/openssl/apps/ |
H A D | ts.c | 67 const char *CAstore, 72 const char *CAstore, 170 char *CAstore = NULL; in ts_main() local 274 CAstore = opt_arg(); in ts_main() 342 CApath, CAfile, CAstore, untrusted, in ts_main() 855 const char *CAstore, char *untrusted, in verify_command() argument 875 CApath, CAfile, CAstore, untrusted, in verify_command() 902 const char *CAstore, in create_verify_ctx() argument 953 CAstore, vpm))) in create_verify_ctx() 1014 if (CAstore != NULL) { in create_cert_store() [all …]
|
H A D | verify.c | 87 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in verify_main() local 135 CAstore = opt_arg(); in verify_main() 202 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) { in verify_main() 210 CAstore, noCAstore)) == NULL) in verify_main()
|
H A D | crl.c | 89 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; in crl_main() local 147 CAstore = opt_arg(); in crl_main() 224 CAstore, noCAstore)) == NULL) in crl_main()
|
H A D | s_time.c | 121 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_time_main() local 184 CAstore = opt_arg(); in s_time_main() 262 CAstore, noCAstore)) { in s_time_main()
|
H A D | smime.c | 174 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL; in smime_main() local 372 CAstore = opt_arg(); in smime_main() 564 CAstore, noCAstore)) == NULL) in smime_main()
|
H A D | pkcs12.c | 184 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL, *prog; in pkcs12_main() local 352 CAstore = opt_arg(); in pkcs12_main() 417 if (CAstore != NULL) in pkcs12_main() 625 CAstore, noCAstore)) in pkcs12_main()
|
H A D | ocsp.c | 232 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in ocsp_main() local 393 CAstore = opt_arg(); in ocsp_main() 800 CAstore, noCAstore); in ocsp_main()
|
H A D | cms.c | 297 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in cms_main() local 487 CAstore = opt_arg(); in cms_main() 960 CAstore, noCAstore)) == NULL) in cms_main()
|
H A D | s_server.c | 1024 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_server_main() local 1308 CAstore = opt_arg(); in s_server_main() 2027 CAstore, noCAstore)) { in s_server_main() 2090 noCApath, CAstore, noCAstore)) { in s_server_main()
|
H A D | s_client.c | 861 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_client_main() local 1448 CAstore = opt_arg(); in s_client_main() 2026 CAstore, noCAstore)) { in s_client_main()
|
/openssl/test/recipes/ |
H A D | 25-test_verify_store.t | 71 -CAstore => $CAcert, 92 -CAstore => $CAcert,
|
/openssl/doc/man3/ |
H A D | SSL_CTX_load_verify_locations.pod | 17 int SSL_CTX_load_verify_store(SSL_CTX *ctx, const char *CAstore); 34 B<CAstore> are trusted. B<ctx> B<MUST NOT> be NULL 97 If B<CAstore> is not NULL, it's a URI for to a store, which may 99 Apart from the B<CAstore> not necessarily being a local file or
|
/openssl/apps/include/ |
H A D | apps.h | 162 const char *CAstore, int noCAstore); 166 const char *CAstore, int noCAstore);
|
/openssl/apps/lib/ |
H A D | apps.c | 145 const char *CAstore, int noCAstore) in ctx_set_verify_locations() argument 147 if (CAfile == NULL && CApath == NULL && CAstore == NULL) { in ctx_set_verify_locations() 162 if (CAstore != NULL && !SSL_CTX_load_verify_store(ctx, CAstore)) in ctx_set_verify_locations() 1424 const char *CAstore, int noCAstore) in setup_verify() argument 1468 if (CAstore != NULL || !noCAstore) { in setup_verify() 1472 if (!X509_LOOKUP_add_store_ex(lookup, CAstore, libctx, propq)) { in setup_verify() 1473 if (CAstore != NULL) in setup_verify() 1474 BIO_printf(bio_err, "Error loading store URI %s\n", CAstore); in setup_verify()
|
/openssl/ssl/ |
H A D | ssl_conf.c | 488 const char *CAfile, const char *CApath, const char *CAstore, in do_store() argument 526 if (CAstore != NULL && !X509_STORE_load_store_ex(*st, CAstore, libctx, in do_store()
|
H A D | ssl_lib.c | 5500 int SSL_CTX_load_verify_store(SSL_CTX *ctx, const char *CAstore) in SSL_CTX_load_verify_store() argument 5502 return X509_STORE_load_store_ex(ctx->cert_store, CAstore, ctx->libctx, in SSL_CTX_load_verify_store()
|
/openssl/doc/man1/ |
H A D | openssl-verification-options.pod | 226 =item B<-CAstore> I<uri> 239 =item B<-no-CAstore> 404 via B<-CAfile>, B<-CApath>, B<-CAstore> or B<-trusted> are always used 417 This option implies the B<-no-CAfile>, B<-no-CApath>, and B<-no-CAstore> options 418 and it cannot be used with the B<-CAfile>, B<-CApath> or B<-CAstore> options, so 667 or a store (as specified by B<-CAstore>).
|
H A D | openssl-crl.pod.in | 101 or B<-CAstore> is specified.
|
H A D | openssl-ts.pod.in | 56 [B<-CAstore> I<uri>] 350 =item B<-CAfile> I<file>, B<-CApath> I<dir>, B<-CAstore> I<uri> 353 At least one of B<-CAfile>, B<-CApath> or B<-CAstore> must be specified.
|
H A D | openssl-ocsp.pod.in | 435 B<-CApath> or B<-CAstore> options or they will be looked for in the 471 Normally only the B<-CApath>, B<-CAfile>, B<-CAstore> and (if the responder
|
/openssl/include/openssl/ |
H A D | ssl.h.in | 2119 __owur int SSL_CTX_load_verify_store(SSL_CTX *ctx, const char *CAstore);
|