Lines Matching full:certificate
134 wpa_printf(MSG_WARNING, "TLS: Failed to parse certificate: %s",
285 /* Windows CryptoAPI and access to certificate stores */
513 wpa_printf(MSG_INFO, "CryptoAPI: Could not find certificate "
533 "certificate");
630 wpa_printf(MSG_DEBUG, "OpenSSL: Loaded CA certificate for "
631 "system certificate store: subject='%s'", buf);
637 "certificate store");
977 * auto chaining the local certificate is in use. BoringSSL removed this
1181 /* handle a certificate and/or CA certificate */
1284 return "certificate";
1288 return "certificate request";
1292 return "certificate verify";
1298 return "certificate url";
1300 return "certificate status";
1560 wpa_hexdump_ascii(MSG_DEBUG, "TLS: Certificate dNSName",
1594 wpa_hexdump_ascii(MSG_DEBUG, "TLS: Certificate commonName",
1827 wpa_printf(MSG_DEBUG, "OpenSSL: Ignore certificate validity "
1844 "server certificate data");
1854 err_str = "Server certificate mismatch";
1859 * Certificate matches pinned certificate, allow
1863 "OpenSSL: Ignore validation issues for a pinned server certificate");
1872 wpa_printf(MSG_WARNING, "TLS: Certificate verification failed,"
1919 wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate "
1923 "Server certificate chain probe",
1938 "certificate revoked",
1947 "bad certificate status response",
2009 "certificate store", __func__);
2018 wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate "
2046 "certificate match");
2050 "cannot validate server certificate hash");
2070 "certificate store");
2084 "to certificate store", __func__);
2132 "system certificate store");
2146 "DER format CA certificate",
2152 "certificate(s) loaded");
2162 * certificate */
2183 "certificate(s) loaded");
2186 /* Add the same CAs to the client certificate requests */
2205 "certificate store when enabling "
2437 "Failed to load client certificate");
2486 wpa_printf(MSG_DEBUG, "TLS: Got certificate from PKCS12: "
2519 wpa_printf(MSG_DEBUG, "TLS: additional certificate"
2525 "Failed to add additional certificate");
2549 "Failed to build certificate chain");
2552 "TLS: Ignore certificate chain verification error when building chain with PKCS#12 extra certificates");
2565 wpa_printf(MSG_DEBUG, "TLS: additional certificate"
2722 "certificate store", __func__);
2730 "Failed to add CA certificate from engine "
2731 "to certificate store");
2743 wpa_printf(MSG_DEBUG, "OpenSSL: %s - added CA certificate from engine "
2744 "to certificate store", __func__);
2874 "access certificate store --> OK");
3810 "OpenSSL: Could not add issuer to certificate store");
3849 wpa_printf(MSG_DEBUG, "OpenSSL: Peer certificate not available for OCSP status check");
3856 wpa_printf(MSG_DEBUG, "OpenSSL: Peer issuer certificate not available for OCSP status check");
3864 wpa_printf(MSG_DEBUG, "OpenSSL: Could not create OCSP certificate identifier");
3872 wpa_printf(MSG_INFO, "OpenSSL: Could not find current server certificate from OCSP response%s",
3893 wpa_printf(MSG_DEBUG, "OpenSSL: OCSP status for server certificate: %s",