HomeSort by: relevance | last modified time | path
    Searched defs:CApath (Results 1 - 25 of 38) sorted by relevancy

1 2

  /src/external/ibm-public/postfix/dist/src/tls/
tls_proxy_server_scan.c 105 VSTRING *CApath = vstring_alloc(25);
130 RECV_ATTR_STR(TLS_ATTR_CAPATH, CApath),
150 props->CApath = vstring_export(CApath);
180 myfree((void *) props->CApath);
tls_proxy_client_scan.c 245 myfree((void *) props->CApath);
269 VSTRING *CApath = vstring_alloc(25);
292 RECV_ATTR_STR(TLS_ATTR_CAPATH, CApath),
307 props->CApath = vstring_export(CApath);
  /src/crypto/external/apache2/openssl/dist/apps/
verify.c 64 { "CApath", OPT_CAPATH, '/', "A directory of files with trusted certificates" },
68 { "no-CApath", OPT_NOCAPATH, '-',
98 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL;
140 CApath = opt_arg();
213 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) {
215 "%s: Cannot use -trusted with -CAfile, -CApath or -CAstore\n",
220 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
crl.c 87 { "CApath", OPT_CAPATH, '/', "Verify CRL using certificates in dir" },
92 { "no-CApath", OPT_NOCAPATH, '-',
112 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog;
162 CApath = opt_arg();
246 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
s_time.c 112 { "CApath", OPT_CAPATH, '/', "PEM format directory of CA's" },
116 { "no-CApath", OPT_NOCAPATH, '-',
139 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL;
190 CApath = opt_arg();
279 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath,
smime.c 148 { "CApath", OPT_CAPATH, '/', "Trusted certificates directory" },
153 { "no-CApath", OPT_NOCAPATH, '-',
208 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL;
406 CApath = opt_arg();
603 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
ts.c 64 const char *CApath, const char *CAfile,
69 const char *CApath, const char *CAfile,
73 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile,
122 { "CApath", OPT_CAPATH, '/', "Path to trusted CA files" },
173 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri",
190 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL;
289 CApath = opt_arg();
362 CApath, CAfile, CAstore, untrusted,
875 const char *CApath, const char *CAfile,
896 CApath, CAfile, CAstore, untrusted
    [all...]
cms.c 277 { "CApath", OPT_CAPATH, '/', "Trusted certificates directory" },
281 { "no-CApath", OPT_NOCAPATH, '-',
360 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL;
550 CApath = opt_arg();
1036 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
pkcs12.c 165 { "CApath", OPT_CAPATH, '/', "PEM-format directory of CA's" },
169 { "no-CApath", OPT_NOCAPATH, '-',
224 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL, *prog;
390 CApath = opt_arg();
456 if (CApath != NULL)
457 WARN_NO_EXPORT("CApath");
463 WARN_NO_EXPORT("no-CApath");
663 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
  /src/crypto/external/bsd/openssl/dist/apps/
verify.c 53 {"CApath", OPT_CAPATH, '/', "A directory of files with trusted certificates"},
57 {"no-CApath", OPT_NOCAPATH, '-',
87 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL;
129 CApath = opt_arg();
202 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) {
204 "%s: Cannot use -trusted with -CAfile, -CApath or -CAstore\n",
209 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
crl.c 64 {"CApath", OPT_CAPATH, '/', "Verify CRL using certificates in dir"},
69 {"no-CApath", OPT_NOCAPATH, '-',
89 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog;
138 CApath = opt_arg();
225 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
s_time.c 94 {"CApath", OPT_CAPATH, '/', "PEM format directory of CA's"},
98 {"no-CApath", OPT_NOCAPATH, '-',
121 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL;
172 CApath = opt_arg();
262 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath,
smime.c 110 {"CApath", OPT_CAPATH, '/', "Trusted certificates directory"},
115 {"no-CApath", OPT_NOCAPATH, '-',
145 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL;
337 CApath = opt_arg();
541 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
ts.c 66 const char *CApath, const char *CAfile,
71 const char *CApath, const char *CAfile,
75 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile,
101 {"CApath", OPT_CAPATH, '/', "Path to trusted CA files"},
152 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri",
169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL;
265 CApath = opt_arg();
338 CApath, CAfile, CAstore, untrusted,
851 const char *CApath, const char *CAfile,
872 CApath, CAfile, CAstore, untrusted
    [all...]
cms.c 210 {"CApath", OPT_CAPATH, '/', "Trusted certificates directory"},
214 {"no-CApath", OPT_NOCAPATH, '-',
293 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL;
473 CApath = opt_arg();
945 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
ocsp.c 118 {"CApath", OPT_CAPATH, '<', "Trusted certificates directory"},
122 {"no-CApath", OPT_NOCAPATH, '-',
236 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL;
393 CApath = opt_arg();
799 store = setup_verify(CAfile, noCAfile, CApath, noCApath,
pkcs12.c 122 {"CApath", OPT_CAPATH, '/', "PEM-format directory of CA's"},
126 {"no-CApath", OPT_NOCAPATH, '-',
175 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL, *prog;
327 CApath = opt_arg();
396 if (CApath != NULL)
397 WARN_NO_EXPORT("CApath");
403 WARN_NO_EXPORT("no-CApath");
602 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
  /src/crypto/external/bsd/openssl.old/dist/apps/
verify.c 41 {"CApath", OPT_CAPATH, '/', "A directory of trusted certificates"},
45 {"no-CApath", OPT_NOCAPATH, '-',
70 const char *prog, *CApath = NULL, *CAfile = NULL;
111 CApath = opt_arg();
165 if (trusted != NULL && (CAfile || CApath)) {
167 "%s: Cannot use -trusted with -CAfile or -CApath\n",
172 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
crl.c 46 {"CApath", OPT_CAPATH, '/', "Verify CRL using certificates in dir"},
50 {"no-CApath", OPT_NOCAPATH, '-',
74 const char *CAfile = NULL, *CApath = NULL, *prog;
122 CApath = opt_arg();
188 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
s_time.c 63 {"CApath", OPT_CAPATH, '/', "PEM format directory of CA's"},
68 {"no-CApath", OPT_NOCAPATH, '-',
97 char *CApath = NULL, *CAfile = NULL, *cipher = NULL, *ciphersuites = NULL;
148 CApath = opt_arg();
209 if (!ctx_set_verify_locations(ctx, CAfile, CApath, noCAfile, noCApath)) {
smime.c 87 {"CApath", OPT_CAPATH, '/', "Trusted certificates directory"},
91 {"no-CApath", OPT_NOCAPATH, '-',
124 const char *CAfile = NULL, *CApath = NULL, *prog = NULL;
303 CApath = opt_arg();
476 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
pkcs12.c 105 {"CApath", OPT_CAPATH, '/', "PEM-format directory of CA's"},
109 {"no-CApath", OPT_NOCAPATH, '-',
136 const char *CApath = NULL, *CAfile = NULL, *prog;
267 CApath = opt_arg();
403 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath))
ts.c 66 const char *CApath, const char *CAfile, const char *untrusted,
70 const char *CApath, const char *CAfile,
73 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile,
110 {"CApath", OPT_CAPATH, '/', "Path to trusted CA files"},
143 "ts -verify -CApath dir -CAfile file.pem -untrusted file.pem",
160 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL;
251 CApath = opt_arg();
312 CApath, CAfile, untrusted,
820 const char *CApath, const char *CAfile, const char *untrusted,
840 CApath, CAfile, untrusted
    [all...]
  /src/usr.sbin/syslogd/
tls.c 155 const char *CApath = tls_opt.CAdir;
248 if (CAfile || CApath) {
249 if (SSL_CTX_load_verify_locations(ctx, CAfile, CApath) != 1) {
250 if (CAfile && CApath)
253 CAfile, CApath, ERR_error_string(
257 "\"%s\": %s\n", (CAfile?CAfile:CApath),
  /src/crypto/external/apache2/openssl/dist/test/
ssl_old_test.c 678 fprintf(stderr, " -CApath arg - PEM format directory of CA's\n");
892 const char *CApath = NULL, *CAfile = NULL;
1063 } else if (strcmp(*argv, "-CApath") == 0) {
1066 CApath = *(++argv);
1537 || SSL_CTX_load_verify_dir(s_ctx, CApath))
1540 || SSL_CTX_load_verify_dir(s_ctx2, CApath))
1543 || SSL_CTX_load_verify_dir(c_ctx, CApath))

Completed in 46 milliseconds

1 2