Home
last modified time | relevance | path

Searched refs:cert_file (Results 1 – 25 of 39) sorted by relevance

12

/third_party/openssl/test/recipes/
D25-test_verify.t486 my $cert_file = srctop_file('test', 'certs', 'root-cert.pem');
495 and copy($cert_file, $certplusrsa)
499 ok(run(app([ qw(openssl verify -trusted), $certplusrsa_file, $cert_file ])),
510 and copy($cert_file, $rsapluscert)
513 ok(run(app([ qw(openssl verify -trusted), $rsapluscert_file, $cert_file ])),
/third_party/python/Lib/test/
Dmake_ssl_certs.py126 req_file, cert_file, key_file = tempnames
147 args += ['-x509', '-out', cert_file ]
155 '-out', cert_file,
163 with open(cert_file, 'r') as f:
/third_party/nghttp2/src/
Dshrpx_tls.h78 const char *cert_file; member
82 SSL_CTX *create_ssl_context(const char *private_key_file, const char *cert_file,
97 const StringRef &cacert, const StringRef &cert_file,
108 const StringRef &cacert, const StringRef &cert_file,
Dshrpx_connection_handler.cc266 tlsconf.cacert, memcachedconf.cert_file, in create_single_worker()
368 tlsconf.cacert, memcachedconf.cert_file, in create_worker_thread()
641 int ConnectionHandler::start_ocsp_update(const char *cert_file) { in start_ocsp_update() argument
645 LOG(INFO) << "Start ocsp update for " << cert_file; in start_ocsp_update()
654 const_cast<char *>(cert_file), nullptr}; in start_ocsp_update()
718 LOG(WARN) << "ocsp query command for " << tls_ctx_data->cert_file in handle_ocsp_complete()
727 LOG(INFO) << "ocsp update for " << tls_ctx_data->cert_file in handle_ocsp_complete()
822 auto cert_file = tls_ctx_data->cert_file; in proceed_next_cert_ocsp() local
824 if (start_ocsp_update(cert_file) != 0) { in proceed_next_cert_ocsp()
939 tlsconf.cacert, memcachedconf.cert_file, memcachedconf.private_key_file, in create_tls_ticket_key_memcached_ssl_ctx()
Dshrpx_tls.cc926 SSL_CTX *create_ssl_context(const char *private_key_file, const char *cert_file, in create_ssl_context() argument
1099 if (SSL_CTX_use_certificate_chain_file(ssl_ctx, cert_file) != 1) { in create_ssl_context()
1162 tls_ctx_data->cert_file = cert_file; in create_ssl_context()
1227 const char *cert_file, in create_quic_ssl_context() argument
1395 if (SSL_CTX_use_certificate_chain_file(ssl_ctx, cert_file) != 1) { in create_quic_ssl_context()
1449 tls_ctx_data->cert_file = cert_file; in create_quic_ssl_context()
1568 const StringRef &cacert, const StringRef &cert_file, in create_ssl_client_context() argument
1638 if (!cert_file.empty()) { in create_ssl_client_context()
1639 if (SSL_CTX_use_certificate_chain_file(ssl_ctx, cert_file.c_str()) != 1) { in create_ssl_client_context()
1641 LOG(FATAL) << "Could not load client certificate from " << cert_file in create_ssl_client_context()
[all …]
Dshrpx_config.h625 TLSCertificate(StringRef private_key_file, StringRef cert_file, in TLSCertificate()
628 cert_file(std::move(cert_file)), in TLSCertificate()
632 StringRef cert_file; member
673 StringRef cert_file; member
702 StringRef cert_file; member
744 StringRef cert_file; member
770 StringRef cert_file; member
Dshrpx_tls_test.cc127 nghttp2_tls_ctx_data->cert_file = nghttp2_certfile; in test_shrpx_tls_cert_lookup_tree_add_ssl_ctx()
138 examples_tls_ctx_data->cert_file = examples_certfile; in test_shrpx_tls_cert_lookup_tree_add_ssl_ctx()
DHttpServer.h61 std::string cert_file; member
Dshrpx_connection_handler.h167 int start_ocsp_update(const char *cert_file);
/third_party/ltp/testcases/kernel/security/integrity/ima/tests/
Dima_keys.sh109 local cert_file="$TST_DATAROOT/x509_ima.der"
125 evmctl import $cert_file $KEYRING_ID > /dev/null || \
141 if cmp -s $temp_file $cert_file; then
/third_party/ffmpeg/libavformat/
Dtls_gnutls.c166 if (c->cert_file && c->key_file) { in tls_open()
168 c->cert_file, c->key_file, in tls_open()
173 c->cert_file, c->key_file, gnutls_strerror(ret)); in tls_open()
177 } else if (c->cert_file || c->key_file) in tls_open()
Dtls.h32 char *cert_file; member
50 …Certificate file", offsetof(pstruct, options_field . cert_file), AV_OPT_TYPE_ST…
Dtls.c49 if (!c->cert_file && av_find_info_tag(buf, sizeof(buf), "cert", p)) in set_options()
50 c->cert_file = av_strdup(buf); in set_options()
Dtls_openssl.c263 if (c->cert_file && !SSL_CTX_use_certificate_chain_file(p->ctx, c->cert_file)) { in tls_open()
265 c->cert_file, ERR_error_string(ERR_get_error(), NULL)); in tls_open()
Dtls_libtls.c107 if (c->cert_file && tls_config_set_cert_file(cfg, c->cert_file) == -1) in ff_tls_open()
Dtls_mbedtls.c191 if (shr->cert_file) { in tls_open()
192 if ((ret = mbedtls_x509_crt_parse_file(&tls_ctx->own_cert, shr->cert_file)) != 0) { in tls_open()
Dtls_securetransport.c162 if ((ret = import_pem(h, c->tls_shared.cert_file, &certArray)) < 0) in load_cert()
288 if (s->cert_file) in tls_open()
/third_party/libcoap/examples/
Dcoap-rd.c53 static char *cert_file = NULL; /* Combined certificate and private key in PEM */ variable
637 if (cert_file == NULL && key_defined == 0) { in fill_keystore()
643 if (cert_file) { in fill_keystore()
668 dtls_pki.pki_key.key.pem.public_cert = cert_file; in fill_keystore()
669 dtls_pki.pki_key.key.pem.private_key = cert_file; in fill_keystore()
744 if (coap_dtls_is_supported() && (key_defined || cert_file)) { in get_context()
755 if (coap_tls_is_supported() && (key_defined || cert_file)) { in get_context()
796 cert_file = optarg; in main()
Dcoap-client.c87 static char *cert_file = NULL; /* certificate and optional private key in PEM, variable
1249 (cert_file && strncasecmp (cert_file, "pkcs11:", 7) == 0) || in setup_pki()
1252 dtls_pki.pki_key.key.pkcs11.public_cert = cert_file; in setup_pki()
1254 key_file : cert_file; in setup_pki()
1260 dtls_pki.pki_key.key.pem.public_cert = cert_file; in setup_pki()
1261 dtls_pki.pki_key.key.pem.private_key = key_file ? key_file : cert_file; in setup_pki()
1268 cert_mem = read_file_mem(cert_file, &cert_mem_len); in setup_pki()
1330 if (root_ca_file || ca_file || cert_file) { in open_session()
1443 cert_file = optarg; in main()
1510 cert_file = optarg; in main()
Dcoap-server.c84 static char *cert_file = NULL; /* certificate and optional private key in PEM, variable
1900 update_pki_key(&dtls_key, key_file, cert_file, ca_file); in verify_pki_sni_callback()
2055 update_pki_key(&dtls_pki.pki_key, key_file, cert_file, ca_file); in setup_pki()
2086 if (cert_file == NULL && key_defined == 0) { in fill_keystore()
2093 if (cert_file) { in fill_keystore()
2100 cert_file = NULL; in fill_keystore()
2313 if (coap_dtls_is_supported() && (key_defined || cert_file)) { in get_context()
2326 if (coap_tls_is_supported() && (key_defined || cert_file)) { in get_context()
2606 cert_file = optarg; in main()
2666 cert_file = optarg; in main()
/third_party/nghttp2/examples/
Dlibevent-server.c143 static SSL_CTX *create_ssl_ctx(const char *key_file, const char *cert_file) { in create_ssl_ctx() argument
176 if (SSL_CTX_use_certificate_chain_file(ssl_ctx, cert_file) != 1) { in create_ssl_ctx()
177 errx(1, "Could not read certificate file %s", cert_file); in create_ssl_ctx()
792 const char *cert_file) { in run() argument
797 ssl_ctx = create_ssl_ctx(key_file, cert_file); in run()
/third_party/python/Lib/http/
Dclient.py1405 def __init__(self, host, port=None, key_file=None, cert_file=None, argument
1412 if (key_file is not None or cert_file is not None or
1419 self.cert_file = cert_file
1434 if key_file or cert_file:
1435 context.load_cert_chain(cert_file, key_file)
/third_party/openssl/apps/lib/
Ds_cb.c114 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file) in set_cert_stuff() argument
116 if (cert_file != NULL) { in set_cert_stuff()
117 if (SSL_CTX_use_certificate_file(ctx, cert_file, in set_cert_stuff()
120 cert_file); in set_cert_stuff()
125 key_file = cert_file; in set_cert_stuff()
/third_party/openssl/apps/include/
Ds_apps.h26 int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
/third_party/openssl/test/
Dcmp_ctx_test.c794 char *cert_file; in DEFINE_SET_CB_TEST() local
801 if (!TEST_ptr(cert_file = test_get_argument(0)) in DEFINE_SET_CB_TEST()
802 || !TEST_ptr(test_cert = load_cert_pem(cert_file, NULL))) in DEFINE_SET_CB_TEST()

12