/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_gnutls.c | 808 const gnutls_datum_t *certs; local 855 certs = gnutls_certificate_get_peers(conn->session, &num_certs); 856 if (certs == NULL) { 873 if (gnutls_x509_crt_import(cert, &certs[i],
|
H A D | tls_openssl.c | 1946 STACK_OF(X509) *certs; 1952 certs = NULL; 1953 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { 1988 if (certs) { 1989 while ((cert = sk_X509_pop(certs)) != NULL) { 2003 sk_X509_free(certs); 3030 STACK_OF(X509) *certs = NULL; 3069 certs = sk_X509_new_null(); 3070 if (certs) { 3073 if (cert && !sk_X509_push(certs, cer [all...] |
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | http_curl.c | 1043 STACK_OF(X509) *certs = NULL; 1089 certs = sk_X509_new_null(); 1090 if (certs) { 1093 if (cert && !sk_X509_push(certs, cert)) { 1098 sk_X509_free(certs); 1099 certs = NULL; 1103 if (cert && !sk_X509_push(certs, cert)) { 1113 status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER); 1114 sk_X509_pop_free(certs, X509_free);
|
/external/wpa_supplicant_8/hs20/client/ |
H A D | est.c | 32 STACK_OF(X509) *certs; 46 certs = p7->d.sign->cert; 49 certs = p7->d.signed_and_enveloped->cert; 52 certs = NULL; 56 if (!certs || ((num = sk_X509_num(certs)) == 0)) { 66 i2d_X509_fp(f, sk_X509_value(certs, 0)); 77 X509 *cert = sk_X509_value(certs, i); 162 wpa_printf(MSG_INFO, "Could not parse CA certs from PKCS#7 cacerts response"); 163 write_result(ctx, "Could not parse CA certs fro [all...] |
/external/wpa_supplicant_8/hs20/server/ca/ |
H A D | setup.sh | 20 mkdir -p rootCA/certs rootCA/crl rootCA/newcerts rootCA/private 39 mkdir -p demoCA/certs demoCA/crl demoCA/newcerts demoCA/private
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_gnutls.c | 808 const gnutls_datum_t *certs; local 855 certs = gnutls_certificate_get_peers(conn->session, &num_certs); 856 if (certs == NULL) { 873 if (gnutls_x509_crt_import(cert, &certs[i],
|
H A D | tls_openssl.c | 1946 STACK_OF(X509) *certs; 1952 certs = NULL; 1953 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { 1988 if (certs) { 1989 while ((cert = sk_X509_pop(certs)) != NULL) { 2003 sk_X509_free(certs); 3030 STACK_OF(X509) *certs = NULL; 3069 certs = sk_X509_new_null(); 3070 if (certs) { 3073 if (cert && !sk_X509_push(certs, cer [all...] |
/external/wpa_supplicant_8/src/utils/ |
H A D | http_curl.c | 1043 STACK_OF(X509) *certs = NULL; 1089 certs = sk_X509_new_null(); 1090 if (certs) { 1093 if (cert && !sk_X509_push(certs, cert)) { 1098 sk_X509_free(certs); 1099 certs = NULL; 1103 if (cert && !sk_X509_push(certs, cert)) { 1113 status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER); 1114 sk_X509_pop_free(certs, X509_free);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_gnutls.c | 808 const gnutls_datum_t *certs; local 855 certs = gnutls_certificate_get_peers(conn->session, &num_certs); 856 if (certs == NULL) { 873 if (gnutls_x509_crt_import(cert, &certs[i],
|
H A D | tls_openssl.c | 1946 STACK_OF(X509) *certs; 1952 certs = NULL; 1953 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) { 1988 if (certs) { 1989 while ((cert = sk_X509_pop(certs)) != NULL) { 2003 sk_X509_free(certs); 3030 STACK_OF(X509) *certs = NULL; 3069 certs = sk_X509_new_null(); 3070 if (certs) { 3073 if (cert && !sk_X509_push(certs, cer [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | http_curl.c | 1043 STACK_OF(X509) *certs = NULL; 1089 certs = sk_X509_new_null(); 1090 if (certs) { 1093 if (cert && !sk_X509_push(certs, cert)) { 1098 sk_X509_free(certs); 1099 certs = NULL; 1103 if (cert && !sk_X509_push(certs, cert)) { 1113 status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER); 1114 sk_X509_pop_free(certs, X509_free);
|
/external/smack/asmack-master/lib/ |
H A D | httpclient-4.1.3.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/http/ org/apache/http/cookie/ ... |
/external/sepolicy/tools/ |
H A D | post_process_mac_perms | 19 certs not already found in that policy. This becomes useful when a directory 20 containing apps is searched and the certs from those apps are added to the 54 certs = [transform(i) for i in results] 56 app_certs.update(certs) 67 # Collect certs for each app found
|
/external/robolectric/lib/main/ |
H A D | android.jar | META-INF/ META-INF/MANIFEST.MF com/ com/android/ com/android/internal/ com/android/internal/util/ ... |
H A D | httpclient-4.0.3.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/http/ org/apache/http/cookie/ ... |
/external/openssl/android.testssl/ |
H A D | CAss.cnf | 35 certs = $dir/certs # Where the issued certs are kept 40 new_certs_dir = $dir/newcerts # default place for new certs.
|
/external/openssl/apps/ |
H A D | CA.sh | 109 mkdir -p ${CATOP}/certs
|
H A D | apps.c | 1219 STACK_OF(X509) *certs; 1220 if (!load_certs_crls(err, file, format, pass, e, desc, &certs, NULL)) 1222 return certs;
|
H A D | nseq.c | 133 seq->certs = sk_X509_new_null(); 135 sk_X509_push(seq->certs,x509); 137 if(!sk_X509_num(seq->certs)) 139 BIO_printf (bio_err, "Error reading certs file %s\n", infile); 154 for(i = 0; i < sk_X509_num(seq->certs); i++) { 155 x509 = sk_X509_value(seq->certs, i);
|
H A D | openssl.cnf | 43 certs = $dir/certs # Where the issued certs are kept 48 new_certs_dir = $dir/newcerts # default place for new certs. 335 certs = $dir/cacert.pem # Certificate chain to include in reply
|
H A D | pkcs12.c | 290 BIO_printf (bio_err, "-certfile f add all certs in f\n"); 431 STACK_OF(X509) *certs=NULL; 459 CRYPTO_push_info("reading certs from input"); 462 /* Load in all certs in input file */ 465 certs = load_certs(bio_err, infile, FORMAT_PEM, NULL, e, 467 if (!certs) 473 for(i = 0; i < sk_X509_num(certs); i++) 475 x = sk_X509_value(certs, i); 483 (void)sk_X509_delete(certs, i); 498 CRYPTO_push_info("reading certs fro [all...] |
H A D | pkcs7.c | 169 BIO_printf(bio_err," -print_certs print any certs or crl in the input\n"); 245 STACK_OF(X509) *certs=NULL; 252 certs=p7->d.sign->cert; 256 certs=p7->d.signed_and_enveloped->cert; 263 if (certs != NULL) 267 for (i=0; i<sk_X509_num(certs); i++) 269 x=sk_X509_value(certs,i);
|
/external/openssl/crypto/asn1/ |
H A D | nsseq.c | 80 ASN1_EXP_SEQUENCE_OF_OPT(NETSCAPE_CERT_SEQUENCE, certs, X509, 0)
|
/external/openssl/crypto/cms/ |
H A D | cms.h | 141 CMS_ContentInfo *CMS_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, 146 STACK_OF(X509) *certs, 168 int CMS_verify(CMS_ContentInfo *cms, STACK_OF(X509) *certs, 172 STACK_OF(X509) *certs, 177 CMS_ContentInfo *CMS_encrypt(STACK_OF(X509) *certs, BIO *in, 265 int CMS_set1_signers_certs(CMS_ContentInfo *cms, STACK_OF(X509) *certs,
|
H A D | cms_lib.c | 561 STACK_OF(X509) *certs = NULL; 573 if (!certs) 575 certs = sk_X509_new_null(); 576 if (!certs) 579 if (!sk_X509_push(certs, cch->d.certificate)) 581 sk_X509_pop_free(certs, X509_free); 588 return certs;
|