2008-07-27 20:03:46 +00:00
|
|
|
/* -*- Mode: C; tab-width: 4; indent-tabs-mode: t; c-basic-offset: 4 -*- */
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Dan Williams <dcbw@redhat.com>
|
|
|
|
|
* Tambet Ingo <tambet@gmail.com>
|
|
|
|
|
*
|
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
|
* version 2 of the License, or (at your option) any later version.
|
|
|
|
|
*
|
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
|
*
|
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
|
* License along with this library; if not, write to the
|
|
|
|
|
* Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
|
|
|
|
* Boston, MA 02110-1301 USA.
|
|
|
|
|
*
|
2009-09-04 09:07:00 -05:00
|
|
|
* (C) Copyright 2007 - 2009 Red Hat, Inc.
|
2008-07-27 20:03:46 +00:00
|
|
|
* (C) Copyright 2007 - 2008 Novell, Inc.
|
|
|
|
|
*/
|
2008-03-14 22:40:35 +00:00
|
|
|
|
|
|
|
|
#ifndef NM_SETTING_8021X_H
|
|
|
|
|
#define NM_SETTING_8021X_H
|
|
|
|
|
|
|
|
|
|
#include <nm-setting.h>
|
|
|
|
|
|
|
|
|
|
G_BEGIN_DECLS
|
|
|
|
|
|
2008-11-13 Dan Williams <dcbw@redhat.com>
Add support for PKCS#12 private keys (bgo #558982)
* libnm-util/crypto.c
libnm-util/crypto.h
- (parse_old_openssl_key_file): rename from parse_key_file(); adapt to
take a GByteArray instead of a filename
- (file_to_g_byte_array): handle private key files too
- (decrypt_key): take a GByteArray rather than data + len
- (crypto_get_private_key_data): refactor crypto_get_private_key() into
one function that takes a filename, and one that takes raw data;
detect pkcs#12 files as well
- (crypto_load_and_verify_certificate): detect file type
- (crypto_is_pkcs12_data, crypto_is_pkcs12_file): add pkcs#12 detection
functions
* libnm-util/crypto_gnutls.c
- (crypto_decrypt): take GByteArray rather than data + len; fix a bug
whereby tail padding was incorrectly handled, leading to erroneous
successes when trying to decrypt the data
- (crypto_verify_cert): rework somewhat
- (crypto_verify_pkcs12): validate pkcs#12 keys
* libnm-util/crypto_nss.c
- (crypto_init): enable various pkcs#12 ciphers
- (crypto_decrypt): take a GByteArray rather than data + len
- (crypto_verify_cert): clean up
- (crypto_verify_pkcs12): validate pkcs#12 keys
* libnm-util/test-crypto.c
- Handle pkcs#12 keys
* libnm-util/nm-setting-8021x.c
libnm-util/nm-setting-8021x.h
libnm-util/libnm-util.ver
- Add two new properties, 'private-key-password' and
'phase2-private-key-password', to be used in conjunction with
pkcs#12 keys
- (nm_setting_802_1x_set_ca_cert_from_file,
nm_setting_802_1x_set_client_cert_from_file,
nm_setting_802_1x_set_phase2_ca_cert_from_file,
nm_setting_802_1x_set_phase2_client_from_file): return certificate
type
- (nm_setting_802_1x_get_private_key_password,
nm_setting_802_1x_get_phase2_private_key_password): return private
key passwords
- (nm_setting_802_1x_set_private_key_from_file,
nm_setting_802_1x_set_phase2_private_key_from_file): set the private
key from a file, and update the private key password at the same time
- (nm_setting_802_1x_get_private_key_type,
nm_setting_802_1x_get_phase2_private_key_type): return the private
key type
* src/supplicant-manager/nm-supplicant-settings-verify.c
- Whitelist private key passwords
* src/supplicant-manager/nm-supplicant-config.c
- (nm_supplicant_config_add_setting_8021x): for pkcs#12 private keys,
add the private key password to the supplicant config, but do not
add the client certificate (as required by wpa_supplicant)
git-svn-id: http://svn-archive.gnome.org/svn/NetworkManager/trunk@4280 4912f4e0-d625-0410-9fb7-b9a5a253dbdc
2008-11-13 21:19:08 +00:00
|
|
|
typedef enum {
|
2009-09-04 09:07:00 -05:00
|
|
|
NM_SETTING_802_1X_CK_FORMAT_UNKNOWN = 0,
|
|
|
|
|
NM_SETTING_802_1X_CK_FORMAT_X509,
|
|
|
|
|
NM_SETTING_802_1X_CK_FORMAT_RAW_KEY,
|
|
|
|
|
NM_SETTING_802_1X_CK_FORMAT_PKCS12
|
|
|
|
|
} NMSetting8021xCKFormat;
|
|
|
|
|
|
|
|
|
|
typedef enum {
|
|
|
|
|
NM_SETTING_802_1X_CK_SCHEME_UNKNOWN = 0,
|
|
|
|
|
NM_SETTING_802_1X_CK_SCHEME_BLOB,
|
|
|
|
|
NM_SETTING_802_1X_CK_SCHEME_PATH
|
|
|
|
|
} NMSetting8021xCKScheme;
|
2008-11-13 Dan Williams <dcbw@redhat.com>
Add support for PKCS#12 private keys (bgo #558982)
* libnm-util/crypto.c
libnm-util/crypto.h
- (parse_old_openssl_key_file): rename from parse_key_file(); adapt to
take a GByteArray instead of a filename
- (file_to_g_byte_array): handle private key files too
- (decrypt_key): take a GByteArray rather than data + len
- (crypto_get_private_key_data): refactor crypto_get_private_key() into
one function that takes a filename, and one that takes raw data;
detect pkcs#12 files as well
- (crypto_load_and_verify_certificate): detect file type
- (crypto_is_pkcs12_data, crypto_is_pkcs12_file): add pkcs#12 detection
functions
* libnm-util/crypto_gnutls.c
- (crypto_decrypt): take GByteArray rather than data + len; fix a bug
whereby tail padding was incorrectly handled, leading to erroneous
successes when trying to decrypt the data
- (crypto_verify_cert): rework somewhat
- (crypto_verify_pkcs12): validate pkcs#12 keys
* libnm-util/crypto_nss.c
- (crypto_init): enable various pkcs#12 ciphers
- (crypto_decrypt): take a GByteArray rather than data + len
- (crypto_verify_cert): clean up
- (crypto_verify_pkcs12): validate pkcs#12 keys
* libnm-util/test-crypto.c
- Handle pkcs#12 keys
* libnm-util/nm-setting-8021x.c
libnm-util/nm-setting-8021x.h
libnm-util/libnm-util.ver
- Add two new properties, 'private-key-password' and
'phase2-private-key-password', to be used in conjunction with
pkcs#12 keys
- (nm_setting_802_1x_set_ca_cert_from_file,
nm_setting_802_1x_set_client_cert_from_file,
nm_setting_802_1x_set_phase2_ca_cert_from_file,
nm_setting_802_1x_set_phase2_client_from_file): return certificate
type
- (nm_setting_802_1x_get_private_key_password,
nm_setting_802_1x_get_phase2_private_key_password): return private
key passwords
- (nm_setting_802_1x_set_private_key_from_file,
nm_setting_802_1x_set_phase2_private_key_from_file): set the private
key from a file, and update the private key password at the same time
- (nm_setting_802_1x_get_private_key_type,
nm_setting_802_1x_get_phase2_private_key_type): return the private
key type
* src/supplicant-manager/nm-supplicant-settings-verify.c
- Whitelist private key passwords
* src/supplicant-manager/nm-supplicant-config.c
- (nm_supplicant_config_add_setting_8021x): for pkcs#12 private keys,
add the private key password to the supplicant config, but do not
add the client certificate (as required by wpa_supplicant)
git-svn-id: http://svn-archive.gnome.org/svn/NetworkManager/trunk@4280 4912f4e0-d625-0410-9fb7-b9a5a253dbdc
2008-11-13 21:19:08 +00:00
|
|
|
|
2008-03-14 22:40:35 +00:00
|
|
|
#define NM_TYPE_SETTING_802_1X (nm_setting_802_1x_get_type ())
|
|
|
|
|
#define NM_SETTING_802_1X(obj) (G_TYPE_CHECK_INSTANCE_CAST ((obj), NM_TYPE_SETTING_802_1X, NMSetting8021x))
|
|
|
|
|
#define NM_SETTING_802_1X_CLASS(klass) (G_TYPE_CHECK_CLASS_CAST ((klass), NM_TYPE_SETTING_802_1X, NMSetting8021xClass))
|
|
|
|
|
#define NM_IS_SETTING_802_1X(obj) (G_TYPE_CHECK_INSTANCE_TYPE ((obj), NM_TYPE_SETTING_802_1X))
|
|
|
|
|
#define NM_IS_SETTING_802_1X_CLASS(klass) (G_TYPE_CHECK_CLASS_TYPE ((obj), NM_TYPE_SETTING_802_1X))
|
|
|
|
|
#define NM_SETTING_802_1X_GET_CLASS(obj) (G_TYPE_INSTANCE_GET_CLASS ((obj), NM_TYPE_SETTING_802_1X, NMSetting8021xClass))
|
|
|
|
|
|
2008-03-17 19:37:23 +00:00
|
|
|
#define NM_SETTING_802_1X_SETTING_NAME "802-1x"
|
2008-03-14 22:40:35 +00:00
|
|
|
|
2008-06-12 23:58:08 +00:00
|
|
|
typedef enum
|
|
|
|
|
{
|
|
|
|
|
NM_SETTING_802_1X_ERROR_UNKNOWN = 0,
|
|
|
|
|
NM_SETTING_802_1X_ERROR_INVALID_PROPERTY,
|
|
|
|
|
NM_SETTING_802_1X_ERROR_MISSING_PROPERTY
|
|
|
|
|
} NMSetting8021xError;
|
|
|
|
|
|
|
|
|
|
#define NM_TYPE_SETTING_802_1X_ERROR (nm_setting_802_1x_error_get_type ())
|
|
|
|
|
GType nm_setting_802_1x_error_get_type (void);
|
|
|
|
|
|
|
|
|
|
#define NM_SETTING_802_1X_ERROR nm_setting_802_1x_error_quark ()
|
|
|
|
|
GQuark nm_setting_802_1x_error_quark (void);
|
|
|
|
|
|
|
|
|
|
|
2008-03-14 22:40:35 +00:00
|
|
|
#define NM_SETTING_802_1X_EAP "eap"
|
|
|
|
|
#define NM_SETTING_802_1X_IDENTITY "identity"
|
|
|
|
|
#define NM_SETTING_802_1X_ANONYMOUS_IDENTITY "anonymous-identity"
|
|
|
|
|
#define NM_SETTING_802_1X_CA_CERT "ca-cert"
|
|
|
|
|
#define NM_SETTING_802_1X_CA_PATH "ca-path"
|
|
|
|
|
#define NM_SETTING_802_1X_CLIENT_CERT "client-cert"
|
|
|
|
|
#define NM_SETTING_802_1X_PHASE1_PEAPVER "phase1-peapver"
|
|
|
|
|
#define NM_SETTING_802_1X_PHASE1_PEAPLABEL "phase1-peaplabel"
|
|
|
|
|
#define NM_SETTING_802_1X_PHASE1_FAST_PROVISIONING "phase1-fast-provisioning"
|
|
|
|
|
#define NM_SETTING_802_1X_PHASE2_AUTH "phase2-auth"
|
|
|
|
|
#define NM_SETTING_802_1X_PHASE2_AUTHEAP "phase2-autheap"
|
|
|
|
|
#define NM_SETTING_802_1X_PHASE2_CA_CERT "phase2-ca-cert"
|
|
|
|
|
#define NM_SETTING_802_1X_PHASE2_CA_PATH "phase2-ca-path"
|
|
|
|
|
#define NM_SETTING_802_1X_PHASE2_CLIENT_CERT "phase2-client-cert"
|
|
|
|
|
#define NM_SETTING_802_1X_PASSWORD "password"
|
|
|
|
|
#define NM_SETTING_802_1X_PRIVATE_KEY "private-key"
|
2008-11-13 Dan Williams <dcbw@redhat.com>
Add support for PKCS#12 private keys (bgo #558982)
* libnm-util/crypto.c
libnm-util/crypto.h
- (parse_old_openssl_key_file): rename from parse_key_file(); adapt to
take a GByteArray instead of a filename
- (file_to_g_byte_array): handle private key files too
- (decrypt_key): take a GByteArray rather than data + len
- (crypto_get_private_key_data): refactor crypto_get_private_key() into
one function that takes a filename, and one that takes raw data;
detect pkcs#12 files as well
- (crypto_load_and_verify_certificate): detect file type
- (crypto_is_pkcs12_data, crypto_is_pkcs12_file): add pkcs#12 detection
functions
* libnm-util/crypto_gnutls.c
- (crypto_decrypt): take GByteArray rather than data + len; fix a bug
whereby tail padding was incorrectly handled, leading to erroneous
successes when trying to decrypt the data
- (crypto_verify_cert): rework somewhat
- (crypto_verify_pkcs12): validate pkcs#12 keys
* libnm-util/crypto_nss.c
- (crypto_init): enable various pkcs#12 ciphers
- (crypto_decrypt): take a GByteArray rather than data + len
- (crypto_verify_cert): clean up
- (crypto_verify_pkcs12): validate pkcs#12 keys
* libnm-util/test-crypto.c
- Handle pkcs#12 keys
* libnm-util/nm-setting-8021x.c
libnm-util/nm-setting-8021x.h
libnm-util/libnm-util.ver
- Add two new properties, 'private-key-password' and
'phase2-private-key-password', to be used in conjunction with
pkcs#12 keys
- (nm_setting_802_1x_set_ca_cert_from_file,
nm_setting_802_1x_set_client_cert_from_file,
nm_setting_802_1x_set_phase2_ca_cert_from_file,
nm_setting_802_1x_set_phase2_client_from_file): return certificate
type
- (nm_setting_802_1x_get_private_key_password,
nm_setting_802_1x_get_phase2_private_key_password): return private
key passwords
- (nm_setting_802_1x_set_private_key_from_file,
nm_setting_802_1x_set_phase2_private_key_from_file): set the private
key from a file, and update the private key password at the same time
- (nm_setting_802_1x_get_private_key_type,
nm_setting_802_1x_get_phase2_private_key_type): return the private
key type
* src/supplicant-manager/nm-supplicant-settings-verify.c
- Whitelist private key passwords
* src/supplicant-manager/nm-supplicant-config.c
- (nm_supplicant_config_add_setting_8021x): for pkcs#12 private keys,
add the private key password to the supplicant config, but do not
add the client certificate (as required by wpa_supplicant)
git-svn-id: http://svn-archive.gnome.org/svn/NetworkManager/trunk@4280 4912f4e0-d625-0410-9fb7-b9a5a253dbdc
2008-11-13 21:19:08 +00:00
|
|
|
#define NM_SETTING_802_1X_PRIVATE_KEY_PASSWORD "private-key-password"
|
2008-03-14 22:40:35 +00:00
|
|
|
#define NM_SETTING_802_1X_PHASE2_PRIVATE_KEY "phase2-private-key"
|
2008-11-13 Dan Williams <dcbw@redhat.com>
Add support for PKCS#12 private keys (bgo #558982)
* libnm-util/crypto.c
libnm-util/crypto.h
- (parse_old_openssl_key_file): rename from parse_key_file(); adapt to
take a GByteArray instead of a filename
- (file_to_g_byte_array): handle private key files too
- (decrypt_key): take a GByteArray rather than data + len
- (crypto_get_private_key_data): refactor crypto_get_private_key() into
one function that takes a filename, and one that takes raw data;
detect pkcs#12 files as well
- (crypto_load_and_verify_certificate): detect file type
- (crypto_is_pkcs12_data, crypto_is_pkcs12_file): add pkcs#12 detection
functions
* libnm-util/crypto_gnutls.c
- (crypto_decrypt): take GByteArray rather than data + len; fix a bug
whereby tail padding was incorrectly handled, leading to erroneous
successes when trying to decrypt the data
- (crypto_verify_cert): rework somewhat
- (crypto_verify_pkcs12): validate pkcs#12 keys
* libnm-util/crypto_nss.c
- (crypto_init): enable various pkcs#12 ciphers
- (crypto_decrypt): take a GByteArray rather than data + len
- (crypto_verify_cert): clean up
- (crypto_verify_pkcs12): validate pkcs#12 keys
* libnm-util/test-crypto.c
- Handle pkcs#12 keys
* libnm-util/nm-setting-8021x.c
libnm-util/nm-setting-8021x.h
libnm-util/libnm-util.ver
- Add two new properties, 'private-key-password' and
'phase2-private-key-password', to be used in conjunction with
pkcs#12 keys
- (nm_setting_802_1x_set_ca_cert_from_file,
nm_setting_802_1x_set_client_cert_from_file,
nm_setting_802_1x_set_phase2_ca_cert_from_file,
nm_setting_802_1x_set_phase2_client_from_file): return certificate
type
- (nm_setting_802_1x_get_private_key_password,
nm_setting_802_1x_get_phase2_private_key_password): return private
key passwords
- (nm_setting_802_1x_set_private_key_from_file,
nm_setting_802_1x_set_phase2_private_key_from_file): set the private
key from a file, and update the private key password at the same time
- (nm_setting_802_1x_get_private_key_type,
nm_setting_802_1x_get_phase2_private_key_type): return the private
key type
* src/supplicant-manager/nm-supplicant-settings-verify.c
- Whitelist private key passwords
* src/supplicant-manager/nm-supplicant-config.c
- (nm_supplicant_config_add_setting_8021x): for pkcs#12 private keys,
add the private key password to the supplicant config, but do not
add the client certificate (as required by wpa_supplicant)
git-svn-id: http://svn-archive.gnome.org/svn/NetworkManager/trunk@4280 4912f4e0-d625-0410-9fb7-b9a5a253dbdc
2008-11-13 21:19:08 +00:00
|
|
|
#define NM_SETTING_802_1X_PHASE2_PRIVATE_KEY_PASSWORD "phase2-private-key-password"
|
2008-03-17 19:37:23 +00:00
|
|
|
#define NM_SETTING_802_1X_PIN "pin"
|
|
|
|
|
#define NM_SETTING_802_1X_PSK "psk"
|
2008-11-21 18:59:37 +00:00
|
|
|
#define NM_SETTING_802_1X_SYSTEM_CA_CERTS "system-ca-certs"
|
2008-03-14 22:40:35 +00:00
|
|
|
|
2009-09-04 09:07:00 -05:00
|
|
|
/* PRIVATE KEY NOTE: when setting PKCS#12 private keys directly via properties
|
|
|
|
|
* using the "blob" scheme, the data must be passed in PKCS#12 format. In this
|
|
|
|
|
* case, the private key password must also be passed to NetworkManager, and the
|
|
|
|
|
* appropriate "client-cert" (or "phase2-client-cert") property of the
|
|
|
|
|
* NMSetting8021x object must also contain the exact same PKCS#12 data that the
|
|
|
|
|
* private key will when NetworkManager requests secrets. This is because the
|
|
|
|
|
* PKCS#12 file contains both the private key and client certificate, so both
|
|
|
|
|
* properties need to be set to the same thing. When using the "path" scheme,
|
|
|
|
|
* just set both the private-key and client-cert properties to the same path,
|
|
|
|
|
* and set the private-key password correctly.
|
|
|
|
|
*
|
|
|
|
|
* When setting OpenSSL-derived "traditional" format (ie S/MIME style, not
|
|
|
|
|
* PKCS#8) RSA and DSA keys directly via properties with the "blob" scheme, they
|
|
|
|
|
* must passed to NetworkManager completely decrypted because the OpenSSL
|
|
|
|
|
* "traditional" format is non-standard and is not complete enough for all
|
|
|
|
|
* crypto libraries to use. Thus, for OpenSSL "traditional" format keys, the
|
|
|
|
|
* private key password is not passed to NetworkManager (because the data is
|
|
|
|
|
* already decrypted by the client), and the appropriate "client-cert" (or
|
|
|
|
|
* "phase2-client-cert") property of the NMSetting8021x object must be a valid
|
|
|
|
|
* client certificate. When using the "path" scheme, just set the private-key
|
|
|
|
|
* and client-cert properties to the paths to their respective objects, and
|
|
|
|
|
* set the private-key password correctly.
|
|
|
|
|
*/
|
|
|
|
|
|
2008-03-14 22:40:35 +00:00
|
|
|
typedef struct {
|
|
|
|
|
NMSetting parent;
|
|
|
|
|
} NMSetting8021x;
|
|
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
|
NMSettingClass parent;
|
|
|
|
|
} NMSetting8021xClass;
|
|
|
|
|
|
|
|
|
|
GType nm_setting_802_1x_get_type (void);
|
|
|
|
|
|
|
|
|
|
NMSetting *nm_setting_802_1x_new (void);
|
|
|
|
|
|
2008-10-30 18:12:46 +00:00
|
|
|
guint32 nm_setting_802_1x_get_num_eap_methods (NMSetting8021x *setting);
|
|
|
|
|
const char * nm_setting_802_1x_get_eap_method (NMSetting8021x *setting, guint32 i);
|
|
|
|
|
gboolean nm_setting_802_1x_add_eap_method (NMSetting8021x *setting, const char *eap);
|
|
|
|
|
void nm_setting_802_1x_remove_eap_method (NMSetting8021x *setting, guint32 i);
|
|
|
|
|
void nm_setting_802_1x_clear_eap_methods (NMSetting8021x *setting);
|
|
|
|
|
|
|
|
|
|
const char * nm_setting_802_1x_get_identity (NMSetting8021x *setting);
|
|
|
|
|
|
|
|
|
|
const char * nm_setting_802_1x_get_anonymous_identity (NMSetting8021x *setting);
|
|
|
|
|
|
2009-09-04 09:07:00 -05:00
|
|
|
gboolean nm_setting_802_1x_get_system_ca_certs (NMSetting8021x *setting);
|
2008-10-30 18:12:46 +00:00
|
|
|
const char * nm_setting_802_1x_get_ca_path (NMSetting8021x *setting);
|
2009-09-04 09:07:00 -05:00
|
|
|
const char * nm_setting_802_1x_get_phase2_ca_path (NMSetting8021x *setting);
|
2008-10-30 18:12:46 +00:00
|
|
|
|
2009-09-04 09:07:00 -05:00
|
|
|
NMSetting8021xCKScheme nm_setting_802_1x_get_ca_cert_scheme (NMSetting8021x *setting);
|
|
|
|
|
const GByteArray * nm_setting_802_1x_get_ca_cert_blob (NMSetting8021x *setting);
|
|
|
|
|
const char * nm_setting_802_1x_get_ca_cert_path (NMSetting8021x *setting);
|
|
|
|
|
gboolean nm_setting_802_1x_set_ca_cert (NMSetting8021x *setting,
|
2009-09-16 10:30:31 -07:00
|
|
|
const char *value,
|
2009-09-04 09:07:00 -05:00
|
|
|
NMSetting8021xCKScheme scheme,
|
|
|
|
|
NMSetting8021xCKFormat *out_format,
|
|
|
|
|
GError **error);
|
|
|
|
|
|
|
|
|
|
NMSetting8021xCKScheme nm_setting_802_1x_get_client_cert_scheme (NMSetting8021x *setting);
|
|
|
|
|
const GByteArray * nm_setting_802_1x_get_client_cert_blob (NMSetting8021x *setting);
|
|
|
|
|
const char * nm_setting_802_1x_get_client_cert_path (NMSetting8021x *setting);
|
|
|
|
|
gboolean nm_setting_802_1x_set_client_cert (NMSetting8021x *setting,
|
2009-09-16 10:30:31 -07:00
|
|
|
const char *value,
|
2009-09-04 09:07:00 -05:00
|
|
|
NMSetting8021xCKScheme scheme,
|
|
|
|
|
NMSetting8021xCKFormat *out_format,
|
|
|
|
|
GError **error);
|
2008-10-30 18:12:46 +00:00
|
|
|
|
|
|
|
|
const char * nm_setting_802_1x_get_phase1_peapver (NMSetting8021x *setting);
|
|
|
|
|
|
|
|
|
|
const char * nm_setting_802_1x_get_phase1_peaplabel (NMSetting8021x *setting);
|
|
|
|
|
|
|
|
|
|
const char * nm_setting_802_1x_get_phase1_fast_provisioning (NMSetting8021x *setting);
|
|
|
|
|
|
|
|
|
|
const char * nm_setting_802_1x_get_phase2_auth (NMSetting8021x *setting);
|
|
|
|
|
|
|
|
|
|
const char * nm_setting_802_1x_get_phase2_autheap (NMSetting8021x *setting);
|
|
|
|
|
|
2009-09-04 09:07:00 -05:00
|
|
|
NMSetting8021xCKScheme nm_setting_802_1x_get_phase2_ca_cert_scheme (NMSetting8021x *setting);
|
|
|
|
|
const GByteArray * nm_setting_802_1x_get_phase2_ca_cert_blob (NMSetting8021x *setting);
|
|
|
|
|
const char * nm_setting_802_1x_get_phase2_ca_cert_path (NMSetting8021x *setting);
|
|
|
|
|
gboolean nm_setting_802_1x_set_phase2_ca_cert (NMSetting8021x *setting,
|
2009-09-16 10:30:31 -07:00
|
|
|
const char *value,
|
2009-09-04 09:07:00 -05:00
|
|
|
NMSetting8021xCKScheme scheme,
|
|
|
|
|
NMSetting8021xCKFormat *out_format,
|
|
|
|
|
GError **error);
|
|
|
|
|
|
|
|
|
|
NMSetting8021xCKScheme nm_setting_802_1x_get_phase2_client_cert_scheme (NMSetting8021x *setting);
|
|
|
|
|
const GByteArray * nm_setting_802_1x_get_phase2_client_cert_blob (NMSetting8021x *setting);
|
|
|
|
|
const char * nm_setting_802_1x_get_phase2_client_cert_path (NMSetting8021x *setting);
|
|
|
|
|
gboolean nm_setting_802_1x_set_phase2_client_cert (NMSetting8021x *setting,
|
2009-09-16 10:30:31 -07:00
|
|
|
const char *value,
|
2009-09-04 09:07:00 -05:00
|
|
|
NMSetting8021xCKScheme scheme,
|
|
|
|
|
NMSetting8021xCKFormat *out_format,
|
|
|
|
|
GError **error);
|
2008-05-19 07:43:13 +00:00
|
|
|
|
2008-10-30 18:12:46 +00:00
|
|
|
const char * nm_setting_802_1x_get_password (NMSetting8021x *setting);
|
2008-05-19 07:43:13 +00:00
|
|
|
|
2008-10-30 18:12:46 +00:00
|
|
|
const char * nm_setting_802_1x_get_pin (NMSetting8021x *setting);
|
2008-05-19 07:43:13 +00:00
|
|
|
|
2008-10-30 18:12:46 +00:00
|
|
|
const char * nm_setting_802_1x_get_psk (NMSetting8021x *setting);
|
2008-05-19 07:43:13 +00:00
|
|
|
|
2009-09-04 09:07:00 -05:00
|
|
|
NMSetting8021xCKScheme nm_setting_802_1x_get_private_key_scheme (NMSetting8021x *setting);
|
|
|
|
|
const GByteArray * nm_setting_802_1x_get_private_key_blob (NMSetting8021x *setting);
|
|
|
|
|
const char * nm_setting_802_1x_get_private_key_path (NMSetting8021x *setting);
|
|
|
|
|
gboolean nm_setting_802_1x_set_private_key (NMSetting8021x *setting,
|
2009-09-16 10:30:31 -07:00
|
|
|
const char *value,
|
2009-09-04 09:07:00 -05:00
|
|
|
const char *password,
|
|
|
|
|
NMSetting8021xCKScheme scheme,
|
|
|
|
|
NMSetting8021xCKFormat *out_format,
|
|
|
|
|
GError **error);
|
|
|
|
|
const char * nm_setting_802_1x_get_private_key_password (NMSetting8021x *setting);
|
|
|
|
|
|
|
|
|
|
NMSetting8021xCKFormat nm_setting_802_1x_get_private_key_format (NMSetting8021x *setting);
|
|
|
|
|
|
|
|
|
|
NMSetting8021xCKScheme nm_setting_802_1x_get_phase2_private_key_scheme (NMSetting8021x *setting);
|
|
|
|
|
const GByteArray * nm_setting_802_1x_get_phase2_private_key_blob (NMSetting8021x *setting);
|
|
|
|
|
const char * nm_setting_802_1x_get_phase2_private_key_path (NMSetting8021x *setting);
|
|
|
|
|
gboolean nm_setting_802_1x_set_phase2_private_key (NMSetting8021x *setting,
|
2009-09-16 10:30:31 -07:00
|
|
|
const char *value,
|
2009-09-04 09:07:00 -05:00
|
|
|
const char *password,
|
|
|
|
|
NMSetting8021xCKScheme scheme,
|
|
|
|
|
NMSetting8021xCKFormat *out_format,
|
|
|
|
|
GError **error);
|
|
|
|
|
const char * nm_setting_802_1x_get_phase2_private_key_password (NMSetting8021x *setting);
|
|
|
|
|
|
|
|
|
|
NMSetting8021xCKFormat nm_setting_802_1x_get_phase2_private_key_format (NMSetting8021x *setting);
|
2008-05-19 07:43:13 +00:00
|
|
|
|
2009-09-25 16:00:19 -07:00
|
|
|
|
|
|
|
|
/***** DEPRECATED; anything below will be removed in version 0.9 *****/
|
|
|
|
|
|
|
|
|
|
typedef enum {
|
|
|
|
|
NM_SETTING_802_1X_CK_TYPE_UNKNOWN = 0,
|
|
|
|
|
NM_SETTING_802_1X_CK_TYPE_X509,
|
|
|
|
|
NM_SETTING_802_1X_CK_TYPE_RAW_KEY,
|
|
|
|
|
NM_SETTING_802_1X_CK_TYPE_PKCS12
|
|
|
|
|
} NMSetting8021xCKType;
|
|
|
|
|
|
|
|
|
|
const GByteArray *nm_setting_802_1x_get_ca_cert (NMSetting8021x *setting);
|
|
|
|
|
gboolean nm_setting_802_1x_set_ca_cert_from_file (NMSetting8021x *setting,
|
|
|
|
|
const char *filename,
|
|
|
|
|
NMSetting8021xCKType *out_ck_type,
|
|
|
|
|
GError **error);
|
|
|
|
|
|
|
|
|
|
const GByteArray *nm_setting_802_1x_get_client_cert (NMSetting8021x *setting);
|
|
|
|
|
gboolean nm_setting_802_1x_set_client_cert_from_file (NMSetting8021x *setting,
|
|
|
|
|
const char *filename,
|
|
|
|
|
NMSetting8021xCKType *out_ck_type,
|
|
|
|
|
GError **error);
|
|
|
|
|
|
|
|
|
|
const GByteArray *nm_setting_802_1x_get_phase2_ca_cert (NMSetting8021x *setting);
|
|
|
|
|
gboolean nm_setting_802_1x_set_phase2_ca_cert_from_file (NMSetting8021x *setting,
|
|
|
|
|
const char *filename,
|
|
|
|
|
NMSetting8021xCKType *out_ck_type,
|
|
|
|
|
GError **error);
|
|
|
|
|
|
|
|
|
|
const GByteArray *nm_setting_802_1x_get_phase2_client_cert (NMSetting8021x *setting);
|
|
|
|
|
gboolean nm_setting_802_1x_set_phase2_client_cert_from_file (NMSetting8021x *setting,
|
|
|
|
|
const char *filename,
|
|
|
|
|
NMSetting8021xCKType *out_ck_type,
|
|
|
|
|
GError **error);
|
|
|
|
|
|
|
|
|
|
const GByteArray *nm_setting_802_1x_get_private_key (NMSetting8021x *setting);
|
|
|
|
|
gboolean nm_setting_802_1x_set_private_key_from_file (NMSetting8021x *setting,
|
|
|
|
|
const char *filename,
|
|
|
|
|
const char *password,
|
|
|
|
|
NMSetting8021xCKType *out_ck_type,
|
|
|
|
|
GError **error);
|
|
|
|
|
|
|
|
|
|
NMSetting8021xCKType nm_setting_802_1x_get_private_key_type (NMSetting8021x *setting);
|
|
|
|
|
|
|
|
|
|
const GByteArray *nm_setting_802_1x_get_phase2_private_key (NMSetting8021x *setting);
|
|
|
|
|
gboolean nm_setting_802_1x_set_phase2_private_key_from_file (NMSetting8021x *setting,
|
|
|
|
|
const char *filename,
|
|
|
|
|
const char *password,
|
|
|
|
|
NMSetting8021xCKType *out_ck_type,
|
|
|
|
|
GError **error);
|
|
|
|
|
|
|
|
|
|
NMSetting8021xCKType nm_setting_802_1x_get_phase2_private_key_type (NMSetting8021x *setting);
|
|
|
|
|
|
2008-03-14 22:40:35 +00:00
|
|
|
G_END_DECLS
|
|
|
|
|
|
|
|
|
|
#endif /* NM_SETTING_8021X_H */
|