/third_party/openssl/demos/certs/ |
D | ocspquery.sh | 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \ 13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \ 15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \ 21 -CAfile root.pem -url http://127.0.0.1:8888/
|
/third_party/openssl/doc/man3/ |
D | SSL_CTX_load_verify_locations.pod | 16 int SSL_CTX_load_verify_file(SSL_CTX *ctx, const char *CAfile); 25 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, 33 are located. The certificates available via B<CAfile>, B<CApath> and 65 If B<CAfile> is not NULL, it points to a file of CA certificates in PEM 75 The B<CAfile> is processed on execution of the SSL_CTX_load_verify_locations() 92 will search for suitable certificates first in B<CAfile>, then in B<CApath>. 103 is not influenced by the contents of B<CAfile> or B<CApath> and must 109 try to fill in missing certificates from B<CAfile>/B<CApath>, if the 131 The operation failed because B<CAfile> and B<CApath> are NULL or the 151 rm CAfile.pem [all …]
|
/third_party/openssl/apps/ |
D | x509.c | 36 static ASN1_INTEGER *x509_load_serial(const char *CAfile, 277 char *infile = NULL, *outfile = NULL, *privkeyfile = NULL, *CAfile = NULL; in x509_main() local 404 CAfile = opt_arg(); in x509_main() 657 CAkeyfile = CAfile; in x509_main() 658 if (CAfile != NULL) { in x509_main() 738 if (CAfile == NULL && sno == NULL) { in x509_main() 767 if (CAfile != NULL) { in x509_main() 768 xca = load_cert_pass(CAfile, CAformat, 1, passin, "CA certificate"); in x509_main() 809 if (CAfile != NULL) { in x509_main() 812 sno = x509_load_serial(CAfile, CAserial, CA_createserial); in x509_main() [all …]
|
D | ts.c | 66 const char *CApath, const char *CAfile, 71 const char *CApath, const char *CAfile, 75 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile, 161 const char *CAfile = NULL, *prog; in ts_main() local 268 CAfile = opt_arg(); in ts_main() 338 CApath, CAfile, CAstore, untrusted, in ts_main() 848 const char *CApath, const char *CAfile, in verify_command() argument 869 CApath, CAfile, CAstore, untrusted, in verify_command() 895 const char *CApath, const char *CAfile, in create_verify_ctx() argument 947 create_cert_store(CApath, CAfile, CAstore, vpm)) in create_verify_ctx() [all …]
|
D | verify.c | 87 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in verify_main() local 132 CAfile = opt_arg(); in verify_main() 202 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) { in verify_main() 209 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in verify_main()
|
D | crl.c | 89 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; in crl_main() local 142 CAfile = opt_arg(); in crl_main() 225 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in crl_main()
|
D | s_time.c | 121 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_time_main() local 175 CAfile = opt_arg(); in s_time_main() 262 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_time_main()
|
D | req.c | 250 const char *infile = NULL, *CAfile = NULL, *CAkeyfile = NULL; in req_main() local 409 CAfile = opt_arg(); in req_main() 753 CAkeyfile = CAfile; in req_main() 755 if (CAfile == NULL) { in req_main() 761 CAkeyfile != CAfile in req_main() 767 if (CAfile != NULL) { in req_main() 768 if ((CAcert = load_cert_pass(CAfile, FORMAT_UNDEF, 1, passin, in req_main()
|
D | smime.c | 145 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL; in smime_main() local 330 CAfile = opt_arg(); in smime_main() 534 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in smime_main()
|
/third_party/node/deps/openssl/openssl/apps/ |
D | x509.c | 36 static ASN1_INTEGER *x509_load_serial(const char *CAfile, 277 char *infile = NULL, *outfile = NULL, *privkeyfile = NULL, *CAfile = NULL; in x509_main() local 404 CAfile = opt_arg(); in x509_main() 657 CAkeyfile = CAfile; in x509_main() 658 if (CAfile != NULL) { in x509_main() 738 if (CAfile == NULL && sno == NULL) { in x509_main() 767 if (CAfile != NULL) { in x509_main() 768 xca = load_cert_pass(CAfile, CAformat, 1, passin, "CA certificate"); in x509_main() 809 if (CAfile != NULL) { in x509_main() 812 sno = x509_load_serial(CAfile, CAserial, CA_createserial); in x509_main() [all …]
|
D | ts.c | 66 const char *CApath, const char *CAfile, 71 const char *CApath, const char *CAfile, 75 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile, 161 const char *CAfile = NULL, *prog; in ts_main() local 268 CAfile = opt_arg(); in ts_main() 338 CApath, CAfile, CAstore, untrusted, in ts_main() 848 const char *CApath, const char *CAfile, in verify_command() argument 869 CApath, CAfile, CAstore, untrusted, in verify_command() 895 const char *CApath, const char *CAfile, in create_verify_ctx() argument 947 create_cert_store(CApath, CAfile, CAstore, vpm)) in create_verify_ctx() [all …]
|
D | verify.c | 87 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in verify_main() local 132 CAfile = opt_arg(); in verify_main() 202 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) { in verify_main() 209 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in verify_main()
|
D | crl.c | 89 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; in crl_main() local 142 CAfile = opt_arg(); in crl_main() 225 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in crl_main()
|
D | s_time.c | 121 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_time_main() local 175 CAfile = opt_arg(); in s_time_main() 262 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_time_main()
|
D | req.c | 250 const char *infile = NULL, *CAfile = NULL, *CAkeyfile = NULL; in req_main() local 409 CAfile = opt_arg(); in req_main() 755 CAkeyfile = CAfile; in req_main() 757 if (CAfile == NULL) { in req_main() 763 CAkeyfile != CAfile in req_main() 769 if (CAfile != NULL) { in req_main() 770 if ((CAcert = load_cert_pass(CAfile, FORMAT_UNDEF, 1, passin, in req_main()
|
D | smime.c | 145 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL; in smime_main() local 330 CAfile = opt_arg(); in smime_main() 534 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in smime_main()
|
/third_party/openssl/demos/bio/ |
D | sconnect.c | 31 const char *CAfile = CAFILE; in main() local 44 CAfile = argv[2]; in main() 55 SSL_CTX_load_verify_locations(ssl_ctx, CAfile, NULL); in main()
|
/third_party/openssl/test/recipes/ |
D | 80-test_ocsp.t | 32 my $CAfile = shift; 35 $untrusted = $CAfile; 47 "-CAfile", catfile($ocspdir, $CAfile),
|
/third_party/openssl/test/ |
D | danetest.c | 32 static const char *CAfile; variable 393 || !TEST_true(SSL_CTX_load_verify_file(ctx, CAfile)) in run_tlsatest() 417 || !TEST_ptr(CAfile = test_get_argument(1)) in setup_tests()
|
/third_party/curl/lib/vtls/ |
D | gtls.c | 463 if(config->CAfile) { in gtls_client_init() 469 config->CAfile, in gtls_client_init() 473 config->CAfile, gnutls_strerror(rc)); in gtls_client_init() 480 infof(data, "found %d certificates in %s", rc, config->CAfile); in gtls_client_init() 502 if(config->verifypeer && !(config->CAfile || config->CApath)) { in gtls_client_init() 912 "CRLfile: %s", config->CAfile ? config->CAfile: in Curl_gtls_verifyserver()
|
D | openssl.c | 310 char *CAfile; /* CAfile path used to generate X509 store */ member 3046 (ca_info_blob ? NULL : conn_config->CAfile); in populate_x509_store() 3330 if(!mb->CAfile || !conn_config->CAfile) in cached_x509_store_different() 3331 return mb->CAfile != conn_config->CAfile; in cached_x509_store_different() 3333 return strcmp(mb->CAfile, conn_config->CAfile); in cached_x509_store_different() 3373 char *CAfile = NULL; in set_cached_x509_store() local 3375 if(conn_config->CAfile) { in set_cached_x509_store() 3376 CAfile = strdup(conn_config->CAfile); in set_cached_x509_store() 3377 if(!CAfile) { in set_cached_x509_store() 3385 free(mbackend->CAfile); in set_cached_x509_store() [all …]
|
/third_party/node/test/fixtures/keys/ |
D | Makefile | 268 openssl verify -CAfile ca1-cert.pem agent1-cert.pem 291 openssl verify -CAfile agent2-cert.pem agent2-cert.pem 314 openssl verify -CAfile ca2-cert.pem agent3-cert.pem 340 openssl verify -CAfile ca2-cert.pem agent4-cert.pem 382 openssl verify -CAfile ca2-cert.pem agent5-cert.pem 440 openssl verify -CAfile fake-cnnic-root-cert.pem agent7-cert.pem 468 openssl verify -CAfile fake-startcom-root-cert.pem \
|
/third_party/openssl/apps/include/ |
D | apps.h | 153 X509_STORE *setup_verify(const char *CAfile, int noCAfile, 157 const char *CAfile, int noCAfile,
|
/third_party/node/deps/openssl/openssl/apps/include/ |
D | apps.h | 153 X509_STORE *setup_verify(const char *CAfile, int noCAfile, 157 const char *CAfile, int noCAfile,
|
/third_party/openssl/demos/certs/apps/ |
D | mkacerts.sh | 44 $OPENSSL verify -CAfile root.pem -untrusted intca.pem \
|