Searched refs:client_cert (Results 1 - 25 of 50) sorted by relevance

12

/external/google-tv-pairing-protocol/cpp/src/polo/pairing/
H A Dpolochallengeresponse.h34 // @param client_cert the client certificate
36 PoloChallengeResponse(X509* client_cert, X509* server_cert);
52 X509* client_cert; member in class:polo::pairing::PoloChallengeResponse
H A Dpolochallengeresponse.cc26 PoloChallengeResponse::PoloChallengeResponse(X509* client_cert, argument
28 : client_cert(client_cert),
33 EVP_PKEY* client_pkey = X509_get_pubkey(client_cert);
/external/libmicrohttpd/doc/chapters/
H A Dtlsauthentication.inc183 gnutls_x509_crt_t client_cert;
199 if (gnutls_x509_crt_init(&client_cert))
207 if (gnutls_x509_crt_import(client_cert,
213 gnutls_x509_crt_deinit(client_cert);
216 return client_cert;
227 * @param client_cert the client certificate
232 cert_auth_get_dn(gnutls_x509_crt_c client_cert)
238 gnutls_x509_crt_get_dn(client_cert, NULL, &lbuf);
246 gnutls_x509_crt_get_dn(client_cert, buf, &lbuf);
254 * @param client_cert th
[all...]
/external/google-tv-pairing-protocol/cpp/tests/polo/pairing/
H A Dpolochallengeresponsetest.cc71 client_cert = PEM_read_bio_X509(client_bio, NULL, NULL, NULL);
81 response = new PoloChallengeResponse(client_cert, server_cert);
85 X509_free(client_cert);
95 X509* client_cert; member in class:polo::pairing::PoloChallengeResponseTest
/external/wpa_supplicant_8/hs20/client/
H A Dosu_client.h78 const char *client_cert, const char *client_key,
83 const char *client_cert, const char *client_key,
96 const char *client_cert, const char *client_key,
101 const char *client_cert, const char *client_key,
H A Dest.c672 const char *client_cert = NULL, *client_key = NULL; local
700 client_cert = client_cert_buf;
712 ctx->ca_fname, user, pw, client_cert, client_key,
H A Doma_dm_client.c936 const char *client_cert,
954 client_cert, client_key, NULL);
1245 const char *client_cert, const char *client_key,
1264 cred_password, client_cert, client_key);
1292 const char *client_cert, const char *client_key,
1311 cred_password, client_cert, client_key);
932 oma_dm_send_recv(struct hs20_osu_client *ctx, const char *url, xml_node_t *syncml, const char *ext_hdr, const char *username, const char *password, const char *client_cert, const char *client_key) argument
1243 oma_dm_pol_upd(struct hs20_osu_client *ctx, const char *address, const char *pps_fname, const char *client_cert, const char *client_key, const char *cred_username, const char *cred_password, xml_node_t *pps) argument
1290 oma_dm_sub_rem(struct hs20_osu_client *ctx, const char *address, const char *pps_fname, const char *client_cert, const char *client_key, const char *cred_username, const char *cred_password, xml_node_t *pps) argument
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dhttp-utils.h40 const char *password, const char *client_cert,
55 const char *client_cert, const char *client_key,
H A Dhttp_curl.c1329 const char *password, const char *client_cert,
1368 if (client_cert && client_key) {
1369 curl_easy_setopt(curl, CURLOPT_SSLCERT, client_cert);
1392 const char *password, const char *client_cert,
1402 clone_str(&ctx->svc_client_cert, client_cert);
1417 password, client_cert, client_key);
1427 const char *password, const char *client_cert,
1431 client_cert, client_key) < 0)
1450 char *client_cert = NULL; local
1460 clone_str(&client_cert, ct
1327 setup_curl_post(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument
1390 post_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument
1425 soap_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument
1659 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument
[all...]
/external/wpa_supplicant_8/src/utils/
H A Dhttp-utils.h40 const char *password, const char *client_cert,
55 const char *client_cert, const char *client_key,
H A Dhttp_curl.c1329 const char *password, const char *client_cert,
1368 if (client_cert && client_key) {
1369 curl_easy_setopt(curl, CURLOPT_SSLCERT, client_cert);
1392 const char *password, const char *client_cert,
1402 clone_str(&ctx->svc_client_cert, client_cert);
1417 password, client_cert, client_key);
1427 const char *password, const char *client_cert,
1431 client_cert, client_key) < 0)
1450 char *client_cert = NULL; local
1460 clone_str(&client_cert, ct
1327 setup_curl_post(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument
1390 post_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument
1425 soap_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument
1659 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dhttp-utils.h40 const char *password, const char *client_cert,
55 const char *client_cert, const char *client_key,
H A Dhttp_curl.c1329 const char *password, const char *client_cert,
1368 if (client_cert && client_key) {
1369 curl_easy_setopt(curl, CURLOPT_SSLCERT, client_cert);
1392 const char *password, const char *client_cert,
1402 clone_str(&ctx->svc_client_cert, client_cert);
1417 password, client_cert, client_key);
1427 const char *password, const char *client_cert,
1431 client_cert, client_key) < 0)
1450 char *client_cert = NULL; local
1460 clone_str(&client_cert, ct
1327 setup_curl_post(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument
1390 post_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument
1425 soap_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument
1659 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument
[all...]
/external/autotest/client/common_lib/cros/network/
H A Dxmlrpc_security_types.py319 client_ca_cert=None, client_cert=None, client_key=None,
331 @param client_cert string PEM encoded identity certificate for client.
345 self.client_cert = client_cert
402 if self.client_cert:
403 tpm_store.install_certificate(self.client_cert, self.client_cert_id)
421 if self.client_cert:
456 client_ca_cert=None, client_cert=None, client_key=None,
466 @param client_cert string PEM encoded identity certificate for client.
477 client_cert
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpa_supplicant.conf173 # By default the PKCS#11 engine is loaded if the client_cert or
539 # client_cert: File path to client certificate file (PEM/DER)
553 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
562 # Windows certificate store can be used by leaving client_cert out and
1063 # client_cert: File path to client certificate file (PEM/DER)
1069 # When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
1073 # Windows certificate store can be used by leaving client_cert out and
1446 client_cert="/etc/cert/user.pem"
1560 client_cert="/etc/cert/user.pem"
1695 client_cert
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_config.h118 * client_cert - File path to client certificate file (PEM/DER)
129 u8 *client_cert; member in struct:eap_peer_config
134 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
140 * Windows certificate store can be used by leaving client_cert out and
285 * This field is like client_cert, but used for phase 2 (inside
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_config.h118 * client_cert - File path to client certificate file (PEM/DER)
129 u8 *client_cert; member in struct:eap_peer_config
134 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
140 * Windows certificate store can be used by leaving client_cert out and
285 * This field is like client_cert, but used for phase 2 (inside
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_config.h118 * client_cert - File path to client certificate file (PEM/DER)
129 u8 *client_cert; member in struct:eap_peer_config
134 * When PKCS#12/PFX file (.p12/.pfx) is used, client_cert should be
140 * Windows certificate store can be used by leaving client_cert out and
285 * This field is like client_cert, but used for phase 2 (inside
/external/autotest/server/site_tests/network_WiFi_PMKSACaching/
H A Dnetwork_WiFi_PMKSACaching.py68 client_cert=site_eap_certs.client_cert_1,
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_gnutls.c474 if (params->client_cert && params->private_key) {
477 conn->xcred, params->client_cert, params->private_key,
482 conn->xcred, params->client_cert, params->private_key,
490 conn->xcred, params->client_cert,
495 conn->xcred, params->client_cert,
706 if (params->client_cert && params->private_key) {
709 global->xcred, params->client_cert,
715 global->xcred, params->client_cert,
H A Dtls_openssl.c2590 const char *client_cert,
2594 if (client_cert == NULL && client_cert_blob == NULL)
2619 if (client_cert == NULL)
2623 if (os_strncmp("keystore://", client_cert, 11) == 0) {
2624 BIO *bio = BIO_from_keystore(&client_cert[11]);
2652 if (SSL_use_certificate_file(conn->ssl, client_cert,
2659 if (SSL_use_certificate_file(conn->ssl, client_cert,
2678 const char *client_cert)
2683 if (client_cert == NULL)
2686 if (SSL_CTX_use_certificate_file(ssl_ctx, client_cert,
2589 tls_connection_client_cert(struct tls_connection *conn, const char *client_cert, const u8 *client_cert_blob, size_t client_cert_blob_len) argument
2677 tls_global_client_cert(struct tls_data *data, const char *client_cert) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dtls_gnutls.c474 if (params->client_cert && params->private_key) {
477 conn->xcred, params->client_cert, params->private_key,
482 conn->xcred, params->client_cert, params->private_key,
490 conn->xcred, params->client_cert,
495 conn->xcred, params->client_cert,
706 if (params->client_cert && params->private_key) {
709 global->xcred, params->client_cert,
715 global->xcred, params->client_cert,
H A Dtls_openssl.c2590 const char *client_cert,
2594 if (client_cert == NULL && client_cert_blob == NULL)
2619 if (client_cert == NULL)
2623 if (os_strncmp("keystore://", client_cert, 11) == 0) {
2624 BIO *bio = BIO_from_keystore(&client_cert[11]);
2652 if (SSL_use_certificate_file(conn->ssl, client_cert,
2659 if (SSL_use_certificate_file(conn->ssl, client_cert,
2678 const char *client_cert)
2683 if (client_cert == NULL)
2686 if (SSL_CTX_use_certificate_file(ssl_ctx, client_cert,
2589 tls_connection_client_cert(struct tls_connection *conn, const char *client_cert, const u8 *client_cert_blob, size_t client_cert_blob_len) argument
2677 tls_global_client_cert(struct tls_data *data, const char *client_cert) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_gnutls.c474 if (params->client_cert && params->private_key) {
477 conn->xcred, params->client_cert, params->private_key,
482 conn->xcred, params->client_cert, params->private_key,
490 conn->xcred, params->client_cert,
495 conn->xcred, params->client_cert,
706 if (params->client_cert && params->private_key) {
709 global->xcred, params->client_cert,
715 global->xcred, params->client_cert,
H A Dtls_openssl.c2590 const char *client_cert,
2594 if (client_cert == NULL && client_cert_blob == NULL)
2619 if (client_cert == NULL)
2623 if (os_strncmp("keystore://", client_cert, 11) == 0) {
2624 BIO *bio = BIO_from_keystore(&client_cert[11]);
2652 if (SSL_use_certificate_file(conn->ssl, client_cert,
2659 if (SSL_use_certificate_file(conn->ssl, client_cert,
2678 const char *client_cert)
2683 if (client_cert == NULL)
2686 if (SSL_CTX_use_certificate_file(ssl_ctx, client_cert,
2589 tls_connection_client_cert(struct tls_connection *conn, const char *client_cert, const u8 *client_cert_blob, size_t client_cert_blob_len) argument
2677 tls_global_client_cert(struct tls_data *data, const char *client_cert) argument
[all...]

Completed in 1054 milliseconds

12