| /src/crypto/external/apache2/openssl/dist/demos/bio/ |
| sconnect.c | 31 #define CAFILE "root.pem" 36 const char *CAfile = CAFILE; 48 CAfile = argv[2]; 59 if (!SSL_CTX_load_verify_locations(ssl_ctx, CAfile, NULL))
|
| /src/crypto/external/bsd/openssl/dist/demos/bio/ |
| sconnect.c | 26 #define CAFILE "root.pem" 31 const char *CAfile = CAFILE; 44 CAfile = argv[2]; 55 SSL_CTX_load_verify_locations(ssl_ctx, CAfile, NULL);
|
| /src/crypto/external/bsd/openssl.old/dist/demos/bio/ |
| sconnect.c | 26 #define CAFILE "root.pem" 31 const char *CAfile = CAFILE; 44 CAfile = argv[2]; 59 SSL_CTX_load_verify_locations(ssl_ctx, CAfile, NULL);
|
| /src/external/ibm-public/postfix/dist/src/tls/ |
| tls_proxy_server_scan.c | 104 VSTRING *CAfile = vstring_alloc(25); 129 RECV_ATTR_STR(TLS_ATTR_CAFILE, CAfile), 149 props->CAfile = vstring_export(CAfile); 179 myfree((void *) props->CAfile);
|
| tls_proxy_client_scan.c | 244 myfree((void *) props->CAfile); 268 VSTRING *CAfile = vstring_alloc(25); 291 RECV_ATTR_STR(TLS_ATTR_CAFILE, CAfile), 306 props->CAfile = vstring_export(CAfile);
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| verify.c | 63 { "CAfile", OPT_CAFILE, '<', "A file of trusted certificates" }, 66 { "no-CAfile", OPT_NOCAFILE, '-', 98 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL; 143 CAfile = opt_arg(); 213 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) { 215 "%s: Cannot use -trusted with -CAfile, -CApath or -CAstore\n", 220 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| crl.c | 88 { "CAfile", OPT_CAFILE, '<', "Verify CRL using certificates in file name" }, 90 { "no-CAfile", OPT_NOCAFILE, '-', 112 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; 166 CAfile = opt_arg(); 246 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| s_time.c | 110 { "cafile", OPT_CAFILE, '<', "PEM format file of CA's" }, 111 { "CAfile", OPT_CAFILE, '<', "PEM format file of CA's" }, 114 { "no-CAfile", OPT_NOCAFILE, '-', 139 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; 193 CAfile = opt_arg(); 279 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath,
|
| smime.c | 149 { "CAfile", OPT_CAFILE, '<', "Trusted certificates file" }, 151 { "no-CAfile", OPT_NOCAFILE, '-', 208 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL; 403 CAfile = opt_arg(); 603 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| ts.c | 64 const char *CApath, const char *CAfile, 69 const char *CApath, const char *CAfile, 73 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile, 121 { "CAfile", OPT_CAFILE, '<', "File with trusted CA certs" }, 173 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri", 182 const char *CAfile = NULL, *prog; 292 CAfile = opt_arg(); 362 CApath, CAfile, CAstore, untrusted, 875 const char *CApath, const char *CAfile, 896 CApath, CAfile, CAstore, untrusted [all...] |
| /src/crypto/external/bsd/openssl/dist/apps/ |
| verify.c | 52 {"CAfile", OPT_CAFILE, '<', "A file of trusted certificates"}, 55 {"no-CAfile", OPT_NOCAFILE, '-', 87 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL; 132 CAfile = opt_arg(); 202 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) { 204 "%s: Cannot use -trusted with -CAfile, -CApath or -CAstore\n", 209 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| crl.c | 65 {"CAfile", OPT_CAFILE, '<', "Verify CRL using certificates in file name"}, 67 {"no-CAfile", OPT_NOCAFILE, '-', 89 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; 142 CAfile = opt_arg(); 225 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| s_time.c | 92 {"cafile", OPT_CAFILE, '<', "PEM format file of CA's"}, 93 {"CAfile", OPT_CAFILE, '<', "PEM format file of CA's"}, 96 {"no-CAfile", OPT_NOCAFILE, '-', 121 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; 175 CAfile = opt_arg(); 262 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath,
|
| smime.c | 111 {"CAfile", OPT_CAFILE, '<', "Trusted certificates file"}, 113 {"no-CAfile", OPT_NOCAFILE, '-', 145 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL; 334 CAfile = opt_arg(); 541 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath,
|
| ts.c | 66 const char *CApath, const char *CAfile, 71 const char *CApath, const char *CAfile, 75 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile, 100 {"CAfile", OPT_CAFILE, '<', "File with trusted CA certs"}, 152 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri", 161 const char *CAfile = NULL, *prog; 268 CAfile = opt_arg(); 338 CApath, CAfile, CAstore, untrusted, 851 const char *CApath, const char *CAfile, 872 CApath, CAfile, CAstore, untrusted [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| verify.c | 42 {"CAfile", OPT_CAFILE, '<', "A file of trusted certificates"}, 43 {"no-CAfile", OPT_NOCAFILE, '-', 70 const char *prog, *CApath = NULL, *CAfile = NULL; 114 CAfile = opt_arg(); 165 if (trusted != NULL && (CAfile || CApath)) { 167 "%s: Cannot use -trusted with -CAfile or -CApath\n", 172 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
|
| crl.c | 47 {"CAfile", OPT_CAFILE, '<', "Verify CRL using certificates in file name"}, 48 {"no-CAfile", OPT_NOCAFILE, '-', 74 const char *CAfile = NULL, *CApath = NULL, *prog; 126 CAfile = opt_arg(); 188 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
|
| s_time.c | 64 {"cafile", OPT_CAFILE, '<', "PEM format file of CA's"}, 65 {"CAfile", OPT_CAFILE, '<', "PEM format file of CA's"}, 66 {"no-CAfile", OPT_NOCAFILE, '-', 97 char *CApath = NULL, *CAfile = NULL, *cipher = NULL, *ciphersuites = NULL; 151 CAfile = opt_arg(); 209 if (!ctx_set_verify_locations(ctx, CAfile, CApath, noCAfile, noCApath)) {
|
| smime.c | 88 {"CAfile", OPT_CAFILE, '<', "Trusted certificates file"}, 89 {"no-CAfile", OPT_NOCAFILE, '-', 124 const char *CAfile = NULL, *CApath = NULL, *prog = NULL; 300 CAfile = opt_arg(); 476 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
|
| pkcs12.c | 106 {"CAfile", OPT_CAFILE, '<', "PEM-format file of CA's"}, 107 {"no-CAfile", OPT_NOCAFILE, '-', 136 const char *CApath = NULL, *CAfile = NULL, *prog; 270 CAfile = opt_arg(); 403 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath))
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| danetest.c | 32 static const char *CAfile; 394 || !TEST_true(SSL_CTX_load_verify_file(ctx, CAfile)) 408 OPT_TEST_DECLARE_USAGE("basedomain CAfile tlsafile\n") 418 || !TEST_ptr(CAfile = test_get_argument(1))
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| danetest.c | 32 static const char *CAfile; 393 || !TEST_true(SSL_CTX_load_verify_file(ctx, CAfile)) 407 OPT_TEST_DECLARE_USAGE("basedomain CAfile tlsafile\n") 417 || !TEST_ptr(CAfile = test_get_argument(1))
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| danetest.c | 32 static const char *CAfile; 396 || !TEST_true(SSL_CTX_load_verify_locations(ctx, CAfile, NULL)) 415 || !TEST_ptr(CAfile = test_get_argument(1)) 417 TEST_error("Usage error: danetest basedomain CAfile tlsafile");
|
| /src/usr.sbin/syslogd/ |
| syslogd.h | 398 char *CAfile; /* file with CA certificate */
|
| tls.c | 154 const char *CAfile = tls_opt.CAfile; 248 if (CAfile || CApath) { 249 if (SSL_CTX_load_verify_locations(ctx, CAfile, CApath) != 1) { 250 if (CAfile && CApath) 253 CAfile, CApath, ERR_error_string( 257 "\"%s\": %s\n", (CAfile?CAfile:CApath),
|