Home
last modified time | relevance | path

Searched refs:cert_sign (Results 1 – 19 of 19) sorted by relevance

/dports/dns/dnscrypt-wrapper/dnscrypt-wrapper-0.4.2/
H A Dcert.h42 int cert_sign(struct SignedCert *signed_cert,
H A Dcert.c44 cert_sign(struct SignedCert *signed_cert, const uint8_t *provider_secretkey) in cert_sign() function
H A Dmain.c733 if (!signed_cert || cert_sign(signed_cert, c.provider_secretkey) != 0) { in main()
/dports/security/zeronet/ZeroNet-0.7.1/src/User/
H A DUser.py125 def addCert(self, auth_address, domain, auth_type, auth_user_name, cert_sign): argument
133 "cert_sign": cert_sign
/dports/www/varnish6/varnish-cache-varnish-6.6.2/vmod/
H A Dvmod_proxy.vcc112 $Function STRING cert_sign()
118 set req.http.cert-sign = proxy.cert_sign();
/dports/www/squid/squid-4.15/src/
H A Dcache_cf.cc210 static void parse_sslproxy_cert_sign(sslproxy_cert_sign **cert_sign);
212 static void free_sslproxy_cert_sign(sslproxy_cert_sign **cert_sign);
4488 static void parse_sslproxy_cert_sign(sslproxy_cert_sign **cert_sign) in parse_sslproxy_cert_sign() argument
4513 while (*cert_sign) in parse_sslproxy_cert_sign()
4514 cert_sign = &(*cert_sign)->next; in parse_sslproxy_cert_sign()
4516 *cert_sign = cs; in parse_sslproxy_cert_sign()
4522 for (cs = cert_sign; cs != NULL; cs = cs->next) { in dump_sslproxy_cert_sign()
4531 static void free_sslproxy_cert_sign(sslproxy_cert_sign **cert_sign) in free_sslproxy_cert_sign() argument
4533 while (*cert_sign) { in free_sslproxy_cert_sign()
4534 sslproxy_cert_sign *cs = *cert_sign; in free_sslproxy_cert_sign()
[all …]
H A DSquidConfig.h514 sslproxy_cert_sign *cert_sign; member
H A Dclient_side.cc2931 for (sslproxy_cert_sign *sg = Config.ssl_client.cert_sign; sg != NULL; sg = sg->next) { in buildSslCertGenerationParams()
H A Dcf.data.pre3032 LOC: Config.ssl_client.cert_sign
/dports/www/varnish6/varnish-cache-varnish-6.6.2/bin/varnishtest/tests/
H A Do00005.vtc25 set resp.http.sign = proxy.cert_sign();
/dports/net/ntp/ntp-4.2.8p15/ntpd/
H A Dntp_crypto.c202 static int cert_sign (struct exten *, struct value *);
1320 if ((rval = cert_sign(ep, &vtemp)) == XEVNT_OK) { in crypto_xmit()
3149 cert_sign( in cert_sign() function
/dports/security/softether-devel/v4.36-9754/src/Cedar/
H A DSM.c8560 UINT cert_sign; in SmCreateCertDlgInit() local
8612 cert_sign = MsRegReadInt(REG_CURRENT_USER, SM_CERT_REG_KEY, "Sign"); in SmCreateCertDlgInit()
8615 Check(hWnd, R_ROOT_CERT, cert_sign ? false : true); in SmCreateCertDlgInit()
8616 Check(hWnd, R_SIGNED_CERT, cert_sign ? true : false); in SmCreateCertDlgInit()
/dports/security/softether/v4.38-9760/src/Cedar/
H A DSM.c8560 UINT cert_sign; in SmCreateCertDlgInit() local
8612 cert_sign = MsRegReadInt(REG_CURRENT_USER, SM_CERT_REG_KEY, "Sign"); in SmCreateCertDlgInit()
8615 Check(hWnd, R_ROOT_CERT, cert_sign ? false : true); in SmCreateCertDlgInit()
8616 Check(hWnd, R_SIGNED_CERT, cert_sign ? true : false); in SmCreateCertDlgInit()
/dports/security/softether5/SoftEtherVPN-5.02.5180/src/Cedar/
H A DSM.c8427 UINT cert_sign; in SmCreateCertDlgInit() local
8479 cert_sign = MsRegReadInt(REG_CURRENT_USER, SM_CERT_REG_KEY, "Sign"); in SmCreateCertDlgInit()
8482 Check(hWnd, R_ROOT_CERT, cert_sign ? false : true); in SmCreateCertDlgInit()
8483 Check(hWnd, R_SIGNED_CERT, cert_sign ? true : false); in SmCreateCertDlgInit()
/dports/security/wolfssl/wolfssl-5.1.0/
H A DChangeLog.md1101 * Allow adding CAs for root CA's over the wire that do not have the extended key usage cert_sign set
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/
H A DChangeLog.md1107 * Allow adding CAs for root CA's over the wire that do not have the extended key usage cert_sign set
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/
H A DChangeLog.md1107 * Allow adding CAs for root CA's over the wire that do not have the extended key usage cert_sign set
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/
H A DChangeLog.md1107 * Allow adding CAs for root CA's over the wire that do not have the extended key usage cert_sign set
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/
H A DChangeLog.md1107 * Allow adding CAs for root CA's over the wire that do not have the extended key usage cert_sign set