/dragonfly/share/examples/uefisign/ |
H A D | uefikeys | 18 certfile="${1}.pem" 27 [ ! -e "${certfile}" ] || die "${certfile} already exists" 34 openssl req -new -x509 -sha256 -days "${days}" -subj "${subj}" -key "${keyfile}" -out "${certfile}"… 35 openssl x509 -inform PEM -outform DER -in "${certfile}" -out "${efifile}" || die "openssl x509 fail… 37 echo "certificate: ${certfile}; private key: ${keyfile}; certificate to enroll in UEFI: ${efifile}"
|
/dragonfly/crypto/libressl/apps/openssl/ |
H A D | crl2p7.c | 77 static int add_certs_from_file(STACK_OF(X509) * stack, char *certfile); 164 char *certfile; in crl2pkcs7_main() local 243 certfile = sk_OPENSSL_STRING_value(crl2p7_config.certflst, i); in crl2pkcs7_main() 244 if (add_certs_from_file(cert_stack, certfile) < 0) { in crl2pkcs7_main() 294 add_certs_from_file(STACK_OF(X509) *stack, char *certfile) in add_certs_from_file() argument 303 if (in == NULL || BIO_read_filename(in, certfile) <= 0) { in add_certs_from_file() 304 BIO_printf(bio_err, "error opening the file, %s\n", certfile); in add_certs_from_file() 310 BIO_printf(bio_err, "error reading the file, %s\n", certfile); in add_certs_from_file()
|
H A D | s_time.c | 105 char *certfile; member 144 .opt.arg = &s_time_config.certfile, 293 if (!set_cert_stuff(tm_ctx, s_time_config.certfile, in s_time_main()
|
H A D | verify.c | 374 const char *certfile = (file == NULL) ? "stdin" : file; in check() local 396 fprintf(stdout, "%s: OK\n", certfile); in check() 399 fprintf(stdout, "%s: verification failed: %d (%s)\n", certfile, in check()
|
H A D | smime.c | 88 char *certfile; member 360 .opt.arg = &smime_config.certfile, 852 if (smime_config.certfile != NULL) { in smime_main() 853 if ((other = load_certs(bio_err, smime_config.certfile, in smime_main()
|
H A D | pkcs12.c | 100 char *certfile; member 301 .opt.arg = &pkcs12_config.certfile, 666 if (pkcs12_config.certfile != NULL) { in pkcs12_main() 669 pkcs12_config.certfile, FORMAT_PEM, NULL, in pkcs12_main()
|
H A D | cms.c | 112 char *certfile; member 563 .opt.arg = &cms_config.certfile, 1315 if (cms_config.certfile != NULL) { in cms_main() 1316 if ((other = load_certs(bio_err, cms_config.certfile, in cms_main()
|
H A D | ca.c | 167 char *certfile; member 319 .opt.arg = &ca_config.certfile, 850 if ((ca_config.certfile == NULL) && in ca_main() 851 ((ca_config.certfile = NCONF_get_string(conf, in ca_main() 856 x509 = load_cert(bio_err, ca_config.certfile, FORMAT_PEM, NULL, in ca_main()
|
/dragonfly/contrib/libpcap/ |
H A D | sslutils.c | 52 void ssl_set_certfile(const char *certfile) in ssl_set_certfile() argument 54 ssl_certfile = certfile; in ssl_set_certfile() 86 char const *certfile = ssl_certfile[0] ? ssl_certfile : "cert.pem"; in ssl_init_once() local 87 if (1 != SSL_CTX_use_certificate_file(ctx, certfile, SSL_FILETYPE_PEM)) in ssl_init_once() 89 …snprintf(errbuf, errbuflen, "Cannot read certificate file %s: %s", certfile, ERR_error_string(ERR_… in ssl_init_once()
|
H A D | sslutils.h | 45 void ssl_set_certfile(const char *certfile);
|
/dragonfly/libexec/dma/ |
H A D | crypto.c | 135 if (config.certfile != NULL) { in smtp_init_crypto() 136 error = init_cert_file(ctx, config.certfile); in smtp_init_crypto()
|
H A D | dma.h | 136 const char *certfile; member
|
H A D | conf.c | 200 config.certfile = data; in parse_conf()
|
H A D | dma.c | 85 .certfile = NULL,
|