/third_party/ffmpeg/libavformat/ |
H A D | tls.h | 30 char *ca_file; member 47 {"ca_file", "Certificate Authority database file", offsetof(pstruct, options_field . ca_file), AV_OPT_TYPE_STRING, .flags = TLS_OPTFL }, \ 48 {"cafile", "Certificate Authority database file", offsetof(pstruct, options_field . ca_file), AV_OPT_TYPE_STRING, .flags = TLS_OPTFL }, \
|
H A D | tls.c | 40 if (!c->ca_file && av_find_info_tag(buf, sizeof(buf), "cafile", p)) in set_options() 41 c->ca_file = av_strdup(buf); in set_options()
|
H A D | tls_libtls.c | 105 if (c->ca_file && tls_config_set_ca_file(cfg, c->ca_file) == -1) in ff_tls_open()
|
H A D | tls_securetransport.c | 139 if ((ret = import_pem(h, c->tls_shared.ca_file, &array)) < 0) in load_ca() 282 if (s->ca_file) { in tls_open() 286 if (s->ca_file || !s->verify) in tls_open()
|
H A D | tls_mbedtls.c | 188 if (shr->ca_file) { in tls_open() 189 if ((ret = mbedtls_x509_crt_parse_file(&tls_ctx->ca_cert, shr->ca_file)) != 0) { in tls_open()
|
H A D | tls_gnutls.c | 167 if (c->ca_file) { in tls_open() 168 ret = gnutls_certificate_set_x509_trust_file(p->cred, c->ca_file, GNUTLS_X509_FMT_PEM); in tls_open()
|
H A D | tls_openssl.c | 275 if (c->ca_file) { in tls_open() 276 if (!SSL_CTX_load_verify_locations(p->ctx, c->ca_file, NULL)) in tls_open()
|
/third_party/curl/lib/vtls/ |
H A D | schannel_verify.c | 224 const char *ca_file, in add_certs_file_to_store() 235 ca_file_tstr = curlx_convert_UTF8_to_tchar((char *)ca_file); in add_certs_file_to_store() 240 ca_file, in add_certs_file_to_store() 262 ca_file, in add_certs_file_to_store() 272 ca_file, in add_certs_file_to_store() 302 ca_file, in add_certs_file_to_store() 321 ca_file, in add_certs_file_to_store() 223 add_certs_file_to_store(HCERTSTORE trust_store, const char *ca_file, struct Curl_easy *data) add_certs_file_to_store() argument
|
/third_party/mbedtls/programs/x509/ |
H A D | cert_app.c | 54 " ca_file=%%s The single file containing the top-level CA(s) you fully trust\n" \ 59 " default: \"\" (none) (overrides ca_file)\n" 80 const char *ca_file; /* the file with the CA certificate(s) */ member 170 opt.ca_file = DFL_CA_FILE; in main() 201 } else if (strcmp(p, "ca_file") == 0) { in main() 202 opt.ca_file = q; in main() 240 } else if (strlen(opt.ca_file)) { in main() 241 if ((ret = mbedtls_x509_crt_parse_file(&cacert, opt.ca_file)) < 0) { in main()
|
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_mail_client.c | 96 " ca_file=%%s default: \"\" (pre-loaded)\n" \ 133 const char *ca_file; /* the file with the CA certificate(s) */ member 393 opt.ca_file = DFL_CA_FILE; in main() 432 } else if (strcmp(p, "ca_file") == 0) { in main() 433 opt.ca_file = q; in main() 475 if (strlen(opt.ca_file)) { in main() 476 ret = mbedtls_x509_crt_parse_file(&cacert, opt.ca_file); in main()
|
H A D | ssl_server2.c | 176 " ca_file=%%s The single file containing the top-level CA(s) you fully trust\n" \ 180 " default: \"\" (pre-loaded) (overrides ca_file)\n" \ 615 const char *ca_file; /* the file with the CA certificate(s) */ member 794 char *crt_file, *key_file, *ca_file, *auth_str; in sni_parse() local 813 GET_ITEM(ca_file); in sni_parse() 832 if (strcmp(ca_file, "-") != 0) { in sni_parse() 839 if (mbedtls_x509_crt_parse_file(new->ca, ca_file) != 0) { in sni_parse() 1693 opt.ca_file = DFL_CA_FILE; in main() 1884 } else if (strcmp(p, "ca_file") == 0) { in main() 1885 opt.ca_file in main() [all...] |
H A D | ssl_client2.c | 127 " ca_file=%%s The single file containing the top-level CA(s) you fully trust\n" \ 131 " default: \"\" (pre-loaded) (overrides ca_file)\n" \ 476 const char *ca_file; /* the file with the CA certificate(s) */ member 925 opt.ca_file = DFL_CA_FILE; in main() 1103 } else if (strcmp(p, "ca_file") == 0) { in main() 1104 opt.ca_file = q; in main() 1680 strcmp(opt.ca_file, "none") == 0) { in main() 1686 } else if (strlen(opt.ca_file)) { in main() 1687 ret = mbedtls_x509_crt_parse_file(&cacert, opt.ca_file); in main() 1952 strcmp(opt.ca_file, "non in main() [all...] |
/third_party/libcoap/examples/ |
H A D | coap-rd.c | 54 static char *ca_file = NULL; /* CA for cert_file - for cert checking in PEM */ variable 637 if (ca_file || root_ca_file) { in fill_keystore() 660 dtls_pki.pki_key.key.pem.ca_file = ca_file; in fill_keystore() 783 ca_file = optarg; in main()
|
H A D | coap-client.c | 108 static char *ca_file = NULL; /* CA for cert_file - for cert checking in PEM, variable 1342 if (ca_file || root_ca_file) { in setup_pki() 1375 (ca_file && strncasecmp(ca_file, "pkcs11:", 7) == 0)) { in setup_pki() 1380 dtls_pki.pki_key.key.pkcs11.ca = ca_file; in setup_pki() 1386 dtls_pki.pki_key.key.pem.ca_file = ca_file; in setup_pki() 1390 ca_mem = read_file_mem(ca_file, &ca_mem_len); in setup_pki() 1446 if (root_ca_file || ca_file || cert_file) { in open_session() 1629 ca_file in main() [all...] |
H A D | coap-server.c | 93 * For PKI, if one or more of cert_file, key_file and ca_file is in PKCS11 URI 94 * format, then the remainder of cert_file, key_file and ca_file are treated 102 static char *ca_file = NULL; /* CA for cert_file - for cert checking in PEM, variable 1883 dtls_key->key.pem.ca_file = ca_name; in update_pki_key() 1909 update_pki_key(&dtls_key, key_file, cert_file, ca_file); in verify_pki_sni_callback() 2026 if (ca_file || root_ca_file) { in setup_pki() 2059 update_pki_key(&dtls_pki.pki_key, key_file, cert_file, ca_file); in setup_pki() 2753 ca_file = optarg; in main()
|
/third_party/libcoap/src/ |
H A D | coap_openssl.c | 1158 if (setup_data->check_common_ca && setup_data->pki_key.key.pem.ca_file && in setup_pki_server() 1159 setup_data->pki_key.key.pem.ca_file[0]) { in setup_pki_server() 1165 cert_names = SSL_load_client_CA_file(setup_data->pki_key.key.pem.ca_file); in setup_pki_server() 1171 setup_data->pki_key.key.pem.ca_file); in setup_pki_server() 1179 memcpy(&rw_var, &setup_data->pki_key.key.pem.ca_file, sizeof(rw_var)); in setup_pki_server() 1518 if (setup_data->check_common_ca && setup_data->pki_key.key.pem.ca_file && in setup_pki_ssl() 1519 setup_data->pki_key.key.pem.ca_file[0]) { in setup_pki_ssl() 1527 STACK_OF(X509_NAME) *cert_names = SSL_load_client_CA_file(setup_data->pki_key.key.pem.ca_file); in setup_pki_ssl() 1534 setup_data->pki_key.key.pem.ca_file, in setup_pki_ssl() 1543 memcpy(&rw_var, &setup_data->pki_key.key.pem.ca_file, sizeo in setup_pki_ssl() 2742 coap_dtls_context_set_pki_root_cas(coap_context_t *ctx, const char *ca_file, const char *ca_dir ) coap_dtls_context_set_pki_root_cas() argument [all...] |
H A D | coap_notls.c | 86 const char *ca_file COAP_UNUSED, in coap_dtls_context_set_pki_root_cas()
|
H A D | coap_gnutls.c | 342 const char *ca_file, in coap_dtls_context_set_pki_root_cas() 352 if (ca_file == NULL && ca_path == NULL) { in coap_dtls_context_set_pki_root_cas() 353 coap_log_warn("coap_context_set_pki_root_cas: ca_file and/or ca_path " in coap_dtls_context_set_pki_root_cas() 361 if (ca_file) { in coap_dtls_context_set_pki_root_cas() 362 g_context->root_ca_file = gnutls_strdup(ca_file); in coap_dtls_context_set_pki_root_cas() 1069 if (setup_data->pki_key.key.pem.ca_file && in setup_pki_credentials() 1070 setup_data->pki_key.key.pem.ca_file[0]) { in setup_pki_credentials() 1072 setup_data->pki_key.key.pem.ca_file, in setup_pki_credentials() 341 coap_dtls_context_set_pki_root_cas(coap_context_t *c_context, const char *ca_file, const char *ca_path) coap_dtls_context_set_pki_root_cas() argument
|
H A D | coap_mbedtls.c | 555 if (setup_data->pki_key.key.pem.ca_file && in setup_pki_credentials() 556 setup_data->pki_key.key.pem.ca_file[0]) { in setup_pki_credentials() 559 setup_data->pki_key.key.pem.ca_file); in setup_pki_credentials() 1746 const char *ca_file, 1757 if (ca_file == NULL && ca_path == NULL) { 1758 coap_log_warn("coap_context_set_pki_root_cas: ca_file and/or ca_path " 1767 if (ca_file) { 1768 m_context->root_ca_file = mbedtls_strdup(ca_file); 1745 coap_dtls_context_set_pki_root_cas(coap_context_t *c_context, const char *ca_file, const char *ca_path) global() argument
|
H A D | coap_tinydtls.c | 1356 const char *ca_file COAP_UNUSED, in coap_dtls_context_set_pki_root_cas()
|
H A D | coap_net.c | 376 const char *ca_file, in coap_context_set_pki_root_cas() 379 return coap_dtls_context_set_pki_root_cas(ctx, ca_file, ca_dir); in coap_context_set_pki_root_cas() 375 coap_context_set_pki_root_cas(coap_context_t *ctx, const char *ca_file, const char *ca_dir) coap_context_set_pki_root_cas() argument
|
/third_party/libcoap/include/coap3/ |
H A D | coap_dtls_internal.h | 112 * @param ca_file If not @p NULL, is the full path name of a PEM encoded 121 const char *ca_file,
|
H A D | coap_dtls.h | 199 const char *ca_file; /**< File location of Common CA in PEM format */ member
|
H A D | coap_net.h | 202 * @param ca_file If not NULL, is the full path name of a PEM encoded 210 const char *ca_file,
|