/system/connectivity/shill/ |
eap_credentials.cc | 86 string ca_cert = ca_cert_; local 93 ca_cert = certfile.value(); 114 KeyVal(WPASupplicant::kNetworkPropertyEapCaCert, ca_cert.c_str()), 129 } else if (ca_cert.empty()) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 73 * ca_cert - File path to CA certificate file (PEM/DER) 75 * This file can have one or more trusted CA certificates. If ca_cert 96 * ca_cert="cert_store://CA" or ca_cert="cert_store://ROOT". 101 u8 *ca_cert; member in struct:eap_peer_config 109 * these certificates are added to the list of trusted CAs. ca_cert 257 * This field is like ca_cert, but used for phase 2 (inside 271 * these certificates are added to the list of trusted CAs. ca_cert
|
/external/wpa_supplicant_8/src/crypto/ |
tls.h | 103 * @ca_cert: File or reference name for CA X.509 certificate in PEM or DER 105 * @ca_cert_blob: ca_cert as inlined data or %NULL if not used 157 const char *ca_cert; member in struct:tls_connection_params
|
/system/connectivity/shill/vpn/ |
openvpn_driver.cc | 739 string ca_cert = local 747 if (!ca_cert.empty()) 763 DCHECK(ca_cert.empty()); 776 DCHECK(!ca_cert.empty() && ca_cert_pem.empty()); 777 AppendOption("ca", ca_cert, options); [all...] |
openvpn_driver_unittest.cc | 85 : ca_cert(ca_cert_in), 92 string ca_cert; member in struct:shill::AuthenticationExpectations 415 if (!GetParam().ca_cert.empty()) { 417 vector<string>{ GetParam().ca_cert }, 481 "ca_cert", "client_cert", "user", "otp", "token", [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
config.h | 114 * ca_cert - CA certificate for Interworking network selection 116 char *ca_cert; member in struct:wpa_cred [all...] |
/external/wpa_supplicant_8/src/ap/ |
ap_config.h | 345 char *ca_cert; member in struct:hostapd_bss_config
|