HomeSort by: relevance | last modified time | path
    Searched refs:private_key (Results 1 - 25 of 29) sorted by relevancy

1 2

  /src/external/bsd/wpa/dist/wpa_supplicant/examples/
wpa2-eap-ccmp.conf 13 private_key="/etc/cert/user.p12"
  /src/usr.bin/nbsvtool/
nbsvtool.c 65 * `private_key' must be given. An additional hint to the verifier how
71 sign_file(X509 *cert, EVP_PKEY *private_key, STACK_OF(X509) *cert_chain,
86 p7 = PKCS7_sign(cert, private_key, cert_chain, in,
234 EVP_PKEY *private_key; member in struct:__anon8302
271 crypto_state.private_key =
274 if (crypto_state.private_key == NULL)
278 crypto_state.private_key);
375 crypto_state.private_key,
  /src/external/bsd/pkg_install/dist/lib/
pkcs7.c 237 EVP_PKEY *private_key;
247 private_key = NULL;
280 private_key = PEM_read_PrivateKey(f, NULL, ssl_pass_cb, NULL);
282 if (private_key == NULL) {
287 if (X509_check_private_key(certificate, private_key) != 1) {
295 p7 = PKCS7_sign(certificate, private_key, cert_chain, in,
316 EVP_PKEY_free(private_key);
  /src/external/bsd/wpa/dist/src/tls/
tlsv1_cred.h 41 const char *private_key,
rsa.c 18 int private_key; /* whether private key is set */ member in struct:crypto_rsa_key
21 /* The following parameters are available only if private_key is set */
155 key->private_key = 1;
263 if (use_private && !key->private_key)
tlsv1_cred.c 1029 * @private_key: File or reference name for the key in PEM or DER format
1032 * @private_key_blob: private_key as inlined data or %NULL if not used
1037 const char *private_key,
1050 if (private_key) {
1055 buf = (u8 *) os_readfile(private_key, &len);
1058 private_key);
  /src/external/bsd/wpa/dist/wpa_supplicant/
wpa_supplicant.conf 174 # private_key option appear to be a PKCS#11 URI, and these options
647 # For example: private_key="pkcs11:manufacturer=piv_II;id=%01"
652 # private_key: File path to client private key file (PEM/DER/PFX)
660 # For example: private_key="pkcs11:manufacturer=piv_II;id=%01"
663 # configuring private_key in one of the following formats:
669 # For example: private_key="hash://63093aa9c47f56ae88334c7b65a4"
1284 # private_key: File path to client private key file (PEM/DER/PFX)
1290 # configuring private_key in one of the following formats:
1293 # for example: private_key="hash://63093aa9c47f56ae88334c7b65a4"
1384 # (private_key/client_cert) is no used and TLS session resumption wa
    [all...]
eapol_test.c 678 os_free(e->radius_conf->auth_server->private_key);
1019 const char *private_key,
1065 if (private_key)
1066 as->private_key = os_strdup(private_key);
1341 char *private_key = NULL, *private_key_passwd = NULL; local
1396 private_key = optarg;
1551 ca_cert, client_cert, private_key, private_key_passwd,
config.h 142 * private_key - File path to client private key file (PEM/DER/PFX)
151 * configuring private_key in one of the following formats:
157 * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4"
166 char *private_key; member in struct:wpa_cred
interworking.c 709 (cred->private_key == NULL ||
710 cred->private_key[0] == '\0') &&
713 "nai-realm-find-eap: incomplete cred info: username: %s password: %s private_key: %s key_id: %s",
716 cred->private_key ? cred->private_key : "NULL",
726 if (((cred->private_key && cred->private_key[0]) ||
1560 if (cred->private_key &&
1561 os_strncmp(cred->private_key, "keystore://", 11) == 0) {
1565 cred->private_key + 11) < 0 |
    [all...]
config.c 2560 { STRe(private_key, cert.private_key) },
2570 { STRe(private_key2, phase2_cert.private_key) },
2596 { STRe(machine_private_key, machine_cert.private_key) },
2871 os_free(cert->private_key);
2975 os_free(cred->private_key);
3841 if (os_strcmp(var, "private_key") == 0) {
3842 os_free(cred->private_key);
3843 cred->private_key = val;
4235 if (os_strcmp(var, "private_key") == 0
    [all...]
config_file.c 709 STR(private_key);
925 if (cred->private_key)
926 fprintf(f, "\tprivate_key=\"%s\"\n", cred->private_key);
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_config.h 73 * private_key - File path to client private key file (PEM/DER/PFX)
82 * configuring private_key in one of the following formats:
88 * For example: private_key="hash://63093aa9c47f56ae88334c7b65a4"
97 char *private_key; member in struct:eap_peer_cert_config
478 * (private_key/client_cert) is no used and TLS session resumption was
eap_tls.c 47 if (!cert->private_key && cert->engine == 0) {
67 } else if (cert->private_key && !cert->private_key_passwd) {
eap_tls_common.c 118 params->private_key = config->private_key;
234 eap_tls_check_blob(sm, &params->private_key,
248 params->private_key ||
  /src/external/mpl/bind/dist/bin/tests/system/doth/CA/
CA.cfg 55 private_key = $dir/private/CA.key # CA private key
  /src/external/bsd/wpa/dist/src/radius/
radius_client.h 64 * private_key - Path to clienbt private key for RADIUS/TLS
66 char *private_key; member in struct:hostapd_radius_server
radius_client.c 1366 params.private_key = server->private_key;
  /src/external/gpl3/gdb/dist/gdb/
skip.c 81 struct private_key {}; struct
88 private_key);
129 private_key)
157 private_key {});
  /src/external/gpl3/gdb.old/dist/gdb/
skip.c 81 struct private_key {}; struct
88 private_key);
129 private_key)
157 private_key {});
  /src/external/bsd/wpa/dist/src/ap/
authsrv.c 291 hapd->conf->private_key || hapd->conf->dh_file ||
322 params.private_key = hapd->conf->private_key;
ap_config.c 564 os_free(servers[i].private_key);
848 os_free(conf->private_key);
ap_config.h 421 char *private_key; member in struct:hostapd_bss_config
  /src/external/bsd/openresolv/dist/
resolvconf.in 178 private_key()
284 elif private_key "$key"; then
765 if private_key "$i"; then
  /src/external/bsd/wpa/dist/hostapd/
config_file.c 2627 } else if (os_strcmp(buf, "private_key") == 0) {
2628 os_free(bss->private_key);
2629 bss->private_key = os_strdup(pos);
2917 os_free(bss->radius->auth_server->private_key);
2918 bss->radius->auth_server->private_key = os_strdup(pos);
2982 os_free(bss->radius->acct_server->private_key);
2983 bss->radius->acct_server->private_key = os_strdup(pos);

Completed in 72 milliseconds

1 2