Home
last modified time | relevance | path

Searched refs:ca (Results 1 – 25 of 73) sorted by relevance

123

/openssl/test/certs/
H A Dsetup.sh81 ./mkcert.sh genca "CA" ca-key ca-cert root-key root-cert
83 ./mkcert.sh genee "CA" ca-key ca-nonca root-key root-cert
84 ./mkcert.sh gen_nonbc_ca "CA" ca-key ca-nonbc root-key root-cert
85 ./mkcert.sh genca "CA" ca-key2 ca-cert2 root-key root-cert
86 ./mkcert.sh genca "CA2" ca-key ca-name2 root-key root-cert
87 ./mkcert.sh genca "CA" ca-key ca-root2 root-key2 root-cert2
112 ./mkcert.sh genca "CA" ca-key ca-cert-md5 root-key root-cert
119 ./mkcert.sh genca "CA" ca-key-768 ca-cert-768 root-key root-cert
158 ./mkcert.sh genee server.example ee-key ee-cert ca-key ca-cert
162 ./mkcert.sh genee server.example ee-key ee-name2 ca-key ca-name2
[all …]
H A Dmkcert.sh190 local ca=$1; shift
207 local ca=$1; shift
229 local ca=$1; shift
235 geneeconfig $key $cert $cakey $ca "$conf"
258 local ca=$1; shift
269 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
291 local ca=$1; shift
303 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
324 local ca=$1; shift
380 local ca=$1; shift
[all …]
H A Dcyrillic.utf816 ba:bc:d5:9a:d6:dc:21:66:72:30:36:ca:94:43:3c:
18 a1:ea:8c:94:63:84:ab:66:ca:e7:cf:ae:3f:f0:c0:
25 52:22:0f:a1:9b:aa:ca:0b:05:c6:ee:0c:0b:f4:58:
H A Dcyrillic.msb16 ba:bc:d5:9a:d6:dc:21:66:72:30:36:ca:94:43:3c:
18 a1:ea:8c:94:63:84:ab:66:ca:e7:cf:ae:3f:f0:c0:
25 52:22:0f:a1:9b:aa:ca:0b:05:c6:ee:0c:0b:f4:58:
/openssl/demos/certs/
H A Dmkcerts.sh13 CN="Test Root CA" opensslcmd req -config ca.cnf -x509 -nodes \
16 CN="Test Intermediate CA" opensslcmd req -config ca.cnf -nodes \
23 CN="Test Server Cert" opensslcmd req -config ca.cnf -nodes \
30 CN="Test Client Cert" opensslcmd req -config ca.cnf -nodes \
87 -config ca.cnf -md sha1
89 -config ca.cnf -md sha1
91 -config ca.cnf -md sha1
93 opensslcmd ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
96 openssl ca -revoke rev.pem -crl_reason superseded \
97 -keyfile root.pem -cert root.pem -config ca.cnf -md sha1
[all …]
H A Dca.cnf9 default_ca = ca
35 # These extensions are added when 'ca' signs a request for an end entity
57 # These extensions are added when 'ca' signs a request for an end entity
80 [ca]
/openssl/test/
H A Dpkcs12_api_test.c64 static int changepass(PKCS12 *p12, EVP_PKEY *key, X509 *cert, STACK_OF(X509) *ca) in changepass() argument
109 STACK_OF(X509) *ca = NULL; in pkcs12_parse_test()
116 if (!TEST_true(PKCS12_parse(p12, in_pass, &key, &cert, &ca))) in pkcs12_parse_test()
123 if ((has_ca && !TEST_ptr(ca)) || (!has_ca && !TEST_ptr_null(ca))) in pkcs12_parse_test()
125 if (has_key && !changepass(p12, key, cert, ca)) in pkcs12_parse_test()
133 OSSL_STACK_OF_X509_free(ca); in pkcs12_parse_test()
143 static PKCS12 *pkcs12_create_ex2_setup(EVP_PKEY **key, X509 **cert, STACK_OF(X509) **ca) in pkcs12_create_ex2_setup() argument
150 if (!TEST_true(PKCS12_parse(p12, "", key, cert, ca))) in pkcs12_create_ex2_setup()
165 STACK_OF(X509) *ca = NULL; in pkcs12_create_ex2_test()
167 p12 = pkcs12_create_ex2_setup(&key, &cert, &ca); in pkcs12_create_ex2_test()
[all …]
H A Dtest.cnf3 [ ca ]
4 default_ca = CA_default # The default ca section
/openssl/demos/pkcs12/
H A Dpkread.c53 STACK_OF(X509) *ca = NULL; in main()
74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { in main()
95 if (ca != NULL && sk_X509_num(ca) > 0) { in main()
97 for (i = 0; i < sk_X509_num(ca); i++) in main()
98 PEM_write_X509_AUX(fp, sk_X509_value(ca, i)); in main()
108 OSSL_STACK_OF_X509_free(ca); in main()
/openssl/test/ocsp-tests/
H A Dmk-ocsp-cert-chain.sh23 -config ca.cnf \
40 -config ca.cnf \
48 -config ca.cnf \
67 -config ca.cnf \
76 -config ca.cnf \
89 opensslcmd ca \
90 -config ca.cnf \
H A Dca.cnf2 default_ca = ca
31 [ ca ]
/openssl/doc/man3/
H A DPKCS12_parse.pod12 STACK_OF(X509) **ca);
20 certificate to B<*cert> and any additional certificates to B<*ca>.
24 Each of the parameters B<pkey>, B<cert>, and B<ca> can be NULL in which case
29 If B<ca> is non-NULL and B<*ca> is NULL a new STACK will be allocated.
30 If B<ca> is non-NULL and B<*ca> is a valid STACK
31 then additional certificates are appended in the given order to B<*ca>.
H A DPKCS12_create.pod12 X509 *cert, STACK_OF(X509) *ca,
15 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert,
22 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert,
32 the structure and I<cert> its corresponding certificates. I<ca>, if not B<NULL>
81 For all certificates in I<ca> then if a certificate contains an I<alias> or
/openssl/test/quic-openssl-docker/
H A Drun_endpoint.sh42 SSL_CERT_FILE=/certs/ca.pem curl --config $CURLRC || exit 1
57 …SSLKEYLOGFILE=/logs/keys.log SSL_CERT_FILE=/certs/ca.pem SSL_CERT_DIR=/certs quic-hq-interop $HOST…
67 …SSL_SESSION_FILE=./session.db SSLKEYLOGFILE=/logs/keys.log SSL_CERT_FILE=/certs/ca.pem SSL_CERT_DI…
73 …SSL_CERT_FILE=/certs/ca.pem curl --verbose --tlsv1.3 --tls13-ciphers TLS_CHACHA20_POLY1305_SHA256 …
/openssl/crypto/pkcs12/
H A Dp12_crt.c36 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, in PKCS12_create_ex2()
62 if (pkey == NULL && cert == NULL && ca == NULL) { in PKCS12_create_ex2()
97 for (i = 0; i < sk_X509_num(ca); i++) { in PKCS12_create_ex2()
98 if ((bag = PKCS12_add_cert(&bags, sk_X509_value(ca, i))) == NULL) in PKCS12_create_ex2()
175 STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, in PKCS12_create_ex()
179 return PKCS12_create_ex2(pass, name, pkey, cert, ca, nid_key, nid_cert, in PKCS12_create_ex()
185 STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, in PKCS12_create()
188 return PKCS12_create_ex(pass, name, pkey, cert, ca, nid_key, nid_cert, in PKCS12_create()
H A Dp12_kiss.c36 STACK_OF(X509) **ca) in PKCS12_parse()
79 if ((cert != NULL || ca != NULL) in PKCS12_parse()
109 if (ca != NULL) { in PKCS12_parse()
110 if (!ossl_x509_add_cert_new(ca, x, X509_ADD_FLAG_DEFAULT)) in PKCS12_parse()
/openssl/crypto/x509/
H A Dv3_bcons.c39 ASN1_OPT(BASIC_CONSTRAINTS, ca, ASN1_FBOOLEAN),
50 X509V3_add_value_bool("CA", bcons->ca, &extlist);
70 if (!X509V3_get_value_bool(val, &bcons->ca)) in v2i_BASIC_CONSTRAINTS()
/openssl/test/smime-certs/
H A Dca.cnf12 default_ca = ca
36 # These extensions are added when 'ca' signs a request for a normal end-entity
55 # These extensions are added when 'ca' signs a request for an end-entity
63 # These extensions are added when 'ca' signs a request for a code-signing
H A Dmksmime-certs.sh13 CONF=ca.cnf
22 CN="Test S/MIME RSA Root" $OPENSSL req -config ca.cnf -x509 -noenc \
23 -keyout smroot.pem -out smroot.pem -key ../certs/ca-key.pem -days 36524
/openssl/crypto/bn/
H A Dbn_recp.c58 const BIGNUM *ca; in BN_mod_mul_reciprocal() local
71 ca = a; in BN_mod_mul_reciprocal()
73 ca = x; /* Just do the mod */ in BN_mod_mul_reciprocal()
75 ret = BN_div_recp(NULL, r, ca, recp, ctx); in BN_mod_mul_reciprocal()
/openssl/doc/man1/
H A DCA.pl.pod83 Creates a new CA hierarchy for use with the B<ca> program (or the B<-signcert>
88 Uses L<openssl-req(1)> and L<openssl-ca(1)>.
109 Calls the L<openssl-ca(1)> command to sign a certificate request. It expects the
119 a root CA. Extra params are passed to L<openssl-ca(1)>.
125 Extra params are passed to L<openssl-x509(1)> and L<openssl-ca(1)>.
129 Generate a CRL. Executes L<openssl-ca(1)>.
137 Leverages L<openssl-ca(1)>.
177 configuration option and value to the B<req> and B<ca> commands invoked by
185 L<openssl-ca(1)>,
/openssl/test/recipes/90-test_includes_data/conf-includes/
H A Dincludes1.cnf8 [ ca ]
9 default_ca = CA_default # The default ca section
/openssl/crypto/objects/
H A Dobj_dat.c121 static unsigned long added_obj_hash(const ADDED_OBJ *ca) in added_obj_hash() argument
128 a = ca->obj; in added_obj_hash()
129 switch (ca->type) { in added_obj_hash()
150 ret |= ((unsigned long)ca->type) << 30L; in added_obj_hash()
154 static int added_obj_cmp(const ADDED_OBJ *ca, const ADDED_OBJ *cb) in added_obj_cmp() argument
159 i = ca->type - cb->type; in added_obj_cmp()
162 a = ca->obj; in added_obj_cmp()
164 switch (ca->type) { in added_obj_cmp()
/openssl/demos/certs/apps/
H A Dapps.cnf36 # These extensions are added when 'ca' signs a request for an end entity
44 # These extensions are added when 'ca' signs a request for an end entity
/openssl/ssl/
H A Dssl_rsa.c525 X509 *ca; in use_certificate_chain_file() local
540 ca = X509_new_ex(real_ctx->libctx, real_ctx->propq); in use_certificate_chain_file()
541 if (ca == NULL) { in use_certificate_chain_file()
545 if (PEM_read_bio_X509(in, &ca, passwd_callback, in use_certificate_chain_file()
548 r = SSL_CTX_add0_chain_cert(ctx, ca); in use_certificate_chain_file()
550 r = SSL_add0_chain_cert(ssl, ca); in use_certificate_chain_file()
557 X509_free(ca); in use_certificate_chain_file()
562 X509_free(ca); in use_certificate_chain_file()

Completed in 43 milliseconds

123