Searched refs:CAfile (Results 76 - 92 of 92) sorted by relevance

1234

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/
H A Dssltest.c260 fprintf(stderr," -CAfile arg - PEM format file of CA's\n");
389 char *CApath=NULL,*CAfile=NULL; local
560 else if (strcmp(*argv,"-CAfile") == 0)
563 CAfile= *(++argv);
805 if ( (!SSL_CTX_load_verify_locations(s_ctx,CAfile,CApath)) ||
807 (!SSL_CTX_load_verify_locations(c_ctx,CAfile,CApath)) ||
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Ds_client.c333 BIO_printf(bio_err, " -CAfile arg - PEM format file of CA's\n");
682 char *CApath = NULL, *CAfile = NULL; local
1012 else if (strcmp(*argv, "-CAfile") == 0) {
1015 CAfile = *(++argv);
1347 if ((CAfile || CApath)
1348 && !SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) {
H A Dapps.c1485 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath) argument
1494 if (CAfile) {
1495 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM)) {
1496 BIO_printf(bp, "Error loading file %s\n", CAfile);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Dapps.c1304 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath) argument
1311 if (CAfile) {
1312 if(!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM)) {
1313 BIO_printf(bp, "Error loading file %s\n", CAfile);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Dssltest.c782 fprintf(stderr, " -CAfile arg - PEM format file of CA's\n");
945 char *CApath = NULL, *CAfile = NULL; local
1167 } else if (strcmp(*argv, "-CAfile") == 0) {
1170 CAfile = *(++argv);
1495 if ((!SSL_CTX_load_verify_locations(s_ctx, CAfile, CApath)) ||
1497 (!SSL_CTX_load_verify_locations(s_ctx2, CAfile, CApath)) ||
1499 (!SSL_CTX_load_verify_locations(c_ctx, CAfile, CApath)) ||
H A Dssl_lib.c3228 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, argument
3231 return (X509_STORE_load_locations(ctx->cert_store, CAfile, CApath));
H A Dssl.h2442 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Dssltest.c782 fprintf(stderr, " -CAfile arg - PEM format file of CA's\n");
945 char *CApath = NULL, *CAfile = NULL; local
1167 } else if (strcmp(*argv, "-CAfile") == 0) {
1170 CAfile = *(++argv);
1495 if ((!SSL_CTX_load_verify_locations(s_ctx, CAfile, CApath)) ||
1497 (!SSL_CTX_load_verify_locations(s_ctx2, CAfile, CApath)) ||
1499 (!SSL_CTX_load_verify_locations(c_ctx, CAfile, CApath)) ||
H A Dssl_lib.c3228 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, argument
3231 return (X509_STORE_load_locations(ctx->cert_store, CAfile, CApath));
H A Dssl.h2442 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dapps.c1485 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath) argument
1494 if (CAfile) {
1495 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM)) {
1496 BIO_printf(bp, "Error loading file %s\n", CAfile);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/
H A Durldata.h361 char *CAfile; /* certificate to verify peer against */ member in struct:ssl_config_data
H A Durl.c5376 data->set.ssl.CAfile = data->set.str[STRING_SSL_CAFILE];
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dssl_lib.c2411 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, argument
2414 return(X509_STORE_load_locations(ctx->cert_store,CAfile,CApath));
H A Dssl.h1445 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/
H A Dnss.c1191 const char *cafile = data->set.ssl.CAfile;
1232 infof(data, " CAfile: %s\n CApath: %s\n",
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dssl.h1445 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,

Completed in 309 milliseconds

1234