Lines Matching refs:end

64 		 * the chain - add the new certificate to the end.
110 const u8 *pos, *end;
126 end = search_tag(pem_cert_end, pos, buf + len - pos);
127 if (end == NULL) {
129 "certificate end tag (%s)", pem_cert_end);
133 der = base64_decode(pos, end - pos, &der_len);
149 end += os_strlen(pem_cert_end);
150 pos = search_tag(pem_cert_begin, end, buf + len - end);
268 const u8 *pos, *end;
279 end = search_tag(pem_key2_end, pos, key + len - pos);
280 if (!end)
285 end = search_tag(pem_key_end, pos, key + len - pos);
286 if (!end)
288 pos2 = search_tag("Proc-Type: 4,ENCRYPTED", pos, end - pos);
296 der = base64_decode(pos, end - pos, &der_len);
309 const u8 *pos, *end;
320 end = search_tag(pem_key_enc_end, pos, key + len - pos);
321 if (!end)
324 der = base64_decode(pos, end - pos, &der_len);
449 const u8 *pos, *end;
468 end = hdr.payload + hdr.length;
470 if (asn1_get_oid(pos, end - pos, &oid, &pos)) {
485 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
523 static int pkcs12_parse_attr_friendly_name(const u8 *pos, const u8 *end)
536 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
550 static int pkcs12_parse_attr_local_key_id(const u8 *pos, const u8 *end)
563 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
579 const u8 *end = pos + len;
591 if (asn1_get_oid(pos, end - pos, &a_oid, &pos)) {
599 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
610 end = hdr.payload + hdr.length;
613 return pkcs12_parse_attr_friendly_name(pos, end);
615 return pkcs12_parse_attr_local_key_id(pos, end);
628 const u8 *pos = buf, *end = buf + len;
635 if (asn1_get_oid(pos, end - pos, &oid, &pos)) {
644 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
657 if (pos < end) {
659 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
671 end = hdr.payload + hdr.length;
672 while (pos < end) {
674 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
705 const u8 *pos, *end;
717 end = hdr.payload + hdr.length;
727 while (pos < end) {
728 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
746 const u8 *pos, const u8 *end,
752 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
768 const u8 *pos, const u8 *end,
784 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
795 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
809 pos, end - pos);
817 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
827 end = pos + hdr.length;
830 if (asn1_get_oid(pos, end - pos, &oid, &pos)) {
847 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
858 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
887 const u8 *end = buf + len;
894 if (asn1_get_oid(pos, end - pos, &oid, &pos)) {
903 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
914 return pkcs12_parse_content_data(cred, pos, end, passwd);
916 return pkcs12_parse_content_enc_data(cred, pos, end, passwd);
929 const u8 *pos, *end;
951 end = pos + hdr.length;
953 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
972 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
982 end = pos + hdr.length;
985 if (asn1_get_oid(pos, end - pos, &oid, &pos)) {
998 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
1010 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
1038 end = pos + hdr.length;
1040 while (end > pos) {
1041 if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
1131 const u8 *pos, *end;
1134 end = dh + len;
1155 if (asn1_get_next(pos, end - pos, &hdr) < 0)
1176 if (asn1_get_next(pos, end - pos, &hdr) < 0)
1206 const u8 *pos, *end;
1221 end = search_tag(pem_dhparams_end, pos, buf + len - pos);
1222 if (end == NULL) {
1223 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM dhparams end "
1228 der = base64_decode(pos, end - pos, &der_len);