/third_party/curl/tests/ |
D | secureserver.pl | 70 my $certfile; # certificate chain PEM file 187 $certfile = "$srcdir/". ($stuncert?"certs/$stuncert":"stunnel.pem"); 188 $certfile = abs_path($certfile); 236 $certfile = pathhelp::sys_native_abs_path($certfile); 246 $cmd = "$stunnel -p $certfile -P $pidfile "; 253 print "pem cert file: $certfile\n"; 280 print STUNCONF "cert = $certfile\n"; 310 print "cert = $certfile\n"; 331 chmod(0600, $certfile) if(-f $certfile);
|
D | runtests.pl | 1636 my ($verbose, $proto, $proxy, $certfile) = @_; 1672 $certfile = 'stunnel.pem' unless($certfile); 1680 $flags .= "--certfile \"$certfile\" " if($certfile ne 'stunnel.pem'); 1718 $runcert{$server} = $certfile; 1916 my ($verbose, $ipv6, $certfile) = @_; 1948 $certfile = 'stunnel.pem' unless($certfile); 1956 $flags .= "--certfile \"$certfile\" " if($certfile ne 'stunnel.pem'); 1980 $runcert{$server} = $certfile; 4739 my $certfile; 4741 $certfile = ($whatlist[1]) ? $whatlist[1] : 'stunnel.pem'; [all …]
|
/third_party/python/Tools/msi/ |
D | sdktools.psm1 | 16 …param([string]$certname, [string]$certsha1, [string]$certfile, [string]$description, [string[]]$fi… in Sign-File() 30 if (-not $certfile) { in Sign-File() variable 31 $certfile = $env:SigningCertificateFile; in Sign-File() variable 34 if (-not ($certsha1 -or $certname -or $certfile)) { in Sign-File() 43 } elseif ($certfile) { in Sign-File() variable 44 …SignTool sign /f $certfile /fd sha256 /tr http://timestamp.digicert.com/ /td sha256 /d $descriptio… in Sign-File() variable
|
D | sign_build.ps1 | 23 [string]$certfile variable 31 …Sign-File -certname $certname -certsha1 $certsha1 -certfile $certfile -description $description -f…
|
D | make_cat.ps1 | 26 [string]$certfile variable 39 …Sign-File -certname $certname -certsha1 $certsha1 -certfile $certfile -description $description -f…
|
D | make_appx.ps1 | 28 [string]$certfile variable 66 …Sign-File -certname $certname -certsha1 $certsha1 -certfile $certfile -description $description -f…
|
/third_party/openssl/apps/ |
D | crl2p7.c | 22 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile); 50 char *infile = NULL, *outfile = NULL, *prog, *certfile; in crl2pkcs7_main() local 138 certfile = sk_OPENSSL_STRING_value(certflst, i); in crl2pkcs7_main() 139 if (add_certs_from_file(cert_stack, certfile) < 0) { in crl2pkcs7_main() 181 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile) in add_certs_from_file() argument 189 in = BIO_new_file(certfile, "r"); in add_certs_from_file() 191 BIO_printf(bio_err, "error opening the file, %s\n", certfile); in add_certs_from_file() 198 BIO_printf(bio_err, "error reading the file, %s\n", certfile); in add_certs_from_file()
|
D | s_time.c | 99 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local 138 certfile = opt_arg(); in s_time_main() 206 if (!set_cert_stuff(ctx, certfile, keyfile)) in s_time_main()
|
D | smime.c | 125 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local 297 certfile = opt_arg(); in smime_main() 410 if (certfile != NULL) { in smime_main() 411 if (!load_certs(certfile, &other, FORMAT_PEM, NULL, in smime_main()
|
D | s_cb.c | 846 const char *certfile; member 996 if (exc->certfile == NULL && exc->next == NULL) { in load_excert() 1002 if (exc->certfile == NULL) { in load_excert() 1006 exc->cert = load_cert(exc->certfile, exc->certform, in load_excert() 1014 exc->key = load_key(exc->certfile, exc->certform, in load_excert() 1051 if (exc->certfile != NULL && !ssl_excert_prepend(&exc)) { in args_excert() 1056 exc->certfile = opt_arg(); in args_excert()
|
/third_party/python/Lib/ |
D | poplib.py | 434 def __init__(self, host, port=POP3_SSL_PORT, keyfile=None, certfile=None, argument 439 if context is not None and certfile is not None: 442 if keyfile is not None or certfile is not None: 447 self.certfile = certfile 449 context = ssl._create_stdlib_context(certfile=certfile, 460 def stls(self, keyfile=None, certfile=None, context=None): argument
|
D | smtplib.py | 752 def starttls(self, keyfile=None, certfile=None, context=None): argument 780 if context is not None and certfile is not None: 783 if keyfile is not None or certfile is not None: 788 context = ssl._create_stdlib_context(certfile=certfile, 1031 keyfile=None, certfile=None, argument 1037 if context is not None and certfile is not None: 1040 if keyfile is not None or certfile is not None: 1045 self.certfile = certfile 1047 context = ssl._create_stdlib_context(certfile=certfile,
|
D | ftplib.py | 719 keyfile=None, certfile=None, context=None, argument 725 if context is not None and certfile is not None: 728 if keyfile is not None or certfile is not None: 733 self.certfile = certfile 736 certfile=certfile,
|
D | ssl.py | 780 certfile=None, keyfile=None, argument 812 if keyfile and not certfile: 814 if certfile or keyfile: 815 context.load_cert_chain(certfile, keyfile) 1417 def wrap_socket(sock, keyfile=None, certfile=None, argument 1428 if server_side and not certfile: 1431 if keyfile and not certfile: 1437 if certfile: 1438 context.load_cert_chain(certfile, keyfile)
|
D | imaplib.py | 1306 certfile=None, ssl_context=None, timeout=None): argument 1310 if ssl_context is not None and certfile is not None: 1313 if keyfile is not None or certfile is not None: 1318 self.certfile = certfile 1320 ssl_context = ssl._create_stdlib_context(certfile=certfile,
|
/third_party/skia/third_party/externals/microhttpd/src/microspdy/ |
D | daemon.c | 171 const char *certfile, in SPDYF_start_daemon_va() argument 224 if (NULL == certfile in SPDYF_start_daemon_va() 225 || NULL == (daemon->certfile = strdup (certfile))) in SPDYF_start_daemon_va() 362 if(NULL != daemon->certfile) in SPDYF_start_daemon_va() 363 free(daemon->certfile); in SPDYF_start_daemon_va() 384 free(daemon->certfile); in SPDYF_stop_daemon()
|
D | daemon.h | 62 const char *certfile,
|
/third_party/openssl/doc/man1/ |
D | crl2pkcs7.pod | 16 [B<-certfile filename>] 55 =item B<-certfile filename> 73 openssl crl2pkcs7 -in crl.pem -certfile cert.pem -out p7.pem 78 openssl crl2pkcs7 -nocrl -certfile newcert.pem 79 -certfile demoCA/cacert.pem -outform DER -out p7.der
|
D | CA.pl.pod | 28 B<CA.pl> B<-verify> [B<-extra-verify> extra-params] B<certfile>... 30 B<CA.pl> B<-revoke> [B<-extra-ca> extra-params] B<certfile> [B<reason>] 109 =item B<-revoke certfile [reason]> 111 Revoke the certificate contained in the specified B<certfile>. An optional
|
/third_party/libcoap/man/ |
D | coap-server.txt.in | 26 [[*-c* certfile] [*-j* keyfile] [*-n*] [*-C* cafile] 143 *Note:* If any one of *certfile*, *keyfile* or *cafile* is in PKCS11 URI 146 *certfile*, *keyfile* or *cafile* are in PEM format. 148 *-c* certfile:: 152 Note: if *-k key* is defined, you need to define *-c certfile* as well to 157 certfile* if the parameter is different from certfile in *-c certfile*. 197 Note: *-c certfile* and *-C cafile* still needs to be defined for the
|
D | coap-client.txt.in | 27 [[*-c* certfile] [*-j* keyfile] [-n] [*-C* cafile] 187 *Note:* If any one of *certfile*, *keyfile* or *cafile* is in PKCS11 URI 190 *certfile*, *keyfile* or *cafile* are in PEM format. 192 *-c* certfile:: 199 certfile* if the parameter is different from certfile in *-c certfile*. 206 certfile. Ideally the client certificate should be signed by the same CA so
|
D | coap-rd.txt.in | 23 [[*-c* certfile] [*-n*] [*-C* cafile] [*-R* trusted_casfile]] 75 *-c* certfile:: 78 Note: if *-k key* is defined, you need to define *-c certfile* as well to
|
/third_party/openssl/test/ |
D | ssltestlib.h | 17 SSL_CTX **sctx, SSL_CTX **cctx, char *certfile,
|
/third_party/python/Lib/test/ |
D | ssl_servers.py | 150 def make_https_server(case, *, context=None, certfile=CERTFILE, argument 155 context.load_cert_chain(certfile)
|
/third_party/grpc/test/core/http/ |
D | test_server.py | 62 certfile=_PEM,
|