Home
last modified time | relevance | path

Searched refs:CApath (Results 1 – 24 of 24) sorted by relevance

/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_load_verify_locations.pod15 int SSL_CTX_load_verify_dir(SSL_CTX *ctx, const char *CApath);
26 const char *CApath);
33 are located. The certificates available via B<CAfile>, B<CApath> and
78 If B<CApath> is not NULL, it points to a directory containing CA certificates
87 The certificates in B<CApath> are only looked up when required, e.g. when
92 will search for suitable certificates first in B<CAfile>, then in B<CApath>.
99 directory, it's generally treated the same way as a B<CApath>.
103 is not influenced by the contents of B<CAfile> or B<CApath> and must
109 try to fill in missing certificates from B<CAfile>/B<CApath>, if the
131 The operation failed because B<CAfile> and B<CApath> are NULL or the
[all …]
/freebsd/crypto/openssl/apps/
H A Dts.c66 const char *CApath, const char *CAfile,
71 const char *CApath, const char *CAfile,
75 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile,
101 {"CApath", OPT_CAPATH, '/', "Path to trusted CA files"},
152 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri",
169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() local
265 CApath = opt_arg(); in ts_main()
338 CApath, CAfile, CAstore, untrusted, in ts_main()
851 const char *CApath, const char *CAfile, in verify_command()
872 CApath, CAfil in verify_command()
848 verify_command(const char * data,const char * digest,const char * queryfile,const char * in,int token_in,const char * CApath,const char * CAfile,const char * CAstore,char * untrusted,X509_VERIFY_PARAM * vpm) verify_command() argument
895 create_verify_ctx(const char * data,const char * digest,const char * queryfile,const char * CApath,const char * CAfile,const char * CAstore,char * untrusted,X509_VERIFY_PARAM * vpm) create_verify_ctx() argument
970 create_cert_store(const char * CApath,const char * CAfile,const char * CAstore,X509_VERIFY_PARAM * vpm) create_cert_store() argument
[all...]
H A Dverify.c87 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in verify_main() local
129 CApath = opt_arg(); in verify_main()
202 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) { in verify_main()
209 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in verify_main()
H A Dcrl.c89 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; in crl_main() local
138 CApath = opt_arg(); in crl_main()
225 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in crl_main()
H A Ds_time.c121 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_time_main() local
172 CApath = opt_arg(); in s_time_main()
262 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_time_main()
H A Dsmime.c145 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL; in smime_main() local
333 CApath = opt_arg(); in smime_main()
535 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in smime_main()
H A Dpkcs12.c122 {"CApath", OPT_CAPATH, '/', "PEM-format directory of CA's"},
126 {"no-CApath", OPT_NOCAPATH, '-',
175 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL, *prog; in pkcs12_main() local
326 CApath = opt_arg(); in pkcs12_main()
395 if (CApath != NULL) in pkcs12_main()
396 WARN_NO_EXPORT("CApath"); in pkcs12_main()
402 WARN_NO_EXPORT("no-CApath"); in pkcs12_main()
601 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in pkcs12_main()
H A Docsp.c118 {"CApath", OPT_CAPATH, '<', "Trusted certificates directory"},
122 {"no-CApath", OPT_NOCAPATH, '-',
236 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in ocsp_main() local
393 CApath = opt_arg(); in ocsp_main()
799 store = setup_verify(CAfile, noCAfile, CApath, noCApath, in ocsp_main()
H A Dcms.c293 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in cms_main() local
473 CApath = opt_arg(); in cms_main()
936 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in cms_main()
H A Ds_server.c989 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_server_main() local
1254 CApath = opt_arg(); in s_server_main()
1942 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_server_main()
2005 if (!ctx_set_verify_locations(ctx2, CAfile, noCAfile, CApath, in s_server_main()
H A Ds_client.c799 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_client_main() local
1310 CApath = opt_arg(); in s_client_main()
1901 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_client_main()
/freebsd/crypto/openssl/apps/include/
H A Dapps.h154 const char *CApath, int noCApath,
158 const char *CApath, int noCApath,
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-verification-options.pod213 =item B<-CApath> I<dir>
222 =item B<-no-CApath>
231 B<-CApath>, depending on if the URI indicates a single file or
404 via B<-CAfile>, B<-CApath>, B<-CAstore> or B<-trusted> are always used
417 This option implies the B<-no-CAfile>, B<-no-CApath>, and B<-no-CAstore> options
418 and it cannot be used with the B<-CAfile>, B<-CApath> or B<-CAstore> options, so
666 a directory (as specified by B<-CApath>),
H A Dopenssl-ts.pod.in55 [B<-CApath> I<dir>]
350 =item B<-CAfile> I<file>, B<-CApath> I<dir>, B<-CAstore> I<uri>
353 At least one of B<-CAfile>, B<-CApath> or B<-CAstore> must be specified.
H A Dopenssl-s_time.pod.in141 …openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commonc…
H A Dopenssl-ocsp.pod.in416 B<-CApath> or B<-CAstore> options or they will be looked for in the
452 Normally only the B<-CApath>, B<-CAfile>, B<-CAstore> and (if the responder
/freebsd/crypto/openssl/apps/lib/
H A Dapps.c150 const char *CApath, int noCApath, in ctx_set_verify_locations() argument
153 if (CAfile == NULL && CApath == NULL && CAstore == NULL) { in ctx_set_verify_locations()
166 if (CApath != NULL && !SSL_CTX_load_verify_dir(ctx, CApath)) in ctx_set_verify_locations()
1361 const char *CApath, int noCApath, in setup_verify() argument
1388 if (CApath != NULL || !noCApath) { in setup_verify()
1392 if (CApath != NULL) { in setup_verify()
1393 if (X509_LOOKUP_add_dir(lookup, CApath, X509_FILETYPE_PEM) <= 0) { in setup_verify()
1394 BIO_printf(bio_err, "Error loading directory %s\n", CApath); in setup_verify()
/freebsd/crypto/openssl/ssl/
H A Dssl_conf.c473 const char *CAfile, const char *CApath, const char *CAstore, in do_store() argument
504 if (CApath != NULL && !X509_STORE_load_path(*st, CApath)) in do_store()
H A Dssl_lib.c4466 int SSL_CTX_load_verify_dir(SSL_CTX *ctx, const char *CApath) in SSL_CTX_load_verify_dir() argument
4468 return X509_STORE_load_path(ctx->cert_store, CApath); in SSL_CTX_load_verify_dir()
4478 const char *CApath) in SSL_CTX_load_verify_locations() argument
4480 if (CAfile == NULL && CApath == NULL) in SSL_CTX_load_verify_locations()
4484 if (CApath != NULL && !SSL_CTX_load_verify_dir(ctx, CApath)) in SSL_CTX_load_verify_locations()
/freebsd/crypto/openssl/test/
H A Dssl_old_test.c885 const char *CApath = NULL, *CAfile = NULL; in main() local
1061 CApath = *(++argv); in main()
1537 || SSL_CTX_load_verify_dir(s_ctx, CApath)) in main()
1540 || SSL_CTX_load_verify_dir(s_ctx2, CApath)) in main()
1543 || SSL_CTX_load_verify_dir(c_ctx, CApath)) in main()
/freebsd/crypto/openssl/include/openssl/
H A Dssl.h2136 __owur int SSL_CTX_load_verify_dir(SSL_CTX *ctx, const char *CApath);
2140 const char *CApath);
H A Dssl.h.in2064 __owur int SSL_CTX_load_verify_dir(SSL_CTX *ctx, const char *CApath);
2068 const char *CApath);
/freebsd/contrib/ldns/
H A Dconfigure.ac1008 AC_MSG_NOTICE([Using CApath: $withval])
/freebsd/crypto/openssl/
H A DCHANGES.md16134 * Add the arguments -CAfile and -CApath to the pkcs12 utility.
17831 * Add new -verify -CAfile and -CApath options to the crl program, these