Home | History | Annotate | Download | only in client

Lines Matching defs:pkcs7

13 #include <openssl/pkcs7.h>
30 static int pkcs7_to_cert(struct hs20_osu_client *ctx, const u8 *pkcs7,
36 PKCS7 *p7 = NULL;
37 const unsigned char *p = pkcs7;
47 CBS_init(&pkcs7_cbs, pkcs7, len);
124 unsigned char *pkcs7;
160 pkcs7 = base64_decode((unsigned char *) resp, resp_len, &pkcs7_len);
161 if (pkcs7 && pkcs7_len < resp_len / 2) {
164 os_free(pkcs7);
165 pkcs7 = NULL;
167 if (pkcs7 == NULL) {
168 wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7");
169 pkcs7 = os_malloc(resp_len);
170 if (pkcs7) {
171 os_memcpy(pkcs7, resp, resp_len);
177 if (pkcs7 == NULL) {
178 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts");
183 res = pkcs7_to_cert(ctx, pkcs7, pkcs7_len, "Cert/est-cacerts.pem",
185 os_free(pkcs7);
668 unsigned char *pkcs7;
730 pkcs7 = base64_decode((unsigned char *) resp, resp_len, &pkcs7_len);
731 if (pkcs7 == NULL) {
732 wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7");
733 pkcs7 = os_malloc(resp_len);
734 if (pkcs7) {
735 os_memcpy(pkcs7, resp, resp_len);
741 if (pkcs7 == NULL) {
747 res = pkcs7_to_cert(ctx, pkcs7, pkcs7_len, "Cert/est_cert.pem",
749 os_free(pkcs7);
752 wpa_printf(MSG_INFO, "EST: Failed to extract certificate from PKCS7 file");
753 write_result(ctx, "EST: Failed to extract certificate from EST PKCS7 file");