| /freebsd/crypto/openssl/test/smime-certs/ |
| H A D | mksmime-certs.sh | 17 $OPENSSL x509 -CA smroot.pem -new -days 36524 -force_pubkey $1 -subj "$2" \ 23 -keyout smroot.pem -out smroot.pem -key ../certs/ca-key.pem -days 36524 26 cp ../certs/ee-key.pem smrsa1.pem 27 gen smrsa1.pem "/CN=Test SMIME EE RSA #1" usr_rsa_cert >>smrsa1.pem 28 cp ../certs/ee-key-3072.pem smrsa2.pem 29 gen smrsa2.pem "/CN=Test SMIME EE RSA #2" usr_rsa_cert >>smrsa2.pem 30 cp ../certs/ee-key-4096.pem smrsa3.pem 31 gen smrsa3.pem "/CN=Test SMIME EE RSA #3" usr_rsa_cert >>smrsa3.pem 33 $OPENSSL x509 -in smrsa3.pem > smrsa3-cert.pem 34 $OPENSSL pkey -in smrsa3.pem > smrsa3-key.pem [all …]
|
| /freebsd/crypto/openssl/demos/certs/ |
| H A D | mkcerts.sh | 14 -keyout root.pem -out root.pem -newkey rsa:2048 -days 3650 17 -keyout intkey.pem -out intreq.pem -newkey rsa:2048 19 opensslcmd x509 -req -in intreq.pem -CA root.pem -days 3600 \ 20 -extfile ca.cnf -extensions v3_ca -CAcreateserial -out intca.pem 24 -keyout skey.pem -out req.pem -newkey rsa:1024 26 opensslcmd x509 -req -in req.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 27 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out server.pem 31 -keyout ckey.pem -out creq.pem -newkey rsa:1024 33 opensslcmd x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 34 -extfile ca.cnf -extensions usr_cert -CAcreateserial -out client.pem [all …]
|
| /freebsd/crypto/openssl/demos/certs/apps/ |
| H A D | mkacerts.sh | 13 -keyout root.pem -out root.pem -key rootkey.pem -new -days 3650 16 -key intkey.pem -out intreq.pem -new 18 opensslcmd x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \ 19 -extfile apps.cnf -extensions v3_ca -CAcreateserial -out intca.pem 22 -key ckey.pem -out creq.pem -new 24 opensslcmd x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 26 opensslcmd x509 -nameopt oneline -subject -issuer >client.pem 29 -key skey.pem -out sreq.pem -new 31 opensslcmd x509 -req -in sreq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 33 opensslcmd x509 -nameopt oneline -subject -issuer >server.pem [all …]
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 04-test_pem_reading.t | 26 # map input PEM file to 1 if it should be accepted; 0 when should be rejected 28 "cert-1023line.pem" => 1, 29 "cert-1024line.pem" => 1, 30 "cert-1025line.pem" => 1, 31 "cert-254-chars-at-the-end.pem" => 1, 32 "cert-254-chars-in-the-middle.pem" => 1, 33 "cert-255line.pem" => 1, 34 "cert-256line.pem" => 1, 35 "cert-257line.pem" => 1, 36 "cert-blankline.pem" => 0, [all …]
|
| H A D | 80-test_ocsp.t | 61 "ND1.ors", "ND1_Issuer_ICA.pem", "", 0, 0); 63 "ND2.ors", "ND2_Issuer_Root.pem", "", 0, 0); 65 "ND3.ors", "ND3_Issuer_Root.pem", "", 0, 0); 67 "ND1.ors", "ND1_Cross_Root.pem", "ND1_Issuer_ICA-Cross.pem", 0, 0); 69 "D1.ors", "D1_Issuer_ICA.pem", "", 0, 0); 71 "D2.ors", "D2_Issuer_Root.pem", "", 0, 0); 73 "D3.ors", "D3_Issuer_Root.pem", "", 0, 0); 80 "ISOP_ND1.ors", "ND1_Issuer_ICA.pem", "", 1, 0); 82 "ISOP_ND2.ors", "ND2_Issuer_Root.pem", "", 1, 0); 84 "ISOP_ND3.ors", "ND3_Issuer_Root.pem", "", 1, 0); [all …]
|
| H A D | 25-test_req.t | 27 @req_new = ("-newkey", "dsa:".srctop_file("apps", "dsa512.pem")); 39 my @addext_args = ( "openssl", "req", "-new", "-out", "testreq-addexts.pem", 40 "-key", srctop_file(@certs, "ee-key.pem"), 64 "-out", "testreq.pem"]))); 76 "-new", "-out", "testreq-rsa.pem", "-utf8", 77 "-key", srctop_file("test", "testrsa.pem")])), 82 "-verify", "-in", "testreq-rsa.pem", "-noout"])), 88 "-verify", "-in", "testreq-rsa.pem", "-noout"])), 103 "-new", "-out", "testreq-rsa.pem", "-utf8", 104 "-key", srctop_file("test", "testrsa.pem"), [all …]
|
| H A D | 90-test_store.t | 27 ( "test/blahdiblah.pem", 30 ( "test/testx509.pem", 31 "test/testrsa.pem", 32 "test/testrsapub.pem", 33 "test/testcrl.pem", 34 "apps/server.pem" ); 41 ( "test/testrsa.pem", 42 "test/testrsapub.pem" ); 54 "rsa-key-pkcs1.pem", "rsa-key-pkcs1.der", 55 "rsa-key-pkcs1-aes128.pem", [all …]
|
| H A D | 20-test_dhparam.t | 32 my $format = shift; #DER or PEM? 41 #Text file. Check it looks like PEM 56 ok(($format eq "PEM") && defined $pemtype, "Checking format is PEM"); 59 #No PEM type in this case, so we just set the pemtype to the expected 100 subtest "Read: 1024 bit PKCS3 params, generator 2, PEM file" => sub { 102 checkdhparams(data_file("pkcs3-2-1024.pem"), "PKCS3", 2, "PEM", 1024); 104 subtest "Read: 1024 bit PKCS3 params, generator 5, PEM file" => sub { 106 checkdhparams(data_file("pkcs3-5-1024.pem"), "PKCS3", 5, "PEM", 1024); 108 subtest "Read: 2048 bit PKCS3 params, generator 2, PEM file" => sub { 110 checkdhparams(data_file("pkcs3-2-2048.pem"), "PKCS3", 2, "PEM", 2048); [all …]
|
| H A D | 15-test_rsapss.t | 21 #using test/testrsa.pem which happens to be a 512 bit RSA 22 ok(run(app(['openssl', 'dgst', '-sign', srctop_file('test', 'testrsa.pem'), '-sha1', 27 srctop_file('test', 'testrsa.pem')])), 30 ok(run(app(['openssl', 'dgst', '-sign', srctop_file('test', 'testrsa.pem'), '-sha1', 33 srctop_file('test', 'testrsa.pem')])), 36 ok(!run(app(['openssl', 'dgst', '-sign', srctop_file('test', 'testrsa.pem'), '-sha512', 38 '-sigopt', 'rsa_mgf1_md:sha512', srctop_file('test', 'testrsa.pem')])), 41 ok(!run(app(['openssl', 'dgst', '-sign', srctop_file('test', 'testrsa.pem'), '-sha512', 43 '-sigopt', 'rsa_mgf1_md:sha1', srctop_file('test', 'testrsa.pem')])), 46 ok(!run(app(['openssl', 'dgst', '-prverify', srctop_file('test', 'testrsa.pem'), '-sha512', [all …]
|
| H A D | 15-test_dsaparam.t | 29 …sa_paramgen_bits:1024 -pkeyopt qbits:160 -pkeyopt type:fips186_4 -out $TESTDIR/p1024_q160_t1864.pem 30 …sa_paramgen_bits:2048 -pkeyopt qbits:224 -pkeyopt type:fips186_4 -out $TESTDIR/p2048_q224_t1864.pem 31 …sa_paramgen_bits:2048 -pkeyopt qbits:256 -pkeyopt type:fips186_4 -out $TESTDIR/p2048_q256_t1864.pem 32 …sa_paramgen_bits:3072 -pkeyopt qbits:256 -pkeyopt type:fips186_4 -out $TESTDIR/p3072_q256_t1864.pem 34 …keyopt qbits:160 -pkeyopt type:fips186_4 -pkeyopt gindex:1 -out $TESTDIR/p1024_q160_t1864_gind1.pem 35 …keyopt qbits:224 -pkeyopt type:fips186_4 -pkeyopt gindex:1 -out $TESTDIR/p2048_q224_t1864_gind1.pem 36 …keyopt qbits:256 -pkeyopt type:fips186_4 -pkeyopt gindex:1 -out $TESTDIR/p2048_q256_t1864_gind1.pem 37 …keyopt qbits:256 -pkeyopt type:fips186_4 -pkeyopt gindex:1 -out $TESTDIR/p3072_q256_t1864_gind1.pem 39 …sa_paramgen_bits:1024 -pkeyopt qbits:160 -pkeyopt type:fips186_2 -out $TESTDIR/p1024_q160_t1862.pem 40 …sa_paramgen_bits:1024 -pkeyopt qbits:224 -pkeyopt type:fips186_2 -out $TESTDIR/p1024_q224_t1862.pem [all …]
|
| H A D | 20-test_pkeyutl.t | 30 '-in', srctop_file('test', 'certs', 'sm2.pem'), 37 '-in', srctop_file('test', 'certs', 'sm2.pem'), 38 '-inkey', srctop_file('test', 'certs', 'sm2.pem'), 62 srctop_file('test', 'certs', 'server-ed25519-cert.pem'), 63 '-inkey', srctop_file('test', 'certs', 'server-ed25519-key.pem'), 67 srctop_file('test', 'certs', 'server-ed25519-cert.pem'), 68 '-inkey', srctop_file('test', 'certs', 'server-ed25519-cert.pem'), 75 '-inkey', srctop_file('test', 'certs', 'server-ed25519-key.pem')]))), 81 srctop_file('test', 'certs', 'server-ed448-cert.pem'), 82 '-inkey', srctop_file('test', 'certs', 'server-ed448-key.pem'), [all …]
|
| /freebsd/crypto/openssl/test/ssl-tests/ |
| H A D | 20-cert-select.cnf | 73 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 75 ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem 76 ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem 77 Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem 78 Ed25519.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed25519-key.pem 79 Ed448.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed448-cert.pem 80 Ed448.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ed448-key.pem 82 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 87 RequestCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 88 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem [all …]
|
| H A D | 10-resumption.cnf | 82 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 87 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 90 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 94 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 98 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 119 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 124 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 127 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 131 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 135 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem [all …]
|
| H A D | 04-client_auth.cnf | 55 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 57 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 61 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 78 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 80 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 85 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 102 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 104 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 105 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 110 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem [all …]
|
| H A D | 20-cert-select.cnf.in | 30 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"), 31 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"), 32 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"), 33 "Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"), 34 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"), 35 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"), 40 "PSS.Certificate" => test_pem("server-pss-cert.pem"), 41 "PSS.PrivateKey" => test_pem("server-pss-key.pem"), 42 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"), 43 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"), [all …]
|
| H A D | 02-protocol-version.cnf | 693 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 696 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 701 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 718 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 721 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 726 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 743 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 746 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 751 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 768 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem [all …]
|
| H A D | 11-dtls_resumption.cnf | 33 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 38 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 41 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 45 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 49 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 71 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 76 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 79 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 83 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 87 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem [all …]
|
| H A D | 07-dtls-protocol-version.cnf | 79 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 82 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 87 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 106 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 109 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 114 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 133 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 135 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 140 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 159 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem [all …]
|
| H A D | 06-sni-ticket.cnf | 33 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 36 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 39 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 42 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 48 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 75 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 78 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 81 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 84 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 90 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem [all …]
|
| H A D | 14-curves.cnf | 119 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 123 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 129 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 148 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 152 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 158 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 177 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 181 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 187 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 206 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem [all …]
|
| H A D | 32-compressed-certificate.cnf | 23 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 26 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 32 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 50 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 53 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 59 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 77 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem 80 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem 86 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem 104 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem [all …]
|
| /freebsd/crypto/openssl/providers/ |
| H A D | encoders.inc | 112 * OSSL_ENCODER_CTX_new_for_pkey(pkey, selection, "PEM", "type-specific", 121 ENCODER_w_structure("RSA", rsa, yes, pem, type_specific_keypair), 125 ENCODER_w_structure("DH", dh, yes, pem, type_specific_params), 127 ENCODER_w_structure("DHX", dhx, yes, pem, type_specific_params), 131 ENCODER_w_structure("DSA", dsa, yes, pem, type_specific), 134 /* EC only supports keypair and parameters DER and PEM output. */ 136 ENCODER_w_structure("EC", ec, yes, pem, type_specific_no_pub), 141 ENCODER_w_structure("SM2", sm2, no, pem, type_specific_no_pub), 160 * The "pem" ones also support PEM_write_bio_PrivateKey() and 164 ENCODER_w_structure("RSA", rsa, yes, pem, EncryptedPrivateKeyInfo), [all …]
|
| /freebsd/crypto/openssl/test/ocsp-tests/ |
| H A D | mk-ocsp-cert-chain.sh | 19 -out root-key.pem 26 -key root-key.pem \ 28 -out root-cert.pem 36 -out intermediate-key.pem 42 -key intermediate-key.pem \ 44 -out intermediate-csr.pem 51 -CA root-cert.pem \ 52 -CAkey root-key.pem \ 53 -in intermediate-csr.pem \ 55 -out intermediate-cert.pem [all …]
|
| /freebsd/crypto/heimdal/lib/hx509/ |
| H A D | test_ca.in | 62 --certificate="FILE:cert-ee.pem" || exit 1 66 cert:FILE:cert-ee.pem \ 76 cert:FILE:cert-ee.pem \ 84 FILE:cert-ee.pem || exit 1 88 cert:FILE:cert-ee.pem \ 97 FILE:cert-ee.pem || exit 1 101 cert:FILE:cert-ee.pem \ 111 --certificate="FILE:cert-ee.pem" || exit 1 120 --certificate="FILE:cert-ee.pem" || exit 1 129 --certificate="FILE:cert-ee.pem" || exit 1 [all …]
|
| /freebsd/crypto/openssl/test/certs/ |
| H A D | setup.sh | 14 openssl x509 -in root-cert.pem -trustout \ 15 -addtrust serverAuth -out root+serverAuth.pem 16 openssl x509 -in root-cert.pem -trustout \ 17 -addreject serverAuth -out root-serverAuth.pem 18 openssl x509 -in root-cert.pem -trustout \ 19 -addtrust clientAuth -out root+clientAuth.pem 20 openssl x509 -in root-cert.pem -trustout \ 21 -addreject clientAuth -out root-clientAuth.pem 23 openssl x509 -in root-cert.pem -trustout \ 24 -addtrust anyExtendedKeyUsage -out root+anyEKU.pem [all …]
|