Searched refs:CAfile (Results 1 - 21 of 21) sorted by last modified time

/freebsd-9.3-release/crypto/openssl/ssl/
H A Dssl.h1674 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
H A Dssl_lib.c2587 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, argument
2590 return (X509_STORE_load_locations(ctx->cert_store, CAfile, CApath));
H A Dssltest.c275 fprintf(stderr, " -CAfile arg - PEM format file of CA's\n");
395 char *CApath = NULL, *CAfile = NULL; local
564 } else if (strcmp(*argv, "-CAfile") == 0) {
567 CAfile = *(++argv);
784 if ((!SSL_CTX_load_verify_locations(s_ctx, CAfile, CApath)) ||
786 (!SSL_CTX_load_verify_locations(c_ctx, CAfile, CApath)) ||
H A Dssl_task.c213 char *CApath = NULL, *CAfile = NULL; local
/freebsd-9.3-release/crypto/openssl/crypto/threads/
H A Dmttest.c175 fprintf(stderr, " -CAfile arg - PEM format file of CA's\n");
187 char *CApath = NULL, *CAfile = NULL; local
224 } else if (strcmp(*argv, "-CAfile") == 0) {
227 CAfile = *(++argv);
297 if ((!SSL_CTX_load_verify_locations(s_ctx, CAfile, CApath)) ||
299 (!SSL_CTX_load_verify_locations(c_ctx, CAfile, CApath)) ||
/freebsd-9.3-release/crypto/openssl/demos/tunala/
H A Dtunala.c86 const char *CAfile, const char *cert,
779 const char *CAfile, const char *cert,
815 if (CAfile) {
817 CAfile, NULL)) {
818 fprintf(stderr, "Error loading CA cert(s) in '%s'\n", CAfile);
821 fprintf(stderr, "Info, operating with CA cert(s) in '%s'\n", CAfile);
778 initialise_ssl_ctx(int server_mode, const char *engine_id, const char *CAfile, const char *cert, const char *key, const char *dcert, const char *dkey, const char *cipher_list, const char *dh_file, const char *dh_special, int tmp_rsa, int ctx_options, int out_state, int out_verify, int verify_mode, unsigned int verify_depth) argument
/freebsd-9.3-release/crypto/openssl/apps/
H A Dapps.c1268 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath) argument
1277 if (CAfile) {
1278 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM)) {
1279 BIO_printf(bp, "Error loading file %s\n", CAfile);
H A Dcrl.c90 " -CAfile name - verify CRL using certificates in file \"name\"\n",
105 char *CAfile = NULL, *CApath = NULL; local
179 } else if (strcmp(*argv, "-CAfile") == 0) {
182 CAfile = *(++argv);
237 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM))
H A Docsp.c123 char *CAfile = NULL, *CApath = NULL; local
271 } else if (!strcmp(*args, "-CAfile")) {
274 CAfile = *args;
473 BIO_printf(bio_err, "-CAfile file trusted certificates file\n");
730 store = setup_verify(bio_err, CAfile, CApath);
H A Dsmime.c105 char *CAfile = NULL, *CApath = NULL; local
270 } else if (!strcmp(*args, "-CAfile")) {
273 CAfile = *args;
406 BIO_printf(bio_err, "-CAfile file trusted certificates file\n");
561 if (!(store = setup_verify(bio_err, CAfile, CApath)))
H A Dverify.c85 char *CApath = NULL, *CAfile = NULL; local
119 } else if (strcmp(*argv, "-CAfile") == 0) {
122 CAfile = *(++argv);
167 if (CAfile) {
168 i = X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM);
170 BIO_printf(bio_err, "Error loading file %s\n", CAfile);
218 "usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
H A Ds_client.c226 BIO_printf(bio_err, " -CAfile arg - PEM format file of CA's\n");
345 char *CApath = NULL, *CAfile = NULL, *cipher = NULL; local
539 } else if (strcmp(*argv, "-CAfile") == 0) {
542 CAfile = *(++argv);
742 if ((!SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) ||
H A Dx509.c153 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
176 char *infile = NULL, *outfile = NULL, *keyfile = NULL, *CAfile = NULL; local
296 CAfile = *(++argv);
462 CAkeyfile = CAfile;
592 xca = load_cert(bio_err, CAfile, CAformat, NULL, e, "CA Certificate");
856 if (!x509_certify(ctx, CAfile, digest, x, xca,
972 static ASN1_INTEGER *x509_load_serial(char *CAfile, char *serialfile, argument
981 ? (strlen(CAfile) + strlen(POSTFIX) + 1)
989 BUF_strlcpy(buf, CAfile, len);
1018 static int x509_certify(X509_STORE *ctx, char *CAfile, cons argument
[all...]
H A Dapps.h285 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
H A Dcms.c126 char *CAfile = NULL, *CApath = NULL; local
410 } else if (!strcmp(*args, "-CAfile")) {
413 CAfile = *++args;
568 BIO_printf(bio_err, "-CAfile file trusted certificates file\n");
775 if (!(store = setup_verify(bio_err, CAfile, CApath)))
H A Dpkcs12.c134 char *CApath = NULL, *CAfile = NULL; local
328 } else if (!strcmp(*args, "-CAfile")) {
331 CAfile = *args;
358 BIO_printf(bio_err, "-CAfile arg - PEM format file of CA's\n");
606 if (!X509_STORE_load_locations(store, CAfile, CApath))
H A Ds_time.c181 static char *CAfile = NULL; variable
204 CAfile = NULL;
235 -CAfile arg - PEM format file of CA's\n\
316 } else if (strcmp(*argv, "-CAfile") == 0) {
320 CAfile = *(++argv);
486 if ((!SSL_CTX_load_verify_locations(tm_ctx, CAfile, CApath)) ||
H A Ds_server.c394 BIO_printf(bio_err, " -CAfile arg - PEM format file of CA's\n");
788 char *CApath = NULL, *CAfile = NULL; local
941 } else if (strcmp(*argv, "-CAfile") == 0) {
944 CAfile = *(++argv);
1268 if ((!SSL_CTX_load_verify_locations(ctx, CAfile, CApath)) ||
1324 if ((!SSL_CTX_load_verify_locations(ctx2, CAfile, CApath)) ||
1491 if (CAfile != NULL) {
1492 SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file(CAfile));
1495 SSL_CTX_set_client_CA_list(ctx2, SSL_load_client_CA_file(CAfile));
H A DCA.sh177 $VERIFY -CAfile $CATOP/$CACERT newcert.pem
182 $VERIFY -CAfile $CATOP/$CACERT $j
/freebsd-9.3-release/crypto/openssl/demos/ssltest-ecc/
H A Dssltest.sh98 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \
103 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \
115 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \
120 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \
130 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \
148 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \
153 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \
170 echo $SSLTEST $SSL_VERSION -CAfile $CA_PEM \
173 $SSLTEST $SSL_VERSION -CAfile $CA_PEM \
178 $SSLTEST $SSL_VERSION -CAfile
[all...]
/freebsd-9.3-release/crypto/openssl/test/
H A Dtestss76 $verifycmd -CAfile $CAcert $CAcert
98 $verifycmd -CAfile $CAcert $Ucert
120 $verifycmd -CAfile $CAcert -untrusted $P1intermediate $P1cert
142 $verifycmd -CAfile $CAcert -untrusted $P2intermediate $P2cert

Completed in 310 milliseconds