Searched refs:CAfile (Results 1 - 16 of 16) sorted by relevance

/freebsd-13-stable/crypto/openssl/apps/
H A Dverify.c42 {"CAfile", OPT_CAFILE, '<', "A file of trusted certificates"},
43 {"no-CAfile", OPT_NOCAFILE, '-',
70 const char *prog, *CApath = NULL, *CAfile = NULL; local
114 CAfile = opt_arg();
165 if (trusted != NULL && (CAfile || CApath)) {
167 "%s: Cannot use -trusted with -CAfile or -CApath\n",
172 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
H A Dts.c66 const char *CApath, const char *CAfile, const char *untrusted,
70 const char *CApath, const char *CAfile,
73 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile,
111 {"CAfile", OPT_CAFILE, '<', "File with trusted CA certs"},
143 "ts -verify -CApath dir -CAfile file.pem -untrusted file.pem",
153 const char *CAfile = NULL, *untrusted = NULL, *prog; local
254 CAfile = opt_arg();
312 CApath, CAfile, untrusted,
820 const char *CApath, const char *CAfile, const char *untrusted,
840 CApath, CAfile, untruste
818 verify_command(const char *data, const char *digest, const char *queryfile, const char *in, int token_in, const char *CApath, const char *CAfile, const char *untrusted, X509_VERIFY_PARAM *vpm) argument
864 create_verify_ctx(const char *data, const char *digest, const char *queryfile, const char *CApath, const char *CAfile, const char *untrusted, X509_VERIFY_PARAM *vpm) argument
935 create_cert_store(const char *CApath, const char *CAfile, X509_VERIFY_PARAM *vpm) argument
[all...]
H A Dx509.c39 static int x509_certify(X509_STORE *ctx, const char *CAfile, const EVP_MD *digest,
116 "The CA key, must be PEM format; if not in CAfile"},
170 char *infile = NULL, *outfile = NULL, *keyfile = NULL, *CAfile = NULL; local
267 CAfile = opt_arg();
487 CAkeyfile = CAfile;
590 xca = load_cert(CAfile, CAformat, "CA Certificate");
813 if (!x509_certify(ctx, CAfile, digest, x, xca,
911 static ASN1_INTEGER *x509_load_serial(const char *CAfile, argument
919 const char *p = strrchr(CAfile, '.');
920 size_t len = p != NULL ? (size_t)(p - CAfile)
946 x509_certify(X509_STORE *ctx, const char *CAfile, const EVP_MD *digest, X509 *x, X509 *xca, EVP_PKEY *pkey, STACK_OF(OPENSSL_STRING) *sigopts, const char *serialfile, int create, int days, int clrext, CONF *conf, const char *section, ASN1_INTEGER *sno, int reqfile, int preserve_dates) argument
[all...]
H A Dcrl.c47 {"CAfile", OPT_CAFILE, '<', "Verify CRL using certificates in file name"},
48 {"no-CAfile", OPT_NOCAFILE, '-',
74 const char *CAfile = NULL, *CApath = NULL, *prog; local
126 CAfile = opt_arg();
188 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
H A Ds_time.c65 {"CAfile", OPT_CAFILE, '<', "PEM format file of CA's"},
66 {"no-CAfile", OPT_NOCAFILE, '-',
97 char *CApath = NULL, *CAfile = NULL, *cipher = NULL, *ciphersuites = NULL; local
151 CAfile = opt_arg();
209 if (!ctx_set_verify_locations(ctx, CAfile, CApath, noCAfile, noCApath)) {
H A Dsmime.c88 {"CAfile", OPT_CAFILE, '<', "Trusted certificates file"},
89 {"no-CAfile", OPT_NOCAFILE, '-',
124 const char *CAfile = NULL, *CApath = NULL, *prog = NULL; local
300 CAfile = opt_arg();
476 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
H A Dapps.h471 X509_STORE *setup_verify(const char *CAfile, const char *CApath,
473 __owur int ctx_set_verify_locations(SSL_CTX *ctx, const char *CAfile,
H A Dpkcs12.c106 {"CAfile", OPT_CAFILE, '<', "PEM-format file of CA's"},
107 {"no-CAfile", OPT_NOCAFILE, '-',
136 const char *CApath = NULL, *CAfile = NULL, *prog; local
270 CAfile = opt_arg();
403 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath))
H A Ds_server.c805 {"CAfile", OPT_CAFILE, '<', "PEM format file of CA's"},
807 {"no-CAfile", OPT_NOCAFILE, '-',
985 const char *CApath = NULL, *CAfile = NULL, *chCApath = NULL, *chCAfile = NULL; local
1299 CAfile = opt_arg();
1876 if (!ctx_set_verify_locations(ctx, CAfile, CApath, noCAfile, noCApath)) {
1937 if (!ctx_set_verify_locations(ctx2, CAfile, CApath, noCAfile,
2120 if (CAfile != NULL) {
2121 SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file(CAfile));
2124 SSL_CTX_set_client_CA_list(ctx2, SSL_load_client_CA_file(CAfile));
H A Dcms.c143 {"CAfile", OPT_CAFILE, '<', "Trusted certificates file"},
145 {"no-CAfile", OPT_NOCAFILE, '-',
203 const char *CAfile = NULL, *CApath = NULL; local
377 CAfile = opt_arg();
800 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
H A Docsp.c191 {"CAfile", OPT_CAFILE, '<', "Trusted certificates file"},
193 {"no-CAfile", OPT_NOCAFILE, '-',
246 const char *CAfile = NULL, *CApath = NULL; local
386 CAfile = opt_arg();
755 store = setup_verify(CAfile, CApath, noCAfile, noCApath);
H A Dapps.c129 int ctx_set_verify_locations(SSL_CTX *ctx, const char *CAfile, argument
132 if (CAfile == NULL && CApath == NULL) {
140 return SSL_CTX_load_verify_locations(ctx, CAfile, CApath);
1230 X509_STORE *setup_verify(const char *CAfile, const char *CApath, int noCAfile, int noCApath) argument
1238 if (CAfile != NULL || !noCAfile) {
1242 if (CAfile) {
1243 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM)) {
1244 BIO_printf(bio_err, "Error loading file %s\n", CAfile);
H A Ds_client.c629 {"CAfile", OPT_CAFILE, '<', "PEM format file of CA's"},
630 {"no-CAfile", OPT_NOCAFILE, '-',
899 const char *CApath = NULL, *CAfile = NULL; local
1406 CAfile = opt_arg();
1926 if (!ctx_set_verify_locations(ctx, CAfile, CApath, noCAfile, noCApath)) {
/freebsd-13-stable/crypto/openssl/ssl/
H A Dssl_conf.c468 const char *CAfile, const char *CApath, int verify_store)
484 return X509_STORE_load_locations(*st, CAfile, CApath) > 0;
467 do_store(SSL_CONF_CTX *cctx, const char *CAfile, const char *CApath, int verify_store) argument
H A Dssl_lib.c4223 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, argument
4226 return X509_STORE_load_locations(ctx->cert_store, CAfile, CApath);
/freebsd-13-stable/crypto/openssl/include/openssl/
H A Dssl.h1996 __owur int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,

Completed in 126 milliseconds