/external/openssl/apps/ |
H A D | verify.c | 84 char *CApath=NULL,*CAfile=NULL; local 116 if (strcmp(*argv,"-CApath") == 0) 119 CApath= *(++argv); 190 if (CApath) { 191 i=X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM); 193 BIO_printf(bio_err, "Error loading directory %s\n", CApath); 240 BIO_printf(bio_err,"usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
|
H A D | crl.c | 94 " -CApath dir - verify CRL using certificates in \"dir\"\n", 108 char *CAfile = NULL, *CApath = NULL; local 183 else if (strcmp(*argv,"-CApath") == 0) 186 CApath = *(++argv); 258 if (!X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM))
|
H A D | s_time.c | 126 static char *CApath=NULL; variable 149 CApath=NULL; 180 -CApath arg - PEM format directory of CA's\n\ 253 } else if( strcmp(*argv,"-CApath") == 0) { 256 CApath= *(++argv); 376 if ((!SSL_CTX_load_verify_locations(tm_ctx,CAfile,CApath)) ||
|
H A D | smime.c | 108 char *CAfile = NULL, *CApath = NULL; local 332 else if (!strcmp (*args, "-CApath")) 336 CApath = *++args; 480 BIO_printf (bio_err, "-CApath dir trusted certificates directory\n"); 672 if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
H A D | cms.c | 128 char *CAfile = NULL, *CApath = NULL; local 481 else if (!strcmp (*args, "-CApath")) 485 CApath = *++args; 643 BIO_printf (bio_err, "-CApath dir trusted certificates directory\n"); 891 if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
H A D | pkcs12.c | 126 char *CApath = NULL, *CAfile = NULL; local 261 } else if (!strcmp(*args,"-CApath")) { 264 CApath = *args; 291 BIO_printf (bio_err, "-CApath arg - PEM format directory of CA's\n"); 534 if (!X509_STORE_load_locations(store, CAfile, CApath))
|
H A D | ocsp.c | 150 char *CAfile = NULL, *CApath = NULL; local 357 else if (!strcmp (*args, "-CApath")) 362 CApath = *args; 606 BIO_printf (bio_err, "-CApath dir trusted certificates directory\n"); 861 store = setup_verify(bio_err, CAfile, CApath);
|
H A D | s_client.c | 300 BIO_printf(bio_err," -CApath arg - PEM format directory of CA's\n"); 584 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local 867 else if (strcmp(*argv,"-CApath") == 0) 870 CApath= *(++argv); 1225 if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) ||
|
H A D | s_server.c | 499 BIO_printf(bio_err," -CApath arg - PEM format directory of CA's\n"); 943 char *CApath=NULL,*CAfile=NULL; local 1102 else if (strcmp(*argv,"-CApath") == 0) 1105 CApath= *(++argv); 1589 if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) || 1646 if ((!SSL_CTX_load_verify_locations(ctx2,CAfile,CApath)) ||
|
H A D | apps.c | 1428 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath) argument 1444 if (CApath) { 1445 if(!X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM)) { 1446 BIO_printf(bp, "Error loading directory %s\n", CApath);
|
/external/openssl/crypto/threads/ |
H A D | mttest.c | 175 fprintf(stderr," -CApath arg - PEM format directory of CA's\n"); 188 char *CApath=NULL,*CAfile=NULL; local 222 else if (strcmp(*argv,"-CApath") == 0) 225 CApath= *(++argv); 309 if ( (!SSL_CTX_load_verify_locations(s_ctx,CAfile,CApath)) || 311 (!SSL_CTX_load_verify_locations(c_ctx,CAfile,CApath)) ||
|
/external/openssl/ssl/ |
H A D | ssltest.c | 354 fprintf(stderr," -CApath arg - PEM format directory of CA's\n"); 504 char *CApath=NULL,*CAfile=NULL; local 718 else if (strcmp(*argv,"-CApath") == 0) 721 CApath= *(++argv); 1009 if ( (!SSL_CTX_load_verify_locations(s_ctx,CAfile,CApath)) || 1011 (!SSL_CTX_load_verify_locations(c_ctx,CAfile,CApath)) ||
|
H A D | ssl_lib.c | 3171 const char *CApath) 3173 return(X509_STORE_load_locations(ctx->cert_store,CAfile,CApath)); 3170 SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, const char *CApath) argument
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_lib.c | 2817 const char *CApath) 2819 return(X509_STORE_load_locations(ctx->cert_store,CAfile,CApath)); 2816 SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, const char *CApath) argument
|