OK, try the attached -- and, of course, completely untested -- patch. It should be a good starting point, although I don't expect it will work out of the box.
With this, a third line in ~/.gss_eap_id contains a path to the PKCS#12 private key. The existing password is repurposed as the passphrase to unlock the key. You could also call gss_set_cred_option(GSS_EAP_CRED_SET_CRED_PRIVATE_KEY) if you wanted to set it programatically.
-- Luke
|