/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
H A D | polochallengeresponse.h | 34 // @param client_cert the client certificate 36 PoloChallengeResponse(X509* client_cert, X509* server_cert); 52 X509* client_cert; member in class:polo::pairing::PoloChallengeResponse
|
H A D | polochallengeresponse.cc | 26 PoloChallengeResponse::PoloChallengeResponse(X509* client_cert, argument 28 : client_cert(client_cert), 33 EVP_PKEY* client_pkey = X509_get_pubkey(client_cert);
|
/external/libmicrohttpd/doc/chapters/ |
H A D | tlsauthentication.inc | 183 gnutls_x509_crt_t client_cert; 199 if (gnutls_x509_crt_init(&client_cert)) 207 if (gnutls_x509_crt_import(client_cert, 213 gnutls_x509_crt_deinit(client_cert); 216 return client_cert; 227 * @param client_cert the client certificate 232 cert_auth_get_dn(gnutls_x509_crt_c client_cert) 238 gnutls_x509_crt_get_dn(client_cert, NULL, &lbuf); 246 gnutls_x509_crt_get_dn(client_cert, buf, &lbuf); 254 * @param client_cert th [all...] |
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/ |
H A D | polochallengeresponsetest.cc | 71 client_cert = PEM_read_bio_X509(client_bio, NULL, NULL, NULL); 81 response = new PoloChallengeResponse(client_cert, server_cert); 85 X509_free(client_cert); 95 X509* client_cert; member in class:polo::pairing::PoloChallengeResponseTest
|
/external/wpa_supplicant_8/hs20/client/ |
H A D | osu_client.h | 78 const char *client_cert, const char *client_key, 83 const char *client_cert, const char *client_key, 96 const char *client_cert, const char *client_key, 101 const char *client_cert, const char *client_key,
|
H A D | est.c | 672 const char *client_cert = NULL, *client_key = NULL; local 700 client_cert = client_cert_buf; 712 ctx->ca_fname, user, pw, client_cert, client_key,
|
H A D | oma_dm_client.c | 936 const char *client_cert, 954 client_cert, client_key, NULL); 1245 const char *client_cert, const char *client_key, 1264 cred_password, client_cert, client_key); 1292 const char *client_cert, const char *client_key, 1311 cred_password, client_cert, client_key); 932 oma_dm_send_recv(struct hs20_osu_client *ctx, const char *url, xml_node_t *syncml, const char *ext_hdr, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1243 oma_dm_pol_upd(struct hs20_osu_client *ctx, const char *address, const char *pps_fname, const char *client_cert, const char *client_key, const char *cred_username, const char *cred_password, xml_node_t *pps) argument 1290 oma_dm_sub_rem(struct hs20_osu_client *ctx, const char *address, const char *pps_fname, const char *client_cert, const char *client_key, const char *cred_username, const char *cred_password, xml_node_t *pps) argument
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | http-utils.h | 40 const char *password, const char *client_cert, 55 const char *client_cert, const char *client_key,
|
H A D | http_curl.c | 1329 const char *password, const char *client_cert, 1368 if (client_cert && client_key) { 1369 curl_easy_setopt(curl, CURLOPT_SSLCERT, client_cert); 1392 const char *password, const char *client_cert, 1402 clone_str(&ctx->svc_client_cert, client_cert); 1417 password, client_cert, client_key); 1427 const char *password, const char *client_cert, 1431 client_cert, client_key) < 0) 1450 char *client_cert = NULL; local 1460 clone_str(&client_cert, ct 1327 setup_curl_post(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1390 post_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1425 soap_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1659 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument [all...] |
/external/wpa_supplicant_8/src/utils/ |
H A D | http-utils.h | 40 const char *password, const char *client_cert, 55 const char *client_cert, const char *client_key,
|
H A D | http_curl.c | 1329 const char *password, const char *client_cert, 1368 if (client_cert && client_key) { 1369 curl_easy_setopt(curl, CURLOPT_SSLCERT, client_cert); 1392 const char *password, const char *client_cert, 1402 clone_str(&ctx->svc_client_cert, client_cert); 1417 password, client_cert, client_key); 1427 const char *password, const char *client_cert, 1431 client_cert, client_key) < 0) 1450 char *client_cert = NULL; local 1460 clone_str(&client_cert, ct 1327 setup_curl_post(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1390 post_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1425 soap_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1659 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | http-utils.h | 40 const char *password, const char *client_cert, 55 const char *client_cert, const char *client_key,
|
H A D | http_curl.c | 1329 const char *password, const char *client_cert, 1368 if (client_cert && client_key) { 1369 curl_easy_setopt(curl, CURLOPT_SSLCERT, client_cert); 1392 const char *password, const char *client_cert, 1402 clone_str(&ctx->svc_client_cert, client_cert); 1417 password, client_cert, client_key); 1427 const char *password, const char *client_cert, 1431 client_cert, client_key) < 0) 1450 char *client_cert = NULL; local 1460 clone_str(&client_cert, ct 1327 setup_curl_post(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1390 post_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1425 soap_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1659 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument [all...] |
/external/autotest/client/common_lib/cros/network/ |
H A D | xmlrpc_security_types.py | 319 client_ca_cert=None, client_cert=None, client_key=None, 331 @param client_cert string PEM encoded identity certificate for client. 345 self.client_cert = client_cert 402 if self.client_cert: 403 tpm_store.install_certificate(self.client_cert, self.client_cert_id) 421 if self.client_cert: 456 client_ca_cert=None, client_cert=None, client_key=None, 466 @param client_cert string PEM encoded identity certificate for client. 477 client_cert [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 173 # By default the PKCS#11 engine is loaded if the client_cert or 539 # client_cert: File path to client certificate file (PEM/DER) 553 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 562 # Windows certificate store can be used by leaving client_cert out and 1063 # client_cert: File path to client certificate file (PEM/DER) 1069 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 1073 # Windows certificate store can be used by leaving client_cert out and 1446 client_cert="/etc/cert/user.pem" 1560 client_cert="/etc/cert/user.pem" 1695 client_cert [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_config.h | 118 * client_cert - File path to client certificate file (PEM/DER) 129 u8 *client_cert; member in struct:eap_peer_config 134 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 140 * Windows certificate store can be used by leaving client_cert out and 285 * This field is like client_cert, but used for phase 2 (inside
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_config.h | 118 * client_cert - File path to client certificate file (PEM/DER) 129 u8 *client_cert; member in struct:eap_peer_config 134 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 140 * Windows certificate store can be used by leaving client_cert out and 285 * This field is like client_cert, but used for phase 2 (inside
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_config.h | 118 * client_cert - File path to client certificate file (PEM/DER) 129 u8 *client_cert; member in struct:eap_peer_config 134 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be 140 * Windows certificate store can be used by leaving client_cert out and 285 * This field is like client_cert, but used for phase 2 (inside
|
/external/autotest/server/site_tests/network_WiFi_PMKSACaching/ |
H A D | network_WiFi_PMKSACaching.py | 68 client_cert=site_eap_certs.client_cert_1,
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_gnutls.c | 474 if (params->client_cert && params->private_key) { 477 conn->xcred, params->client_cert, params->private_key, 482 conn->xcred, params->client_cert, params->private_key, 490 conn->xcred, params->client_cert, 495 conn->xcred, params->client_cert, 706 if (params->client_cert && params->private_key) { 709 global->xcred, params->client_cert, 715 global->xcred, params->client_cert,
|
H A D | tls_openssl.c | 2590 const char *client_cert, 2594 if (client_cert == NULL && client_cert_blob == NULL) 2619 if (client_cert == NULL) 2623 if (os_strncmp("keystore://", client_cert, 11) == 0) { 2624 BIO *bio = BIO_from_keystore(&client_cert[11]); 2652 if (SSL_use_certificate_file(conn->ssl, client_cert, 2659 if (SSL_use_certificate_file(conn->ssl, client_cert, 2678 const char *client_cert) 2683 if (client_cert == NULL) 2686 if (SSL_CTX_use_certificate_file(ssl_ctx, client_cert, 2589 tls_connection_client_cert(struct tls_connection *conn, const char *client_cert, const u8 *client_cert_blob, size_t client_cert_blob_len) argument 2677 tls_global_client_cert(struct tls_data *data, const char *client_cert) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_gnutls.c | 474 if (params->client_cert && params->private_key) { 477 conn->xcred, params->client_cert, params->private_key, 482 conn->xcred, params->client_cert, params->private_key, 490 conn->xcred, params->client_cert, 495 conn->xcred, params->client_cert, 706 if (params->client_cert && params->private_key) { 709 global->xcred, params->client_cert, 715 global->xcred, params->client_cert,
|
H A D | tls_openssl.c | 2590 const char *client_cert, 2594 if (client_cert == NULL && client_cert_blob == NULL) 2619 if (client_cert == NULL) 2623 if (os_strncmp("keystore://", client_cert, 11) == 0) { 2624 BIO *bio = BIO_from_keystore(&client_cert[11]); 2652 if (SSL_use_certificate_file(conn->ssl, client_cert, 2659 if (SSL_use_certificate_file(conn->ssl, client_cert, 2678 const char *client_cert) 2683 if (client_cert == NULL) 2686 if (SSL_CTX_use_certificate_file(ssl_ctx, client_cert, 2589 tls_connection_client_cert(struct tls_connection *conn, const char *client_cert, const u8 *client_cert_blob, size_t client_cert_blob_len) argument 2677 tls_global_client_cert(struct tls_data *data, const char *client_cert) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_gnutls.c | 474 if (params->client_cert && params->private_key) { 477 conn->xcred, params->client_cert, params->private_key, 482 conn->xcred, params->client_cert, params->private_key, 490 conn->xcred, params->client_cert, 495 conn->xcred, params->client_cert, 706 if (params->client_cert && params->private_key) { 709 global->xcred, params->client_cert, 715 global->xcred, params->client_cert,
|
H A D | tls_openssl.c | 2590 const char *client_cert, 2594 if (client_cert == NULL && client_cert_blob == NULL) 2619 if (client_cert == NULL) 2623 if (os_strncmp("keystore://", client_cert, 11) == 0) { 2624 BIO *bio = BIO_from_keystore(&client_cert[11]); 2652 if (SSL_use_certificate_file(conn->ssl, client_cert, 2659 if (SSL_use_certificate_file(conn->ssl, client_cert, 2678 const char *client_cert) 2683 if (client_cert == NULL) 2686 if (SSL_CTX_use_certificate_file(ssl_ctx, client_cert, 2589 tls_connection_client_cert(struct tls_connection *conn, const char *client_cert, const u8 *client_cert_blob, size_t client_cert_blob_len) argument 2677 tls_global_client_cert(struct tls_data *data, const char *client_cert) argument [all...] |