Home
last modified time | relevance | path

Searched refs:CAfile (Results 1 – 25 of 33) sorted by relevance

12

/openssl/demos/certs/
H A Docspquery.sh18 opensslcmd ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \
20 opensslcmd ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \
22 opensslcmd ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \
28 -CAfile root.pem -url http://127.0.0.1:8888/
/openssl/doc/man3/
H A DSSL_CTX_load_verify_locations.pod16 int SSL_CTX_load_verify_file(SSL_CTX *ctx, const char *CAfile);
25 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
33 are located. The certificates available via B<CAfile>, B<CApath> and
66 If B<CAfile> is not NULL, it points to a file of CA certificates in PEM
76 The B<CAfile> is processed on execution of the SSL_CTX_load_verify_locations()
93 will search for suitable certificates first in B<CAfile>, then in B<CApath>.
104 is not influenced by the contents of B<CAfile> or B<CApath> and must
110 try to fill in missing certificates from B<CAfile>/B<CApath>, if the
132 The operation failed because B<CAfile> and B<CApath> are NULL or the
152 rm CAfile.pem
[all …]
H A DSSL_load_client_CA_file.pod95 cert_names = SSL_load_client_CA_file("/path/to/CAfile.pem");
H A DSSL_CTX_set0_CA_list.pod169 Scan all certificates in B<CAfile> and list them as acceptable CAs:
171 SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file(CAfile));
/openssl/demos/bio/
H A Dsconnect.c36 const char *CAfile = CAFILE; in main() local
48 CAfile = argv[2]; in main()
59 if (!SSL_CTX_load_verify_locations(ssl_ctx, CAfile, NULL)) in main()
/openssl/test/recipes/
H A D80-test_ocsp.t32 my $CAfile = shift;
35 $untrusted = $CAfile;
47 "-CAfile", catfile($ocspdir, $CAfile),
/openssl/apps/
H A Dts.c66 const char *CApath, const char *CAfile,
71 const char *CApath, const char *CAfile,
75 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile,
161 const char *CAfile = NULL, *prog; in ts_main() local
271 CAfile = opt_arg(); in ts_main()
342 CApath, CAfile, CAstore, untrusted, in ts_main()
854 const char *CApath, const char *CAfile, in verify_command() argument
875 CApath, CAfile, CAstore, untrusted, in verify_command()
952 if (!TS_VERIFY_CTX_set0_store(ctx, create_cert_store(CApath, CAfile, in create_verify_ctx()
1001 if (CAfile != NULL) { in create_cert_store()
[all …]
H A Dx509.c420 CAfile = opt_arg(); in x509_main()
689 CAkeyfile = CAfile; in x509_main()
690 if (CAfile != NULL) { in x509_main()
772 if (CAfile == NULL && sno == NULL) { in x509_main()
804 if (CAfile != NULL) { in x509_main()
843 if (CAfile != NULL) { in x509_main()
874 if (CAfile == NULL) { in x509_main()
930 } else if (CAfile != NULL) { in x509_main()
1145 const char *p = strrchr(CAfile, '.'); in x509_load_serial()
1146 size_t len = p != NULL ? (size_t)(p - CAfile) : strlen(CAfile); in x509_load_serial()
[all …]
H A Dverify.c87 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in verify_main() local
132 CAfile = opt_arg(); in verify_main()
202 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) { in verify_main()
209 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in verify_main()
H A Dcrl.c89 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; in crl_main() local
143 CAfile = opt_arg(); in crl_main()
223 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in crl_main()
H A Ds_time.c121 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_time_main() local
175 CAfile = opt_arg(); in s_time_main()
261 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_time_main()
H A Dreq.c257 const char *infile = NULL, *CAfile = NULL, *CAkeyfile = NULL; in req_main() local
426 CAfile = opt_arg(); in req_main()
751 CAkeyfile = CAfile; in req_main()
753 if (CAfile == NULL) { in req_main()
759 CAkeyfile != CAfile in req_main()
765 if (CAfile != NULL) { in req_main()
766 if ((CAcert = load_cert_pass(CAfile, FORMAT_UNDEF, 1, passin, in req_main()
H A Dsmime.c174 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL; in smime_main() local
366 CAfile = opt_arg(); in smime_main()
569 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in smime_main()
H A Dpkcs12.c184 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL, *prog; in pkcs12_main() local
355 CAfile = opt_arg(); in pkcs12_main()
413 if (CAfile != NULL) in pkcs12_main()
624 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in pkcs12_main()
H A Docsp.c232 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in ocsp_main() local
387 CAfile = opt_arg(); in ocsp_main()
799 store = setup_verify(CAfile, noCAfile, CApath, noCApath, in ocsp_main()
/openssl/test/
H A Ddanetest.c32 static const char *CAfile; variable
393 || !TEST_true(SSL_CTX_load_verify_file(ctx, CAfile)) in run_tlsatest()
417 || !TEST_ptr(CAfile = test_get_argument(1)) in setup_tests()
/openssl/test/recipes/95-test_external_tlsfuzzer_data/
H A Dcert.json.in5 "-verify", "1", "-CAfile", "tests/clientX509Cert.pem"],
/openssl/demos/certs/apps/
H A Dmkacerts.sh48 opensslcmd verify -CAfile root.pem -untrusted intca.pem \
/openssl/apps/include/
H A Dapps.h160 X509_STORE *setup_verify(const char *CAfile, int noCAfile,
164 const char *CAfile, int noCAfile,
/openssl/doc/man1/
H A Dopenssl-ts.pod.in54 [B<-CAfile> I<file>]
350 =item B<-CAfile> I<file>, B<-CApath> I<dir>, B<-CAstore> I<uri>
353 At least one of B<-CAfile>, B<-CApath> or B<-CAstore> must be specified.
579 -CAfile cacert.pem -untrusted tsacert.pem
584 -CAfile cacert.pem
589 -CAfile cacert.pem
594 -in design2.tsr -CAfile cacert.pem
H A Dopenssl-verification-options.pod203 =item B<-CAfile> I<file>
209 =item B<-no-CAfile>
230 With URIs in the C<file:> scheme, this acts as B<-CAfile> or
404 via B<-CAfile>, B<-CApath>, B<-CAstore> or B<-trusted> are always used
417 This option implies the B<-no-CAfile>, B<-no-CApath>, and B<-no-CAstore> options
418 and it cannot be used with the B<-CAfile>, B<-CApath> or B<-CAstore> options, so
665 subject name must appear in a file (as specified by the B<-CAfile> option),
H A Dopenssl-s_time.pod.in129 This is an obsolete synonym for B<-CAfile>.
142 …openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commonc…
H A Dopenssl-crl.pod.in100 This option is implicitly enabled if any of B<-CApath>, B<-CAfile>
/openssl/apps/lib/
H A Dapps.c143 const char *CAfile, int noCAfile, in ctx_set_verify_locations() argument
147 if (CAfile == NULL && CApath == NULL && CAstore == NULL) { in ctx_set_verify_locations()
158 if (CAfile != NULL && !SSL_CTX_load_verify_file(ctx, CAfile)) in ctx_set_verify_locations()
1393 X509_STORE *setup_verify(const char *CAfile, int noCAfile, in setup_verify() argument
1405 if (CAfile != NULL || !noCAfile) { in setup_verify()
1409 if (CAfile != NULL) { in setup_verify()
1410 if (X509_LOOKUP_load_file_ex(lookup, CAfile, X509_FILETYPE_PEM, in setup_verify()
1413 if (X509_LOOKUP_load_file_ex(lookup, CAfile, X509_FILETYPE_ASN1, in setup_verify()
1415 BIO_printf(bio_err, "Error loading file %s\n", CAfile); in setup_verify()
/openssl/ssl/
H A Dssl_conf.c488 const char *CAfile, const char *CApath, const char *CAstore, in do_store() argument
522 if (CAfile != NULL && !X509_STORE_load_file_ex(*st, CAfile, libctx, propq)) in do_store()

Completed in 62 milliseconds

12