/freebsd/crypto/heimdal/lib/hx509/ |
H A D | test_ca.in | 59 --ca-certificate=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key \ 67 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1 72 --signer=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key || exit 1 78 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1 83 --signer=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key \ 90 anchor:FILE:$srcdir/data/ca.crt > /dev/null && exit 1 96 --signer=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key \ 103 anchor:FILE:$srcdir/data/ca.crt > /dev/null && exit 1 107 --ca-certificate=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key \ 115 --ca-certificate=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key \ [all …]
|
H A D | test_chain.in | 54 chain:FILE:$srcdir/data/ca.crt \ 55 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1 60 chain:FILE:$srcdir/data/ca.crt \ 61 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1 66 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1 71 chain:FILE:$srcdir/data/ca.crt \ 72 anchor:FILE:$srcdir/data/ca.crt > /dev/null && exit 1 74 echo "sub-cert -> sub-ca -> root" 77 chain:FILE:$srcdir/data/sub-ca.crt \ 78 chain:FILE:$srcdir/data/ca.crt \ [all …]
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 80-test_ocsp.t | 59 test_ocsp("NON-DELEGATED; Intermediate CA -> EE", 61 test_ocsp("NON-DELEGATED; Root CA -> Intermediate CA", 63 test_ocsp("NON-DELEGATED; Root CA -> EE", 65 test_ocsp("NON-DELEGATED; 3-level CA hierarchy", 67 test_ocsp("DELEGATED; Intermediate CA -> EE", 69 test_ocsp("DELEGATED; Root CA -> Intermediate CA", 71 test_ocsp("DELEGATED; Root CA -> EE", 78 test_ocsp("NON-DELEGATED; Intermediate CA -> EE", 80 test_ocsp("NON-DELEGATED; Root CA -> Intermediate CA", 82 test_ocsp("NON-DELEGATED; Root CA -> EE", [all …]
|
H A D | 25-test_verify.t | 35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 38 # Root CA variants 39 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]), 40 "fail trusted non-ca root"); 41 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]), 42 "fail server trust non-ca root"); 43 ok(!verify("ee-cert", "sslserver", [qw(nroot+anyEKU)], [qw(ca-cert)]), 44 "fail wildcard trust non-ca root"); 45 ok(!verify("ee-cert", "sslserver", [qw(root-cert2)], [qw(ca-cert)]), 47 ok(!verify("ee-cert", "sslserver", [qw(root-name2)], [qw(ca-cert)]), [all …]
|
/freebsd/crypto/openssl/test/certs/ |
H A D | setup.sh | 4 ./mkcert.sh genroot "Root CA" root-key root-cert 5 # root cert variants: CA:false, key2, DN2, expired 6 ./mkcert.sh genss "Root CA" root-key root-nonca 7 ./mkcert.sh genroot "Root CA" root-key2 root-cert2 9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 40 # Root CA security level variants: 43 ./mkcert.sh genroot "Root CA" root-key root-cert-md5 46 ./mkcert.sh genroot "Root CA" root-key-768 root-cert-768 49 ./mkcert.sh genroot "Root CA" root-key croot-cert clientAuth [all …]
|
H A D | mkcert.sh | 103 local bcon="basicConstraints = critical,CA:true" 138 local bcon="basicConstraints = critical,CA:true" 156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 190 local ca=$1; shift 195 "basicConstraints = CA:false" \ 199 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 207 local ca=$1; shift 213 "basicConstraints = CA:false"; \ 216 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ [all …]
|
/freebsd/crypto/openssl/demos/certs/ |
H A D | mkcerts.sh | 7 # Root CA: create certificate directly 8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \ 10 # Intermediate CA: request first 11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \ 13 # Sign request: CA extensions 14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -days 3600 \ 15 -extfile ca.cnf -extensions v3_ca -CAcreateserial -out intca.pem 18 CN="Test Server Cert" $OPENSSL req -config ca.cnf -nodes \ 21 $OPENSSL x509 -req -in req.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 22 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out server.pem [all …]
|
/freebsd/sys/i386/i386/ |
H A D | copyout.c | 142 struct copyinstr_arg0 *ca; in copyinstr_slow0() local 145 ca = arg; in copyinstr_slow0() 146 MPASS(ca->alen == 0 && ca->len > 0 && !ca->end); in copyinstr_slow0() 147 while (ca->alen < ca->len && !ca->end) { in copyinstr_slow0() 148 c = *(char *)(kva + ca->alen); in copyinstr_slow0() 149 *(char *)ca->kc = c; in copyinstr_slow0() 150 ca->alen++; in copyinstr_slow0() 151 ca->kc++; in copyinstr_slow0() 153 ca->end = true; in copyinstr_slow0() 160 struct copyinstr_arg0 ca; in copyinstr() local [all …]
|
/freebsd/crypto/openssl/test/smime-certs/ |
H A D | mksmime-certs.sh | 13 OPENSSL_CONF=./ca.cnf 16 # Root CA: create certificate directly 17 CN="Test S/MIME RSA Root" $OPENSSL req -config ca.cnf -x509 -noenc \ 21 CN="Test S/MIME EE RSA #1" $OPENSSL req -config ca.cnf -noenc \ 24 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 25 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa1.pem 27 CN="Test S/MIME EE RSA #2" $OPENSSL req -config ca.cnf -noenc \ 29 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 30 -extfile ca.cnf -extensions usr_cert -CAcreateserial >>smrsa2.pem 32 CN="Test S/MIME EE RSA #3" $OPENSSL req -config ca.cnf -noenc \ [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | danetest.in | 30 # subject= CN = Issuer CA 38 # subject= CN = Root CA 207 issuer= /CN=Issuer CA 221 subject= /CN=Issuer CA 222 issuer= /CN=Root CA 235 subject= /CN=Root CA 236 issuer= /CN=Root CA 254 issuer= /CN=Issuer CA 268 subject= /CN=Issuer CA 269 issuer= /CN=Root CA [all …]
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | CA.pl.pod | 5 CA.pl - friendlier interface for OpenSSL certificate programs 9 B<CA.pl> 14 B<CA.pl> 26 B<CA.pl> B<-pkcs12> [I<certname>] 28 B<CA.pl> B<-verify> I<certfile> ... 30 B<CA.pl> B<-revoke> I<certfile> [I<reason>] 34 The B<CA.pl> script is a perl script that supplies the relevant command line 45 B<CA.pl> script. 47 Under some environments it may not be possible to run the B<CA.pl> script 51 perl -S CA.pl [all …]
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | CA.pl.1 | 133 .IX Title "CA.PL 1ossl" 134 .TH CA.PL 1ossl "2023-09-19" "3.0.11" "OpenSSL" 143 \&\fB\s-1CA\s0.pl\fR 148 \&\fB\s-1CA\s0.pl\fR 160 \&\fB\s-1CA\s0.pl\fR \fB\-pkcs12\fR [\fIcertname\fR] 162 \&\fB\s-1CA\s0.pl\fR \fB\-verify\fR \fIcertfile\fR ... 164 \&\fB\s-1CA\s0.pl\fR \fB\-revoke\fR \fIcertfile\fR [\fIreason\fR] 167 The \fB\s-1CA\s0.pl\fR script is a perl script that supplies the relevant command line 178 \&\fB\s-1CA\s0.pl\fR script. 180 Under some environments it may not be possible to run the \fB\s-1CA\s0.pl\fR script [all …]
|
H A D | openssl-ca.1 | 133 .IX Title "OPENSSL-CA 1ossl" 134 .TH OPENSSL-CA 1ossl "2023-09-22" "3.0.11" "OpenSSL" 140 openssl\-ca \- sample minimal CA application 143 \&\fBopenssl\fR \fBca\fR 207 This command emulates a \s-1CA\s0 application. 220 The descriptions of the \fBca\fR command options are divided into each purpose. 237 \&\fBdefault_ca\fR in the \fBca\fR section). 241 signed by the \s-1CA.\s0 249 A single self-signed certificate to be signed by the \s-1CA.\s0 253 and additional field values to be signed by the \s-1CA.\s0 See the \fB\s-1SPKAC FORMAT\s0\fR [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set0_CA_list.pod | 18 - get or set CA list 42 The functions described here set and manage the list of CA names that are sent 45 For TLS versions 1.2 and earlier the list of CA names is only sent from the 46 server to the client when requesting a client certificate. So any list of CA 47 names set is never sent from client to server and the list of CA names retrieved 50 For TLS 1.3 the list of CA names is sent using the B<certificate_authorities> 54 In most cases it is not necessary to set CA names on the client side. The list 55 of CA names that are acceptable to the client will be sent in plaintext to the 58 and therefore setting CA names on the client side will have no impact if that 62 The "client CA list" functions below only have an effect when called on the [all …]
|
H A D | SSL_CTX_load_verify_locations.pod | 9 - set default locations for trusted CA certificates 32 locations for B<ctx>, at which CA certificates for verification purposes 40 which CA certificates are loaded should be used. There is one default directory, 42 The default CA certificates directory is called F<certs> in the default OpenSSL 46 The default CA certificates file is called F<cert.pem> in the default 65 If B<CAfile> is not NULL, it points to a file of CA certificates in PEM 66 format. The file can contain several CA certificates identified by 69 ... (CA certificate in base64 encoding) ... 78 If B<CApath> is not NULL, it points to a directory containing CA certificates 79 in PEM format. The files each contain one CA certificate. The files are [all …]
|
/freebsd/contrib/ofed/libibumad/ |
H A D | umad.c | 104 static int find_cached_ca(const char *ca_name, umad_ca_t * ca) in find_cached_ca() argument 109 static int put_ca(umad_ca_t * ca) in put_ca() argument 220 static int release_ca(umad_ca_t * ca) in release_ca() argument 224 for (i = 0; i <= ca->numports; i++) { in release_ca() 225 if (!ca->ports[i]) in release_ca() 227 release_port(ca->ports[i]); in release_ca() 228 free(ca->ports[i]); in release_ca() 229 ca->ports[i] = NULL; in release_ca() 235 * if *port > 0, check ca[port] state. Otherwise set *port to 242 umad_ca_t ca; in resolve_ca_port() local [all …]
|
/freebsd/contrib/ofed/infiniband-diags/src/ |
H A D | ibstat.c | 59 "CA", 65 static void ca_dump(umad_ca_t * ca) in ca_dump() argument 67 if (!ca->node_type) in ca_dump() 70 ((unsigned)ca->node_type <= in ca_dump() 71 IB_NODE_MAX ? node_type_str[ca->node_type] : "???"), in ca_dump() 72 ca->ca_name); in ca_dump() 74 ((unsigned)ca->node_type <= in ca_dump() 75 IB_NODE_MAX ? node_type_str[ca->node_type] : "???"), in ca_dump() 76 ca->ca_type); in ca_dump() 77 printf("\tNumber of ports: %d\n", ca->numports); in ca_dump() [all …]
|
/freebsd/crypto/heimdal/doc/ |
H A D | hx509.texi | 182 * Setting up a CA:: 190 Setting up a CA 193 * Creating a CA certificate:: 229 @item CA 232 Registration Authority, i.e., an optional system to which a CA delegates certain management functio… 234 An optional system to which a CA delegates the publication of certificate revocation lists. 250 @node What is X.509 ?, Setting up a CA, Introduction, Top 290 @item Certification Authority (CA) certificates 293 certificates (be it sub-ordinate CA certificates to build an trust anchors 294 or end entity certificates). There is no limit to how many certificates a CA [all …]
|
/freebsd/contrib/ofed/opensm/include/vendor/ |
H A D | osm_vendor_al.h | 114 * Node GUID of the local CA. 117 * Size of the CA attributes for this CA. 120 * Pointer to dynamicly allocated CA Attribute structure. 125 /****f* OpenSM: CA Info/osm_ca_info_get_num_ports 130 * Returns the number of ports owned by this CA. 143 * [in] Pointer to a CA Info object. 146 * Returns the number of ports owned by this CA. 153 /****f* OpenSM: CA Info/osm_ca_info_get_port_guid 158 * Returns the port GUID of the specified port owned by this CA. 172 * [in] Pointer to a CA Info object. [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | SSL_CTX_set0_CA_list.3 | 153 \&\- get or set CA list 177 The functions described here set and manage the list of \s-1CA\s0 names that are sent 180 For \s-1TLS\s0 versions 1.2 and earlier the list of \s-1CA\s0 names is only sent from the 181 server to the client when requesting a client certificate. So any list of \s-1CA\s0 182 names set is never sent from client to server and the list of \s-1CA\s0 names retrieved 185 For \s-1TLS 1.3\s0 the list of \s-1CA\s0 names is sent using the \fBcertificate_authorities\fR 189 In most cases it is not necessary to set \s-1CA\s0 names on the client side. The list 190 of \s-1CA\s0 names that are acceptable to the client will be sent in plaintext to the 193 and therefore setting \s-1CA\s0 names on the client side will have no impact if that 197 The \*(L"client \s-1CA\s0 list\*(R" functions below only have an effect when called on the [all …]
|
/freebsd/crypto/openssl/apps/ |
H A D | CA.pl.in | 10 # Wrapper around the ca to make it easier to use 18 my @OPENSSL_CMDS = ("req", "ca", "pkcs12", "x509", "verify"); 26 my $CA = "$openssl ca $OPENSSL_CONFIG"; 124 …CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-… 125 CA.pl -pkcs12 [certname] 126 CA.pl -verify certfile ... 127 CA.pl -revoke certfile [reason] 167 # ask user for existing CA certificate 168 print "CA certificate filename (or enter to create)\n"; 176 print "Making CA certificate ...\n"; [all …]
|
/freebsd/contrib/ofed/opensm/libvendor/ |
H A D | osm_vendor_mtl_hca_guid.c | 69 /****f* OpenSM: CA Info/osm_ca_info_get_pi_ptr 75 * owned by this CA. 89 * [in] Pointer to a CA Info object. 93 * The index is the offset into the ca's internal array 98 * owned by this CA. 106 * get the CA names ava`ilable on the system 155 "More CA GUIDs than allocated array (%d).\n", in __osm_vendor_get_ca_ids() 213 "__osm_ca_info_init: " "Querying CA %s.\n", ca_id); in __osm_ca_info_init() 316 uint32_t ca; in osm_vendor_get_all_port_attr() local 329 * 1) Determine the number of CA's in osm_vendor_get_all_port_attr() [all …]
|
H A D | osm_vendor_mlx_hca.c | 76 * owned by this CA. 86 * get the CA names available on the system 135 "More CA GUIDs than allocated array (%d).\n", in __osm_vendor_get_ca_ids() 193 "__osm_ca_info_init: " "Querying CA %s.\n", ca_id); in __osm_ca_info_init() 304 uint32_t ca; in osm_vendor_get_all_port_attr() local 317 /* determine the number of CA's */ in osm_vendor_get_all_port_attr() 322 "Fail to get CA Ids.\n"); in osm_vendor_get_all_port_attr() 326 /* Allocate an array big enough to hold the ca info objects */ in osm_vendor_get_all_port_attr() 331 "Unable to allocate CA information array.\n"); in osm_vendor_get_all_port_attr() 338 * For each CA, retrieve the CA info attributes in osm_vendor_get_all_port_attr() [all …]
|
/freebsd/crypto/openssl/demos/certs/apps/ |
H A D | mkacerts.sh | 7 # Root CA: create certificate directly 8 CN="OpenSSL Test Root CA" $OPENSSL req -config apps.cnf -x509 -nodes \ 10 # Intermediate CA: request first 11 CN="OpenSSL Test Intermediate CA" $OPENSSL req -config apps.cnf -nodes \ 13 # Sign request: CA extensions 14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \ 19 # Sign using intermediate CA 20 $OPENSSL x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 26 # Sign using intermediate CA 27 $OPENSSL x509 -req -in sreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ [all …]
|
/freebsd/tests/sys/net/if_ovpn/ |
H A D | if_ovpn.sh | 62 ca $(atf_get_srcdir)/ca.crt 83 ca $(atf_get_srcdir)/ca.crt 141 ca $(atf_get_srcdir)/ca.crt 162 ca $(atf_get_srcdir)/ca.crt 214 ca $(atf_get_srcdir)/ca.crt 235 ca $(atf_get_srcdir)/ca.crt 286 ca $(atf_get_srcdir)/ca.crt 307 ca $(atf_get_srcdir)/ca.crt 377 ca $(atf_get_srcdir)/ca.crt 398 ca $(atf_get_srcdir)/ca.crt [all …]
|