/external/wpa_supplicant_8/wpa_supplicant/examples/ |
ieee8021x.conf | 12 ca_cert="/etc/cert/ca.pem"
|
wpa2-eap-ccmp.conf | 12 ca_cert="/etc/cert/ca.pem"
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf | 380 # ca_cert: CA certificate for Interworking network selection 511 # ca_cert="/etc/wpa_supplicant/ca.pem" 524 # ca_cert="/etc/wpa_supplicant/ca.pem" [all...] |
config.h | 99 * ca_cert - CA certificate for Interworking network selection 101 char *ca_cert; member in struct:wpa_cred [all...] |
config_file.c | 676 STR(ca_cert); 768 if (cred->ca_cert) 769 fprintf(f, "\tca_cert=\"%s\"\n", cred->ca_cert);
|
/external/chromium_org/net/data/ssl/scripts/ |
generate-bad-eku-certs.sh | 40 -extensions ca_cert \ 50 -extensions ca_cert \
|
generate-redundant-test-chains.sh | 58 -extensions ca_cert \ 78 -extensions ca_cert \ 104 -extensions ca_cert \ 115 -extensions ca_cert \
|
generate-multi-root-test-chains.sh | 54 -extensions ca_cert \ 74 -extensions ca_cert \ 108 -extensions ca_cert \ 120 -extensions ca_cert \ 131 -extensions ca_cert \
|
generate-weak-test-chains.sh | 55 -extensions ca_cert \ 65 -extensions ca_cert \ 133 -extensions ca_cert \
|
generate-cross-signed-certs.sh | 54 -extensions ca_cert 65 -extensions ca_cert
|
generate-aia-certs.sh | 50 -extensions ca_cert \ 71 -extensions ca_cert
|
generate-test-certs.sh | 39 -extensions ca_cert \
|
generate-client-certificates.sh | 62 -extensions ca_cert \ 82 -extensions ca_cert \ 101 -extensions ca_cert \
|
generate-policy-certs.sh | 53 -extensions ca_cert \
|
generate-duplicate-cn-certs.sh | 48 -extensions ca_cert \
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 73 * ca_cert - File path to CA certificate file (PEM/DER) 75 * This file can have one or more trusted CA certificates. If ca_cert 96 * ca_cert="cert_store://CA" or ca_cert="cert_store://ROOT". 101 u8 *ca_cert; member in struct:eap_peer_config 109 * these certificates are added to the list of trusted CAs. ca_cert 238 * This field is like ca_cert, but used for phase 2 (inside 252 * these certificates are added to the list of trusted CAs. ca_cert
|
eap_tls_common.c | 85 params->ca_cert = (char *) config->ca_cert; 107 params->ca_cert = (char *) config->ca_cert2; 156 if (eap_tls_check_blob(sm, ¶ms->ca_cert, ¶ms->ca_cert_blob, [all...] |
/external/chromium_org/net/cert/ |
x509_certificate_nss.cc | 87 case CA_CERT: { 238 CERTCertificate* ca_cert = intermediates[i]; local 239 HASH_Update(sha1_ctx, ca_cert->derCert.data, ca_cert->derCert.len);
|
x509_certificate_win.cc | 330 PCCERT_CONTEXT ca_cert = intermediates[i]; local 331 SHA1_Update(sha1_ctx, ca_cert->pbCertEncoded, ca_cert->cbCertEncoded);
|
/external/wpa_supplicant_8/src/ap/ |
authsrv.c | 144 (hapd->conf->ca_cert || hapd->conf->server_cert || 156 params.ca_cert = hapd->conf->ca_cert;
|
ap_config.h | 298 char *ca_cert; member in struct:hostapd_bss_config
|
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl.c | 514 "Failed to add ca_cert to OpenSSL " [all...] |
tls_gnutls.c | 531 if (params->ca_cert) { 534 conn->xcred, params->ca_cert, GNUTLS_X509_FMT_PEM); 537 "in PEM format: %s", params->ca_cert, 540 conn->xcred, params->ca_cert, 545 params->ca_cert, 642 if (params->ca_cert) { 644 global->xcred, params->ca_cert, GNUTLS_X509_FMT_PEM); 647 "in PEM format: %s", params->ca_cert, 650 global->xcred, params->ca_cert, 655 params->ca_cert, [all...] |
tls_internal.c | 193 if (tlsv1_set_ca_cert(cred, params->ca_cert, 257 if (tlsv1_set_ca_cert(cred, params->ca_cert, params->ca_cert_blob,
|
tls.h | 93 * @ca_cert: File or reference name for CA X.509 certificate in PEM or DER 95 * @ca_cert_blob: ca_cert as inlined data or %NULL if not used 139 const char *ca_cert; member in struct:tls_connection_params
|