/freebsd/crypto/openssl/test/ |
H A D | danetest.in | 30 # subject= CN = Issuer CA 38 # subject= CN = Root CA 207 issuer= /CN=Issuer CA 221 subject= /CN=Issuer CA 222 issuer= /CN=Root CA 235 subject= /CN=Root CA 236 issuer= /CN=Root CA 254 issuer= /CN=Issuer CA 268 subject= /CN=Issuer CA 269 issuer= /CN=Root CA [all …]
|
H A D | CAtsa.cnf | 33 certificate = $dir/cacert.pem # The CA certificate 43 # For the CA policy 67 organizationName = Gov-CA Ltd. 79 # TSA server cert is not a CA cert. 80 basicConstraints=CA:FALSE 92 # This is not a CA cert and not a TSA cert, either (timeStamping usage missing) 93 basicConstraints=CA:FALSE 107 basicConstraints = CA:FALSE 112 # Extensions for a typical CA 116 basicConstraints = critical,CA:true
|
H A D | ca-and-certs.cnf | 19 commonName_value = Dodgy CA 37 basicConstraints = CA:false 43 basicConstraints = CA:false 49 basicConstraints = CA:false 87 basicConstraints = critical,CA:true,pathlen:1
|
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Utils/ |
H A D | CtorUtils.cpp | 39 Constant *CA = ConstantArray::get(ATy, CAList); in removeGlobalCtors() local 42 if (CA->getType() == OldCA->getType()) { in removeGlobalCtors() 43 GCL->setInitializer(CA); in removeGlobalCtors() 49 new GlobalVariable(CA->getType(), GCL->isConstant(), GCL->getLinkage(), in removeGlobalCtors() 50 CA, "", GCL->getThreadLocalMode()); in removeGlobalCtors() 65 ConstantArray *CA = cast<ConstantArray>(GV->getInitializer()); 67 Result.reserve(CA->getNumOperands()); in parseGlobalCtors() 68 for (auto &V : CA->operands()) { in parseGlobalCtors() local 89 ConstantArray *CA = dyn_cast<ConstantArray>(GV->getInitializer()); in findGlobalCtors() 90 if (!CA) in findGlobalCtors() 92 ConstantArray *CA = dyn_cast<ConstantArray>(GV->getInitializer()); findGlobalCtors() local [all...] |
/freebsd/crypto/openssl/doc/man1/ |
H A D | CA.pl.pod | 5 CA.pl - friendlier interface for OpenSSL certificate programs 9 B<CA.pl> 14 B<CA.pl> 26 B<CA.pl> B<-pkcs12> [I<certname>] 28 B<CA.pl> B<-verify> I<certfile> ... 30 B<CA.pl> B<-revoke> I<certfile> [I<reason>] 34 The B<CA.pl> script is a perl script that supplies the relevant command line 45 B<CA.pl> script. 47 Under some environments it may not be possible to run the B<CA.pl> script 51 perl -S CA.pl [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set0_CA_list.pod | 18 - get or set CA list 42 The functions described here set and manage the list of CA names that are sent 45 For TLS versions 1.2 and earlier the list of CA names is only sent from the 46 server to the client when requesting a client certificate. So any list of CA 47 names set is never sent from client to server and the list of CA names retrieved 50 For TLS 1.3 the list of CA names is sent using the B<certificate_authorities> 54 In most cases it is not necessary to set CA names on the client side. The list 55 of CA names that are acceptable to the client will be sent in plaintext to the 58 and therefore setting CA names on the client side will have no impact if that 62 The "client CA list" functions below only have an effect when called on the [all …]
|
H A D | SSL_CTX_load_verify_locations.pod | 9 - set default locations for trusted CA certificates 32 locations for B<ctx>, at which CA certificates for verification purposes 40 which CA certificates are loaded should be used. There is one default directory, 42 The default CA certificates directory is called F<certs> in the default OpenSSL 46 The default CA certificates file is called F<cert.pem> in the default 65 If B<CAfile> is not NULL, it points to a file of CA certificates in PEM 66 format. The file can contain several CA certificates identified by 69 ... (CA certificate in base64 encoding) ... 78 If B<CApath> is not NULL, it points to a directory containing CA certificates 79 in PEM format. The files each contain one CA certificate. The files are [all …]
|
H A D | X509_check_ca.pod | 5 X509_check_ca - check if given certificate is CA certificate 15 This function checks if given certificate is CA certificate (can be used 21 Function return 0, if it is not CA certificate, 1 if it is proper X509v3 22 CA certificate with B<basicConstraints> extension CA:TRUE, 26 extension telling that it is CA certificate.
|
H A D | X509_check_purpose.pod | 17 checked to determine if it's a possible CA with various levels of certainty 38 For non-CA checks 50 For CA checks the below integers could be returned with the following meanings: 56 =item E<32>0 not a CA or does not have the purpose represented by I<id> 58 =item E<32>1 is a CA. 61 New versions will not return this value. May be a CA 67 =item E<32>5 legacy Netscape specific CA Flags present
|
/freebsd/crypto/openssl/apps/ |
H A D | CA.pl.in | 26 my $CA = "$openssl ca $OPENSSL_CONFIG"; 124 …CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-… 125 CA.pl -pkcs12 [certname] 126 CA.pl -verify certfile ... 127 CA.pl -revoke certfile [reason] 179 $RET = run("$CA -create_serial" 194 $RET = run("$CA -policy policy_anything -infiles $NEWREQ $EXTRA{ca}"); 196 $RET = run("$CA -policy policy_anything -out $NEWCERT" 200 $RET = run("$CA -policy policy_anything -out $NEWCERT" 206 $RET = run("$CA -policy policy_anything -out $NEWCERT" [all …]
|
/freebsd/secure/caroot/trusted/ |
H A D | HARICA_TLS_ECC_Root_CA_2021.pem | 2 ## HARICA TLS ECC Root CA 2021 5 ## Authority (CA). It was automatically extracted from Mozilla's 6 ## root CA list (the file `certdata.txt' in security/nss). 20 …ssuer: C = GR, O = Hellenic Academic and Research Institutions CA, CN = HARICA TLS ECC Root CA 2021 24 …bject: C = GR, O = Hellenic Academic and Research Institutions CA, CN = HARICA TLS ECC Root CA 2021 40 CA:TRUE 42 C9:1B:53:81:12:FE:04:D5:16:D1:AA:BC:9A:6F:B7:A0:95:19:6E:CA
|
H A D | GlobalSign_ECC_Root_CA_-_R5.pem | 2 ## GlobalSign ECC Root CA - R5 5 ## Authority (CA). It was automatically extracted from Mozilla's 6 ## root CA list (the file `certdata.txt' in security/nss). 20 Issuer: OU = GlobalSign ECC Root CA - R5, O = GlobalSign, CN = GlobalSign 24 Subject: OU = GlobalSign ECC Root CA - R5, O = GlobalSign, CN = GlobalSign 42 CA:TRUE 44 3D:E6:29:48:9B:EA:07:CA:21:44:4A:26:DE:6E:DE:D2:83:D0:9F:59
|
H A D | OISTE_WISeKey_Global_Root_GC_CA.pem | 2 ## OISTE WISeKey Global Root GC CA 5 ## Authority (CA). It was automatically extracted from Mozilla's 6 ## root CA list (the file `certdata.txt' in security/nss). 20 … Issuer: C = CH, O = WISeKey, OU = OISTE Foundation Endorsed, CN = OISTE WISeKey Global Root GC CA 24 … Subject: C = CH, O = WISeKey, OU = OISTE Foundation Endorsed, CN = OISTE WISeKey Global Root GC CA 42 CA:TRUE 44 48:87:14:AC:E3:C3:9E:90:60:3A:D7:CA:89:EE:D3:AD:8C:B4:50:66
|
H A D | GlobalSign_Root_CA.pem | 2 ## GlobalSign Root CA 5 ## Authority (CA). It was automatically extracted from Mozilla's 6 ## root CA list (the file `certdata.txt' in security/nss). 20 Issuer: C = BE, O = GlobalSign nv-sa, OU = Root CA, CN = GlobalSign Root CA 24 Subject: C = BE, O = GlobalSign nv-sa, OU = Root CA, CN = GlobalSign Root CA 52 CA:TRUE 54 60:7B:66:1A:45:0D:97:CA:89:50:2F:7D:04:CD:34:A8:FF:FC:FD:4B
|
H A D | D-TRUST_BR_Root_CA_1_2020.pem | 2 ## D-TRUST BR Root CA 1 2020 5 ## Authority (CA). It was automatically extracted from Mozilla's 6 ## root CA list (the file `certdata.txt' in security/nss). 20 Issuer: C = DE, O = D-Trust GmbH, CN = D-TRUST BR Root CA 1 2020 24 Subject: C = DE, O = D-Trust GmbH, CN = D-TRUST BR Root CA 1 2020 40 CA:TRUE 49 …URI:ldap://directory.d-trust.net/CN=D-TRUST%20BR%20Root%20CA%201%202020,O=D-Trust%20GmbH,C=DE?cert…
|
H A D | D-TRUST_EV_Root_CA_1_2020.pem | 2 ## D-TRUST EV Root CA 1 2020 5 ## Authority (CA). It was automatically extracted from Mozilla's 6 ## root CA list (the file `certdata.txt' in security/nss). 20 Issuer: C = DE, O = D-Trust GmbH, CN = D-TRUST EV Root CA 1 2020 24 Subject: C = DE, O = D-Trust GmbH, CN = D-TRUST EV Root CA 1 2020 40 CA:TRUE 49 …URI:ldap://directory.d-trust.net/CN=D-TRUST%20EV%20Root%20CA%201%202020,O=D-Trust%20GmbH,C=DE?cert…
|
H A D | Amazon_Root_CA_3.pem | 2 ## Amazon Root CA 3 5 ## Authority (CA). It was automatically extracted from Mozilla's 6 ## root CA list (the file `certdata.txt' in security/nss). 20 Issuer: C = US, O = Amazon, CN = Amazon Root CA 3 24 Subject: C = US, O = Amazon, CN = Amazon Root CA 3 38 CA:TRUE
|
H A D | GlobalSign_ECC_Root_CA_-_R4.pem | 2 ## GlobalSign ECC Root CA - R4 5 ## Authority (CA). It was automatically extracted from Mozilla's 6 ## root CA list (the file `certdata.txt' in security/nss). 20 Issuer: OU = GlobalSign ECC Root CA - R4, O = GlobalSign, CN = GlobalSign 24 Subject: OU = GlobalSign ECC Root CA - R4, O = GlobalSign, CN = GlobalSign 40 CA:TRUE
|
H A D | e-Szigno_Root_CA_2017.pem | 2 ## e-Szigno Root CA 2017 5 ## Authority (CA). It was automatically extracted from Mozilla's 6 ## root CA list (the file `certdata.txt' in security/nss). 20 … = Budapest, O = Microsec Ltd., organizationIdentifier = VATHU-23584497, CN = e-Szigno Root CA 2017 24 … = Budapest, O = Microsec Ltd., organizationIdentifier = VATHU-23584497, CN = e-Szigno Root CA 2017 38 CA:TRUE
|
H A D | Amazon_Root_CA_4.pem | 2 ## Amazon Root CA 4 5 ## Authority (CA). It was automatically extracted from Mozilla's 6 ## root CA list (the file `certdata.txt' in security/nss). 20 Issuer: C = US, O = Amazon, CN = Amazon Root CA 4 24 Subject: C = US, O = Amazon, CN = Amazon Root CA 4 40 CA:TRUE
|
H A D | Atos_TrustedRoot_Root_CA_ECC_TLS_2021.pem | 2 ## Atos TrustedRoot Root CA ECC TLS 2021 5 ## Authority (CA). It was automatically extracted from Mozilla's 6 ## root CA list (the file `certdata.txt' in security/nss). 20 Issuer: CN = Atos TrustedRoot Root CA ECC TLS 2021, O = Atos, C = DE 24 Subject: CN = Atos TrustedRoot Root CA ECC TLS 2021, O = Atos, C = DE 40 CA:TRUE
|
H A D | Certum_EC-384_CA.pem | 2 ## Certum EC-384 CA 5 ## Authority (CA). It was automatically extracted from Mozilla's 6 ## root CA list (the file `certdata.txt' in security/nss). 20 …r: C = PL, O = Asseco Data Systems S.A., OU = Certum Certification Authority, CN = Certum EC-384 CA 24 …t: C = PL, O = Asseco Data Systems S.A., OU = Certum Certification Authority, CN = Certum EC-384 CA 40 CA:TRUE
|
/freebsd/crypto/openssl/test/smime-certs/ |
H A D | mksmime-certs.sh | 24 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 29 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 34 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 43 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 47 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 51 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 61 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 65 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 81 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
|
/freebsd/crypto/openssl/test/certs/ |
H A D | mkcert.sh | 156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 199 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 216 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 266 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 300 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 329 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 389 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 407 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
|
/freebsd/crypto/openssl/demos/certs/ |
H A D | ca.cnf | 38 basicConstraints=critical, CA:FALSE 47 basicConstraints=critical, CA:FALSE 60 basicConstraints=critical, CA:FALSE 70 # Extensions for a typical CA 76 basicConstraints = critical,CA:true 79 # Minimal CA entry to allow generation of CRLs.
|