HomeSort by: relevance | last modified time | path
    Searched defs:client_cert (Results 1 - 13 of 13) sorted by relevancy

  /src/external/bsd/wpa/dist/hs20/client/
est.c 656 const char *client_cert = NULL, *client_key = NULL; local
684 client_cert = client_cert_buf;
696 ctx->ca_fname, user, pw, client_cert, client_key,
osu_client.c 1609 if (set_cred_quoted(ctx->ifname, id, "client_cert", buf) < 0) {
1610 wpa_printf(MSG_INFO, "Failed to set client_cert");
2599 char *client_cert = NULL; local
2701 client_cert = client_cert_buf;
2732 client_cert, client_key,
2736 client_cert, client_key,
2758 char *client_cert = NULL; local
2866 client_cert = client_cert_buf;
2887 client_cert, client_key,
2891 client_cert, client_key
    [all...]
  /src/external/bsd/wpa/dist/src/radius/
radius_client.h 59 * client_cert - Path to client certificate for RADIUS/TLS
61 char *client_cert; member in struct:hostapd_radius_server
  /src/crypto/external/apache2/openssl/dist/test/
cmp_client_test.c 37 static X509 *client_cert = NULL; variable
65 || !ossl_cmp_mock_srv_set1_refCert(fixture->srv_ctx, client_cert)
66 || !ossl_cmp_mock_srv_set1_certOut(fixture->srv_ctx, client_cert)
77 || !OSSL_CMP_CTX_set1_oldCert(ctx, client_cert)
138 if (!TEST_ptr(res) || !TEST_int_eq(X509_cmp(res, client_cert), 0))
386 X509_cmp(OSSL_CMP_CTX_get0_newCert(ctx), client_cert));
495 if (!ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx, X509_dup(client_cert))) {
515 X509_free(client_cert);
548 || !TEST_ptr(client_cert = load_cert_pem(client_cert_f, libctx))
  /src/crypto/external/bsd/openssl/dist/test/
cmp_client_test.c 39 static X509 *client_cert = NULL; variable
67 || !ossl_cmp_mock_srv_set1_certOut(fixture->srv_ctx, client_cert)
79 || !OSSL_CMP_CTX_set1_oldCert(ctx, client_cert)
139 if (!TEST_ptr(res) || !TEST_int_eq(X509_cmp(res, client_cert), 0))
372 X509_cmp(OSSL_CMP_CTX_get0_newCert(ctx), client_cert));
462 if (!ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx, X509_dup(client_cert))) {
482 X509_free(client_cert);
515 || !TEST_ptr(client_cert = load_cert_pem(client_cert_f, libctx))
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_config.h 59 * client_cert - File path to client certificate file (PEM/DER)
70 char *client_cert; member in struct:eap_peer_cert_config
75 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
81 * Windows certificate store can be used by leaving client_cert out and
478 * (private_key/client_cert) is no used and TLS session resumption was
  /src/crypto/external/bsd/heimdal/dist/kdc/
kerberos5.c 371 char *client_cert = NULL; local
387 &client_cert);
395 r->client_name, client_cert);
396 free(client_cert);
  /src/external/bsd/wpa/dist/src/crypto/
tls.h 148 * @client_cert: File or reference name for client X.509 certificate in PEM or
150 * @client_cert_blob: client_cert as inlined data or %NULL if not used
196 const char *client_cert; member in struct:tls_connection_params
  /src/external/bsd/wpa/dist/wpa_supplicant/
eapol_test.c 677 os_free(e->radius_conf->auth_server->client_cert);
1018 const char *ca_cert, const char *client_cert,
1063 if (client_cert)
1064 as->client_cert = os_strdup(client_cert);
1340 char *ca_cert = NULL, *client_cert = NULL; local
1393 client_cert = optarg;
1551 ca_cert, client_cert, private_key, private_key_passwd,
config.h 129 * client_cert - File path to client certificate file (PEM/DER)
139 char *client_cert; member in struct:wpa_cred
144 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
150 * Windows certificate store can be used by leaving client_cert out and
  /src/external/bsd/nsd/dist/
options.c 2359 X509 *client_cert; local
2364 client_cert = SSL_get1_peer_certificate(tls_auth);
2366 client_cert = SSL_get_peer_certificate(tls_auth);
2369 if (client_cert == NULL)
2386 if (!(result = matches_subject_alternative_name(acl_cert_cn, acl_cert_cn_len, client_cert)))
2387 result = matches_common_name(acl_cert_cn, acl_cert_cn_len, client_cert);
2389 X509_free(client_cert);
options.h 461 char* client_cert; member in struct:tls_auth_options
  /src/external/bsd/wpa/dist/src/utils/
http_curl.c 1329 const char *password, const char *client_cert,
1368 if (client_cert && client_key) {
1369 curl_easy_setopt(curl, CURLOPT_SSLCERT, client_cert);
1392 const char *password, const char *client_cert,
1402 clone_str(&ctx->svc_client_cert, client_cert);
1417 password, client_cert, client_key);
1427 const char *password, const char *client_cert,
1431 client_cert, client_key) < 0)
1450 char *client_cert = NULL; local
1460 clone_str(&client_cert, ctx->svc_client_cert)
    [all...]

Completed in 86 milliseconds