Lines Matching full:certificate
505 /* use system ca certificate store as fallback */
557 /* Sets the priority on the certificate types supported by gnutls. Priority
723 failf(data, "error reading X.509 key or certificate file");
896 /* This function will return the peer's raw certificate (chain) as sent by
898 X.509). In case of a X.509 then a certificate list may be present. The
899 first certificate in the list is the peer's certificate, following the
900 issuer's certificate, then the issuer's issuer etc. */
944 /* This function will try to verify the peer's certificate and return its
948 regarding the certificate key size and chain size are set. To override
960 failf(data, "server certificate verification failed. CAfile: %s "
967 infof(data, "\t server certificate verification FAILED\n");
970 infof(data, "\t server certificate verification OK\n");
973 infof(data, "\t server certificate verification SKIPPED\n");
986 infof(data, "\t server certificate status verification FAILED\n");
1035 crl_reason = "certificate superseded";
1043 crl_reason = "certificate is on hold";
1059 failf(data, "Server certificate was revoked: %s", crl_reason);
1065 failf(data, "Server certificate status is unknown");
1074 infof(data, "\t server certificate status verification OK\n");
1077 infof(data, "\t server certificate status verification SKIPPED\n");
1080 /* initialize an X.509 certificate structure. */
1084 /* convert the given DER or PEM encoded Certificate to the native
1096 failf(data, "server certificate issuer check failed (IssuerCert: %s)",
1101 infof(data, "\t server certificate issuer check OK (Issuer Cert: %s)\n",
1116 /* This function will check if the given certificate's subject matches the
1169 failf(data, "SSL: certificate subject name (%s) does not match "
1191 infof(data, "\t server certificate expiration date verify FAILED\n");
1196 failf(data, "server certificate expiration date has passed.");
1201 infof(data, "\t server certificate expiration date FAILED\n");
1204 infof(data, "\t server certificate expiration date OK\n");
1216 infof(data, "\t server certificate activation date verify FAILED\n");
1221 failf(data, "server certificate not activated yet.");
1226 infof(data, "\t server certificate activation date FAILED\n");
1229 infof(data, "\t server certificate activation date OK\n");
1254 infof(data, "\t certificate public key: %s\n",
1257 /* version of the X.509 certificate. */
1258 infof(data, "\t certificate version: #%d\n",