Searched refs:certfile (Results 1 - 10 of 10) sorted by relevance
/freebsd-10-stable/share/examples/uefisign/ |
H A D | uefikeys | 18 certfile="${1}.pem" 27 [ ! -e "${certfile}" ] || die "${certfile} already exists" 34 openssl req -new -x509 -sha256 -days "${days}" -subj "${subj}" -key "${keyfile}" -out "${certfile}" || die "openssl req failed" 35 openssl x509 -inform PEM -outform DER -in "${certfile}" -out "${efifile}" || die "openssl x509 failed" 37 echo "certificate: ${certfile}; private key: ${keyfile}; certificate to enroll in UEFI: ${efifile}"
|
/freebsd-10-stable/crypto/openssl/apps/ |
H A D | crl2p7.c | 76 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile); 94 char *infile, *outfile, *prog, *certfile; local 136 } else if (strcmp(*argv, "-certfile") == 0) { 165 " -certfile arg certificates file of chain to a trusted CA\n"); 168 " -nocrl no crl to load, just certs from '-certfile'\n"); 231 certfile = sk_OPENSSL_STRING_value(certflst, i); 232 if (add_certs_from_file(cert_stack, certfile) < 0) { 294 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile) 303 if ((in == NULL) || (BIO_read_filename(in, certfile) <= 0)) { 304 BIO_printf(bio_err, "error opening the file, %s\n", certfile); [all...] |
H A D | CA.sh | 150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
H A D | smime.c | 98 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; local 294 } else if (!strcmp(*args, "-certfile")) { 297 certfile = *++args; 420 BIO_printf(bio_err, "-certfile file other certificates file\n"); 527 if (certfile) { 528 if (!(other = load_certs(bio_err, certfile, FORMAT_PEM, NULL,
|
H A D | cms.c | 113 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; local 420 } else if (!strcmp(*args, "-certfile")) { 423 certfile = *++args; 557 BIO_printf(bio_err, "-certfile file other certificates file\n"); 667 if (certfile) { 668 if (!(other = load_certs(bio_err, certfile, FORMAT_PEM, NULL,
|
H A D | pkcs12.c | 104 char *certfile = NULL; local 244 } else if (!strcmp(*args, "-certfile")) { 247 certfile = *args; 337 BIO_printf(bio_err, "-certfile f add all certs in f\n"); 563 if (certfile) { 565 if (!(morecerts = load_certs(bio_err, certfile, FORMAT_PEM, 567 "certificates from certfile"))) 575 CRYPTO_push_info("reading certs from certfile");
|
H A D | ca.c | 269 char *certfile = NULL; local 409 certfile = *(++argv); 727 if ((certfile == NULL) 728 && ((certfile = NCONF_get_string(conf, 734 x509 = load_cert(bio_err, certfile, FORMAT_PEM, NULL, e,
|
/freebsd-10-stable/contrib/openbsm/bin/auditdistd/ |
H A D | token.l | 61 certfile { DP; return CERTFILE; }
|
/freebsd-10-stable/contrib/sendmail/src/ |
H A D | tls.c | 587 ** certfile -- filename of certificate 595 load_certkey(ssl, srv, certfile, keyfile) 598 char *certfile; 611 TLS_OK_F(certfile, "CertFile", bitset(TLS_I_CERT_EX, req), 616 /* certfile etc. must be "safe". */ 623 TLS_SAFE_F(certfile, sff | TLS_UNR(TLS_I_CERT_UNR, req), 630 # define SSL_use_cert(ssl, certfile) \ 631 SSL_use_certificate_file(ssl, certfile, SSL_FILETYPE_PEM) 635 SSL_use_cert(ssl, certfile) <= 0) 641 who, SSL_USE_CERT, certfile); [all...] |
H A D | readcf.c | 2352 char *keyfile, *certfile; local 2362 keyfile = certfile = opt = val = NULL; 2509 else if (sm_strcasecmp(opt, "certfile") == 0) 2510 certfile = val; 2526 if (keyfile != NULL && certfile != NULL) 2528 load_certkey(ssl, srv, certfile, keyfile); 2529 keyfile = certfile = NULL; 2531 else if (keyfile != NULL || certfile != NULL)
|
Completed in 198 milliseconds