/external/curl/docs/cmdline-opts/ |
proxy-cacert.d | 1 Long: proxy-cacert 5 See-also: proxy-capath cacert capath proxy 7 Same as --cacert but used in HTTPS proxy context.
|
proxy-capath.d | 5 See-also: proxy-cacert proxy capath
|
capath.d | 12 --cacert if the --cacert file contains many CA certificates.
|
insecure.d | 5 See-also: proxy-insecure cacert
|
/external/wpa_supplicant_8/hs20/server/ca/ |
ocsp-req.sh | 5 openssl ocsp -text -CAfile ca.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 7 # openssl ocsp -text -CAfile rootCA/cacert.pem -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 9 # openssl ocsp -text -CAfile rootCA/cacert.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 10 # openssl ocsp -text -CAfile rootCA/cacert.pem -VAfile ca.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/
|
ocsp-responder-ica.sh | 3 openssl ocsp -index demoCA/index.txt -port 8888 -nmin 5 -rsigner demoCA/cacert.pem -rkey demoCA/private/cakey-plain.pem -CA demoCA/cacert.pem -resp_no_certs -text
|
ocsp-update-cache.sh | 6 -verify_other demoCA/cacert.pem \ 7 -issuer demoCA/cacert.pem \
|
ocsp-responder.sh | 3 openssl ocsp -index demoCA/index.txt -port 8888 -nmin 5 -rsigner ocsp.pem -rkey ocsp.key -CA demoCA/cacert.pem -text
|
setup.sh | 107 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out rootCA/cacert.pem -days 10957 -batch -keyfile rootCA/private/cakey.pem -passin pass:$PASS -selfsign -extensions v3_ca -outdir rootCA/newcerts -infiles rootCA/careq.pem || fail "Failed to sign Root CA certificate" 108 $OPENSSL x509 -in rootCA/cacert.pem -out rootCA/cacert.der -outform DER || fail "Failed to create rootCA DER" 109 sha256sum rootCA/cacert.der > rootCA/cacert.fingerprint || fail "Failed to create rootCA fingerprint" 128 $OPENSSL ca -config openssl.cnf.tmp -md sha256 -create_serial -out demoCA/cacert.pem -days 3652 -batch -keyfile rootCA/private/cakey.pem -cert rootCA/cacert.pem -passin pass:$PASS -extensions v3_ca -infiles demoCA/careq.pem || fail "Failed to sign Intermediate CA certificate" 131 $OPENSSL x509 -in demoCA/cacert.pem -out demoCA/cacert.der -outform DER || fail "Failed to create demoCA DER." 132 sha256sum demoCA/cacert.der > demoCA/cacert.fingerprint || fail "Failed to create demoCA fingerprint [all...] |
/external/epid-sdk/example/verifysig/src/ |
verifysig11.c | 35 EpidCaCertificate const* cacert, void** verifier_precomp, 47 cacert, &pub_key); 84 cacert, NULL, &priv_rl_size); 97 cacert, priv_rl, &priv_rl_size); 112 result = Epid11ParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, 125 result = Epid11ParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, 141 result = Epid11ParseGroupRlFile(signed_grp_rl, signed_grp_rl_size, cacert, 154 result = Epid11ParseGroupRlFile(signed_grp_rl, signed_grp_rl_size, cacert,
|
verifysig.c | 36 EpidCaCertificate const* cacert, HashAlg hash_alg, 48 cacert, &pub_key); 90 result = EpidParsePrivRlFile(signed_priv_rl, signed_priv_rl_size, cacert, 103 result = EpidParsePrivRlFile(signed_priv_rl, signed_priv_rl_size, cacert, 119 result = EpidParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, 132 result = EpidParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, 148 result = EpidParseGroupRlFile(signed_grp_rl, signed_grp_rl_size, cacert, 161 result = EpidParseGroupRlFile(signed_grp_rl, signed_grp_rl_size, cacert,
|
verifysig11.h | 37 struct EpidCaCertificate const* cacert,
|
verifysig.h | 42 struct EpidCaCertificate const* cacert, HashAlg hash_alg,
|
main.c | 43 #define CACERT_DEFAULT "cacert.bin" 112 EpidCaCertificate cacert = {0}; local 339 if (0 != ReadLoud(cacert_file->filename[0], &cacert, sizeof(cacert))) { 348 if (!IsCaCertAuthorizedByRootCa(&cacert, sizeof(cacert))) { 452 ver_rl_size, signed_pubkey, signed_pubkey_size, &cacert, 465 &cacert, &verifier_precmp, &vprecmpi_file_size);
|
/external/epid-sdk/example/signmsg/src/ |
signmsg.h | 40 size_t* sig_len, EpidCaCertificate const* cacert);
|
main.c | 36 #define CACERT_DEFAULT "cacert.bin" 88 EpidCaCertificate cacert = {0}; local 255 if (0 != ReadLoud(cacert_file->filename[0], &cacert, sizeof(cacert))) { 263 if (!IsCaCertAuthorizedByRootCa(&cacert, sizeof(cacert))) { 360 PrintBuffer(&cacert, sizeof(cacert)); 373 member_precmp_ptr, &sig, &sig_size, &cacert);
|
signmsg.c | 41 size_t* sig_len, EpidCaCertificate const* cacert) { 61 sts = EpidParseGroupPubKeyFile(signed_pubkey, signed_pubkey_size, cacert, 138 sts = EpidParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert, NULL, 154 sts = EpidParseSigRlFile(signed_sig_rl, signed_sig_rl_size, cacert,
|
/external/curl/tests/certs/scripts/ |
genroot.sh | 51 echo "openssl x509 -set_serial $SERIAL -extfile $PREFIX-ca.prm -days $DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.csr -out $PREFIX-$SERIAL.ca-cacert $DIGESTALGO " 53 $OPENSSL x509 -set_serial $SERIAL -extfile $PREFIX-ca.prm -days $DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.csr -out $PREFIX-$SERIAL-ca.cacert $DIGESTALGO 55 echo "openssl x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert " 56 $OPENSSL x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert 58 echo "openssl x509 -in $PREFIX-ca.cacert -outform der -out $PREFIX-ca.der " 59 $OPENSSL x509 -in $PREFIX-ca.cacert -outform der -out $PREFIX-ca.der 61 echo "openssl x509 -in $PREFIX-ca.cacert -text -nameopt multiline > $PREFIX-ca.crt " 63 $OPENSSL x509 -in $PREFIX-ca.cacert -text -nameopt multiline > $PREFIX-ca.cr [all...] |
genserv.sh | 43 if [ ! -f $CAPREFIX-ca.cacert ] ; then 86 echo "openssl x509 -set_serial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.key -in $PREFIX-sv.csr -req -text -nameopt multiline $DIGESTALGO > $PREFIX-sv.crt " 88 $OPENSSL x509 -set_serial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.key -in $PREFIX-sv.csr -req -text -nameopt multiline $DIGESTALGO > $PREFIX-sv.crt
|
/cts/apps/CtsVerifier/ |
create_test_certs.sh | 5 # - cacert.der 41 -out 'cacert.pem' \ 46 -in 'cacert.pem' \ 47 -out 'cacert.der') 73 -cert 'cacert.pem' \ 87 "$tmpdir"/cacert.der \
|
/external/epid-sdk/example/ |
Makefile | 72 cp ./data/cacert.bin ./data/grprl.bin \ 80 cp ./compressed_data/cacert.bin ./compressed_data/grprl.bin \
|
/external/epid-sdk/tools/revokegrp/src/ |
main.c | 211 EpidCaCertificate cacert = {0}; local 230 if (0 != ReadLoud(cacert_file, &cacert, sizeof(cacert))) { 252 pubkey_file_size, &cacert,
|
/external/epid-sdk/tools/revokekey/src/ |
main.c | 79 EpidCaCertificate cacert; local 95 if (0 != ReadLoud(cacert_file, &cacert, sizeof(cacert))) { 99 sts = EpidParseGroupPubKeyFile(signed_pubkey, signed_pubkey_size, &cacert,
|
/external/epid-sdk/tools/revokesig/src/ |
main.c | 299 EpidCaCertificate cacert = {0}; local 325 if (0 != ReadLoud(cacert_file, &cacert, sizeof(cacert))) { 354 pubkey_file_size, &cacert,
|
/external/curl/lib/vtls/ |
polarssl.c | 77 x509_crt cacert; member in struct:ssl_backend_data 256 memset(&BACKEND->cacert, 0, sizeof(x509_crt)); 259 ret = x509_crt_parse_file(&BACKEND->cacert, 273 ret = x509_crt_parse_path(&BACKEND->cacert, capath); 404 &BACKEND->cacert, 675 x509_crt_free(&BACKEND->cacert);
|