/openssl/test/certs/ |
H A D | setup.sh | 81 ./mkcert.sh genca "CA" ca-key ca-cert root-key root-cert 83 ./mkcert.sh genee "CA" ca-key ca-nonca root-key root-cert 84 ./mkcert.sh gen_nonbc_ca "CA" ca-key ca-nonbc root-key root-cert 85 ./mkcert.sh genca "CA" ca-key2 ca-cert2 root-key root-cert 86 ./mkcert.sh genca "CA2" ca-key ca-name2 root-key root-cert 87 ./mkcert.sh genca "CA" ca-key ca-root2 root-key2 root-cert2 112 ./mkcert.sh genca "CA" ca-key ca-cert-md5 root-key root-cert 119 ./mkcert.sh genca "CA" ca-key-768 ca-cert-768 root-key root-cert 158 ./mkcert.sh genee server.example ee-key ee-cert ca-key ca-cert 162 ./mkcert.sh genee server.example ee-key ee-name2 ca-key ca-name2 [all …]
|
H A D | mkcert.sh | 185 local ca=$1; shift 202 local ca=$1; shift 224 local ca=$1; shift 230 geneeconfig $key $cert $cakey $ca "$conf" 253 local ca=$1; shift 264 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 286 local ca=$1; shift 298 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 319 local ca=$1; shift 375 local ca=$1; shift [all …]
|
H A D | cyrillic.utf8 | 16 ba:bc:d5:9a:d6:dc:21:66:72:30:36:ca:94:43:3c: 18 a1:ea:8c:94:63:84:ab:66:ca:e7:cf:ae:3f:f0:c0: 25 52:22:0f:a1:9b:aa:ca:0b:05:c6:ee:0c:0b:f4:58:
|
H A D | cyrillic.msb | 16 ba:bc:d5:9a:d6:dc:21:66:72:30:36:ca:94:43:3c: 18 a1:ea:8c:94:63:84:ab:66:ca:e7:cf:ae:3f:f0:c0: 25 52:22:0f:a1:9b:aa:ca:0b:05:c6:ee:0c:0b:f4:58:
|
/openssl/demos/certs/ |
H A D | mkcerts.sh | 8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \ 11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \ 18 CN="Test Server Cert" $OPENSSL req -config ca.cnf -nodes \ 25 CN="Test Client Cert" $OPENSSL req -config ca.cnf -nodes \ 32 CN="Test Revoked Cert" $OPENSSL req -config ca.cnf -nodes \ 82 -config ca.cnf -md sha1 84 -config ca.cnf -md sha1 86 -config ca.cnf -md sha1 88 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \ 91 openssl ca -revoke rev.pem -crl_reason superseded \ [all …]
|
H A D | ca.cnf | 9 default_ca = ca 35 # These extensions are added when 'ca' signs a request for an end entity 57 # These extensions are added when 'ca' signs a request for an end entity 80 [ca]
|
/openssl/test/smime-certs/ |
H A D | mksmime-certs.sh | 13 OPENSSL_CONF=./ca.cnf 17 CN="Test S/MIME RSA Root" $OPENSSL req -config ca.cnf -x509 -noenc \ 21 CN="Test S/MIME EE RSA #1" $OPENSSL req -config ca.cnf -noenc \ 27 CN="Test S/MIME EE RSA #2" $OPENSSL req -config ca.cnf -noenc \ 32 CN="Test S/MIME EE RSA #3" $OPENSSL req -config ca.cnf -noenc \ 41 CN="Test S/MIME EE DSA #1" $OPENSSL req -config ca.cnf -noenc \ 45 CN="Test S/MIME EE DSA #2" $OPENSSL req -config ca.cnf -noenc \ 49 CN="Test S/MIME EE DSA #3" $OPENSSL req -config ca.cnf -noenc \ 59 CN="Test S/MIME EE EC #1" $OPENSSL req -config ca.cnf -noenc \ 63 CN="Test S/MIME EE EC #2" $OPENSSL req -config ca.cnf -noenc \ [all …]
|
H A D | ca.cnf | 12 default_ca = ca 35 # These extensions are added when 'ca' signs a request for an end entity 47 # These extensions are added when 'ca' signs a request for an end entity 59 # These extensions are added when 'ca' signs a request for a code-signing
|
/openssl/demos/pkcs12/ |
H A D | pkread.c | 53 STACK_OF(X509) *ca = NULL; in main() 74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { in main() 95 if (ca != NULL && sk_X509_num(ca) > 0) { in main() 97 for (i = 0; i < sk_X509_num(ca); i++) in main() 98 PEM_write_X509_AUX(fp, sk_X509_value(ca, i)); in main() 108 OSSL_STACK_OF_X509_free(ca); in main()
|
/openssl/doc/man3/ |
H A D | PKCS12_parse.pod | 12 STACK_OF(X509) **ca); 20 certificate to B<*cert> and any additional certificates to B<*ca>. 24 Each of the parameters B<pkey>, B<cert>, and B<ca> can be NULL in which case 29 If B<ca> is non-NULL and B<*ca> is NULL a new STACK will be allocated. 30 If B<ca> is non-NULL and B<*ca> is a valid STACK 31 then additional certificates are appended in the given order to B<*ca>.
|
H A D | X509_check_purpose.pod | 11 int X509_check_purpose(X509 *x, int id, int ca); 16 represented by I<id>. If I<ca> is nonzero, then certificate I<x> is
|
H A D | PKCS12_create.pod | 12 X509 *cert, STACK_OF(X509) *ca, 15 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, 25 the structure and I<cert> its corresponding certificates. I<ca>, if not B<NULL>
|
/openssl/test/ |
H A D | pkcs12_api_test.c | 70 STACK_OF(X509) *ca = NULL; in pkcs12_parse_test() 77 if (!TEST_true(PKCS12_parse(p12, in_pass, &key, &cert, &ca))) in pkcs12_parse_test() 84 if ((has_ca && !TEST_ptr(ca)) || (!has_ca && !TEST_ptr_null(ca))) in pkcs12_parse_test() 93 OSSL_STACK_OF_X509_free(ca); in pkcs12_parse_test()
|
H A D | test.cnf | 3 [ ca ] 4 default_ca = CA_default # The default ca section
|
/openssl/crypto/x509/ |
H A D | v3_bcons.c | 39 ASN1_OPT(BASIC_CONSTRAINTS, ca, ASN1_FBOOLEAN), 50 X509V3_add_value_bool("CA", bcons->ca, &extlist); 70 if (!X509V3_get_value_bool(val, &bcons->ca)) in v2i_BASIC_CONSTRAINTS()
|
/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 28 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, in PKCS12_create_ex() 50 if (pkey == NULL && cert == NULL && ca == NULL) { in PKCS12_create_ex() 71 for (i = 0; i < sk_X509_num(ca); i++) { in PKCS12_create_ex() 72 if (!PKCS12_add_cert(&bags, sk_X509_value(ca, i))) in PKCS12_create_ex() 131 STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, in PKCS12_create() 134 return PKCS12_create_ex(pass, name, pkey, cert, ca, nid_key, nid_cert, in PKCS12_create()
|
H A D | p12_kiss.c | 34 STACK_OF(X509) **ca) in PKCS12_parse() 77 if ((cert != NULL || ca != NULL) in PKCS12_parse() 107 if (ca != NULL) { in PKCS12_parse() 108 if (!ossl_x509_add_cert_new(ca, x, X509_ADD_FLAG_DEFAULT)) in PKCS12_parse()
|
/openssl/crypto/bn/ |
H A D | bn_recp.c | 60 const BIGNUM *ca; in BN_mod_mul_reciprocal() local 73 ca = a; in BN_mod_mul_reciprocal() 75 ca = x; /* Just do the mod */ in BN_mod_mul_reciprocal() 77 ret = BN_div_recp(NULL, r, ca, recp, ctx); in BN_mod_mul_reciprocal()
|
/openssl/doc/man1/ |
H A D | CA.pl.pod | 83 Creates a new CA hierarchy for use with the B<ca> program (or the B<-signcert> 88 Uses L<openssl-req(1)> and L<openssl-ca(1)>. 109 Calls the L<openssl-ca(1)> command to sign a certificate request. It expects the 119 a root CA. Extra params are passed to L<openssl-ca(1)>. 125 Extra params are passed to L<openssl-x509(1)> and L<openssl-ca(1)>. 129 Generate a CRL. Executes L<openssl-ca(1)>. 137 Leverages L<openssl-ca(1)>. 177 configuration option and value to the B<req> and B<ca> commands invoked by 185 L<openssl-ca(1)>,
|
/openssl/crypto/objects/ |
H A D | obj_dat.c | 120 static unsigned long added_obj_hash(const ADDED_OBJ *ca) in added_obj_hash() argument 127 a = ca->obj; in added_obj_hash() 128 switch (ca->type) { in added_obj_hash() 149 ret |= ((unsigned long)ca->type) << 30L; in added_obj_hash() 153 static int added_obj_cmp(const ADDED_OBJ *ca, const ADDED_OBJ *cb) in added_obj_cmp() argument 158 i = ca->type - cb->type; in added_obj_cmp() 161 a = ca->obj; in added_obj_cmp() 163 switch (ca->type) { in added_obj_cmp()
|
/openssl/test/recipes/90-test_includes_data/conf-includes/ |
H A D | includes1.cnf | 8 [ ca ] 9 default_ca = CA_default # The default ca section
|
/openssl/demos/certs/apps/ |
H A D | apps.cnf | 36 # These extensions are added when 'ca' signs a request for an end entity 44 # These extensions are added when 'ca' signs a request for an end entity
|
/openssl/ssl/ |
H A D | ssl_rsa.c | 504 X509 *ca; in use_certificate_chain_file() local 519 ca = X509_new_ex(real_ctx->libctx, real_ctx->propq); in use_certificate_chain_file() 520 if (ca == NULL) { in use_certificate_chain_file() 524 if (PEM_read_bio_X509(in, &ca, passwd_callback, in use_certificate_chain_file() 527 r = SSL_CTX_add0_chain_cert(ctx, ca); in use_certificate_chain_file() 529 r = SSL_add0_chain_cert(ssl, ca); in use_certificate_chain_file() 536 X509_free(ca); in use_certificate_chain_file() 541 X509_free(ca); in use_certificate_chain_file()
|
/openssl/apps/ |
H A D | openssl.cnf | 34 # We can add new OIDs in here for use by 'ca', 'req' and 'ts'. 76 [ ca ] 77 default_ca = CA_default # The default ca section 204 # These extensions are added when 'ca' signs a request. 359 out_trusted = insta.ca.crt 369 trusted = insta.ca.crt # does not include keyUsage digitalSignature
|
H A D | openssl-vms.cnf | 34 # We can add new OIDs in here for use by 'ca', 'req' and 'ts'. 76 [ ca ] 77 default_ca = CA_default # The default ca section 204 # These extensions are added when 'ca' signs a request. 359 out_trusted = insta.ca.crt 369 trusted = insta.ca.crt # does not include keyUsage digitalSignature
|