/external/wpa_supplicant_8/hs20/server/www/ |
est.php | 136 $cert_pem = "$cadir/tmp/req-signed.pem"; variable 137 if (file_exists($cert_pem)) 138 unlink($cert_pem); 139 exec("openssl x509 -req -in $req_pem -CAkey $cadir/cakey.pem -out $cert_pem -CA $cadir/cacert.pem -CAserial $cadir/serial -days 365 -text"); 140 if (!file_exists($cert_pem)) { 145 $cert = file_get_contents($cert_pem); 146 $handle = popen("openssl x509 -in $cert_pem -serial -noout", "r"); 163 exec("openssl x509 -in $cert_pem -inform PEM -out $cert_der -outform DER"); 174 exec("openssl crl2pkcs7 -nocrl -certfile $cert_pem -out $pkcs7 -outform DER"); 180 if (!$db->exec("UPDATE sessions SET user='$user', cert='$fingerprint', cert_pem='$cert' WHERE rowid=$rowid")) [all...] |
/external/libmicrohttpd/doc/examples/ |
tlsauthentication.c | 238 char *cert_pem; local 241 cert_pem = load_file (SERVERCERTFILE); 243 if ((key_pem == NULL) || (cert_pem == NULL)) 253 MHD_OPTION_HTTPS_MEM_CERT, cert_pem, MHD_OPTION_END); 256 printf ("%s\n", cert_pem); 259 free (cert_pem); 268 free (cert_pem);
|
/external/webrtc/talk/app/webrtc/test/ |
fakedtlsidentitystore.h | 40 const char* cert_pem; member in struct:__anon27523 130 rtc::SSLIdentity::PemToDer("CERTIFICATE", kKeysAndCerts[0].cert_pem, &cert); 157 const char* get_cert() { return kKeysAndCerts[key_index_].cert_pem; }
|
/external/libmicrohttpd/src/examples/ |
https_fileserver_example.c | 51 const char cert_pem[] = variable 183 MHD_OPTION_HTTPS_MEM_CERT, cert_pem,
|
/cts/tools/utils/ |
certificates.py | 28 def cert_pem(self): member in class:Certificate 36 f.write(self.cert_pem()) 41 f.write(self.cert_pem())
|
/external/webrtc/webrtc/base/ |
sslstreamadapter_unittest.cc | 672 SSLStreamAdapterTestDTLS(const std::string& cert_pem, 674 SSLStreamAdapterTestBase(cert_pem, private_key_pem, true), [all...] |
/external/wpa_supplicant_8/hs20/server/ |
spp_server.c | 1902 char *cert_pem, *fingerprint; local [all...] |