Searched refs:certs (Results 1 - 25 of 173) sorted by last modified time

1234567

/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_gnutls.c808 const gnutls_datum_t *certs; local
855 certs = gnutls_certificate_get_peers(conn->session, &num_certs);
856 if (certs == NULL) {
873 if (gnutls_x509_crt_import(cert, &certs[i],
H A Dtls_openssl.c1946 STACK_OF(X509) *certs;
1952 certs = NULL;
1953 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) {
1988 if (certs) {
1989 while ((cert = sk_X509_pop(certs)) != NULL) {
2003 sk_X509_free(certs);
3030 STACK_OF(X509) *certs = NULL;
3069 certs = sk_X509_new_null();
3070 if (certs) {
3073 if (cert && !sk_X509_push(certs, cer
[all...]
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dhttp_curl.c1043 STACK_OF(X509) *certs = NULL;
1089 certs = sk_X509_new_null();
1090 if (certs) {
1093 if (cert && !sk_X509_push(certs, cert)) {
1098 sk_X509_free(certs);
1099 certs = NULL;
1103 if (cert && !sk_X509_push(certs, cert)) {
1113 status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER);
1114 sk_X509_pop_free(certs, X509_free);
/external/wpa_supplicant_8/hs20/client/
H A Dest.c32 STACK_OF(X509) *certs;
46 certs = p7->d.sign->cert;
49 certs = p7->d.signed_and_enveloped->cert;
52 certs = NULL;
56 if (!certs || ((num = sk_X509_num(certs)) == 0)) {
66 i2d_X509_fp(f, sk_X509_value(certs, 0));
77 X509 *cert = sk_X509_value(certs, i);
162 wpa_printf(MSG_INFO, "Could not parse CA certs from PKCS#7 cacerts response");
163 write_result(ctx, "Could not parse CA certs fro
[all...]
/external/wpa_supplicant_8/hs20/server/ca/
H A Dsetup.sh20 mkdir -p rootCA/certs rootCA/crl rootCA/newcerts rootCA/private
39 mkdir -p demoCA/certs demoCA/crl demoCA/newcerts demoCA/private
/external/wpa_supplicant_8/src/crypto/
H A Dtls_gnutls.c808 const gnutls_datum_t *certs; local
855 certs = gnutls_certificate_get_peers(conn->session, &num_certs);
856 if (certs == NULL) {
873 if (gnutls_x509_crt_import(cert, &certs[i],
H A Dtls_openssl.c1946 STACK_OF(X509) *certs;
1952 certs = NULL;
1953 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) {
1988 if (certs) {
1989 while ((cert = sk_X509_pop(certs)) != NULL) {
2003 sk_X509_free(certs);
3030 STACK_OF(X509) *certs = NULL;
3069 certs = sk_X509_new_null();
3070 if (certs) {
3073 if (cert && !sk_X509_push(certs, cer
[all...]
/external/wpa_supplicant_8/src/utils/
H A Dhttp_curl.c1043 STACK_OF(X509) *certs = NULL;
1089 certs = sk_X509_new_null();
1090 if (certs) {
1093 if (cert && !sk_X509_push(certs, cert)) {
1098 sk_X509_free(certs);
1099 certs = NULL;
1103 if (cert && !sk_X509_push(certs, cert)) {
1113 status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER);
1114 sk_X509_pop_free(certs, X509_free);
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_gnutls.c808 const gnutls_datum_t *certs; local
855 certs = gnutls_certificate_get_peers(conn->session, &num_certs);
856 if (certs == NULL) {
873 if (gnutls_x509_crt_import(cert, &certs[i],
H A Dtls_openssl.c1946 STACK_OF(X509) *certs;
1952 certs = NULL;
1953 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) {
1988 if (certs) {
1989 while ((cert = sk_X509_pop(certs)) != NULL) {
2003 sk_X509_free(certs);
3030 STACK_OF(X509) *certs = NULL;
3069 certs = sk_X509_new_null();
3070 if (certs) {
3073 if (cert && !sk_X509_push(certs, cer
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dhttp_curl.c1043 STACK_OF(X509) *certs = NULL;
1089 certs = sk_X509_new_null();
1090 if (certs) {
1093 if (cert && !sk_X509_push(certs, cert)) {
1098 sk_X509_free(certs);
1099 certs = NULL;
1103 if (cert && !sk_X509_push(certs, cert)) {
1113 status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER);
1114 sk_X509_pop_free(certs, X509_free);
/external/smack/asmack-master/lib/
H A Dhttpclient-4.1.3.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/http/ org/apache/http/cookie/ ...
/external/sepolicy/tools/
H A Dpost_process_mac_perms19 certs not already found in that policy. This becomes useful when a directory
20 containing apps is searched and the certs from those apps are added to the
54 certs = [transform(i) for i in results]
56 app_certs.update(certs)
67 # Collect certs for each app found
/external/robolectric/lib/main/
H A Dandroid.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/android/ com/android/internal/ com/android/internal/util/ ...
H A Dhttpclient-4.0.3.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/http/ org/apache/http/cookie/ ...
/external/openssl/android.testssl/
H A DCAss.cnf35 certs = $dir/certs # Where the issued certs are kept
40 new_certs_dir = $dir/newcerts # default place for new certs.
/external/openssl/apps/
H A DCA.sh109 mkdir -p ${CATOP}/certs
H A Dapps.c1219 STACK_OF(X509) *certs;
1220 if (!load_certs_crls(err, file, format, pass, e, desc, &certs, NULL))
1222 return certs;
H A Dnseq.c133 seq->certs = sk_X509_new_null();
135 sk_X509_push(seq->certs,x509);
137 if(!sk_X509_num(seq->certs))
139 BIO_printf (bio_err, "Error reading certs file %s\n", infile);
154 for(i = 0; i < sk_X509_num(seq->certs); i++) {
155 x509 = sk_X509_value(seq->certs, i);
H A Dopenssl.cnf43 certs = $dir/certs # Where the issued certs are kept
48 new_certs_dir = $dir/newcerts # default place for new certs.
335 certs = $dir/cacert.pem # Certificate chain to include in reply
H A Dpkcs12.c290 BIO_printf (bio_err, "-certfile f add all certs in f\n");
431 STACK_OF(X509) *certs=NULL;
459 CRYPTO_push_info("reading certs from input");
462 /* Load in all certs in input file */
465 certs = load_certs(bio_err, infile, FORMAT_PEM, NULL, e,
467 if (!certs)
473 for(i = 0; i < sk_X509_num(certs); i++)
475 x = sk_X509_value(certs, i);
483 (void)sk_X509_delete(certs, i);
498 CRYPTO_push_info("reading certs fro
[all...]
H A Dpkcs7.c169 BIO_printf(bio_err," -print_certs print any certs or crl in the input\n");
245 STACK_OF(X509) *certs=NULL;
252 certs=p7->d.sign->cert;
256 certs=p7->d.signed_and_enveloped->cert;
263 if (certs != NULL)
267 for (i=0; i<sk_X509_num(certs); i++)
269 x=sk_X509_value(certs,i);
/external/openssl/crypto/asn1/
H A Dnsseq.c80 ASN1_EXP_SEQUENCE_OF_OPT(NETSCAPE_CERT_SEQUENCE, certs, X509, 0)
/external/openssl/crypto/cms/
H A Dcms.h141 CMS_ContentInfo *CMS_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
146 STACK_OF(X509) *certs,
168 int CMS_verify(CMS_ContentInfo *cms, STACK_OF(X509) *certs,
172 STACK_OF(X509) *certs,
177 CMS_ContentInfo *CMS_encrypt(STACK_OF(X509) *certs, BIO *in,
265 int CMS_set1_signers_certs(CMS_ContentInfo *cms, STACK_OF(X509) *certs,
H A Dcms_lib.c561 STACK_OF(X509) *certs = NULL;
573 if (!certs)
575 certs = sk_X509_new_null();
576 if (!certs)
579 if (!sk_X509_push(certs, cch->d.certificate))
581 sk_X509_pop_free(certs, X509_free);
588 return certs;

Completed in 385 milliseconds

1234567