Home
last modified time | relevance | path

Searched refs:cacert (Results 1 – 25 of 67) sorted by relevance

123

/external/wpa_supplicant_8/hs20/server/ca/
Dsetup.sh107 …$OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -…
108 …$OPENSSL x509 -in rootCA/cacert.pem -out rootCA/cacert.der -outform DER || fail "Failed to create …
109 …sha256sum rootCA/cacert.der > rootCA/cacert.fingerprint || fail "Failed to create rootCA fingerpri…
128 … sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem …
131 …$OPENSSL x509 -in demoCA/cacert.pem -out demoCA/cacert.der -outform DER || fail "Failed to create …
132 …sha256sum demoCA/cacert.der > demoCA/cacert.fingerprint || fail "Failed to create demoCA fingerpri…
206 $OPENSSL verify -CAfile rootCA/cacert.pem demoCA/cacert.pem
207 $OPENSSL verify -CAfile rootCA/cacert.pem -untrusted demoCA/cacert.pem *.pem
209 cat rootCA/cacert.pem demoCA/cacert.pem > ca.pem
Docsp-req.sh5 …penssl ocsp -text -CAfile ca.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacer…
Docsp-responder-ica.sh3 …ndex.txt -port 8888 -nmin 5 -rsigner demoCA/cacert.pem -rkey demoCA/private/cakey-plain.pem -CA de…
Docsp-update-cache.sh6 -verify_other demoCA/cacert.pem \
7 -issuer demoCA/cacert.pem \
/external/epid-sdk/example/verifysig/src/
Dverifysig11.c35 EpidCaCertificate const* cacert, void** verifier_precomp, in Verify11() argument
47 cacert, &pub_key); in Verify11()
84 cacert, NULL, &priv_rl_size); in Verify11()
97 cacert, priv_rl, &priv_rl_size); in Verify11()
112 result = Epid11ParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, in Verify11()
125 result = Epid11ParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, in Verify11()
141 result = Epid11ParseGroupRlFile(signed_grp_rl, signed_grp_rl_size, cacert, in Verify11()
154 result = Epid11ParseGroupRlFile(signed_grp_rl, signed_grp_rl_size, cacert, in Verify11()
Dverifysig.c36 EpidCaCertificate const* cacert, HashAlg hash_alg, in Verify() argument
48 cacert, &pub_key); in Verify()
90 result = EpidParsePrivRlFile(signed_priv_rl, signed_priv_rl_size, cacert, in Verify()
103 result = EpidParsePrivRlFile(signed_priv_rl, signed_priv_rl_size, cacert, in Verify()
119 result = EpidParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, in Verify()
132 result = EpidParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, in Verify()
148 result = EpidParseGroupRlFile(signed_grp_rl, signed_grp_rl_size, cacert, in Verify()
161 result = EpidParseGroupRlFile(signed_grp_rl, signed_grp_rl_size, cacert, in Verify()
Dmain.c112 EpidCaCertificate cacert = {0}; in main() local
339 if (0 != ReadLoud(cacert_file->filename[0], &cacert, sizeof(cacert))) { in main()
348 if (!IsCaCertAuthorizedByRootCa(&cacert, sizeof(cacert))) { in main()
452 ver_rl_size, signed_pubkey, signed_pubkey_size, &cacert, in main()
465 &cacert, &verifier_precmp, &vprecmpi_file_size); in main()
/external/curl/tests/certs/scripts/
Dgenroot.sh53 …DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.csr -out $PREFIX-$SERIAL-ca.cacert $DIGESTALGO
56 $OPENSSL x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert
59 $OPENSSL x509 -in $PREFIX-ca.cacert -outform der -out $PREFIX-ca.der
63 $OPENSSL x509 -in $PREFIX-ca.cacert -text -nameopt multiline > $PREFIX-ca.crt
66 $OPENSSL x509 -noout -text -in $PREFIX-ca.cacert -nameopt multiline
/external/curl/tests/certs/
DMakefile.am34 EdelCurlRoot-ca.cacert \
96 build-certs: $(srcdir)/EdelCurlRoot-ca.cacert $(srcdir)/Server-localhost-sv.pem \
100 $(srcdir)/EdelCurlRoot-ca.cacert:
103 $(srcdir)/Server-localhost-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
106 $(srcdir)/Server-localhost.nn-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
109 $(srcdir)/Server-localhost0h-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
112 $(srcdir)/Server-localhost-firstSAN-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
115 $(srcdir)/Server-localhost-lastSAN-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
/external/epid-sdk/example/signmsg/src/
Dmain.c88 EpidCaCertificate cacert = {0}; in main() local
255 if (0 != ReadLoud(cacert_file->filename[0], &cacert, sizeof(cacert))) { in main()
263 if (!IsCaCertAuthorizedByRootCa(&cacert, sizeof(cacert))) { in main()
360 PrintBuffer(&cacert, sizeof(cacert)); in main()
373 member_precmp_ptr, &sig, &sig_size, &cacert); in main()
Dsignmsg.c41 size_t* sig_len, EpidCaCertificate const* cacert) { in SignMsg() argument
61 sts = EpidParseGroupPubKeyFile(signed_pubkey, signed_pubkey_size, cacert, in SignMsg()
138 sts = EpidParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, NULL, in SignMsg()
154 sts = EpidParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, in SignMsg()
/external/curl/docs/cmdline-opts/
Dproxy-cacert.d1 Long: proxy-cacert
5 See-also: proxy-capath cacert capath proxy
7 Same as --cacert but used in HTTPS proxy context.
Dcapath.d12 --cacert if the --cacert file contains many CA certificates.
/external/grpc-grpc/tools/dockerfile/distribtest/csharp_centos7_x64/
DDockerfile27 RUN curl https://curl.haxx.se/ca/cacert.pem > ~/cacert.pem && cert-sync ~/cacert.pem && rm -f ~/cac…
/external/grpc-grpc/tools/dockerfile/distribtest/csharp_jessie_x64/
DDockerfile31 RUN curl https://curl.haxx.se/ca/cacert.pem > ~/cacert.pem && cert-sync ~/cacert.pem && rm -f ~/cac…
/external/grpc-grpc/tools/dockerfile/distribtest/csharp_jessie_x86/
DDockerfile31 RUN curl https://curl.haxx.se/ca/cacert.pem > ~/cacert.pem && cert-sync ~/cacert.pem && rm -f ~/cac…
/external/grpc-grpc/tools/dockerfile/distribtest/csharp_ubuntu1604_x64/
DDockerfile31 RUN curl https://curl.haxx.se/ca/cacert.pem > ~/cacert.pem && cert-sync ~/cacert.pem && rm -f ~/cac…
/external/grpc-grpc/tools/dockerfile/distribtest/csharp_ubuntu1404_x64/
DDockerfile44 RUN curl https://curl.haxx.se/ca/cacert.pem > ~/cacert.pem && cert-sync ~/cacert.pem && rm -f ~/cac…
/external/curl/tests/data/
Dtest40419 FTPS with invalid cacert
22 --ftp-ssl-control --cacert moooo ftps://%HOSTIP:%FTPSPORT/
/external/epid-sdk/tools/revokekey/src/
Dmain.c79 EpidCaCertificate cacert; in OpenKey() local
95 if (0 != ReadLoud(cacert_file, &cacert, sizeof(cacert))) { in OpenKey()
99 sts = EpidParseGroupPubKeyFile(signed_pubkey, signed_pubkey_size, &cacert, in OpenKey()
/external/epid-sdk/tools/revokegrp/src/
Dmain.c211 EpidCaCertificate cacert = {0}; in MakeRequest() local
230 if (0 != ReadLoud(cacert_file, &cacert, sizeof(cacert))) { in MakeRequest()
252 pubkey_file_size, &cacert, in MakeRequest()
/external/epid-sdk/tools/revokesig/src/
Dmain.c299 EpidCaCertificate cacert = {0}; in MakeRequest() local
325 if (0 != ReadLoud(cacert_file, &cacert, sizeof(cacert))) { in MakeRequest()
354 pubkey_file_size, &cacert, in MakeRequest()
/external/epid-sdk/example/
DMakefile72 cp ./data/cacert.bin ./data/grprl.bin \
80 cp ./compressed_data/cacert.bin ./compressed_data/grprl.bin \
/external/curl/lib/vtls/
Dpolarssl.c77 x509_crt cacert; member
256 memset(&BACKEND->cacert, 0, sizeof(x509_crt)); in polarssl_connect_step1()
259 ret = x509_crt_parse_file(&BACKEND->cacert, in polarssl_connect_step1()
273 ret = x509_crt_parse_path(&BACKEND->cacert, capath); in polarssl_connect_step1()
404 &BACKEND->cacert, in polarssl_connect_step1()
675 x509_crt_free(&BACKEND->cacert); in Curl_polarssl_close()
/external/epid-sdk/example/compressed_data/
DREADME.md67 |__ cacert.bin
147 - `cacert.bin` - CA certificate used as default input to signmsg
177 - `cacert.bin` - CA certificate used to check that revocation

123