.509 certificate in DER format
1469 * @buf: Pointer to the X.509 certificate in DER format
1471 * Returns: Pointer to the parsed certificate or %NULL on failure
1473 * Caller is responsible for freeing the returned certificate by calling
1492 /* RFC 3280 - X.509 v3 certificate / ASN.1 DER */
1494 /* Certificate ::= SEQUENCE */
1498 wpa_printf(MSG_DEBUG, "X509: Certificate did not start with "
1513 "encoded certificate",
1576 * x509_certificate_check_signature - Verify certificate signature
1577 * @issuer: Issuer certificate
1578 * @cert: Certificate to be verified
1681 "does not match with certificate "
1694 "does not match with certificate "
1713 "not match with certificate "
1751 wpa_hexdump(MSG_MSGDUMP, "X509: Certificate hash (MD5)",
1758 wpa_hexdump(MSG_MSGDUMP, "X509: Certificate hash (SHA1)",
1765 wpa_hexdump(MSG_MSGDUMP, "X509: Certificate hash (SHA256)",
1772 wpa_printf(MSG_INFO, "X509: Unsupported certificate signature "
1780 wpa_printf(MSG_INFO, "X509: Certificate Digest does not match "
1788 "X509: Extra data after certificate signature hash",
1797 wpa_printf(MSG_DEBUG, "X509: Certificate Digest matches with "
1808 wpa_printf(MSG_DEBUG, "X509: Non-CA certificate used as an "
1815 wpa_printf(MSG_DEBUG, "X509: v3 CA certificate did not "
1822 wpa_printf(MSG_DEBUG, "X509: Issuer certificate did not have "
1832 * x509_certificate_chain_validate - Validate X.509 certificate chain
1834 * @chain: Certificate chain to be validated (first chain must be issued by
1835 * signed by the second certificate in the chain and so on)
1851 wpa_printf(MSG_DEBUG, "X509: Validate certificate chain");
1866 wpa_printf(MSG_INFO, "X509: Certificate not valid "
1876 wpa_printf(MSG_DEBUG, "X509: Certificate "
1909 "certificate signature within "
1933 "certificate signature");
1938 wpa_printf(MSG_DEBUG, "X509: Trusted certificate "
1951 wpa_printf(MSG_DEBUG, "X509: Certificate chain validation "
1955 wpa_printf(MSG_DEBUG, "X509: Certificate chain valid");
1962 * x509_certificate_get_subject - Get a certificate based on Subject name
1963 * @chain: Certificate chain to search through
1965 certificate with the given Subject name or
1983 * x509_certificate_self_signed - Is the certificate self-signed?
1984 * @cert: Certificate
1985 * Returns: 1 if certificate is self-signed, 0 if not