• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wpa_supplicant/src/crypto/

Lines Matching refs:cert

119 	const CERT_CONTEXT *cert;
242 if (priv->cert)
243 CertFreeCertificateContext(priv->cert);
270 if (strncmp(name, "cert://", 7) == 0) {
305 X509 *cert = NULL;
311 (strncmp(name, "cert://", 7) != 0 &&
325 priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER);
326 if (priv->cert == NULL) {
327 priv->cert = cryptoapi_find_cert(
330 if (priv->cert == NULL) {
336 cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &priv->cert->pbCertEncoded,
337 priv->cert->cbCertEncoded);
338 if (cert == NULL) {
344 if (!CryptAcquireCertificatePrivateKey(priv->cert,
370 if (!SSL_use_certificate(ssl, cert)) {
375 pub_rsa = cert->cert_info->key->pkey->pkey.rsa;
376 X509_free(cert);
377 cert = NULL;
391 if (cert)
392 X509_free(cert);
407 X509 *cert;
429 wpa_printf(MSG_DEBUG, "%s: failed to open system cert store "
436 cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ctx->pbCertEncoded,
438 if (cert == NULL) {
440 "X509 DER encoding for CA cert");
444 X509_NAME_oneline(X509_get_subject_name(cert), buf,
449 if (!X509_STORE_add_cert(ssl_ctx->cert_store, cert)) {
455 X509_free(cert);
459 wpa_printf(MSG_DEBUG, "%s: failed to close system cert store "
776 /* load private key first in-case PIN is required for cert */
934 static int tls_match_altsubject_component(X509 *cert, int type,
941 ext = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL);
956 static int tls_match_altsubject(X509 *cert, const char *match)
990 if (tls_match_altsubject_component(cert, type, pos, len) > 0)
1066 "cert already in hash table error",
1096 X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob,
1098 if (cert == NULL) {
1104 if (!X509_STORE_add_cert(ssl_ctx->cert_store, cert)) {
1113 "cert already in hash table error",
1116 X509_free(cert);
1120 X509_free(cert);
1364 X509 *cert;
1370 cert = NULL;
1372 if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) {
1380 if (cert) {
1381 X509_NAME_oneline(X509_get_subject_name(cert), buf,
1386 if (SSL_use_certificate(ssl, cert) != 1)
1389 if (SSL_CTX_use_certificate(ssl_ctx, cert) != 1)
1392 X509_free(cert);
1408 while ((cert = sk_X509_pop(certs)) != NULL) {
1409 X509_NAME_oneline(X509_get_subject_name(cert), buf,
1414 * There is no SSL equivalent for the chain cert - so
1417 if (SSL_CTX_add_extra_chain_cert(ssl_ctx, cert) != 1) {
1491 X509 **cert)
1496 X509 *cert;
1499 params.cert = NULL;
1503 wpa_printf(MSG_ERROR, "ENGINE: cannot load client cert with id"
1508 if (!params.cert) {
1509 wpa_printf(MSG_ERROR, "ENGINE: did not properly cert with id"
1513 *cert = params.cert;
1523 X509 *cert;
1525 if (tls_engine_get_cert(conn, cert_id, &cert))
1528 if (!SSL_use_certificate(conn->ssl, cert)) {
1531 X509_free(cert);
1534 X509_free(cert);
1550 X509 *cert;
1553 if (tls_engine_get_cert(conn, ca_cert_id, &cert))
1562 X509_free(cert);
1565 if (!X509_STORE_add_cert(ssl_ctx->cert_store, cert)) {
1572 wpa_printf(MSG_DEBUG, "OpenSSL: %s - ignoring cert"
1576 X509_free(cert);
1580 X509_free(cert);