| /src/external/bsd/ppp/dist/pppd/ |
| eap-tls.c | 257 SSL_CTX *eaptls_init_ssl(int init_server, char *cacertfile, char *capath, 280 if (!(cacertfile[0] || capath[0])) 390 if (tls_set_ca(ctx, capath, cacertfile) != 0) { 395 SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file(cacertfile)); 651 char cacertfile[MAXWORDLEN]; local 672 servcertfile, cacertfile, capath, pkfile, pkcs12, 1)) { 680 ets->ctx = eaptls_init_ssl(1, cacertfile, capath, servcertfile, pkfile, pkcs12); 729 char cacertfile[MAXWORDLEN]; local 746 servcertfile, cacertfile, capath, pkfile, pkcs12, 0)) { 753 ets->ctx = eaptls_init_ssl(0, cacertfile, capath, clicertfile, pkfile, pkcs12) [all...] |
| auth.c | 2483 char cacertfile[MAXWORDLEN]; local 2498 cacertfile, pkfile, &addrs, NULL, filename, 2504 if (ret >= 0 && !eaptls_init_ssl(1, cacertfile, servcertfile, 2530 char cacertfile[MAXWORDLEN]; local 2550 cacertfile, pkfile, &addrs, NULL, filename, 2555 if (ret >= 0 && !eaptls_init_ssl(0, cacertfile, clicertfile, 2724 char *clicertfile, char *servcertfile, char *cacertfile, 2736 bzero(cacertfile, MAXWORDLEN); 2746 strlcpy( cacertfile, cacert_file, MAXWORDLEN ); 2755 strlcpy( cacertfile, cacert_file, MAXWORDLEN ) [all...] |
| /src/crypto/dist/ipsec-tools/src/racoon/ |
| remoteconf.h | 108 char *cacertfile; /* file name of CA */ member in struct:remoteconf
|