| /src/external/bsd/wpa/dist/hs20/client/ |
| est.c | 656 const char *client_cert = NULL, *client_key = NULL; local 684 client_cert = client_cert_buf; 696 ctx->ca_fname, user, pw, client_cert, client_key,
|
| osu_client.c | 1609 if (set_cred_quoted(ctx->ifname, id, "client_cert", buf) < 0) { 1610 wpa_printf(MSG_INFO, "Failed to set client_cert"); 2599 char *client_cert = NULL; local 2701 client_cert = client_cert_buf; 2732 client_cert, client_key, 2736 client_cert, client_key, 2758 char *client_cert = NULL; local 2866 client_cert = client_cert_buf; 2887 client_cert, client_key, 2891 client_cert, client_key [all...] |
| /src/external/bsd/wpa/dist/src/radius/ |
| radius_client.h | 59 * client_cert - Path to client certificate for RADIUS/TLS 61 char *client_cert; member in struct:hostapd_radius_server
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| cmp_client_test.c | 37 static X509 *client_cert = NULL; variable 65 || !ossl_cmp_mock_srv_set1_refCert(fixture->srv_ctx, client_cert) 66 || !ossl_cmp_mock_srv_set1_certOut(fixture->srv_ctx, client_cert) 77 || !OSSL_CMP_CTX_set1_oldCert(ctx, client_cert) 138 if (!TEST_ptr(res) || !TEST_int_eq(X509_cmp(res, client_cert), 0)) 386 X509_cmp(OSSL_CMP_CTX_get0_newCert(ctx), client_cert)); 495 if (!ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx, X509_dup(client_cert))) { 515 X509_free(client_cert); 548 || !TEST_ptr(client_cert = load_cert_pem(client_cert_f, libctx))
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| cmp_client_test.c | 39 static X509 *client_cert = NULL; variable 67 || !ossl_cmp_mock_srv_set1_certOut(fixture->srv_ctx, client_cert) 79 || !OSSL_CMP_CTX_set1_oldCert(ctx, client_cert) 139 if (!TEST_ptr(res) || !TEST_int_eq(X509_cmp(res, client_cert), 0)) 372 X509_cmp(OSSL_CMP_CTX_get0_newCert(ctx), client_cert)); 462 if (!ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx, X509_dup(client_cert))) { 482 X509_free(client_cert); 515 || !TEST_ptr(client_cert = load_cert_pem(client_cert_f, libctx))
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_config.h | 59 * client_cert - File path to client certificate file (PEM/DER) 70 char *client_cert; member in struct:eap_peer_cert_config 75 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 81 * Windows certificate store can be used by leaving client_cert out and 478 * (private_key/client_cert) is no used and TLS session resumption was
|
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| kerberos5.c | 371 char *client_cert = NULL; local 387 &client_cert); 395 r->client_name, client_cert); 396 free(client_cert);
|
| /src/external/bsd/wpa/dist/src/crypto/ |
| tls.h | 148 * @client_cert: File or reference name for client X.509 certificate in PEM or 150 * @client_cert_blob: client_cert as inlined data or %NULL if not used 196 const char *client_cert; member in struct:tls_connection_params
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| eapol_test.c | 677 os_free(e->radius_conf->auth_server->client_cert); 1018 const char *ca_cert, const char *client_cert, 1063 if (client_cert) 1064 as->client_cert = os_strdup(client_cert); 1340 char *ca_cert = NULL, *client_cert = NULL; local 1393 client_cert = optarg; 1551 ca_cert, client_cert, private_key, private_key_passwd,
|
| config.h | 129 * client_cert - File path to client certificate file (PEM/DER) 139 char *client_cert; member in struct:wpa_cred 144 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 150 * Windows certificate store can be used by leaving client_cert out and
|
| /src/external/bsd/nsd/dist/ |
| options.c | 2359 X509 *client_cert; local 2364 client_cert = SSL_get1_peer_certificate(tls_auth); 2366 client_cert = SSL_get_peer_certificate(tls_auth); 2369 if (client_cert == NULL) 2386 if (!(result = matches_subject_alternative_name(acl_cert_cn, acl_cert_cn_len, client_cert))) 2387 result = matches_common_name(acl_cert_cn, acl_cert_cn_len, client_cert); 2389 X509_free(client_cert);
|
| options.h | 461 char* client_cert; member in struct:tls_auth_options
|
| /src/external/bsd/wpa/dist/src/utils/ |
| http_curl.c | 1329 const char *password, const char *client_cert, 1368 if (client_cert && client_key) { 1369 curl_easy_setopt(curl, CURLOPT_SSLCERT, client_cert); 1392 const char *password, const char *client_cert, 1402 clone_str(&ctx->svc_client_cert, client_cert); 1417 password, client_cert, client_key); 1427 const char *password, const char *client_cert, 1431 client_cert, client_key) < 0) 1450 char *client_cert = NULL; local 1460 clone_str(&client_cert, ctx->svc_client_cert) [all...] |