| /src/external/bsd/wpa/dist/hs20/client/ |
| osu_client.h | 81 const char *client_cert, const char *client_key, 86 const char *client_cert, const char *client_key, 99 const char *client_cert, const char *client_key, 104 const char *client_cert, const char *client_key,
|
| est.c | 656 const char *client_cert = NULL, *client_key = NULL; local 684 client_cert = client_cert_buf; 696 ctx->ca_fname, user, pw, client_cert, client_key,
|
| oma_dm_client.c | 942 const char *client_cert, 960 client_cert, client_key, NULL); 1251 const char *client_cert, const char *client_key, 1270 cred_password, client_cert, client_key); 1298 const char *client_cert, const char *client_key, 1317 cred_password, client_cert, client_key);
|
| spp_client.c | 786 const char *client_cert, const char *client_key, 797 cred_username, cred_password, client_cert, 933 const char *client_cert, const char *client_key, 944 cred_password, client_cert, client_key) == 0) {
|
| osu_client.c | 1609 if (set_cred_quoted(ctx->ifname, id, "client_cert", buf) < 0) { 1610 wpa_printf(MSG_INFO, "Failed to set client_cert"); 2599 char *client_cert = NULL; local 2701 client_cert = client_cert_buf; 2732 client_cert, client_key, 2736 client_cert, client_key, 2758 char *client_cert = NULL; local 2866 client_cert = client_cert_buf; 2887 client_cert, client_key, 2891 client_cert, client_key [all...] |
| /src/external/bsd/wpa/dist/src/utils/ |
| http-utils.h | 41 const char *password, const char *client_cert, 56 const char *client_cert, const char *client_key,
|
| http_curl.c | 1329 const char *password, const char *client_cert, 1368 if (client_cert && client_key) { 1369 curl_easy_setopt(curl, CURLOPT_SSLCERT, client_cert); 1392 const char *password, const char *client_cert, 1402 clone_str(&ctx->svc_client_cert, client_cert); 1417 password, client_cert, client_key); 1427 const char *password, const char *client_cert, 1431 client_cert, client_key) < 0) 1450 char *client_cert = NULL; local 1460 clone_str(&client_cert, ctx->svc_client_cert) [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| wpa_supplicant.conf | 173 # By default the PKCS#11 engine is loaded if the client_cert or 639 # client_cert: File path to client certificate file (PEM/DER) 653 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 662 # Windows certificate store can be used by leaving client_cert out and 1279 # client_cert: File path to client certificate file (PEM/DER) 1285 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 1289 # Windows certificate store can be used by leaving client_cert out and 1384 # (private_key/client_cert) is no used and TLS session resumption was 1816 client_cert="/etc/cert/user.pem" 1930 client_cert="/etc/cert/user.pem [all...] |
| eapol_test.c | 677 os_free(e->radius_conf->auth_server->client_cert); 1018 const char *ca_cert, const char *client_cert, 1063 if (client_cert) 1064 as->client_cert = os_strdup(client_cert); 1340 char *ca_cert = NULL, *client_cert = NULL; local 1393 client_cert = optarg; 1551 ca_cert, client_cert, private_key, private_key_passwd,
|
| config.h | 129 * client_cert - File path to client certificate file (PEM/DER) 139 char *client_cert; member in struct:wpa_cred 144 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 150 * Windows certificate store can be used by leaving client_cert out and
|
| config.c | 2559 { STRe(client_cert, cert.client_cert) }, 2569 { STRe(client_cert2, phase2_cert.client_cert) }, 2595 { STRe(machine_client_cert, machine_cert.client_cert) }, 2870 os_free(cert->client_cert); 2974 os_free(cred->client_cert); 3835 if (os_strcmp(var, "client_cert") == 0) { 3836 os_free(cred->client_cert); 3837 cred->client_cert = val; 4232 if (os_strcmp(var, "client_cert") == 0 [all...] |
| config_file.c | 708 STR(client_cert); 923 if (cred->client_cert) 924 fprintf(f, "\tclient_cert=\"%s\"\n", cred->client_cert);
|
| config_winreg.c | 906 STR(client_cert);
|
| interworking.c | 1555 if (cred->client_cert && cred->client_cert[0] && 1556 wpa_config_set_quoted(ssid, "client_cert", cred->client_cert) < 0)
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_config.h | 59 * client_cert - File path to client certificate file (PEM/DER) 70 char *client_cert; member in struct:eap_peer_cert_config 75 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 81 * Windows certificate store can be used by leaving client_cert out and 478 * (private_key/client_cert) is no used and TLS session resumption was
|
| eap_tls_common.c | 117 params->client_cert = config->client_cert; 231 eap_tls_check_blob(sm, ¶ms->client_cert, 246 data->client_cert_conf = params->client_cert ||
|
| /src/external/bsd/wpa/dist/src/radius/ |
| radius_client.h | 59 * client_cert - Path to client certificate for RADIUS/TLS 61 char *client_cert; member in struct:hostapd_radius_server
|
| radius_client.c | 1365 params.client_cert = server->client_cert;
|
| /src/external/bsd/nsd/dist/ |
| options.h | 461 char* client_cert; member in struct:tls_auth_options
|
| xfrd-tcp.c | 999 if (zone->master->tls_auth_options->client_cert && 1002 zone->master->tls_auth_options->client_cert) != 1) { 1003 log_msg(LOG_ERR, "xfrd tls: Unable to load client certificate from file %s", zone->master->tls_auth_options->client_cert); 1018 zone->master->tls_auth_options->client_cert);
|
| options.c | 2359 X509 *client_cert; local 2364 client_cert = SSL_get1_peer_certificate(tls_auth); 2366 client_cert = SSL_get_peer_certificate(tls_auth); 2369 if (client_cert == NULL) 2386 if (!(result = matches_subject_alternative_name(acl_cert_cn, acl_cert_cn_len, client_cert))) 2387 result = matches_common_name(acl_cert_cn, acl_cert_cn_len, client_cert); 2389 X509_free(client_cert);
|
| configparser.y | 888 cfg_parser->tls_auth->client_cert = region_strdup(cfg_parser->opt->region, $2);
|
| /src/external/bsd/wpa/dist/src/ap/ |
| authsrv.c | 320 params.client_cert = hapd->conf->server_cert;
|
| ap_config.c | 563 os_free(servers[i].client_cert);
|
| /src/external/bsd/wpa/dist/hostapd/ |
| config_file.c | 2913 os_free(bss->radius->auth_server->client_cert); 2914 bss->radius->auth_server->client_cert = os_strdup(pos); 2978 os_free(bss->radius->acct_server->client_cert); 2979 bss->radius->acct_server->client_cert = os_strdup(pos);
|