Home
last modified time | relevance | path

Searched refs:CA (Results 1 – 25 of 492) sorted by relevance

12345678910>>...20

/freebsd/crypto/openssl/test/
H A Ddanetest.in30 # subject= CN = Issuer CA
38 # subject= CN = Root CA
207 issuer= /CN=Issuer CA
221 subject= /CN=Issuer CA
222 issuer= /CN=Root CA
235 subject= /CN=Root CA
236 issuer= /CN=Root CA
254 issuer= /CN=Issuer CA
268 subject= /CN=Issuer CA
269 issuer= /CN=Root CA
[all …]
H A DCAtsa.cnf33 certificate = $dir/cacert.pem # The CA certificate
43 # For the CA policy
67 organizationName = Gov-CA Ltd.
79 # TSA server cert is not a CA cert.
80 basicConstraints=CA:FALSE
92 # This is not a CA cert and not a TSA cert, either (timeStamping usage missing)
93 basicConstraints=CA:FALSE
107 basicConstraints = CA:FALSE
112 # Extensions for a typical CA
116 basicConstraints = critical,CA:true
H A Dca-and-certs.cnf19 commonName_value = Dodgy CA
37 basicConstraints = CA:false
43 basicConstraints = CA:false
49 basicConstraints = CA:false
87 basicConstraints = critical,CA:true,pathlen:1
/freebsd/contrib/llvm-project/llvm/lib/Transforms/Utils/
H A DCtorUtils.cpp39 Constant *CA = ConstantArray::get(ATy, CAList); in removeGlobalCtors() local
42 if (CA->getType() == OldCA->getType()) { in removeGlobalCtors()
43 GCL->setInitializer(CA); in removeGlobalCtors()
49 new GlobalVariable(CA->getType(), GCL->isConstant(), GCL->getLinkage(), in removeGlobalCtors()
50 CA, "", GCL->getThreadLocalMode()); in removeGlobalCtors()
65 ConstantArray *CA = cast<ConstantArray>(GV->getInitializer());
67 Result.reserve(CA->getNumOperands()); in parseGlobalCtors()
68 for (auto &V : CA->operands()) { in parseGlobalCtors() local
89 ConstantArray *CA = dyn_cast<ConstantArray>(GV->getInitializer()); in findGlobalCtors()
90 if (!CA) in findGlobalCtors()
92 ConstantArray *CA = dyn_cast<ConstantArray>(GV->getInitializer()); findGlobalCtors() local
[all...]
/freebsd/crypto/openssl/doc/man1/
H A DCA.pl.pod5 CA.pl - friendlier interface for OpenSSL certificate programs
9 B<CA.pl>
14 B<CA.pl>
26 B<CA.pl> B<-pkcs12> [I<certname>]
28 B<CA.pl> B<-verify> I<certfile> ...
30 B<CA.pl> B<-revoke> I<certfile> [I<reason>]
34 The B<CA.pl> script is a perl script that supplies the relevant command line
45 B<CA.pl> script.
47 Under some environments it may not be possible to run the B<CA.pl> script
51 perl -S CA.pl
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set0_CA_list.pod18 - get or set CA list
42 The functions described here set and manage the list of CA names that are sent
45 For TLS versions 1.2 and earlier the list of CA names is only sent from the
46 server to the client when requesting a client certificate. So any list of CA
47 names set is never sent from client to server and the list of CA names retrieved
50 For TLS 1.3 the list of CA names is sent using the B<certificate_authorities>
54 In most cases it is not necessary to set CA names on the client side. The list
55 of CA names that are acceptable to the client will be sent in plaintext to the
58 and therefore setting CA names on the client side will have no impact if that
62 The "client CA list" functions below only have an effect when called on the
[all …]
H A DSSL_CTX_load_verify_locations.pod9 - set default locations for trusted CA certificates
32 locations for B<ctx>, at which CA certificates for verification purposes
40 which CA certificates are loaded should be used. There is one default directory,
42 The default CA certificates directory is called F<certs> in the default OpenSSL
46 The default CA certificates file is called F<cert.pem> in the default
65 If B<CAfile> is not NULL, it points to a file of CA certificates in PEM
66 format. The file can contain several CA certificates identified by
69 ... (CA certificate in base64 encoding) ...
78 If B<CApath> is not NULL, it points to a directory containing CA certificates
79 in PEM format. The files each contain one CA certificate. The files are
[all …]
H A DX509_check_ca.pod5 X509_check_ca - check if given certificate is CA certificate
15 This function checks if given certificate is CA certificate (can be used
21 Function return 0, if it is not CA certificate, 1 if it is proper X509v3
22 CA certificate with B<basicConstraints> extension CA:TRUE,
26 extension telling that it is CA certificate.
H A DX509_check_purpose.pod17 checked to determine if it's a possible CA with various levels of certainty
38 For non-CA checks
50 For CA checks the below integers could be returned with the following meanings:
56 =item E<32>0 not a CA or does not have the purpose represented by I<id>
58 =item E<32>1 is a CA.
61 New versions will not return this value. May be a CA
67 =item E<32>5 legacy Netscape specific CA Flags present
/freebsd/crypto/openssl/apps/
H A DCA.pl.in26 my $CA = "$openssl ca $OPENSSL_CONFIG";
124CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-…
125 CA.pl -pkcs12 [certname]
126 CA.pl -verify certfile ...
127 CA.pl -revoke certfile [reason]
179 $RET = run("$CA -create_serial"
194 $RET = run("$CA -policy policy_anything -infiles $NEWREQ $EXTRA{ca}");
196 $RET = run("$CA -policy policy_anything -out $NEWCERT"
200 $RET = run("$CA -policy policy_anything -out $NEWCERT"
206 $RET = run("$CA -policy policy_anything -out $NEWCERT"
[all …]
/freebsd/secure/caroot/trusted/
H A DHARICA_TLS_ECC_Root_CA_2021.pem2 ## HARICA TLS ECC Root CA 2021
5 ## Authority (CA). It was automatically extracted from Mozilla's
6 ## root CA list (the file `certdata.txt' in security/nss).
20 …ssuer: C = GR, O = Hellenic Academic and Research Institutions CA, CN = HARICA TLS ECC Root CA 2021
24 …bject: C = GR, O = Hellenic Academic and Research Institutions CA, CN = HARICA TLS ECC Root CA 2021
40 CA:TRUE
42 C9:1B:53:81:12:FE:04:D5:16:D1:AA:BC:9A:6F:B7:A0:95:19:6E:CA
H A DGlobalSign_ECC_Root_CA_-_R5.pem2 ## GlobalSign ECC Root CA - R5
5 ## Authority (CA). It was automatically extracted from Mozilla's
6 ## root CA list (the file `certdata.txt' in security/nss).
20 Issuer: OU = GlobalSign ECC Root CA - R5, O = GlobalSign, CN = GlobalSign
24 Subject: OU = GlobalSign ECC Root CA - R5, O = GlobalSign, CN = GlobalSign
42 CA:TRUE
44 3D:E6:29:48:9B:EA:07:CA:21:44:4A:26:DE:6E:DE:D2:83:D0:9F:59
H A DOISTE_WISeKey_Global_Root_GC_CA.pem2 ## OISTE WISeKey Global Root GC CA
5 ## Authority (CA). It was automatically extracted from Mozilla's
6 ## root CA list (the file `certdata.txt' in security/nss).
20 … Issuer: C = CH, O = WISeKey, OU = OISTE Foundation Endorsed, CN = OISTE WISeKey Global Root GC CA
24 … Subject: C = CH, O = WISeKey, OU = OISTE Foundation Endorsed, CN = OISTE WISeKey Global Root GC CA
42 CA:TRUE
44 48:87:14:AC:E3:C3:9E:90:60:3A:D7:CA:89:EE:D3:AD:8C:B4:50:66
H A DGlobalSign_Root_CA.pem2 ## GlobalSign Root CA
5 ## Authority (CA). It was automatically extracted from Mozilla's
6 ## root CA list (the file `certdata.txt' in security/nss).
20 Issuer: C = BE, O = GlobalSign nv-sa, OU = Root CA, CN = GlobalSign Root CA
24 Subject: C = BE, O = GlobalSign nv-sa, OU = Root CA, CN = GlobalSign Root CA
52 CA:TRUE
54 60:7B:66:1A:45:0D:97:CA:89:50:2F:7D:04:CD:34:A8:FF:FC:FD:4B
H A DD-TRUST_BR_Root_CA_1_2020.pem2 ## D-TRUST BR Root CA 1 2020
5 ## Authority (CA). It was automatically extracted from Mozilla's
6 ## root CA list (the file `certdata.txt' in security/nss).
20 Issuer: C = DE, O = D-Trust GmbH, CN = D-TRUST BR Root CA 1 2020
24 Subject: C = DE, O = D-Trust GmbH, CN = D-TRUST BR Root CA 1 2020
40 CA:TRUE
49 …URI:ldap://directory.d-trust.net/CN=D-TRUST%20BR%20Root%20CA%201%202020,O=D-Trust%20GmbH,C=DE?cert…
H A DD-TRUST_EV_Root_CA_1_2020.pem2 ## D-TRUST EV Root CA 1 2020
5 ## Authority (CA). It was automatically extracted from Mozilla's
6 ## root CA list (the file `certdata.txt' in security/nss).
20 Issuer: C = DE, O = D-Trust GmbH, CN = D-TRUST EV Root CA 1 2020
24 Subject: C = DE, O = D-Trust GmbH, CN = D-TRUST EV Root CA 1 2020
40 CA:TRUE
49 …URI:ldap://directory.d-trust.net/CN=D-TRUST%20EV%20Root%20CA%201%202020,O=D-Trust%20GmbH,C=DE?cert…
H A DAmazon_Root_CA_3.pem2 ## Amazon Root CA 3
5 ## Authority (CA). It was automatically extracted from Mozilla's
6 ## root CA list (the file `certdata.txt' in security/nss).
20 Issuer: C = US, O = Amazon, CN = Amazon Root CA 3
24 Subject: C = US, O = Amazon, CN = Amazon Root CA 3
38 CA:TRUE
H A DGlobalSign_ECC_Root_CA_-_R4.pem2 ## GlobalSign ECC Root CA - R4
5 ## Authority (CA). It was automatically extracted from Mozilla's
6 ## root CA list (the file `certdata.txt' in security/nss).
20 Issuer: OU = GlobalSign ECC Root CA - R4, O = GlobalSign, CN = GlobalSign
24 Subject: OU = GlobalSign ECC Root CA - R4, O = GlobalSign, CN = GlobalSign
40 CA:TRUE
H A De-Szigno_Root_CA_2017.pem2 ## e-Szigno Root CA 2017
5 ## Authority (CA). It was automatically extracted from Mozilla's
6 ## root CA list (the file `certdata.txt' in security/nss).
20 … = Budapest, O = Microsec Ltd., organizationIdentifier = VATHU-23584497, CN = e-Szigno Root CA 2017
24 … = Budapest, O = Microsec Ltd., organizationIdentifier = VATHU-23584497, CN = e-Szigno Root CA 2017
38 CA:TRUE
H A DAmazon_Root_CA_4.pem2 ## Amazon Root CA 4
5 ## Authority (CA). It was automatically extracted from Mozilla's
6 ## root CA list (the file `certdata.txt' in security/nss).
20 Issuer: C = US, O = Amazon, CN = Amazon Root CA 4
24 Subject: C = US, O = Amazon, CN = Amazon Root CA 4
40 CA:TRUE
H A DAtos_TrustedRoot_Root_CA_ECC_TLS_2021.pem2 ## Atos TrustedRoot Root CA ECC TLS 2021
5 ## Authority (CA). It was automatically extracted from Mozilla's
6 ## root CA list (the file `certdata.txt' in security/nss).
20 Issuer: CN = Atos TrustedRoot Root CA ECC TLS 2021, O = Atos, C = DE
24 Subject: CN = Atos TrustedRoot Root CA ECC TLS 2021, O = Atos, C = DE
40 CA:TRUE
H A DCertum_EC-384_CA.pem2 ## Certum EC-384 CA
5 ## Authority (CA). It was automatically extracted from Mozilla's
6 ## root CA list (the file `certdata.txt' in security/nss).
20 …r: C = PL, O = Asseco Data Systems S.A., OU = Certum Certification Authority, CN = Certum EC-384 CA
24 …t: C = PL, O = Asseco Data Systems S.A., OU = Certum Certification Authority, CN = Certum EC-384 CA
40 CA:TRUE
/freebsd/crypto/openssl/test/smime-certs/
H A Dmksmime-certs.sh24 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
29 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
34 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
43 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
47 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
51 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
61 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
65 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
81 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
/freebsd/crypto/openssl/test/certs/
H A Dmkcert.sh156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
199 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
216 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
266 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
300 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
329 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
389 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
407 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
/freebsd/crypto/openssl/demos/certs/
H A Dca.cnf38 basicConstraints=critical, CA:FALSE
47 basicConstraints=critical, CA:FALSE
60 basicConstraints=critical, CA:FALSE
70 # Extensions for a typical CA
76 basicConstraints = critical,CA:true
79 # Minimal CA entry to allow generation of CRLs.

12345678910>>...20