/external/wpa_supplicant_8/hs20/server/ca/ |
ocsp-req.sh | 5 openssl ocsp -text -CAfile ca.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 7 # openssl ocsp -text -CAfile rootCA/cacert.pem -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 9 # openssl ocsp -text -CAfile rootCA/cacert.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 10 # openssl ocsp -text -CAfile rootCA/cacert.pem -VAfile ca.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/
|
ocsp-update-cache.sh | 5 -CAfile ca.pem \
|
setup.sh | 206 $OPENSSL verify -CAfile rootCA/cacert.pem demoCA/cacert.pem 207 $OPENSSL verify -CAfile rootCA/cacert.pem -untrusted demoCA/cacert.pem *.pem
|
/frameworks/base/core/java/android/security/net/config/ |
SystemCertificateSource.java | 45 protected boolean isCertMarkedAsRemoved(String caFile) { 46 return new File(mUserRemovedCaDir, caFile).exists();
|
DirectoryCertificateSource.java | 64 protected abstract boolean isCertMarkedAsRemoved(String caFile); 76 for (String caFile : mDir.list()) { 77 if (isCertMarkedAsRemoved(caFile)) { 80 X509Certificate cert = readCertificate(caFile);
|
UserCertificateSource.java | 42 protected boolean isCertMarkedAsRemoved(String caFile) {
|
/external/autotest/client/site_tests/security_OpenSSLBlacklist/ |
security_OpenSSLBlacklist.py | 18 r = os.system('OPENSSL_BLACKLIST_PATH=%s %s -CAfile %s %s' % 48 '-CAfile', self.ca, '-cert', self.cert,
|
/external/autotest/client/site_tests/platform_AccurateTime/ |
platform_AccurateTime.py | 23 '-CAfile', self.ca, '-cert', self.cert,
|
/external/curl/lib/vtls/ |
vtls.c | 101 safe_strequal(data->CAfile, needle->CAfile) && 120 if(source->CAfile) { 121 dest->CAfile = strdup(source->CAfile); 122 if(!dest->CAfile) 126 dest->CAfile = NULL; 174 Curl_safefree(sslc->CAfile);
|
gtls.c | 451 if(data->set.ssl.CAfile) { 457 data->set.ssl.CAfile, 461 data->set.ssl.CAfile, gnutls_strerror(rc)); 467 rc, data->set.ssl.CAfile); 478 data->set.ssl.CAfile, gnutls_strerror(rc)); 491 !(data->set.ssl.CAfile || data->set.ssl.CApath)) { 925 failf(data, "server certificate verification failed. CAfile: %s " 926 "CRLfile: %s", data->set.ssl.CAfile?data->set.ssl.CAfile:"none", [all...] |
axtls.c | 186 if(data->set.ssl.CAfile) { 187 if(ssl_obj_load(ssl_ctx, SSL_OBJ_X509_CACERT, data->set.ssl.CAfile, NULL) 190 data->set.ssl.CAfile); 196 infof(data, "found certificates in %s\n", data->set.ssl.CAfile);
|
nss.c | 1401 const char *cafile = data->set.ssl.CAfile; local [all...] |
cyassl.c | 238 " CAfile: %s\n CApath: %s", 257 " CAfile: %s\n"
|
darwinssl.c | [all...] |
openssl.c | [all...] |
/external/libmicrohttpd/src/examples/ |
https_fileserver_example.c | 45 #define CAFILE "ca.pem"
|
/external/chromium-trace/catapult/telemetry/third_party/websocket-client/ |
ChangeLog | 46 - fixed TypeError: cafile, capath and cadata cannot be all omitted (#227)
|
/external/chromium-trace/catapult/telemetry/third_party/websocket-client/websocket/ |
_http.py | 138 context.load_verify_locations(cafile=sslopt.get('ca_certs', None))
|
/external/ipsec-tools/src/racoon/ |
crypto_openssl.c | 461 eay_check_x509cert(cert, CApath, CAfile, local) 464 char *CAfile; 484 BIO *bio = BIO_from_android(CAfile); 513 X509_LOOKUP_load_file(lookup, CAfile, 514 (CAfile == NULL) ? X509_FILETYPE_DEFAULT : X509_FILETYPE_PEM); [all...] |
/external/libvncserver/webclients/java-applet/ssl/ |
ss_vncviewer | [all...] |
/external/curl/docs/ |
TODO | 622 "Look at SSL cafile - quick traces look to me like these are done on every [all...] |
/external/curl/lib/ |
urldata.h | 351 char *CAfile; /* certificate to verify peer against */ [all...] |
/external/google-breakpad/src/third_party/curl/ |
curl.h | [all...] |
/external/curl/include/curl/ |
curl.h | [all...] |
/external/wpa_supplicant_8/hostapd/ |
hostapd.conf | [all...] |