/openbsd/regress/lib/libcrypto/CA/ |
H A D | intermediate.cnf | 34 # The root CA should only sign intermediate certificates that match. 44 # Allow the intermediate CA to sign a more diverse range of certificates. 100 # Extensions for client certificates (`man x509v3.cnf`). 114 # Extensions for server certificates (`man x509v3.cnf`). 128 # Extension for OCSP signing certificates (`man ocsp`).
|
H A D | root.cnf | 34 # The root CA should only sign intermediate certificates that match. 44 # Allow the intermediate CA to sign a more diverse range of certificates. 116 # Extensions for client certificates (`man x509v3.cnf`). 126 # Extensions for server certificates (`man x509v3.cnf`). 140 # Extension for OCSP signing certificates (`man ocsp`).
|
/openbsd/usr.bin/ssh/ |
H A D | PROTOCOL.certkeys | 9 of X.509 certificates and uses raw keys. This approach has some benefits 16 certificates used are not traditional X.509 certificates, with numerous 41 Two additional types exist for RSA certificates to force use of 71 encoding of these certificates is also used for storing them on disk. 165 provide an abbreviated way to refer to certificates from that CA. 166 If a CA does not wish to number its certificates, it must set this 179 usernames for SSH_CERT_TYPE_USER certificates. As a special case, a 199 This ensures that certificates containing unknown restrictions do not 201 enabled via extensions without breaking certificates' backwards 247 No critical options are defined for host certificates at present. The [all …]
|
H A D | PROTOCOL.krl | 44 These sections use type KRL_SECTION_CERTIFICATES to revoke certificates by 46 certificates to be revoked and a reserved field whose contents is currently 73 certificates by listing their serial numbers. The cert_section_data in this 84 a range of serial numbers of certificates: 89 All certificates in the range serial_min <= serial <= serial_max are 110 ID" strings. This may be useful in revoking all certificates 122 certificates KRL section that may be used to provide optional or critical 145 (not certificates). They are less space efficient than serial numbers, 160 certificates) by listing their hashes:
|
H A D | PROTOCOL.agent | 89 The key constraint extension allows certificates to be associated 97 Where "certsblob" consists of one or more certificates encoded as public 100 string[] certificates 110 the resultant certificates to be loaded to the agent. The default
|
H A D | readconf.h | 97 struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES]; member
|
H A D | ssh.c | 2310 struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES]; in load_public_identity_files() local 2324 memset(certificates, 0, sizeof(certificates)); in load_public_identity_files() 2426 certificates[n_certs] = public; in load_public_identity_files() 2441 memcpy(options.certificates, certificates, sizeof(certificates)); in load_public_identity_files()
|
/openbsd/regress/lib/libssl/interop/ |
H A D | README | 15 server certificates, missing or invalid CA or certificates, and
|
/openbsd/lib/libssl/test/ |
H A D | CAtsa.cnf | 83 # The following key usage flags are needed for TSA server certificates. 87 # PKIX recommendations harmless if included in all certificates. 96 # The following key usage flags are needed for TSA server certificates. 101 # PKIX recommendations harmless if included in all certificates.
|
H A D | CAss.cnf | 39 # several certificates with same subject.
|
/openbsd/usr.sbin/nsd/ |
H A D | nsd-control-setup.sh.in | 90 -d <dir> used directory to store keys and certificates (default: $DESTDIR) 92 -r recreate certificates
|
/openbsd/usr.sbin/unbound/smallapp/ |
H A D | unbound-control-setup.sh.in | 90 -d <dir> used directory to store keys and certificates (default: $DESTDIR) 92 -r recreate certificates
|
/openbsd/regress/lib/libcrypto/x509/bettertls/ |
H A D | README | 6 The certificates are in "certificates", generated by running the
|
H A D | Makefile | 22 ./verify ${.CURDIR}/certificates > test.out
|
/openbsd/regress/lib/libcrypto/certs/ |
H A D | README | 2 test verification. Each subdirectory contains a set of certificates 5 intermediate certificates are contained in a bundle.pem file. 35 signed by two root certificates (should verify with two chains). 107 signed by two root certificates, with one of the cross signings
|
/openbsd/lib/libssl/doc/ |
H A D | openssl.cnf | 46 # several certificates with same subject. 191 # PKIX recommendations harmless if included in all certificates. 198 # An alternative to produce certificates that aren't 212 # This is required for TSA certificates. 296 # PKIX recommendations harmless if included in all certificates. 303 # An alternative to produce certificates that aren't
|
/openbsd/usr.bin/file/magdir/ |
H A D | ssl | 3 # Type: OpenSSL certificates/key files
|
/openbsd/regress/sbin/iked/live/ |
H A D | crt.in | 4 default_bits = 2048 # default strength of client certificates
|
/openbsd/lib/libcrypto/cms/ |
H A D | cms_local.h | 114 STACK_OF(CMS_CertificateChoices) *certificates; 159 STACK_OF(CMS_CertificateChoices) *certificates;
|
H A D | cms_sd.c | 126 for (i = 0; i < sk_CMS_CertificateChoices_num(sd->certificates); i++) { in cms_sd_set_version() 127 cch = sk_CMS_CertificateChoices_value(sd->certificates, i); in cms_sd_set_version() 614 certs = sd->certificates; in CMS_set1_signers_certs()
|
H A D | cms_lib.c | 494 return &cms->d.signedData->certificates; in STACK_OF() 499 return &cms->d.envelopedData->originatorInfo->certificates; in STACK_OF()
|
/openbsd/gnu/llvm/llvm/utils/docker/nvidia-cuda/ |
H A D | Dockerfile | 13 apt-get install -y --no-install-recommends ca-certificates cmake python \
|
/openbsd/gnu/llvm/clang/utils/analyzer/ |
H A D | Dockerfile | 5 ca-certificates \
|
/openbsd/gnu/llvm/llvm/utils/docker/debian10/ |
H A D | Dockerfile | 17 apt-get install -y --no-install-recommends ca-certificates gnupg \
|
/openbsd/sbin/isakmpd/ |
H A D | TO-DO | 129 * Specify extra certificates to send somehow.
|