Home
last modified time | relevance | path

Searched refs:CApath (Results 1 – 25 of 27) sorted by relevance

12

/third_party/openssl/doc/man3/
DSSL_CTX_load_verify_locations.pod15 int SSL_CTX_load_verify_dir(SSL_CTX *ctx, const char *CApath);
26 const char *CApath);
33 are located. The certificates available via B<CAfile>, B<CApath> and
78 If B<CApath> is not NULL, it points to a directory containing CA certificates
87 The certificates in B<CApath> are only looked up when required, e.g. when
92 will search for suitable certificates first in B<CAfile>, then in B<CApath>.
99 directory, it's generally treated the same way as a B<CApath>.
103 is not influenced by the contents of B<CAfile> or B<CApath> and must
109 try to fill in missing certificates from B<CAfile>/B<CApath>, if the
131 The operation failed because B<CAfile> and B<CApath> are NULL or the
[all …]
/third_party/openssl/apps/
Dts.c66 const char *CApath, const char *CAfile,
71 const char *CApath, const char *CAfile,
75 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile,
169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() local
265 CApath = opt_arg(); in ts_main()
338 CApath, CAfile, CAstore, untrusted, in ts_main()
848 const char *CApath, const char *CAfile, in verify_command() argument
869 CApath, CAfile, CAstore, untrusted, in verify_command()
895 const char *CApath, const char *CAfile, in create_verify_ctx() argument
947 create_cert_store(CApath, CAfile, CAstore, vpm)) in create_verify_ctx()
[all …]
Dverify.c87 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in verify_main() local
129 CApath = opt_arg(); in verify_main()
202 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) { in verify_main()
209 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in verify_main()
Dcrl.c89 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; in crl_main() local
138 CApath = opt_arg(); in crl_main()
225 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in crl_main()
Ds_time.c121 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_time_main() local
172 CApath = opt_arg(); in s_time_main()
262 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_time_main()
Dsmime.c145 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL; in smime_main() local
333 CApath = opt_arg(); in smime_main()
534 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in smime_main()
Dpkcs12.c175 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL, *prog; in pkcs12_main() local
326 CApath = opt_arg(); in pkcs12_main()
395 if (CApath != NULL) in pkcs12_main()
601 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in pkcs12_main()
Docsp.c236 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in ocsp_main() local
393 CApath = opt_arg(); in ocsp_main()
797 store = setup_verify(CAfile, noCAfile, CApath, noCApath, in ocsp_main()
Dcms.c293 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in cms_main() local
473 CApath = opt_arg(); in cms_main()
937 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in cms_main()
Ds_server.c988 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_server_main() local
1253 CApath = opt_arg(); in s_server_main()
1936 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_server_main()
1999 if (!ctx_set_verify_locations(ctx2, CAfile, noCAfile, CApath, in s_server_main()
Ds_client.c799 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_client_main() local
1310 CApath = opt_arg(); in s_client_main()
1901 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_client_main()
/third_party/curl/
Dbackport-CVE-2022-22576.patch128 - safecmp(data->CApath, needle->CApath) &&
134 + Curl_safecmp(data->CApath, needle->CApath) &&
Dbackport-CVE-2022-27782.patch349 const char * const ssl_capath = SSL_CONN_CONFIG(CApath);
482 const char * const ssl_capath = SSL_CONN_CONFIG(CApath);
/third_party/openssl/apps/include/
Dapps.h154 const char *CApath, int noCApath,
158 const char *CApath, int noCApath,
/third_party/openssl/doc/man1/
Dopenssl-verification-options.pod213 =item B<-CApath> I<dir>
222 =item B<-no-CApath>
231 B<-CApath>, depending on if the URI indicates a single file or
404 via B<-CAfile>, B<-CApath>, B<-CAstore> or B<-trusted> are always used
417 This option implies the B<-no-CAfile>, B<-no-CApath>, and B<-no-CAstore> options
418 and it cannot be used with the B<-CAfile>, B<-CApath> or B<-CAstore> options, so
666 a directory (as specified by B<-CApath>),
Dopenssl-ts.pod.in55 [B<-CApath> I<dir>]
350 =item B<-CAfile> I<file>, B<-CApath> I<dir>, B<-CAstore> I<uri>
353 At least one of B<-CAfile>, B<-CApath> or B<-CAstore> must be specified.
Dopenssl-s_time.pod.in141 …openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commonc…
Dopenssl-ocsp.pod.in416 B<-CApath> or B<-CAstore> options or they will be looked for in the
452 Normally only the B<-CApath>, B<-CAfile>, B<-CAstore> and (if the responder
/third_party/openssl/apps/lib/
Dapps.c150 const char *CApath, int noCApath, in ctx_set_verify_locations() argument
153 if (CAfile == NULL && CApath == NULL && CAstore == NULL) { in ctx_set_verify_locations()
166 if (CApath != NULL && !SSL_CTX_load_verify_dir(ctx, CApath)) in ctx_set_verify_locations()
1358 const char *CApath, int noCApath, in setup_verify() argument
1385 if (CApath != NULL || !noCApath) { in setup_verify()
1389 if (CApath != NULL) { in setup_verify()
1390 if (X509_LOOKUP_add_dir(lookup, CApath, X509_FILETYPE_PEM) <= 0) { in setup_verify()
1391 BIO_printf(bio_err, "Error loading directory %s\n", CApath); in setup_verify()
/third_party/openssl/ssl/
Dssl_conf.c473 const char *CAfile, const char *CApath, const char *CAstore, in do_store() argument
504 if (CApath != NULL && !X509_STORE_load_path(*st, CApath)) in do_store()
Dssl_lib.c4429 int SSL_CTX_load_verify_dir(SSL_CTX *ctx, const char *CApath) in SSL_CTX_load_verify_dir() argument
4431 return X509_STORE_load_path(ctx->cert_store, CApath); in SSL_CTX_load_verify_dir()
4441 const char *CApath) in SSL_CTX_load_verify_locations() argument
4443 if (CAfile == NULL && CApath == NULL) in SSL_CTX_load_verify_locations()
4447 if (CApath != NULL && !SSL_CTX_load_verify_dir(ctx, CApath)) in SSL_CTX_load_verify_locations()
/third_party/openssl/test/
Dssl_old_test.c885 const char *CApath = NULL, *CAfile = NULL; in main() local
1060 CApath = *(++argv); in main()
1534 || SSL_CTX_load_verify_dir(s_ctx, CApath)) in main()
1537 || SSL_CTX_load_verify_dir(s_ctx2, CApath)) in main()
1540 || SSL_CTX_load_verify_dir(c_ctx, CApath)) in main()
/third_party/libwebsockets/lib/tls/mbedtls/wrapper/include/openssl/
Dssl.h1193 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, const char *CApath);
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/
Dssl.rs723 CApath: *const c_char, in SSL_CTX_load_verify_locations()
/third_party/openssl/ohos_lite/include/openssl/
Dssl.h1987 const char *CApath);

12