/third_party/python/Lib/test/ |
H A D | make_ssl_certs.py | 126 req_file, cert_file, key_file = tempnames 147 args += ['-x509', '-out', cert_file ] 155 '-out', cert_file, 163 with open(cert_file, 'r') as f:
|
/third_party/ltp/testcases/kernel/security/integrity/ima/tests/ |
H A D | ima_keys.sh | 105 local cert_file="$TST_DATAROOT/x509_ima.der" 121 evmctl import $cert_file $KEYRING_ID > /dev/null || \ 137 if cmp -s $temp_file $cert_file; then
|
/third_party/nghttp2/src/ |
H A D | shrpx_tls.h | 78 const char *cert_file; member 82 SSL_CTX *create_ssl_context(const char *private_key_file, const char *cert_file, 97 const StringRef &cacert, const StringRef &cert_file, 108 const StringRef &cacert, const StringRef &cert_file,
|
H A D | shrpx_connection_handler.cc | 266 tlsconf.cacert, memcachedconf.cert_file, in create_single_worker() 368 tlsconf.cacert, memcachedconf.cert_file, in create_worker_thread() 641 int ConnectionHandler::start_ocsp_update(const char *cert_file) { in start_ocsp_update() argument 645 LOG(INFO) << "Start ocsp update for " << cert_file; in start_ocsp_update() 654 const_cast<char *>(cert_file), nullptr}; in start_ocsp_update() 718 LOG(WARN) << "ocsp query command for " << tls_ctx_data->cert_file in handle_ocsp_complete() 727 LOG(INFO) << "ocsp update for " << tls_ctx_data->cert_file in handle_ocsp_complete() 822 auto cert_file = tls_ctx_data->cert_file; in proceed_next_cert_ocsp() local 824 if (start_ocsp_update(cert_file) ! in proceed_next_cert_ocsp() [all...] |
H A D | shrpx_tls.cc | 927 SSL_CTX *create_ssl_context(const char *private_key_file, const char *cert_file, in create_ssl_context() argument 1100 if (SSL_CTX_use_certificate_chain_file(ssl_ctx, cert_file) != 1) { in create_ssl_context() 1163 tls_ctx_data->cert_file = cert_file; in create_ssl_context() 1228 const char *cert_file, in create_quic_ssl_context() 1396 if (SSL_CTX_use_certificate_chain_file(ssl_ctx, cert_file) != 1) { in create_quic_ssl_context() 1450 tls_ctx_data->cert_file = cert_file; in create_quic_ssl_context() 1569 const StringRef &cacert, const StringRef &cert_file, in create_ssl_client_context() 1639 if (!cert_file in create_ssl_client_context() 1227 create_quic_ssl_context(const char *private_key_file, const char *cert_file, const std::vector<uint8_t> &sct_data , neverbleed_t *nb ) create_quic_ssl_context() argument 1565 create_ssl_client_context( neverbleed_t *nb, const StringRef &cacert, const StringRef &cert_file, const StringRef &private_key_file, int (*next_proto_select_cb)(SSL *s, unsigned char **out, unsigned char *outlen, const unsigned char *in, unsigned int inlen, void *arg)) create_ssl_client_context() argument [all...] |
H A D | shrpx_config.h | 625 TLSCertificate(StringRef private_key_file, StringRef cert_file, in TLSCertificate() 628 cert_file(std::move(cert_file)), in TLSCertificate() 632 StringRef cert_file; member 673 StringRef cert_file; member 702 StringRef cert_file; member 744 StringRef cert_file; member 770 StringRef cert_file; member
|
H A D | shrpx_tls_test.cc | 127 nghttp2_tls_ctx_data->cert_file = nghttp2_certfile; in test_shrpx_tls_cert_lookup_tree_add_ssl_ctx() 138 examples_tls_ctx_data->cert_file = examples_certfile; in test_shrpx_tls_cert_lookup_tree_add_ssl_ctx()
|
/third_party/ffmpeg/libavformat/ |
H A D | tls.h | 32 char *cert_file; member 50 {"cert_file", "Certificate file", offsetof(pstruct, options_field . cert_file), AV_OPT_TYPE_STRING, .flags = TLS_OPTFL }, \
|
H A D | tls_gnutls.c | 178 if (c->cert_file && c->key_file) { in tls_open() 180 c->cert_file, c->key_file, in tls_open() 185 c->cert_file, c->key_file, gnutls_strerror(ret)); in tls_open() 189 } else if (c->cert_file || c->key_file) in tls_open()
|
H A D | tls.c | 50 if (!c->cert_file && av_find_info_tag(buf, sizeof(buf), "cert", p)) in set_options() 51 c->cert_file = av_strdup(buf); in set_options()
|
H A D | tls_libtls.c | 107 if (c->cert_file && tls_config_set_cert_file(cfg, c->cert_file) == -1) in ff_tls_open()
|
H A D | tls_openssl.c | 279 if (c->cert_file && !SSL_CTX_use_certificate_chain_file(p->ctx, c->cert_file)) { in tls_open() 281 c->cert_file, ERR_error_string(ERR_get_error(), NULL)); in tls_open()
|
H A D | tls_mbedtls.c | 196 if (shr->cert_file) { in tls_open() 197 if ((ret = mbedtls_x509_crt_parse_file(&tls_ctx->own_cert, shr->cert_file)) != 0) { in tls_open()
|
H A D | tls_securetransport.c | 162 if ((ret = import_pem(h, c->tls_shared.cert_file, &certArray)) < 0) in load_cert() 288 if (s->cert_file) in tls_open()
|
/third_party/libcoap/examples/ |
H A D | coap-rd.c | 53 static char *cert_file = NULL; /* Combined certificate and private key in PEM */ variable 54 static char *ca_file = NULL; /* CA for cert_file - for cert checking in PEM */ 628 if (cert_file == NULL && key_defined == 0) { in fill_keystore() 633 if (cert_file) { in fill_keystore() 658 dtls_pki.pki_key.key.pem.public_cert = cert_file; in fill_keystore() 659 dtls_pki.pki_key.key.pem.private_key = cert_file; in fill_keystore() 715 coap_get_available_scheme_hint_bits(cert_file != NULL || key_defined != 0, in get_context() 780 cert_file = optarg; in main()
|
H A D | coap-client.c | 104 static char *cert_file = NULL; /* certificate and optional private key in PEM, variable 108 static char *ca_file = NULL; /* CA for cert_file - for cert checking in PEM, 1374 (cert_file && strncasecmp(cert_file, "pkcs11:", 7) == 0) || in setup_pki() 1377 dtls_pki.pki_key.key.pkcs11.public_cert = cert_file; in setup_pki() 1379 key_file : cert_file; in setup_pki() 1384 dtls_pki.pki_key.key.pem.public_cert = cert_file; in setup_pki() 1385 dtls_pki.pki_key.key.pem.private_key = key_file ? key_file : cert_file; in setup_pki() 1391 cert_mem = read_file_mem(cert_file, &cert_mem_len); in setup_pki() 1446 if (root_ca_file || ca_file || cert_file) { in open_session() [all...] |
H A D | coap-server.c | 93 * For PKI, if one or more of cert_file, key_file and ca_file is in PKCS11 URI 94 * format, then the remainder of cert_file, key_file and ca_file are treated 98 static char *cert_file = NULL; /* certificate and optional private key in PEM, variable 102 static char *ca_file = NULL; /* CA for cert_file - for cert checking in PEM, 1909 update_pki_key(&dtls_key, key_file, cert_file, ca_file); in verify_pki_sni_callback() 2059 update_pki_key(&dtls_pki.pki_key, key_file, cert_file, ca_file); in setup_pki() 2090 if (cert_file == NULL && key_defined == 0) { in fill_keystore() 2096 if (cert_file) { in fill_keystore() 2103 cert_file = NULL; in fill_keystore() 2326 coap_get_available_scheme_hint_bits(cert_file ! in get_context() [all...] |
/third_party/nghttp2/examples/ |
H A D | libevent-server.c | 143 static SSL_CTX *create_ssl_ctx(const char *key_file, const char *cert_file) { in create_ssl_ctx() argument 176 if (SSL_CTX_use_certificate_chain_file(ssl_ctx, cert_file) != 1) { in create_ssl_ctx() 177 errx(1, "Could not read certificate file %s", cert_file); in create_ssl_ctx() 792 const char *cert_file) { in run() 797 ssl_ctx = create_ssl_ctx(key_file, cert_file); in run() 791 run(const char *service, const char *key_file, const char *cert_file) run() argument
|
/third_party/curl/lib/vtls/ |
H A D | openssl.h | 48 SSL_CTX *ctx, char *cert_file,
|
H A D | openssl.c | 1270 char *cert_file, in cert_stuff() 1283 if(cert_file || cert_blob || (file_type == SSL_FILETYPE_ENGINE)) { in cert_stuff() 1302 SSL_CTX_use_certificate_chain_file(ctx, cert_file); in cert_stuff() 1308 (cert_blob ? "CURLOPT_SSLCERT_BLOB" : cert_file), in cert_stuff() 1323 SSL_CTX_use_certificate_file(ctx, cert_file, file_type); in cert_stuff() 1329 (cert_blob ? "CURLOPT_SSLCERT_BLOB" : cert_file), in cert_stuff() 1339 * cert_file is a PKCS#11 URI */ in cert_stuff() 1341 if(is_pkcs11_uri(cert_file)) { in cert_stuff() 1355 params.cert_id = cert_file; in cert_stuff() 1369 " '%s' [%s]", cert_file, in cert_stuff() 1268 cert_stuff(struct Curl_easy *data, SSL_CTX* ctx, char *cert_file, const struct curl_blob *cert_blob, const char *cert_type, char *key_file, const struct curl_blob *key_blob, const char *key_type, char *key_passwd) cert_stuff() argument 1656 Curl_ossl_set_client_cert(struct Curl_easy *data, SSL_CTX *ctx, char *cert_file, const struct curl_blob *cert_blob, const char *cert_type, char *key_file, const struct curl_blob *key_blob, const char *key_type, char *key_passwd) Curl_ossl_set_client_cert() argument [all...] |
/third_party/python/Lib/http/ |
H A D | client.py | 1407 # XXX Should key_file and cert_file be deprecated in favour of context? 1409 def __init__(self, host, port=None, key_file=None, cert_file=None, 1416 if (key_file is not None or cert_file is not None or 1419 warnings.warn("key_file, cert_file and check_hostname are " 1423 self.cert_file = cert_file 1438 if key_file or cert_file: 1439 context.load_cert_chain(cert_file, key_file)
|
/third_party/node/deps/openssl/openssl/apps/lib/ |
H A D | s_cb.c | 114 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file) in set_cert_stuff() argument 116 if (cert_file != NULL) { in set_cert_stuff() 117 if (SSL_CTX_use_certificate_file(ctx, cert_file, in set_cert_stuff() 120 cert_file); in set_cert_stuff() 125 key_file = cert_file; in set_cert_stuff()
|
/third_party/openssl/apps/lib/ |
H A D | s_cb.c | 114 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file) in set_cert_stuff() argument 116 if (cert_file != NULL) { in set_cert_stuff() 117 if (SSL_CTX_use_certificate_file(ctx, cert_file, in set_cert_stuff() 120 cert_file); in set_cert_stuff() 125 key_file = cert_file; in set_cert_stuff()
|
/third_party/node/deps/openssl/openssl/apps/include/ |
H A D | s_apps.h | 26 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
|
/third_party/openssl/apps/include/ |
H A D | s_apps.h | 26 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
|