/freebsd-11-stable/crypto/openssl/apps/ |
H A D | verify.c | 84 char *CApath = NULL, *CAfile = NULL; local 118 } else if (strcmp(*argv, "-CAfile") == 0) { 121 CAfile = *(++argv); 169 if (CAfile) { 170 i = X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM); 172 BIO_printf(bio_err, "Error loading file %s\n", CAfile); 230 "usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
|
H A D | CA.sh | 177 $VERIFY -CAfile $CATOP/$CACERT newcert.pem 182 $VERIFY -CAfile $CATOP/$CACERT $j
|
H A D | s_time.c | 130 static char *CAfile = NULL; variable 153 CAfile = NULL; 184 -CAfile arg - PEM format file of CA's\n\ 265 } else if (strcmp(*argv, "-CAfile") == 0) { 269 CAfile = *(++argv); 384 if ((!SSL_CTX_load_verify_locations(tm_ctx, CAfile, CApath)) ||
|
H A D | x509.c | 162 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest, 190 char *infile = NULL, *outfile = NULL, *keyfile = NULL, *CAfile = NULL; local 330 CAfile = *(++argv); 527 CAkeyfile = CAfile; 660 xca = load_cert(bio_err, CAfile, CAformat, NULL, e, "CA Certificate"); 930 if (!x509_certify(ctx, CAfile, digest, x, xca, 1046 static ASN1_INTEGER *x509_load_serial(char *CAfile, char *serialfile, argument 1055 ? (strlen(CAfile) + strlen(POSTFIX) + 1) 1063 BUF_strlcpy(buf, CAfile, len); 1092 static int x509_certify(X509_STORE *ctx, char *CAfile, cons argument [all...] |
H A D | crl.c | 93 " -CAfile name - verify CRL using certificates in file \"name\"\n", 107 char *CAfile = NULL, *CApath = NULL; local 197 } else if (strcmp(*argv, "-CAfile") == 0) { 200 CAfile = *(++argv); 261 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM))
|
H A D | smime.c | 109 char *CAfile = NULL, *CApath = NULL; local 296 } else if (!strcmp(*args, "-CAfile")) { 299 CAfile = *++args; 441 BIO_printf(bio_err, "-CAfile file trusted certificates file\n"); 604 if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
H A D | apps.h | 261 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
|
H A D | pkcs12.c | 131 char *CApath = NULL, *CAfile = NULL; local 307 } else if (!strcmp(*args, "-CAfile")) { 310 CAfile = *args; 337 BIO_printf(bio_err, "-CAfile arg - PEM format file of CA's\n"); 588 if (!X509_STORE_load_locations(store, CAfile, CApath))
|
H A D | s_server.c | 568 BIO_printf(bio_err, " -CAfile arg - PEM format file of CA's\n"); 1086 char *CApath = NULL, *CAfile = NULL; local 1318 else if (strcmp(*argv, "-CAfile") == 0) { 1321 CAfile = *(++argv); 1822 if ((!SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) || 1884 if ((!SSL_CTX_load_verify_locations(ctx2, CAfile, CApath)) || 2061 if (CAfile != NULL) { 2062 SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file(CAfile)); 2065 SSL_CTX_set_client_CA_list(ctx2, SSL_load_client_CA_file(CAfile));
|
H A D | cms.c | 139 char *CAfile = NULL, *CApath = NULL; local 486 } else if (!strcmp(*args, "-CAfile")) { 489 CAfile = *++args; 645 BIO_printf(bio_err, "-CAfile file trusted certificates file\n"); 852 if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
H A D | ocsp.c | 156 char *CAfile = NULL, *CApath = NULL; local 317 } else if (!strcmp(*args, "-CAfile")) { 320 CAfile = *args; 538 "-CAfile file trusted certificates file\n"); 818 store = setup_verify(bio_err, CAfile, CApath);
|
H A D | s_client.c | 330 BIO_printf(bio_err, " -CAfile arg - PEM format file of CA's\n"); 680 char *CApath = NULL, *CAfile = NULL; local 1023 else if (strcmp(*argv, "-CAfile") == 0) { 1026 CAfile = *(++argv); 1369 if ((CAfile || CApath) 1370 && !SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) {
|
H A D | apps.c | 1494 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath) argument 1503 if (CAfile) { 1504 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM)) { 1505 BIO_printf(bp, "Error loading file %s\n", CAfile);
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | ssl_task.c | 213 char *CApath = NULL, *CAfile = NULL; local
|
H A D | ssltest.c | 864 fprintf(stderr, " -CAfile arg - PEM format file of CA's\n"); 1036 char *CApath = NULL, *CAfile = NULL; local 1263 } else if (strcmp(*argv, "-CAfile") == 0) { 1266 CAfile = *(++argv); 1642 if ((!SSL_CTX_load_verify_locations(s_ctx, CAfile, CApath)) || 1644 (!SSL_CTX_load_verify_locations(s_ctx2, CAfile, CApath)) || 1646 (!SSL_CTX_load_verify_locations(c_ctx, CAfile, CApath)) ||
|
H A D | ssl_lib.c | 3252 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, argument 3255 return (X509_STORE_load_locations(ctx->cert_store, CAfile, CApath));
|
H A D | ssl.h | 2442 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
|
/freebsd-11-stable/crypto/openssl/crypto/threads/ |
H A D | mttest.c | 170 BIO_printf(bio_err, " -CAfile arg - PEM format file of CA's\n"); 182 char *CApath = NULL, *CAfile = NULL; local 219 } else if (strcmp(*argv, "-CAfile") == 0) { 222 CAfile = *(++argv); 295 if ((!SSL_CTX_load_verify_locations(s_ctx, CAfile, CApath)) || 297 (!SSL_CTX_load_verify_locations(c_ctx, CAfile, CApath)) ||
|