/third_party/ffmpeg/libavformat/ |
D | tls.h | 30 char *ca_file; member 47 …{"ca_file", "Certificate Authority database file", offsetof(pstruct, options_field . ca_file), … 48 …{"cafile", "Certificate Authority database file", offsetof(pstruct, options_field . ca_file), …
|
D | tls.c | 39 if (!c->ca_file && av_find_info_tag(buf, sizeof(buf), "cafile", p)) in set_options() 40 c->ca_file = av_strdup(buf); in set_options()
|
D | tls_mbedtls.c | 183 if (shr->ca_file) { in tls_open() 184 if ((ret = mbedtls_x509_crt_parse_file(&tls_ctx->ca_cert, shr->ca_file)) != 0) { in tls_open() 226 shr->ca_file ? MBEDTLS_SSL_VERIFY_REQUIRED : MBEDTLS_SSL_VERIFY_NONE); in tls_open()
|
D | tls_securetransport.c | 139 if ((ret = import_pem(h, c->tls_shared.ca_file, &array)) < 0) in load_ca() 282 if (s->ca_file) { in tls_open() 286 if (s->ca_file || !s->verify) in tls_open()
|
D | tls_libtls.c | 105 if (c->ca_file && tls_config_set_ca_file(cfg, c->ca_file) == -1) in ff_tls_open()
|
D | tls_gnutls.c | 155 if (c->ca_file) { in tls_open() 156 ret = gnutls_certificate_set_x509_trust_file(p->cred, c->ca_file, GNUTLS_X509_FMT_PEM); in tls_open()
|
D | tls_openssl.c | 259 if (c->ca_file) { in tls_open() 260 if (!SSL_CTX_load_verify_locations(p->ctx, c->ca_file, NULL)) in tls_open()
|
/third_party/mbedtls/programs/x509/ |
D | cert_app.c | 105 const char *ca_file; /* the file with the CA certificate(s) */ member 187 opt.ca_file = DFL_CA_FILE; in main() 220 opt.ca_file = q; in main() 261 else if( strlen( opt.ca_file ) ) in main() 263 if( ( ret = mbedtls_x509_crt_parse_file( &cacert, opt.ca_file ) ) < 0 ) in main()
|
/third_party/mbedtls/programs/ssl/ |
D | ssl_mail_client.c | 156 const char *ca_file; /* the file with the CA certificate(s) */ member 424 opt.ca_file = DFL_CA_FILE; in main() 467 opt.ca_file = q; in main() 511 if( strlen( opt.ca_file ) ) in main() 512 ret = mbedtls_x509_crt_parse_file( &cacert, opt.ca_file ); in main()
|
D | ssl_server2.c | 572 const char *ca_file; /* the file with the CA certificate(s) */ member 731 char *crt_file, *key_file, *ca_file, *auth_str; in sni_parse() local 751 GET_ITEM( ca_file ); in sni_parse() 768 if( strcmp( ca_file, "-" ) != 0 ) in sni_parse() 775 if( mbedtls_x509_crt_parse_file( new->ca, ca_file ) != 0 ) in sni_parse() 1498 opt.ca_file = DFL_CA_FILE; in main() 1625 opt.ca_file = q; in main() 2341 strcmp( opt.ca_file, "none" ) == 0 ) in main() 2349 else if( strlen( opt.ca_file ) ) in main() 2350 ret = mbedtls_x509_crt_parse_file( &cacert, opt.ca_file ); in main() [all …]
|
D | ssl_client2.c | 457 const char *ca_file; /* the file with the CA certificate(s) */ member 825 opt.ca_file = DFL_CA_FILE; in main() 950 opt.ca_file = q; in main() 1607 strcmp( opt.ca_file, "none" ) == 0 ) in main() 1615 else if( strlen( opt.ca_file ) ) in main() 1616 ret = mbedtls_x509_crt_parse_file( &cacert, opt.ca_file ); in main() 1878 strcmp( opt.ca_file, "none" ) != 0 ) in main()
|
/third_party/libcoap/examples/ |
D | coap-client.c | 91 static char *ca_file = NULL; /* CA for cert_file - for cert checking in PEM, variable 1216 if (ca_file || root_ca_file) { in setup_pki() 1250 (ca_file && strncasecmp (ca_file, "pkcs11:", 7) == 0)) { in setup_pki() 1255 dtls_pki.pki_key.key.pkcs11.ca = ca_file; in setup_pki() 1262 dtls_pki.pki_key.key.pem.ca_file = ca_file; in setup_pki() 1267 ca_mem = read_file_mem(ca_file, &ca_mem_len); in setup_pki() 1330 if (root_ca_file || ca_file || cert_file) { in open_session() 1446 ca_file = optarg; in main()
|
D | coap-rd.c | 54 static char *ca_file = NULL; /* CA for cert_file - for cert checking in PEM */ variable 647 if (ca_file || root_ca_file) { in fill_keystore() 670 dtls_pki.pki_key.key.pem.ca_file = ca_file; in fill_keystore() 799 ca_file = optarg; in main()
|
D | coap-server.c | 88 static char *ca_file = NULL; /* CA for cert_file - for cert checking in PEM, variable 1872 dtls_key->key.pem.ca_file = ca_name; in update_pki_key() 1900 update_pki_key(&dtls_key, key_file, cert_file, ca_file); in verify_pki_sni_callback() 2021 if (ca_file || root_ca_file) { in setup_pki() 2055 update_pki_key(&dtls_pki.pki_key, key_file, cert_file, ca_file); in setup_pki() 2609 ca_file = optarg; in main()
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_x509parse.function | 545 void x509_verify_restart( char *crt_file, char *ca_file, 570 TEST_ASSERT( mbedtls_x509_crt_parse_file( &ca, ca_file ) == 0 ); 601 void x509_verify( char *crt_file, char *ca_file, char *crl_file, 647 TEST_ASSERT( mbedtls_x509_crt_parse_file( &ca, ca_file ) == 0 ); 677 void x509_verify_ca_cb_failure( char *crt_file, char *ca_file, char *name, 689 TEST_ASSERT( mbedtls_x509_crt_parse_file( &ca, ca_file ) == 0 ); 707 void x509_verify_callback( char *crt_file, char *ca_file, char *name, 723 TEST_ASSERT( mbedtls_x509_crt_parse_file( &ca, ca_file ) == 0 ); 1039 void mbedtls_x509_crt_verify_max( char *ca_file, char *chain_dir, int nb_int, 1058 TEST_ASSERT( mbedtls_x509_crt_parse_file( &trusted, ca_file ) == 0 );
|
/third_party/libcoap/src/ |
D | coap_openssl.c | 1030 if (setup_data->check_common_ca && setup_data->pki_key.key.pem.ca_file && in setup_pki_server() 1031 setup_data->pki_key.key.pem.ca_file[0]) { in setup_pki_server() 1037 cert_names = SSL_load_client_CA_file(setup_data->pki_key.key.pem.ca_file); in setup_pki_server() 1044 setup_data->pki_key.key.pem.ca_file); in setup_pki_server() 1052 memcpy(&rw_var, &setup_data->pki_key.key.pem.ca_file, sizeof (rw_var)); in setup_pki_server() 1420 if (setup_data->check_common_ca && setup_data->pki_key.key.pem.ca_file && in setup_pki_ssl() 1421 setup_data->pki_key.key.pem.ca_file[0]) { in setup_pki_ssl() 1429 … STACK_OF(X509_NAME) *cert_names = SSL_load_client_CA_file(setup_data->pki_key.key.pem.ca_file); in setup_pki_ssl() 1437 setup_data->pki_key.key.pem.ca_file, in setup_pki_ssl() 1446 memcpy(&rw_var, &setup_data->pki_key.key.pem.ca_file, sizeof (rw_var)); in setup_pki_ssl() [all …]
|
D | coap_mbedtls.c | 508 if (setup_data->pki_key.key.pem.ca_file && in setup_pki_credentials() 509 setup_data->pki_key.key.pem.ca_file[0]) { in setup_pki_credentials() 512 setup_data->pki_key.key.pem.ca_file); in setup_pki_credentials() 1442 const char *ca_file, in coap_dtls_context_set_pki_root_cas() argument 1455 if (ca_file == NULL && ca_path == NULL) { in coap_dtls_context_set_pki_root_cas() 1466 if (ca_file) { in coap_dtls_context_set_pki_root_cas() 1467 m_context->root_ca_file = mbedtls_strdup(ca_file); in coap_dtls_context_set_pki_root_cas()
|
D | coap_notls.c | 45 const char *ca_file COAP_UNUSED, in coap_dtls_context_set_pki_root_cas()
|
D | coap_gnutls.c | 290 const char *ca_file, in coap_dtls_context_set_pki_root_cas() argument 302 if (ca_file == NULL && ca_path == NULL) { in coap_dtls_context_set_pki_root_cas() 312 if (ca_file) { in coap_dtls_context_set_pki_root_cas() 313 g_context->root_ca_file = gnutls_strdup(ca_file); in coap_dtls_context_set_pki_root_cas() 1063 if (setup_data->pki_key.key.pem.ca_file && in setup_pki_credentials() 1064 setup_data->pki_key.key.pem.ca_file[0]) { in setup_pki_credentials() 1066 setup_data->pki_key.key.pem.ca_file, in setup_pki_credentials()
|
/third_party/gstreamer/gstplugins_bad/sys/dvb/ |
D | dvbbasebin.c | 818 gchar *ca_file; in dvb_base_bin_init_cam() local 822 ca_file = g_strdup_printf ("/dev/dvb/adapter%d/ca0", adapter); in dvb_base_bin_init_cam() 823 if (g_file_test (ca_file, G_FILE_TEST_EXISTS)) { in dvb_base_bin_init_cam() 826 if (!cam_device_open (dvbbasebin->hwcam, ca_file)) { in dvb_base_bin_init_cam() 827 GST_ERROR_OBJECT (dvbbasebin, "could not open %s", ca_file); in dvb_base_bin_init_cam() 835 g_free (ca_file); in dvb_base_bin_init_cam()
|
/third_party/libcoap/include/coap3/ |
D | coap_dtls_internal.h | 110 const char *ca_file,
|
D | coap_dtls.h | 159 const char *ca_file; /**< File location of Common CA in PEM format */ member
|
D | net.h | 207 const char *ca_file,
|
/third_party/libcoap/man/ |
D | coap_endpoint_client.txt.in | 225 const char *ca_file 268 dtls_pki.pki_key.key.pem.ca_file = ca_file;
|
D | coap_endpoint_server.txt.in | 280 const char *ca_file, 324 dtls_pki.pki_key.key.pem.ca_file = ca_file;
|