/external/wpa_supplicant_8/wpa_supplicant/examples/ |
ieee8021x.conf | 12 ca_cert="/etc/cert/ca.pem"
|
wpa2-eap-ccmp.conf | 12 ca_cert="/etc/cert/ca.pem"
|
/external/chromium_org/net/cert/ |
cert_type.h | 20 CA_CERT,
|
x509_certificate_nss.cc | 87 case CA_CERT: { 238 CERTCertificate* ca_cert = intermediates[i]; local 239 HASH_Update(sha1_ctx, ca_cert->derCert.data, ca_cert->derCert.len);
|
/external/chromium_org/net/data/ssl/scripts/ |
generate-multi-root-test-chains.sh | 54 -extensions ca_cert \ 74 -extensions ca_cert \ 108 -extensions ca_cert \ 120 -extensions ca_cert \ 131 -extensions ca_cert \
|
aia-test.cnf | 31 [ca_cert]
|
client-certs.cnf | 45 [ca_cert]
|
generate-redundant-test-chains.sh | 58 -extensions ca_cert \ 78 -extensions ca_cert \ 104 -extensions ca_cert \ 115 -extensions ca_cert \
|
policy.cnf | 30 [ca_cert]
|
redundant-ca.cnf | 29 [ca_cert]
|
generate-aia-certs.sh | 50 -extensions ca_cert \ 71 -extensions ca_cert
|
generate-bad-eku-certs.sh | 40 -extensions ca_cert \ 50 -extensions ca_cert \
|
generate-cross-signed-certs.sh | 54 -extensions ca_cert 65 -extensions ca_cert
|
generate-client-certificates.sh | 62 -extensions ca_cert \ 82 -extensions ca_cert \ 101 -extensions ca_cert \
|
generate-weak-test-chains.sh | 55 -extensions ca_cert \ 65 -extensions ca_cert \ 133 -extensions ca_cert \
|
ca.cnf | 39 [ca_cert]
|
generate-test-certs.sh | 39 -extensions ca_cert \
|
/external/chromium_org/chrome/common/net/ |
x509_certificate_model_unittest.cc | 81 EXPECT_EQ(net::CA_CERT, 84 // Test that explicitly distrusted CA certs are still returned as CA_CERT 87 cert.get(), net::CA_CERT, net::NSSCertDatabase::DISTRUSTED_SSL)); 89 EXPECT_EQ(net::CA_CERT,
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_supplicant.conf.sgml | 68 ca_cert="/etc/cert/ca.pem" 90 ca_cert="/etc/cert/ca.pem" 113 ca_cert="/etc/cert/ca.pem" 133 ca_cert="/etc/cert/ca.pem" 162 ca_cert="/etc/cert/ca.pem"
|
/external/wpa_supplicant_8/src/ap/ |
authsrv.c | 144 (hapd->conf->ca_cert || hapd->conf->server_cert || 156 params.ca_cert = hapd->conf->ca_cert;
|
/external/chromium_org/chromeos/network/onc/ |
onc_certificate_importer_impl_unittest.cc | 49 return net::CA_CERT; 132 if (expected_type == net::SERVER_CERT || expected_type == net::CA_CERT) { 252 AddCertificateFromFile("certificate-web-authority.onc", net::CA_CERT, NULL); 270 AddCertificateFromFile("certificate-authority.onc", net::CA_CERT, NULL); 335 CertParam(net::CA_CERT,
|
/external/wpa_supplicant_8/src/crypto/ |
tls_gnutls.c | 531 if (params->ca_cert) { 534 conn->xcred, params->ca_cert, GNUTLS_X509_FMT_PEM); 537 "in PEM format: %s", params->ca_cert, 540 conn->xcred, params->ca_cert, 545 params->ca_cert, 642 if (params->ca_cert) { 644 global->xcred, params->ca_cert, GNUTLS_X509_FMT_PEM); 647 "in PEM format: %s", params->ca_cert, 650 global->xcred, params->ca_cert, 655 params->ca_cert, [all...] |
tls_openssl.c | 514 "Failed to add ca_cert to OpenSSL " [all...] |
/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsNSSCertificateDB.cpp | 93 root->GetDefaultNickname(net::CA_CERT), 101 if (!SetCertTrust(root, net::CA_CERT, trustBits)) 153 cert->GetDefaultNickname(net::CA_CERT), 232 if (type == net::CA_CERT) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 73 * ca_cert - File path to CA certificate file (PEM/DER) 75 * This file can have one or more trusted CA certificates. If ca_cert 96 * ca_cert="cert_store://CA" or ca_cert="cert_store://ROOT". 101 u8 *ca_cert; member in struct:eap_peer_config 109 * these certificates are added to the list of trusted CAs. ca_cert 238 * This field is like ca_cert, but used for phase 2 (inside 252 * these certificates are added to the list of trusted CAs. ca_cert
|