/external/curl/tests/ |
D | secureserver.pl | 68 my $certfile; # certificate chain PEM file 185 $certfile = "$srcdir/". ($stuncert?"certs/$stuncert":"stunnel.pem"); 186 $certfile = abs_path($certfile); 234 $certfile =~ s/^(\/cygdrive)?\/(\w)\//$2\:\//; 244 $cmd = "$stunnel -p $certfile -P $pidfile "; 251 print "pem cert file: $certfile\n"; 273 print STUNCONF "cert = $certfile\n"; 303 print "cert = $certfile\n"; 324 chmod(0600, $certfile) if(-f $certfile);
|
D | runtests.pl | 1367 my ($verbose, $ipv6, $certfile) = @_; 1399 $certfile = 'stunnel.pem' unless($certfile); 1407 $flags .= "--certfile \"$certfile\" " if($certfile ne 'stunnel.pem'); 1435 $runcert{$server} = $certfile; 1625 my ($verbose, $ipv6, $certfile) = @_; 1657 $certfile = 'stunnel.pem' unless($certfile); 1665 $flags .= "--certfile \"$certfile\" " if($certfile ne 'stunnel.pem'); 1693 $runcert{$server} = $certfile; 4153 my $certfile; 4155 $certfile = ($whatlist[1]) ? $whatlist[1] : 'stunnel.pem'; [all …]
|
/external/autotest/client/cros/ |
D | ownership.py | 303 certfile = scoped_tempfile.tempdir.name + '/cert.pem' 305 OPENSSLREQ, '/CN=me', keyfile, certfile) 307 return (keyfile, certfile) 320 certfile = scoped_tempfile(certpath) 322 cert_extract_pubkey_der(certfile.name)) 325 def push_to_nss(keyfile, certfile, nssdb): argument 337 OPENSSLP12, certfile, keyfile, for_push.name)
|
D | httpd.py | 221 certfile=cert_path,
|
/external/autotest/client/site_tests/security_RootCA/ |
D | security_RootCA.py | 105 for certfile in glob.glob(OPENSSL_CERT_GLOB): 106 f, i = utils.system_output(fingerprint_cmd % certfile, 132 for certfile in glob.glob(OPENSSL_CERT_GLOB): 133 s = os.stat(certfile) 136 utils.system_output("ls -lH %s" % certfile))
|
/external/libmicrohttpd/src/microspdy/ |
D | daemon.c | 171 const char *certfile, in SPDYF_start_daemon_va() argument 224 if (NULL == certfile in SPDYF_start_daemon_va() 225 || NULL == (daemon->certfile = strdup (certfile))) in SPDYF_start_daemon_va() 362 if(NULL != daemon->certfile) in SPDYF_start_daemon_va() 363 free(daemon->certfile); in SPDYF_start_daemon_va() 384 free(daemon->certfile); in SPDYF_stop_daemon()
|
D | daemon.h | 62 const char *certfile,
|
D | io_openssl.c | 102 if(1 != SSL_CTX_use_certificate_file(daemon->io_context, daemon->certfile , SSL_FILETYPE_PEM)) in SPDYF_openssl_init()
|
D | applicationlayer.c | 326 const char *certfile, in SPDY_start_daemon() argument 359 certfile, in SPDY_start_daemon()
|
D | structures.h | 891 char *certfile; member
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/ |
D | https_connection.py | 129 certfile=self.cert_file,
|
D | connection.py | 833 certfile=cert_file,
|
/external/chromium-trace/catapult/telemetry/third_party/webpagereplay/ |
D | certutils_test.py | 34 self.socket, certfile=https_root_ca_cert_path, server_side=True,
|
D | httpproxy.py | 421 self.socket, certfile=https_root_ca_cert_path, server_side=True,
|
/external/curl/tests/certs/scripts/ |
D | genserv.sh | 92 …-caname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt
|
/external/curl/docs/ |
D | SSLCERTS | 90 x509 -inform PEM -in certfile -text -out certdata" where certfile is
|
/external/libmicrohttpd/src/include/ |
D | microspdy.h | 881 const char *certfile,
|
/external/ipsec-tools/src/racoon/ |
D | oakley.c | 1680 char *certfile; local 1684 certfile = iph1->rmconf->mycertfile; 1687 certfile = iph1->rmconf->peerscertfile; 1690 if (!certfile) { 1699 getpathname(path, sizeof(path), LC_PATHTYPE_CERT, certfile); 1763 char *certfile; local
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/ |
D | libhttplib2.tex | 250 file that contains your private key. \var{certfile} is a PEM formatted certificate chain file.
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/httplib2/python2/httplib2/ |
D | __init__.py | 79 return ssl.wrap_socket(sock, keyfile=key_file, certfile=cert_file,
|