| /src/external/ibm-public/postfix/dist/src/tls/ |
| tls_proxy_server_scan.c | 105 VSTRING *CApath = vstring_alloc(25); 130 RECV_ATTR_STR(TLS_ATTR_CAPATH, CApath), 150 props->CApath = vstring_export(CApath); 180 myfree((void *) props->CApath);
|
| tls_proxy_client_scan.c | 245 myfree((void *) props->CApath); 269 VSTRING *CApath = vstring_alloc(25); 292 RECV_ATTR_STR(TLS_ATTR_CAPATH, CApath), 307 props->CApath = vstring_export(CApath);
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| verify.c | 64 { "CApath", OPT_CAPATH, '/', "A directory of files with trusted certificates" }, 68 { "no-CApath", OPT_NOCAPATH, '-', 98 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL; 140 CApath = opt_arg(); 213 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) { 215 "%s: Cannot use -trusted with -CAfile, -CApath or -CAstore\n", 220 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| crl.c | 87 { "CApath", OPT_CAPATH, '/', "Verify CRL using certificates in dir" }, 92 { "no-CApath", OPT_NOCAPATH, '-', 112 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; 162 CApath = opt_arg(); 246 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| s_time.c | 112 { "CApath", OPT_CAPATH, '/', "PEM format directory of CA's" }, 116 { "no-CApath", OPT_NOCAPATH, '-', 139 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; 190 CApath = opt_arg(); 279 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath,
|
| smime.c | 148 { "CApath", OPT_CAPATH, '/', "Trusted certificates directory" }, 153 { "no-CApath", OPT_NOCAPATH, '-', 208 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL; 406 CApath = opt_arg(); 603 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| ts.c | 64 const char *CApath, const char *CAfile, 69 const char *CApath, const char *CAfile, 73 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile, 122 { "CApath", OPT_CAPATH, '/', "Path to trusted CA files" }, 173 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri", 190 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; 289 CApath = opt_arg(); 362 CApath, CAfile, CAstore, untrusted, 875 const char *CApath, const char *CAfile, 896 CApath, CAfile, CAstore, untrusted [all...] |
| cms.c | 277 { "CApath", OPT_CAPATH, '/', "Trusted certificates directory" }, 281 { "no-CApath", OPT_NOCAPATH, '-', 360 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; 550 CApath = opt_arg(); 1036 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| pkcs12.c | 165 { "CApath", OPT_CAPATH, '/', "PEM-format directory of CA's" }, 169 { "no-CApath", OPT_NOCAPATH, '-', 224 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL, *prog; 390 CApath = opt_arg(); 456 if (CApath != NULL) 457 WARN_NO_EXPORT("CApath"); 463 WARN_NO_EXPORT("no-CApath"); 663 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| verify.c | 53 {"CApath", OPT_CAPATH, '/', "A directory of files with trusted certificates"}, 57 {"no-CApath", OPT_NOCAPATH, '-', 87 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL; 129 CApath = opt_arg(); 202 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) { 204 "%s: Cannot use -trusted with -CAfile, -CApath or -CAstore\n", 209 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| crl.c | 64 {"CApath", OPT_CAPATH, '/', "Verify CRL using certificates in dir"}, 69 {"no-CApath", OPT_NOCAPATH, '-', 89 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; 138 CApath = opt_arg(); 225 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| s_time.c | 94 {"CApath", OPT_CAPATH, '/', "PEM format directory of CA's"}, 98 {"no-CApath", OPT_NOCAPATH, '-', 121 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; 172 CApath = opt_arg(); 262 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath,
|
| smime.c | 110 {"CApath", OPT_CAPATH, '/', "Trusted certificates directory"}, 115 {"no-CApath", OPT_NOCAPATH, '-', 145 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL; 337 CApath = opt_arg(); 541 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| ts.c | 66 const char *CApath, const char *CAfile, 71 const char *CApath, const char *CAfile, 75 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile, 101 {"CApath", OPT_CAPATH, '/', "Path to trusted CA files"}, 152 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri", 169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; 265 CApath = opt_arg(); 338 CApath, CAfile, CAstore, untrusted, 851 const char *CApath, const char *CAfile, 872 CApath, CAfile, CAstore, untrusted [all...] |
| cms.c | 210 {"CApath", OPT_CAPATH, '/', "Trusted certificates directory"}, 214 {"no-CApath", OPT_NOCAPATH, '-', 293 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; 473 CApath = opt_arg(); 945 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| ocsp.c | 118 {"CApath", OPT_CAPATH, '<', "Trusted certificates directory"}, 122 {"no-CApath", OPT_NOCAPATH, '-', 236 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; 393 CApath = opt_arg(); 799 store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| pkcs12.c | 122 {"CApath", OPT_CAPATH, '/', "PEM-format directory of CA's"}, 126 {"no-CApath", OPT_NOCAPATH, '-', 175 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL, *prog; 327 CApath = opt_arg(); 396 if (CApath != NULL) 397 WARN_NO_EXPORT("CApath"); 403 WARN_NO_EXPORT("no-CApath"); 602 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| verify.c | 41 {"CApath", OPT_CAPATH, '/', "A directory of trusted certificates"}, 45 {"no-CApath", OPT_NOCAPATH, '-', 70 const char *prog, *CApath = NULL, *CAfile = NULL; 111 CApath = opt_arg(); 165 if (trusted != NULL && (CAfile || CApath)) { 167 "%s: Cannot use -trusted with -CAfile or -CApath\n", 172 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
|
| crl.c | 46 {"CApath", OPT_CAPATH, '/', "Verify CRL using certificates in dir"}, 50 {"no-CApath", OPT_NOCAPATH, '-', 74 const char *CAfile = NULL, *CApath = NULL, *prog; 122 CApath = opt_arg(); 188 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
|
| s_time.c | 63 {"CApath", OPT_CAPATH, '/', "PEM format directory of CA's"}, 68 {"no-CApath", OPT_NOCAPATH, '-', 97 char *CApath = NULL, *CAfile = NULL, *cipher = NULL, *ciphersuites = NULL; 148 CApath = opt_arg(); 209 if (!ctx_set_verify_locations(ctx, CAfile, CApath, noCAfile, noCApath)) {
|
| smime.c | 87 {"CApath", OPT_CAPATH, '/', "Trusted certificates directory"}, 91 {"no-CApath", OPT_NOCAPATH, '-', 124 const char *CAfile = NULL, *CApath = NULL, *prog = NULL; 303 CApath = opt_arg(); 476 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
|
| pkcs12.c | 105 {"CApath", OPT_CAPATH, '/', "PEM-format directory of CA's"}, 109 {"no-CApath", OPT_NOCAPATH, '-', 136 const char *CApath = NULL, *CAfile = NULL, *prog; 267 CApath = opt_arg(); 403 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath))
|
| ts.c | 66 const char *CApath, const char *CAfile, const char *untrusted, 70 const char *CApath, const char *CAfile, 73 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile, 110 {"CApath", OPT_CAPATH, '/', "Path to trusted CA files"}, 143 "ts -verify -CApath dir -CAfile file.pem -untrusted file.pem", 160 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; 251 CApath = opt_arg(); 312 CApath, CAfile, untrusted, 820 const char *CApath, const char *CAfile, const char *untrusted, 840 CApath, CAfile, untrusted [all...] |
| /src/usr.sbin/syslogd/ |
| tls.c | 155 const char *CApath = tls_opt.CAdir; 248 if (CAfile || CApath) { 249 if (SSL_CTX_load_verify_locations(ctx, CAfile, CApath) != 1) { 250 if (CAfile && CApath) 253 CAfile, CApath, ERR_error_string( 257 "\"%s\": %s\n", (CAfile?CAfile:CApath),
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| ssl_old_test.c | 678 fprintf(stderr, " -CApath arg - PEM format directory of CA's\n"); 892 const char *CApath = NULL, *CAfile = NULL; 1063 } else if (strcmp(*argv, "-CApath") == 0) { 1066 CApath = *(++argv); 1537 || SSL_CTX_load_verify_dir(s_ctx, CApath)) 1540 || SSL_CTX_load_verify_dir(s_ctx2, CApath)) 1543 || SSL_CTX_load_verify_dir(c_ctx, CApath))
|