/openbsd/lib/libcrypto/x509/ |
H A D | x509_v3.c | 111 X509v3_get_ext_by_critical(const STACK_OF(X509_EXTENSION) *exts, int critical, in X509v3_get_ext_by_critical() argument 114 critical = (critical != 0); in X509v3_get_ext_by_critical() 122 if (X509_EXTENSION_get_critical(ext) == critical) in X509v3_get_ext_by_critical() 187 X509_EXTENSION_create_by_NID(X509_EXTENSION **out_ext, int nid, int critical, in X509_EXTENSION_create_by_NID() argument 197 return X509_EXTENSION_create_by_OBJ(out_ext, obj, critical, data); in X509_EXTENSION_create_by_NID() 203 int critical, ASN1_OCTET_STRING *data) in X509_EXTENSION_create_by_OBJ() argument 216 if (!X509_EXTENSION_set_critical(ext, critical)) in X509_EXTENSION_create_by_OBJ() 246 X509_EXTENSION_set_critical(X509_EXTENSION *ext, int critical) in X509_EXTENSION_set_critical() argument 251 ext->critical = critical ? 0xFF : -1; in X509_EXTENSION_set_critical() 293 return ext->critical > 0; in X509_EXTENSION_get_critical()
|
H A D | x509_policy.c | 357 int cert_has_any_policy, critical, i, previous_level_has_any_policy; in process_certificate_policies() local 360 policies = X509_get_ext_d2i(x509, NID_certificate_policies, &critical, in process_certificate_policies() 363 if (critical != -1) in process_certificate_policies() 515 int critical, i; in process_policy_mappings() local 518 mappings = X509_get_ext_d2i(cert, NID_policy_mappings, &critical, NULL); in process_policy_mappings() 519 if (mappings == NULL && critical != -1) { in process_policy_mappings() 726 int critical; in process_policy_constraints() local 729 constraints = X509_get_ext_d2i(x509, NID_policy_constraints, &critical, in process_policy_constraints() 731 if (constraints == NULL && critical != -1) in process_policy_constraints() 754 &critical, NULL); in process_policy_constraints() [all …]
|
/openbsd/regress/lib/libcrypto/CA/ |
H A D | intermediate.cnf | 89 basicConstraints = critical, CA:true 90 keyUsage = critical, digitalSignature, cRLSign, keyCertSign 96 basicConstraints = critical, CA:true, pathlen:0 97 keyUsage = critical, digitalSignature, cRLSign, keyCertSign 106 keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment 108 subjectAltName = critical, @usr_san 120 keyUsage = critical, digitalSignature, keyEncipherment 132 keyUsage = critical, digitalSignature 133 extendedKeyUsage = critical, OCSPSigning
|
H A D | root.cnf | 89 basicConstraints = critical, CA:true 90 keyUsage = critical, digitalSignature, cRLSign, keyCertSign 96 basicConstraints = critical, CA:true, pathlen:0 97 keyUsage = critical, digitalSignature, cRLSign, keyCertSign 98 nameConstraints = critical, @ca_name_constraints 122 keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment 132 keyUsage = critical, digitalSignature, keyEncipherment 144 keyUsage = critical, digitalSignature 145 extendedKeyUsage = critical, OCSPSigning
|
/openbsd/lib/libcrypto/ |
H A D | cert.pem | 25 X509v3 Key Usage: critical 100 X509v3 Key Usage: critical 169 X509v3 Key Usage: critical 230 X509v3 Key Usage: critical 285 X509v3 Key Usage: critical 324 X509v3 Key Usage: critical 363 X509v3 Key Usage: critical 413 X509v3 Key Usage: critical 452 X509v3 Key Usage: critical 506 X509v3 Key Usage: critical [all …]
|
H A D | x509v3.cnf | 14 basicConstraints=critical,CA:true,pathlen:$ENV::CERTPATHLEN
|
/openbsd/regress/lib/libssl/certs/ |
H A D | make-certs.sh | 65 basicConstraints = critical, CA:true 66 keyUsage = critical, cRLSign, keyCertSign 71 basicConstraints = critical, CA:true 72 keyUsage = critical, cRLSign, keyCertSign 77 basicConstraints = critical, CA:false 78 keyUsage = critical, digitalSignature
|
/openbsd/lib/libcrypto/ts/ |
H A D | ts_lib.c | 111 int i, critical, n; in TS_ext_print_bio() local 121 critical = X509_EXTENSION_get_critical(ex); in TS_ext_print_bio() 122 BIO_printf(bio, ": %s\n", critical ? "critical" : ""); in TS_ext_print_bio()
|
/openbsd/usr.bin/ssh/ |
H A D | PROTOCOL.certkeys | 88 string critical options 108 string critical options 128 string critical options 145 string critical options 189 critical options is a set of zero or more key options encoded as 197 Generally, critical options are used to control features that restrict 224 The critical options section of the certificate specifies zero or more 236 "critical"; if an implementation does not recognise a option, 242 No critical options are defined for host certificates at present. The 274 non-critical certificate extensions. The encoding and ordering of [all …]
|
H A D | krl.c | 827 u_char critical = 1; in cert_extension_subsection() local 832 (r = sshbuf_get_u8(subsect, &critical)) != 0 || in cert_extension_subsection() 846 name, critical, sshbuf_len(value)); in cert_extension_subsection() 848 if (critical) { in cert_extension_subsection() 1007 u_char critical = 1; in extension_section() local 1012 (r = sshbuf_get_u8(sect, &critical)) != 0 || in extension_section() 1025 name, critical, sshbuf_len(value)); in extension_section() 1027 if (critical) { in extension_section()
|
/openbsd/regress/lib/libcrypto/certs/ |
H A D | make-certs.sh | 65 basicConstraints = critical, CA:true 66 keyUsage = critical, cRLSign, keyCertSign 71 basicConstraints = critical, CA:true 72 keyUsage = critical, cRLSign, keyCertSign 77 basicConstraints = critical, CA:false 78 keyUsage = critical, digitalSignature
|
/openbsd/lib/libtls/ |
H A D | tls_verify.c | 95 int critical = 0; in tls_check_subject_altname() local 101 altname_stack = X509_get_ext_d2i(cert, NID_subject_alt_name, &critical, in tls_check_subject_altname() 104 if (critical != -1) { in tls_check_subject_altname()
|
/openbsd/gnu/llvm/lldb/scripts/ |
H A D | macos-setup-codesign.sh | 35 keyUsage = critical,digitalSignature 36 extendedKeyUsage = critical,codeSigning
|
/openbsd/usr.sbin/nsd/ |
H A D | nsd-control-setup.sh.in | 134 basicConstraints=critical,CA:TRUE,pathlen:0 170 basicConstraints=critical,CA:FALSE
|
/openbsd/usr.sbin/unbound/smallapp/ |
H A D | unbound-control-setup.sh.in | 138 basicConstraints=critical,CA:TRUE,pathlen:0 174 basicConstraints=critical,CA:FALSE
|
/openbsd/lib/libssl/test/ |
H A D | CAtsa.cnf | 85 extendedKeyUsage = critical,timeStamping 99 # extendedKeyUsage = critical,timeStamping 117 basicConstraints = critical,CA:true
|
H A D | P1ss.cnf | 37 proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:1,policy:text:AB
|
H A D | P2ss.cnf | 40 proxyCertInfo=critical,@proxy_ext
|
/openbsd/regress/usr.bin/ssh/unittests/sshkey/ |
H A D | test_sshkey.c | 401 sshbuf_free(k1->cert->critical); in sshkey_tests() 402 k1->cert->critical = sshbuf_new(); in sshkey_tests() 403 ASSERT_PTR_NE(k1->cert->critical, NULL); in sshkey_tests() 407 put_opt(k1->cert->critical, "force-command", "/usr/bin/true"); in sshkey_tests() 408 put_opt(k1->cert->critical, "source-address", "127.0.0.1"); in sshkey_tests()
|
/openbsd/gnu/gcc/libgomp/testsuite/libgomp.c/ |
H A D | critical-2.c | 25 #pragma omp critical in main()
|
H A D | omp_matvec.c | 57 #pragma omp critical in main()
|
/openbsd/regress/sbin/iked/live/ |
H A D | crt.in | 23 basicConstraints = critical, CA:true, pathlen:0
|
/openbsd/lib/libssl/doc/ |
H A D | openssl.cnf | 213 # extendedKeyUsage = critical,timeStamping 234 # This is what PKIX recommends but some broken software chokes on critical 236 #basicConstraints = critical,CA:true 257 # basicConstraints= critical, DER:30:03:01:01:FF 318 proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
/openbsd/gnu/gcc/libgomp/testsuite/libgomp.c++/ |
H A D | ctor-3.C | 56 #pragma omp critical in doit()
|
H A D | ctor-4.C | 57 #pragma omp critical in doit()
|