HomeSort by: relevance | last modified time | path
    Searched refs:client_cert (Results 1 - 25 of 27) sorted by relevancy

1 2

  /src/external/bsd/wpa/dist/hs20/client/
osu_client.h 81 const char *client_cert, const char *client_key,
86 const char *client_cert, const char *client_key,
99 const char *client_cert, const char *client_key,
104 const char *client_cert, const char *client_key,
est.c 656 const char *client_cert = NULL, *client_key = NULL; local
684 client_cert = client_cert_buf;
696 ctx->ca_fname, user, pw, client_cert, client_key,
oma_dm_client.c 942 const char *client_cert,
960 client_cert, client_key, NULL);
1251 const char *client_cert, const char *client_key,
1270 cred_password, client_cert, client_key);
1298 const char *client_cert, const char *client_key,
1317 cred_password, client_cert, client_key);
spp_client.c 786 const char *client_cert, const char *client_key,
797 cred_username, cred_password, client_cert,
933 const char *client_cert, const char *client_key,
944 cred_password, client_cert, client_key) == 0) {
osu_client.c 1609 if (set_cred_quoted(ctx->ifname, id, "client_cert", buf) < 0) {
1610 wpa_printf(MSG_INFO, "Failed to set client_cert");
2599 char *client_cert = NULL; local
2701 client_cert = client_cert_buf;
2732 client_cert, client_key,
2736 client_cert, client_key,
2758 char *client_cert = NULL; local
2866 client_cert = client_cert_buf;
2887 client_cert, client_key,
2891 client_cert, client_key
    [all...]
  /src/external/bsd/wpa/dist/src/utils/
http-utils.h 41 const char *password, const char *client_cert,
56 const char *client_cert, const char *client_key,
http_curl.c 1329 const char *password, const char *client_cert,
1368 if (client_cert && client_key) {
1369 curl_easy_setopt(curl, CURLOPT_SSLCERT, client_cert);
1392 const char *password, const char *client_cert,
1402 clone_str(&ctx->svc_client_cert, client_cert);
1417 password, client_cert, client_key);
1427 const char *password, const char *client_cert,
1431 client_cert, client_key) < 0)
1450 char *client_cert = NULL; local
1460 clone_str(&client_cert, ctx->svc_client_cert)
    [all...]
  /src/external/bsd/wpa/dist/wpa_supplicant/
wpa_supplicant.conf 173 # By default the PKCS#11 engine is loaded if the client_cert or
639 # client_cert: File path to client certificate file (PEM/DER)
653 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
662 # Windows certificate store can be used by leaving client_cert out and
1279 # client_cert: File path to client certificate file (PEM/DER)
1285 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
1289 # Windows certificate store can be used by leaving client_cert out and
1384 # (private_key/client_cert) is no used and TLS session resumption was
1816 client_cert="/etc/cert/user.pem"
1930 client_cert="/etc/cert/user.pem
    [all...]
eapol_test.c 677 os_free(e->radius_conf->auth_server->client_cert);
1018 const char *ca_cert, const char *client_cert,
1063 if (client_cert)
1064 as->client_cert = os_strdup(client_cert);
1340 char *ca_cert = NULL, *client_cert = NULL; local
1393 client_cert = optarg;
1551 ca_cert, client_cert, private_key, private_key_passwd,
config.h 129 * client_cert - File path to client certificate file (PEM/DER)
139 char *client_cert; member in struct:wpa_cred
144 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
150 * Windows certificate store can be used by leaving client_cert out and
config.c 2559 { STRe(client_cert, cert.client_cert) },
2569 { STRe(client_cert2, phase2_cert.client_cert) },
2595 { STRe(machine_client_cert, machine_cert.client_cert) },
2870 os_free(cert->client_cert);
2974 os_free(cred->client_cert);
3835 if (os_strcmp(var, "client_cert") == 0) {
3836 os_free(cred->client_cert);
3837 cred->client_cert = val;
4232 if (os_strcmp(var, "client_cert") == 0
    [all...]
config_file.c 708 STR(client_cert);
923 if (cred->client_cert)
924 fprintf(f, "\tclient_cert=\"%s\"\n", cred->client_cert);
config_winreg.c 906 STR(client_cert);
interworking.c 1555 if (cred->client_cert && cred->client_cert[0] &&
1556 wpa_config_set_quoted(ssid, "client_cert", cred->client_cert) < 0)
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_config.h 59 * client_cert - File path to client certificate file (PEM/DER)
70 char *client_cert; member in struct:eap_peer_cert_config
75 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
81 * Windows certificate store can be used by leaving client_cert out and
478 * (private_key/client_cert) is no used and TLS session resumption was
eap_tls_common.c 117 params->client_cert = config->client_cert;
231 eap_tls_check_blob(sm, &params->client_cert,
246 data->client_cert_conf = params->client_cert ||
  /src/external/bsd/wpa/dist/src/radius/
radius_client.h 59 * client_cert - Path to client certificate for RADIUS/TLS
61 char *client_cert; member in struct:hostapd_radius_server
radius_client.c 1365 params.client_cert = server->client_cert;
  /src/external/bsd/nsd/dist/
options.h 461 char* client_cert; member in struct:tls_auth_options
xfrd-tcp.c 999 if (zone->master->tls_auth_options->client_cert &&
1002 zone->master->tls_auth_options->client_cert) != 1) {
1003 log_msg(LOG_ERR, "xfrd tls: Unable to load client certificate from file %s", zone->master->tls_auth_options->client_cert);
1018 zone->master->tls_auth_options->client_cert);
options.c 2359 X509 *client_cert; local
2364 client_cert = SSL_get1_peer_certificate(tls_auth);
2366 client_cert = SSL_get_peer_certificate(tls_auth);
2369 if (client_cert == NULL)
2386 if (!(result = matches_subject_alternative_name(acl_cert_cn, acl_cert_cn_len, client_cert)))
2387 result = matches_common_name(acl_cert_cn, acl_cert_cn_len, client_cert);
2389 X509_free(client_cert);
configparser.y 888 cfg_parser->tls_auth->client_cert = region_strdup(cfg_parser->opt->region, $2);
  /src/external/bsd/wpa/dist/src/ap/
authsrv.c 320 params.client_cert = hapd->conf->server_cert;
ap_config.c 563 os_free(servers[i].client_cert);
  /src/external/bsd/wpa/dist/hostapd/
config_file.c 2913 os_free(bss->radius->auth_server->client_cert);
2914 bss->radius->auth_server->client_cert = os_strdup(pos);
2978 os_free(bss->radius->acct_server->client_cert);
2979 bss->radius->acct_server->client_cert = os_strdup(pos);

Completed in 78 milliseconds

1 2