Home
last modified time | relevance | path

Searched refs:entity (Results 1 – 25 of 29) sorted by relevance

12

/openssl/test/smime-certs/
H A Dca.cnf36 # These extensions are added when 'ca' signs a request for a normal end-entity
55 # These extensions are added when 'ca' signs a request for an end-entity
64 # end-entity certificate compatible with RSA and ECC keys
/openssl/demos/certs/apps/
H A Dapps.cnf36 # These extensions are added when 'ca' signs a request for an end entity
44 # These extensions are added when 'ca' signs a request for an end entity
/openssl/crypto/x509/
H A Dt_acert.c137 GENERAL_NAME *entity; in X509_ACERT_print_ex() local
139 entity = sk_GENERAL_NAME_value(holderEntities, i); in X509_ACERT_print_ex()
143 if (GENERAL_NAME_print(bp, entity) <= 0) in X509_ACERT_print_ex()
/openssl/demos/certs/
H A Dca.cnf35 # These extensions are added when 'ca' signs a request for an end entity
57 # These extensions are added when 'ca' signs a request for an end entity
/openssl/
H A DLICENSE.txt13 "Licensor" shall mean the copyright owner or entity authorized by
16 "Legal Entity" shall mean the union of the acting entity and all
18 control with that entity. For the purposes of this definition,
20 direction or management of such entity, whether by contract or
22 outstanding shares, or (iii) beneficial ownership of such entity.
83 institute patent litigation against any entity (including a
/openssl/doc/man3/
H A DSSL_check_chain.pod37 B<CERT_PKEY_EE_PARAM>: the parameters of the end entity certificate are
42 B<CERT_PKEY_EXPLICIT_SIGN>: the end entity certificate algorithm
H A DX509_get0_distinguishing_id.pod27 an entity in the authentication process.
H A DTS_VERIFY_CTX.pod48 time. TSP defines a Time Stamping Authority (TSA) and an entity that makes
50 requesting entity is referred to as the client.
H A DSSL_CTX_add1_chain_cert.pod70 Each of these functions operates on the I<current> end entity
74 SSL_CTX_select_current_cert() selects B<x509> as the current end entity
H A DSSL_CTX_add_extra_chain_cert.pod43 following the end entity certificate.
H A DSSL_get_peer_cert_chain.pod29 of the peer including the peer's end entity certificate. It must be called
H A DSSL_CTX_set_cert_cb.pod38 SSL_use_PrivateKey() to set the end entity certificate and private key.
H A DSSL_CTX_use_serverinfo.pod39 end-entity certificate).
H A DOSSL_PARAM.pod140 The key names and associated types are defined by the entity that
200 long enough duration (such as the life-time of the entity that
226 long enough duration (such as the life-time of the entity that
H A DX509_ACERT_get0_holder_baseCertId.pod55 X509_ACERT_set0_holder_digest() sets the holder entity based on digest
H A DSSL_CTX_set_verify.pod160 number of certificates between the end-entity and trust-anchor certificates.
162 end-entity nor the trust-anchor certificates count against B<depth>. If the
167 depth to 2 allows the levels 0, 1, 2 and 3 (0 being the end-entity and 3 the
H A DPKCS7_sign_add_signer.pod75 I<cert>, which may be an end-entity (signer) certificate
H A DX509_VERIFY_PARAM_set_flags.pod114 neither the end-entity certificate nor the trust-anchor count against this
116 Thus a B<depth> limit of 0 only allows the end-entity certificate to be signed
118 intermediate CA certificate between the trust anchor and the end-entity
H A DSSL_extension_supported.pod130 entity certificate and has a B<chainidx> value of 0. The certificates are in the
160 first certificate is always the end entity certificate and has a B<chainidx>
H A DX509_STORE_add_cert.pod70 and verification operation. That process includes providing the end-entity
H A DX509_STORE_CTX_get_error.pod45 occurred. If it is zero it occurred in the end entity certificate, one if
46 it is the certificate which signed the end entity certificate and so on.
/openssl/doc/man7/
H A Dossl-guide-tls-server-block.pod103 certificates are often also required, and both the server (end-entity or EE)
113 * not only the leaf (end-entity) server certificate, but also any
130 * key matches the just loaded end-entity certificate. It does not check
H A Dproxy-certificates.pod12 extend rights to some other entity (a computer process, typically, or
13 sometimes to the user itself). This allows the entity to perform
/openssl/doc/man1/
H A Dopenssl-verification-options.pod67 (EKUs) that may be given in X.509 extensions of end-entity certificates.
78 A certificate, which may be CA certificate or an end-entity certificate,
338 Checks end entity certificate validity by attempting to look up a valid CRL.
474 end-entity certificate nor the trust-anchor certificate count against the
513 end-entity certificate.
H A Dopenssl-pkcs12.pod.in277 If this option is present then the certificate chain of the end entity
279 The end entity certificate is the first one read from the B<-in> file

Completed in 37 milliseconds

12