Searched refs:entity (Results 1 – 25 of 29) sorted by relevance
12
/openssl/test/smime-certs/ |
H A D | ca.cnf | 36 # These extensions are added when 'ca' signs a request for a normal end-entity 55 # These extensions are added when 'ca' signs a request for an end-entity 64 # end-entity certificate compatible with RSA and ECC keys
|
/openssl/demos/certs/apps/ |
H A D | apps.cnf | 36 # These extensions are added when 'ca' signs a request for an end entity 44 # These extensions are added when 'ca' signs a request for an end entity
|
/openssl/crypto/x509/ |
H A D | t_acert.c | 137 GENERAL_NAME *entity; in X509_ACERT_print_ex() local 139 entity = sk_GENERAL_NAME_value(holderEntities, i); in X509_ACERT_print_ex() 143 if (GENERAL_NAME_print(bp, entity) <= 0) in X509_ACERT_print_ex()
|
/openssl/demos/certs/ |
H A D | ca.cnf | 35 # These extensions are added when 'ca' signs a request for an end entity 57 # These extensions are added when 'ca' signs a request for an end entity
|
/openssl/ |
H A D | LICENSE.txt | 13 "Licensor" shall mean the copyright owner or entity authorized by 16 "Legal Entity" shall mean the union of the acting entity and all 18 control with that entity. For the purposes of this definition, 20 direction or management of such entity, whether by contract or 22 outstanding shares, or (iii) beneficial ownership of such entity. 83 institute patent litigation against any entity (including a
|
/openssl/doc/man3/ |
H A D | SSL_check_chain.pod | 37 B<CERT_PKEY_EE_PARAM>: the parameters of the end entity certificate are 42 B<CERT_PKEY_EXPLICIT_SIGN>: the end entity certificate algorithm
|
H A D | X509_get0_distinguishing_id.pod | 27 an entity in the authentication process.
|
H A D | TS_VERIFY_CTX.pod | 48 time. TSP defines a Time Stamping Authority (TSA) and an entity that makes 50 requesting entity is referred to as the client.
|
H A D | SSL_CTX_add1_chain_cert.pod | 70 Each of these functions operates on the I<current> end entity 74 SSL_CTX_select_current_cert() selects B<x509> as the current end entity
|
H A D | SSL_CTX_add_extra_chain_cert.pod | 43 following the end entity certificate.
|
H A D | SSL_get_peer_cert_chain.pod | 29 of the peer including the peer's end entity certificate. It must be called
|
H A D | SSL_CTX_set_cert_cb.pod | 38 SSL_use_PrivateKey() to set the end entity certificate and private key.
|
H A D | SSL_CTX_use_serverinfo.pod | 39 end-entity certificate).
|
H A D | OSSL_PARAM.pod | 140 The key names and associated types are defined by the entity that 200 long enough duration (such as the life-time of the entity that 226 long enough duration (such as the life-time of the entity that
|
H A D | X509_ACERT_get0_holder_baseCertId.pod | 55 X509_ACERT_set0_holder_digest() sets the holder entity based on digest
|
H A D | SSL_CTX_set_verify.pod | 160 number of certificates between the end-entity and trust-anchor certificates. 162 end-entity nor the trust-anchor certificates count against B<depth>. If the 167 depth to 2 allows the levels 0, 1, 2 and 3 (0 being the end-entity and 3 the
|
H A D | PKCS7_sign_add_signer.pod | 75 I<cert>, which may be an end-entity (signer) certificate
|
H A D | X509_VERIFY_PARAM_set_flags.pod | 114 neither the end-entity certificate nor the trust-anchor count against this 116 Thus a B<depth> limit of 0 only allows the end-entity certificate to be signed 118 intermediate CA certificate between the trust anchor and the end-entity
|
H A D | SSL_extension_supported.pod | 130 entity certificate and has a B<chainidx> value of 0. The certificates are in the 160 first certificate is always the end entity certificate and has a B<chainidx>
|
H A D | X509_STORE_add_cert.pod | 70 and verification operation. That process includes providing the end-entity
|
H A D | X509_STORE_CTX_get_error.pod | 45 occurred. If it is zero it occurred in the end entity certificate, one if 46 it is the certificate which signed the end entity certificate and so on.
|
/openssl/doc/man7/ |
H A D | ossl-guide-tls-server-block.pod | 103 certificates are often also required, and both the server (end-entity or EE) 113 * not only the leaf (end-entity) server certificate, but also any 130 * key matches the just loaded end-entity certificate. It does not check
|
H A D | proxy-certificates.pod | 12 extend rights to some other entity (a computer process, typically, or 13 sometimes to the user itself). This allows the entity to perform
|
/openssl/doc/man1/ |
H A D | openssl-verification-options.pod | 67 (EKUs) that may be given in X.509 extensions of end-entity certificates. 78 A certificate, which may be CA certificate or an end-entity certificate, 338 Checks end entity certificate validity by attempting to look up a valid CRL. 474 end-entity certificate nor the trust-anchor certificate count against the 513 end-entity certificate.
|
H A D | openssl-pkcs12.pod.in | 277 If this option is present then the certificate chain of the end entity 279 The end entity certificate is the first one read from the B<-in> file
|
Completed in 42 milliseconds
12