/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/cms/ |
H A D | cms_ver.c | 19 X509 *cacert = NULL; local 32 tbio = BIO_new_file("cacert.pem", "r"); 37 cacert = PEM_read_bio_X509(tbio, NULL, 0, NULL); 39 if (!cacert) 42 if (!X509_STORE_add_cert(st, cacert)) 80 X509_free(cacert);
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/smime/ |
H A D | smver.c | 19 X509 *cacert = NULL; local 32 tbio = BIO_new_file("cacert.pem", "r"); 37 cacert = PEM_read_bio_X509(tbio, NULL, 0, NULL); 39 if (!cacert) 42 if (!X509_STORE_add_cert(st, cacert)) 78 X509_free(cacert);
|
/netbsd-current/crypto/external/bsd/openssl/dist/demos/smime/ |
H A D | smver.c | 19 X509 *cacert = NULL; local 34 tbio = BIO_new_file("cacert.pem", "r"); 39 cacert = PEM_read_bio_X509(tbio, NULL, 0, NULL); 41 if (cacert == NULL) 44 if (!X509_STORE_add_cert(st, cacert)) 82 X509_free(cacert);
|
/netbsd-current/crypto/external/bsd/openssl/dist/demos/cms/ |
H A D | cms_ver.c | 19 X509 *cacert = NULL; local 34 tbio = BIO_new_file("cacert.pem", "r"); 39 cacert = PEM_read_bio_X509(tbio, NULL, 0, NULL); 41 if (cacert == NULL) 44 if (!X509_STORE_add_cert(st, cacert)) 83 X509_free(cacert);
|
/netbsd-current/crypto/external/bsd/openssl/dist/test/ |
H A D | algorithmid_test.c | 111 X509 *cacert, const char *ca_filename) 137 || !TEST_ptr(pkey = X509_get0_pubkey(cacert))) 216 X509 *eecert = NULL, *cacert = NULL; local 237 if ((cacert = PEM_read_bio_X509(bca, NULL, NULL, NULL)) == NULL) { 244 ret = test_x509_sig_aid(eecert, eecert_filename, cacert, cacert_filename) 246 & test_x509_spki_aid(cacert, cacert_filename); 251 X509_free(cacert); 110 test_x509_sig_aid(X509 *eecert, const char *ee_filename, X509 *cacert, const char *ca_filename) argument
|
/netbsd-current/external/ibm-public/postfix/dist/src/tls/ |
H A D | mkcert.sh | 123 local cacert=$1; shift 137 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 146 local cacert=$1; shift 158 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hx509/data/ |
H A D | mkcert.sh | 55 local cacert=$1; shift 64 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
|
/netbsd-current/external/bsd/pkg_install/dist/x509/ |
H A D | pkgsrc.sh | 24 $CA -out $1/cacert.pem -batch \
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/certs/ |
H A D | mkcert.sh | 134 local cacert=$1; shift 147 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 156 local cacert=$1; shift 168 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
|
/netbsd-current/external/bsd/openldap/dist/contrib/ldapc++/examples/ |
H A D | startTls.cpp | 18 std::string cacert(argv[2]); 26 tls.setOption( TlsOptions::CACERTFILE, cacert );
|
/netbsd-current/external/bsd/openldap/dist/tests/scripts/ |
H A D | test066-autoca | 220 echo "-----BEGIN CERTIFICATE-----" > $TESTDIR/cacert.pem 221 sed -e "/^dn:/d" -e "s/cACertificate;binary:://" -e "/^$/d" $SEARCHOUT >> $TESTDIR/cacert.pem 222 echo "-----END CERTIFICATE-----" >> $TESTDIR/cacert.pem 237 LDAPTLS_CACERT=$TESTDIR/cacert.pem
|
/netbsd-current/external/bsd/openldap/dist/tests/scripts/lloadd/ |
H A D | test005-tls | 164 $LDAPSEARCH -o tls-cacert=$TESTDIR/tls/ca/certs/testsuiteCA.crt -o tls-reqcert=hard -ZZ -b "" -s base -H $URIP1 \ 177 $LDAPSEARCH -o tls-cacert=$TESTDIR/tls/ca/certs/testsuiteCA.crt -o tls-reqcert=hard -o tls-protocol-min=3.3 -ZZ -b "" -s base -H $URIP1 \ 216 $LDAPSEARCH -o tls-cacert=$TESTDIR/tls/ca/certs/testsuiteCA.crt \ 233 $LDAPSASLWHOAMI -o tls-cacert=$TESTDIR/tls/ca/certs/testsuiteCA.crt -o tls-reqcert=hard \
|
/netbsd-current/crypto/external/bsd/openssl/dist/test/certs/ |
H A D | mkcert.sh | 137 local cacert=$1; shift 156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 165 local cacert=$1; shift 177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
|
/netbsd-current/crypto/dist/ipsec-tools/src/racoon/ |
H A D | remoteconf.c | 692 if (new->cacert != NULL && new->cacert == rmconf->cacert) { 693 new->cacert = vdup(new->cacert); 694 STRDUP_FATAL(new->cacert); 750 if (rmconf->cacert) 751 vfree(rmconf->cacert);
|
H A D | remoteconf.h | 109 vchar_t *cacert; /* CA certificate */ member in struct:remoteconf
|
H A D | cfparse.y | 2092 if (cur_rmconf->cacert != NULL) { 2098 &cur_rmconf->cacert)) {
|
H A D | oakley.c | 2248 } else if (rmconf->cacert != NULL) { 2249 type = oakley_get_certtype(rmconf->cacert); 2250 asn1dn = eay_get_x509asn1subjectname(rmconf->cacert);
|
/netbsd-current/external/bsd/openldap/dist/servers/slapd/overlays/ |
H A D | autoca.c | 472 struct berval *cacert = arg; local 490 bvs[0] = *cacert; 514 autoca_setca( struct berval *cacert ) 516 struct berval *bv = ch_malloc( sizeof(struct berval) + cacert->bv_len ); 517 bv->bv_len = cacert->bv_len; 519 AC_MEMCPY( bv->bv_val, cacert->bv_val, bv->bv_len );
|