/third_party/openssl/demos/certs/ |
D | ocspquery.sh | 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \ 13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \ 15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \ 21 -CAfile root.pem -url http://127.0.0.1:8888/
|
/third_party/openssl/doc/man3/ |
D | SSL_CTX_load_verify_locations.pod | 13 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, 26 available via B<CAfile> and B<CApath> are trusted. 46 If B<CAfile> is not NULL, it points to a file of CA certificates in PEM 56 The B<CAfile> is processed on execution of the SSL_CTX_load_verify_locations() 73 certificates in B<CAfile>, then those in B<CApath>. Certificate matching 83 is not influenced by the contents of B<CAfile> or B<CApath> and must 89 try to fill in missing certificates from B<CAfile>/B<CApath>, if the 111 The operation failed because B<CAfile> and B<CApath> are NULL or the 131 rm CAfile.pem 133 openssl x509 -in $i -text >> CAfile.pem
|
D | SSL_load_client_CA_file.pod | 65 cert_names = SSL_load_client_CA_file("/path/to/CAfile.pem");
|
/third_party/openssl/test/recipes/ |
D | 80-test_ocsp.t | 31 my $CAfile = shift; 34 $untrusted = $CAfile; 44 "-CAfile", catfile($ocspdir, $CAfile),
|
/third_party/openssl/demos/bio/ |
D | sconnect.c | 31 const char *CAfile = CAFILE; in main() local 44 CAfile = argv[2]; in main() 59 SSL_CTX_load_verify_locations(ssl_ctx, CAfile, NULL); in main()
|
/third_party/openssl/apps/ |
D | ts.c | 66 const char *CApath, const char *CAfile, const char *untrusted, 70 const char *CApath, const char *CAfile, 73 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile, 153 const char *CAfile = NULL, *untrusted = NULL, *prog; in ts_main() local 254 CAfile = opt_arg(); in ts_main() 312 CApath, CAfile, untrusted, in ts_main() 820 const char *CApath, const char *CAfile, const char *untrusted, in verify_command() argument 840 CApath, CAfile, untrusted, in verify_command() 866 const char *CApath, const char *CAfile, in create_verify_ctx() argument 915 if (TS_VERIFY_CTX_set_store(ctx, create_cert_store(CApath, CAfile, vpm)) in create_verify_ctx() [all …]
|
D | x509.c | 39 static int x509_certify(X509_STORE *ctx, const char *CAfile, const EVP_MD *digest, 170 char *infile = NULL, *outfile = NULL, *keyfile = NULL, *CAfile = NULL; in x509_main() local 267 CAfile = opt_arg(); in x509_main() 487 CAkeyfile = CAfile; in x509_main() 590 xca = load_cert(CAfile, CAformat, "CA Certificate"); in x509_main() 813 if (!x509_certify(ctx, CAfile, digest, x, xca, in x509_main() 911 static ASN1_INTEGER *x509_load_serial(const char *CAfile, in x509_load_serial() argument 919 const char *p = strrchr(CAfile, '.'); in x509_load_serial() 920 size_t len = p != NULL ? (size_t)(p - CAfile) : strlen(CAfile); in x509_load_serial() 923 memcpy(buf, CAfile, len); in x509_load_serial() [all …]
|
D | verify.c | 70 const char *prog, *CApath = NULL, *CAfile = NULL; in verify_main() local 114 CAfile = opt_arg(); in verify_main() 165 if (trusted != NULL && (CAfile || CApath)) { in verify_main() 172 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL) in verify_main()
|
D | crl.c | 74 const char *CAfile = NULL, *CApath = NULL, *prog; in crl_main() local 126 CAfile = opt_arg(); in crl_main() 188 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL) in crl_main()
|
D | s_time.c | 97 char *CApath = NULL, *CAfile = NULL, *cipher = NULL, *ciphersuites = NULL; in s_time_main() local 151 CAfile = opt_arg(); in s_time_main() 209 if (!ctx_set_verify_locations(ctx, CAfile, CApath, noCAfile, noCApath)) { in s_time_main()
|
D | smime.c | 124 const char *CAfile = NULL, *CApath = NULL, *prog = NULL; in smime_main() local 300 CAfile = opt_arg(); in smime_main() 476 if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL) in smime_main()
|
D | apps.c | 129 int ctx_set_verify_locations(SSL_CTX *ctx, const char *CAfile, in ctx_set_verify_locations() argument 132 if (CAfile == NULL && CApath == NULL) { in ctx_set_verify_locations() 140 return SSL_CTX_load_verify_locations(ctx, CAfile, CApath); in ctx_set_verify_locations() 1234 X509_STORE *setup_verify(const char *CAfile, const char *CApath, int noCAfile, int noCApath) in setup_verify() argument 1242 if (CAfile != NULL || !noCAfile) { in setup_verify() 1246 if (CAfile) { in setup_verify() 1247 if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM)) { in setup_verify() 1248 BIO_printf(bio_err, "Error loading file %s\n", CAfile); in setup_verify()
|
D | apps.h | 471 X509_STORE *setup_verify(const char *CAfile, const char *CApath, 473 __owur int ctx_set_verify_locations(SSL_CTX *ctx, const char *CAfile,
|
/third_party/curl/lib/vtls/ |
D | mesalink.c | 155 if(SSL_CONN_CONFIG(CAfile) || SSL_CONN_CONFIG(CApath)) { in mesalink_connect_step1() 156 if(!SSL_CTX_load_verify_locations(BACKEND->ctx, SSL_CONN_CONFIG(CAfile), in mesalink_connect_step1() 162 SSL_CONN_CONFIG(CAfile) ? in mesalink_connect_step1() 163 SSL_CONN_CONFIG(CAfile) : "none", in mesalink_connect_step1() 176 SSL_CONN_CONFIG(CAfile) ? SSL_CONN_CONFIG(CAfile): "none"); in mesalink_connect_step1()
|
D | wolfssl.c | 332 if(SSL_CONN_CONFIG(CAfile)) { in wolfssl_connect_step1() 334 SSL_CONN_CONFIG(CAfile), in wolfssl_connect_step1() 340 SSL_CONN_CONFIG(CAfile)? in wolfssl_connect_step1() 341 SSL_CONN_CONFIG(CAfile): "none", in wolfssl_connect_step1() 358 SSL_CONN_CONFIG(CAfile) ? SSL_CONN_CONFIG(CAfile) : "none"); in wolfssl_connect_step1()
|
D | gtls.c | 457 if(SSL_CONN_CONFIG(CAfile)) { in gtls_connect_step1() 463 SSL_CONN_CONFIG(CAfile), in gtls_connect_step1() 467 SSL_CONN_CONFIG(CAfile), gnutls_strerror(rc)); in gtls_connect_step1() 475 SSL_CONN_CONFIG(CAfile)); in gtls_connect_step1() 499 !(SSL_CONN_CONFIG(CAfile) || SSL_CONN_CONFIG(CApath))) { in gtls_connect_step1() 919 "CRLfile: %s", SSL_CONN_CONFIG(CAfile) ? SSL_CONN_CONFIG(CAfile): in gtls_connect_step3()
|
D | vtls.c | 143 Curl_safecmp(data->CAfile, needle->CAfile) && in Curl_ssl_config_matches() 182 CLONE_STRING(CAfile); in Curl_clone_primary_ssl_config() 203 Curl_safefree(sslc->CAfile); in Curl_free_primary_ssl_config()
|
/third_party/openssl/test/ |
D | danetest.c | 32 static const char *CAfile; variable 396 || !TEST_true(SSL_CTX_load_verify_locations(ctx, CAfile, NULL)) in run_tlsatest() 415 || !TEST_ptr(CAfile = test_get_argument(1)) in setup_tests()
|
/third_party/openssl/doc/man1/ |
D | s_time.pod | 17 [B<-CAfile filename>] 18 [B<-no-CAfile>] 88 =item B<-CAfile file> 93 =item B<-no-CAfile> 163 …openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commonc…
|
D | crl.pod | 23 [B<-CAfile file>] 94 =item B<-CAfile file>
|
D | verify.pod | 12 [B<-CAfile file>] 14 [B<-no-CAfile>] 68 =item B<-CAfile file> 81 =item B<-no-CAfile> 211 via B<-CAfile>, B<-CApath> or B<-trusted> before any certificates specified via 243 This option implies the B<-no-CAfile> and B<-no-CApath> options. 244 This option cannot be used in combination with either of the B<-CAfile> or 755 subject name must either appear in a file (as specified by the B<-CAfile>
|
D | ocsp.pod | 35 [B<-CAfile file>] 36 [B<-no-CAfile>] 208 =item B<-CAfile file>, B<-CApath pathname> 213 =item B<-no-CAfile> 398 certificates used to build the chain can be specified by the B<CAfile> 435 Normally only the B<-CApath>, B<-CAfile> and (if the responder is a 'global
|
D | ts.pod | 51 [B<-CAfile> trusted_certs.pem] 365 details. Either this option or B<-CAfile> must be specified. (Optional) 368 =item B<-CAfile> trusted_certs.pem 606 -CAfile cacert.pem -untrusted tsacert.pem 611 -CAfile cacert.pem 615 -CAfile cacert.pem 619 -in design2.tsr -CAfile cacert.pem
|
/third_party/node/test/fixtures/keys/ |
D | Makefile | 260 openssl verify -CAfile ca1-cert.pem agent1-cert.pem 283 openssl verify -CAfile agent2-cert.pem agent2-cert.pem 306 openssl verify -CAfile ca2-cert.pem agent3-cert.pem 332 openssl verify -CAfile ca2-cert.pem agent4-cert.pem 374 openssl verify -CAfile ca2-cert.pem agent5-cert.pem 432 openssl verify -CAfile fake-cnnic-root-cert.pem agent7-cert.pem 460 openssl verify -CAfile fake-startcom-root-cert.pem \
|
/third_party/openssl/demos/certs/apps/ |
D | mkacerts.sh | 44 $OPENSSL verify -CAfile root.pem -untrusted intca.pem \
|