Home
last modified time | relevance | path

Searched refs:certfile (Results 1 – 14 of 14) sorted by relevance

/dragonfly/share/examples/uefisign/
H A Duefikeys18 certfile="${1}.pem"
27 [ ! -e "${certfile}" ] || die "${certfile} already exists"
34 openssl req -new -x509 -sha256 -days "${days}" -subj "${subj}" -key "${keyfile}" -out "${certfile}"…
35 openssl x509 -inform PEM -outform DER -in "${certfile}" -out "${efifile}" || die "openssl x509 fail…
37 echo "certificate: ${certfile}; private key: ${keyfile}; certificate to enroll in UEFI: ${efifile}"
/dragonfly/crypto/libressl/apps/openssl/
H A Dcrl2p7.c77 static int add_certs_from_file(STACK_OF(X509) * stack, char *certfile);
164 char *certfile; in crl2pkcs7_main() local
243 certfile = sk_OPENSSL_STRING_value(crl2p7_config.certflst, i); in crl2pkcs7_main()
244 if (add_certs_from_file(cert_stack, certfile) < 0) { in crl2pkcs7_main()
294 add_certs_from_file(STACK_OF(X509) *stack, char *certfile) in add_certs_from_file() argument
303 if (in == NULL || BIO_read_filename(in, certfile) <= 0) { in add_certs_from_file()
304 BIO_printf(bio_err, "error opening the file, %s\n", certfile); in add_certs_from_file()
310 BIO_printf(bio_err, "error reading the file, %s\n", certfile); in add_certs_from_file()
H A Ds_time.c105 char *certfile; member
144 .opt.arg = &s_time_config.certfile,
293 if (!set_cert_stuff(tm_ctx, s_time_config.certfile, in s_time_main()
H A Dverify.c374 const char *certfile = (file == NULL) ? "stdin" : file; in check() local
396 fprintf(stdout, "%s: OK\n", certfile); in check()
399 fprintf(stdout, "%s: verification failed: %d (%s)\n", certfile, in check()
H A Dsmime.c88 char *certfile; member
360 .opt.arg = &smime_config.certfile,
852 if (smime_config.certfile != NULL) { in smime_main()
853 if ((other = load_certs(bio_err, smime_config.certfile, in smime_main()
H A Dpkcs12.c100 char *certfile; member
301 .opt.arg = &pkcs12_config.certfile,
666 if (pkcs12_config.certfile != NULL) { in pkcs12_main()
669 pkcs12_config.certfile, FORMAT_PEM, NULL, in pkcs12_main()
H A Dcms.c112 char *certfile; member
563 .opt.arg = &cms_config.certfile,
1315 if (cms_config.certfile != NULL) { in cms_main()
1316 if ((other = load_certs(bio_err, cms_config.certfile, in cms_main()
H A Dca.c167 char *certfile; member
319 .opt.arg = &ca_config.certfile,
850 if ((ca_config.certfile == NULL) && in ca_main()
851 ((ca_config.certfile = NCONF_get_string(conf, in ca_main()
856 x509 = load_cert(bio_err, ca_config.certfile, FORMAT_PEM, NULL, in ca_main()
/dragonfly/contrib/libpcap/
H A Dsslutils.c52 void ssl_set_certfile(const char *certfile) in ssl_set_certfile() argument
54 ssl_certfile = certfile; in ssl_set_certfile()
86 char const *certfile = ssl_certfile[0] ? ssl_certfile : "cert.pem"; in ssl_init_once() local
87 if (1 != SSL_CTX_use_certificate_file(ctx, certfile, SSL_FILETYPE_PEM)) in ssl_init_once()
89 …snprintf(errbuf, errbuflen, "Cannot read certificate file %s: %s", certfile, ERR_error_string(ERR_… in ssl_init_once()
H A Dsslutils.h45 void ssl_set_certfile(const char *certfile);
/dragonfly/libexec/dma/
H A Dcrypto.c135 if (config.certfile != NULL) { in smtp_init_crypto()
136 error = init_cert_file(ctx, config.certfile); in smtp_init_crypto()
H A Ddma.h136 const char *certfile; member
H A Dconf.c200 config.certfile = data; in parse_conf()
H A Ddma.c85 .certfile = NULL,