Searched refs:certfile (Results 1 - 10 of 10) sorted by relevance

/freebsd-10-stable/share/examples/uefisign/
H A Duefikeys18 certfile="${1}.pem"
27 [ ! -e "${certfile}" ] || die "${certfile} already exists"
34 openssl req -new -x509 -sha256 -days "${days}" -subj "${subj}" -key "${keyfile}" -out "${certfile}" || die "openssl req failed"
35 openssl x509 -inform PEM -outform DER -in "${certfile}" -out "${efifile}" || die "openssl x509 failed"
37 echo "certificate: ${certfile}; private key: ${keyfile}; certificate to enroll in UEFI: ${efifile}"
/freebsd-10-stable/crypto/openssl/apps/
H A Dcrl2p7.c76 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile);
94 char *infile, *outfile, *prog, *certfile; local
136 } else if (strcmp(*argv, "-certfile") == 0) {
165 " -certfile arg certificates file of chain to a trusted CA\n");
168 " -nocrl no crl to load, just certs from '-certfile'\n");
231 certfile = sk_OPENSSL_STRING_value(certflst, i);
232 if (add_certs_from_file(cert_stack, certfile) < 0) {
294 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
303 if ((in == NULL) || (BIO_read_filename(in, certfile) <= 0)) {
304 BIO_printf(bio_err, "error opening the file, %s\n", certfile);
[all...]
H A DCA.sh150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
H A Dsmime.c98 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; local
294 } else if (!strcmp(*args, "-certfile")) {
297 certfile = *++args;
420 BIO_printf(bio_err, "-certfile file other certificates file\n");
527 if (certfile) {
528 if (!(other = load_certs(bio_err, certfile, FORMAT_PEM, NULL,
H A Dcms.c113 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; local
420 } else if (!strcmp(*args, "-certfile")) {
423 certfile = *++args;
557 BIO_printf(bio_err, "-certfile file other certificates file\n");
667 if (certfile) {
668 if (!(other = load_certs(bio_err, certfile, FORMAT_PEM, NULL,
H A Dpkcs12.c104 char *certfile = NULL; local
244 } else if (!strcmp(*args, "-certfile")) {
247 certfile = *args;
337 BIO_printf(bio_err, "-certfile f add all certs in f\n");
563 if (certfile) {
565 if (!(morecerts = load_certs(bio_err, certfile, FORMAT_PEM,
567 "certificates from certfile")))
575 CRYPTO_push_info("reading certs from certfile");
H A Dca.c269 char *certfile = NULL; local
409 certfile = *(++argv);
727 if ((certfile == NULL)
728 && ((certfile = NCONF_get_string(conf,
734 x509 = load_cert(bio_err, certfile, FORMAT_PEM, NULL, e,
/freebsd-10-stable/contrib/openbsm/bin/auditdistd/
H A Dtoken.l61 certfile { DP; return CERTFILE; }
/freebsd-10-stable/contrib/sendmail/src/
H A Dtls.c587 ** certfile -- filename of certificate
595 load_certkey(ssl, srv, certfile, keyfile)
598 char *certfile;
611 TLS_OK_F(certfile, "CertFile", bitset(TLS_I_CERT_EX, req),
616 /* certfile etc. must be "safe". */
623 TLS_SAFE_F(certfile, sff | TLS_UNR(TLS_I_CERT_UNR, req),
630 # define SSL_use_cert(ssl, certfile) \
631 SSL_use_certificate_file(ssl, certfile, SSL_FILETYPE_PEM)
635 SSL_use_cert(ssl, certfile) <= 0)
641 who, SSL_USE_CERT, certfile);
[all...]
H A Dreadcf.c2352 char *keyfile, *certfile; local
2362 keyfile = certfile = opt = val = NULL;
2509 else if (sm_strcasecmp(opt, "certfile") == 0)
2510 certfile = val;
2526 if (keyfile != NULL && certfile != NULL)
2528 load_certkey(ssl, srv, certfile, keyfile);
2529 keyfile = certfile = NULL;
2531 else if (keyfile != NULL || certfile != NULL)

Completed in 198 milliseconds