/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_load_verify_locations.pod | 15 int SSL_CTX_load_verify_dir(SSL_CTX *ctx, const char *CApath); 26 const char *CApath); 33 are located. The certificates available via B<CAfile>, B<CApath> and 78 If B<CApath> is not NULL, it points to a directory containing CA certificates 87 The certificates in B<CApath> are only looked up when required, e.g. when 92 will search for suitable certificates first in B<CAfile>, then in B<CApath>. 99 directory, it's generally treated the same way as a B<CApath>. 103 is not influenced by the contents of B<CAfile> or B<CApath> and must 109 try to fill in missing certificates from B<CAfile>/B<CApath>, if the 131 The operation failed because B<CAfile> and B<CApath> are NULL or the [all …]
|
/freebsd/crypto/openssl/apps/ |
H A D | ts.c | 66 const char *CApath, const char *CAfile, 71 const char *CApath, const char *CAfile, 75 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile, 101 {"CApath", OPT_CAPATH, '/', "Path to trusted CA files"}, 152 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri", 169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() local 265 CApath = opt_arg(); in ts_main() 338 CApath, CAfile, CAstore, untrusted, in ts_main() 851 const char *CApath, const char *CAfile, in verify_command() 872 CApath, CAfil in verify_command() 848 verify_command(const char * data,const char * digest,const char * queryfile,const char * in,int token_in,const char * CApath,const char * CAfile,const char * CAstore,char * untrusted,X509_VERIFY_PARAM * vpm) verify_command() argument 895 create_verify_ctx(const char * data,const char * digest,const char * queryfile,const char * CApath,const char * CAfile,const char * CAstore,char * untrusted,X509_VERIFY_PARAM * vpm) create_verify_ctx() argument 970 create_cert_store(const char * CApath,const char * CAfile,const char * CAstore,X509_VERIFY_PARAM * vpm) create_cert_store() argument [all...] |
H A D | verify.c | 87 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in verify_main() local 129 CApath = opt_arg(); in verify_main() 202 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) { in verify_main() 209 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in verify_main()
|
H A D | crl.c | 89 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; in crl_main() local 138 CApath = opt_arg(); in crl_main() 225 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in crl_main()
|
H A D | s_time.c | 121 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_time_main() local 172 CApath = opt_arg(); in s_time_main() 262 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_time_main()
|
H A D | smime.c | 145 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL; in smime_main() local 333 CApath = opt_arg(); in smime_main() 535 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in smime_main()
|
H A D | pkcs12.c | 122 {"CApath", OPT_CAPATH, '/', "PEM-format directory of CA's"}, 126 {"no-CApath", OPT_NOCAPATH, '-', 175 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL, *prog; in pkcs12_main() local 326 CApath = opt_arg(); in pkcs12_main() 395 if (CApath != NULL) in pkcs12_main() 396 WARN_NO_EXPORT("CApath"); in pkcs12_main() 402 WARN_NO_EXPORT("no-CApath"); in pkcs12_main() 601 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in pkcs12_main()
|
H A D | ocsp.c | 118 {"CApath", OPT_CAPATH, '<', "Trusted certificates directory"}, 122 {"no-CApath", OPT_NOCAPATH, '-', 236 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in ocsp_main() local 393 CApath = opt_arg(); in ocsp_main() 799 store = setup_verify(CAfile, noCAfile, CApath, noCApath, in ocsp_main()
|
H A D | cms.c | 293 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in cms_main() local 473 CApath = opt_arg(); in cms_main() 936 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in cms_main()
|
H A D | s_server.c | 989 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_server_main() local 1254 CApath = opt_arg(); in s_server_main() 1942 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_server_main() 2005 if (!ctx_set_verify_locations(ctx2, CAfile, noCAfile, CApath, in s_server_main()
|
H A D | s_client.c | 799 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_client_main() local 1310 CApath = opt_arg(); in s_client_main() 1901 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_client_main()
|
/freebsd/crypto/openssl/apps/include/ |
H A D | apps.h | 154 const char *CApath, int noCApath, 158 const char *CApath, int noCApath,
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-verification-options.pod | 213 =item B<-CApath> I<dir> 222 =item B<-no-CApath> 231 B<-CApath>, depending on if the URI indicates a single file or 404 via B<-CAfile>, B<-CApath>, B<-CAstore> or B<-trusted> are always used 417 This option implies the B<-no-CAfile>, B<-no-CApath>, and B<-no-CAstore> options 418 and it cannot be used with the B<-CAfile>, B<-CApath> or B<-CAstore> options, so 666 a directory (as specified by B<-CApath>),
|
H A D | openssl-ts.pod.in | 55 [B<-CApath> I<dir>] 350 =item B<-CAfile> I<file>, B<-CApath> I<dir>, B<-CAstore> I<uri> 353 At least one of B<-CAfile>, B<-CApath> or B<-CAstore> must be specified.
|
H A D | openssl-s_time.pod.in | 141 …openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commonc…
|
H A D | openssl-ocsp.pod.in | 416 B<-CApath> or B<-CAstore> options or they will be looked for in the 452 Normally only the B<-CApath>, B<-CAfile>, B<-CAstore> and (if the responder
|
/freebsd/crypto/openssl/apps/lib/ |
H A D | apps.c | 150 const char *CApath, int noCApath, in ctx_set_verify_locations() argument 153 if (CAfile == NULL && CApath == NULL && CAstore == NULL) { in ctx_set_verify_locations() 166 if (CApath != NULL && !SSL_CTX_load_verify_dir(ctx, CApath)) in ctx_set_verify_locations() 1361 const char *CApath, int noCApath, in setup_verify() argument 1388 if (CApath != NULL || !noCApath) { in setup_verify() 1392 if (CApath != NULL) { in setup_verify() 1393 if (X509_LOOKUP_add_dir(lookup, CApath, X509_FILETYPE_PEM) <= 0) { in setup_verify() 1394 BIO_printf(bio_err, "Error loading directory %s\n", CApath); in setup_verify()
|
/freebsd/crypto/openssl/ssl/ |
H A D | ssl_conf.c | 473 const char *CAfile, const char *CApath, const char *CAstore, in do_store() argument 504 if (CApath != NULL && !X509_STORE_load_path(*st, CApath)) in do_store()
|
H A D | ssl_lib.c | 4466 int SSL_CTX_load_verify_dir(SSL_CTX *ctx, const char *CApath) in SSL_CTX_load_verify_dir() argument 4468 return X509_STORE_load_path(ctx->cert_store, CApath); in SSL_CTX_load_verify_dir() 4478 const char *CApath) in SSL_CTX_load_verify_locations() argument 4480 if (CAfile == NULL && CApath == NULL) in SSL_CTX_load_verify_locations() 4484 if (CApath != NULL && !SSL_CTX_load_verify_dir(ctx, CApath)) in SSL_CTX_load_verify_locations()
|
/freebsd/crypto/openssl/test/ |
H A D | ssl_old_test.c | 885 const char *CApath = NULL, *CAfile = NULL; in main() local 1061 CApath = *(++argv); in main() 1537 || SSL_CTX_load_verify_dir(s_ctx, CApath)) in main() 1540 || SSL_CTX_load_verify_dir(s_ctx2, CApath)) in main() 1543 || SSL_CTX_load_verify_dir(c_ctx, CApath)) in main()
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | ssl.h | 2136 __owur int SSL_CTX_load_verify_dir(SSL_CTX *ctx, const char *CApath); 2140 const char *CApath);
|
H A D | ssl.h.in | 2064 __owur int SSL_CTX_load_verify_dir(SSL_CTX *ctx, const char *CApath); 2068 const char *CApath);
|
/freebsd/contrib/ldns/ |
H A D | configure.ac | 1008 AC_MSG_NOTICE([Using CApath: $withval])
|
/freebsd/crypto/openssl/ |
H A D | CHANGES.md | 16134 * Add the arguments -CAfile and -CApath to the pkcs12 utility. 17831 * Add new -verify -CAfile and -CApath options to the crl program, these
|