Home
last modified time | relevance | path

Searched refs:CAfile (Results 1 – 25 of 56) sorted by relevance

123

/third_party/openssl/demos/certs/
Docspquery.sh11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \
13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \
15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \
21 -CAfile root.pem -url http://127.0.0.1:8888/
/third_party/openssl/doc/man3/
DSSL_CTX_load_verify_locations.pod13 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
26 available via B<CAfile> and B<CApath> are trusted.
46 If B<CAfile> is not NULL, it points to a file of CA certificates in PEM
56 The B<CAfile> is processed on execution of the SSL_CTX_load_verify_locations()
73 certificates in B<CAfile>, then those in B<CApath>. Certificate matching
83 is not influenced by the contents of B<CAfile> or B<CApath> and must
89 try to fill in missing certificates from B<CAfile>/B<CApath>, if the
111 The operation failed because B<CAfile> and B<CApath> are NULL or the
131 rm CAfile.pem
133 openssl x509 -in $i -text >> CAfile.pem
DSSL_load_client_CA_file.pod65 cert_names = SSL_load_client_CA_file("/path/to/CAfile.pem");
/third_party/openssl/test/recipes/
D80-test_ocsp.t31 my $CAfile = shift;
34 $untrusted = $CAfile;
44 "-CAfile", catfile($ocspdir, $CAfile),
/third_party/openssl/demos/bio/
Dsconnect.c31 const char *CAfile = CAFILE; in main() local
44 CAfile = argv[2]; in main()
59 SSL_CTX_load_verify_locations(ssl_ctx, CAfile, NULL); in main()
/third_party/openssl/apps/
Dts.c66 const char *CApath, const char *CAfile, const char *untrusted,
70 const char *CApath, const char *CAfile,
73 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile,
153 const char *CAfile = NULL, *untrusted = NULL, *prog; in ts_main() local
254 CAfile = opt_arg(); in ts_main()
312 CApath, CAfile, untrusted, in ts_main()
820 const char *CApath, const char *CAfile, const char *untrusted, in verify_command() argument
840 CApath, CAfile, untrusted, in verify_command()
866 const char *CApath, const char *CAfile, in create_verify_ctx() argument
915 if (TS_VERIFY_CTX_set_store(ctx, create_cert_store(CApath, CAfile, vpm)) in create_verify_ctx()
[all …]
Dx509.c39 static int x509_certify(X509_STORE *ctx, const char *CAfile, const EVP_MD *digest,
170 char *infile = NULL, *outfile = NULL, *keyfile = NULL, *CAfile = NULL; in x509_main() local
267 CAfile = opt_arg(); in x509_main()
487 CAkeyfile = CAfile; in x509_main()
590 xca = load_cert(CAfile, CAformat, "CA Certificate"); in x509_main()
813 if (!x509_certify(ctx, CAfile, digest, x, xca, in x509_main()
911 static ASN1_INTEGER *x509_load_serial(const char *CAfile, in x509_load_serial() argument
919 const char *p = strrchr(CAfile, '.'); in x509_load_serial()
920 size_t len = p != NULL ? (size_t)(p - CAfile) : strlen(CAfile); in x509_load_serial()
923 memcpy(buf, CAfile, len); in x509_load_serial()
[all …]
Dverify.c70 const char *prog, *CApath = NULL, *CAfile = NULL; in verify_main() local
114 CAfile = opt_arg(); in verify_main()
165 if (trusted != NULL && (CAfile || CApath)) { in verify_main()
172 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL) in verify_main()
Dcrl.c74 const char *CAfile = NULL, *CApath = NULL, *prog; in crl_main() local
126 CAfile = opt_arg(); in crl_main()
188 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL) in crl_main()
Ds_time.c97 char *CApath = NULL, *CAfile = NULL, *cipher = NULL, *ciphersuites = NULL; in s_time_main() local
151 CAfile = opt_arg(); in s_time_main()
209 if (!ctx_set_verify_locations(ctx, CAfile, CApath, noCAfile, noCApath)) { in s_time_main()
Dsmime.c124 const char *CAfile = NULL, *CApath = NULL, *prog = NULL; in smime_main() local
300 CAfile = opt_arg(); in smime_main()
476 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL) in smime_main()
Dapps.c129 int ctx_set_verify_locations(SSL_CTX *ctx, const char *CAfile, in ctx_set_verify_locations() argument
132 if (CAfile == NULL && CApath == NULL) { in ctx_set_verify_locations()
140 return SSL_CTX_load_verify_locations(ctx, CAfile, CApath); in ctx_set_verify_locations()
1234 X509_STORE *setup_verify(const char *CAfile, const char *CApath, int noCAfile, int noCApath) in setup_verify() argument
1242 if (CAfile != NULL || !noCAfile) { in setup_verify()
1246 if (CAfile) { in setup_verify()
1247 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM)) { in setup_verify()
1248 BIO_printf(bio_err, "Error loading file %s\n", CAfile); in setup_verify()
Dapps.h471 X509_STORE *setup_verify(const char *CAfile, const char *CApath,
473 __owur int ctx_set_verify_locations(SSL_CTX *ctx, const char *CAfile,
/third_party/curl/lib/vtls/
Dmesalink.c155 if(SSL_CONN_CONFIG(CAfile) || SSL_CONN_CONFIG(CApath)) { in mesalink_connect_step1()
156 if(!SSL_CTX_load_verify_locations(BACKEND->ctx, SSL_CONN_CONFIG(CAfile), in mesalink_connect_step1()
162 SSL_CONN_CONFIG(CAfile) ? in mesalink_connect_step1()
163 SSL_CONN_CONFIG(CAfile) : "none", in mesalink_connect_step1()
176 SSL_CONN_CONFIG(CAfile) ? SSL_CONN_CONFIG(CAfile): "none"); in mesalink_connect_step1()
Dwolfssl.c332 if(SSL_CONN_CONFIG(CAfile)) { in wolfssl_connect_step1()
334 SSL_CONN_CONFIG(CAfile), in wolfssl_connect_step1()
340 SSL_CONN_CONFIG(CAfile)? in wolfssl_connect_step1()
341 SSL_CONN_CONFIG(CAfile): "none", in wolfssl_connect_step1()
358 SSL_CONN_CONFIG(CAfile) ? SSL_CONN_CONFIG(CAfile) : "none"); in wolfssl_connect_step1()
Dgtls.c457 if(SSL_CONN_CONFIG(CAfile)) { in gtls_connect_step1()
463 SSL_CONN_CONFIG(CAfile), in gtls_connect_step1()
467 SSL_CONN_CONFIG(CAfile), gnutls_strerror(rc)); in gtls_connect_step1()
475 SSL_CONN_CONFIG(CAfile)); in gtls_connect_step1()
499 !(SSL_CONN_CONFIG(CAfile) || SSL_CONN_CONFIG(CApath))) { in gtls_connect_step1()
919 "CRLfile: %s", SSL_CONN_CONFIG(CAfile) ? SSL_CONN_CONFIG(CAfile): in gtls_connect_step3()
Dvtls.c143 Curl_safecmp(data->CAfile, needle->CAfile) && in Curl_ssl_config_matches()
182 CLONE_STRING(CAfile); in Curl_clone_primary_ssl_config()
203 Curl_safefree(sslc->CAfile); in Curl_free_primary_ssl_config()
/third_party/openssl/test/
Ddanetest.c32 static const char *CAfile; variable
396 || !TEST_true(SSL_CTX_load_verify_locations(ctx, CAfile, NULL)) in run_tlsatest()
415 || !TEST_ptr(CAfile = test_get_argument(1)) in setup_tests()
/third_party/openssl/doc/man1/
Ds_time.pod17 [B<-CAfile filename>]
18 [B<-no-CAfile>]
88 =item B<-CAfile file>
93 =item B<-no-CAfile>
163 …openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commonc…
Dcrl.pod23 [B<-CAfile file>]
94 =item B<-CAfile file>
Dverify.pod12 [B<-CAfile file>]
14 [B<-no-CAfile>]
68 =item B<-CAfile file>
81 =item B<-no-CAfile>
211 via B<-CAfile>, B<-CApath> or B<-trusted> before any certificates specified via
243 This option implies the B<-no-CAfile> and B<-no-CApath> options.
244 This option cannot be used in combination with either of the B<-CAfile> or
755 subject name must either appear in a file (as specified by the B<-CAfile>
Docsp.pod35 [B<-CAfile file>]
36 [B<-no-CAfile>]
208 =item B<-CAfile file>, B<-CApath pathname>
213 =item B<-no-CAfile>
398 certificates used to build the chain can be specified by the B<CAfile>
435 Normally only the B<-CApath>, B<-CAfile> and (if the responder is a 'global
Dts.pod51 [B<-CAfile> trusted_certs.pem]
365 details. Either this option or B<-CAfile> must be specified. (Optional)
368 =item B<-CAfile> trusted_certs.pem
606 -CAfile cacert.pem -untrusted tsacert.pem
611 -CAfile cacert.pem
615 -CAfile cacert.pem
619 -in design2.tsr -CAfile cacert.pem
/third_party/node/test/fixtures/keys/
DMakefile260 openssl verify -CAfile ca1-cert.pem agent1-cert.pem
283 openssl verify -CAfile agent2-cert.pem agent2-cert.pem
306 openssl verify -CAfile ca2-cert.pem agent3-cert.pem
332 openssl verify -CAfile ca2-cert.pem agent4-cert.pem
374 openssl verify -CAfile ca2-cert.pem agent5-cert.pem
432 openssl verify -CAfile fake-cnnic-root-cert.pem agent7-cert.pem
460 openssl verify -CAfile fake-startcom-root-cert.pem \
/third_party/openssl/demos/certs/apps/
Dmkacerts.sh44 $OPENSSL verify -CAfile root.pem -untrusted intca.pem \

123