HomeSort by: relevance | last modified time | path
    Searched refs:client_cert (Results 1 - 25 of 36) sorted by relevancy

1 2

  /src/external/bsd/wpa/dist/hs20/client/
osu_client.h 81 const char *client_cert, const char *client_key,
86 const char *client_cert, const char *client_key,
99 const char *client_cert, const char *client_key,
104 const char *client_cert, const char *client_key,
est.c 656 const char *client_cert = NULL, *client_key = NULL; local
684 client_cert = client_cert_buf;
696 ctx->ca_fname, user, pw, client_cert, client_key,
oma_dm_client.c 942 const char *client_cert,
960 client_cert, client_key, NULL);
1251 const char *client_cert, const char *client_key,
1270 cred_password, client_cert, client_key);
1298 const char *client_cert, const char *client_key,
1317 cred_password, client_cert, client_key);
spp_client.c 786 const char *client_cert, const char *client_key,
797 cred_username, cred_password, client_cert,
933 const char *client_cert, const char *client_key,
944 cred_password, client_cert, client_key) == 0) {
osu_client.c 1609 if (set_cred_quoted(ctx->ifname, id, "client_cert", buf) < 0) {
1610 wpa_printf(MSG_INFO, "Failed to set client_cert");
2599 char *client_cert = NULL; local
2701 client_cert = client_cert_buf;
2732 client_cert, client_key,
2736 client_cert, client_key,
2758 char *client_cert = NULL; local
2866 client_cert = client_cert_buf;
2887 client_cert, client_key,
2891 client_cert, client_key
    [all...]
  /src/external/bsd/wpa/dist/src/utils/
http-utils.h 41 const char *password, const char *client_cert,
56 const char *client_cert, const char *client_key,
http_curl.c 1329 const char *password, const char *client_cert,
1368 if (client_cert && client_key) {
1369 curl_easy_setopt(curl, CURLOPT_SSLCERT, client_cert);
1392 const char *password, const char *client_cert,
1402 clone_str(&ctx->svc_client_cert, client_cert);
1417 password, client_cert, client_key);
1427 const char *password, const char *client_cert,
1431 client_cert, client_key) < 0)
1450 char *client_cert = NULL; local
1460 clone_str(&client_cert, ctx->svc_client_cert)
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
cmp_client_test.c 39 static X509 *client_cert = NULL; variable
67 || !ossl_cmp_mock_srv_set1_certOut(fixture->srv_ctx, client_cert)
79 || !OSSL_CMP_CTX_set1_oldCert(ctx, client_cert)
139 if (!TEST_ptr(res) || !TEST_int_eq(X509_cmp(res, client_cert), 0))
372 X509_cmp(OSSL_CMP_CTX_get0_newCert(ctx), client_cert));
462 if (!ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx, X509_dup(client_cert))) {
482 X509_free(client_cert);
515 || !TEST_ptr(client_cert = load_cert_pem(client_cert_f, libctx))
  /src/external/bsd/wpa/dist/wpa_supplicant/
wpa_supplicant.conf 173 # By default the PKCS#11 engine is loaded if the client_cert or
639 # client_cert: File path to client certificate file (PEM/DER)
653 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
662 # Windows certificate store can be used by leaving client_cert out and
1279 # client_cert: File path to client certificate file (PEM/DER)
1285 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
1289 # Windows certificate store can be used by leaving client_cert out and
1384 # (private_key/client_cert) is no used and TLS session resumption was
1816 client_cert="/etc/cert/user.pem"
1930 client_cert="/etc/cert/user.pem
    [all...]
eapol_test.c 677 os_free(e->radius_conf->auth_server->client_cert);
1018 const char *ca_cert, const char *client_cert,
1063 if (client_cert)
1064 as->client_cert = os_strdup(client_cert);
1340 char *ca_cert = NULL, *client_cert = NULL; local
1393 client_cert = optarg;
1551 ca_cert, client_cert, private_key, private_key_passwd,
config.h 129 * client_cert - File path to client certificate file (PEM/DER)
139 char *client_cert; member in struct:wpa_cred
144 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
150 * Windows certificate store can be used by leaving client_cert out and
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_config.h 59 * client_cert - File path to client certificate file (PEM/DER)
70 char *client_cert; member in struct:eap_peer_cert_config
75 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
81 * Windows certificate store can be used by leaving client_cert out and
478 * (private_key/client_cert) is no used and TLS session resumption was
eap_tls_common.c 117 params->client_cert = config->client_cert;
231 eap_tls_check_blob(sm, &params->client_cert,
246 data->client_cert_conf = params->client_cert ||
  /src/crypto/external/apache2/openssl/dist/test/
cmp_client_test.c 37 static X509 *client_cert = NULL; variable
65 || !ossl_cmp_mock_srv_set1_refCert(fixture->srv_ctx, client_cert)
66 || !ossl_cmp_mock_srv_set1_certOut(fixture->srv_ctx, client_cert)
77 || !OSSL_CMP_CTX_set1_oldCert(ctx, client_cert)
138 if (!TEST_ptr(res) || !TEST_int_eq(X509_cmp(res, client_cert), 0))
386 X509_cmp(OSSL_CMP_CTX_get0_newCert(ctx), client_cert));
495 if (!ossl_cmp_ctx_set0_newCert(fixture->cmp_ctx, X509_dup(client_cert))) {
515 X509_free(client_cert);
548 || !TEST_ptr(client_cert = load_cert_pem(client_cert_f, libctx))
  /src/external/bsd/wpa/dist/src/radius/
radius_client.h 59 * client_cert - Path to client certificate for RADIUS/TLS
61 char *client_cert; member in struct:hostapd_radius_server
  /src/external/bsd/wpa/dist/src/crypto/
tls_wolfssl.c 469 const char *client_cert,
473 if (!client_cert && !client_cert_blob)
494 if (client_cert) {
496 conn->ssl, client_cert) != SSL_SUCCESS) {
500 conn->ssl, client_cert,
1312 if (tls_connection_client_cert(conn, params->client_cert,
1404 static int tls_global_client_cert(void *ssl_ctx, const char *client_cert)
1408 if (!client_cert)
1411 if (wolfSSL_CTX_use_certificate_chain_file_format(ctx, client_cert,
1414 wolfSSL_CTX_use_certificate_chain_file(ctx, client_cert) !
    [all...]
tls_gnutls.c 546 if (params->client_cert && params->private_key) {
549 params->client_cert, params->private_key);
552 conn->xcred, params->client_cert, params->private_key,
557 conn->xcred, params->client_cert, params->private_key,
566 conn->xcred, params->client_cert,
571 conn->xcred, params->client_cert,
793 if (params->client_cert && params->private_key) {
796 global->xcred, params->client_cert,
802 global->xcred, params->client_cert,
tls_openssl.c 3426 const char *client_cert,
3430 if (client_cert == NULL && client_cert_blob == NULL)
3483 if (client_cert == NULL)
3487 if (os_strncmp("keystore://", client_cert, 11) == 0) {
3488 BIO *bio = BIO_from_keystore(&client_cert[11]);
3516 if (SSL_use_certificate_file(conn->ssl, client_cert,
3525 if (SSL_use_certificate_chain_file(conn->ssl, client_cert) == 1) {
3532 if (SSL_use_certificate_file(conn->ssl, client_cert,
3552 const char *client_cert)
3557 if (client_cert == NULL
    [all...]
tls.h 148 * @client_cert: File or reference name for client X.509 certificate in PEM or
150 * @client_cert_blob: client_cert as inlined data or %NULL if not used
196 const char *client_cert; member in struct:tls_connection_params
tls_internal.c 266 if (tlsv1_set_cert(cred, params->client_cert,
323 if (tlsv1_set_cert(cred, params->client_cert, params->client_cert_blob,
  /src/crypto/external/bsd/heimdal/dist/kdc/
pkinit.c 1552 hx509_cert client_cert,
1562 client_cert,
1613 hx509_cert client_cert,
1626 client_cert,
  /src/external/bsd/nsd/dist/
options.h 461 char* client_cert; member in struct:tls_auth_options
xfrd-tcp.c 999 if (zone->master->tls_auth_options->client_cert &&
1002 zone->master->tls_auth_options->client_cert) != 1) {
1003 log_msg(LOG_ERR, "xfrd tls: Unable to load client certificate from file %s", zone->master->tls_auth_options->client_cert);
1018 zone->master->tls_auth_options->client_cert);
options.c 2359 X509 *client_cert; local
2364 client_cert = SSL_get1_peer_certificate(tls_auth);
2366 client_cert = SSL_get_peer_certificate(tls_auth);
2369 if (client_cert == NULL)
2386 if (!(result = matches_subject_alternative_name(acl_cert_cn, acl_cert_cn_len, client_cert)))
2387 result = matches_common_name(acl_cert_cn, acl_cert_cn_len, client_cert);
2389 X509_free(client_cert);
  /src/external/bsd/wpa/dist/src/ap/
authsrv.c 320 params.client_cert = hapd->conf->server_cert;

Completed in 70 milliseconds

1 2