/macosx-10.9.5/ruby-104/ruby/sample/openssl/ |
H A D | smime_read.rb | 7 cert_file = options["c"] 13 cert = X509::Certificate.new(File::read(cert_file))
|
H A D | smime_write.rb | 7 cert_file = options["c"] 11 cert = X509::Certificate.new(File::read(cert_file))
|
H A D | echo_cli.rb | 11 cert_file = options["c"] 16 if cert_file && key_file 17 ctx.cert = OpenSSL::X509::Certificate.new(File::read(cert_file))
|
H A D | echo_svr.rb | 10 cert_file = options["c"] 14 if cert_file && key_file 15 cert = OpenSSL::X509::Certificate.new(File::read(cert_file))
|
/macosx-10.9.5/postfix-252/postfix/src/tls/ |
H A D | tls_certkey.c | 15 /* int tls_set_my_certificate_key_info(ctx, cert_file, key_file, 19 /* const char *cert_file; 210 const char *cert_file, 216 * certificate (in cert_file). Both may specify the same file. 221 if (SSL_CTX_use_certificate_chain_file(ctx, cert_file) <= 0) { 223 "disabling TLS support", cert_type, cert_file); 263 "disabling TLS support", cert_type, key_file, cert_file); 272 const char *cert_file, 284 if (*cert_file && !set_cert_stuff(ctx, "RSA", cert_file, key_fil 209 set_cert_stuff(SSL_CTX *ctx, const char *cert_type, const char *cert_file, const char *key_file) argument 271 tls_set_my_certificate_key_info(SSL_CTX *ctx, const char *cert_file, const char *key_file, const char *dcert_file, const char *dkey_file, const char *eccert_file, const char *eckey_file) argument [all...] |
H A D | tls.h | 227 const char *cert_file; member in struct:__anon11831 284 const char *cert_file; member in struct:__anon11833
|
H A D | tls_client.c | 439 props->cert_file,
|
H A D | tls_server.c | 467 props->cert_file,
|
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/commands/ |
H A D | cert_command.rb | 74 'and the certificate from -C') do |cert_file, options| 75 raise OptionParser::InvalidArgument, "#{cert_file}: does not exist" unless 76 File.file? cert_file 78 options[:sign] << cert_file 112 options[:sign].each do |cert_file| 113 sign cert_file 183 cert_file = File.join Gem.default_cert_path 184 cert = File.read cert_file 214 def sign cert_file 215 cert = File.read cert_file [all...] |
/macosx-10.9.5/ruby-104/ruby/ext/openssl/ |
H A D | ossl_x509.c | 99 DefX509Default(CERT_FILE, cert_file);
|
/macosx-10.9.5/ruby-104/ruby/test/rubygems/ |
H A D | test_gem_security_signer.rb | 16 @cert_file = PUBLIC_CERT 33 signer = Gem::Security::Signer.new nil, [@cert_file, CHILD_CERT] 46 signer = Gem::Security::Signer.new nil, [@cert_file]
|
/macosx-10.9.5/postfix-252/postfix/src/tlsproxy/ |
H A D | tlsproxy.c | 897 const char *cert_file; local 949 cert_file = ""; 952 cert_file = var_tlsp_tls_cert_file; 955 (*cert_file || *var_tlsp_tls_dcert_file || *var_tlsp_tls_eccert_file); 977 cert_file = cert_file,
|
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/ |
H A D | test_case.rb | 1059 cert_file = cert_path cert_name 1061 cert = File.read cert_file 1072 cert_file = 1076 return cert_file if File.exist? cert_file
|
/macosx-10.9.5/curl-78.94.1/curl/lib/ |
H A D | ssluse.c | 299 char *cert_file, 308 if(cert_file != NULL || file_type == SSL_FILETYPE_ENGINE) { 343 cert_file) != 1) { 354 cert_file, 370 params.cert_id = cert_file; 384 " '%s' [%s]", cert_file, 422 f = fopen(cert_file,"rb"); 424 failf(data, "could not open PKCS12 file '%s'", cert_file); 431 failf(data, "error reading PKCS12 file '%s'", cert_file ); 458 cert_file); 297 cert_stuff(struct connectdata *conn, SSL_CTX* ctx, char *cert_file, const char *cert_type, char *key_file, const char *key_type) argument [all...] |
H A D | nss.c | 553 char *cert_file, char *key_file) 558 if(cert_file) { 559 rv = nss_load_cert(&conn->ssl[sockindex], cert_file, PR_FALSE); 562 if(!display_error(conn, err, cert_file)) { 571 if(key_file || (is_file(cert_file))) { 576 rv = nss_load_key(conn, sockindex, cert_file); 552 cert_stuff(struct connectdata *conn, int sockindex, char *cert_file, char *key_file) argument
|
/macosx-10.9.5/postfix-252/postfix/src/smtp/ |
H A D | smtp.c | 1082 cert_file = var_smtp_tls_cert_file,
|
/macosx-10.9.5/apache-786.1/httpd/modules/ssl/ |
H A D | ssl_engine_config.c.orig | 142 mctx->pkp->cert_file = NULL; 239 cfgMergeString(pkp->cert_file); 1499 sc->proxy->pkp->cert_file = arg;
|
H A D | ssl_engine_init.c.orig | 1119 if (!(pkp->cert_file || pkp->cert_path)) { 1125 if (pkp->cert_file) { 1126 SSL_X509_INFO_load_file(ptemp, sk, pkp->cert_file);
|
H A D | ssl_engine_config.c | 142 mctx->pkp->cert_file = NULL; 240 cfgMergeString(pkp->cert_file); 1517 sc->proxy->pkp->cert_file = arg;
|
H A D | ssl_engine_init.c | 1126 if (!(pkp->cert_file || pkp->cert_path)) { 1132 if (pkp->cert_file) { 1133 SSL_X509_INFO_load_file(ptemp, sk, pkp->cert_file);
|
H A D | ssl_private.h | 464 const char *cert_file; member in struct:__anon6088
|
H A D | ssl_private.h.orig | 464 const char *cert_file;
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/ |
H A D | softp11.c | 600 add_certificate(const char *cert_file, argument 627 ret = hx509_certs_init(context, cert_file, flags, lock, &certs); 629 st_logf("failed to open file %s\n", cert_file); 636 st_logf("failed adding certs from file %s\n", cert_file);
|
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/ |
H A D | EAPTLSUtil.c | 1895 getTrustExceptions(char * domain, char * identifier, char * cert_file) argument 1912 cert_hash = file_create_certificate_hash(cert_file); 1915 cert_file, strerror(errno));
|
/macosx-10.9.5/postfix-252/postfix/src/smtpd/ |
H A D | smtpd_imap.c | 309 cert_file = "",
|