/dports/dns/dnscrypt-wrapper/dnscrypt-wrapper-0.4.2/ |
H A D | cert.h | 42 int cert_sign(struct SignedCert *signed_cert,
|
H A D | cert.c | 44 cert_sign(struct SignedCert *signed_cert, const uint8_t *provider_secretkey) in cert_sign() function
|
H A D | main.c | 733 if (!signed_cert || cert_sign(signed_cert, c.provider_secretkey) != 0) { in main()
|
/dports/security/zeronet/ZeroNet-0.7.1/src/User/ |
H A D | User.py | 125 def addCert(self, auth_address, domain, auth_type, auth_user_name, cert_sign): argument 133 "cert_sign": cert_sign
|
/dports/www/varnish6/varnish-cache-varnish-6.6.2/vmod/ |
H A D | vmod_proxy.vcc | 112 $Function STRING cert_sign() 118 set req.http.cert-sign = proxy.cert_sign();
|
/dports/www/squid/squid-4.15/src/ |
H A D | cache_cf.cc | 210 static void parse_sslproxy_cert_sign(sslproxy_cert_sign **cert_sign); 212 static void free_sslproxy_cert_sign(sslproxy_cert_sign **cert_sign); 4488 static void parse_sslproxy_cert_sign(sslproxy_cert_sign **cert_sign) in parse_sslproxy_cert_sign() argument 4513 while (*cert_sign) in parse_sslproxy_cert_sign() 4514 cert_sign = &(*cert_sign)->next; in parse_sslproxy_cert_sign() 4516 *cert_sign = cs; in parse_sslproxy_cert_sign() 4522 for (cs = cert_sign; cs != NULL; cs = cs->next) { in dump_sslproxy_cert_sign() 4531 static void free_sslproxy_cert_sign(sslproxy_cert_sign **cert_sign) in free_sslproxy_cert_sign() argument 4533 while (*cert_sign) { in free_sslproxy_cert_sign() 4534 sslproxy_cert_sign *cs = *cert_sign; in free_sslproxy_cert_sign() [all …]
|
H A D | SquidConfig.h | 514 sslproxy_cert_sign *cert_sign; member
|
H A D | client_side.cc | 2931 for (sslproxy_cert_sign *sg = Config.ssl_client.cert_sign; sg != NULL; sg = sg->next) { in buildSslCertGenerationParams()
|
H A D | cf.data.pre | 3032 LOC: Config.ssl_client.cert_sign
|
/dports/www/varnish6/varnish-cache-varnish-6.6.2/bin/varnishtest/tests/ |
H A D | o00005.vtc | 25 set resp.http.sign = proxy.cert_sign();
|
/dports/net/ntp/ntp-4.2.8p15/ntpd/ |
H A D | ntp_crypto.c | 202 static int cert_sign (struct exten *, struct value *); 1320 if ((rval = cert_sign(ep, &vtemp)) == XEVNT_OK) { in crypto_xmit() 3149 cert_sign( in cert_sign() function
|
/dports/security/softether-devel/v4.36-9754/src/Cedar/ |
H A D | SM.c | 8560 UINT cert_sign; in SmCreateCertDlgInit() local 8612 cert_sign = MsRegReadInt(REG_CURRENT_USER, SM_CERT_REG_KEY, "Sign"); in SmCreateCertDlgInit() 8615 Check(hWnd, R_ROOT_CERT, cert_sign ? false : true); in SmCreateCertDlgInit() 8616 Check(hWnd, R_SIGNED_CERT, cert_sign ? true : false); in SmCreateCertDlgInit()
|
/dports/security/softether/v4.38-9760/src/Cedar/ |
H A D | SM.c | 8560 UINT cert_sign; in SmCreateCertDlgInit() local 8612 cert_sign = MsRegReadInt(REG_CURRENT_USER, SM_CERT_REG_KEY, "Sign"); in SmCreateCertDlgInit() 8615 Check(hWnd, R_ROOT_CERT, cert_sign ? false : true); in SmCreateCertDlgInit() 8616 Check(hWnd, R_SIGNED_CERT, cert_sign ? true : false); in SmCreateCertDlgInit()
|
/dports/security/softether5/SoftEtherVPN-5.02.5180/src/Cedar/ |
H A D | SM.c | 8427 UINT cert_sign; in SmCreateCertDlgInit() local 8479 cert_sign = MsRegReadInt(REG_CURRENT_USER, SM_CERT_REG_KEY, "Sign"); in SmCreateCertDlgInit() 8482 Check(hWnd, R_ROOT_CERT, cert_sign ? false : true); in SmCreateCertDlgInit() 8483 Check(hWnd, R_SIGNED_CERT, cert_sign ? true : false); in SmCreateCertDlgInit()
|
/dports/security/wolfssl/wolfssl-5.1.0/ |
H A D | ChangeLog.md | 1101 * Allow adding CAs for root CA's over the wire that do not have the extended key usage cert_sign set
|
/dports/databases/mariadb105-client/mariadb-10.5.15/extra/wolfssl/wolfssl/ |
H A D | ChangeLog.md | 1107 * Allow adding CAs for root CA's over the wire that do not have the extended key usage cert_sign set
|
/dports/databases/mariadb104-server/mariadb-10.4.24/extra/wolfssl/wolfssl/ |
H A D | ChangeLog.md | 1107 * Allow adding CAs for root CA's over the wire that do not have the extended key usage cert_sign set
|
/dports/databases/mariadb105-server/mariadb-10.5.15/extra/wolfssl/wolfssl/ |
H A D | ChangeLog.md | 1107 * Allow adding CAs for root CA's over the wire that do not have the extended key usage cert_sign set
|
/dports/databases/mariadb104-client/mariadb-10.4.24/extra/wolfssl/wolfssl/ |
H A D | ChangeLog.md | 1107 * Allow adding CAs for root CA's over the wire that do not have the extended key usage cert_sign set
|