Searched refs:cacert (Results 1 – 16 of 16) sorted by relevance
/openssl/demos/smime/ |
H A D | smver.c | 19 X509 *cacert = NULL; in main() local 38 cacert = PEM_read_bio_X509(tbio, NULL, 0, NULL); in main() 40 if (cacert == NULL) in main() 43 if (!X509_STORE_add_cert(st, cacert)) in main() 80 X509_free(cacert); in main()
|
/openssl/demos/cms/ |
H A D | cms_ver.c | 62 X509 *cacert = NULL; in main() local 81 cacert = PEM_read_bio_X509(tbio, NULL, 0, NULL); in main() 83 if (cacert == NULL) in main() 86 if (!X509_STORE_add_cert(st, cacert)) in main() 126 X509_free(cacert); in main()
|
/openssl/test/ |
H A D | algorithmid_test.c | 111 X509 *cacert, const char *ca_filename) in test_x509_sig_aid() argument 137 || !TEST_ptr(pkey = X509_get0_pubkey(cacert))) in test_x509_sig_aid() 216 X509 *eecert = NULL, *cacert = NULL; in test_x509_files() local 237 if ((cacert = PEM_read_bio_X509(bca, NULL, NULL, NULL)) == NULL) { in test_x509_files() 244 ret = test_x509_sig_aid(eecert, eecert_filename, cacert, cacert_filename) in test_x509_files() 246 & test_x509_spki_aid(cacert, cacert_filename); in test_x509_files() 251 X509_free(cacert); in test_x509_files()
|
H A D | CAtsa.cnf | 33 certificate = $dir/cacert.pem # The CA certificate 157 certs = $dir/demoCA/cacert.pem# Certificate chain to include in reply
|
H A D | ca-and-certs.cnf | 64 certificate = $dir/cacert.pem
|
/openssl/test/certs/ |
H A D | mkcert.sh | 137 local cacert=$1; shift 156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 165 local cacert=$1; shift 177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set0_CA_list.pod | 28 int SSL_CTX_add_client_CA(SSL_CTX *ctx, X509 *cacert); 29 int SSL_add_client_CA(SSL *ssl, X509 *cacert); 84 SSL_CTX_add_client_CA() adds the CA name extracted from B<cacert> to the 88 SSL_add_client_CA() adds the CA name extracted from B<cacert> to the
|
/openssl/doc/man1/ |
H A D | openssl-ts.pod.in | 540 instructions. The examples below assume that F<cacert.pem> contains the 542 by F<cacert.pem> and F<tsakey.pem> is the private key of the TSA. 579 -CAfile cacert.pem -untrusted tsacert.pem 584 -CAfile cacert.pem 589 -CAfile cacert.pem 594 -in design2.tsr -CAfile cacert.pem
|
H A D | openssl-ocsp.pod.in | 504 openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem -CA demoCA/cacert.pem 509 openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem -CA demoCA/cacert.pem 514 openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA demoCA/cacert.pem 515 -issuer demoCA/cacert.pem -serial 1 520 openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA demoCA/cacert.pem
|
H A D | openssl-crl2pkcs7.pod.in | 80 -certfile demoCA/cacert.pem -outform DER -out p7.der
|
H A D | CA.pl.pod | 99 file F<newcert.pem> and the CA certificate to be in the file F<demoCA/cacert.pem>,
|
H A D | openssl-ca.pod.in | 668 certificate would be copied to F<demoCA/cacert.pem> and its private 719 certificate = $dir/cacert.pem # The CA cert 751 ./demoCA/cacert.pem - CA certificate
|
H A D | openssl-x509.pod.in | 775 -key key.pem -out cacert.pem 781 -CA cacert.pem -CAkey key.pem -CAcreateserial
|
/openssl/apps/ |
H A D | openssl-vms.cnf | 90 certificate = $dir]cacert.pem # The CA certificate 317 certs = $dir.cacert.pem] # Certificate chain to include in reply
|
H A D | openssl.cnf | 90 certificate = $dir/cacert.pem # The CA certificate 317 certs = $dir/cacert.pem # Certificate chain to include in reply
|
/openssl/doc/HOWTO/ |
H A D | certificates.txt | 82 openssl req -new -x509 -key privkey.pem -out cacert.pem -days 1095
|
Completed in 39 milliseconds