| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 25-test_x509.t | 123 subtest 'x509 -- x.509 v1 certificate' => sub { 127 subtest 'x509 -- first x.509 v3 certificate' => sub { 131 subtest 'x509 -- second x.509 v3 certificate' => sub { 146 1, 'X.509 Not Assertion Extension'); 150 1, 'X.509 Group Attribute Certificate Extension'); 154 1, 'X.509 Source of Authority Extension'); 158 1, 'X.509 No Revocation Available'); 166 1, 'X.509 Indirect Issuer'); 171 1, 'X.509 Targeting Information Extension'); 174 1, 'X.509 Targeting Information Targets'); [all …]
|
| /freebsd/contrib/bearssl/inc/ |
| H A D | bearssl_x509.h | 41 * # X.509 Certificate Chain Processing 43 * An X.509 processing engine receives an X.509 chain, chunk by chunk, 59 * **The "minimal" engine** implements minimal X.509 decoding and chain 65 * - X.509 v1, v2 and v3 certificates are supported. 125 * X.509 error codes are in the 32..63 range. 128 /** \brief X.509 status: validation was successful; this is not actually 132 /** \brief X.509 status: invalid value in an ASN.1 structure. */ 135 /** \brief X.509 status: truncated certificate. */ 138 /** \brief X.509 status: empty certificate chain (no certificate at all). */ 141 /** \brief X.509 status: decoding error: inner element extends beyond [all …]
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | x509.pod | 5 x509 - X.509 certificate handling 13 An X.509 certificate is a structured grouping of information about 14 an individual, a device, or anything one can imagine. An X.509 CRL 17 found in the X.509 document from ITU-T, or in RFC3280 from PKIX. 34 handle X.509 certificates, with some exceptions, shown below. 37 functions handle X.509 CRLs.
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | x509.7 | 64 x509 \- X.509 certificate handling 72 An X.509 certificate is a structured grouping of information about 73 an individual, a device, or anything one can imagine. An X.509 CRL 76 found in the X.509 document from ITU-T, or in RFC3280 from PKIX. 93 handle X.509 certificates, with some exceptions, shown below. 96 functions handle X.509 CRLs.
|
| /freebsd/crypto/heimdal/doc/doxyout/hx509/html/ |
| H A D | index.html | 3 <title>Heimdalx509library: Heimdal PKIX/X.509 library</title> 22 <h1>Heimdal PKIX/X.509 library</h1> 26 Heimdal libhx509 library is a implementation of the PKIX/X.509 and related protocols.<p> 27 PKIX/X.509 is ...<p> 29 <li><a class="el" href="page_name.html">PKIX/X.509 Names</a></li><li><a class="el" href="page_cert.…
|
| H A D | page_name.html | 3 <title>Heimdalx509library: PKIX/X.509 Names</title> 22 <h1><a class="anchor" name="page_name">PKIX/X.509 Names </a></h1>There are several names in PKIX/X.…
|
| /freebsd/crypto/heimdal/doc/ |
| H A D | hx509.texi | 25 * hx509: (hx509). The X.509 distribution from KTH 32 @subtitle X.509 distribution from KTH 181 * What is X.509 ?:: 217 @node Introduction, What is X.509 ?, Top, Top 240 hx509 (Heimdal x509 support) is a near complete X.509 stack that can 250 @node What is X.509 ?, Setting up a CA, Introduction, Top 251 @chapter What is X.509, PKIX, PKCS7 and CMS ? 253 X.509 was created by CCITT (later ITU) for the X.500 directory 254 service. Today, X.509 discussions and implementations commonly reference 255 the IETF's PKIX Certificate and CRL Profile of the X.509 v3 certificate [all …]
|
| /freebsd/lib/libsecureboot/efi/include/Guid/ |
| H A D | ImageAuthentication.h | 96 /// The SHA256 hash of an X.509 certificate's To-Be-Signed contents. 107 /// The SHA384 hash of an X.509 certificate's To-Be-Signed contents. 118 /// The SHA512 hash of an X.509 certificate's To-Be-Signed contents. 181 /// This identifies a signature based on an X.509 certificate. If the signature is an X.509 183 /// key certificate in the image using certificate path verification, up to this X.509 225 /// This identifies a signature containing the SHA256 hash of an X.509 certificate's 238 /// This identifies a signature containing the SHA384 hash of an X.509 certificate's 251 /// This identifies a signature containing the SHA512 hash of an X.509 certificate's
|
| /freebsd/crypto/openssl/crypto/x509/ |
| H A D | v3_soa_id.c | 41 * The sOAIdentifier X.509v3 extension is defined in ITU Recommendation X.509 42 * (2019), Section 17.3.2.1.1. See: https://www.itu.int/rec/T-REC-X.509-201910-I/en.
|
| H A D | v3_single_use.c | 41 * The singleUse X.509v3 extension is defined in ITU Recommendation X.509 42 * (2019), Section 17.1.2.5. See: https://www.itu.int/rec/T-REC-X.509-201910-I/en.
|
| H A D | v3_no_ass.c | 41 * The noAssertion X.509v3 extension is defined in ITU Recommendation X.509 42 * (2019), Section 17.5.2.7. See: https://www.itu.int/rec/T-REC-X.509-201910-I/en.
|
| H A D | v3_no_rev_avail.c | 41 * The noRevAvail X.509v3 extension is defined in ITU Recommendation X.509 42 * (2019), Section 17.2.2.7. See: https://www.itu.int/rec/T-REC-X.509-201910-I/en.
|
| H A D | v3_ind_iss.c | 41 * The indirectIssuer X.509v3 extension is defined in ITU Recommendation X.509 42 * (2019), Section 17.5.2.5. See: https://www.itu.int/rec/T-REC-X.509-201910-I/en.
|
| H A D | v3_group_ac.c | 41 * The groupAC X.509v3 extension is defined in ITU Recommendation X.509 42 * (2019), Section 17.1.2.6. See: https://www.itu.int/rec/T-REC-X.509-201910-I/en.
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | X509_REQ_get_extensions.pod | 7 - handle X.509 extension attributes of a CSR 20 X509_REQ_get_extensions() returns the first list of X.509 extensions 25 X509_REQ_add_extensions_nid() adds to I<req> a list of X.509 extensions I<exts>,
|
| H A D | SSL_set1_server_cert_type.pod | 52 By default (if no explicit settings are specified), only X.509 certificates 62 By default (if no explicit settings are specified), only X.509 certificates 66 RPKs if its peer also supports RPKs, otherwise X.509 certificate will be used 75 Which corresponds to an X.509 certificate normally used in TLS. 86 X.509 certificates are used in the handshake.
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | SSL_set1_server_cert_type.3 | 110 By default (if no explicit settings are specified), only X.509 certificates 120 By default (if no explicit settings are specified), only X.509 certificates 124 RPKs if its peer also supports RPKs, otherwise X.509 certificate will be used 130 Which corresponds to an X.509 certificate normally used in TLS. 138 X.509 certificates are used in the handshake.
|
| H A D | X509_REQ_get_extensions.3 | 66 \&\- handle X.509 extension attributes of a CSR 79 \&\fBX509_REQ_get_extensions()\fR returns the first list of X.509 extensions 84 \&\fBX509_REQ_add_extensions_nid()\fR adds to \fIreq\fR a list of X.509 extensions \fIexts\fR,
|
| /freebsd/crypto/openssl/doc/internal/man3/ |
| H A D | ossl_print_attribute_value.pod | 23 distinguished name, as seen in the C<subject> and C<issuer> fields of an X.509 24 public key certificate. They also appear in the attributes of an X.509 26 associatedInformation X.509v3 extensions.
|
| /freebsd/contrib/bearssl/src/ssl/ |
| H A D | ssl_client_full.c | 102 * Note: the X.509 validation engine will nonetheless refuse to in br_ssl_client_init_full() 124 * X.509 engine uses SHA-256 to hash certificate DN (for in br_ssl_client_init_full() 148 * X.509 engine. in br_ssl_client_init_full() 159 * Link the X.509 engine in the SSL engine. in br_ssl_client_init_full()
|
| /freebsd/share/snmp/mibs/ |
| H A D | FREEBSD-MIB.txt | 27 "Added entries for the otherName component of a X.509 cert" 43 "Subtree for X.509 Certificate otherName entries" 52 "Entry for X.509 Certificate for NFS user@domain name"
|
| /freebsd/secure/usr.bin/openssl/man/ |
| H A D | openssl-x509.1 | 155 Generated certificates bear X.509 version 3. 195 X.509 extensions included in a certificate input are not copied by default. 196 X.509 extensions to be added can be specified using the \fB\-extfile\fR option. 203 X.509 extensions included in the request are not copied by default. 204 X.509 extensions to be added can be specified using the \fB\-extfile\fR option. 207 Determines how to handle X.509 extensions 467 Configuration file containing certificate and request X.509 extensions to add. 470 The section in the extfile to add X.509 extensions from. 778 wrong private key, using unsuitable X.509 extensions, 807 Since OpenSSL 3.2, generated certificates bear X.509 version 3,
|
| H A D | openssl-verification-options.1 | 64 openssl\-verification\-options \- generic X.509 certificate verification options 73 There are many situations where X.509 certificates are verified 124 (EKUs) that may be given in X.509 extensions of end-entity certificates. 188 The second step is to check the X.509v3 extensions of every certificate 193 The X.509v3 extensions of the target or "leaf" certificate 247 Files should be named with the hash value of the X.509 SubjectName of each 314 The authorityKeyIdentifier must be given for X.509v3 certs unless they 317 The subjectKeyIdentifier must be given for all X.509v3 CA certs. 524 which includes the case that it is an X.509v1 certificate, 567 basicConstraints and keyUsage and X.509v1 certificates above apply to \fBall\fR
|
| /freebsd/crypto/heimdal/lib/hx509/ |
| H A D | doxygen.c | 34 /** @mainpage Heimdal PKIX/X.509 library 38 * Heimdal libhx509 library is a implementation of the PKIX/X.509 and 41 * PKIX/X.509 is ...
|
| /freebsd/sys/contrib/device-tree/src/arm64/qcom/ |
| H A D | sdm636.dtsi | 14 * 509 instead of 512 and lack of 22 /* Adreno 509 shares the frequency table with 512 */
|