Home
last modified time | relevance | path

Searched refs:ca (Results 1 – 25 of 62) sorted by relevance

123

/openssl/test/certs/
H A Dsetup.sh81 ./mkcert.sh genca "CA" ca-key ca-cert root-key root-cert
83 ./mkcert.sh genee "CA" ca-key ca-nonca root-key root-cert
84 ./mkcert.sh gen_nonbc_ca "CA" ca-key ca-nonbc root-key root-cert
85 ./mkcert.sh genca "CA" ca-key2 ca-cert2 root-key root-cert
86 ./mkcert.sh genca "CA2" ca-key ca-name2 root-key root-cert
87 ./mkcert.sh genca "CA" ca-key ca-root2 root-key2 root-cert2
112 ./mkcert.sh genca "CA" ca-key ca-cert-md5 root-key root-cert
119 ./mkcert.sh genca "CA" ca-key-768 ca-cert-768 root-key root-cert
158 ./mkcert.sh genee server.example ee-key ee-cert ca-key ca-cert
162 ./mkcert.sh genee server.example ee-key ee-name2 ca-key ca-name2
[all …]
H A Dmkcert.sh185 local ca=$1; shift
202 local ca=$1; shift
224 local ca=$1; shift
230 geneeconfig $key $cert $cakey $ca "$conf"
253 local ca=$1; shift
264 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
286 local ca=$1; shift
298 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
319 local ca=$1; shift
375 local ca=$1; shift
[all …]
H A Dcyrillic.utf816 ba:bc:d5:9a:d6:dc:21:66:72:30:36:ca:94:43:3c:
18 a1:ea:8c:94:63:84:ab:66:ca:e7:cf:ae:3f:f0:c0:
25 52:22:0f:a1:9b:aa:ca:0b:05:c6:ee:0c:0b:f4:58:
H A Dcyrillic.msb16 ba:bc:d5:9a:d6:dc:21:66:72:30:36:ca:94:43:3c:
18 a1:ea:8c:94:63:84:ab:66:ca:e7:cf:ae:3f:f0:c0:
25 52:22:0f:a1:9b:aa:ca:0b:05:c6:ee:0c:0b:f4:58:
/openssl/demos/certs/
H A Dmkcerts.sh8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \
11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \
18 CN="Test Server Cert" $OPENSSL req -config ca.cnf -nodes \
25 CN="Test Client Cert" $OPENSSL req -config ca.cnf -nodes \
32 CN="Test Revoked Cert" $OPENSSL req -config ca.cnf -nodes \
82 -config ca.cnf -md sha1
84 -config ca.cnf -md sha1
86 -config ca.cnf -md sha1
88 $OPENSSL ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
91 openssl ca -revoke rev.pem -crl_reason superseded \
[all …]
H A Dca.cnf9 default_ca = ca
35 # These extensions are added when 'ca' signs a request for an end entity
57 # These extensions are added when 'ca' signs a request for an end entity
80 [ca]
/openssl/test/smime-certs/
H A Dmksmime-certs.sh13 OPENSSL_CONF=./ca.cnf
17 CN="Test S/MIME RSA Root" $OPENSSL req -config ca.cnf -x509 -noenc \
21 CN="Test S/MIME EE RSA #1" $OPENSSL req -config ca.cnf -noenc \
27 CN="Test S/MIME EE RSA #2" $OPENSSL req -config ca.cnf -noenc \
32 CN="Test S/MIME EE RSA #3" $OPENSSL req -config ca.cnf -noenc \
41 CN="Test S/MIME EE DSA #1" $OPENSSL req -config ca.cnf -noenc \
45 CN="Test S/MIME EE DSA #2" $OPENSSL req -config ca.cnf -noenc \
49 CN="Test S/MIME EE DSA #3" $OPENSSL req -config ca.cnf -noenc \
59 CN="Test S/MIME EE EC #1" $OPENSSL req -config ca.cnf -noenc \
63 CN="Test S/MIME EE EC #2" $OPENSSL req -config ca.cnf -noenc \
[all …]
H A Dca.cnf12 default_ca = ca
35 # These extensions are added when 'ca' signs a request for an end entity
47 # These extensions are added when 'ca' signs a request for an end entity
59 # These extensions are added when 'ca' signs a request for a code-signing
/openssl/demos/pkcs12/
H A Dpkread.c53 STACK_OF(X509) *ca = NULL; in main()
74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { in main()
95 if (ca != NULL && sk_X509_num(ca) > 0) { in main()
97 for (i = 0; i < sk_X509_num(ca); i++) in main()
98 PEM_write_X509_AUX(fp, sk_X509_value(ca, i)); in main()
108 OSSL_STACK_OF_X509_free(ca); in main()
/openssl/doc/man3/
H A DPKCS12_parse.pod12 STACK_OF(X509) **ca);
20 certificate to B<*cert> and any additional certificates to B<*ca>.
24 Each of the parameters B<pkey>, B<cert>, and B<ca> can be NULL in which case
29 If B<ca> is non-NULL and B<*ca> is NULL a new STACK will be allocated.
30 If B<ca> is non-NULL and B<*ca> is a valid STACK
31 then additional certificates are appended in the given order to B<*ca>.
H A DX509_check_purpose.pod11 int X509_check_purpose(X509 *x, int id, int ca);
16 represented by I<id>. If I<ca> is nonzero, then certificate I<x> is
H A DPKCS12_create.pod12 X509 *cert, STACK_OF(X509) *ca,
15 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert,
25 the structure and I<cert> its corresponding certificates. I<ca>, if not B<NULL>
/openssl/test/
H A Dpkcs12_api_test.c70 STACK_OF(X509) *ca = NULL; in pkcs12_parse_test()
77 if (!TEST_true(PKCS12_parse(p12, in_pass, &key, &cert, &ca))) in pkcs12_parse_test()
84 if ((has_ca && !TEST_ptr(ca)) || (!has_ca && !TEST_ptr_null(ca))) in pkcs12_parse_test()
93 OSSL_STACK_OF_X509_free(ca); in pkcs12_parse_test()
H A Dtest.cnf3 [ ca ]
4 default_ca = CA_default # The default ca section
/openssl/crypto/x509/
H A Dv3_bcons.c39 ASN1_OPT(BASIC_CONSTRAINTS, ca, ASN1_FBOOLEAN),
50 X509V3_add_value_bool("CA", bcons->ca, &extlist);
70 if (!X509V3_get_value_bool(val, &bcons->ca)) in v2i_BASIC_CONSTRAINTS()
/openssl/crypto/pkcs12/
H A Dp12_crt.c28 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, in PKCS12_create_ex()
50 if (pkey == NULL && cert == NULL && ca == NULL) { in PKCS12_create_ex()
71 for (i = 0; i < sk_X509_num(ca); i++) { in PKCS12_create_ex()
72 if (!PKCS12_add_cert(&bags, sk_X509_value(ca, i))) in PKCS12_create_ex()
131 STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, in PKCS12_create()
134 return PKCS12_create_ex(pass, name, pkey, cert, ca, nid_key, nid_cert, in PKCS12_create()
H A Dp12_kiss.c34 STACK_OF(X509) **ca) in PKCS12_parse()
77 if ((cert != NULL || ca != NULL) in PKCS12_parse()
107 if (ca != NULL) { in PKCS12_parse()
108 if (!ossl_x509_add_cert_new(ca, x, X509_ADD_FLAG_DEFAULT)) in PKCS12_parse()
/openssl/crypto/bn/
H A Dbn_recp.c60 const BIGNUM *ca; in BN_mod_mul_reciprocal() local
73 ca = a; in BN_mod_mul_reciprocal()
75 ca = x; /* Just do the mod */ in BN_mod_mul_reciprocal()
77 ret = BN_div_recp(NULL, r, ca, recp, ctx); in BN_mod_mul_reciprocal()
/openssl/doc/man1/
H A DCA.pl.pod83 Creates a new CA hierarchy for use with the B<ca> program (or the B<-signcert>
88 Uses L<openssl-req(1)> and L<openssl-ca(1)>.
109 Calls the L<openssl-ca(1)> command to sign a certificate request. It expects the
119 a root CA. Extra params are passed to L<openssl-ca(1)>.
125 Extra params are passed to L<openssl-x509(1)> and L<openssl-ca(1)>.
129 Generate a CRL. Executes L<openssl-ca(1)>.
137 Leverages L<openssl-ca(1)>.
177 configuration option and value to the B<req> and B<ca> commands invoked by
185 L<openssl-ca(1)>,
/openssl/crypto/objects/
H A Dobj_dat.c120 static unsigned long added_obj_hash(const ADDED_OBJ *ca) in added_obj_hash() argument
127 a = ca->obj; in added_obj_hash()
128 switch (ca->type) { in added_obj_hash()
149 ret |= ((unsigned long)ca->type) << 30L; in added_obj_hash()
153 static int added_obj_cmp(const ADDED_OBJ *ca, const ADDED_OBJ *cb) in added_obj_cmp() argument
158 i = ca->type - cb->type; in added_obj_cmp()
161 a = ca->obj; in added_obj_cmp()
163 switch (ca->type) { in added_obj_cmp()
/openssl/test/recipes/90-test_includes_data/conf-includes/
H A Dincludes1.cnf8 [ ca ]
9 default_ca = CA_default # The default ca section
/openssl/demos/certs/apps/
H A Dapps.cnf36 # These extensions are added when 'ca' signs a request for an end entity
44 # These extensions are added when 'ca' signs a request for an end entity
/openssl/ssl/
H A Dssl_rsa.c504 X509 *ca; in use_certificate_chain_file() local
519 ca = X509_new_ex(real_ctx->libctx, real_ctx->propq); in use_certificate_chain_file()
520 if (ca == NULL) { in use_certificate_chain_file()
524 if (PEM_read_bio_X509(in, &ca, passwd_callback, in use_certificate_chain_file()
527 r = SSL_CTX_add0_chain_cert(ctx, ca); in use_certificate_chain_file()
529 r = SSL_add0_chain_cert(ssl, ca); in use_certificate_chain_file()
536 X509_free(ca); in use_certificate_chain_file()
541 X509_free(ca); in use_certificate_chain_file()
/openssl/apps/
H A Dopenssl.cnf34 # We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
76 [ ca ]
77 default_ca = CA_default # The default ca section
204 # These extensions are added when 'ca' signs a request.
359 out_trusted = insta.ca.crt
369 trusted = insta.ca.crt # does not include keyUsage digitalSignature
H A Dopenssl-vms.cnf34 # We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
76 [ ca ]
77 default_ca = CA_default # The default ca section
204 # These extensions are added when 'ca' signs a request.
359 out_trusted = insta.ca.crt
369 trusted = insta.ca.crt # does not include keyUsage digitalSignature

Completed in 39 milliseconds

123