/external/wpa_supplicant_8/hs20/server/ca/ |
H A D | ocsp-req.sh | 5 openssl ocsp -text -CAfile ca.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 7 # openssl ocsp -text -CAfile rootCA/cacert.pem -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 9 # openssl ocsp -text -CAfile rootCA/cacert.pem -verify_other demoCA/cacert.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/ 10 # openssl ocsp -text -CAfile rootCA/cacert.pem -VAfile ca.pem -trust_other -issuer demoCA/cacert.pem -cert $i -url http://localhost:8888/
|
H A D | ocsp-update-cache.sh | 5 -CAfile ca.pem \
|
H A D | setup.sh | 122 $OPENSSL verify -CAfile rootCA/cacert.pem demoCA/cacert.pem 123 $OPENSSL verify -CAfile rootCA/cacert.pem -untrusted demoCA/cacert.pem *.pem
|
/external/openssl/apps/ |
H A D | verify.c | 84 char *CApath=NULL,*CAfile=NULL; local 121 else if (strcmp(*argv,"-CAfile") == 0) 124 CAfile= *(++argv); 179 if (CAfile) { 180 i=X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM); 182 BIO_printf(bio_err, "Error loading file %s\n", CAfile); 240 BIO_printf(bio_err,"usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
|
H A D | CA.sh | 177 $VERIFY -CAfile $CATOP/$CACERT newcert.pem 182 $VERIFY -CAfile $CATOP/$CACERT $j
|
H A D | x509.c | 159 static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest, 184 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local 330 CAfile= *(++argv); 521 { CAkeyfile=CAfile; } 667 xca=load_cert(bio_err,CAfile,CAformat,NULL,e,"CA Certificate"); 983 if (!x509_certify(ctx,CAfile,digest,x,xca, 1107 static ASN1_INTEGER *x509_load_serial(char *CAfile, char *serialfile, int create) argument 1115 ?(strlen(CAfile)+strlen(POSTFIX)+1) 1121 BUF_strlcpy(buf,CAfile,len); 1147 static int x509_certify(X509_STORE *ctx, char *CAfile, cons argument [all...] |
H A D | crl.c | 93 " -CAfile name - verify CRL using certificates in file \"name\"\n", 108 char *CAfile = NULL, *CApath = NULL; local 189 else if (strcmp(*argv,"-CAfile") == 0) 192 CAfile = *(++argv); 253 if (!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM))
|
H A D | s_time.c | 127 static char *CAfile=NULL; variable 150 CAfile=NULL; 181 -CAfile arg - PEM format file of CA's\n\ 258 } else if( strcmp(*argv,"-CAfile") == 0) { 261 CAfile= *(++argv); 376 if ((!SSL_CTX_load_verify_locations(tm_ctx,CAfile,CApath)) ||
|
H A D | smime.c | 108 char *CAfile = NULL, *CApath = NULL; local 326 else if (!strcmp (*args, "-CAfile")) 330 CAfile = *++args; 481 BIO_printf (bio_err, "-CAfile file trusted certificates file\n"); 672 if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
H A D | apps.h | 258 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
|
H A D | cms.c | 128 char *CAfile = NULL, *CApath = NULL; local 475 else if (!strcmp (*args, "-CAfile")) 479 CAfile = *++args; 644 BIO_printf (bio_err, "-CAfile file trusted certificates file\n"); 891 if (!(store = setup_verify(bio_err, CAfile, CApath)))
|
H A D | ocsp.c | 150 char *CAfile = NULL, *CApath = NULL; local 348 else if (!strcmp (*args, "-CAfile")) 353 CAfile = *args; 607 BIO_printf (bio_err, "-CAfile file trusted certificates file\n"); 861 store = setup_verify(bio_err, CAfile, CApath);
|
H A D | pkcs12.c | 126 char *CApath = NULL, *CAfile = NULL; local 266 } else if (!strcmp(*args,"-CAfile")) { 269 CAfile = *args; 292 BIO_printf (bio_err, "-CAfile arg - PEM format file of CA's\n"); 534 if (!X509_STORE_load_locations(store, CAfile, CApath))
|
H A D | s_server.c | 500 BIO_printf(bio_err," -CAfile arg - PEM format file of CA's\n"); 943 char *CApath=NULL,*CAfile=NULL; local 1126 else if (strcmp(*argv,"-CAfile") == 0) 1129 CAfile= *(++argv); 1589 if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) || 1646 if ((!SSL_CTX_load_verify_locations(ctx2,CAfile,CApath)) || 1886 if (CAfile != NULL) 1888 SSL_CTX_set_client_CA_list(ctx,SSL_load_client_CA_file(CAfile)); 1891 SSL_CTX_set_client_CA_list(ctx2,SSL_load_client_CA_file(CAfile));
|
H A D | s_client.c | 301 BIO_printf(bio_err," -CAfile arg - PEM format file of CA's\n"); 584 char *CApath=NULL,*CAfile=NULL,*cipher=NULL; local 872 else if (strcmp(*argv,"-CAfile") == 0) 875 CAfile= *(++argv); 1225 if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) ||
|
H A D | apps.c | 1428 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath) argument 1435 if (CAfile) { 1436 if(!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM)) { 1437 BIO_printf(bp, "Error loading file %s\n", CAfile);
|
/external/openssl/crypto/threads/ |
H A D | netware.bat | 10 rem "mttest.nlm -thread 20 -loops 10 -CAfile \openssl\apps\server.pem >mttest.out 2>mttest.err"
|
H A D | mttest.c | 176 fprintf(stderr," -CAfile arg - PEM format file of CA's\n"); 188 char *CApath=NULL,*CAfile=NULL; local 227 else if (strcmp(*argv,"-CAfile") == 0) 230 CAfile= *(++argv); 309 if ( (!SSL_CTX_load_verify_locations(s_ctx,CAfile,CApath)) || 311 (!SSL_CTX_load_verify_locations(c_ctx,CAfile,CApath)) ||
|
/external/openssl/ssl/ |
H A D | ssltest.c | 355 fprintf(stderr," -CAfile arg - PEM format file of CA's\n"); 504 char *CApath=NULL,*CAfile=NULL; local 723 else if (strcmp(*argv,"-CAfile") == 0) 726 CAfile= *(++argv); 1009 if ( (!SSL_CTX_load_verify_locations(s_ctx,CAfile,CApath)) || 1011 (!SSL_CTX_load_verify_locations(c_ctx,CAfile,CApath)) ||
|
H A D | ssl_lib.c | 3170 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, argument 3173 return(X509_STORE_load_locations(ctx->cert_store,CAfile,CApath));
|
H A D | ssl.h | 2087 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
|
/external/ipsec-tools/src/racoon/ |
H A D | crypto_openssl.c | 455 eay_check_x509cert(cert, CApath, CAfile, local) 458 char *CAfile; 478 BIO *bio = BIO_from_android(CAfile); 507 X509_LOOKUP_load_file(lookup, CAfile, 508 (CAfile == NULL) ? X509_FILETYPE_DEFAULT : X509_FILETYPE_PEM);
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_lib.c | 2816 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, argument 2819 return(X509_STORE_load_locations(ctx->cert_store,CAfile,CApath));
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | ssl.h | 2158 OPENSSL_EXPORT int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
|
/external/openssl/include/openssl/ |
H A D | ssl.h | 2087 int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
|