/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/maurice/ |
H A D | loadkeys.h | 15 EVP_PKEY * ReadPublicKey(const char *certfile);
|
H A D | loadkeys.c | 25 EVP_PKEY * ReadPublicKey(const char *certfile) argument 27 FILE *fp = fopen (certfile, "r");
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/tests/ |
H A D | secureserver.pl | 65 my $certfile; # certificate chain PEM file 131 elsif($ARGV[0] eq '--certfile') { 181 $certfile = "$srcdir/". ($stuncert?"certs/$stuncert":"stunnel.pem"); 228 $cmd = "$stunnel -p $certfile -P $pidfile "; 235 print "pem cert file: $certfile\n"; 258 cert = $certfile 289 print "cert = $certfile\n"; 305 chmod(0600, $certfile) if(-f $certfile);
|
H A D | runtests.pl | 1332 my ($verbose, $ipv6, $certfile) = @_; 1364 $certfile = 'stunnel.pem' unless($certfile); 1372 $flags .= "--certfile \"$certfile\" " if($certfile ne 'stunnel.pem'); 1400 $runcert{$server} = $certfile; 1589 my ($verbose, $ipv6, $certfile) = @_; 1621 $certfile = 'stunnel.pem' unless($certfile); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | crl2p7.c | 75 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile); 92 char *infile,*outfile,*prog,*certfile; local 141 else if (strcmp(*argv,"-certfile") == 0) 166 BIO_printf(bio_err," -certfile arg certificates file of chain to a trusted CA\n"); 168 BIO_printf(bio_err," -nocrl no crl to load, just certs from '-certfile'\n"); 231 certfile = sk_value(certflst, i); 232 if (add_certs_from_file(cert_stack,certfile) < 0) 296 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile) 305 if ((stat(certfile,&st) != 0)) 307 BIO_printf(bio_err,"unable to load the file, %s\n",certfile); [all...] |
H A D | verify.c | 281 static STACK_OF(X509) *load_untrusted(char *certfile) 293 if(!(in=BIO_new_file(certfile, "r"))) { 294 BIO_printf(bio_err,"error opening the file, %s\n",certfile); 300 BIO_printf(bio_err,"error reading the file, %s\n",certfile); 316 BIO_printf(bio_err,"no certificates in file, %s\n",certfile);
|
H A D | smime.c | 93 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 296 else if (!strcmp (*args, "-certfile")) 301 certfile = *args; 446 BIO_printf (bio_err, "-certfile file other certificates file\n"); 553 if (certfile) 555 if (!(other = load_certs(bio_err,certfile,FORMAT_PEM, NULL, 559 BIO_printf(bio_err, "Can't read certificate file %s\n", certfile);
|
H A D | pkcs12.c | 98 char *certfile=NULL; local 214 } else if (!strcmp (*args, "-certfile")) { 217 certfile = *args; 290 BIO_printf (bio_err, "-certfile f add all certs in f\n"); 493 if(certfile) 496 if(!(morecerts = load_certs(bio_err, certfile, FORMAT_PEM, 498 "certificates from certfile"))) 507 CRYPTO_push_info("reading certs from certfile");
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | crl2p7.c | 76 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile); 94 char *infile, *outfile, *prog, *certfile; local 136 } else if (strcmp(*argv, "-certfile") == 0) { 165 " -certfile arg certificates file of chain to a trusted CA\n"); 168 " -nocrl no crl to load, just certs from '-certfile'\n"); 231 certfile = sk_OPENSSL_STRING_value(certflst, i); 232 if (add_certs_from_file(cert_stack, certfile) < 0) { 294 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile) 303 if ((in == NULL) || (BIO_read_filename(in, certfile) <= 0)) { 304 BIO_printf(bio_err, "error opening the file, %s\n", certfile); [all...] |
H A D | s_cb.c | 1168 const char *certfile; member in struct:ssl_excert_st 1282 exc->certfile = NULL; 1328 if (!exc->certfile && !exc->next) { 1334 if (!exc->certfile) { 1338 exc->cert = load_cert(err, exc->certfile, exc->certform, 1346 exc->key = load_key(err, exc->certfile, exc->certform, 1382 if (exc->certfile && !ssl_excert_prepend(&exc)) { 1387 exc->certfile = argn;
|
H A D | CA.sh | 150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
H A D | smime.c | 98 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; local 294 } else if (!strcmp(*args, "-certfile")) { 297 certfile = *++args; 420 BIO_printf(bio_err, "-certfile file other certificates file\n"); 527 if (certfile) { 528 if (!(other = load_certs(bio_err, certfile, FORMAT_PEM, NULL,
|
H A D | pkcs12.c | 104 char *certfile = NULL; local 244 } else if (!strcmp(*args, "-certfile")) { 247 certfile = *args; 337 BIO_printf(bio_err, "-certfile f add all certs in f\n"); 563 if (certfile) { 565 if (!(morecerts = load_certs(bio_err, certfile, FORMAT_PEM, 567 "certificates from certfile"))) 575 CRYPTO_push_info("reading certs from certfile");
|
H A D | cms.c | 123 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; local 484 } else if (!strcmp(*args, "-certfile")) { 487 certfile = *++args; 621 BIO_printf(bio_err, "-certfile file other certificates file\n"); 732 if (certfile) { 733 if (!(other = load_certs(bio_err, certfile, FORMAT_PEM, NULL,
|
H A D | ca.c | 269 char *certfile = NULL; local 409 certfile = *(++argv); 732 if ((certfile == NULL) 733 && ((certfile = NCONF_get_string(conf, 739 x509 = load_cert(bio_err, certfile, FORMAT_PEM, NULL, e,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/sign/ |
H A D | sign.c | 85 static char certfile[] = "cert.pem"; local 129 fp = fopen(certfile, "r");
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/sign/ |
H A D | sign.c | 82 static char certfile[] = "cert.pem"; local 123 fp = fopen (certfile, "r");
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/sign/ |
H A D | sign.c | 85 static char certfile[] = "cert.pem"; local 129 fp = fopen(certfile, "r");
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | crl2p7.c | 76 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile); 94 char *infile, *outfile, *prog, *certfile; local 136 } else if (strcmp(*argv, "-certfile") == 0) { 165 " -certfile arg certificates file of chain to a trusted CA\n"); 168 " -nocrl no crl to load, just certs from '-certfile'\n"); 231 certfile = sk_OPENSSL_STRING_value(certflst, i); 232 if (add_certs_from_file(cert_stack, certfile) < 0) { 294 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile) 303 if ((in == NULL) || (BIO_read_filename(in, certfile) <= 0)) { 304 BIO_printf(bio_err, "error opening the file, %s\n", certfile); [all...] |
H A D | s_cb.c | 1168 const char *certfile; member in struct:ssl_excert_st 1282 exc->certfile = NULL; 1328 if (!exc->certfile && !exc->next) { 1334 if (!exc->certfile) { 1338 exc->cert = load_cert(err, exc->certfile, exc->certform, 1346 exc->key = load_key(err, exc->certfile, exc->certform, 1382 if (exc->certfile && !ssl_excert_prepend(&exc)) { 1387 exc->certfile = argn;
|
H A D | CA.sh | 150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
H A D | smime.c | 98 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; local 294 } else if (!strcmp(*args, "-certfile")) { 297 certfile = *++args; 420 BIO_printf(bio_err, "-certfile file other certificates file\n"); 527 if (certfile) { 528 if (!(other = load_certs(bio_err, certfile, FORMAT_PEM, NULL,
|
H A D | pkcs12.c | 104 char *certfile = NULL; local 244 } else if (!strcmp(*args, "-certfile")) { 247 certfile = *args; 337 BIO_printf(bio_err, "-certfile f add all certs in f\n"); 563 if (certfile) { 565 if (!(morecerts = load_certs(bio_err, certfile, FORMAT_PEM, 567 "certificates from certfile"))) 575 CRYPTO_push_info("reading certs from certfile");
|
H A D | cms.c | 123 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; local 484 } else if (!strcmp(*args, "-certfile")) { 487 certfile = *++args; 621 BIO_printf(bio_err, "-certfile file other certificates file\n"); 732 if (certfile) { 733 if (!(other = load_certs(bio_err, certfile, FORMAT_PEM, NULL,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/tests/certs/scripts/ |
H A D | genserv.sh | 84 echo "$OPENSSL pkcs12 -export -des3 -out $PREFIX-sv.p12 -caname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt " 86 $OPENSSL pkcs12 -export -des3 -out $PREFIX-sv.p12 -caname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt
|