Home
last modified time | relevance | path

Searched refs:client_cert (Results 1 – 25 of 1088) sorted by relevance

12345678910>>...44

/dports/devel/py-twine/twine-3.7.0/tests/
H A Dtest_settings.py49 assert s.client_cert is None
88 def test_password_is_required_if_no_client_cert(client_cert, entered_password): argument
90 settings_obj = settings.Settings(username="fakeuser", client_cert=client_cert)
96 client_cert = "/random/path"
98 username="fakeuser", password="anything", client_cert=client_cert
101 assert settings_obj.client_cert == client_cert
113 client_cert = "/random/path"
115 username="fakeuser", client_cert=client_cert, non_interactive=True
/dports/www/chromium-legacy/chromium-88.0.4324.182/chromeos/network/onc/
H A Donc_certificate_pattern.cc85 onc::client_cert::kIssuerCAPEMs, base::Value::Type::LIST); in ReadFromONCDictionary()
94 onc::client_cert::kEnrollmentURI, base::Value::Type::LIST); in ReadFromONCDictionary()
103 dict.FindKeyOfType(onc::client_cert::kIssuer, in ReadFromONCDictionary()
105 onc::client_cert::kCommonName, onc::client_cert::kLocality, in ReadFromONCDictionary()
106 onc::client_cert::kOrganization, in ReadFromONCDictionary()
107 onc::client_cert::kOrganizationalUnit); in ReadFromONCDictionary()
110 dict.FindKeyOfType(onc::client_cert::kSubject, in ReadFromONCDictionary()
112 onc::client_cert::kCommonName, onc::client_cert::kLocality, in ReadFromONCDictionary()
113 onc::client_cert::kOrganization, in ReadFromONCDictionary()
114 onc::client_cert::kOrganizationalUnit); in ReadFromONCDictionary()
H A Donc_normalizer.cc121 ::onc::client_cert::kClientCertPattern, in NormalizeEAP()
122 clientcert_type == ::onc::client_cert::kPattern); in NormalizeEAP()
124 ::onc::client_cert::kClientCertRef, in NormalizeEAP()
125 clientcert_type == ::onc::client_cert::kRef); in NormalizeEAP()
142 RemoveEntryUnless(ipsec, ::onc::client_cert::kClientCertType, in NormalizeIPsec()
154 ::onc::client_cert::kClientCertPattern, in NormalizeIPsec()
157 ::onc::client_cert::kClientCertRef, in NormalizeIPsec()
158 clientcert_type == ::onc::client_cert::kRef); in NormalizeIPsec()
198 ::onc::client_cert::kClientCertPattern, in NormalizeOpenVPN()
201 ::onc::client_cert::kClientCertRef, in NormalizeOpenVPN()
[all …]
/dports/net/czmq4/czmq-4.2.1/examples/security/
H A Dironhouse2_v2.c21 zcert_t *client_cert = zcert_load ("client_cert.txt"); in client_task() local
22 assert (client_cert); in client_task()
29 zcert_apply (client_cert, client); in client_task()
41 zcert_destroy (&client_cert); in client_task()
81 zcert_t *client_cert = zcert_new (); in main() local
84 zcert_set_meta (client_cert, "name", "Client test certificate"); in main()
85 zcert_save_public (client_cert, ".curve/testcert.pub"); in main()
86 rc = zcert_save (client_cert, "client_cert.txt"); in main()
88 zcert_destroy (&client_cert); in main()
H A Dironhouse2.c35 zcert_t *client_cert = zcert_load ("client_cert.txt"); in client_task() local
36 assert (client_cert); in client_task()
41 zcert_apply (client_cert, client); in client_task()
58 zcert_destroy (&client_cert); in client_task()
98 zcert_t *client_cert = zcert_new (); in main() local
101 zcert_set_meta (client_cert, "name", "Client test certificate"); in main()
102 zcert_save_public (client_cert, ".curve/testcert.pub"); in main()
103 rc = zcert_save (client_cert, "client_cert.txt"); in main()
105 zcert_destroy (&client_cert); in main()
H A Dironhouse.c29 zcert_t *client_cert = zcert_new (); in main() local
31 zcert_set_meta (client_cert, "name", "Client test certificate"); in main()
32 zcert_save_public (client_cert, ".curve/testcert.pub"); in main()
46 zcert_apply (client_cert, client); in main()
57 zcert_destroy (&client_cert); in main()
/dports/security/gnutls/gnutls-3.6.16/tests/
H A Dcommon-cert-key-exchange.h49 #define try_x509_cli(name, client_prio, client_kx, server_sign_algo, client_sign_algo, client_cert)… argument
51 …&server_ca3_localhost_cert, &server_ca3_key, &cli_ca3_cert, &cli_ca3_key, client_cert, GNUTLS_CRT_…
53 #define try_rawpk_cli(name, client_prio, client_kx, server_sign_algo, client_sign_algo, client_cert argument
55 …&rawpk_public_key1, &rawpk_private_key1, &rawpk_public_key2, &rawpk_private_key2, client_cert, GNU…
73 unsigned client_cert,
86 unsigned client_cert, in try_with_key() argument
91 serv_cert, serv_key, cli_cert, cli_key, client_cert, 0, server_ctype, client_ctype); in try_with_key()
105 #define dtls_try_cli(name, client_prio, client_kx, server_sign_algo, client_sign_algo, client_cert)… argument
107 &server_ca3_localhost_cert, &server_ca3_key, &cli_ca3_cert, &cli_ca3_key, client_cert)
110 …ent_kx, server_sign_algo, client_sign_algo, serv_cert, serv_key, cli_cert, cli_key, client_cert, 0)
[all …]
/dports/devel/py-oslo.config/oslo.config-8.7.1/oslo_config/sources/
H A D_uri.py121 conf[group_name].client_cert,
142 def __init__(self, uri, ca_path=None, client_cert=None, client_key=None): argument
146 data = self._fetch_uri(uri, ca_path, client_cert, client_key)
154 def _fetch_uri(self, uri, ca_path, client_cert, client_key): argument
156 cert = (client_cert, client_key) if client_cert and client_key else \
157 client_cert
/dports/www/elinks/elinks-0.11.7/src/network/ssl/
H A Dsocket.c138 unsigned char *client_cert; in ssl_connect() local
140 client_cert = get_opt_str("connection.ssl.client_cert.file"); in ssl_connect()
141 if (!*client_cert) { in ssl_connect()
142 client_cert = getenv("X509_CLIENT_CERT"); in ssl_connect()
143 if (client_cert && !*client_cert) in ssl_connect()
144 client_cert = NULL; in ssl_connect()
147 if (client_cert) { in ssl_connect()
150 SSL_CTX_use_certificate_chain_file(ctx, client_cert); in ssl_connect()
151 SSL_CTX_use_PrivateKey_file(ctx, client_cert, in ssl_connect()
/dports/databases/pecl-cassandra/php-driver-61faee0/ext/src/SSLOptions/
H A DBuilder.c90 if (builder->client_cert) { in PHP_METHOD()
91 if (!file_get_contents(builder->client_cert, &contents, &len TSRMLS_CC)) in PHP_METHOD()
179 char *client_cert; in PHP_METHOD() local
188 php_stat(client_cert, client_cert_len, FS_IS_R, &readable TSRMLS_CC); in PHP_METHOD()
192 "The path '%s' doesn't exist or is not readable", client_cert); in PHP_METHOD()
198 if (builder->client_cert) in PHP_METHOD()
199 efree(builder->client_cert); in PHP_METHOD()
201 builder->client_cert = estrndup(client_cert, client_cert_len); in PHP_METHOD()
306 if (self->client_cert) in php_driver_ssl_builder_free()
307 efree(self->client_cert); in php_driver_ssl_builder_free()
[all …]
/dports/security/openssl-legacy-static/openssl-1.0.2u/demos/ssl/
H A Dinetdsrv.cpp31 X509* client_cert; in main() local
61 client_cert = SSL_get_peer_certificate (ssl); in main()
62 if (client_cert != NULL) { in main()
65 str = X509_NAME_oneline (X509_get_subject_name (client_cert)); in main()
70 str = X509_NAME_oneline (X509_get_issuer_name (client_cert)); in main()
78 X509_free (client_cert); in main()
H A Dserv.cpp49 X509* client_cert; in main() local
117 client_cert = SSL_get_peer_certificate (ssl); in main()
118 if (client_cert != NULL) { in main()
121 str = X509_NAME_oneline (X509_get_subject_name (client_cert), 0, 0); in main()
126 str = X509_NAME_oneline (X509_get_issuer_name (client_cert), 0, 0); in main()
134 X509_free (client_cert); in main()
/dports/security/openssl-unsafe/openssl-c9ba19c/demos/ssl/
H A Dinetdsrv.cpp31 X509* client_cert; in main() local
61 client_cert = SSL_get_peer_certificate (ssl); in main()
62 if (client_cert != NULL) { in main()
65 str = X509_NAME_oneline (X509_get_subject_name (client_cert)); in main()
70 str = X509_NAME_oneline (X509_get_issuer_name (client_cert)); in main()
78 X509_free (client_cert); in main()
H A Dserv.cpp49 X509* client_cert; in main() local
117 client_cert = SSL_get_peer_certificate (ssl); in main()
118 if (client_cert != NULL) { in main()
121 str = X509_NAME_oneline (X509_get_subject_name (client_cert), 0, 0); in main()
126 str = X509_NAME_oneline (X509_get_issuer_name (client_cert), 0, 0); in main()
134 X509_free (client_cert); in main()
/dports/sysutils/docker-compose/docker-compose-1.24.0/tests/unit/cli/
H A Ddocker_client_test.py73 client_cert = os.path.join(cert_path, 'cert.pem') variable in TLSConfigTestCase
102 '--tlscert': self.client_cert, '--tlskey': self.key
110 '--tlscert': self.client_cert, '--tlskey': self.key,
119 '--tlscert': self.client_cert, '--tlskey': self.key,
141 options = {'--tlscert': self.client_cert}
158 '--tlscert': '"{0}"'.format(self.client_cert),
164 assert result.cert == (self.client_cert, self.key)
181 assert result.cert == (self.client_cert, self.key)
192 '--tlscert': '"{0}"'.format(self.client_cert),
199 assert result.cert == (self.client_cert, self.key)
[all …]
/dports/security/wolfssl/wolfssl-5.1.0/scripts/
H A Dtrusted_peer.test29 client_cert=`pwd`/certs/client-cert.pem
94 client_cert=`pwd`/certs/client-ecc-cert.pem
121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $…
139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
142 ./examples/client/client -A "$wrong_ca" -E "$server_cert" -c "$client_cert" -p $port
156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
159 ./examples/client/client -A "$client_ca" -c "$client_cert" -p $port
262 cat "$client_cert" "$client_ca" > "$combined_cert"
266 ./examples/client/client -A "$client_ca" -c "$client_cert" -k "$client_key" -p $port
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/scripts/
H A Dtrusted_peer.test29 client_cert=`pwd`/certs/client-cert.pem
94 client_cert=`pwd`/certs/client-ecc-cert.pem
121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $…
139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
142 ./examples/client/client -A "$wrong_ca" -E "$server_cert" -c "$client_cert" -p $port
156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
159 ./examples/client/client -A "$client_ca" -c "$client_cert" -p $port
262 cat "$client_cert" "$client_ca" > "$combined_cert"
266 ./examples/client/client -A "$client_ca" -c "$client_cert" -k "$client_key" -p $port
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/scripts/
H A Dtrusted_peer.test29 client_cert=`pwd`/certs/client-cert.pem
94 client_cert=`pwd`/certs/client-ecc-cert.pem
121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $…
139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
142 ./examples/client/client -A "$wrong_ca" -E "$server_cert" -c "$client_cert" -p $port
156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
159 ./examples/client/client -A "$client_ca" -c "$client_cert" -p $port
262 cat "$client_cert" "$client_ca" > "$combined_cert"
266 ./examples/client/client -A "$client_ca" -c "$client_cert" -k "$client_key" -p $port
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/scripts/
H A Dtrusted_peer.test29 client_cert=`pwd`/certs/client-cert.pem
94 client_cert=`pwd`/certs/client-ecc-cert.pem
121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $…
139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
142 ./examples/client/client -A "$wrong_ca" -E "$server_cert" -c "$client_cert" -p $port
156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
159 ./examples/client/client -A "$client_ca" -c "$client_cert" -p $port
262 cat "$client_cert" "$client_ca" > "$combined_cert"
266 ./examples/client/client -A "$client_ca" -c "$client_cert" -k "$client_key" -p $port
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/scripts/
H A Dtrusted_peer.test29 client_cert=`pwd`/certs/client-cert.pem
94 client_cert=`pwd`/certs/client-ecc-cert.pem
121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $…
139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
142 ./examples/client/client -A "$wrong_ca" -E "$server_cert" -c "$client_cert" -p $port
156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r…
159 ./examples/client/client -A "$client_ca" -c "$client_cert" -p $port
262 cat "$client_cert" "$client_ca" > "$combined_cert"
266 ./examples/client/client -A "$client_ca" -c "$client_cert" -k "$client_key" -p $port
/dports/net/hostapd-devel/hostap-14ab4a816/tests/hwsim/
H A Dtest_suite_b.py68 client_cert="auth_serv/ec-user.pem",
148 client_cert="auth_serv/ec-user.pem",
189 client_cert="auth_serv/ec2-user.pem",
263 client_cert="auth_serv/ec2-user.pem",
322 client_cert="auth_serv/ec-user.pem",
356 client_cert="auth_serv/ec-user.pem",
475 client_cert="auth_serv/user.pem",
632 client_cert="auth_serv/ec2-user.pem",
650 client_cert="auth_serv/ec2-user.pem",
666 client_cert="auth_serv/ec2-user.pem",
[all …]
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/tests/hwsim/
H A Dtest_suite_b.py68 client_cert="auth_serv/ec-user.pem",
148 client_cert="auth_serv/ec-user.pem",
189 client_cert="auth_serv/ec2-user.pem",
263 client_cert="auth_serv/ec2-user.pem",
322 client_cert="auth_serv/ec-user.pem",
356 client_cert="auth_serv/ec-user.pem",
475 client_cert="auth_serv/user.pem",
632 client_cert="auth_serv/ec2-user.pem",
650 client_cert="auth_serv/ec2-user.pem",
666 client_cert="auth_serv/ec2-user.pem",
[all …]
/dports/ftp/wzdftpd/wzdftpd-0.8.3/libwzd-auth/
H A Dwzd_tls.c54 X509 * client_cert=NULL; in check_certificate() local
64 client_cert = SSL_get_peer_certificate(ssl_get_obj(context)); in check_certificate()
65 out_log(LEVEL_FLOOD, "[%p] = SSL_get_peer_certificate(...)\n", client_cert); in check_certificate()
67 if (!client_cert) return 0; /* no client cert */ in check_certificate()
78 name = X509_NAME_oneline (X509_get_subject_name (client_cert), 0, 0); in check_certificate()
94 X509_free(client_cert); in check_certificate()
/dports/www/chromium-legacy/chromium-88.0.4324.182/chromeos/network/
H A Dnetwork_cert_migrator.cc99 chromeos::client_cert::ConfigType config_type = in MigrateClientCertProperties()
100 chromeos::client_cert::CONFIG_TYPE_NONE; in MigrateClientCertProperties()
101 chromeos::client_cert::GetClientCertFromShillProperties( in MigrateClientCertProperties()
103 if (config_type == chromeos::client_cert::CONFIG_TYPE_NONE || in MigrateClientCertProperties()
109 if (config_type == chromeos::client_cert::CONFIG_TYPE_OPENVPN) in MigrateClientCertProperties()
118 chromeos::client_cert::SetEmptyShillProperties(config_type, in MigrateClientCertProperties()
130 chromeos::client_cert::SetShillProperties( in MigrateClientCertProperties()
H A Dclient_cert_resolver.cc80 client_cert::ClientCertConfig cert_config;
123 const client_cert::ClientCertConfig& client_cert_config) { in ShouldResolveCert()
155 client_cert::ConfigType cert_config_type;
222 const client_cert::ClientCertConfig& client_cert_config) in MatchCertWithCertConfig()
240 if (cert_config.client_cert_type == ::onc::client_cert::kRef) { in operator ()()
250 const client_cert::ClientCertConfig cert_config;
463 const client_cert::ConfigType client_cert_type, in ResolveClientCertificateSync()
464 const client_cert::ClientCertConfig& client_cert_config, in ResolveClientCertificateSync()
504 client_cert::SetShillProperties( in ResolveClientCertificateSync()
633 client_cert::ClientCertConfig cert_config; in ResolveNetworks()
[all …]

12345678910>>...44