/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | x509.c | 152 static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest, 175 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local 308 CAfile= *(++argv); 489 { CAkeyfile=CAfile; } 637 xca=load_cert(bio_err,CAfile,CAformat,NULL,e,"CA Certificate"); 949 if (!x509_certify(ctx,CAfile,digest,x,xca, 1080 static ASN1_INTEGER *x509_load_serial(char *CAfile, char *serialfile, int create) argument 1088 ?(strlen(CAfile)+strlen(POSTFIX)+1) 1094 BUF_strlcpy(buf,CAfile,len); 1120 static int x509_certify(X509_STORE *ctx, char *CAfile, cons argument [all...] |
H A D | crl.c | 89 " -CAfile name - verify CRL using certificates in file \"name\"\n", 104 char *CAfile = NULL, *CApath = NULL; local 182 else if (strcmp(*argv,"-CAfile") == 0) 185 CAfile = *(++argv); 240 if (!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM))
|
H A D | s_time.c | 175 static char *CAfile=NULL; variable 198 CAfile=NULL; 229 -CAfile arg - PEM format file of CA's\n\ 306 } else if( strcmp(*argv,"-CAfile") == 0) { 309 CAfile= *(++argv); 479 if ((!SSL_CTX_load_verify_locations(tm_ctx,CAfile,CApath)) ||
|
H A D | smime.c | 104 char *CAfile = NULL, *CApath = NULL; local 306 else if (!strcmp (*args, "-CAfile")) 311 CAfile = *args; 461 BIO_printf (bio_err, "-CAfile file trusted certificates file\n"); 633 if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | crl.c | 93 " -CAfile name - verify CRL using certificates in file \"name\"\n", 107 char *CAfile = NULL, *CApath = NULL; local 197 } else if (strcmp(*argv, "-CAfile") == 0) { 200 CAfile = *(++argv); 261 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM))
|
H A D | smime.c | 109 char *CAfile = NULL, *CApath = NULL; local 298 } else if (!strcmp(*args, "-CAfile")) { 301 CAfile = *++args; 443 BIO_printf(bio_err, "-CAfile file trusted certificates file\n"); 608 if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | crl.c | 93 " -CAfile name - verify CRL using certificates in file \"name\"\n", 107 char *CAfile = NULL, *CApath = NULL; local 197 } else if (strcmp(*argv, "-CAfile") == 0) { 200 CAfile = *(++argv); 261 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM))
|
H A D | smime.c | 109 char *CAfile = NULL, *CApath = NULL; local 298 } else if (!strcmp(*args, "-CAfile")) { 301 CAfile = *++args; 443 BIO_printf(bio_err, "-CAfile file trusted certificates file\n"); 608 if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ms/ |
H A D | testss.bat | 41 %verifycmd% -CAfile %CAcert% %CAcert% 54 %verifycmd% -CAfile %CAcert% %Ucert%
|
H A D | testssce.bat | 41 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %CAcert% 54 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %Ucert%
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/ |
H A D | axtls.c | 187 if(data->set.ssl.CAfile) { 188 if(ssl_obj_load(ssl_ctx, SSL_OBJ_X509_CACERT, data->set.ssl.CAfile, NULL) 191 data->set.ssl.CAfile); 197 infof(data, "found certificates in %s\n", data->set.ssl.CAfile);
|
H A D | gtls.c | 438 if(data->set.ssl.CAfile) { 444 data->set.ssl.CAfile, 448 data->set.ssl.CAfile, gnutls_strerror(rc)); 454 rc, data->set.ssl.CAfile); 721 failf(data, "server certificate verification failed. CAfile: %s " 722 "CRLfile: %s", data->set.ssl.CAfile?data->set.ssl.CAfile:"none",
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ms/ |
H A D | testss.bat | 41 %verifycmd% -CAfile %CAcert% %CAcert%
54 %verifycmd% -CAfile %CAcert% %Ucert%
|
H A D | testssce.bat | 41 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %CAcert%
54 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %Ucert%
|
H A D | test.bat | 80 openssl verify -CAfile cert.tmp ..\certs\*.pem
86 set SSL_TEST=ssltest -key keyU.ss -cert certU.ss -c_key keyU.ss -c_cert certU.ss -CAfile certCA.ss
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ms/ |
H A D | testss.bat | 41 %verifycmd% -CAfile %CAcert% %CAcert% 54 %verifycmd% -CAfile %CAcert% %Ucert%
|
H A D | testssce.bat | 41 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %CAcert% 54 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %Ucert%
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/ |
H A D | tocsp | 12 -CAfile $ocspdir/$2 -verify_other $ocspdir/$2 -CApath /dev/null
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/ |
H A D | tocsp | 12 -CAfile $ocspdir/$2 -verify_other $ocspdir/$2 -CApath /dev/null
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/threads/ |
H A D | netware.bat | 10 rem "mttest.nlm -thread 20 -loops 10 -CAfile \openssl\apps\server.pem >mttest.out 2>mttest.err"
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/threads/ |
H A D | netware.bat | 10 rem "mttest.nlm -thread 20 -loops 10 -CAfile \openssl\apps\server.pem >mttest.out 2>mttest.err"
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/threads/ |
H A D | netware.bat | 10 rem "mttest.nlm -thread 20 -loops 10 -CAfile \openssl\apps\server.pem >mttest.out 2>mttest.err"
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/tunala/ |
H A D | tunala.c | 86 const char *CAfile, const char *cert, 782 const char *CAfile, const char *cert, 818 if (CAfile) { 820 CAfile, NULL)) { 821 fprintf(stderr, "Error loading CA cert(s) in '%s'\n", CAfile); 824 fprintf(stderr, "Info, operating with CA cert(s) in '%s'\n", CAfile); 781 initialise_ssl_ctx(int server_mode, const char *engine_id, const char *CAfile, const char *cert, const char *key, const char *dcert, const char *dkey, const char *cipher_list, const char *dh_file, const char *dh_special, int tmp_rsa, int ctx_options, int out_state, int out_verify, int verify_mode, unsigned int verify_depth) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/tunala/ |
H A D | tunala.c | 70 const char *CAfile, const char *cert, const char *key, 729 const char *CAfile, const char *cert, const char *key, 762 if(CAfile) { 764 CAfile, NULL)) { 766 CAfile); 770 CAfile); 728 initialise_ssl_ctx(int server_mode, const char *engine_id, const char *CAfile, const char *cert, const char *key, const char *dcert, const char *dkey, const char *cipher_list, const char *dh_file, const char *dh_special, int tmp_rsa, int ctx_options, int out_state, int out_verify, int verify_mode, unsigned int verify_depth) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/tunala/ |
H A D | tunala.c | 86 const char *CAfile, const char *cert, 782 const char *CAfile, const char *cert, 818 if (CAfile) { 820 CAfile, NULL)) { 821 fprintf(stderr, "Error loading CA cert(s) in '%s'\n", CAfile); 824 fprintf(stderr, "Info, operating with CA cert(s) in '%s'\n", CAfile); 781 initialise_ssl_ctx(int server_mode, const char *engine_id, const char *CAfile, const char *cert, const char *key, const char *dcert, const char *dkey, const char *cipher_list, const char *dh_file, const char *dh_special, int tmp_rsa, int ctx_options, int out_state, int out_verify, int verify_mode, unsigned int verify_depth) argument
|