Home
last modified time | relevance | path

Searched refs:certfile (Results 1 - 25 of 47) sorted by relevance

12

/third_party/curl/tests/
H A Dsecureserver.pl74 my $certfile; # certificate chain PEM file
136 elsif($ARGV[0] eq '--certfile') {
199 $certfile = "$srcdir/". ($stuncert?"certs/$stuncert":"stunnel.pem");
200 $certfile = abs_path($certfile);
248 $certfile = pathhelp::sys_native_abs_path($certfile);
258 $cmd = "\"$stunnel\" -p $certfile -P $pidfile ";
265 print "pem cert file: $certfile\n";
292 print $stunconf "cert = $certfile\
[all...]
H A Dservers.pm1330 my ($verb, $proto, $proxy, $certfile) = @_;
1360 $certfile = 'stunnel.pem' unless($certfile);
1369 $flags .= "--certfile \"$certfile\" " if($certfile ne 'stunnel.pem');
1403 $runcert{$server} = $certfile;
1551 my ($verb, $ipv6, $certfile, $proto, $clearport) = @_;
1576 $certfile = 'stunnel.pem' unless($certfile);
[all...]
/third_party/node/deps/openssl/openssl/apps/
H A Dcrl2pkcs7.c22 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile);
37 {"nocrl", OPT_NOCRL, '-', "No crl to load, just certs from '-certfile'"},
38 {"certfile", OPT_CERTFILE, '<',
58 char *infile = NULL, *outfile = NULL, *prog, *certfile; in crl2pkcs7_main() local
152 certfile = sk_OPENSSL_STRING_value(certflst, i); in crl2pkcs7_main()
153 if (add_certs_from_file(cert_stack, certfile) < 0) { in crl2pkcs7_main()
195 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile) in STACK_OF()
203 in = BIO_new_file(certfile, "r"); in STACK_OF()
205 BIO_printf(bio_err, "error opening the file, %s\n", certfile); in STACK_OF()
212 BIO_printf(bio_err, "error reading the file, %s\n", certfile); in STACK_OF()
[all...]
H A Dsmime.c99 {"certfile", OPT_CERTFILE, '<', "Other certificates file"},
146 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local
327 certfile = opt_arg(); in smime_main()
463 if (certfile != NULL) { in smime_main()
464 if (!load_certs(certfile, 0, &other, NULL, "certificates")) { in smime_main()
H A Ds_time.c124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local
162 certfile = opt_arg(); in s_time_main()
259 if (!set_cert_stuff(ctx, certfile, keyfile)) in s_time_main()
/third_party/openssl/apps/
H A Dcrl2pkcs7.c22 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile);
37 {"nocrl", OPT_NOCRL, '-', "No crl to load, just certs from '-certfile'"},
38 {"certfile", OPT_CERTFILE, '<',
58 char *infile = NULL, *outfile = NULL, *prog, *certfile; in crl2pkcs7_main() local
152 certfile = sk_OPENSSL_STRING_value(certflst, i); in crl2pkcs7_main()
153 if (add_certs_from_file(cert_stack, certfile) < 0) { in crl2pkcs7_main()
195 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile) in STACK_OF()
203 in = BIO_new_file(certfile, "r"); in STACK_OF()
205 BIO_printf(bio_err, "error opening the file, %s\n", certfile); in STACK_OF()
212 BIO_printf(bio_err, "error reading the file, %s\n", certfile); in STACK_OF()
[all...]
H A Dsmime.c99 {"certfile", OPT_CERTFILE, '<', "Other certificates file"},
146 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local
327 certfile = opt_arg(); in smime_main()
462 if (certfile != NULL) { in smime_main()
463 if (!load_certs(certfile, 0, &other, NULL, "certificates")) { in smime_main()
H A Ds_time.c124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local
162 certfile = opt_arg(); in s_time_main()
259 if (!set_cert_stuff(ctx, certfile, keyfile)) in s_time_main()
/third_party/python/Lib/
H A Dpoplib.py422 Instantiate with: POP3_SSL(hostname, port=995, keyfile=None, certfile=None,
428 certfile - PEM formatted certificate chain file
434 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None,
439 if context is not None and certfile is not None:
440 raise ValueError("context and certfile arguments are mutually "
442 if keyfile is not None or certfile is not None:
444 warnings.warn("keyfile and certfile are deprecated, use a "
447 self.certfile = certfile
449 context = ssl._create_stdlib_context(certfile
[all...]
H A Dsmtplib.py752 def starttls(self, keyfile=None, certfile=None, context=None):
759 session. If you provide the keyfile and certfile parameters,
780 if context is not None and certfile is not None:
781 raise ValueError("context and certfile arguments are mutually "
783 if keyfile is not None or certfile is not None:
785 warnings.warn("keyfile and certfile are deprecated, use a "
788 context = ssl._create_stdlib_context(certfile=certfile,
1020 as they do in the SMTP class. keyfile and certfile are also optional -
1023 SSLContext, and is an alternative to keyfile and certfile; I
[all...]
H A Dftplib.py719 keyfile=None, certfile=None, context=None,
725 if context is not None and certfile is not None:
726 raise ValueError("context and certfile arguments are mutually "
728 if keyfile is not None or certfile is not None:
730 warnings.warn("keyfile and certfile are deprecated, use a "
733 self.certfile = certfile
736 certfile=certfile,
H A Dssl.py785 certfile=None, keyfile=None,
817 if keyfile and not certfile:
818 raise ValueError("certfile must be specified")
819 if certfile or keyfile:
820 context.load_cert_chain(certfile, keyfile)
1451 def wrap_socket(sock, keyfile=None, certfile=None,
1462 if server_side and not certfile:
1463 raise ValueError("certfile must be specified for server-side "
1465 if keyfile and not certfile:
1466 raise ValueError("certfile mus
[all...]
H A Dimaplib.py1288 Instantiate with: IMAP4_SSL([host[, port[, keyfile[, certfile[, ssl_context[, timeout=None]]]]]])
1293 certfile - PEM formatted certificate chain file (default: None);
1297 certfile should not be set otherwise ValueError is raised.
1306 certfile=None, ssl_context=None, timeout=None):
1310 if ssl_context is not None and certfile is not None:
1311 raise ValueError("ssl_context and certfile arguments are mutually "
1313 if keyfile is not None or certfile is not None:
1315 warnings.warn("keyfile and certfile are deprecated, use a "
1318 self.certfile = certfile
[all...]
/third_party/skia/third_party/externals/microhttpd/src/microspdy/
H A Ddaemon.c171 const char *certfile, in SPDYF_start_daemon_va()
224 if (NULL == certfile in SPDYF_start_daemon_va()
225 || NULL == (daemon->certfile = strdup (certfile))) in SPDYF_start_daemon_va()
227 SPDYF_DEBUG("strdup (certfile)"); in SPDYF_start_daemon_va()
362 if(NULL != daemon->certfile) in SPDYF_start_daemon_va()
363 free(daemon->certfile); in SPDYF_start_daemon_va()
384 free(daemon->certfile); in SPDYF_stop_daemon()
170 SPDYF_start_daemon_va(uint16_t port, const char *certfile, const char *keyfile, SPDY_NewSessionCallback nscb, SPDY_SessionClosedCallback sccb, SPDY_NewRequestCallback nrcb, SPDY_NewDataCallback npdcb, SPDYF_NewStreamCallback fnscb, SPDYF_NewDataCallback fndcb, void * cls, void * fcls, va_list valist) SPDYF_start_daemon_va() argument
H A Ddaemon.h41 * @param certfile path to the certificate that will be used by server
62 const char *certfile,
/third_party/fsverity-utils/programs/
H A Dcmd_sign.c67 if (sig_params.certfile != NULL) { in fsverity_cmd_sign()
71 sig_params.certfile = optarg; in fsverity_cmd_sign()
113 if (sig_params.certfile == NULL) in fsverity_cmd_sign()
114 sig_params.certfile = sig_params.keyfile; in fsverity_cmd_sign()
H A Dtest_sign_digest.c23 .certfile = "testdata/cert.pem", in main()
/third_party/fsverity-utils/lib/
H A Dsign_digest.c82 static int read_certificate(const char *certfile, X509 **cert_ret) in read_certificate() argument
88 if (!certfile) { in read_certificate()
94 bio = BIO_new_file(certfile, "r"); in read_certificate()
96 error_msg_openssl("can't open '%s' for reading", certfile); in read_certificate()
103 certfile); in read_certificate()
432 err = read_certificate(sig_params->certfile, &cert); in libfsverity_sign_digest()
/third_party/python/Lib/test/
H A Dssl_servers.py150 def make_https_server(case, *, context=None, certfile=CERTFILE,
154 # We assume the certfile contains both private key and certificate
155 context.load_cert_chain(certfile)
H A Dtest_urllib2_localnet.py572 handler = self.start_https_server(certfile=CERT_localhost)
583 handler = self.start_https_server(certfile=CERT_fakehostname)
589 handler = self.start_https_server(certfile=CERT_localhost)
607 handler = self.start_https_server(context=context, certfile=CERT_localhost)
H A Dtest_ssl.py285 ciphers=None, certfile=None, keyfile=None,
298 if certfile is not None or keyfile is not None:
299 context.load_cert_chain(certfile, keyfile)
649 "certfile must be specified",
652 "certfile must be specified for server-side operations",
655 "certfile must be specified for server-side operations",
656 ssl.wrap_socket, sock, server_side=True, certfile="")
657 with ssl.wrap_socket(sock, server_side=True, certfile=CERTFILE) as s:
662 ssl.wrap_socket(sock, certfile=NONEXISTINGCERT)
667 certfile
[all...]
/third_party/node/deps/openssl/openssl/apps/lib/
H A Ds_cb.c860 const char *certfile; member
1012 if (exc->certfile == NULL && exc->next == NULL) { in load_excert()
1018 if (exc->certfile == NULL) { in load_excert()
1022 exc->cert = load_cert(exc->certfile, exc->certform, in load_excert()
1030 exc->key = load_key(exc->certfile, exc->certform, in load_excert()
1066 if (exc->certfile != NULL && !ssl_excert_prepend(&exc)) { in args_excert()
1071 exc->certfile = opt_arg(); in args_excert()
/third_party/openssl/apps/lib/
H A Ds_cb.c860 const char *certfile; member
1012 if (exc->certfile == NULL && exc->next == NULL) { in load_excert()
1018 if (exc->certfile == NULL) { in load_excert()
1022 exc->cert = load_cert(exc->certfile, exc->certform, in load_excert()
1030 exc->key = load_key(exc->certfile, exc->certform, in load_excert()
1066 if (exc->certfile != NULL && !ssl_excert_prepend(&exc)) { in args_excert()
1071 exc->certfile = opt_arg(); in args_excert()
/third_party/openssl/test/helpers/
H A Dssltestlib.h18 char *certfile, char *privkeyfile);
/third_party/fsverity-utils/include/
H A Dlibfsverity.h87 * Zero this, then set @certfile. Then, to specify the private key by key file,
99 /** @certfile: the path to the certificate file in PEM format */
100 const char *certfile; member

Completed in 24 milliseconds

12