/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | ssltest.c | 260 fprintf(stderr," -CAfile arg - PEM format file of CA's\n"); 389 char *CApath=NULL,*CAfile=NULL; local 560 else if (strcmp(*argv,"-CAfile") == 0) 563 CAfile= *(++argv); 805 if ( (!SSL_CTX_load_verify_locations(s_ctx,CAfile,CApath)) || 807 (!SSL_CTX_load_verify_locations(c_ctx,CAfile,CApath)) ||
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | s_client.c | 333 BIO_printf(bio_err, " -CAfile arg - PEM format file of CA's\n"); 682 char *CApath = NULL, *CAfile = NULL; local 1012 else if (strcmp(*argv, "-CAfile") == 0) { 1015 CAfile = *(++argv); 1347 if ((CAfile || CApath) 1348 && !SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) {
|
H A D | apps.c | 1485 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath) argument 1494 if (CAfile) { 1495 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM)) { 1496 BIO_printf(bp, "Error loading file %s\n", CAfile);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | apps.c | 1304 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath) argument 1311 if (CAfile) { 1312 if(!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM)) { 1313 BIO_printf(bp, "Error loading file %s\n", CAfile);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssltest.c | 782 fprintf(stderr, " -CAfile arg - PEM format file of CA's\n"); 945 char *CApath = NULL, *CAfile = NULL; local 1167 } else if (strcmp(*argv, "-CAfile") == 0) { 1170 CAfile = *(++argv); 1495 if ((!SSL_CTX_load_verify_locations(s_ctx, CAfile, CApath)) || 1497 (!SSL_CTX_load_verify_locations(s_ctx2, CAfile, CApath)) || 1499 (!SSL_CTX_load_verify_locations(c_ctx, CAfile, CApath)) ||
|
H A D | ssl_lib.c | 3228 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, argument 3231 return (X509_STORE_load_locations(ctx->cert_store, CAfile, CApath));
|
H A D | ssl.h | 2442 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssltest.c | 782 fprintf(stderr, " -CAfile arg - PEM format file of CA's\n"); 945 char *CApath = NULL, *CAfile = NULL; local 1167 } else if (strcmp(*argv, "-CAfile") == 0) { 1170 CAfile = *(++argv); 1495 if ((!SSL_CTX_load_verify_locations(s_ctx, CAfile, CApath)) || 1497 (!SSL_CTX_load_verify_locations(s_ctx2, CAfile, CApath)) || 1499 (!SSL_CTX_load_verify_locations(c_ctx, CAfile, CApath)) ||
|
H A D | ssl_lib.c | 3228 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, argument 3231 return (X509_STORE_load_locations(ctx->cert_store, CAfile, CApath));
|
H A D | ssl.h | 2442 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | apps.c | 1485 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath) argument 1494 if (CAfile) { 1495 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM)) { 1496 BIO_printf(bp, "Error loading file %s\n", CAfile);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | urldata.h | 361 char *CAfile; /* certificate to verify peer against */ member in struct:ssl_config_data
|
H A D | url.c | 5376 data->set.ssl.CAfile = data->set.str[STRING_SSL_CAFILE];
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | ssl_lib.c | 2411 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, argument 2414 return(X509_STORE_load_locations(ctx->cert_store,CAfile,CApath));
|
H A D | ssl.h | 1445 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/ |
H A D | nss.c | 1191 const char *cafile = data->set.ssl.CAfile; 1232 infof(data, " CAfile: %s\n CApath: %s\n",
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ssl.h | 1445 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
|