Home
last modified time | relevance | path

Searched refs:cacert (Results 1 – 25 of 97) sorted by relevance

1234

/third_party/curl/docs/cmdline-opts/
Dproxy-cacert.md4 Long: proxy-cacert
12 - cacert
16 - --proxy-cacert CA-file.txt -x https://proxy $URL
19 # `--proxy-cacert`
21 Same as --cacert but used in HTTPS proxy context.
Dcapath.md12 - cacert
26 --cacert if the --cacert file contains many CA certificates.
Dcacert.md4 Long: cacert
15 - --cacert CA-file.txt $URL
18 # `--cacert`
/third_party/curl/tests/certs/scripts/
Dgenroot.sh74 …DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.csr -out $PREFIX-$SERIAL-ca.cacert $DIGESTALGO
77 $OPENSSL x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert
80 $OPENSSL x509 -in $PREFIX-ca.cacert -outform der -out $PREFIX-ca.der
84 $OPENSSL x509 -in $PREFIX-ca.cacert -text -nameopt multiline > $PREFIX-ca.crt
87 $OPENSSL x509 -noout -text -in $PREFIX-ca.cacert -nameopt multiline
Dgenserv.sh64 if [ ! -f $CAPREFIX-ca.cacert ] ; then
109 $OPENSSL x509 -set_serial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert
/third_party/openssl/demos/cms/
Dcms_ver.c19 X509 *cacert = NULL; in main() local
39 cacert = PEM_read_bio_X509(tbio, NULL, 0, NULL); in main()
41 if (cacert == NULL) in main()
44 if (!X509_STORE_add_cert(st, cacert)) in main()
83 X509_free(cacert); in main()
/third_party/openssl/demos/smime/
Dsmver.c19 X509 *cacert = NULL; in main() local
39 cacert = PEM_read_bio_X509(tbio, NULL, 0, NULL); in main()
41 if (cacert == NULL) in main()
44 if (!X509_STORE_add_cert(st, cacert)) in main()
82 X509_free(cacert); in main()
/third_party/curl/tests/certs/
DMakefile.am39 EdelCurlRoot-ca.cacert \
110 build-certs: $(srcdir)/EdelCurlRoot-ca.cacert $(srcdir)/Server-localhost-sv.pem \
115 $(srcdir)/EdelCurlRoot-ca.cacert:
118 $(srcdir)/Server-localhost-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
121 $(srcdir)/Server-localhost.nn-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
124 $(srcdir)/Server-localhost0h-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
127 $(srcdir)/Server-localhost-firstSAN-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
130 $(srcdir)/Server-localhost-lastSAN-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
133 $(srcdir)/stunnel-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
DMakefile.in467 EdelCurlRoot-ca.cacert \
851 build-certs: $(srcdir)/EdelCurlRoot-ca.cacert $(srcdir)/Server-localhost-sv.pem \
856 $(srcdir)/EdelCurlRoot-ca.cacert:
859 $(srcdir)/Server-localhost-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
862 $(srcdir)/Server-localhost.nn-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
865 $(srcdir)/Server-localhost0h-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
868 $(srcdir)/Server-localhost-firstSAN-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
871 $(srcdir)/Server-localhost-lastSAN-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
874 $(srcdir)/stunnel-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
/third_party/openssl/test/
Dalgorithmid_test.c111 X509 *cacert, const char *ca_filename) in test_x509_sig_aid() argument
137 || !TEST_ptr(pkey = X509_get0_pubkey(cacert))) in test_x509_sig_aid()
216 X509 *eecert = NULL, *cacert = NULL; in test_x509_files() local
237 if ((cacert = PEM_read_bio_X509(bca, NULL, NULL, NULL)) == NULL) { in test_x509_files()
244 ret = test_x509_sig_aid(eecert, eecert_filename, cacert, cacert_filename) in test_x509_files()
246 & test_x509_spki_aid(cacert, cacert_filename); in test_x509_files()
251 X509_free(cacert); in test_x509_files()
/third_party/mbedtls/programs/fuzz/
Dfuzz_dtlsclient.c20 static mbedtls_x509_crt cacert; variable
48 mbedtls_x509_crt_init(&cacert); in LLVMFuzzerTestOneInput()
49 if (mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem, in LLVMFuzzerTestOneInput()
78 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL); in LLVMFuzzerTestOneInput()
Dfuzz_client.c18 static mbedtls_x509_crt cacert; variable
52 mbedtls_x509_crt_init(&cacert); in LLVMFuzzerTestOneInput()
53 if (mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem, in LLVMFuzzerTestOneInput()
102 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL); in LLVMFuzzerTestOneInput()
/third_party/mbedtls/programs/ssl/
Dssl_client1.c80 mbedtls_x509_crt cacert; in main() local
92 mbedtls_x509_crt_init(&cacert); in main()
114 ret = mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem, in main()
157 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL); in main()
278 mbedtls_x509_crt_free(&cacert); in main()
Ddtls_client.c94 mbedtls_x509_crt cacert; in main() local
110 mbedtls_x509_crt_init(&cacert); in main()
132 ret = mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem, in main()
174 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL); in main()
328 mbedtls_x509_crt_free(&cacert); in main()
Dssl_mail_client.c353 mbedtls_x509_crt cacert; in main() local
368 mbedtls_x509_crt_init(&cacert); in main()
479 ret = mbedtls_x509_crt_parse_file(&cacert, opt.ca_file); in main()
483 ret = mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem, in main()
587 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL); in main()
793 mbedtls_x509_crt_free(&cacert); in main()
/third_party/mbedtls/programs/x509/
Dcert_app.c140 mbedtls_x509_crt cacert; in main() local
155 mbedtls_x509_crt_init(&cacert); in main()
235 if ((ret = mbedtls_x509_crt_parse_path(&cacert, opt.ca_path)) < 0) { in main()
243 if ((ret = mbedtls_x509_crt_parse_file(&cacert, opt.ca_file)) < 0) { in main()
319 if ((ret = mbedtls_x509_crt_verify(&crt, &cacert, &cacrl, NULL, &flags, in main()
381 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL); in main()
445 mbedtls_x509_crt_free(&cacert); in main()
/third_party/mbedtls/port/src/
Dtls_client.c58 mbedtls_x509_crt_init(&session->cacert); in MbedtlsClientInit()
76 mbedtls_x509_crt_free(&session->cacert); in MbedtlsClientClose()
90 …int ret = mbedtls_x509_crt_parse(&session->cacert, (const unsigned char *)G_MBEDTLS_ROOT_CERTIFICA… in MbedtlsClientContext()
120 mbedtls_ssl_conf_ca_chain(&session->conf, &session->cacert, NULL); in MbedtlsClientContext()
/third_party/libcoap/src/
Dcoap_mbedtls.c125 mbedtls_x509_crt cacert; member
141 mbedtls_x509_crt cacert; member
497 setup_pki_credentials(mbedtls_x509_crt *cacert, in setup_pki_credentials() argument
557 mbedtls_x509_crt_init(cacert); in setup_pki_credentials()
558 ret = mbedtls_x509_crt_parse_file(cacert, in setup_pki_credentials()
565 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL); in setup_pki_credentials()
656 mbedtls_x509_crt_init(cacert); in setup_pki_credentials()
668 ret = mbedtls_x509_crt_parse(cacert, buffer, length); in setup_pki_credentials()
671 ret = mbedtls_x509_crt_parse(cacert, in setup_pki_credentials()
680 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL); in setup_pki_credentials()
[all …]
/third_party/curl/tests/data/
Dtest40419 FTPS with invalid cacert
22 --ftp-ssl-control --cacert moooo ftps://%HOSTIP:%FTPSPORT/
/third_party/openssl/test/certs/
Dmkcert.sh137 local cacert=$1; shift
156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
165 local cacert=$1; shift
177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
/third_party/nghttp2/src/
Dshrpx_tls.cc1069 if (!tlsconf.cacert.empty()) { in create_ssl_context()
1070 if (SSL_CTX_load_verify_locations(ssl_ctx, tlsconf.cacert.c_str(), in create_ssl_context()
1073 << tlsconf.cacert << ": " in create_ssl_context()
1111 if (!tlsconf.client_verify.cacert.empty()) { in create_ssl_context()
1113 ssl_ctx, tlsconf.client_verify.cacert.c_str(), nullptr) != 1) { in create_ssl_context()
1116 << tlsconf.client_verify.cacert << ": " in create_ssl_context()
1124 auto list = SSL_load_client_CA_file(tlsconf.client_verify.cacert.c_str()); in create_ssl_context()
1127 << tlsconf.client_verify.cacert << ": " in create_ssl_context()
1365 if (!tlsconf.cacert.empty()) { in create_quic_ssl_context()
1366 if (SSL_CTX_load_verify_locations(ssl_ctx, tlsconf.cacert.c_str(), in create_quic_ssl_context()
[all …]
Dshrpx_tls.h97 const StringRef &cacert, const StringRef &cert_file,
108 const StringRef &cacert, const StringRef &cert_file,
/third_party/curl/docs/
DSSLCERTS.md58 libcurl hackers: `curl_easy_setopt(curl, CURLOPT_CAINFO, cacert);`
60 With the curl command line tool: `--cacert [file]`
95 - `openssl s_client -showcerts -servername server -connect server:443 > cacert.pem`
152 server connection so instead of `--insecure` and `--cacert` to control the
153 certificate verification, you use `--proxy-insecure` and `--proxy-cacert`.
/third_party/curl/lib/vtls/
Dmbedtls.c100 mbedtls_x509_crt cacert; member
380 mbedtls_x509_crt_init(&backend->cacert); in mbed_connect_step1()
390 ret = mbedtls_x509_crt_parse(&backend->cacert, newblob, in mbed_connect_step1()
403 ret = mbedtls_x509_crt_parse_file(&backend->cacert, ssl_cafile); in mbed_connect_step1()
419 ret = mbedtls_x509_crt_parse_path(&backend->cacert, ssl_capath); in mbed_connect_step1()
645 &backend->cacert, in mbed_connect_step1()
976 mbedtls_x509_crt_free(&backend->cacert);
/third_party/nghttp2/tests/testdata/
DMakefile.am23 EXTRA_DIST = cacert.pem index.html privkey.pem

1234