Home
last modified time | relevance | path

Searched refs:certs (Results 1 – 17 of 17) sorted by relevance

/plugin/authgoogle/google/auth/
H A DGoogle_P12Signer.php37 $certs = array();
38 if (!openssl_pkcs12_read($p12, $certs, $password)) {
45 if (!array_key_exists("pkey", $certs) || !$certs["pkey"]) {
48 $this->privateKey = openssl_pkey_get_private($certs["pkey"]);
H A DGoogle_OAuth2.php338 $certs = json_decode($request->getResponseBody(), true);
339 if ($certs) {
340 return $certs;
364 $certs = $this->getFederatedSignonCerts();
368 return $this->verifySignedJwtWithCerts($id_token, $certs, $audience);
373 function verifySignedJwtWithCerts($jwt, $certs, $required_audience) { argument
396 foreach ($certs as $keyName => $pem) {
/plugin/authgooglesheets/vendor/google/auth/src/
H A DAccessToken.php131 'unrecognized "alg" in certs, expected ES256 or RS256'
168 'certs expects "alg" to be set'
175 'More than one alg detected in certs'
241 'certs expects "kid" to be set'
246 'RSA certs expects "n" and "e" to be set'
330 $certs = $cacheItem ? $cacheItem->get() : null; // @phpstan-ignore-line
333 if (!$certs) {
334 $certs = $this->retrieveCertsFromLocation($location, $options);
339 if (!isset($certs['keys'])) {
354 $cacheItem->set($certs);
[all …]
/plugin/authgooglesheets/vendor/google/apiclient/src/AccessToken/
H A DVerify.php100 $certs = $this->getFederatedSignOnCerts();
101 foreach ($certs as $cert) {
186 $certs = null;
189 $certs = $cacheItem->get();
193 if (!$certs) {
194 $certs = $this->retrieveCertsFromLocation(
200 $cacheItem->set($certs);
205 if (!isset($certs['keys'])) {
211 return $certs['keys'];
/plugin/elasticsearch/vendor/elasticsearch/elasticsearch/.ci/
H A Drun-elasticsearch.sh49 --env xpack.security.http.ssl.key=certs/testnode.key
50 --env xpack.security.http.ssl.certificate=certs/testnode.crt
51 --env xpack.security.http.ssl.certificate_authorities=certs/ca.crt
54 --env xpack.security.transport.ssl.key=certs/testnode.key
55 --env xpack.security.transport.ssl.certificate=certs/testnode.crt
56 --env xpack.security.transport.ssl.certificate_authorities=certs/ca.crt
60 --volume $ssl_cert:/usr/share/elasticsearch/config/certs/testnode.crt
61 --volume $ssl_key:/usr/share/elasticsearch/config/certs/testnode.key
62 --volume $ssl_ca:/usr/share/elasticsearch/config/certs/ca.crt
66 cert_validation_flags="--insecure --cacert /usr/share/elasticsearch/config/certs/c
[all...]
/plugin/authgooglesheets/vendor/google/apiclient-services/src/SQLAdmin/
H A DInstancesListServerCasResponse.php51 public function setCerts($certs) argument
53 $this->certs = $certs;
60 return $this->certs;
/plugin/file2dw/docker/proxy/
H A Ddocker-compose.yml23 - "/path/to/certs:/etc/nginx/certs:ro" # REQUIRED: Change "left" path
40 …- "/path/to/certs:/etc/nginx/certs:ro" # REQUIRED: Change "left" path. Use the same path as in ngi…
59 …- "/path/to/certs:/etc/nginx/certs:rw" # REQUIRED: Change "left" path. Use the same path as in ngi…
/plugin/letsencrypt/
H A Dadmin.php202 $form->addFieldsetOpen($this->getLang('get certs'));
203 $form->addButton('sign', $this->getLang('get certs'))->attr('type', 'submit')->val(1);
/plugin/quickstats/GEOIP/vendor/maxmind/web-service-common/
H A DCHANGELOG.md17 * On Mac OS X when using a curl built against SecureTransport, the certs
73 * If this library is inside a phar archive, the CA certs are copied out of the
/plugin/adfs/phpsaml/extlib/xmlseclibs/
H A Dxmlseclibs.php1158 $certs = XMLSecurityDSig::staticGet509XCerts($cert, $isPEMFormat);
1159 if (! empty($certs)) {
1160 return $certs[0];
1165 static function staticGet509XCerts($certs, $isPEMFormat=true) { argument
1169 $arCert = explode("\n", $certs);
1188 return array($certs);
1203 $certs = XMLSecurityDSig::staticGet509XCerts($cert, $isPEMFormat);
1222 foreach ($certs as $X509Cert){
/plugin/adfs/phpsaml/
H A DREADME.md136 **Important** In this option, the x509 certs must be stored at `vendor/onelogin/php-saml/certs`
186 The new OneLogin SAML Toolkit contains different folders (`certs`, `endpoints`,
191 #### `certs/` ####
361 // the certs folder. But we can also provide them with the following parameters
476 False || True (use sp certs) || array (
1250 - `'signing'`. An array of certs that will be used to validate IdP signature
1421 * `checkSPCerts` - Checks if the x509 certs of the SP exists and are valid.
/plugin/elasticsearch/vendor/elasticsearch/elasticsearch/docs/
H A Dconnecting.asciidoc161 Self-signed certificates are certs that have not been signed by a public CA.
/plugin/authgooglesheets/
H A Dcomposer.lock103 … "cache/filesystem-adapter": "For caching certs and tokens (using Google\\Client::setCache)"
/plugin/diagramsnet/lib/WEB-INF/lib/
H A Dhttpclient-4.5.5.jarMETA-INF/MANIFEST.MF META-INF/ org/ org/apache/ org/ ...
/plugin/jdraw/lib/
H A Dhttpclient-4.0.1.jarMETA-INF/MANIFEST.MF META-INF/HAMMURAP.SF META-INF/HAMMURAP ...
/plugin/jcapture/lib/
H A Dhttpclient-4.0.1.jarMETA-INF/MANIFEST.MF META-INF/HAMMURAP.SF META-INF/HAMMURAP ...
/plugin/authgooglesheets/vendor/guzzlehttp/guzzle/
H A DCHANGELOG.md1084 * Now shipping with cURL's CA certs and using it by default