Home | History | Annotate | Download | only in crypto

Lines Matching refs:ca_cert

514 					"Failed to add ca_cert to OpenSSL "
1516 static int tls_load_ca_der(void *_ssl_ctx, const char *ca_cert)
1530 if (!X509_LOOKUP_load_file(lookup, ca_cert, X509_FILETYPE_ASN1)) {
1549 const char *ca_cert, const u8 *ca_cert_blob,
1569 if (ca_cert && os_strncmp(ca_cert, "probe://", 8) == 0) {
1577 if (ca_cert && os_strncmp(ca_cert, "hash://", 7) == 0) {
1579 const char *pos = ca_cert + 7;
1581 wpa_printf(MSG_DEBUG, "OpenSSL: Unsupported ca_cert "
1582 "hash value '%s'", ca_cert);
1588 "hash length in ca_cert '%s'", ca_cert);
1593 "value in ca_cert '%s'", ca_cert);
1639 if (ca_cert && os_strncmp("keystore://", ca_cert, 11) == 0) {
1640 BIO *bio = BIO_from_keystore(&ca_cert[11]);
1669 if (ca_cert && tls_cryptoapi_ca_cert(ssl_ctx, conn->ssl, ca_cert) ==
1677 if (ca_cert || ca_path) {
1679 if (SSL_CTX_load_verify_locations(ssl_ctx, ca_cert, ca_path) !=
1683 if (ca_cert &&
1684 tls_load_ca_der(ssl_ctx, ca_cert) == 0) {
1701 /* No ca_cert configured - do not try to verify server
1710 static int tls_global_ca_cert(SSL_CTX *ssl_ctx, const char *ca_cert)
1712 if (ca_cert) {
1713 if (SSL_CTX_load_verify_locations(ssl_ctx, ca_cert, NULL) != 1)
1726 SSL_load_client_CA_file(ca_cert));
3217 } else if (tls_connection_ca_cert(tls_ctx, conn, params->ca_cert,
3301 if (tls_global_ca_cert(ssl_ctx, params->ca_cert))