/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/ssltest-ecc/ |
H A D | ssltest.sh | 98 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 103 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 115 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 120 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 130 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 148 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 153 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 170 echo $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 173 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \ 178 $SSLTEST $SSL_VERSION -CAfile [all...] |
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/tls/ |
H A D | tls_certkey.c | 12 /* int tls_set_ca_certificate_info(ctx, CAfile, CApath) 14 /* const char *CAfile; 29 /* either one file CAfile that contains all CA certificates, 86 int tls_set_ca_certificate_info(SSL_CTX *ctx, const char *CAfile, argument 89 if (*CAfile == 0) 90 CAfile = 0; 93 if (CAfile || CApath) { 94 if (!SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) {
|
H A D | tls_server.c | 433 * add all CA certificates to one large CAfile, the other possibility is 441 props->CAfile, props->CApath) < 0) { 522 if (*props->CAfile) 524 SSL_load_client_CA_file(props->CAfile));
|
H A D | tls.h | 218 const char *CAfile; member in struct:__anon2479 275 const char *CAfile; member in struct:__anon2481
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ms/ |
H A D | testce.bat | 116 cerun CE:\OpenSSL\openssl verify -CAfile \OpenSSL\cert.tmp \OpenSSL\certs\*.pem 131 cerun CE:\OpenSSL\ssltest -ssl2 -server_auth -CAfile \OpenSSL\cert.tmp 135 cerun CE:\OpenSSL\ssltest -ssl2 -client_auth -CAfile \OpenSSL\cert.tmp 139 cerun CE:\OpenSSL\ssltest -ssl2 -server_auth -client_auth -CAfile \OpenSSL\cert.tmp 147 cerun CE:\OpenSSL\ssltest -ssl3 -server_auth -CAfile \OpenSSL\cert.tmp 151 cerun CE:\OpenSSL\ssltest -ssl3 -client_auth -CAfile \OpenSSL\cert.tmp 155 cerun CE:\OpenSSL\ssltest -ssl3 -server_auth -client_auth -CAfile \OpenSSL\cert.tmp 163 cerun CE:\OpenSSL\ssltest -server_auth -CAfile \OpenSSL\cert.tmp 167 cerun CE:\OpenSSL\ssltest -client_auth -CAfile \OpenSSL\cert.tmp 171 cerun CE:\OpenSSL\ssltest -server_auth -client_auth -CAfile \OpenSS [all...] |
H A D | testss.bat | 41 %verifycmd% -CAfile %CAcert% %CAcert% 54 %verifycmd% -CAfile %CAcert% %Ucert%
|
H A D | testssce.bat | 41 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %CAcert% 54 cerun CE:\OpenSSL\%verifycmd% -CAfile %CAcert% %Ucert%
|
H A D | test.bat | 78 set SSL_TEST=ssltest -key keyU.ss -cert certU.ss -c_key keyU.ss -c_cert certU.ss -CAfile certCA.ss
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/test/ |
H A D | testss | 76 $verifycmd -CAfile $CAcert $CAcert 98 $verifycmd -CAfile $CAcert $Ucert 120 $verifycmd -CAfile $CAcert -untrusted $P1intermediate $P1cert 142 $verifycmd -CAfile $CAcert -untrusted $P2intermediate $P2cert
|
H A D | testtsa | 128 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -queryfile $1 -in $2 -CAfile tsaca.pem \ 131 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -data $3 -in $2 -CAfile tsaca.pem \ 142 -CAfile tsaca.pem -untrusted tsa_cert1.pem 145 -CAfile tsaca.pem -untrusted tsa_cert1.pem 151 ../../util/shlib_wrap.sh ../../apps/openssl ts -verify -queryfile $1 -in $2 -CAfile tsaca.pem \
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | verify.c | 84 char *CApath=NULL,*CAfile=NULL; local 121 else if (strcmp(*argv,"-CAfile") == 0) 124 CAfile= *(++argv); 179 if (CAfile) { 180 i=X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM); 182 BIO_printf(bio_err, "Error loading file %s\n", CAfile); 240 BIO_printf(bio_err,"usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
|
H A D | CA.com | 196 $ VERIFY "-CAfile" 'CACERT' newcert.pem 205 $ VERIFY "-CAfile" 'CACERT' '__tmp'
|
H A D | CA.sh | 177 $VERIFY -CAfile $CATOP/$CACERT newcert.pem 182 $VERIFY -CAfile $CATOP/$CACERT $j
|
H A D | x509.c | 159 static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest, 184 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local 330 CAfile= *(++argv); 521 { CAkeyfile=CAfile; } 667 xca=load_cert(bio_err,CAfile,CAformat,NULL,e,"CA Certificate"); 983 if (!x509_certify(ctx,CAfile,digest,x,xca, 1107 static ASN1_INTEGER *x509_load_serial(char *CAfile, char *serialfile, int create) argument 1115 ?(strlen(CAfile)+strlen(POSTFIX)+1) 1121 BUF_strlcpy(buf,CAfile,len); 1147 static int x509_certify(X509_STORE *ctx, char *CAfile, cons argument [all...] |
H A D | crl.c | 93 " -CAfile name - verify CRL using certificates in file \"name\"\n", 108 char *CAfile = NULL, *CApath = NULL; local 189 else if (strcmp(*argv,"-CAfile") == 0) 192 CAfile = *(++argv); 253 if (!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM))
|
H A D | s_time.c | 127 static char *CAfile=NULL; variable 150 CAfile=NULL; 181 -CAfile arg - PEM format file of CA's\n\ 258 } else if( strcmp(*argv,"-CAfile") == 0) { 261 CAfile= *(++argv); 376 if ((!SSL_CTX_load_verify_locations(tm_ctx,CAfile,CApath)) ||
|
H A D | smime.c | 108 char *CAfile = NULL, *CApath = NULL; local 326 else if (!strcmp (*args, "-CAfile")) 330 CAfile = *++args; 481 BIO_printf (bio_err, "-CAfile file trusted certificates file\n"); 672 if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
H A D | apps.h | 258 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/threads/ |
H A D | netware.bat | 10 rem "mttest.nlm -thread 20 -loops 10 -CAfile \openssl\apps\server.pem >mttest.out 2>mttest.err"
|
H A D | mttest.c | 176 fprintf(stderr," -CAfile arg - PEM format file of CA's\n"); 188 char *CApath=NULL,*CAfile=NULL; local 227 else if (strcmp(*argv,"-CAfile") == 0) 230 CAfile= *(++argv); 309 if ( (!SSL_CTX_load_verify_locations(s_ctx,CAfile,CApath)) || 311 (!SSL_CTX_load_verify_locations(c_ctx,CAfile,CApath)) ||
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/tunala/ |
H A D | tunala.c | 70 const char *CAfile, const char *cert, const char *key, 731 const char *CAfile, const char *cert, const char *key, 764 if(CAfile) { 766 CAfile, NULL)) { 768 CAfile); 772 CAfile); 730 initialise_ssl_ctx(int server_mode, const char *engine_id, const char *CAfile, const char *cert, const char *key, const char *dcert, const char *dkey, const char *cipher_list, const char *dh_file, const char *dh_special, int tmp_rsa, int ctx_options, int out_state, int out_verify, int verify_mode, unsigned int verify_depth) argument
|
/netbsd-6-1-5-RELEASE/usr.sbin/syslogd/ |
H A D | tls.c | 150 const char *CAfile = tls_opt.CAfile; local 244 if (CAfile || CApath) { 245 if (SSL_CTX_load_verify_locations(ctx, CAfile, CApath) != 1) { 246 if (CAfile && CApath) 249 CAfile, CApath, ERR_error_string( 253 "\"%s\": %s\n", (CAfile?CAfile:CApath),
|
H A D | syslogd.h | 396 char *CAfile; /* file with CA certificate */ member in struct:tls_global_options_t
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ssl/ |
H A D | ssl_task.c | 201 char *CApath=NULL,*CAfile=NULL; local
|
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/smtp/ |
H A D | smtp.c | 1055 CAfile = var_smtp_tls_CAfile,
|