Home
last modified time | relevance | path

Searched full:509 (Results 1 – 25 of 553) sorted by relevance

12345678910>>...23

/freebsd/crypto/openssl/test/recipes/
H A D25-test_x509.t123 subtest 'x509 -- x.509 v1 certificate' => sub {
127 subtest 'x509 -- first x.509 v3 certificate' => sub {
131 subtest 'x509 -- second x.509 v3 certificate' => sub {
146 1, 'X.509 Not Assertion Extension');
150 1, 'X.509 Group Attribute Certificate Extension');
154 1, 'X.509 Source of Authority Extension');
158 1, 'X.509 No Revocation Available');
166 1, 'X.509 Indirect Issuer');
171 1, 'X.509 Targeting Information Extension');
174 1, 'X.509 Targeting Information Targets');
[all …]
/freebsd/contrib/bearssl/inc/
H A Dbearssl_x509.h41 * # X.509 Certificate Chain Processing
43 * An X.509 processing engine receives an X.509 chain, chunk by chunk,
59 * **The "minimal" engine** implements minimal X.509 decoding and chain
65 * - X.509 v1, v2 and v3 certificates are supported.
125 * X.509 error codes are in the 32..63 range.
128 /** \brief X.509 status: validation was successful; this is not actually
132 /** \brief X.509 status: invalid value in an ASN.1 structure. */
135 /** \brief X.509 status: truncated certificate. */
138 /** \brief X.509 status: empty certificate chain (no certificate at all). */
141 /** \brief X.509 status: decoding error: inner element extends beyond
[all …]
/freebsd/crypto/openssl/doc/man7/
H A Dx509.pod5 x509 - X.509 certificate handling
13 An X.509 certificate is a structured grouping of information about
14 an individual, a device, or anything one can imagine. An X.509 CRL
17 found in the X.509 document from ITU-T, or in RFC3280 from PKIX.
34 handle X.509 certificates, with some exceptions, shown below.
37 functions handle X.509 CRLs.
/freebsd/secure/lib/libcrypto/man/man7/
H A Dx509.764 x509 \- X.509 certificate handling
72 An X.509 certificate is a structured grouping of information about
73 an individual, a device, or anything one can imagine. An X.509 CRL
76 found in the X.509 document from ITU-T, or in RFC3280 from PKIX.
93 handle X.509 certificates, with some exceptions, shown below.
96 functions handle X.509 CRLs.
/freebsd/crypto/heimdal/doc/doxyout/hx509/html/
H A Dindex.html3 <title>Heimdalx509library: Heimdal PKIX/X.509 library</title>
22 <h1>Heimdal PKIX/X.509 library</h1>
26 Heimdal libhx509 library is a implementation of the PKIX/X.509 and related protocols.<p>
27 PKIX/X.509 is ...<p>
29 <li><a class="el" href="page_name.html">PKIX/X.509 Names</a></li><li><a class="el" href="page_cert.…
H A Dpage_name.html3 <title>Heimdalx509library: PKIX/X.509 Names</title>
22 <h1><a class="anchor" name="page_name">PKIX/X.509 Names </a></h1>There are several names in PKIX/X.
/freebsd/crypto/heimdal/doc/
H A Dhx509.texi25 * hx509: (hx509). The X.509 distribution from KTH
32 @subtitle X.509 distribution from KTH
181 * What is X.509 ?::
217 @node Introduction, What is X.509 ?, Top, Top
240 hx509 (Heimdal x509 support) is a near complete X.509 stack that can
250 @node What is X.509 ?, Setting up a CA, Introduction, Top
251 @chapter What is X.509, PKIX, PKCS7 and CMS ?
253 X.509 was created by CCITT (later ITU) for the X.500 directory
254 service. Today, X.509 discussions and implementations commonly reference
255 the IETF's PKIX Certificate and CRL Profile of the X.509 v3 certificate
[all …]
/freebsd/lib/libsecureboot/efi/include/Guid/
H A DImageAuthentication.h96 /// The SHA256 hash of an X.509 certificate's To-Be-Signed contents.
107 /// The SHA384 hash of an X.509 certificate's To-Be-Signed contents.
118 /// The SHA512 hash of an X.509 certificate's To-Be-Signed contents.
181 /// This identifies a signature based on an X.509 certificate. If the signature is an X.509
183 /// key certificate in the image using certificate path verification, up to this X.509
225 /// This identifies a signature containing the SHA256 hash of an X.509 certificate's
238 /// This identifies a signature containing the SHA384 hash of an X.509 certificate's
251 /// This identifies a signature containing the SHA512 hash of an X.509 certificate's
/freebsd/crypto/openssl/crypto/x509/
H A Dv3_soa_id.c41 * The sOAIdentifier X.509v3 extension is defined in ITU Recommendation X.509
42 * (2019), Section 17.3.2.1.1. See: https://www.itu.int/rec/T-REC-X.509-201910-I/en.
H A Dv3_single_use.c41 * The singleUse X.509v3 extension is defined in ITU Recommendation X.509
42 * (2019), Section 17.1.2.5. See: https://www.itu.int/rec/T-REC-X.509-201910-I/en.
H A Dv3_no_ass.c41 * The noAssertion X.509v3 extension is defined in ITU Recommendation X.509
42 * (2019), Section 17.5.2.7. See: https://www.itu.int/rec/T-REC-X.509-201910-I/en.
H A Dv3_no_rev_avail.c41 * The noRevAvail X.509v3 extension is defined in ITU Recommendation X.509
42 * (2019), Section 17.2.2.7. See: https://www.itu.int/rec/T-REC-X.509-201910-I/en.
H A Dv3_ind_iss.c41 * The indirectIssuer X.509v3 extension is defined in ITU Recommendation X.509
42 * (2019), Section 17.5.2.5. See: https://www.itu.int/rec/T-REC-X.509-201910-I/en.
H A Dv3_group_ac.c41 * The groupAC X.509v3 extension is defined in ITU Recommendation X.509
42 * (2019), Section 17.1.2.6. See: https://www.itu.int/rec/T-REC-X.509-201910-I/en.
/freebsd/crypto/openssl/doc/man3/
H A DX509_REQ_get_extensions.pod7 - handle X.509 extension attributes of a CSR
20 X509_REQ_get_extensions() returns the first list of X.509 extensions
25 X509_REQ_add_extensions_nid() adds to I<req> a list of X.509 extensions I<exts>,
H A DSSL_set1_server_cert_type.pod52 By default (if no explicit settings are specified), only X.509 certificates
62 By default (if no explicit settings are specified), only X.509 certificates
66 RPKs if its peer also supports RPKs, otherwise X.509 certificate will be used
75 Which corresponds to an X.509 certificate normally used in TLS.
86 X.509 certificates are used in the handshake.
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_set1_server_cert_type.3110 By default (if no explicit settings are specified), only X.509 certificates
120 By default (if no explicit settings are specified), only X.509 certificates
124 RPKs if its peer also supports RPKs, otherwise X.509 certificate will be used
130 Which corresponds to an X.509 certificate normally used in TLS.
138 X.509 certificates are used in the handshake.
H A DX509_REQ_get_extensions.366 \&\- handle X.509 extension attributes of a CSR
79 \&\fBX509_REQ_get_extensions()\fR returns the first list of X.509 extensions
84 \&\fBX509_REQ_add_extensions_nid()\fR adds to \fIreq\fR a list of X.509 extensions \fIexts\fR,
/freebsd/crypto/openssl/doc/internal/man3/
H A Dossl_print_attribute_value.pod23 distinguished name, as seen in the C<subject> and C<issuer> fields of an X.509
24 public key certificate. They also appear in the attributes of an X.509
26 associatedInformation X.509v3 extensions.
/freebsd/contrib/bearssl/src/ssl/
H A Dssl_client_full.c102 * Note: the X.509 validation engine will nonetheless refuse to in br_ssl_client_init_full()
124 * X.509 engine uses SHA-256 to hash certificate DN (for in br_ssl_client_init_full()
148 * X.509 engine. in br_ssl_client_init_full()
159 * Link the X.509 engine in the SSL engine. in br_ssl_client_init_full()
/freebsd/share/snmp/mibs/
H A DFREEBSD-MIB.txt27 "Added entries for the otherName component of a X.509 cert"
43 "Subtree for X.509 Certificate otherName entries"
52 "Entry for X.509 Certificate for NFS user@domain name"
/freebsd/secure/usr.bin/openssl/man/
H A Dopenssl-x509.1155 Generated certificates bear X.509 version 3.
195 X.509 extensions included in a certificate input are not copied by default.
196 X.509 extensions to be added can be specified using the \fB\-extfile\fR option.
203 X.509 extensions included in the request are not copied by default.
204 X.509 extensions to be added can be specified using the \fB\-extfile\fR option.
207 Determines how to handle X.509 extensions
467 Configuration file containing certificate and request X.509 extensions to add.
470 The section in the extfile to add X.509 extensions from.
778 wrong private key, using unsuitable X.509 extensions,
807 Since OpenSSL 3.2, generated certificates bear X.509 version 3,
H A Dopenssl-verification-options.164 openssl\-verification\-options \- generic X.509 certificate verification options
73 There are many situations where X.509 certificates are verified
124 (EKUs) that may be given in X.509 extensions of end-entity certificates.
188 The second step is to check the X.509v3 extensions of every certificate
193 The X.509v3 extensions of the target or "leaf" certificate
247 Files should be named with the hash value of the X.509 SubjectName of each
314 The authorityKeyIdentifier must be given for X.509v3 certs unless they
317 The subjectKeyIdentifier must be given for all X.509v3 CA certs.
524 which includes the case that it is an X.509v1 certificate,
567 basicConstraints and keyUsage and X.509v1 certificates above apply to \fBall\fR
/freebsd/crypto/heimdal/lib/hx509/
H A Ddoxygen.c34 /** @mainpage Heimdal PKIX/X.509 library
38 * Heimdal libhx509 library is a implementation of the PKIX/X.509 and
41 * PKIX/X.509 is ...
/freebsd/sys/contrib/device-tree/src/arm64/qcom/
H A Dsdm636.dtsi14 * 509 instead of 512 and lack of
22 /* Adreno 509 shares the frequency table with 512 */

12345678910>>...23