/freebsd/share/examples/uefisign/ |
H A D | uefikeys | 17 certfile="${1}.pem" 26 [ ! -e "${certfile}" ] || die "${certfile} already exists" 33 openssl req -new -x509 -sha256 -days "${days}" -subj "${subj}" -key "${keyfile}" -out "${certfile}"… 34 openssl x509 -inform PEM -outform DER -in "${certfile}" -out "${efifile}" || die "openssl x509 fail… 36 echo "certificate: ${certfile}; private key: ${keyfile}; certificate to enroll in UEFI: ${efifile}"
|
/freebsd/crypto/openssl/apps/ |
H A D | crl2pkcs7.c | 22 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile); 58 char *infile = NULL, *outfile = NULL, *prog, *certfile; in crl2pkcs7_main() local 152 certfile = sk_OPENSSL_STRING_value(certflst, i); in crl2pkcs7_main() 153 if (add_certs_from_file(cert_stack, certfile) < 0) { in crl2pkcs7_main() 195 static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile) in add_certs_from_file() argument 203 in = BIO_new_file(certfile, "r"); in add_certs_from_file() 205 BIO_printf(bio_err, "error opening the file, %s\n", certfile); in add_certs_from_file() 212 BIO_printf(bio_err, "error reading the file, %s\n", certfile); in add_certs_from_file()
|
H A D | s_time.c | 124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local 162 certfile = opt_arg(); in s_time_main() 259 if (!set_cert_stuff(ctx, certfile, keyfile)) in s_time_main()
|
H A D | CA.pl.in | 126 CA.pl -verify certfile ... 127 CA.pl -revoke certfile [reason]
|
H A D | smime.c | 146 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in smime_main() local 327 certfile = opt_arg(); in smime_main() 463 if (certfile != NULL) { in smime_main() 464 if (!load_certs(certfile, 0, &other, NULL, "certificates")) { in smime_main()
|
H A D | pkcs12.c | 115 {"certfile", OPT_CERTFILE, '<', "Extra certificates for PKCS12 output"}, 157 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; in pkcs12_main() local 287 certfile = opt_arg(); in pkcs12_main() 385 if (certfile != NULL) in pkcs12_main() 386 WARN_NO_EXPORT("certfile"); in pkcs12_main() 628 if (certfile != NULL) { in pkcs12_main() 629 if (!load_certs(certfile, 0, &certs, passcerts, in pkcs12_main() 630 "extra certificates from -certfile")) in pkcs12_main()
|
H A D | cms.c | 292 char *certfile = NULL, *keyfile = NULL, *contfile = NULL; in cms_main() local 467 certfile = opt_arg(); in cms_main() 841 if (certfile != NULL) { in cms_main() 842 if (!load_certs(certfile, 0, &other, NULL, "certificate file")) { in cms_main()
|
H A D | ca.c | 277 char *certfile = NULL, *crl_ext = NULL, *crlnumberfile = NULL; in ca_main() local 394 certfile = opt_arg(); in ca_main() 601 if (certfile == NULL in ca_main() 602 && (certfile = lookup_conf(conf, section, ENV_CERTIFICATE)) == NULL) in ca_main() 605 x509 = load_cert_pass(certfile, certformat, 1, passin, "CA certificate"); in ca_main()
|
/freebsd/contrib/libpcap/ |
H A D | sslutils.c | 50 void ssl_set_certfile(const char *certfile) in ssl_set_certfile() argument 52 ssl_certfile = certfile; in ssl_set_certfile() 84 char const *certfile = ssl_certfile[0] ? ssl_certfile : "cert.pem"; in ssl_init_once() local 85 if (1 != SSL_CTX_use_certificate_file(ctx, certfile, SSL_FILETYPE_PEM)) in ssl_init_once() 87 …snprintf(errbuf, errbuflen, "Cannot read certificate file %s: %s", certfile, ERR_error_string(ERR_… in ssl_init_once()
|
H A D | sslutils.h | 51 void ssl_set_certfile(const char *certfile);
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-crl2pkcs7.pod.in | 16 [B<-certfile> I<filename>] 54 =item B<-certfile> I<filename> 74 openssl crl2pkcs7 -in crl.pem -certfile cert.pem -out p7.pem 79 openssl crl2pkcs7 -nocrl -certfile newcert.pem 80 -certfile demoCA/cacert.pem -outform DER -out p7.der
|
H A D | CA.pl.pod | 28 B<CA.pl> B<-verify> I<certfile> ... 30 B<CA.pl> B<-revoke> I<certfile> [I<reason>] 131 =item B<-revoke> I<certfile> [I<reason>] 133 Revoke the certificate contained in the specified B<certfile>. An optional
|
H A D | openssl-smime.pod.in | 22 [B<-certfile> I<file>] 180 only the certificates specified in the B<-certfile> option are used. 201 available locally (passed using the B<-certfile> option for example). 232 =item B<-certfile> I<file> 378 -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem
|
H A D | openssl-pkcs12.pod.in | 50 [B<-certfile> I<filename>] 259 =item B<-certfile> I<filename> 266 The password source for certificate input such as B<-certfile> 443 -certfile othercerts.pem
|
H A D | openssl-cms.pod.in | 79 [B<-certfile> I<file>] 442 =item B<-certfile> I<file> 468 available locally (passed using the B<-certfile> option for example). 536 only the certificates specified in the B<-certfile> option are used. 781 -signer mycert.pem -inkey mykey.pem -certfile mycerts.pem
|
/freebsd/contrib/sendmail/src/ |
H A D | tls.c | 716 load_certkey(ssl, srv, certfile, keyfile) 719 char *certfile; 732 TLS_OK_F(certfile, "CertFile", bitset(TLS_I_CERT_EX, req), 746 TLS_SAFE_F(certfile, sff | TLS_UNR(TLS_I_CERT_UNR, req), 753 # define SSL_use_cert(ssl, certfile) \ 754 SSL_use_certificate_file(ssl, certfile, SSL_FILETYPE_PEM) 758 SSL_use_cert(ssl, certfile) <= 0) 764 who, SSL_USE_CERT, certfile); 975 inittls(ctx, req, options, srv, certfile, keyfile, cacertpath, cacertfile, dhparam) 980 char *certfile, *keyfile, *cacertpath, *cacertfile, *dhparam; [all …]
|
H A D | readcf.c | 2530 char *keyfile, *certfile; local 2541 keyfile = certfile = opt = val = NULL; 2721 certfile = val; 2763 if (keyfile != NULL && certfile != NULL) 2765 load_certkey(ssl, srv, certfile, keyfile); 2766 keyfile = certfile = NULL; 2768 else if (keyfile != NULL || certfile != NULL)
|
/freebsd/contrib/dma/ |
H A D | crypto.c | 134 if (config.certfile != NULL) { in smtp_init_crypto() 135 error = init_cert_file(ctx, config.certfile); in smtp_init_crypto()
|
H A D | dma.h | 136 const char *certfile; member
|
H A D | conf.c | 200 config.certfile = data; in parse_conf()
|
H A D | dma.c | 83 .certfile = NULL,
|
/freebsd/crypto/openssl/apps/lib/ |
H A D | s_cb.c | 861 const char *certfile; member 1013 if (exc->certfile == NULL && exc->next == NULL) { in load_excert() 1019 if (exc->certfile == NULL) { in load_excert() 1023 exc->cert = load_cert(exc->certfile, exc->certform, in load_excert() 1031 exc->key = load_key(exc->certfile, exc->certform, in load_excert() 1067 if (exc->certfile != NULL && !ssl_excert_prepend(&exc)) { in args_excert() 1072 exc->certfile = opt_arg(); in args_excert()
|
/freebsd/contrib/openbsm/bin/auditdistd/ |
H A D | token.l | 61 certfile { DP; return CERTFILE; }
|
/freebsd/crypto/openssl/test/helpers/ |
H A D | ssltestlib.h | 18 char *certfile, char *privkeyfile);
|
H A D | ssltestlib.c | 825 char *certfile, char *privkeyfile) in create_ssl_ctx_pair() 875 if (serverctx != NULL && certfile != NULL && privkeyfile != NULL) { in create_ssl_ctx_pair() 876 if (!TEST_int_eq(SSL_CTX_use_certificate_file(serverctx, certfile, in create_ssl_ctx_pair() 816 create_ssl_ctx_pair(OSSL_LIB_CTX * libctx,const SSL_METHOD * sm,const SSL_METHOD * cm,int min_proto_version,int max_proto_version,SSL_CTX ** sctx,SSL_CTX ** cctx,char * certfile,char * privkeyfile) create_ssl_ctx_pair() argument
|