/external/openssl/apps/ |
verify.c | 84 char *CApath=NULL,*CAfile=NULL; 120 else if (strcmp(*argv,"-CAfile") == 0) 123 CAfile= *(++argv); 173 if (CAfile) { 174 i=X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM); 176 BIO_printf(bio_err, "Error loading file %s\n", CAfile); 218 BIO_printf(bio_err,"usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
|
crl.c | 90 " -CAfile name - verify CRL using certificates in file \"name\"\n", 105 char *CAfile = NULL, *CApath = NULL; 183 else if (strcmp(*argv,"-CAfile") == 0) 186 CAfile = *(++argv); 243 if (!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM))
|
x509.c | 153 static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest, 176 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; 310 CAfile= *(++argv); 493 { CAkeyfile=CAfile; } 641 xca=load_cert(bio_err,CAfile,CAformat,NULL,e,"CA Certificate"); 956 if (!x509_certify(ctx,CAfile,digest,x,xca, 1087 static ASN1_INTEGER *x509_load_serial(char *CAfile, char *serialfile, int create) 1095 ?(strlen(CAfile)+strlen(POSTFIX)+1) 1101 BUF_strlcpy(buf,CAfile,len); 1127 static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest [all...] |
CA.pl | 156 system ("$VERIFY -CAfile $CATOP/$CACERT $j"); 161 system ("$VERIFY -CAfile $CATOP/$CACERT newcert.pem");
|
CA.pl.in | 156 system ("$VERIFY -CAfile $CATOP/$CACERT $j"); 161 system ("$VERIFY -CAfile $CATOP/$CACERT newcert.pem");
|
CA.sh | 177 $VERIFY -CAfile $CATOP/$CACERT newcert.pem 182 $VERIFY -CAfile $CATOP/$CACERT $j
|
s_time.c | 175 static char *CAfile=NULL; 198 CAfile=NULL; 229 -CAfile arg - PEM format file of CA's\n\ 306 } else if( strcmp(*argv,"-CAfile") == 0) { 309 CAfile= *(++argv); 479 if ((!SSL_CTX_load_verify_locations(tm_ctx,CAfile,CApath)) ||
|
pkcs12.c | 130 char *CApath = NULL, *CAfile = NULL; 285 } else if (!strcmp(*args,"-CAfile")) { 288 CAfile = *args; 311 BIO_printf (bio_err, "-CAfile arg - PEM format file of CA's\n"); 549 if (!X509_STORE_load_locations(store, CAfile, CApath))
|
smime.c | 104 char *CAfile = NULL, *CApath = NULL; 310 else if (!strcmp (*args, "-CAfile")) 315 CAfile = *args; 468 BIO_printf (bio_err, "-CAfile file trusted certificates file\n"); 640 if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
CA.com | 186 $ VERIFY "-CAfile" 'CATOP''CACERT' newcert.pem 195 $ VERIFY "-CAfile" 'CATOP''CACERT' '__tmp'
|
cms.c | 124 char *CAfile = NULL, *CApath = NULL; 458 else if (!strcmp (*args, "-CAfile")) 462 CAfile = *++args; 627 BIO_printf (bio_err, "-CAfile file trusted certificates file\n"); 874 if (!(store = setup_verify(bio_err, CAfile, CApath))) [all...] |
ocsp.c | 119 char *CAfile = NULL, *CApath = NULL; 297 else if (!strcmp (*args, "-CAfile")) 302 CAfile = *args; 551 BIO_printf (bio_err, "-CAfile file trusted certificates file\n"); 803 store = setup_verify(bio_err, CAfile, CApath); [all...] |
s_server.c | 366 BIO_printf(bio_err," -CAfile arg - PEM format file of CA's\n"); 754 char *CApath=NULL,*CAfile=NULL; 934 else if (strcmp(*argv,"-CAfile") == 0) 937 CAfile= *(++argv); [all...] |
s_client.c | 207 BIO_printf(bio_err," -CAfile arg - PEM format file of CA's\n"); 307 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; 525 else if (strcmp(*argv,"-CAfile") == 0) 528 CAfile= *(++argv); 757 if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) || [all...] |
apps.c | 1308 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath) [all...] |
apps.h | 285 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
|
/external/openssl/crypto/threads/ |
netware.bat | 10 rem "mttest.nlm -thread 20 -loops 10 -CAfile \openssl\apps\server.pem >mttest.out 2>mttest.err"
|
mttest.c | 174 fprintf(stderr," -CAfile arg - PEM format file of CA's\n"); 186 char *CApath=NULL,*CAfile=NULL; 225 else if (strcmp(*argv,"-CAfile") == 0) 228 CAfile= *(++argv); 307 if ( (!SSL_CTX_load_verify_locations(s_ctx,CAfile,CApath)) || 309 (!SSL_CTX_load_verify_locations(c_ctx,CAfile,CApath)) ||
|
/external/openssl/android.testssl/ |
testssl | 24 CA="-CAfile $3"
|
/external/ipsec-tools/src/racoon/ |
crypto_openssl.c | 457 eay_check_x509cert(cert, CApath, CAfile, local) 460 char *CAfile; 483 X509_LOOKUP_load_file(lookup, CAfile, 484 (CAfile == NULL) ? X509_FILETYPE_DEFAULT : X509_FILETYPE_PEM); 496 if (CAfile) { 497 BIO *bio = BIO_from_keystore(CAfile); [all...] |
/external/openssl/ssl/ |
ssltest.c | 263 fprintf(stderr," -CAfile arg - PEM format file of CA's\n"); 395 char *CApath=NULL,*CAfile=NULL; 582 else if (strcmp(*argv,"-CAfile") == 0) 585 CAfile= *(++argv); 875 if ( (!SSL_CTX_load_verify_locations(s_ctx,CAfile,CApath)) || 877 (!SSL_CTX_load_verify_locations(c_ctx,CAfile,CApath)) || [all...] |
ssl_task.c | 201 char *CApath=NULL,*CAfile=NULL;
|
ssl_lib.c | [all...] |
/external/openssl/patches/ |
handshake_cutthrough.patch | 14 char *CApath=NULL,*CAfile=NULL,*cipher=NULL;
|
/external/openssl/include/openssl/ |
ssl.h | [all...] |