Searched refs:CAfile (Results 26 - 50 of 92) sorted by relevance

1234

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Dx509.c152 static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest,
175 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local
308 CAfile= *(++argv);
489 { CAkeyfile=CAfile; }
637 xca=load_cert(bio_err,CAfile,CAformat,NULL,e,"CA Certificate");
949 if (!x509_certify(ctx,CAfile,digest,x,xca,
1080 static ASN1_INTEGER *x509_load_serial(char *CAfile, char *serialfile, int create) argument
1088 ?(strlen(CAfile)+strlen(POSTFIX)+1)
1094 BUF_strlcpy(buf,CAfile,len);
1120 static int x509_certify(X509_STORE *ctx, char *CAfile, cons argument
[all...]
H A Dcrl.c89 " -CAfile name - verify CRL using certificates in file \"name\"\n",
104 char *CAfile = NULL, *CApath = NULL; local
182 else if (strcmp(*argv,"-CAfile") == 0)
185 CAfile = *(++argv);
240 if (!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM))
H A Ds_time.c175 static char *CAfile=NULL; variable
198 CAfile=NULL;
229 -CAfile arg - PEM format file of CA's\n\
306 } else if( strcmp(*argv,"-CAfile") == 0) {
309 CAfile= *(++argv);
479 if ((!SSL_CTX_load_verify_locations(tm_ctx,CAfile,CApath)) ||
H A Dsmime.c104 char *CAfile = NULL, *CApath = NULL; local
306 else if (!strcmp (*args, "-CAfile"))
311 CAfile = *args;
461 BIO_printf (bio_err, "-CAfile file trusted certificates file\n");
633 if (!(store = setup_verify(bio_err, CAfile, CApath)))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dcrl.c93 " -CAfile name - verify CRL using certificates in file \"name\"\n",
107 char *CAfile = NULL, *CApath = NULL; local
197 } else if (strcmp(*argv, "-CAfile") == 0) {
200 CAfile = *(++argv);
261 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM))
H A Dsmime.c109 char *CAfile = NULL, *CApath = NULL; local
298 } else if (!strcmp(*args, "-CAfile")) {
301 CAfile = *++args;
443 BIO_printf(bio_err, "-CAfile file trusted certificates file\n");
608 if (!(store = setup_verify(bio_err, CAfile, CApath)))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dcrl.c93 " -CAfile name - verify CRL using certificates in file \"name\"\n",
107 char *CAfile = NULL, *CApath = NULL; local
197 } else if (strcmp(*argv, "-CAfile") == 0) {
200 CAfile = *(++argv);
261 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM))
H A Dsmime.c109 char *CAfile = NULL, *CApath = NULL; local
298 } else if (!strcmp(*args, "-CAfile")) {
301 CAfile = *++args;
443 BIO_printf(bio_err, "-CAfile file trusted certificates file\n");
608 if (!(store = setup_verify(bio_err, CAfile, CApath)))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ms/
H A Dtestss.bat41 %verifycmd% -CAfile %CAcert% %CAcert%
54 %verifycmd% -CAfile %CAcert% %Ucert%
H A Dtestssce.bat41 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %CAcert%
54 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %Ucert%
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/
H A Daxtls.c187 if(data->set.ssl.CAfile) {
188 if(ssl_obj_load(ssl_ctx, SSL_OBJ_X509_CACERT, data->set.ssl.CAfile, NULL)
191 data->set.ssl.CAfile);
197 infof(data, "found certificates in %s\n", data->set.ssl.CAfile);
H A Dgtls.c438 if(data->set.ssl.CAfile) {
444 data->set.ssl.CAfile,
448 data->set.ssl.CAfile, gnutls_strerror(rc));
454 rc, data->set.ssl.CAfile);
721 failf(data, "server certificate verification failed. CAfile: %s "
722 "CRLfile: %s", data->set.ssl.CAfile?data->set.ssl.CAfile:"none",
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ms/
H A Dtestss.bat41 %verifycmd% -CAfile %CAcert% %CAcert%
54 %verifycmd% -CAfile %CAcert% %Ucert%
H A Dtestssce.bat41 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %CAcert%
54 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %Ucert%
H A Dtest.bat80 openssl verify -CAfile cert.tmp ..\certs\*.pem
86 set SSL_TEST=ssltest -key keyU.ss -cert certU.ss -c_key keyU.ss -c_cert certU.ss -CAfile certCA.ss
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ms/
H A Dtestss.bat41 %verifycmd% -CAfile %CAcert% %CAcert%
54 %verifycmd% -CAfile %CAcert% %Ucert%
H A Dtestssce.bat41 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %CAcert%
54 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %Ucert%
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/
H A Dtocsp12 -CAfile $ocspdir/$2 -verify_other $ocspdir/$2 -CApath /dev/null
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/
H A Dtocsp12 -CAfile $ocspdir/$2 -verify_other $ocspdir/$2 -CApath /dev/null
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/threads/
H A Dnetware.bat10 rem "mttest.nlm -thread 20 -loops 10 -CAfile \openssl\apps\server.pem >mttest.out 2>mttest.err"
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/threads/
H A Dnetware.bat10 rem "mttest.nlm -thread 20 -loops 10 -CAfile \openssl\apps\server.pem >mttest.out 2>mttest.err"
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/threads/
H A Dnetware.bat10 rem "mttest.nlm -thread 20 -loops 10 -CAfile \openssl\apps\server.pem >mttest.out 2>mttest.err"
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/tunala/
H A Dtunala.c86 const char *CAfile, const char *cert,
782 const char *CAfile, const char *cert,
818 if (CAfile) {
820 CAfile, NULL)) {
821 fprintf(stderr, "Error loading CA cert(s) in '%s'\n", CAfile);
824 fprintf(stderr, "Info, operating with CA cert(s) in '%s'\n", CAfile);
781 initialise_ssl_ctx(int server_mode, const char *engine_id, const char *CAfile, const char *cert, const char *key, const char *dcert, const char *dkey, const char *cipher_list, const char *dh_file, const char *dh_special, int tmp_rsa, int ctx_options, int out_state, int out_verify, int verify_mode, unsigned int verify_depth) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/tunala/
H A Dtunala.c70 const char *CAfile, const char *cert, const char *key,
729 const char *CAfile, const char *cert, const char *key,
762 if(CAfile) {
764 CAfile, NULL)) {
766 CAfile);
770 CAfile);
728 initialise_ssl_ctx(int server_mode, const char *engine_id, const char *CAfile, const char *cert, const char *key, const char *dcert, const char *dkey, const char *cipher_list, const char *dh_file, const char *dh_special, int tmp_rsa, int ctx_options, int out_state, int out_verify, int verify_mode, unsigned int verify_depth) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/tunala/
H A Dtunala.c86 const char *CAfile, const char *cert,
782 const char *CAfile, const char *cert,
818 if (CAfile) {
820 CAfile, NULL)) {
821 fprintf(stderr, "Error loading CA cert(s) in '%s'\n", CAfile);
824 fprintf(stderr, "Info, operating with CA cert(s) in '%s'\n", CAfile);
781 initialise_ssl_ctx(int server_mode, const char *engine_id, const char *CAfile, const char *cert, const char *key, const char *dcert, const char *dkey, const char *cipher_list, const char *dh_file, const char *dh_special, int tmp_rsa, int ctx_options, int out_state, int out_verify, int verify_mode, unsigned int verify_depth) argument

Completed in 255 milliseconds

1234