Home
last modified time | relevance | path

Searched refs:certificates (Results 1 – 18 of 18) sorted by relevance

/dragonfly/crypto/openssh/
H A DPROTOCOL.krl43 These sections use type KRL_SECTION_CERTIFICATES to revoke certificates by
45 certificates to be revoked and a reserved field whose contents is currently
71 certificates by listing their serial numbers. The cert_section_data in this
82 a range of serial numbers of certificates:
87 All certificates in the range serial_min <= serial <= serial_max are
108 ID" strings. This may be useful in revoking all certificates
120 (not certificates). They are less space efficient than serial numbers,
135 certificates) by listing their hashes:
H A DPROTOCOL.certkeys9 of X.509 certificates and uses raw keys. This approach has some benefits
16 certificates used are not traditional X.509 certificates, with numerous
41 Two additional types exist for RSA certificates to force use of
71 encoding of these certificates is also used for storing them on disk.
165 provide an abbreviated way to refer to certificates from that CA.
166 If a CA does not wish to number its certificates, it must set this
179 usernames for SSH_CERT_TYPE_USER certificates. As a special case, a
199 This ensures that certificates containing unknown restrictions do not
201 enabled via extensions without breaking certificates' backwards
242 No critical options are defined for host certificates at present. The
[all …]
H A Dreadconf.h96 struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES]; member
H A Dssh.c2228 struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES]; in load_public_identity_files() local
2242 memset(certificates, 0, sizeof(certificates)); in load_public_identity_files()
2344 certificates[n_certs] = public; in load_public_identity_files()
2359 memcpy(options.certificates, certificates, sizeof(certificates)); in load_public_identity_files()
H A Dreadconf.c2358 memset(options->certificates, 0, sizeof(options->certificates)); in initialize_options()
2752 sshkey_free(o->certificates[i]); in free_options()
H A Dsshconnect2.c1743 key = options.certificates[i]; in pubkey_prepare()
/dragonfly/contrib/file/magic/Magdir/
H A Dssl6 # Type: OpenSSL certificates/key files
H A Dpgp-binary-keys146 # certificates (GnuPG removed the code to support them in November
/dragonfly/crypto/libressl/crypto/cms/
H A Dcms_lcl.h114 STACK_OF(CMS_CertificateChoices) *certificates;
159 STACK_OF(CMS_CertificateChoices) *certificates;
H A Dcms_sd.c121 for (i = 0; i < sk_CMS_CertificateChoices_num(sd->certificates); i++) { in cms_sd_set_version()
122 cch = sk_CMS_CertificateChoices_value(sd->certificates, i); in cms_sd_set_version()
548 certs = sd->certificates; in CMS_set1_signers_certs()
H A Dcms_lib.c443 return &cms->d.signedData->certificates; in STACK_OF()
448 return &cms->d.envelopedData->originatorInfo->certificates; in STACK_OF()
H A Dcms_env.c861 for (i = 0; i < sk_CMS_CertificateChoices_num(org->certificates); i++) { in cms_env_set_originfo_version()
864 cch = sk_CMS_CertificateChoices_value(org->certificates, i); in cms_env_set_originfo_version()
H A Dcms_asn1.c380 .offset = offsetof(CMS_SignedData, certificates),
414 .offset = offsetof(CMS_OriginatorInfo, certificates),
/dragonfly/crypto/libressl/
H A DChangeLog590 * Gracefully handle root certificates being both trusted and
1080 instead of only RSA certificates.
1198 client to request OCSP staples for leaf certificates.
1201 in order to send OCSP staples for leaf certificates.
1241 instead of only RSA certificates.
1266 expired untrusted issuer certificates.
1786 * Added definitions for three OIDs used in EV certificates.
1836 certificates (which it seems are common place with
1990 * Add support for OCSP intermediate certificates.
2040 certificates provided in responses.
[all …]
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/
H A DREADME657 Some EAP authentication methods require use of certificates. EAP-TLS
658 uses both server side and client certificates whereas EAP-PEAP and
664 wpa_supplicant supports X.509 certificates in PEM and DER
H A Deap_testing.txt24 certificates, and private keys for testing use. Other alternative
H A DChangeLog84 encoded certificates
257 - do not verify CA certificates when ca_cert is not specified
1781 * added support for loading trusted CA certificates from Windows
1783 likely CA (Intermediate CA certificates) or ROOT (root certificates)
1827 to use file system for external files (e.g., certificates);
1991 * added support for reading additional certificates from PKCS#12 files
2125 certificates. Proof of concept type of experimental patch is
/dragonfly/games/fortune/datfiles/
H A Dfortunes57574 marriage certificates, and defy you.