Home
last modified time | relevance | path

Searched refs:certfile (Results 1 – 15 of 15) sorted by relevance

/openbsd/usr.sbin/acme-client/
H A Drevokeproc.c62 revokeproc(int fd, const char *certfile, int force, in revokeproc() argument
83 warn("%s", certfile); in revokeproc()
105 warnx("%s: no certificate found", certfile); in revokeproc()
122 warnx("%s: invalid X509v3 extensions", certfile); in revokeproc()
137 warnx("%s: does not have a SAN entry", certfile); in revokeproc()
185 warn("%s: unexpected SAN", certfile); in revokeproc()
190 certfile, visbuf); in revokeproc()
200 certfile, name_len, name_buf); in revokeproc()
211 warnx("%s: domain not listed: %s", certfile, alts[j]); in revokeproc()
224 dodbg("%s: revocation", certfile); in revokeproc()
[all …]
H A Dfileproc.c93 fileproc(int certsock, const char *certdir, const char *certfile, const char in fileproc() argument
139 if (certfile) { in fileproc()
140 if (unlink(certfile) == -1 && errno != ENOENT) { in fileproc()
141 warn("%s", certfile); in fileproc()
144 dodbg("%s: unlinked", certfile); in fileproc()
192 if (certfile) { in fileproc()
193 if (!serialise(certfile, csr, csz, NULL, 0)) in fileproc()
196 dodbg("%s: created", certfile); in fileproc()
/openbsd/usr.bin/openssl/
H A Dcrl2p7.c77 static int add_certs_from_file(STACK_OF(X509) * stack, char *certfile);
164 char *certfile; in crl2pkcs7_main() local
241 certfile = sk_OPENSSL_STRING_value(cfg.certflst, i); in crl2pkcs7_main()
242 if (add_certs_from_file(cert_stack, certfile) < 0) { in crl2pkcs7_main()
292 add_certs_from_file(STACK_OF(X509) *stack, char *certfile) in add_certs_from_file() argument
301 if (in == NULL || BIO_read_filename(in, certfile) <= 0) { in add_certs_from_file()
302 BIO_printf(bio_err, "error opening the file, %s\n", certfile); in add_certs_from_file()
308 BIO_printf(bio_err, "error reading the file, %s\n", certfile); in add_certs_from_file()
H A Ds_time.c105 char *certfile; member
144 .opt.arg = &cfg.certfile,
291 if (!set_cert_stuff(tm_ctx, cfg.certfile, in s_time_main()
H A Dverify.c372 const char *certfile = (file == NULL) ? "stdin" : file; in check() local
394 fprintf(stdout, "%s: OK\n", certfile); in check()
397 fprintf(stdout, "%s: verification failed: %d (%s)\n", certfile, in check()
H A Dsmime.c87 char *certfile; member
359 .opt.arg = &cfg.certfile,
849 if (cfg.certfile != NULL) { in smime_main()
850 if ((other = load_certs(bio_err, cfg.certfile, in smime_main()
H A Dpkcs12.c101 char *certfile; member
302 .opt.arg = &cfg.certfile,
665 if (cfg.certfile != NULL) { in pkcs12_main()
668 cfg.certfile, FORMAT_PEM, NULL, in pkcs12_main()
H A Dcms.c111 char *certfile; member
562 .opt.arg = &cfg.certfile,
1312 if (cfg.certfile != NULL) { in cms_main()
1313 if ((other = load_certs(bio_err, cfg.certfile, in cms_main()
H A Dca.c167 char *certfile; member
319 .opt.arg = &cfg.certfile,
829 if ((cfg.certfile == NULL) && in ca_main()
830 ((cfg.certfile = NCONF_get_string(conf, in ca_main()
835 x509 = load_cert(bio_err, cfg.certfile, FORMAT_PEM, NULL, in ca_main()
/openbsd/regress/sbin/isakmpd/x509/
H A Dx509test.c166 BIO *certfile, *keyfile; in main() local
208 certfile = BIO_new (BIO_s_file ()); in main()
209 if (BIO_read_filename (certfile, argv[2]) == -1) in main()
215 cert = PEM_read_bio_X509 (certfile, NULL, NULL, NULL); in main()
217 cert = PEM_read_bio_X509 (certfile, NULL, NULL); in main()
219 BIO_free (certfile); in main()
/openbsd/usr.sbin/ocspcheck/
H A Docspcheck.c553 char *host = NULL, *path = NULL, *certfile = NULL, *outfile = NULL, in main() local
590 if (argc != 1 || (certfile = argv[0]) == NULL) in main()
628 if (unveil(certfile, "r") == -1) in main()
629 err(1, "unveil %s", certfile); in main()
641 if ((request = ocsp_request_new_from_cert(cadir, certfile, nonce)) in main()
649 certfile); in main()
699 request, castore, host, certfile)) in main()
735 request, castore, host, certfile)) in main()
/openbsd/usr.sbin/relayd/
H A Drelayd.c1326 char certfile[PATH_MAX]; in relay_load_certfiles() local
1369 if (snprintf(certfile, sizeof(certfile), in relay_load_certfiles()
1372 if ((cert_fd = open(certfile, O_RDONLY)) == -1) { in relay_load_certfiles()
1373 if (snprintf(certfile, sizeof(certfile), in relay_load_certfiles()
1376 if ((cert_fd = open(certfile, O_RDONLY)) == -1) in relay_load_certfiles()
1383 if (snprintf(certfile, sizeof(certfile), in relay_load_certfiles()
1387 if (snprintf(certfile, sizeof(certfile), in relay_load_certfiles()
1391 if ((key_fd = open(certfile, O_RDONLY)) == -1) in relay_load_certfiles()
1396 if (snprintf(certfile, sizeof(certfile), in relay_load_certfiles()
1400 if (snprintf(certfile, sizeof(certfile), in relay_load_certfiles()
[all …]
/openbsd/usr.sbin/ldapd/
H A Dparse.y1239 char certfile[PATH_MAX]; in load_certfile() local
1281 if (!bsnprintf(certfile, sizeof(certfile), "%s.crt", name)) { in load_certfile()
1286 if (!bsnprintf(certfile, sizeof(certfile), in load_certfile()
1293 log_debug("loading certificate file %s", certfile); in load_certfile()
1294 s->ssl_cert = tls_load_file(certfile, &s->ssl_cert_len, NULL); in load_certfile()
1305 if (!bsnprintf(certfile, sizeof(certfile), "%s.key", name)) { in load_certfile()
1310 if (!bsnprintf(certfile, sizeof(certfile), in load_certfile()
1317 log_debug("loading key file %s", certfile); in load_certfile()
1318 s->ssl_key = tls_load_file(certfile, &s->ssl_key_len, NULL); in load_certfile()
/openbsd/regress/lib/libtls/tls/
H A Dtlstest.c36 char *cafile, *certfile, *keyfile; variable
326 if (tls_config_set_keypair_file(server_cfg, certfile, keyfile) == -1) in test_tls()
368 if (tls_config_set_keypair_file(server_cfg, certfile, keyfile) == -1) in do_tls_tests()
431 if (tls_config_set_keypair_file(server_cfg, certfile, keyfile) == -1) in do_tls_ordering_tests()
547 certfile = argv[2]; in main()
/openbsd/regress/lib/libtls/signer/
H A Dsignertest.c358 test_signer_tls(char *certfile, char *keyfile, char *cafile) in test_signer_tls() argument
367 if (tls_signer_add_keypair_file(signer, certfile, keyfile)) in test_signer_tls()
386 if (tls_config_set_cert_file(server_cfg, certfile) == -1) in test_signer_tls()