HomeSort by: relevance | last modified time | path
    Searched defs:CAfile (Results 1 - 25 of 50) sorted by relevancy

1 2

  /src/crypto/external/apache2/openssl/dist/demos/bio/
sconnect.c 31 #define CAFILE "root.pem"
36 const char *CAfile = CAFILE;
48 CAfile = argv[2];
59 if (!SSL_CTX_load_verify_locations(ssl_ctx, CAfile, NULL))
  /src/crypto/external/bsd/openssl/dist/demos/bio/
sconnect.c 26 #define CAFILE "root.pem"
31 const char *CAfile = CAFILE;
44 CAfile = argv[2];
55 SSL_CTX_load_verify_locations(ssl_ctx, CAfile, NULL);
  /src/crypto/external/bsd/openssl.old/dist/demos/bio/
sconnect.c 26 #define CAFILE "root.pem"
31 const char *CAfile = CAFILE;
44 CAfile = argv[2];
59 SSL_CTX_load_verify_locations(ssl_ctx, CAfile, NULL);
  /src/external/ibm-public/postfix/dist/src/tls/
tls_proxy_server_scan.c 104 VSTRING *CAfile = vstring_alloc(25);
129 RECV_ATTR_STR(TLS_ATTR_CAFILE, CAfile),
149 props->CAfile = vstring_export(CAfile);
179 myfree((void *) props->CAfile);
tls_proxy_client_scan.c 244 myfree((void *) props->CAfile);
268 VSTRING *CAfile = vstring_alloc(25);
291 RECV_ATTR_STR(TLS_ATTR_CAFILE, CAfile),
306 props->CAfile = vstring_export(CAfile);
  /src/crypto/external/apache2/openssl/dist/apps/
verify.c 63 { "CAfile", OPT_CAFILE, '<', "A file of trusted certificates" },
66 { "no-CAfile", OPT_NOCAFILE, '-',
98 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL;
143 CAfile = opt_arg();
213 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) {
215 "%s: Cannot use -trusted with -CAfile, -CApath or -CAstore\n",
220 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
crl.c 88 { "CAfile", OPT_CAFILE, '<', "Verify CRL using certificates in file name" },
90 { "no-CAfile", OPT_NOCAFILE, '-',
112 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog;
166 CAfile = opt_arg();
246 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
s_time.c 110 { "cafile", OPT_CAFILE, '<', "PEM format file of CA's" },
111 { "CAfile", OPT_CAFILE, '<', "PEM format file of CA's" },
114 { "no-CAfile", OPT_NOCAFILE, '-',
139 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL;
193 CAfile = opt_arg();
279 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath,
smime.c 149 { "CAfile", OPT_CAFILE, '<', "Trusted certificates file" },
151 { "no-CAfile", OPT_NOCAFILE, '-',
208 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL;
403 CAfile = opt_arg();
603 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
ts.c 64 const char *CApath, const char *CAfile,
69 const char *CApath, const char *CAfile,
73 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile,
121 { "CAfile", OPT_CAFILE, '<', "File with trusted CA certs" },
173 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri",
182 const char *CAfile = NULL, *prog;
292 CAfile = opt_arg();
362 CApath, CAfile, CAstore, untrusted,
875 const char *CApath, const char *CAfile,
896 CApath, CAfile, CAstore, untrusted
    [all...]
  /src/crypto/external/bsd/openssl/dist/apps/
verify.c 52 {"CAfile", OPT_CAFILE, '<', "A file of trusted certificates"},
55 {"no-CAfile", OPT_NOCAFILE, '-',
87 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL;
132 CAfile = opt_arg();
202 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) {
204 "%s: Cannot use -trusted with -CAfile, -CApath or -CAstore\n",
209 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
crl.c 65 {"CAfile", OPT_CAFILE, '<', "Verify CRL using certificates in file name"},
67 {"no-CAfile", OPT_NOCAFILE, '-',
89 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog;
142 CAfile = opt_arg();
225 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
s_time.c 92 {"cafile", OPT_CAFILE, '<', "PEM format file of CA's"},
93 {"CAfile", OPT_CAFILE, '<', "PEM format file of CA's"},
96 {"no-CAfile", OPT_NOCAFILE, '-',
121 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL;
175 CAfile = opt_arg();
262 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath,
smime.c 111 {"CAfile", OPT_CAFILE, '<', "Trusted certificates file"},
113 {"no-CAfile", OPT_NOCAFILE, '-',
145 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL;
334 CAfile = opt_arg();
541 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
ts.c 66 const char *CApath, const char *CAfile,
71 const char *CApath, const char *CAfile,
75 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile,
100 {"CAfile", OPT_CAFILE, '<', "File with trusted CA certs"},
152 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri",
161 const char *CAfile = NULL, *prog;
268 CAfile = opt_arg();
338 CApath, CAfile, CAstore, untrusted,
851 const char *CApath, const char *CAfile,
872 CApath, CAfile, CAstore, untrusted
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/apps/
verify.c 42 {"CAfile", OPT_CAFILE, '<', "A file of trusted certificates"},
43 {"no-CAfile", OPT_NOCAFILE, '-',
70 const char *prog, *CApath = NULL, *CAfile = NULL;
114 CAfile = opt_arg();
165 if (trusted != NULL && (CAfile || CApath)) {
167 "%s: Cannot use -trusted with -CAfile or -CApath\n",
172 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
crl.c 47 {"CAfile", OPT_CAFILE, '<', "Verify CRL using certificates in file name"},
48 {"no-CAfile", OPT_NOCAFILE, '-',
74 const char *CAfile = NULL, *CApath = NULL, *prog;
126 CAfile = opt_arg();
188 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
s_time.c 64 {"cafile", OPT_CAFILE, '<', "PEM format file of CA's"},
65 {"CAfile", OPT_CAFILE, '<', "PEM format file of CA's"},
66 {"no-CAfile", OPT_NOCAFILE, '-',
97 char *CApath = NULL, *CAfile = NULL, *cipher = NULL, *ciphersuites = NULL;
151 CAfile = opt_arg();
209 if (!ctx_set_verify_locations(ctx, CAfile, CApath, noCAfile, noCApath)) {
smime.c 88 {"CAfile", OPT_CAFILE, '<', "Trusted certificates file"},
89 {"no-CAfile", OPT_NOCAFILE, '-',
124 const char *CAfile = NULL, *CApath = NULL, *prog = NULL;
300 CAfile = opt_arg();
476 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
pkcs12.c 106 {"CAfile", OPT_CAFILE, '<', "PEM-format file of CA's"},
107 {"no-CAfile", OPT_NOCAFILE, '-',
136 const char *CApath = NULL, *CAfile = NULL, *prog;
270 CAfile = opt_arg();
403 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath))
  /src/crypto/external/apache2/openssl/dist/test/
danetest.c 32 static const char *CAfile;
394 || !TEST_true(SSL_CTX_load_verify_file(ctx, CAfile))
408 OPT_TEST_DECLARE_USAGE("basedomain CAfile tlsafile\n")
418 || !TEST_ptr(CAfile = test_get_argument(1))
  /src/crypto/external/bsd/openssl/dist/test/
danetest.c 32 static const char *CAfile;
393 || !TEST_true(SSL_CTX_load_verify_file(ctx, CAfile))
407 OPT_TEST_DECLARE_USAGE("basedomain CAfile tlsafile\n")
417 || !TEST_ptr(CAfile = test_get_argument(1))
  /src/crypto/external/bsd/openssl.old/dist/test/
danetest.c 32 static const char *CAfile;
396 || !TEST_true(SSL_CTX_load_verify_locations(ctx, CAfile, NULL))
415 || !TEST_ptr(CAfile = test_get_argument(1))
417 TEST_error("Usage error: danetest basedomain CAfile tlsafile");
  /src/usr.sbin/syslogd/
syslogd.h 398 char *CAfile; /* file with CA certificate */
tls.c 154 const char *CAfile = tls_opt.CAfile;
248 if (CAfile || CApath) {
249 if (SSL_CTX_load_verify_locations(ctx, CAfile, CApath) != 1) {
250 if (CAfile && CApath)
253 CAfile, CApath, ERR_error_string(
257 "\"%s\": %s\n", (CAfile?CAfile:CApath),

Completed in 44 milliseconds

1 2