/dports/security/xmlsec1/xmlsec1-1.2.29/tests/ |
H A D | testDSig.sh | 465 "--trusted-$cert_format $topfolder/keys/cacert.$cert_format" \ 467 "--trusted-$cert_format $topfolder/keys/cacert.$cert_format" 474 …cert_format $topfolder/keys/cacert.$cert_format --untrusted-$cert_format $topfolder/keys/ca2cert.$… 476 …cert_format $topfolder/keys/cacert.$cert_format --untrusted-$cert_format $topfolder/keys/ca2cert.$… 607 …"--trusted-$cert_format $topfolder/keys/cacert.$cert_format --trusted-$cert_format $topfolder/keys… 871 …"--trusted-$cert_format certs/rsa-ca-cert.$cert_format --untrusted-$cert_format certs/rsa-cert.$ce… 878 …"--trusted-$cert_format certs/rsa-ca-cert.$cert_format --untrusted-$cert_format certs/rsa-cert.$ce… 885 …"--trusted-$cert_format certs/rsa-ca-cert.$cert_format --untrusted-$cert_format certs/rsa-cert.$ce… 971 "--trusted-$cert_format certs/rsa-ca-cert.$cert_format" 978 "--trusted-$cert_format certs/rsa-ca-cert.$cert_format" [all …]
|
H A D | testrun.sh | 68 cert_format=$file_format
|
/dports/sysutils/py-salt/salt-3004.1/salt/modules/ |
H A D | win_pki.py | 205 cert_format = cert_format.lower() 207 _validate_cert_format(name=cert_format) 213 if cert_format == "pfx": 258 cert_format=_DEFAULT_FORMAT, argument 292 cert_format = cert_format.lower() 304 name=cached_source_path, cert_format=cert_format, password=password 307 cert_props = get_cert_file(name=cached_source_path, cert_format=cert_format) 319 if cert_format == "pfx": 361 cert_format=_DEFAULT_FORMAT, argument 391 cert_format = cert_format.lower() [all …]
|
/dports/sysutils/py-salt/salt-3004.1/salt/states/ |
H A D | win_pki.py | 26 cert_format=_DEFAULT_FORMAT, 74 name=cached_source_path, cert_format=cert_format, password=password 78 name=cached_source_path, cert_format=cert_format 95 cert_format=cert_format,
|
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/core/server/cgi-bin/ |
H A D | download.fcgi | 111 my $cert_format = uc($cgi->param('format') || ''); 113 if ($cert_format eq 'DER') { 116 $cert_format = 'PEM'; 120 …ert = $client->run_command('get_cert', { identifier => $cert_identifier, format => $cert_format });
|
/dports/security/p5-openxpki/openxpki-3.16.1/core/server/cgi-bin/ |
H A D | download.fcgi | 111 my $cert_format = uc($cgi->param('format') || ''); 113 if ($cert_format eq 'DER') { 116 $cert_format = 'PEM'; 120 …ert = $client->run_command('get_cert', { identifier => $cert_identifier, format => $cert_format });
|
/dports/devel/py-cursive/cursive-0.2.2/cursive/tests/unit/ |
H A D | test_signature_utils.py | 74 def __init__(self, data, cert_format): argument 76 self.cert_format = cert_format 80 return self.cert_format
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/general/plugins/modules/ |
H A D | java_keystore.py | 273 def read_certificate_fingerprint(self, cert_format='PEM'): argument 275 if cert_format == 'PEM': 371 …def cryptography_create_pkcs12_bundle(self, keystore_p12_path, key_format='PEM', cert_format='PEM'… argument 377 if cert_format == 'PEM':
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/general/plugins/modules/system/ |
H A D | java_keystore.py | 273 def read_certificate_fingerprint(self, cert_format='PEM'): argument 275 if cert_format == 'PEM': 371 …def cryptography_create_pkcs12_bundle(self, keystore_p12_path, key_format='PEM', cert_format='PEM'… argument 377 if cert_format == 'PEM':
|
/dports/security/yubico-piv-tool/yubico-piv-tool-2.2.0/tool/ |
H A D | yubico-piv-tool.c | 550 static bool import_cert(ykpiv_state *state, enum enum_key_format cert_format, in import_cert() argument 560 input_file = open_file(input_file_name, key_file_mode(cert_format, false)); in import_cert() 569 if(cert_format == key_format_arg_PEM) { in import_cert() 575 } else if(cert_format == key_format_arg_DER) { in import_cert() 581 } else if(cert_format == key_format_arg_PKCS12) { in import_cert() 591 } else if (cert_format == key_format_arg_GZIP) { in import_cert() 1629 enum enum_key_format cert_format, int verbose) { in test_signature() argument 1647 if(cert_format == key_format_arg_PEM) { in test_signature() 1649 } else if(cert_format == key_format_arg_DER) { in test_signature() 1793 if(cert_format == key_format_arg_PEM) { in test_decipher() [all …]
|
/dports/security/py-python-nss/python-nss-1.0.1/doc/examples/ |
H A D | cert_dump.py | 105 parser.set_defaults(cert_format='pem', 118 si = nss.read_der_from_file(filename, options.cert_format == 'pem')
|
/dports/sysutils/py-salt/salt-3004.1/salt/runners/ |
H A D | digicertapi.py | 211 cert_format="pem_all", argument 276 _base_url(), certificate_id, cert_format 289 _base_url(), certificate_id, cert_format
|
/dports/sysutils/cinnamon-control-center/cinnamon-control-center-4.8.2/panels/network/wireless-security/ |
H A D | eap-method-tls.c | 281 NMSetting8021xCKFormat cert_format = NM_SETTING_802_1X_CK_FORMAT_UNKNOWN; in private_key_picker_helper() local 290 …et_private_key (setting, filename, password, NM_SETTING_802_1X_CK_SCHEME_PATH, &cert_format, NULL); in private_key_picker_helper() 295 if (cert_format == NM_SETTING_802_1X_CK_FORMAT_PKCS12) { in private_key_picker_helper()
|
/dports/sysutils/gnome-control-center/gnome-control-center-41.2/panels/network/wireless-security/ |
H A D | eap-method-tls.c | 242 NMSetting8021xCKFormat cert_format = NM_SETTING_802_1X_CK_FORMAT_UNKNOWN; 248 …et_private_key (setting, filename, password, NM_SETTING_802_1X_CK_SCHEME_PATH, &cert_format, NULL); 251 if (cert_format == NM_SETTING_802_1X_CK_FORMAT_PKCS12) {
|
/dports/security/p5-openxpki-i18n/openxpki-3.16.1/core/server/OpenXPKI/Client/UI/ |
H A D | Certificate.pm | 1010 my $cert_format = 'DER'; 1014 $cert_format = 'TXT'; 1018 $cert_format = 'PEM'; 1031 …$self->send_command_v2 ( "get_cert", {'identifier' => $cert_identifier, 'format' => $cert_format});
|
/dports/security/p5-openxpki/openxpki-3.16.1/core/server/OpenXPKI/Client/UI/ |
H A D | Certificate.pm | 1010 my $cert_format = 'DER'; 1014 $cert_format = 'TXT'; 1018 $cert_format = 'PEM'; 1031 …$self->send_command_v2 ( "get_cert", {'identifier' => $cert_identifier, 'format' => $cert_format});
|
/dports/security/libressl/libressl-3.4.3/apps/openssl/ |
H A D | s_client.c | 201 int cert_format; member 471 .opt.value = &s_client_config.cert_format, 923 s_client_config.cert_format = FORMAT_PEM; in s_client_main() 984 s_client_config.cert_format, in s_client_main()
|
H A D | s_server.c | 247 int cert_format; member 566 .opt.value = &s_server_config.cert_format, 1099 s_server_config.cert_format = FORMAT_PEM; in s_server_main() 1146 s_server_config.cert_format, in s_server_main() 1162 s_server_config.cert_format, in s_server_main()
|
/dports/security/libressl-static/libressl-3.3.5/apps/openssl/ |
H A D | s_client.c | 201 int cert_format; member 471 .opt.value = &s_client_config.cert_format, 923 s_client_config.cert_format = FORMAT_PEM; in s_client_main() 984 s_client_config.cert_format, in s_client_main()
|
H A D | s_server.c | 247 int cert_format; member 565 .opt.value = &s_server_config.cert_format, 1090 s_server_config.cert_format = FORMAT_PEM; in s_server_main() 1137 s_server_config.cert_format, in s_server_main() 1153 s_server_config.cert_format, in s_server_main()
|
/dports/www/obhttpd/libressl-3.4.1/apps/openssl/ |
H A D | s_client.c | 201 int cert_format; member 471 .opt.value = &s_client_config.cert_format, 923 s_client_config.cert_format = FORMAT_PEM; in s_client_main() 984 s_client_config.cert_format, in s_client_main()
|
H A D | s_server.c | 247 int cert_format; member 566 .opt.value = &s_server_config.cert_format, 1098 s_server_config.cert_format = FORMAT_PEM; in s_server_main() 1140 s_server_config.cert_format, in s_server_main() 1156 s_server_config.cert_format, in s_server_main()
|
/dports/net/p5-Socket-Class/Socket-Class-2.258/xs/sc_ssl/openssl/source/apps/ |
H A D | s_client.c | 301 int cert_format = FORMAT_PEM, key_format = FORMAT_PEM; in MAIN() local 428 cert_format = str2fmt(*(++argv)); in MAIN() 655 cert = load_cert(bio_err,cert_file,cert_format, in MAIN()
|
/dports/security/openssl-legacy-static/openssl-1.0.2u/apps/ |
H A D | s_client.c | 675 int cert_format = FORMAT_PEM, key_format = FORMAT_PEM; in MAIN() local 831 cert_format = str2fmt(*(++argv)); in MAIN() 1220 cert = load_cert(bio_err, cert_file, cert_format, in MAIN()
|
/dports/security/openssl-unsafe/openssl-c9ba19c/apps/ |
H A D | s_client.c | 686 int cert_format = FORMAT_PEM, key_format = FORMAT_PEM; in MAIN() local 848 cert_format = str2fmt(*(++argv)); in MAIN() 1254 cert = load_cert(bio_err, cert_file, cert_format, in MAIN()
|