Home
last modified time | relevance | path

Searched refs:certificates (Results 1 – 25 of 39) sorted by relevance

12

/openbsd/regress/lib/libcrypto/CA/
H A Dintermediate.cnf34 # The root CA should only sign intermediate certificates that match.
44 # Allow the intermediate CA to sign a more diverse range of certificates.
100 # Extensions for client certificates (`man x509v3.cnf`).
114 # Extensions for server certificates (`man x509v3.cnf`).
128 # Extension for OCSP signing certificates (`man ocsp`).
H A Droot.cnf34 # The root CA should only sign intermediate certificates that match.
44 # Allow the intermediate CA to sign a more diverse range of certificates.
116 # Extensions for client certificates (`man x509v3.cnf`).
126 # Extensions for server certificates (`man x509v3.cnf`).
140 # Extension for OCSP signing certificates (`man ocsp`).
/openbsd/usr.bin/ssh/
H A DPROTOCOL.certkeys9 of X.509 certificates and uses raw keys. This approach has some benefits
16 certificates used are not traditional X.509 certificates, with numerous
41 Two additional types exist for RSA certificates to force use of
71 encoding of these certificates is also used for storing them on disk.
165 provide an abbreviated way to refer to certificates from that CA.
166 If a CA does not wish to number its certificates, it must set this
179 usernames for SSH_CERT_TYPE_USER certificates. As a special case, a
199 This ensures that certificates containing unknown restrictions do not
201 enabled via extensions without breaking certificates' backwards
247 No critical options are defined for host certificates at present. The
[all …]
H A DPROTOCOL.krl44 These sections use type KRL_SECTION_CERTIFICATES to revoke certificates by
46 certificates to be revoked and a reserved field whose contents is currently
73 certificates by listing their serial numbers. The cert_section_data in this
84 a range of serial numbers of certificates:
89 All certificates in the range serial_min <= serial <= serial_max are
110 ID" strings. This may be useful in revoking all certificates
122 certificates KRL section that may be used to provide optional or critical
145 (not certificates). They are less space efficient than serial numbers,
160 certificates) by listing their hashes:
H A DPROTOCOL.agent89 The key constraint extension allows certificates to be associated
97 Where "certsblob" consists of one or more certificates encoded as public
100 string[] certificates
110 the resultant certificates to be loaded to the agent. The default
H A Dreadconf.h97 struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES]; member
H A Dssh.c2310 struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES]; in load_public_identity_files() local
2324 memset(certificates, 0, sizeof(certificates)); in load_public_identity_files()
2426 certificates[n_certs] = public; in load_public_identity_files()
2441 memcpy(options.certificates, certificates, sizeof(certificates)); in load_public_identity_files()
/openbsd/regress/lib/libssl/interop/
H A DREADME15 server certificates, missing or invalid CA or certificates, and
/openbsd/lib/libssl/test/
H A DCAtsa.cnf83 # The following key usage flags are needed for TSA server certificates.
87 # PKIX recommendations harmless if included in all certificates.
96 # The following key usage flags are needed for TSA server certificates.
101 # PKIX recommendations harmless if included in all certificates.
H A DCAss.cnf39 # several certificates with same subject.
/openbsd/usr.sbin/nsd/
H A Dnsd-control-setup.sh.in90 -d <dir> used directory to store keys and certificates (default: $DESTDIR)
92 -r recreate certificates
/openbsd/usr.sbin/unbound/smallapp/
H A Dunbound-control-setup.sh.in90 -d <dir> used directory to store keys and certificates (default: $DESTDIR)
92 -r recreate certificates
/openbsd/regress/lib/libcrypto/x509/bettertls/
H A DREADME6 The certificates are in "certificates", generated by running the
H A DMakefile22 ./verify ${.CURDIR}/certificates > test.out
/openbsd/regress/lib/libcrypto/certs/
H A DREADME2 test verification. Each subdirectory contains a set of certificates
5 intermediate certificates are contained in a bundle.pem file.
35 signed by two root certificates (should verify with two chains).
107 signed by two root certificates, with one of the cross signings
/openbsd/lib/libssl/doc/
H A Dopenssl.cnf46 # several certificates with same subject.
191 # PKIX recommendations harmless if included in all certificates.
198 # An alternative to produce certificates that aren't
212 # This is required for TSA certificates.
296 # PKIX recommendations harmless if included in all certificates.
303 # An alternative to produce certificates that aren't
/openbsd/usr.bin/file/magdir/
H A Dssl3 # Type: OpenSSL certificates/key files
/openbsd/regress/sbin/iked/live/
H A Dcrt.in4 default_bits = 2048 # default strength of client certificates
/openbsd/lib/libcrypto/cms/
H A Dcms_local.h114 STACK_OF(CMS_CertificateChoices) *certificates;
159 STACK_OF(CMS_CertificateChoices) *certificates;
H A Dcms_sd.c126 for (i = 0; i < sk_CMS_CertificateChoices_num(sd->certificates); i++) { in cms_sd_set_version()
127 cch = sk_CMS_CertificateChoices_value(sd->certificates, i); in cms_sd_set_version()
614 certs = sd->certificates; in CMS_set1_signers_certs()
H A Dcms_lib.c494 return &cms->d.signedData->certificates; in STACK_OF()
499 return &cms->d.envelopedData->originatorInfo->certificates; in STACK_OF()
/openbsd/gnu/llvm/llvm/utils/docker/nvidia-cuda/
H A DDockerfile13 apt-get install -y --no-install-recommends ca-certificates cmake python \
/openbsd/gnu/llvm/clang/utils/analyzer/
H A DDockerfile5 ca-certificates \
/openbsd/gnu/llvm/llvm/utils/docker/debian10/
H A DDockerfile17 apt-get install -y --no-install-recommends ca-certificates gnupg \
/openbsd/sbin/isakmpd/
H A DTO-DO129 * Specify extra certificates to send somehow.

12