91 references to Subject
Certificate.Sample (2)
Startup.cs (2)
24new Claim(ClaimTypes.NameIdentifier, context.ClientCertificate.Subject, ClaimValueTypes.String, context.Options.ClaimsIssuer), 25new Claim(ClaimTypes.Name, context.ClientCertificate.Subject, ClaimValueTypes.String, context.Options.ClaimsIssuer)
dotnet-dev-certs (6)
src\Shared\CertificateGeneration\CertificateManager.cs (4)
188var filteredCertificates = certificates.Where(c => c.Subject == Subject); 429var filteredCertificates = certificates.Where(c => c.Subject == Subject); 690var certificatesWithName = certificates.Where(c => c.Subject == Subject); 813$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (2)
274var subjectMatch = Regex.Match(certificate.Subject, CertificateSubjectRegex, RegexOptions.Singleline, MaxRegexTimeout); 277throw new InvalidOperationException($"Can't determine the subject for the certificate with subject '{certificate.Subject}'.");
dotnet-svcutil-lib (1)
FrameworkFork\System.ServiceModel\System\ServiceModel\Channels\TransportSecurityHelpers.cs (1)
434certificate.Subject, certHashString, thumbprint)));
Http3SampleApp (1)
Startup.cs (1)
26await context.Response.WriteAsync($"Hello World! {context.Request.Protocol} {context.Connection.ClientCertificate?.Subject}");
InMemory.FunctionalTests (4)
src\Servers\Kestrel\shared\test\CertHelper.cs (2)
74if (cert.Subject.Contains(caName)) 91if (cert.Subject.Contains(caName))
src\Servers\Kestrel\shared\test\CertificateAuthority.cs (2)
123internal string SubjectName => _cert.Subject; 125internal string OcspResponderSubjectName => (_ocspResponder ?? _cert).Subject;
Microsoft.AspNetCore.Authentication.Certificate (3)
CertificateAuthenticationHandler.cs (3)
124Logger.CertificateRejected("Self signed", clientCertificate.Subject); 133Logger.CertificateRejected("Chained", clientCertificate.Subject); 151Logger.CertificateFailedValidation(clientCertificate.Subject, chainErrors);
Microsoft.AspNetCore.Authentication.Test (2)
CertificateTests.cs (2)
912new Claim(ClaimTypes.NameIdentifier, context.ClientCertificate.Subject, ClaimValueTypes.String, context.Options.ClaimsIssuer), 913new Claim(ClaimTypes.Name, context.ClientCertificate.Subject, ClaimValueTypes.String, context.Options.ClaimsIssuer)
Microsoft.AspNetCore.DeveloperCertificates.XPlat (6)
src\Shared\CertificateGeneration\CertificateManager.cs (4)
188var filteredCertificates = certificates.Where(c => c.Subject == Subject); 429var filteredCertificates = certificates.Where(c => c.Subject == Subject); 690var certificatesWithName = certificates.Where(c => c.Subject == Subject); 813$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (2)
274var subjectMatch = Regex.Match(certificate.Subject, CertificateSubjectRegex, RegexOptions.Singleline, MaxRegexTimeout); 277throw new InvalidOperationException($"Can't determine the subject for the certificate with subject '{certificate.Subject}'.");
Microsoft.AspNetCore.DeveloperCertificates.XPlat.Tests (8)
CertificateManagerTests.cs (8)
57var httpsCertificate = Assert.Single(httpsCertificates, c => c.Subject == TestCertificateSubject); 59Assert.Equal(TestCertificateSubject, httpsCertificate.Subject); 143var httpsCertificate = _manager.ListCertificates(StoreName.My, StoreLocation.CurrentUser, isValid: false).Single(c => c.Subject == TestCertificateSubject); 175var httpsCertificate = _manager.ListCertificates(StoreName.My, StoreLocation.CurrentUser, isValid: false).Single(c => c.Subject == TestCertificateSubject); 208var httpsCertificate = _manager.ListCertificates(StoreName.My, StoreLocation.CurrentUser, isValid: false).Single(c => c.Subject == TestCertificateSubject); 239var httpsCertificate = _manager.ListCertificates(StoreName.My, StoreLocation.CurrentUser, isValid: false).Single(c => c.Subject == TestCertificateSubject); 272var httpsCertificate = _manager.ListCertificates(StoreName.My, StoreLocation.CurrentUser, isValid: false).Single(c => c.Subject == TestCertificateSubject); 298var httpsCertificate = _manager.ListCertificates(StoreName.My, StoreLocation.CurrentUser, isValid: false).Single(c => c.Subject == TestCertificateSubject);
Microsoft.AspNetCore.Server.Kestrel.Core (8)
Internal\LoggerExtensions.cs (1)
18public static void LocatedDevelopmentCertificate(this ILogger<KestrelServer> logger, X509Certificate2 certificate) => LocatedDevelopmentCertificate(logger, certificate.Subject, certificate.Thumbprint);
src\Shared\CertificateGeneration\CertificateManager.cs (4)
188var filteredCertificates = certificates.Where(c => c.Subject == Subject); 429var filteredCertificates = certificates.Where(c => c.Subject == Subject); 690var certificatesWithName = certificates.Where(c => c.Subject == Subject); 813$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (2)
274var subjectMatch = Regex.Match(certificate.Subject, CertificateSubjectRegex, RegexOptions.Singleline, MaxRegexTimeout); 277throw new InvalidOperationException($"Can't determine the subject for the certificate with subject '{certificate.Subject}'.");
TlsConfigurationLoader.cs (1)
179if (!string.Equals(certificate.Subject, "CN=localhost", StringComparison.Ordinal))
Microsoft.AspNetCore.Server.Kestrel.Core.Tests (6)
SniOptionsSelectorTests.cs (2)
243Assert.Equal("CN=leaf.com", fullChain[0].Subject); 245Assert.Equal("CN=Test Intermediate CA 2", fullChain[1].Subject);
src\Servers\Kestrel\shared\test\CertHelper.cs (2)
74if (cert.Subject.Contains(caName)) 91if (cert.Subject.Contains(caName))
src\Servers\Kestrel\shared\test\CertificateAuthority.cs (2)
123internal string SubjectName => _cert.Subject; 125internal string OcspResponderSubjectName => (_ocspResponder ?? _cert).Subject;
System.Net.Http (2)
src\libraries\Common\src\System\Net\Security\CertificateHelper.cs (2)
42NetEventSource.Info(candidateCerts, $"Skipping current X509Certificate2 {cert.GetHashCode()} since it doesn't have private key. Certificate Subject: {cert.Subject}, Thumbprint: {cert.Thumbprint}."); 51NetEventSource.Info(candidateCerts, $"Choosing X509Certificate2 {cert.GetHashCode()} as the Client Certificate. Certificate Subject: {cert.Subject}, Thumbprint: {cert.Thumbprint}.");
System.Net.Security (1)
System\Net\Security\SslStreamCertificateContext.cs (1)
67NetEventSource.Error(null, $"Failed to build chain for {target.Subject}");
System.Security.Cryptography (4)
System\Security\Cryptography\X509Certificates\ManagedCertificateFinder.cs (1)
79FindCore(subjectDistinguishedName, static (subjectDistinguishedName, cert) => StringComparer.OrdinalIgnoreCase.Equals(subjectDistinguishedName, cert.Subject));
System\Security\Cryptography\X509Certificates\OpenSslCachedSystemStoreProvider.cs (1)
245if (StringComparer.Ordinal.Equals(cert.Subject, cert.Issuer))
System\Security\Cryptography\X509Certificates\OpenSslX509ChainEventSource.cs (1)
670CachingIntermediate(certificate.Subject);
System\Security\Cryptography\X509Certificates\X509Certificate.cs (1)
523sb.AppendLine(Subject);
System.Security.Cryptography.Xml (1)
System\Security\Cryptography\Xml\SignedXmlDebugLog.cs (1)
240keyName = "\"" + certificate.Subject + "\"";
System.ServiceModel.Http (1)
System\ServiceModel\Channels\HttpTransportSecurityHelpers.cs (1)
159certificate.Subject, certificate.Thumbprint, thumbprint)));
Templates.Blazor.Tests (7)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,
src\Shared\CertificateGeneration\CertificateManager.cs (4)
188var filteredCertificates = certificates.Where(c => c.Subject == Subject); 429var filteredCertificates = certificates.Where(c => c.Subject == Subject); 690var certificatesWithName = certificates.Where(c => c.Subject == Subject); 813$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (2)
274var subjectMatch = Regex.Match(certificate.Subject, CertificateSubjectRegex, RegexOptions.Singleline, MaxRegexTimeout); 277throw new InvalidOperationException($"Can't determine the subject for the certificate with subject '{certificate.Subject}'.");
Templates.Blazor.WebAssembly.Auth.Tests (7)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,
src\Shared\CertificateGeneration\CertificateManager.cs (4)
188var filteredCertificates = certificates.Where(c => c.Subject == Subject); 429var filteredCertificates = certificates.Where(c => c.Subject == Subject); 690var certificatesWithName = certificates.Where(c => c.Subject == Subject); 813$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (2)
274var subjectMatch = Regex.Match(certificate.Subject, CertificateSubjectRegex, RegexOptions.Singleline, MaxRegexTimeout); 277throw new InvalidOperationException($"Can't determine the subject for the certificate with subject '{certificate.Subject}'.");
Templates.Blazor.WebAssembly.Tests (7)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,
src\Shared\CertificateGeneration\CertificateManager.cs (4)
188var filteredCertificates = certificates.Where(c => c.Subject == Subject); 429var filteredCertificates = certificates.Where(c => c.Subject == Subject); 690var certificatesWithName = certificates.Where(c => c.Subject == Subject); 813$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (2)
274var subjectMatch = Regex.Match(certificate.Subject, CertificateSubjectRegex, RegexOptions.Singleline, MaxRegexTimeout); 277throw new InvalidOperationException($"Can't determine the subject for the certificate with subject '{certificate.Subject}'.");
Templates.Mvc.Tests (7)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,
src\Shared\CertificateGeneration\CertificateManager.cs (4)
188var filteredCertificates = certificates.Where(c => c.Subject == Subject); 429var filteredCertificates = certificates.Where(c => c.Subject == Subject); 690var certificatesWithName = certificates.Where(c => c.Subject == Subject); 813$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (2)
274var subjectMatch = Regex.Match(certificate.Subject, CertificateSubjectRegex, RegexOptions.Singleline, MaxRegexTimeout); 277throw new InvalidOperationException($"Can't determine the subject for the certificate with subject '{certificate.Subject}'.");
Templates.Tests (7)
src\ProjectTemplates\Shared\AspNetProcess.cs (1)
46ServerCertificateCustomValidationCallback = (request, certificate, chain, errors) => (certificate.Subject != "CN=localhost" && errors == SslPolicyErrors.None) || certificate?.Thumbprint == _developmentCertificate.CertificateThumbprint,
src\Shared\CertificateGeneration\CertificateManager.cs (4)
188var filteredCertificates = certificates.Where(c => c.Subject == Subject); 429var filteredCertificates = certificates.Where(c => c.Subject == Subject); 690var certificatesWithName = certificates.Where(c => c.Subject == Subject); 813$"{c.Thumbprint} - {c.Subject} - Valid from {c.NotBefore:u} to {c.NotAfter:u} - IsHttpsDevelopmentCertificate: {IsHttpsDevelopmentCertificate(c).ToString().ToLowerInvariant()} - IsExportable: {Instance.IsExportable(c).ToString().ToLowerInvariant()}";
src\Shared\CertificateGeneration\MacOSCertificateManager.cs (2)
274var subjectMatch = Regex.Match(certificate.Subject, CertificateSubjectRegex, RegexOptions.Singleline, MaxRegexTimeout); 277throw new InvalidOperationException($"Can't determine the subject for the certificate with subject '{certificate.Subject}'.");