/third_party/node/deps/openssl/openssl/apps/ |
H A D | ts.c | 66 const char *CApath, const char *CAfile, 71 const char *CApath, const char *CAfile, 75 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile, 101 {"CApath", OPT_CAPATH, '/', "Path to trusted CA files"}, 152 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri", 169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() local 265 CApath = opt_arg(); in ts_main() 338 CApath, CAfile, CAstore, untrusted, in ts_main() 848 const char *CApath, const char *CAfile, in verify_command() 869 CApath, CAfil in verify_command() 846 verify_command(const char *data, const char *digest, const char *queryfile, const char *in, int token_in, const char *CApath, const char *CAfile, const char *CAstore, char *untrusted, X509_VERIFY_PARAM *vpm) verify_command() argument 893 create_verify_ctx(const char *data, const char *digest, const char *queryfile, const char *CApath, const char *CAfile, const char *CAstore, char *untrusted, X509_VERIFY_PARAM *vpm) create_verify_ctx() argument 970 create_cert_store(const char *CApath, const char *CAfile, const char *CAstore, X509_VERIFY_PARAM *vpm) create_cert_store() argument [all...] |
H A D | verify.c | 53 {"CApath", OPT_CAPATH, '/', "A directory of files with trusted certificates"}, 57 {"no-CApath", OPT_NOCAPATH, '-', 87 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in verify_main() local 129 CApath = opt_arg(); in verify_main() 202 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) { in verify_main() 204 "%s: Cannot use -trusted with -CAfile, -CApath or -CAstore\n", in verify_main() 209 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in verify_main()
|
H A D | crl.c | 64 {"CApath", OPT_CAPATH, '/', "Verify CRL using certificates in dir"}, 69 {"no-CApath", OPT_NOCAPATH, '-', 89 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; in crl_main() local 138 CApath = opt_arg(); in crl_main() 225 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in crl_main()
|
H A D | s_time.c | 94 {"CApath", OPT_CAPATH, '/', "PEM format directory of CA's"}, 98 {"no-CApath", OPT_NOCAPATH, '-', 121 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_time_main() local 172 CApath = opt_arg(); in s_time_main() 262 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_time_main()
|
H A D | smime.c | 110 {"CApath", OPT_CAPATH, '/', "Trusted certificates directory"}, 115 {"no-CApath", OPT_NOCAPATH, '-', 145 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL; in smime_main() local 333 CApath = opt_arg(); in smime_main() 535 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in smime_main()
|
H A D | pkcs12.c | 122 {"CApath", OPT_CAPATH, '/', "PEM-format directory of CA's"}, 126 {"no-CApath", OPT_NOCAPATH, '-', 175 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL, *prog; in pkcs12_main() local 326 CApath = opt_arg(); in pkcs12_main() 395 if (CApath != NULL) in pkcs12_main() 396 WARN_NO_EXPORT("CApath"); in pkcs12_main() 402 WARN_NO_EXPORT("no-CApath"); in pkcs12_main() 601 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in pkcs12_main()
|
H A D | ocsp.c | 118 {"CApath", OPT_CAPATH, '<', "Trusted certificates directory"}, 122 {"no-CApath", OPT_NOCAPATH, '-', 236 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in ocsp_main() local 393 CApath = opt_arg(); in ocsp_main() 799 store = setup_verify(CAfile, noCAfile, CApath, noCApath, in ocsp_main()
|
H A D | cms.c | 210 {"CApath", OPT_CAPATH, '/', "Trusted certificates directory"}, 214 {"no-CApath", OPT_NOCAPATH, '-', 293 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in cms_main() local 473 CApath = opt_arg(); in cms_main() 936 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in cms_main()
|
/third_party/openssl/apps/ |
H A D | ts.c | 66 const char *CApath, const char *CAfile, 71 const char *CApath, const char *CAfile, 75 static X509_STORE *create_cert_store(const char *CApath, const char *CAfile, 101 {"CApath", OPT_CAPATH, '/', "Path to trusted CA files"}, 152 " openssl ts -verify -CApath dir -CAfile root-cert.pem -CAstore uri", 169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() local 265 CApath = opt_arg(); in ts_main() 338 CApath, CAfile, CAstore, untrusted, in ts_main() 848 const char *CApath, const char *CAfile, in verify_command() 869 CApath, CAfil in verify_command() 846 verify_command(const char *data, const char *digest, const char *queryfile, const char *in, int token_in, const char *CApath, const char *CAfile, const char *CAstore, char *untrusted, X509_VERIFY_PARAM *vpm) verify_command() argument 893 create_verify_ctx(const char *data, const char *digest, const char *queryfile, const char *CApath, const char *CAfile, const char *CAstore, char *untrusted, X509_VERIFY_PARAM *vpm) create_verify_ctx() argument 970 create_cert_store(const char *CApath, const char *CAfile, const char *CAstore, X509_VERIFY_PARAM *vpm) create_cert_store() argument [all...] |
H A D | verify.c | 53 {"CApath", OPT_CAPATH, '/', "A directory of files with trusted certificates"}, 57 {"no-CApath", OPT_NOCAPATH, '-', 87 const char *prog, *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in verify_main() local 129 CApath = opt_arg(); in verify_main() 202 && (CAfile != NULL || CApath != NULL || CAstore != NULL)) { in verify_main() 204 "%s: Cannot use -trusted with -CAfile, -CApath or -CAstore\n", in verify_main() 209 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in verify_main()
|
H A D | crl.c | 64 {"CApath", OPT_CAPATH, '/', "Verify CRL using certificates in dir"}, 69 {"no-CApath", OPT_NOCAPATH, '-', 89 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog; in crl_main() local 138 CApath = opt_arg(); in crl_main() 225 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in crl_main()
|
H A D | s_time.c | 94 {"CApath", OPT_CAPATH, '/', "PEM format directory of CA's"}, 98 {"no-CApath", OPT_NOCAPATH, '-', 121 char *CApath = NULL, *CAfile = NULL, *CAstore = NULL; in s_time_main() local 172 CApath = opt_arg(); in s_time_main() 262 if (!ctx_set_verify_locations(ctx, CAfile, noCAfile, CApath, noCApath, in s_time_main()
|
H A D | smime.c | 110 {"CApath", OPT_CAPATH, '/', "Trusted certificates directory"}, 115 {"no-CApath", OPT_NOCAPATH, '-', 145 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL, *prog = NULL; in smime_main() local 333 CApath = opt_arg(); in smime_main() 534 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in smime_main()
|
H A D | pkcs12.c | 122 {"CApath", OPT_CAPATH, '/', "PEM-format directory of CA's"}, 126 {"no-CApath", OPT_NOCAPATH, '-', 175 const char *CApath = NULL, *CAfile = NULL, *CAstore = NULL, *prog; in pkcs12_main() local 326 CApath = opt_arg(); in pkcs12_main() 395 if (CApath != NULL) in pkcs12_main() 396 WARN_NO_EXPORT("CApath"); in pkcs12_main() 402 WARN_NO_EXPORT("no-CApath"); in pkcs12_main() 601 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in pkcs12_main()
|
H A D | cms.c | 210 {"CApath", OPT_CAPATH, '/', "Trusted certificates directory"}, 214 {"no-CApath", OPT_NOCAPATH, '-', 293 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in cms_main() local 473 CApath = opt_arg(); in cms_main() 937 if ((store = setup_verify(CAfile, noCAfile, CApath, noCApath, in cms_main()
|
H A D | ocsp.c | 118 {"CApath", OPT_CAPATH, '<', "Trusted certificates directory"}, 122 {"no-CApath", OPT_NOCAPATH, '-', 236 const char *CAfile = NULL, *CApath = NULL, *CAstore = NULL; in ocsp_main() local 393 CApath = opt_arg(); in ocsp_main() 799 store = setup_verify(CAfile, noCAfile, CApath, noCApath, in ocsp_main()
|
/third_party/node/deps/openssl/openssl/apps/include/ |
H A D | apps.h | 154 const char *CApath, int noCApath, 158 const char *CApath, int noCApath,
|
/third_party/openssl/apps/include/ |
H A D | apps.h | 154 const char *CApath, int noCApath, 158 const char *CApath, int noCApath,
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | ssl_conf.c | 473 const char *CAfile, const char *CApath, const char *CAstore, in do_store() 504 if (CApath != NULL && !X509_STORE_load_path(*st, CApath)) in do_store() 472 do_store(SSL_CONF_CTX *cctx, const char *CAfile, const char *CApath, const char *CAstore, int verify_store) do_store() argument
|
/third_party/openssl/ssl/ |
H A D | ssl_conf.c | 473 const char *CAfile, const char *CApath, const char *CAstore, in do_store() 504 if (CApath != NULL && !X509_STORE_load_path(*st, CApath)) in do_store() 472 do_store(SSL_CONF_CTX *cctx, const char *CAfile, const char *CApath, const char *CAstore, int verify_store) do_store() argument
|
/third_party/curl/lib/vtls/ |
H A D | gtls.c | 494 if(config->CApath) { in gtls_client_init() 497 config->CApath, in gtls_client_init() 501 config->CApath, gnutls_strerror(rc), in gtls_client_init() 509 infof(data, "found %d certificates in %s", rc, config->CApath); in gtls_client_init()
|
H A D | vtls.c | 190 Curl_safecmp(c1->CApath, c2->CApath) && in match_ssl_primary_config() 237 CLONE_STRING(CApath); in clone_ssl_primary_config() 256 Curl_safefree(sslc->CApath); in Curl_free_primary_ssl_config() 276 data->set.ssl.primary.CApath = data->set.str[STRING_SSL_CAPATH]; in Curl_ssl_easy_config_complete() 302 data->set.proxy_ssl.primary.CApath = data->set.str[STRING_SSL_CAPATH_PROXY]; in Curl_ssl_easy_config_complete()
|
/third_party/openssl/test/ |
H A D | ssl_old_test.c | 672 fprintf(stderr, " -CApath arg - PEM format directory of CA's\n"); in sv_usage() 885 const char *CApath = NULL, *CAfile = NULL; in main() local 1057 } else if (strcmp(*argv, "-CApath") == 0) { in main() 1060 CApath = *(++argv); in main() 1534 || SSL_CTX_load_verify_dir(s_ctx, CApath)) in main() 1537 || SSL_CTX_load_verify_dir(s_ctx2, CApath)) in main() 1540 || SSL_CTX_load_verify_dir(c_ctx, CApath)) in main()
|
/third_party/node/deps/openssl/openssl/apps/lib/ |
H A D | apps.c | 150 const char *CApath, int noCApath, in ctx_set_verify_locations() 153 if (CAfile == NULL && CApath == NULL && CAstore == NULL) { in ctx_set_verify_locations() 166 if (CApath != NULL && !SSL_CTX_load_verify_dir(ctx, CApath)) in ctx_set_verify_locations() 1361 const char *CApath, int noCApath, in setup_verify() 1388 if (CApath != NULL || !noCApath) { in setup_verify() 1392 if (CApath != NULL) { in setup_verify() 1393 if (X509_LOOKUP_add_dir(lookup, CApath, X509_FILETYPE_PEM) <= 0) { in setup_verify() 1394 BIO_printf(bio_err, "Error loading directory %s\n", CApath); in setup_verify() 148 ctx_set_verify_locations(SSL_CTX *ctx, const char *CAfile, int noCAfile, const char *CApath, int noCApath, const char *CAstore, int noCAstore) ctx_set_verify_locations() argument 1360 setup_verify(const char *CAfile, int noCAfile, const char *CApath, int noCApath, const char *CAstore, int noCAstore) setup_verify() argument
|
/third_party/openssl/apps/lib/ |
H A D | apps.c | 150 const char *CApath, int noCApath, in ctx_set_verify_locations() 153 if (CAfile == NULL && CApath == NULL && CAstore == NULL) { in ctx_set_verify_locations() 166 if (CApath != NULL && !SSL_CTX_load_verify_dir(ctx, CApath)) in ctx_set_verify_locations() 1359 const char *CApath, int noCApath, in setup_verify() 1386 if (CApath != NULL || !noCApath) { in setup_verify() 1390 if (CApath != NULL) { in setup_verify() 1391 if (X509_LOOKUP_add_dir(lookup, CApath, X509_FILETYPE_PEM) <= 0) { in setup_verify() 1392 BIO_printf(bio_err, "Error loading directory %s\n", CApath); in setup_verify() 148 ctx_set_verify_locations(SSL_CTX *ctx, const char *CAfile, int noCAfile, const char *CApath, int noCApath, const char *CAstore, int noCAstore) ctx_set_verify_locations() argument 1358 setup_verify(const char *CAfile, int noCAfile, const char *CApath, int noCApath, const char *CAstore, int noCAstore) setup_verify() argument
|