/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | pkcs12.c | 131 char *CApath = NULL, *CAfile = NULL; local 303 } else if (!strcmp(*args, "-CApath")) { 306 CApath = *args; 338 BIO_printf(bio_err, "-CApath arg - PEM format directory of CA's\n"); 592 if (!X509_STORE_load_locations(store, CAfile, CApath))
|
H A D | cms.c | 139 char *CAfile = NULL, *CApath = NULL; local 492 } else if (!strcmp(*args, "-CApath")) { 495 CApath = *++args; 646 "-CApath dir trusted certificates directory\n"); 856 if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
H A D | ocsp.c | 156 char *CAfile = NULL, *CApath = NULL; local 323 } else if (!strcmp(*args, "-CApath")) { 326 CApath = *args; 536 "-CApath dir trusted certificates directory\n"); 819 store = setup_verify(bio_err, CAfile, CApath);
|
H A D | s_client.c | 332 BIO_printf(bio_err, " -CApath arg - PEM format directory of CA's\n"); 682 char *CApath = NULL, *CAfile = NULL; local 998 } else if (strcmp(*argv, "-CApath") == 0) { 1001 CApath = *(++argv); 1347 if ((CAfile || CApath) 1348 && !SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) {
|
H A D | apps.c | 1485 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath) argument 1505 if (CApath) { 1506 if (!X509_LOOKUP_add_dir(lookup, CApath, X509_FILETYPE_PEM)) { 1507 BIO_printf(bp, "Error loading directory %s\n", CApath);
|
H A D | s_server.c | 578 BIO_printf(bio_err, " -CApath arg - PEM format directory of CA's\n"); 1097 char *CApath = NULL, *CAfile = NULL; local 1282 } else if (strcmp(*argv, "-CApath") == 0) { 1285 CApath = *(++argv); 1803 if ((!SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) || 1865 if ((!SSL_CTX_load_verify_locations(ctx2, CAfile, CApath)) ||
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | pkcs12.c | 131 char *CApath = NULL, *CAfile = NULL; local 303 } else if (!strcmp(*args, "-CApath")) { 306 CApath = *args; 338 BIO_printf(bio_err, "-CApath arg - PEM format directory of CA's\n"); 592 if (!X509_STORE_load_locations(store, CAfile, CApath))
|
H A D | cms.c | 139 char *CAfile = NULL, *CApath = NULL; local 492 } else if (!strcmp(*args, "-CApath")) { 495 CApath = *++args; 646 "-CApath dir trusted certificates directory\n"); 856 if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
H A D | ocsp.c | 156 char *CAfile = NULL, *CApath = NULL; local 323 } else if (!strcmp(*args, "-CApath")) { 326 CApath = *args; 536 "-CApath dir trusted certificates directory\n"); 819 store = setup_verify(bio_err, CAfile, CApath);
|
H A D | s_client.c | 332 BIO_printf(bio_err, " -CApath arg - PEM format directory of CA's\n"); 682 char *CApath = NULL, *CAfile = NULL; local 998 } else if (strcmp(*argv, "-CApath") == 0) { 1001 CApath = *(++argv); 1347 if ((CAfile || CApath) 1348 && !SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) {
|
H A D | apps.c | 1485 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath) argument 1505 if (CApath) { 1506 if (!X509_LOOKUP_add_dir(lookup, CApath, X509_FILETYPE_PEM)) { 1507 BIO_printf(bp, "Error loading directory %s\n", CApath);
|
H A D | s_server.c | 578 BIO_printf(bio_err, " -CApath arg - PEM format directory of CA's\n"); 1097 char *CApath = NULL, *CAfile = NULL; local 1282 } else if (strcmp(*argv, "-CApath") == 0) { 1285 CApath = *(++argv); 1803 if ((!SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) || 1865 if ((!SSL_CTX_load_verify_locations(ctx2, CAfile, CApath)) ||
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | ocsp.c | 117 char *CAfile = NULL, *CApath = NULL; local 289 else if (!strcmp (*args, "-CApath")) 294 CApath = *args; 533 BIO_printf (bio_err, "-CApath dir trusted certificates directory\n"); 824 store = setup_verify(bio_err, CAfile, CApath);
|
H A D | pkcs12.c | 123 char *CApath = NULL, *CAfile = NULL; local 261 } else if (!strcmp(*args,"-CApath")) { 264 CApath = *args; 291 BIO_printf (bio_err, "-CApath arg - PEM format directory of CA's\n"); 525 if (!X509_STORE_load_locations(store, CAfile, CApath))
|
H A D | s_client.c | 198 BIO_printf(bio_err," -CApath arg - PEM format directory of CA's\n"); 266 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local 447 else if (strcmp(*argv,"-CApath") == 0) 450 CApath= *(++argv); 614 if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) ||
|
H A D | s_server.c | 341 BIO_printf(bio_err," -CApath arg - PEM format directory of CA's\n"); 536 char *CApath=NULL,*CAfile=NULL; local 689 else if (strcmp(*argv,"-CApath") == 0) 692 CApath= *(++argv); 960 if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) ||
|
H A D | apps.c | 1304 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath) argument 1320 if (CApath) { 1321 if(!X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM)) { 1322 BIO_printf(bp, "Error loading directory %s\n", CApath);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | ssltest.c | 259 fprintf(stderr," -CApath arg - PEM format directory of CA's\n"); 389 char *CApath=NULL,*CAfile=NULL; local 555 else if (strcmp(*argv,"-CApath") == 0) 558 CApath= *(++argv); 805 if ( (!SSL_CTX_load_verify_locations(s_ctx,CAfile,CApath)) || 807 (!SSL_CTX_load_verify_locations(c_ctx,CAfile,CApath)) ||
|
H A D | ssl_lib.c | 2412 const char *CApath) 2414 return(X509_STORE_load_locations(ctx->cert_store,CAfile,CApath)); 2411 SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, const char *CApath) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | ssltest.c | 259 fprintf(stderr," -CApath arg - PEM format directory of CA's\n"); 389 char *CApath=NULL,*CAfile=NULL; local 555 else if (strcmp(*argv,"-CApath") == 0) 558 CApath= *(++argv); 805 if ( (!SSL_CTX_load_verify_locations(s_ctx,CAfile,CApath)) || 807 (!SSL_CTX_load_verify_locations(c_ctx,CAfile,CApath)) ||
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssltest.c | 781 fprintf(stderr, " -CApath arg - PEM format directory of CA's\n"); 945 char *CApath = NULL, *CAfile = NULL; local 1163 } else if (strcmp(*argv, "-CApath") == 0) { 1166 CApath = *(++argv); 1495 if ((!SSL_CTX_load_verify_locations(s_ctx, CAfile, CApath)) || 1497 (!SSL_CTX_load_verify_locations(s_ctx2, CAfile, CApath)) || 1499 (!SSL_CTX_load_verify_locations(c_ctx, CAfile, CApath)) ||
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssltest.c | 781 fprintf(stderr, " -CApath arg - PEM format directory of CA's\n"); 945 char *CApath = NULL, *CAfile = NULL; local 1163 } else if (strcmp(*argv, "-CApath") == 0) { 1166 CApath = *(++argv); 1495 if ((!SSL_CTX_load_verify_locations(s_ctx, CAfile, CApath)) || 1497 (!SSL_CTX_load_verify_locations(s_ctx2, CAfile, CApath)) || 1499 (!SSL_CTX_load_verify_locations(c_ctx, CAfile, CApath)) ||
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/ |
H A D | crypto_openssl.c | 218 eay_check_x509cert(cert, CApath) 220 char *CApath; 251 error = X509_LOOKUP_add_dir(lookup, CApath, X509_FILETYPE_PEM);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/ |
H A D | urldata.h | 360 char *CApath; /* certificate dir (doesn't work on windows) */ member in struct:ssl_config_data
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/ |
H A D | nss.c | 1192 const char *capath = data->set.ssl.CApath; 1232 infof(data, " CAfile: %s\n CApath: %s\n",
|