/openssl/test/certs/ |
H A D | setup.sh | 81 ./mkcert.sh genca "CA" ca-key ca-cert root-key root-cert 83 ./mkcert.sh genee "CA" ca-key ca-nonca root-key root-cert 84 ./mkcert.sh gen_nonbc_ca "CA" ca-key ca-nonbc root-key root-cert 85 ./mkcert.sh genca "CA" ca-key2 ca-cert2 root-key root-cert 86 ./mkcert.sh genca "CA2" ca-key ca-name2 root-key root-cert 87 ./mkcert.sh genca "CA" ca-key ca-root2 root-key2 root-cert2 112 ./mkcert.sh genca "CA" ca-key ca-cert-md5 root-key root-cert 119 ./mkcert.sh genca "CA" ca-key-768 ca-cert-768 root-key root-cert 158 ./mkcert.sh genee server.example ee-key ee-cert ca-key ca-cert 162 ./mkcert.sh genee server.example ee-key ee-name2 ca-key ca-name2 [all …]
|
H A D | mkcert.sh | 190 local ca=$1; shift 207 local ca=$1; shift 229 local ca=$1; shift 235 geneeconfig $key $cert $cakey $ca "$conf" 258 local ca=$1; shift 269 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 291 local ca=$1; shift 303 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 324 local ca=$1; shift 380 local ca=$1; shift [all …]
|
H A D | cyrillic.utf8 | 16 ba:bc:d5:9a:d6:dc:21:66:72:30:36:ca:94:43:3c: 18 a1:ea:8c:94:63:84:ab:66:ca:e7:cf:ae:3f:f0:c0: 25 52:22:0f:a1:9b:aa:ca:0b:05:c6:ee:0c:0b:f4:58:
|
/openssl/demos/certs/ |
H A D | mkcerts.sh | 13 CN="Test Root CA" opensslcmd req -config ca.cnf -x509 -nodes \ 16 CN="Test Intermediate CA" opensslcmd req -config ca.cnf -nodes \ 23 CN="Test Server Cert" opensslcmd req -config ca.cnf -nodes \ 30 CN="Test Client Cert" opensslcmd req -config ca.cnf -nodes \ 87 -config ca.cnf -md sha1 89 -config ca.cnf -md sha1 91 -config ca.cnf -md sha1 93 opensslcmd ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \ 96 openssl ca -revoke rev.pem -crl_reason superseded \ 97 -keyfile root.pem -cert root.pem -config ca.cnf -md sha1 [all …]
|
H A D | ca.cnf | 9 default_ca = ca 35 # These extensions are added when 'ca' signs a request for an end entity 57 # These extensions are added when 'ca' signs a request for an end entity 80 [ca]
|
/openssl/test/ |
H A D | pkcs12_api_test.c | 64 static int changepass(PKCS12 *p12, EVP_PKEY *key, X509 *cert, STACK_OF(X509) *ca) in changepass() argument 109 STACK_OF(X509) *ca = NULL; in pkcs12_parse_test() 116 if (!TEST_true(PKCS12_parse(p12, in_pass, &key, &cert, &ca))) in pkcs12_parse_test() 123 if ((has_ca && !TEST_ptr(ca)) || (!has_ca && !TEST_ptr_null(ca))) in pkcs12_parse_test() 125 if (has_key && !changepass(p12, key, cert, ca)) in pkcs12_parse_test() 133 OSSL_STACK_OF_X509_free(ca); in pkcs12_parse_test() 143 static PKCS12 *pkcs12_create_ex2_setup(EVP_PKEY **key, X509 **cert, STACK_OF(X509) **ca) in pkcs12_create_ex2_setup() argument 150 if (!TEST_true(PKCS12_parse(p12, "", key, cert, ca))) in pkcs12_create_ex2_setup() 165 STACK_OF(X509) *ca = NULL; in pkcs12_create_ex2_test() 167 p12 = pkcs12_create_ex2_setup(&key, &cert, &ca); in pkcs12_create_ex2_test() [all …]
|
H A D | test.cnf | 3 [ ca ] 4 default_ca = CA_default # The default ca section
|
/openssl/demos/pkcs12/ |
H A D | pkread.c | 53 STACK_OF(X509) *ca = NULL; in main() 74 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) { in main() 95 if (ca != NULL && sk_X509_num(ca) > 0) { in main() 97 for (i = 0; i < sk_X509_num(ca); i++) in main() 98 PEM_write_X509_AUX(fp, sk_X509_value(ca, i)); in main() 108 OSSL_STACK_OF_X509_free(ca); in main()
|
/openssl/test/ocsp-tests/ |
H A D | mk-ocsp-cert-chain.sh | 23 -config ca.cnf \ 40 -config ca.cnf \ 48 -config ca.cnf \ 67 -config ca.cnf \ 76 -config ca.cnf \ 89 opensslcmd ca \ 90 -config ca.cnf \
|
H A D | ca.cnf | 2 default_ca = ca 31 [ ca ]
|
/openssl/doc/man3/ |
H A D | PKCS12_parse.pod | 12 STACK_OF(X509) **ca); 20 certificate to B<*cert> and any additional certificates to B<*ca>. 24 Each of the parameters B<pkey>, B<cert>, and B<ca> can be NULL in which case 29 If B<ca> is non-NULL and B<*ca> is NULL a new STACK will be allocated. 30 If B<ca> is non-NULL and B<*ca> is a valid STACK 31 then additional certificates are appended in the given order to B<*ca>.
|
H A D | PKCS12_create.pod | 12 X509 *cert, STACK_OF(X509) *ca, 15 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, 22 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, 32 the structure and I<cert> its corresponding certificates. I<ca>, if not B<NULL> 81 For all certificates in I<ca> then if a certificate contains an I<alias> or
|
/openssl/test/quic-openssl-docker/ |
H A D | run_endpoint.sh | 42 SSL_CERT_FILE=/certs/ca.pem curl --config $CURLRC || exit 1 57 …SSLKEYLOGFILE=/logs/keys.log SSL_CERT_FILE=/certs/ca.pem SSL_CERT_DIR=/certs quic-hq-interop $HOST… 67 …SSL_SESSION_FILE=./session.db SSLKEYLOGFILE=/logs/keys.log SSL_CERT_FILE=/certs/ca.pem SSL_CERT_DI… 79 …ESSION_FILE=./session.db SSLKEYLOGFILE=/logs/keys.log SSL_CERT_FILE=/certs/ca.pem SSL_CERT_DIR=/ce…
|
/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 36 X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, in PKCS12_create_ex2() 62 if (pkey == NULL && cert == NULL && ca == NULL) { in PKCS12_create_ex2() 97 for (i = 0; i < sk_X509_num(ca); i++) { in PKCS12_create_ex2() 98 if ((bag = PKCS12_add_cert(&bags, sk_X509_value(ca, i))) == NULL) in PKCS12_create_ex2() 175 STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, in PKCS12_create_ex() 179 return PKCS12_create_ex2(pass, name, pkey, cert, ca, nid_key, nid_cert, in PKCS12_create_ex() 185 STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, in PKCS12_create() 188 return PKCS12_create_ex(pass, name, pkey, cert, ca, nid_key, nid_cert, in PKCS12_create()
|
H A D | p12_kiss.c | 36 STACK_OF(X509) **ca) in PKCS12_parse() 79 if ((cert != NULL || ca != NULL) in PKCS12_parse() 109 if (ca != NULL) { in PKCS12_parse() 110 if (!ossl_x509_add_cert_new(ca, x, X509_ADD_FLAG_DEFAULT)) in PKCS12_parse()
|
/openssl/crypto/x509/ |
H A D | v3_bcons.c | 39 ASN1_OPT(BASIC_CONSTRAINTS, ca, ASN1_FBOOLEAN), 50 X509V3_add_value_bool("CA", bcons->ca, &extlist); 70 if (!X509V3_get_value_bool(val, &bcons->ca)) in v2i_BASIC_CONSTRAINTS()
|
/openssl/test/smime-certs/ |
H A D | ca.cnf | 12 default_ca = ca 36 # These extensions are added when 'ca' signs a request for a normal end-entity 55 # These extensions are added when 'ca' signs a request for an end-entity 63 # These extensions are added when 'ca' signs a request for a code-signing
|
H A D | mksmime-certs.sh | 13 CONF=ca.cnf 22 CN="Test S/MIME RSA Root" $OPENSSL req -config ca.cnf -x509 -noenc \ 23 -keyout smroot.pem -out smroot.pem -key ../certs/ca-key.pem -days 36524
|
/openssl/crypto/bn/ |
H A D | bn_recp.c | 58 const BIGNUM *ca; in BN_mod_mul_reciprocal() local 71 ca = a; in BN_mod_mul_reciprocal() 73 ca = x; /* Just do the mod */ in BN_mod_mul_reciprocal() 75 ret = BN_div_recp(NULL, r, ca, recp, ctx); in BN_mod_mul_reciprocal()
|
/openssl/doc/man1/ |
H A D | CA.pl.pod | 83 Creates a new CA hierarchy for use with the B<ca> program (or the B<-signcert> 88 Uses L<openssl-req(1)> and L<openssl-ca(1)>. 109 Calls the L<openssl-ca(1)> command to sign a certificate request. It expects the 119 a root CA. Extra params are passed to L<openssl-ca(1)>. 125 Extra params are passed to L<openssl-x509(1)> and L<openssl-ca(1)>. 129 Generate a CRL. Executes L<openssl-ca(1)>. 137 Leverages L<openssl-ca(1)>. 177 configuration option and value to the B<req> and B<ca> commands invoked by 185 L<openssl-ca(1)>,
|
/openssl/test/recipes/95-test_external_oqsprovider_data/ |
H A D | oqsprovider-pkcs12gen.sh | 55 sed -e 's/^oqsprovider/# oqsprovider/' $OPENSSL_CONF > tmp/openssl-ca-no-oqsprovider.cnf 58 OPENSSL_CONF=tmp/openssl-ca-no-oqsprovider.cnf $OPENSSL_APP pkcs12 -provider default -provider oqsp…
|
/openssl/test/recipes/90-test_includes_data/conf-includes/ |
H A D | includes1.cnf | 8 [ ca ] 9 default_ca = CA_default # The default ca section
|
/openssl/crypto/objects/ |
H A D | obj_dat.c | 121 static unsigned long added_obj_hash(const ADDED_OBJ *ca) in added_obj_hash() argument 128 a = ca->obj; in added_obj_hash() 129 switch (ca->type) { in added_obj_hash() 150 ret |= ((unsigned long)ca->type) << 30L; in added_obj_hash() 154 static int added_obj_cmp(const ADDED_OBJ *ca, const ADDED_OBJ *cb) in added_obj_cmp() argument 159 i = ca->type - cb->type; in added_obj_cmp() 162 a = ca->obj; in added_obj_cmp() 164 switch (ca->type) { in added_obj_cmp()
|
/openssl/demos/certs/apps/ |
H A D | apps.cnf | 36 # These extensions are added when 'ca' signs a request for an end entity 44 # These extensions are added when 'ca' signs a request for an end entity
|
/openssl/ssl/ |
H A D | ssl_rsa.c | 525 X509 *ca; in use_certificate_chain_file() local 540 ca = X509_new_ex(real_ctx->libctx, real_ctx->propq); in use_certificate_chain_file() 541 if (ca == NULL) { in use_certificate_chain_file() 545 if (PEM_read_bio_X509(in, &ca, passwd_callback, in use_certificate_chain_file() 548 r = SSL_CTX_add0_chain_cert(ctx, ca); in use_certificate_chain_file() 550 r = SSL_add0_chain_cert(ssl, ca); in use_certificate_chain_file() 557 X509_free(ca); in use_certificate_chain_file() 562 X509_free(ca); in use_certificate_chain_file()
|