/third_party/curl/tests/ |
H A D | secureserver.pl | 74 my $certfile; # certificate chain PEM file 136 elsif($ARGV[0] eq '--certfile') { 199 $certfile = "$srcdir/". ($stuncert?"certs/$stuncert":"stunnel.pem"); 200 $certfile = abs_path($certfile); 248 $certfile = pathhelp::sys_native_abs_path($certfile); 258 $cmd = "\"$stunnel\" -p $certfile -P $pidfile "; 265 print "pem cert file: $certfile\n"; 292 print $stunconf "cert = $certfile\ [all...] |
H A D | servers.pm | 1330 my ($verb, $proto, $proxy, $certfile) = @_; 1360 $certfile = 'stunnel.pem' unless($certfile); 1369 $flags .= "--certfile \"$certfile\" " if($certfile ne 'stunnel.pem'); 1403 $runcert{$server} = $certfile; 1551 my ($verb, $ipv6, $certfile, $proto, $clearport) = @_; 1576 $certfile = 'stunnel.pem' unless($certfile); [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | crl2pkcs7.c | 22 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile); 37 {"nocrl", OPT_NOCRL, '-', "No crl to load, just certs from '-certfile'"}, 38 {"certfile", OPT_CERTFILE, '<', 58 char *infile = NULL, *outfile = NULL, *prog, *certfile; in crl2pkcs7_main() local 152 certfile = sk_OPENSSL_STRING_value(certflst, i); in crl2pkcs7_main() 153 if (add_certs_from_file(cert_stack, certfile) < 0) { in crl2pkcs7_main() 195 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile) in STACK_OF() 203 in = BIO_new_file(certfile, "r"); in STACK_OF() 205 BIO_printf(bio_err, "error opening the file, %s\n", certfile); in STACK_OF() 212 BIO_printf(bio_err, "error reading the file, %s\n", certfile); in STACK_OF() [all...] |
H A D | smime.c | 99 {"certfile", OPT_CERTFILE, '<', "Other certificates file"}, 146 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local 327 certfile = opt_arg(); in smime_main() 463 if (certfile != NULL) { in smime_main() 464 if (!load_certs(certfile, 0, &other, NULL, "certificates")) { in smime_main()
|
H A D | s_time.c | 124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local 162 certfile = opt_arg(); in s_time_main() 259 if (!set_cert_stuff(ctx, certfile, keyfile)) in s_time_main()
|
/third_party/openssl/apps/ |
H A D | crl2pkcs7.c | 22 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile); 37 {"nocrl", OPT_NOCRL, '-', "No crl to load, just certs from '-certfile'"}, 38 {"certfile", OPT_CERTFILE, '<', 58 char *infile = NULL, *outfile = NULL, *prog, *certfile; in crl2pkcs7_main() local 152 certfile = sk_OPENSSL_STRING_value(certflst, i); in crl2pkcs7_main() 153 if (add_certs_from_file(cert_stack, certfile) < 0) { in crl2pkcs7_main() 195 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile) in STACK_OF() 203 in = BIO_new_file(certfile, "r"); in STACK_OF() 205 BIO_printf(bio_err, "error opening the file, %s\n", certfile); in STACK_OF() 212 BIO_printf(bio_err, "error reading the file, %s\n", certfile); in STACK_OF() [all...] |
H A D | smime.c | 99 {"certfile", OPT_CERTFILE, '<', "Other certificates file"}, 146 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local 327 certfile = opt_arg(); in smime_main() 462 if (certfile != NULL) { in smime_main() 463 if (!load_certs(certfile, 0, &other, NULL, "certificates")) { in smime_main()
|
H A D | s_time.c | 124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local 162 certfile = opt_arg(); in s_time_main() 259 if (!set_cert_stuff(ctx, certfile, keyfile)) in s_time_main()
|
/third_party/python/Lib/ |
H A D | poplib.py | 422 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None, 428 certfile - PEM formatted certificate chain file 434 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None, 439 if context is not None and certfile is not None: 440 raise ValueError("context and certfile arguments are mutually " 442 if keyfile is not None or certfile is not None: 444 warnings.warn("keyfile and certfile are deprecated, use a " 447 self.certfile = certfile 449 context = ssl._create_stdlib_context(certfile [all...] |
H A D | smtplib.py | 752 def starttls(self, keyfile=None, certfile=None, context=None): 759 session. If you provide the keyfile and certfile parameters, 780 if context is not None and certfile is not None: 781 raise ValueError("context and certfile arguments are mutually " 783 if keyfile is not None or certfile is not None: 785 warnings.warn("keyfile and certfile are deprecated, use a " 788 context = ssl._create_stdlib_context(certfile=certfile, 1020 as they do in the SMTP class. keyfile and certfile are also optional - 1023 SSLContext, and is an alternative to keyfile and certfile; I [all...] |
H A D | ftplib.py | 719 keyfile=None, certfile=None, context=None, 725 if context is not None and certfile is not None: 726 raise ValueError("context and certfile arguments are mutually " 728 if keyfile is not None or certfile is not None: 730 warnings.warn("keyfile and certfile are deprecated, use a " 733 self.certfile = certfile 736 certfile=certfile,
|
H A D | ssl.py | 785 certfile=None, keyfile=None, 817 if keyfile and not certfile: 818 raise ValueError("certfile must be specified") 819 if certfile or keyfile: 820 context.load_cert_chain(certfile, keyfile) 1451 def wrap_socket(sock, keyfile=None, certfile=None, 1462 if server_side and not certfile: 1463 raise ValueError("certfile must be specified for server-side " 1465 if keyfile and not certfile: 1466 raise ValueError("certfile mus [all...] |
H A D | imaplib.py | 1288 Instantiate with: IMAP4_SSL([host[, port[, keyfile[, certfile[, ssl_context[, timeout=None]]]]]]) 1293 certfile - PEM formatted certificate chain file (default: None); 1297 certfile should not be set otherwise ValueError is raised. 1306 certfile=None, ssl_context=None, timeout=None): 1310 if ssl_context is not None and certfile is not None: 1311 raise ValueError("ssl_context and certfile arguments are mutually " 1313 if keyfile is not None or certfile is not None: 1315 warnings.warn("keyfile and certfile are deprecated, use a " 1318 self.certfile = certfile [all...] |
/third_party/skia/third_party/externals/microhttpd/src/microspdy/ |
H A D | daemon.c | 171 const char *certfile, in SPDYF_start_daemon_va() 224 if (NULL == certfile in SPDYF_start_daemon_va() 225 || NULL == (daemon->certfile = strdup (certfile))) in SPDYF_start_daemon_va() 227 SPDYF_DEBUG("strdup (certfile)"); in SPDYF_start_daemon_va() 362 if(NULL != daemon->certfile) in SPDYF_start_daemon_va() 363 free(daemon->certfile); in SPDYF_start_daemon_va() 384 free(daemon->certfile); in SPDYF_stop_daemon() 170 SPDYF_start_daemon_va(uint16_t port, const char *certfile, const char *keyfile, SPDY_NewSessionCallback nscb, SPDY_SessionClosedCallback sccb, SPDY_NewRequestCallback nrcb, SPDY_NewDataCallback npdcb, SPDYF_NewStreamCallback fnscb, SPDYF_NewDataCallback fndcb, void * cls, void * fcls, va_list valist) SPDYF_start_daemon_va() argument
|
H A D | daemon.h | 41 * @param certfile path to the certificate that will be used by server 62 const char *certfile,
|
/third_party/fsverity-utils/programs/ |
H A D | cmd_sign.c | 67 if (sig_params.certfile != NULL) { in fsverity_cmd_sign() 71 sig_params.certfile = optarg; in fsverity_cmd_sign() 113 if (sig_params.certfile == NULL) in fsverity_cmd_sign() 114 sig_params.certfile = sig_params.keyfile; in fsverity_cmd_sign()
|
H A D | test_sign_digest.c | 23 .certfile = "testdata/cert.pem", in main()
|
/third_party/fsverity-utils/lib/ |
H A D | sign_digest.c | 82 static int read_certificate(const char *certfile, X509 **cert_ret) in read_certificate() argument 88 if (!certfile) { in read_certificate() 94 bio = BIO_new_file(certfile, "r"); in read_certificate() 96 error_msg_openssl("can't open '%s' for reading", certfile); in read_certificate() 103 certfile); in read_certificate() 432 err = read_certificate(sig_params->certfile, &cert); in libfsverity_sign_digest()
|
/third_party/python/Lib/test/ |
H A D | ssl_servers.py | 150 def make_https_server(case, *, context=None, certfile=CERTFILE, 154 # We assume the certfile contains both private key and certificate 155 context.load_cert_chain(certfile)
|
H A D | test_urllib2_localnet.py | 572 handler = self.start_https_server(certfile=CERT_localhost) 583 handler = self.start_https_server(certfile=CERT_fakehostname) 589 handler = self.start_https_server(certfile=CERT_localhost) 607 handler = self.start_https_server(context=context, certfile=CERT_localhost)
|
H A D | test_ssl.py | 285 ciphers=None, certfile=None, keyfile=None, 298 if certfile is not None or keyfile is not None: 299 context.load_cert_chain(certfile, keyfile) 649 "certfile must be specified", 652 "certfile must be specified for server-side operations", 655 "certfile must be specified for server-side operations", 656 ssl.wrap_socket, sock, server_side=True, certfile="") 657 with ssl.wrap_socket(sock, server_side=True, certfile=CERTFILE) as s: 662 ssl.wrap_socket(sock, certfile=NONEXISTINGCERT) 667 certfile [all...] |
/third_party/node/deps/openssl/openssl/apps/lib/ |
H A D | s_cb.c | 860 const char *certfile; member 1012 if (exc->certfile == NULL && exc->next == NULL) { in load_excert() 1018 if (exc->certfile == NULL) { in load_excert() 1022 exc->cert = load_cert(exc->certfile, exc->certform, in load_excert() 1030 exc->key = load_key(exc->certfile, exc->certform, in load_excert() 1066 if (exc->certfile != NULL && !ssl_excert_prepend(&exc)) { in args_excert() 1071 exc->certfile = opt_arg(); in args_excert()
|
/third_party/openssl/apps/lib/ |
H A D | s_cb.c | 860 const char *certfile; member 1012 if (exc->certfile == NULL && exc->next == NULL) { in load_excert() 1018 if (exc->certfile == NULL) { in load_excert() 1022 exc->cert = load_cert(exc->certfile, exc->certform, in load_excert() 1030 exc->key = load_key(exc->certfile, exc->certform, in load_excert() 1066 if (exc->certfile != NULL && !ssl_excert_prepend(&exc)) { in args_excert() 1071 exc->certfile = opt_arg(); in args_excert()
|
/third_party/openssl/test/helpers/ |
H A D | ssltestlib.h | 18 char *certfile, char *privkeyfile);
|
/third_party/fsverity-utils/include/ |
H A D | libfsverity.h | 87 * Zero this, then set @certfile. Then, to specify the private key by key file, 99 /** @certfile: the path to the certificate file in PEM format */ 100 const char *certfile; member
|