Searched refs:cert_file (Results 1 - 25 of 26) sorted by relevance

12

/macosx-10.9.5/ruby-104/ruby/sample/openssl/
H A Dsmime_read.rb7 cert_file = options["c"]
13 cert = X509::Certificate.new(File::read(cert_file))
H A Dsmime_write.rb7 cert_file = options["c"]
11 cert = X509::Certificate.new(File::read(cert_file))
H A Decho_cli.rb11 cert_file = options["c"]
16 if cert_file && key_file
17 ctx.cert = OpenSSL::X509::Certificate.new(File::read(cert_file))
H A Decho_svr.rb10 cert_file = options["c"]
14 if cert_file && key_file
15 cert = OpenSSL::X509::Certificate.new(File::read(cert_file))
/macosx-10.9.5/postfix-252/postfix/src/tls/
H A Dtls_certkey.c15 /* int tls_set_my_certificate_key_info(ctx, cert_file, key_file,
19 /* const char *cert_file;
210 const char *cert_file,
216 * certificate (in cert_file). Both may specify the same file.
221 if (SSL_CTX_use_certificate_chain_file(ctx, cert_file) <= 0) {
223 "disabling TLS support", cert_type, cert_file);
263 "disabling TLS support", cert_type, key_file, cert_file);
272 const char *cert_file,
284 if (*cert_file && !set_cert_stuff(ctx, "RSA", cert_file, key_fil
209 set_cert_stuff(SSL_CTX *ctx, const char *cert_type, const char *cert_file, const char *key_file) argument
271 tls_set_my_certificate_key_info(SSL_CTX *ctx, const char *cert_file, const char *key_file, const char *dcert_file, const char *dkey_file, const char *eccert_file, const char *eckey_file) argument
[all...]
H A Dtls.h227 const char *cert_file; member in struct:__anon11831
284 const char *cert_file; member in struct:__anon11833
H A Dtls_client.c439 props->cert_file,
H A Dtls_server.c467 props->cert_file,
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/commands/
H A Dcert_command.rb74 'and the certificate from -C') do |cert_file, options|
75 raise OptionParser::InvalidArgument, "#{cert_file}: does not exist" unless
76 File.file? cert_file
78 options[:sign] << cert_file
112 options[:sign].each do |cert_file|
113 sign cert_file
183 cert_file = File.join Gem.default_cert_path
184 cert = File.read cert_file
214 def sign cert_file
215 cert = File.read cert_file
[all...]
/macosx-10.9.5/ruby-104/ruby/ext/openssl/
H A Dossl_x509.c99 DefX509Default(CERT_FILE, cert_file);
/macosx-10.9.5/ruby-104/ruby/test/rubygems/
H A Dtest_gem_security_signer.rb16 @cert_file = PUBLIC_CERT
33 signer = Gem::Security::Signer.new nil, [@cert_file, CHILD_CERT]
46 signer = Gem::Security::Signer.new nil, [@cert_file]
/macosx-10.9.5/postfix-252/postfix/src/tlsproxy/
H A Dtlsproxy.c897 const char *cert_file; local
949 cert_file = "";
952 cert_file = var_tlsp_tls_cert_file;
955 (*cert_file || *var_tlsp_tls_dcert_file || *var_tlsp_tls_eccert_file);
977 cert_file = cert_file,
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/
H A Dtest_case.rb1059 cert_file = cert_path cert_name
1061 cert = File.read cert_file
1072 cert_file =
1076 return cert_file if File.exist? cert_file
/macosx-10.9.5/curl-78.94.1/curl/lib/
H A Dssluse.c299 char *cert_file,
308 if(cert_file != NULL || file_type == SSL_FILETYPE_ENGINE) {
343 cert_file) != 1) {
354 cert_file,
370 params.cert_id = cert_file;
384 " '%s' [%s]", cert_file,
422 f = fopen(cert_file,"rb");
424 failf(data, "could not open PKCS12 file '%s'", cert_file);
431 failf(data, "error reading PKCS12 file '%s'", cert_file );
458 cert_file);
297 cert_stuff(struct connectdata *conn, SSL_CTX* ctx, char *cert_file, const char *cert_type, char *key_file, const char *key_type) argument
[all...]
H A Dnss.c553 char *cert_file, char *key_file)
558 if(cert_file) {
559 rv = nss_load_cert(&conn->ssl[sockindex], cert_file, PR_FALSE);
562 if(!display_error(conn, err, cert_file)) {
571 if(key_file || (is_file(cert_file))) {
576 rv = nss_load_key(conn, sockindex, cert_file);
552 cert_stuff(struct connectdata *conn, int sockindex, char *cert_file, char *key_file) argument
/macosx-10.9.5/postfix-252/postfix/src/smtp/
H A Dsmtp.c1082 cert_file = var_smtp_tls_cert_file,
/macosx-10.9.5/apache-786.1/httpd/modules/ssl/
H A Dssl_engine_config.c.orig142 mctx->pkp->cert_file = NULL;
239 cfgMergeString(pkp->cert_file);
1499 sc->proxy->pkp->cert_file = arg;
H A Dssl_engine_init.c.orig1119 if (!(pkp->cert_file || pkp->cert_path)) {
1125 if (pkp->cert_file) {
1126 SSL_X509_INFO_load_file(ptemp, sk, pkp->cert_file);
H A Dssl_engine_config.c142 mctx->pkp->cert_file = NULL;
240 cfgMergeString(pkp->cert_file);
1517 sc->proxy->pkp->cert_file = arg;
H A Dssl_engine_init.c1126 if (!(pkp->cert_file || pkp->cert_path)) {
1132 if (pkp->cert_file) {
1133 SSL_X509_INFO_load_file(ptemp, sk, pkp->cert_file);
H A Dssl_private.h464 const char *cert_file; member in struct:__anon6088
H A Dssl_private.h.orig464 const char *cert_file;
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/
H A Dsoftp11.c600 add_certificate(const char *cert_file, argument
627 ret = hx509_certs_init(context, cert_file, flags, lock, &certs);
629 st_logf("failed to open file %s\n", cert_file);
636 st_logf("failed adding certs from file %s\n", cert_file);
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/
H A DEAPTLSUtil.c1895 getTrustExceptions(char * domain, char * identifier, char * cert_file) argument
1912 cert_hash = file_create_certificate_hash(cert_file);
1915 cert_file, strerror(errno));
/macosx-10.9.5/postfix-252/postfix/src/smtpd/
H A Dsmtpd_imap.c309 cert_file = "",

Completed in 315 milliseconds

12