Home | History | Annotate | Download | only in qemu

Lines Matching full:x509

130             return "vencrypt+x509+none";
132 return "vencrypt+x509+vnc";
134 return "vencrypt+x509+plain";
138 return "vencrypt+x509+sasl";
166 monitor_printf(mon, " x509 dname: %s\n", client->tls.dname);
168 monitor_printf(mon, " x509 dname: none\n");
2190 int tls = 0, x509 = 0;
2223 } else if (strncmp(options, "x509", 4) == 0) {
2225 x509 = 1; /* Require x509 certificates */
2229 /* Now check for 'x509=/some/path' postfix
2230 * and use that to setup x509 certificate/key paths */
2239 x509 certificates/keys in %s\n", path);
2259 if (acl && x509 && vs->tls.x509verify) {
2261 fprintf(stderr, "Failed to create x509 dname ACL\n");
2284 * - tls + x509 (encrypt, good x509 creds, no auth)
2285 * - tls + x509 + password (encrypt, good x509 creds, weak auth)
2286 * - tls + x509 + sasl (encrypt, good x509 creds, good auth)
2289 * NB2. the x509 schemes have option to validate a client cert dname
2295 if (x509) {
2296 VNC_DEBUG("Initializing VNC server with x509 password auth\n");
2315 if (x509) {
2316 VNC_DEBUG("Initializing VNC server with x509 SASL auth\n");
2335 if (x509) {
2336 VNC_DEBUG("Initializing VNC server with x509 no auth\n");