/freebsd/crypto/openssl/demos/certs/ |
H A D | ocspquery.sh | 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \ 13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \ 15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \ 21 -CAfile root.pem -url http://127.0.0.1:8888/
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_load_verify_locations.pod | 16 int SSL_CTX_load_verify_file(SSL_CTX *ctx, const char *CAfile); 25 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, 33 are located. The certificates available via B<CAfile>, B<CApath> and 65 If B<CAfile> is not NULL, it points to a file of CA certificates in PEM 75 The B<CAfile> is processed on execution of the SSL_CTX_load_verify_locations() 92 will search for suitable certificates first in B<CAfile>, then in B<CApath>. 103 is not influenced by the contents of B<CAfile> or B<CApath> and must 109 try to fill in missing certificates from B<CAfile>/B<CApath>, if the 131 The operation failed because B<CAfile> and B<CApath> are NULL or the 151 rm CAfile.pem [all …]
|
H A D | SSL_load_client_CA_file.pod | 95 cert_names = SSL_load_client_CA_file("/path/to/CAfile.pem");
|
H A D | SSL_CTX_set0_CA_list.pod | 169 Scan all certificates in B<CAfile> and list them as acceptable CAs: 171 SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file(CAfile));
|
/freebsd/crypto/openssl/apps/ |
H A D | x509.c | 36 static ASN1_INTEGER *x509_load_serial(const char *CAfile, 277 char *infile = NULL, *outfile = NULL, *privkeyfile = NULL, *CAfile = NULL; in x509_main() local 404 CAfile = opt_arg(); in x509_main() 657 CAkeyfile = CAfile; in x509_main() 658 if (CAfile != NULL) { in x509_main() 738 if (CAfile == NULL && sno == NULL) { in x509_main() 767 if (CAfile != NULL) { in x509_main() 768 xca = load_cert_pass(CAfile, CAformat, 1, passin, "CA certificate"); in x509_main() 809 if (CAfile != NULL) { in x509_main() 812 sno = x509_load_serial(CAfile, CAserial, CA_createserial); in x509_main() [all …]
|
H A D | ts.c | 66 const char *CApath, const char *CAfile, 71 const char *CApath, const char *CAfile, 75 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile, 100 {"CAfile", OPT_CAFILE, '<', "File with trusted CA certs"}, 152 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri", 161 const char *CAfile = NULL, *prog; in ts_main() local 268 CAfile = opt_arg(); in ts_main() 338 CApath, CAfile, CAstore, untrusted, in ts_main() 851 const char *CApath, const char *CAfile, in verify_command() 872 CApath, CAfile, CAstor in verify_command() 848 verify_command(const char * data,const char * digest,const char * queryfile,const char * in,int token_in,const char * CApath,const char * CAfile,const char * CAstore,char * untrusted,X509_VERIFY_PARAM * vpm) verify_command() argument 895 create_verify_ctx(const char * data,const char * digest,const char * queryfile,const char * CApath,const char * CAfile,const char * CAstore,char * untrusted,X509_VERIFY_PARAM * vpm) create_verify_ctx() argument 970 create_cert_store(const char * CApath,const char * CAfile,const char * CAstore,X509_VERIFY_PARAM * vpm) create_cert_store() argument [all...] |
H A D | verify.c | 87 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in verify_main() local 132 CAfile = opt_arg(); in verify_main() 202 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) { in verify_main() 209 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in verify_main()
|
H A D | crl.c | 89 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; in crl_main() local 142 CAfile = opt_arg(); in crl_main() 225 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in crl_main()
|
H A D | s_time.c | 121 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_time_main() local 175 CAfile = opt_arg(); in s_time_main() 262 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_time_main()
|
H A D | req.c | 250 const char *infile = NULL, *CAfile = NULL, *CAkeyfile = NULL; in req_main() local 409 CAfile = opt_arg(); in req_main() 757 CAkeyfile = CAfile; in req_main() 759 if (CAfile == NULL) { in req_main() 765 CAkeyfile != CAfile in req_main() 771 if (CAfile != NULL) { in req_main() 772 if ((CAcert = load_cert_pass(CAfile, FORMAT_UNDEF, 1, passin, in req_main()
|
H A D | smime.c | 145 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL; in smime_main() local 330 CAfile = opt_arg(); in smime_main() 535 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in smime_main()
|
H A D | pkcs12.c | 121 {"CAfile", OPT_CAFILE, '<', "PEM-format file of CA's"}, 124 {"no-CAfile", OPT_NOCAFILE, '-', 175 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL, *prog; in pkcs12_main() local 332 CAfile = opt_arg(); in pkcs12_main() 393 if (CAfile != NULL) in pkcs12_main() 394 WARN_NO_EXPORT("CAfile"); in pkcs12_main() 400 WARN_NO_EXPORT("no-CAfile"); in pkcs12_main() 601 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in pkcs12_main()
|
H A D | ocsp.c | 117 {"CAfile", OPT_CAFILE, '<', "Trusted certificates file"}, 120 {"no-CAfile", OPT_NOCAFILE, '-', 236 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in ocsp_main() local 390 CAfile = opt_arg(); in ocsp_main() 799 store = setup_verify(CAfile, noCAfile, CApath, noCApath, in ocsp_main()
|
H A D | s_server.c | 989 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_server_main() local 1319 CAfile = opt_arg(); in s_server_main() 1942 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_server_main() 2005 if (!ctx_set_verify_locations(ctx2, CAfile, noCAfile, CApath, in s_server_main() 2199 if (CAfile != NULL) { in s_server_main() 2200 SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file(CAfile)); in s_server_main() 2203 SSL_CTX_set_client_CA_list(ctx2, SSL_load_client_CA_file(CAfile)); in s_server_main()
|
H A D | cms.c | 293 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in cms_main() local 470 CAfile = opt_arg(); in cms_main() 936 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in cms_main()
|
/freebsd/crypto/openssl/demos/bio/ |
H A D | sconnect.c | 31 const char *CAfile = CAFILE; in main() local 44 CAfile = argv[2]; in main() 55 SSL_CTX_load_verify_locations(ssl_ctx, CAfile, NULL); in main()
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 80-test_ocsp.t | 32 my $CAfile = shift; 35 $untrusted = $CAfile; 47 "-CAfile", catfile($ocspdir, $CAfile),
|
/freebsd/crypto/openssl/test/ |
H A D | danetest.c | 32 static const char *CAfile; variable 393 || !TEST_true(SSL_CTX_load_verify_file(ctx, CAfile)) in run_tlsatest() 417 || !TEST_ptr(CAfile = test_get_argument(1)) in setup_tests()
|
/freebsd/crypto/openssl/demos/certs/apps/ |
H A D | mkacerts.sh | 44 $OPENSSL verify -CAfile root.pem -untrusted intca.pem \
|
/freebsd/crypto/openssl/apps/include/ |
H A D | apps.h | 153 X509_STORE *setup_verify(const char *CAfile, int noCAfile, 157 const char *CAfile, int noCAfile,
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-ts.pod.in | 54 [B<-CAfile> I<file>] 350 =item B<-CAfile> I<file>, B<-CApath> I<dir>, B<-CAstore> I<uri> 353 At least one of B<-CAfile>, B<-CApath> or B<-CAstore> must be specified. 579 -CAfile cacert.pem -untrusted tsacert.pem 584 -CAfile cacert.pem 588 -CAfile cacert.pem 592 -in design2.tsr -CAfile cacert.pem
|
H A D | openssl-verification-options.pod | 203 =item B<-CAfile> I<file> 209 =item B<-no-CAfile> 230 With URIs in the C<file:> scheme, this acts as B<-CAfile> or 404 via B<-CAfile>, B<-CApath>, B<-CAstore> or B<-trusted> are always used 417 This option implies the B<-no-CAfile>, B<-no-CApath>, and B<-no-CAstore> options 418 and it cannot be used with the B<-CAfile>, B<-CApath> or B<-CAstore> options, so 665 subject name must appear in a file (as specified by the B<-CAfile> option),
|
H A D | openssl-s_time.pod.in | 128 This is an obsolete synonym for B<-CAfile>. 141 …openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commonc…
|
/freebsd/crypto/openssl/apps/lib/ |
H A D | apps.c | 149 const char *CAfile, int noCAfile, in ctx_set_verify_locations() argument 153 if (CAfile == NULL && CApath == NULL && CAstore == NULL) { in ctx_set_verify_locations() 164 if (CAfile != NULL && !SSL_CTX_load_verify_file(ctx, CAfile)) in ctx_set_verify_locations() 1360 X509_STORE *setup_verify(const char *CAfile, int noCAfile, in setup_verify() argument 1372 if (CAfile != NULL || !noCAfile) { in setup_verify() 1376 if (CAfile != NULL) { in setup_verify() 1377 if (X509_LOOKUP_load_file_ex(lookup, CAfile, X509_FILETYPE_PEM, in setup_verify() 1379 BIO_printf(bio_err, "Error loading file %s\n", CAfile); in setup_verify()
|
/freebsd/crypto/openssl/ssl/ |
H A D | ssl_conf.c | 473 const char *CAfile, const char *CApath, const char *CAstore, in do_store() argument 502 if (CAfile != NULL && !X509_STORE_load_file_ex(*st, CAfile, libctx, propq)) in do_store()
|