/third_party/curl/docs/cmdline-opts/ |
D | proxy-cacert.md | 4 Long: proxy-cacert 12 - cacert 16 - --proxy-cacert CA-file.txt -x https://proxy $URL 19 # `--proxy-cacert` 21 Same as --cacert but used in HTTPS proxy context.
|
D | capath.md | 12 - cacert 26 --cacert if the --cacert file contains many CA certificates.
|
D | cacert.md | 4 Long: cacert 15 - --cacert CA-file.txt $URL 18 # `--cacert`
|
/third_party/curl/tests/certs/scripts/ |
D | genroot.sh | 74 …DURATION -req -signkey $PREFIX-ca.key -in $PREFIX-ca.csr -out $PREFIX-$SERIAL-ca.cacert $DIGESTALGO 77 $OPENSSL x509 -text -in $PREFIX-$SERIAL-ca.cacert -nameopt multiline > $PREFIX-ca.cacert 80 $OPENSSL x509 -in $PREFIX-ca.cacert -outform der -out $PREFIX-ca.der 84 $OPENSSL x509 -in $PREFIX-ca.cacert -text -nameopt multiline > $PREFIX-ca.crt 87 $OPENSSL x509 -noout -text -in $PREFIX-ca.cacert -nameopt multiline
|
D | genserv.sh | 64 if [ ! -f $CAPREFIX-ca.cacert ] ; then 109 $OPENSSL x509 -set_serial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert …
|
/third_party/openssl/demos/cms/ |
D | cms_ver.c | 19 X509 *cacert = NULL; in main() local 39 cacert = PEM_read_bio_X509(tbio, NULL, 0, NULL); in main() 41 if (cacert == NULL) in main() 44 if (!X509_STORE_add_cert(st, cacert)) in main() 83 X509_free(cacert); in main()
|
/third_party/openssl/demos/smime/ |
D | smver.c | 19 X509 *cacert = NULL; in main() local 39 cacert = PEM_read_bio_X509(tbio, NULL, 0, NULL); in main() 41 if (cacert == NULL) in main() 44 if (!X509_STORE_add_cert(st, cacert)) in main() 82 X509_free(cacert); in main()
|
/third_party/curl/tests/certs/ |
D | Makefile.am | 39 EdelCurlRoot-ca.cacert \ 110 build-certs: $(srcdir)/EdelCurlRoot-ca.cacert $(srcdir)/Server-localhost-sv.pem \ 115 $(srcdir)/EdelCurlRoot-ca.cacert: 118 $(srcdir)/Server-localhost-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert 121 $(srcdir)/Server-localhost.nn-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert 124 $(srcdir)/Server-localhost0h-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert 127 $(srcdir)/Server-localhost-firstSAN-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert 130 $(srcdir)/Server-localhost-lastSAN-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert 133 $(srcdir)/stunnel-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
|
D | Makefile.in | 467 EdelCurlRoot-ca.cacert \ 851 build-certs: $(srcdir)/EdelCurlRoot-ca.cacert $(srcdir)/Server-localhost-sv.pem \ 856 $(srcdir)/EdelCurlRoot-ca.cacert: 859 $(srcdir)/Server-localhost-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert 862 $(srcdir)/Server-localhost.nn-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert 865 $(srcdir)/Server-localhost0h-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert 868 $(srcdir)/Server-localhost-firstSAN-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert 871 $(srcdir)/Server-localhost-lastSAN-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert 874 $(srcdir)/stunnel-sv.pem: $(srcdir)/EdelCurlRoot-ca.cacert
|
/third_party/openssl/test/ |
D | algorithmid_test.c | 111 X509 *cacert, const char *ca_filename) in test_x509_sig_aid() argument 137 || !TEST_ptr(pkey = X509_get0_pubkey(cacert))) in test_x509_sig_aid() 216 X509 *eecert = NULL, *cacert = NULL; in test_x509_files() local 237 if ((cacert = PEM_read_bio_X509(bca, NULL, NULL, NULL)) == NULL) { in test_x509_files() 244 ret = test_x509_sig_aid(eecert, eecert_filename, cacert, cacert_filename) in test_x509_files() 246 & test_x509_spki_aid(cacert, cacert_filename); in test_x509_files() 251 X509_free(cacert); in test_x509_files()
|
/third_party/mbedtls/programs/fuzz/ |
D | fuzz_dtlsclient.c | 20 static mbedtls_x509_crt cacert; variable 48 mbedtls_x509_crt_init(&cacert); in LLVMFuzzerTestOneInput() 49 if (mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem, in LLVMFuzzerTestOneInput() 78 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL); in LLVMFuzzerTestOneInput()
|
D | fuzz_client.c | 18 static mbedtls_x509_crt cacert; variable 52 mbedtls_x509_crt_init(&cacert); in LLVMFuzzerTestOneInput() 53 if (mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem, in LLVMFuzzerTestOneInput() 102 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL); in LLVMFuzzerTestOneInput()
|
/third_party/mbedtls/programs/ssl/ |
D | ssl_client1.c | 80 mbedtls_x509_crt cacert; in main() local 92 mbedtls_x509_crt_init(&cacert); in main() 114 ret = mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem, in main() 157 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL); in main() 278 mbedtls_x509_crt_free(&cacert); in main()
|
D | dtls_client.c | 94 mbedtls_x509_crt cacert; in main() local 110 mbedtls_x509_crt_init(&cacert); in main() 132 ret = mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem, in main() 174 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL); in main() 328 mbedtls_x509_crt_free(&cacert); in main()
|
D | ssl_mail_client.c | 353 mbedtls_x509_crt cacert; in main() local 368 mbedtls_x509_crt_init(&cacert); in main() 479 ret = mbedtls_x509_crt_parse_file(&cacert, opt.ca_file); in main() 483 ret = mbedtls_x509_crt_parse(&cacert, (const unsigned char *) mbedtls_test_cas_pem, in main() 587 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL); in main() 793 mbedtls_x509_crt_free(&cacert); in main()
|
/third_party/mbedtls/programs/x509/ |
D | cert_app.c | 140 mbedtls_x509_crt cacert; in main() local 155 mbedtls_x509_crt_init(&cacert); in main() 235 if ((ret = mbedtls_x509_crt_parse_path(&cacert, opt.ca_path)) < 0) { in main() 243 if ((ret = mbedtls_x509_crt_parse_file(&cacert, opt.ca_file)) < 0) { in main() 319 if ((ret = mbedtls_x509_crt_verify(&crt, &cacert, &cacrl, NULL, &flags, in main() 381 mbedtls_ssl_conf_ca_chain(&conf, &cacert, NULL); in main() 445 mbedtls_x509_crt_free(&cacert); in main()
|
/third_party/mbedtls/port/src/ |
D | tls_client.c | 58 mbedtls_x509_crt_init(&session->cacert); in MbedtlsClientInit() 76 mbedtls_x509_crt_free(&session->cacert); in MbedtlsClientClose() 90 …int ret = mbedtls_x509_crt_parse(&session->cacert, (const unsigned char *)G_MBEDTLS_ROOT_CERTIFICA… in MbedtlsClientContext() 120 mbedtls_ssl_conf_ca_chain(&session->conf, &session->cacert, NULL); in MbedtlsClientContext()
|
/third_party/libcoap/src/ |
D | coap_mbedtls.c | 125 mbedtls_x509_crt cacert; member 141 mbedtls_x509_crt cacert; member 497 setup_pki_credentials(mbedtls_x509_crt *cacert, in setup_pki_credentials() argument 557 mbedtls_x509_crt_init(cacert); in setup_pki_credentials() 558 ret = mbedtls_x509_crt_parse_file(cacert, in setup_pki_credentials() 565 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL); in setup_pki_credentials() 656 mbedtls_x509_crt_init(cacert); in setup_pki_credentials() 668 ret = mbedtls_x509_crt_parse(cacert, buffer, length); in setup_pki_credentials() 671 ret = mbedtls_x509_crt_parse(cacert, in setup_pki_credentials() 680 mbedtls_ssl_conf_ca_chain(&m_env->conf, cacert, NULL); in setup_pki_credentials() [all …]
|
/third_party/curl/tests/data/ |
D | test404 | 19 FTPS with invalid cacert 22 --ftp-ssl-control --cacert moooo ftps://%HOSTIP:%FTPSPORT/
|
/third_party/openssl/test/certs/ |
D | mkcert.sh | 137 local cacert=$1; shift 156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 165 local cacert=$1; shift 177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
|
/third_party/nghttp2/src/ |
D | shrpx_tls.cc | 1069 if (!tlsconf.cacert.empty()) { in create_ssl_context() 1070 if (SSL_CTX_load_verify_locations(ssl_ctx, tlsconf.cacert.c_str(), in create_ssl_context() 1073 << tlsconf.cacert << ": " in create_ssl_context() 1111 if (!tlsconf.client_verify.cacert.empty()) { in create_ssl_context() 1113 ssl_ctx, tlsconf.client_verify.cacert.c_str(), nullptr) != 1) { in create_ssl_context() 1116 << tlsconf.client_verify.cacert << ": " in create_ssl_context() 1124 auto list = SSL_load_client_CA_file(tlsconf.client_verify.cacert.c_str()); in create_ssl_context() 1127 << tlsconf.client_verify.cacert << ": " in create_ssl_context() 1365 if (!tlsconf.cacert.empty()) { in create_quic_ssl_context() 1366 if (SSL_CTX_load_verify_locations(ssl_ctx, tlsconf.cacert.c_str(), in create_quic_ssl_context() [all …]
|
D | shrpx_tls.h | 97 const StringRef &cacert, const StringRef &cert_file, 108 const StringRef &cacert, const StringRef &cert_file,
|
/third_party/curl/docs/ |
D | SSLCERTS.md | 58 libcurl hackers: `curl_easy_setopt(curl, CURLOPT_CAINFO, cacert);` 60 With the curl command line tool: `--cacert [file]` 95 - `openssl s_client -showcerts -servername server -connect server:443 > cacert.pem` 152 server connection so instead of `--insecure` and `--cacert` to control the 153 certificate verification, you use `--proxy-insecure` and `--proxy-cacert`.
|
/third_party/curl/lib/vtls/ |
D | mbedtls.c | 100 mbedtls_x509_crt cacert; member 380 mbedtls_x509_crt_init(&backend->cacert); in mbed_connect_step1() 390 ret = mbedtls_x509_crt_parse(&backend->cacert, newblob, in mbed_connect_step1() 403 ret = mbedtls_x509_crt_parse_file(&backend->cacert, ssl_cafile); in mbed_connect_step1() 419 ret = mbedtls_x509_crt_parse_path(&backend->cacert, ssl_capath); in mbed_connect_step1() 645 &backend->cacert, in mbed_connect_step1() 976 mbedtls_x509_crt_free(&backend->cacert);
|
/third_party/nghttp2/tests/testdata/ |
D | Makefile.am | 23 EXTRA_DIST = cacert.pem index.html privkey.pem
|