/dports/devel/py-twine/twine-3.7.0/tests/ |
H A D | test_settings.py | 49 assert s.client_cert is None 88 def test_password_is_required_if_no_client_cert(client_cert, entered_password): argument 90 settings_obj = settings.Settings(username="fakeuser", client_cert=client_cert) 96 client_cert = "/random/path" 98 username="fakeuser", password="anything", client_cert=client_cert 101 assert settings_obj.client_cert == client_cert 113 client_cert = "/random/path" 115 username="fakeuser", client_cert=client_cert, non_interactive=True
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/chromeos/network/onc/ |
H A D | onc_certificate_pattern.cc | 85 onc::client_cert::kIssuerCAPEMs, base::Value::Type::LIST); in ReadFromONCDictionary() 94 onc::client_cert::kEnrollmentURI, base::Value::Type::LIST); in ReadFromONCDictionary() 103 dict.FindKeyOfType(onc::client_cert::kIssuer, in ReadFromONCDictionary() 105 onc::client_cert::kCommonName, onc::client_cert::kLocality, in ReadFromONCDictionary() 106 onc::client_cert::kOrganization, in ReadFromONCDictionary() 107 onc::client_cert::kOrganizationalUnit); in ReadFromONCDictionary() 110 dict.FindKeyOfType(onc::client_cert::kSubject, in ReadFromONCDictionary() 112 onc::client_cert::kCommonName, onc::client_cert::kLocality, in ReadFromONCDictionary() 113 onc::client_cert::kOrganization, in ReadFromONCDictionary() 114 onc::client_cert::kOrganizationalUnit); in ReadFromONCDictionary()
|
H A D | onc_normalizer.cc | 121 ::onc::client_cert::kClientCertPattern, in NormalizeEAP() 122 clientcert_type == ::onc::client_cert::kPattern); in NormalizeEAP() 124 ::onc::client_cert::kClientCertRef, in NormalizeEAP() 125 clientcert_type == ::onc::client_cert::kRef); in NormalizeEAP() 142 RemoveEntryUnless(ipsec, ::onc::client_cert::kClientCertType, in NormalizeIPsec() 154 ::onc::client_cert::kClientCertPattern, in NormalizeIPsec() 157 ::onc::client_cert::kClientCertRef, in NormalizeIPsec() 158 clientcert_type == ::onc::client_cert::kRef); in NormalizeIPsec() 198 ::onc::client_cert::kClientCertPattern, in NormalizeOpenVPN() 201 ::onc::client_cert::kClientCertRef, in NormalizeOpenVPN() [all …]
|
/dports/net/czmq4/czmq-4.2.1/examples/security/ |
H A D | ironhouse2_v2.c | 21 zcert_t *client_cert = zcert_load ("client_cert.txt"); in client_task() local 22 assert (client_cert); in client_task() 29 zcert_apply (client_cert, client); in client_task() 41 zcert_destroy (&client_cert); in client_task() 81 zcert_t *client_cert = zcert_new (); in main() local 84 zcert_set_meta (client_cert, "name", "Client test certificate"); in main() 85 zcert_save_public (client_cert, ".curve/testcert.pub"); in main() 86 rc = zcert_save (client_cert, "client_cert.txt"); in main() 88 zcert_destroy (&client_cert); in main()
|
H A D | ironhouse2.c | 35 zcert_t *client_cert = zcert_load ("client_cert.txt"); in client_task() local 36 assert (client_cert); in client_task() 41 zcert_apply (client_cert, client); in client_task() 58 zcert_destroy (&client_cert); in client_task() 98 zcert_t *client_cert = zcert_new (); in main() local 101 zcert_set_meta (client_cert, "name", "Client test certificate"); in main() 102 zcert_save_public (client_cert, ".curve/testcert.pub"); in main() 103 rc = zcert_save (client_cert, "client_cert.txt"); in main() 105 zcert_destroy (&client_cert); in main()
|
H A D | ironhouse.c | 29 zcert_t *client_cert = zcert_new (); in main() local 31 zcert_set_meta (client_cert, "name", "Client test certificate"); in main() 32 zcert_save_public (client_cert, ".curve/testcert.pub"); in main() 46 zcert_apply (client_cert, client); in main() 57 zcert_destroy (&client_cert); in main()
|
/dports/security/gnutls/gnutls-3.6.16/tests/ |
H A D | common-cert-key-exchange.h | 49 #define try_x509_cli(name, client_prio, client_kx, server_sign_algo, client_sign_algo, client_cert)… argument 51 …&server_ca3_localhost_cert, &server_ca3_key, &cli_ca3_cert, &cli_ca3_key, client_cert, GNUTLS_CRT_… 53 #define try_rawpk_cli(name, client_prio, client_kx, server_sign_algo, client_sign_algo, client_cert… argument 55 …&rawpk_public_key1, &rawpk_private_key1, &rawpk_public_key2, &rawpk_private_key2, client_cert, GNU… 73 unsigned client_cert, 86 unsigned client_cert, in try_with_key() argument 91 serv_cert, serv_key, cli_cert, cli_key, client_cert, 0, server_ctype, client_ctype); in try_with_key() 105 #define dtls_try_cli(name, client_prio, client_kx, server_sign_algo, client_sign_algo, client_cert)… argument 107 &server_ca3_localhost_cert, &server_ca3_key, &cli_ca3_cert, &cli_ca3_key, client_cert) 110 …ent_kx, server_sign_algo, client_sign_algo, serv_cert, serv_key, cli_cert, cli_key, client_cert, 0) [all …]
|
/dports/devel/py-oslo.config/oslo.config-8.7.1/oslo_config/sources/ |
H A D | _uri.py | 121 conf[group_name].client_cert, 142 def __init__(self, uri, ca_path=None, client_cert=None, client_key=None): argument 146 data = self._fetch_uri(uri, ca_path, client_cert, client_key) 154 def _fetch_uri(self, uri, ca_path, client_cert, client_key): argument 156 cert = (client_cert, client_key) if client_cert and client_key else \ 157 client_cert
|
/dports/www/elinks/elinks-0.11.7/src/network/ssl/ |
H A D | socket.c | 138 unsigned char *client_cert; in ssl_connect() local 140 client_cert = get_opt_str("connection.ssl.client_cert.file"); in ssl_connect() 141 if (!*client_cert) { in ssl_connect() 142 client_cert = getenv("X509_CLIENT_CERT"); in ssl_connect() 143 if (client_cert && !*client_cert) in ssl_connect() 144 client_cert = NULL; in ssl_connect() 147 if (client_cert) { in ssl_connect() 150 SSL_CTX_use_certificate_chain_file(ctx, client_cert); in ssl_connect() 151 SSL_CTX_use_PrivateKey_file(ctx, client_cert, in ssl_connect()
|
/dports/databases/pecl-cassandra/php-driver-61faee0/ext/src/SSLOptions/ |
H A D | Builder.c | 90 if (builder->client_cert) { in PHP_METHOD() 91 if (!file_get_contents(builder->client_cert, &contents, &len TSRMLS_CC)) in PHP_METHOD() 179 char *client_cert; in PHP_METHOD() local 188 php_stat(client_cert, client_cert_len, FS_IS_R, &readable TSRMLS_CC); in PHP_METHOD() 192 "The path '%s' doesn't exist or is not readable", client_cert); in PHP_METHOD() 198 if (builder->client_cert) in PHP_METHOD() 199 efree(builder->client_cert); in PHP_METHOD() 201 builder->client_cert = estrndup(client_cert, client_cert_len); in PHP_METHOD() 306 if (self->client_cert) in php_driver_ssl_builder_free() 307 efree(self->client_cert); in php_driver_ssl_builder_free() [all …]
|
/dports/security/openssl-legacy-static/openssl-1.0.2u/demos/ssl/ |
H A D | inetdsrv.cpp | 31 X509* client_cert; in main() local 61 client_cert = SSL_get_peer_certificate (ssl); in main() 62 if (client_cert != NULL) { in main() 65 str = X509_NAME_oneline (X509_get_subject_name (client_cert)); in main() 70 str = X509_NAME_oneline (X509_get_issuer_name (client_cert)); in main() 78 X509_free (client_cert); in main()
|
H A D | serv.cpp | 49 X509* client_cert; in main() local 117 client_cert = SSL_get_peer_certificate (ssl); in main() 118 if (client_cert != NULL) { in main() 121 str = X509_NAME_oneline (X509_get_subject_name (client_cert), 0, 0); in main() 126 str = X509_NAME_oneline (X509_get_issuer_name (client_cert), 0, 0); in main() 134 X509_free (client_cert); in main()
|
/dports/security/openssl-unsafe/openssl-c9ba19c/demos/ssl/ |
H A D | inetdsrv.cpp | 31 X509* client_cert; in main() local 61 client_cert = SSL_get_peer_certificate (ssl); in main() 62 if (client_cert != NULL) { in main() 65 str = X509_NAME_oneline (X509_get_subject_name (client_cert)); in main() 70 str = X509_NAME_oneline (X509_get_issuer_name (client_cert)); in main() 78 X509_free (client_cert); in main()
|
H A D | serv.cpp | 49 X509* client_cert; in main() local 117 client_cert = SSL_get_peer_certificate (ssl); in main() 118 if (client_cert != NULL) { in main() 121 str = X509_NAME_oneline (X509_get_subject_name (client_cert), 0, 0); in main() 126 str = X509_NAME_oneline (X509_get_issuer_name (client_cert), 0, 0); in main() 134 X509_free (client_cert); in main()
|
/dports/sysutils/docker-compose/docker-compose-1.24.0/tests/unit/cli/ |
H A D | docker_client_test.py | 73 client_cert = os.path.join(cert_path, 'cert.pem') variable in TLSConfigTestCase 102 '--tlscert': self.client_cert, '--tlskey': self.key 110 '--tlscert': self.client_cert, '--tlskey': self.key, 119 '--tlscert': self.client_cert, '--tlskey': self.key, 141 options = {'--tlscert': self.client_cert} 158 '--tlscert': '"{0}"'.format(self.client_cert), 164 assert result.cert == (self.client_cert, self.key) 181 assert result.cert == (self.client_cert, self.key) 192 '--tlscert': '"{0}"'.format(self.client_cert), 199 assert result.cert == (self.client_cert, self.key) [all …]
|
/dports/security/wolfssl/wolfssl-5.1.0/scripts/ |
H A D | trusted_peer.test | 29 client_cert=`pwd`/certs/client-cert.pem 94 client_cert=`pwd`/certs/client-ecc-cert.pem 121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $… 139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 142 ./examples/client/client -A "$wrong_ca" -E "$server_cert" -c "$client_cert" -p $port 156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 159 ./examples/client/client -A "$client_ca" -c "$client_cert" -p $port 262 cat "$client_cert" "$client_ca" > "$combined_cert" 266 ./examples/client/client -A "$client_ca" -c "$client_cert" -k "$client_key" -p $port
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/scripts/ |
H A D | trusted_peer.test | 29 client_cert=`pwd`/certs/client-cert.pem 94 client_cert=`pwd`/certs/client-ecc-cert.pem 121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $… 139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 142 ./examples/client/client -A "$wrong_ca" -E "$server_cert" -c "$client_cert" -p $port 156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 159 ./examples/client/client -A "$client_ca" -c "$client_cert" -p $port 262 cat "$client_cert" "$client_ca" > "$combined_cert" 266 ./examples/client/client -A "$client_ca" -c "$client_cert" -k "$client_key" -p $port
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/scripts/ |
H A D | trusted_peer.test | 29 client_cert=`pwd`/certs/client-cert.pem 94 client_cert=`pwd`/certs/client-ecc-cert.pem 121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $… 139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 142 ./examples/client/client -A "$wrong_ca" -E "$server_cert" -c "$client_cert" -p $port 156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 159 ./examples/client/client -A "$client_ca" -c "$client_cert" -p $port 262 cat "$client_cert" "$client_ca" > "$combined_cert" 266 ./examples/client/client -A "$client_ca" -c "$client_cert" -k "$client_key" -p $port
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/scripts/ |
H A D | trusted_peer.test | 29 client_cert=`pwd`/certs/client-cert.pem 94 client_cert=`pwd`/certs/client-ecc-cert.pem 121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $… 139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 142 ./examples/client/client -A "$wrong_ca" -E "$server_cert" -c "$client_cert" -p $port 156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 159 ./examples/client/client -A "$client_ca" -c "$client_cert" -p $port 262 cat "$client_cert" "$client_ca" > "$combined_cert" 266 ./examples/client/client -A "$client_ca" -c "$client_cert" -k "$client_key" -p $port
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/scripts/ |
H A D | trusted_peer.test | 29 client_cert=`pwd`/certs/client-cert.pem 94 client_cert=`pwd`/certs/client-ecc-cert.pem 121 ./examples/server/server -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$ready_file" -p $… 139 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 142 ./examples/client/client -A "$wrong_ca" -E "$server_cert" -c "$client_cert" -p $port 156 ./examples/server/server -A "$wrong_ca" -E "$client_cert" -c "$server_cert" -k "$server_key" -R "$r… 159 ./examples/client/client -A "$client_ca" -c "$client_cert" -p $port 262 cat "$client_cert" "$client_ca" > "$combined_cert" 266 ./examples/client/client -A "$client_ca" -c "$client_cert" -k "$client_key" -p $port
|
/dports/net/hostapd-devel/hostap-14ab4a816/tests/hwsim/ |
H A D | test_suite_b.py | 68 client_cert="auth_serv/ec-user.pem", 148 client_cert="auth_serv/ec-user.pem", 189 client_cert="auth_serv/ec2-user.pem", 263 client_cert="auth_serv/ec2-user.pem", 322 client_cert="auth_serv/ec-user.pem", 356 client_cert="auth_serv/ec-user.pem", 475 client_cert="auth_serv/user.pem", 632 client_cert="auth_serv/ec2-user.pem", 650 client_cert="auth_serv/ec2-user.pem", 666 client_cert="auth_serv/ec2-user.pem", [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/tests/hwsim/ |
H A D | test_suite_b.py | 68 client_cert="auth_serv/ec-user.pem", 148 client_cert="auth_serv/ec-user.pem", 189 client_cert="auth_serv/ec2-user.pem", 263 client_cert="auth_serv/ec2-user.pem", 322 client_cert="auth_serv/ec-user.pem", 356 client_cert="auth_serv/ec-user.pem", 475 client_cert="auth_serv/user.pem", 632 client_cert="auth_serv/ec2-user.pem", 650 client_cert="auth_serv/ec2-user.pem", 666 client_cert="auth_serv/ec2-user.pem", [all …]
|
/dports/ftp/wzdftpd/wzdftpd-0.8.3/libwzd-auth/ |
H A D | wzd_tls.c | 54 X509 * client_cert=NULL; in check_certificate() local 64 client_cert = SSL_get_peer_certificate(ssl_get_obj(context)); in check_certificate() 65 out_log(LEVEL_FLOOD, "[%p] = SSL_get_peer_certificate(...)\n", client_cert); in check_certificate() 67 if (!client_cert) return 0; /* no client cert */ in check_certificate() 78 name = X509_NAME_oneline (X509_get_subject_name (client_cert), 0, 0); in check_certificate() 94 X509_free(client_cert); in check_certificate()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/chromeos/network/ |
H A D | network_cert_migrator.cc | 99 chromeos::client_cert::ConfigType config_type = in MigrateClientCertProperties() 100 chromeos::client_cert::CONFIG_TYPE_NONE; in MigrateClientCertProperties() 101 chromeos::client_cert::GetClientCertFromShillProperties( in MigrateClientCertProperties() 103 if (config_type == chromeos::client_cert::CONFIG_TYPE_NONE || in MigrateClientCertProperties() 109 if (config_type == chromeos::client_cert::CONFIG_TYPE_OPENVPN) in MigrateClientCertProperties() 118 chromeos::client_cert::SetEmptyShillProperties(config_type, in MigrateClientCertProperties() 130 chromeos::client_cert::SetShillProperties( in MigrateClientCertProperties()
|
H A D | client_cert_resolver.cc | 80 client_cert::ClientCertConfig cert_config; 123 const client_cert::ClientCertConfig& client_cert_config) { in ShouldResolveCert() 155 client_cert::ConfigType cert_config_type; 222 const client_cert::ClientCertConfig& client_cert_config) in MatchCertWithCertConfig() 240 if (cert_config.client_cert_type == ::onc::client_cert::kRef) { in operator ()() 250 const client_cert::ClientCertConfig cert_config; 463 const client_cert::ConfigType client_cert_type, in ResolveClientCertificateSync() 464 const client_cert::ClientCertConfig& client_cert_config, in ResolveClientCertificateSync() 504 client_cert::SetShillProperties( in ResolveClientCertificateSync() 633 client_cert::ClientCertConfig cert_config; in ResolveNetworks() [all …]
|