Home
last modified time | relevance | path

Searched full:ca (Results 1 – 25 of 1825) sorted by relevance

12345678910>>...73

/freebsd/crypto/heimdal/lib/hx509/
H A Dtest_ca.in59 --ca-certificate=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key \
67 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1
72 --signer=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key || exit 1
78 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1
83 --signer=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key \
90 anchor:FILE:$srcdir/data/ca.crt > /dev/null && exit 1
96 --signer=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key \
103 anchor:FILE:$srcdir/data/ca.crt > /dev/null && exit 1
107 --ca-certificate=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key \
115 --ca-certificate=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key \
[all …]
H A Dtest_chain.in54 chain:FILE:$srcdir/data/ca.crt \
55 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1
60 chain:FILE:$srcdir/data/ca.crt \
61 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1
66 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1
71 chain:FILE:$srcdir/data/ca.crt \
72 anchor:FILE:$srcdir/data/ca.crt > /dev/null && exit 1
74 echo "sub-cert -> sub-ca -> root"
77 chain:FILE:$srcdir/data/sub-ca.crt \
78 chain:FILE:$srcdir/data/ca.crt \
[all …]
/freebsd/crypto/openssl/test/recipes/
H A D80-test_ocsp.t59 test_ocsp("NON-DELEGATED; Intermediate CA -> EE",
61 test_ocsp("NON-DELEGATED; Root CA -> Intermediate CA",
63 test_ocsp("NON-DELEGATED; Root CA -> EE",
65 test_ocsp("NON-DELEGATED; 3-level CA hierarchy",
67 test_ocsp("DELEGATED; Intermediate CA -> EE",
69 test_ocsp("DELEGATED; Root CA -> Intermediate CA",
71 test_ocsp("DELEGATED; Root CA -> EE",
78 test_ocsp("NON-DELEGATED; Intermediate CA -> EE",
80 test_ocsp("NON-DELEGATED; Root CA -> Intermediate CA",
82 test_ocsp("NON-DELEGATED; Root CA -> EE",
[all …]
H A D25-test_verify.t35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]),
38 # Root CA variants
39 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]),
40 "fail trusted non-ca root");
41 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]),
42 "fail server trust non-ca root");
43 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]),
44 "fail wildcard trust non-ca root");
45 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]),
47 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]),
[all …]
/freebsd/crypto/openssl/test/certs/
H A Dsetup.sh4 ./mkcert.sh genroot "Root CA" root-key root-cert
5 # root cert variants: CA:false, key2, DN2, expired
6 ./mkcert.sh genss "Root CA" root-key root-nonca
7 ./mkcert.sh genroot "Root CA" root-key2 root-cert2
9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired
12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root
40 # Root CA security level variants:
43 ./mkcert.sh genroot "Root CA" root-key root-cert-md5
46 ./mkcert.sh genroot "Root CA" root-key-768 root-cert-768
49 ./mkcert.sh genroot "Root CA" root-key croot-cert clientAuth
[all …]
H A Dmkcert.sh103 local bcon="basicConstraints = critical,CA:true"
138 local bcon="basicConstraints = critical,CA:true"
156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
190 local ca=$1; shift
195 "basicConstraints = CA:false" \
199 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
207 local ca=$1; shift
213 "basicConstraints = CA:false"; \
216 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
[all …]
/freebsd/crypto/openssl/demos/certs/
H A Dmkcerts.sh7 # Root CA: create certificate directly
8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \
10 # Intermediate CA: request first
11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \
13 # Sign request: CA extensions
14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -days 3600 \
15 -extfile ca.cnf -extensions v3_ca -CAcreateserial -out intca.pem
18 CN="Test Server Cert" $OPENSSL req -config ca.cnf -nodes \
21 $OPENSSL x509 -req -in req.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
22 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out server.pem
[all …]
/freebsd/sys/i386/i386/
H A Dcopyout.c142 struct copyinstr_arg0 *ca; in copyinstr_slow0() local
145 ca = arg; in copyinstr_slow0()
146 MPASS(ca->alen == 0 && ca->len > 0 && !ca->end); in copyinstr_slow0()
147 while (ca->alen < ca->len && !ca->end) { in copyinstr_slow0()
148 c = *(char *)(kva + ca->alen); in copyinstr_slow0()
149 *(char *)ca->kc = c; in copyinstr_slow0()
150 ca->alen++; in copyinstr_slow0()
151 ca->kc++; in copyinstr_slow0()
153 ca->end = true; in copyinstr_slow0()
160 struct copyinstr_arg0 ca; in copyinstr() local
[all …]
/freebsd/crypto/openssl/test/smime-certs/
H A Dmksmime-certs.sh13 OPENSSL_CONF=./ca.cnf
16 # Root CA: create certificate directly
17 CN="Test S/MIME RSA Root" $OPENSSL req -config ca.cnf -x509 -noenc \
21 CN="Test S/MIME EE RSA #1" $OPENSSL req -config ca.cnf -noenc \
24 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
25 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa1.pem
27 CN="Test S/MIME EE RSA #2" $OPENSSL req -config ca.cnf -noenc \
29 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
30 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa2.pem
32 CN="Test S/MIME EE RSA #3" $OPENSSL req -config ca.cnf -noenc \
[all …]
/freebsd/crypto/openssl/test/
H A Ddanetest.in30 # subject= CN = Issuer CA
38 # subject= CN = Root CA
207 issuer= /CN=Issuer CA
221 subject= /CN=Issuer CA
222 issuer= /CN=Root CA
235 subject= /CN=Root CA
236 issuer= /CN=Root CA
254 issuer= /CN=Issuer CA
268 subject= /CN=Issuer CA
269 issuer= /CN=Root CA
[all …]
/freebsd/crypto/openssl/doc/man1/
H A DCA.pl.pod5 CA.pl - friendlier interface for OpenSSL certificate programs
9 B<CA.pl>
14 B<CA.pl>
26 B<CA.pl> B<-pkcs12> [I<certname>]
28 B<CA.pl> B<-verify> I<certfile> ...
30 B<CA.pl> B<-revoke> I<certfile> [I<reason>]
34 The B<CA.pl> script is a perl script that supplies the relevant command line
45 B<CA.pl> script.
47 Under some environments it may not be possible to run the B<CA.pl> script
51 perl -S CA.pl
[all …]
/freebsd/secure/usr.bin/openssl/man/
H A DCA.pl.1133 .IX Title "CA.PL 1ossl"
134 .TH CA.PL 1ossl "2023-09-19" "3.0.11" "OpenSSL"
143 \&\fB\s-1CA\s0.pl\fR
148 \&\fB\s-1CA\s0.pl\fR
160 \&\fB\s-1CA\s0.pl\fR \fB\-pkcs12\fR [\fIcertname\fR]
162 \&\fB\s-1CA\s0.pl\fR \fB\-verify\fR \fIcertfile\fR ...
164 \&\fB\s-1CA\s0.pl\fR \fB\-revoke\fR \fIcertfile\fR [\fIreason\fR]
167 The \fB\s-1CA\s0.pl\fR script is a perl script that supplies the relevant command line
178 \&\fB\s-1CA\s0.pl\fR script.
180 Under some environments it may not be possible to run the \fB\s-1CA\s0.pl\fR script
[all …]
H A Dopenssl-ca.1133 .IX Title "OPENSSL-CA 1ossl"
134 .TH OPENSSL-CA 1ossl "2023-09-22" "3.0.11" "OpenSSL"
140 openssl\-ca \- sample minimal CA application
143 \&\fBopenssl\fR \fBca\fR
207 This command emulates a \s-1CA\s0 application.
220 The descriptions of the \fBca\fR command options are divided into each purpose.
237 \&\fBdefault_ca\fR in the \fBca\fR section).
241 signed by the \s-1CA.\s0
249 A single self-signed certificate to be signed by the \s-1CA.\s0
253 and additional field values to be signed by the \s-1CA.\s0 See the \fB\s-1SPKAC FORMAT\s0\fR
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set0_CA_list.pod18 - get or set CA list
42 The functions described here set and manage the list of CA names that are sent
45 For TLS versions 1.2 and earlier the list of CA names is only sent from the
46 server to the client when requesting a client certificate. So any list of CA
47 names set is never sent from client to server and the list of CA names retrieved
50 For TLS 1.3 the list of CA names is sent using the B<certificate_authorities>
54 In most cases it is not necessary to set CA names on the client side. The list
55 of CA names that are acceptable to the client will be sent in plaintext to the
58 and therefore setting CA names on the client side will have no impact if that
62 The "client CA list" functions below only have an effect when called on the
[all …]
H A DSSL_CTX_load_verify_locations.pod9 - set default locations for trusted CA certificates
32 locations for B<ctx>, at which CA certificates for verification purposes
40 which CA certificates are loaded should be used. There is one default directory,
42 The default CA certificates directory is called F<certs> in the default OpenSSL
46 The default CA certificates file is called F<cert.pem> in the default
65 If B<CAfile> is not NULL, it points to a file of CA certificates in PEM
66 format. The file can contain several CA certificates identified by
69 ... (CA certificate in base64 encoding) ...
78 If B<CApath> is not NULL, it points to a directory containing CA certificates
79 in PEM format. The files each contain one CA certificate. The files are
[all …]
/freebsd/contrib/ofed/libibumad/
H A Dumad.c104 static int find_cached_ca(const char *ca_name, umad_ca_t * ca) in find_cached_ca() argument
109 static int put_ca(umad_ca_t * ca) in put_ca() argument
220 static int release_ca(umad_ca_t * ca) in release_ca() argument
224 for (i = 0; i <= ca->numports; i++) { in release_ca()
225 if (!ca->ports[i]) in release_ca()
227 release_port(ca->ports[i]); in release_ca()
228 free(ca->ports[i]); in release_ca()
229 ca->ports[i] = NULL; in release_ca()
235 * if *port > 0, check ca[port] state. Otherwise set *port to
242 umad_ca_t ca; in resolve_ca_port() local
[all …]
/freebsd/contrib/ofed/infiniband-diags/src/
H A Dibstat.c59 "CA",
65 static void ca_dump(umad_ca_t * ca) in ca_dump() argument
67 if (!ca->node_type) in ca_dump()
70 ((unsigned)ca->node_type <= in ca_dump()
71 IB_NODE_MAX ? node_type_str[ca->node_type] : "???"), in ca_dump()
72 ca->ca_name); in ca_dump()
74 ((unsigned)ca->node_type <= in ca_dump()
75 IB_NODE_MAX ? node_type_str[ca->node_type] : "???"), in ca_dump()
76 ca->ca_type); in ca_dump()
77 printf("\tNumber of ports: %d\n", ca->numports); in ca_dump()
[all …]
/freebsd/crypto/heimdal/doc/
H A Dhx509.texi182 * Setting up a CA::
190 Setting up a CA
193 * Creating a CA certificate::
229 @item CA
232 Registration Authority, i.e., an optional system to which a CA delegates certain management functio…
234 An optional system to which a CA delegates the publication of certificate revocation lists.
250 @node What is X.509 ?, Setting up a CA, Introduction, Top
290 @item Certification Authority (CA) certificates
293 certificates (be it sub-ordinate CA certificates to build an trust anchors
294 or end entity certificates). There is no limit to how many certificates a CA
[all …]
/freebsd/contrib/ofed/opensm/include/vendor/
H A Dosm_vendor_al.h114 * Node GUID of the local CA.
117 * Size of the CA attributes for this CA.
120 * Pointer to dynamicly allocated CA Attribute structure.
125 /****f* OpenSM: CA Info/osm_ca_info_get_num_ports
130 * Returns the number of ports owned by this CA.
143 * [in] Pointer to a CA Info object.
146 * Returns the number of ports owned by this CA.
153 /****f* OpenSM: CA Info/osm_ca_info_get_port_guid
158 * Returns the port GUID of the specified port owned by this CA.
172 * [in] Pointer to a CA Info object.
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_CTX_set0_CA_list.3153 \&\- get or set CA list
177 The functions described here set and manage the list of \s-1CA\s0 names that are sent
180 For \s-1TLS\s0 versions 1.2 and earlier the list of \s-1CA\s0 names is only sent from the
181 server to the client when requesting a client certificate. So any list of \s-1CA\s0
182 names set is never sent from client to server and the list of \s-1CA\s0 names retrieved
185 For \s-1TLS 1.3\s0 the list of \s-1CA\s0 names is sent using the \fBcertificate_authorities\fR
189 In most cases it is not necessary to set \s-1CA\s0 names on the client side. The list
190 of \s-1CA\s0 names that are acceptable to the client will be sent in plaintext to the
193 and therefore setting \s-1CA\s0 names on the client side will have no impact if that
197 The \*(L"client \s-1CA\s0 list\*(R" functions below only have an effect when called on the
[all …]
/freebsd/crypto/openssl/apps/
H A DCA.pl.in10 # Wrapper around the ca to make it easier to use
18 my @OPENSSL_CMDS = ("req", "ca", "pkcs12", "x509", "verify");
26 my $CA = "$openssl ca $OPENSSL_CONFIG";
124CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-…
125 CA.pl -pkcs12 [certname]
126 CA.pl -verify certfile ...
127 CA.pl -revoke certfile [reason]
167 # ask user for existing CA certificate
168 print "CA certificate filename (or enter to create)\n";
176 print "Making CA certificate ...\n";
[all …]
/freebsd/contrib/ofed/opensm/libvendor/
H A Dosm_vendor_mtl_hca_guid.c69 /****f* OpenSM: CA Info/osm_ca_info_get_pi_ptr
75 * owned by this CA.
89 * [in] Pointer to a CA Info object.
93 * The index is the offset into the ca's internal array
98 * owned by this CA.
106 * get the CA names ava`ilable on the system
155 "More CA GUIDs than allocated array (%d).\n", in __osm_vendor_get_ca_ids()
213 "__osm_ca_info_init: " "Querying CA %s.\n", ca_id); in __osm_ca_info_init()
316 uint32_t ca; in osm_vendor_get_all_port_attr() local
329 * 1) Determine the number of CA's in osm_vendor_get_all_port_attr()
[all …]
H A Dosm_vendor_mlx_hca.c76 * owned by this CA.
86 * get the CA names available on the system
135 "More CA GUIDs than allocated array (%d).\n", in __osm_vendor_get_ca_ids()
193 "__osm_ca_info_init: " "Querying CA %s.\n", ca_id); in __osm_ca_info_init()
304 uint32_t ca; in osm_vendor_get_all_port_attr() local
317 /* determine the number of CA's */ in osm_vendor_get_all_port_attr()
322 "Fail to get CA Ids.\n"); in osm_vendor_get_all_port_attr()
326 /* Allocate an array big enough to hold the ca info objects */ in osm_vendor_get_all_port_attr()
331 "Unable to allocate CA information array.\n"); in osm_vendor_get_all_port_attr()
338 * For each CA, retrieve the CA info attributes in osm_vendor_get_all_port_attr()
[all …]
/freebsd/crypto/openssl/demos/certs/apps/
H A Dmkacerts.sh7 # Root CA: create certificate directly
8 CN="OpenSSL Test Root CA" $OPENSSL req -config apps.cnf -x509 -nodes \
10 # Intermediate CA: request first
11 CN="OpenSSL Test Intermediate CA" $OPENSSL req -config apps.cnf -nodes \
13 # Sign request: CA extensions
14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \
19 # Sign using intermediate CA
20 $OPENSSL x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
26 # Sign using intermediate CA
27 $OPENSSL x509 -req -in sreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
[all …]
/freebsd/tests/sys/net/if_ovpn/
H A Dif_ovpn.sh62 ca $(atf_get_srcdir)/ca.crt
83 ca $(atf_get_srcdir)/ca.crt
141 ca $(atf_get_srcdir)/ca.crt
162 ca $(atf_get_srcdir)/ca.crt
214 ca $(atf_get_srcdir)/ca.crt
235 ca $(atf_get_srcdir)/ca.crt
286 ca $(atf_get_srcdir)/ca.crt
307 ca $(atf_get_srcdir)/ca.crt
377 ca $(atf_get_srcdir)/ca.crt
398 ca $(atf_get_srcdir)/ca.crt
[all …]

12345678910>>...73