| /src/usr.sbin/certctl/ |
| Makefile | 7 # XXX This is a hack to install certs.conf both in /etc/openssl (in the 11 etc-certs.conf base-certs.conf: certs.conf 15 CONFIGFILES+= etc-certs.conf 16 FILESBUILD_etc-certs.conf= yes 17 FILESDIR_etc-certs.conf= /etc/openssl 18 FILESNAME_etc-certs.conf= certs.conf 19 FILESMODE_etc-certs.conf= 64 [all...] |
| certs.conf | 3 # $NetBSD: certs.conf,v 1.1 2023/08/26 05:27:15 riastradh Exp $ 6 # certificates in /etc/openssl/certs. 9 path /usr/share/certs/mozilla/server 11 # For manual control over /etc/openssl/certs, e.g. if you want to
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| keyset.c | 110 * @param certs return pointer, free with hx509_certs_free(). 120 hx509_lock lock, hx509_certs *certs) 128 *certs = NULL; 169 *certs = c; 177 * @param certs a certificate store to store. 190 hx509_certs certs, 194 if (certs->ops->store == NULL) { 198 certs->ops->name); 202 return (*certs->ops->store)(context, certs, certs->ops_data, flags, lock) [all...] |
| ks_mem.c | 49 } certs; member in struct:mem_data 55 hx509_certs certs, void **data, int flags, 74 mem_free(hx509_certs certs, void *data) 79 for (i = 0; i < mem->certs.len; i++) 80 hx509_cert_free(mem->certs.val[i]); 81 free(mem->certs.val); 92 mem_add(hx509_context context, hx509_certs certs, void *data, hx509_cert c) 97 val = realloc(mem->certs.val, 98 (mem->certs.len + 1) * sizeof(mem->certs.val[0])) [all...] |
| ks_dir.c | 49 hx509_certs certs; member in struct:dircursor 59 hx509_certs certs, void **data, int flags, 92 dir_free(hx509_certs certs, void *data) 100 hx509_certs certs, void *data, void **cursor) 119 d->certs = NULL; 128 hx509_certs certs, void *data, void *iter, hx509_cert *cert) 139 if (d->certs) { 140 ret = hx509_certs_next_cert(context, d->certs, d->iter, cert); 142 hx509_certs_end_seq(context, d->certs, d->iter); 144 hx509_certs_free(&d->certs); [all...] |
| ks_null.c | 41 hx509_certs certs, void **data, int flags, 49 null_free(hx509_certs certs, void *data) 57 hx509_certs certs, void *data, void **cursor) 65 hx509_certs certs, void *data, void *iter, hx509_cert *cert) 73 hx509_certs certs,
|
| lock.c | 46 hx509_certs certs; member in struct:hx509_lock_data 80 &l->certs); 123 return lock->certs; 140 return hx509_certs_add(context, lock->certs, cert); 144 hx509_lock_add_certs(hx509_context context, hx509_lock lock, hx509_certs certs) 146 return hx509_certs_merge(context, lock->certs, certs); 152 hx509_certs certs = lock->certs; local 159 &lock->certs); [all...] |
| collector.c | 47 hx509_certs certs; member in struct:hx509_collector 79 0, NULL, &c->certs); 102 return hx509_certs_add(context, c->certs, cert); 178 hx509_certs certs) 195 ret = hx509_certs_find(context, certs, &q, &cert); 206 match_keys(hx509_context context, struct private_key *value, hx509_certs certs) 218 ret = hx509_certs_start_seq(context, certs, &cursor); 224 ret = hx509_certs_next_cert(context, certs, cursor, &c); 244 hx509_certs_end_seq(context, certs, cursor); 257 hx509_certs certs; local [all...] |
| /src/crypto/external/apache2/openssl/dist/test/quic-openssl-docker/ |
| run_endpoint.sh | 42 SSL_CERT_FILE=/certs/ca.pem curl --config $CURLRC || exit 1 57 SSLKEYLOGFILE=/logs/keys.log SSL_CERT_FILE=/certs/ca.pem SSL_CERT_DIR=/certs quic-hq-interop $HOSTNAME $HOSTPORT ./reqfile.txt || exit 1 67 SSL_SESSION_FILE=./session.db SSLKEYLOGFILE=/logs/keys.log SSL_CERT_FILE=/certs/ca.pem SSL_CERT_DIR=/certs quic-hq-interop $HOSTNAME $HOSTPORT ./reqfile.txt || exit 1 79 SSL_CIPHER_SUITES=TLS_CHACHA20_POLY1305_SHA256 SSL_SESSION_FILE=./session.db SSLKEYLOGFILE=/logs/keys.log SSL_CERT_FILE=/certs/ca.pem SSL_CERT_DIR=/certs quic-hq-interop $HOSTNAME $HOSTPORT ./reqfile.txt || exit 1 92 NO_ADDR_VALIDATE=yes SSLKEYLOGFILE=/logs/keys.log FILEPREFIX=/www quic-hq-interop-server 443 /certs/cert.pem /certs/priv.key 95 SSLKEYLOGFILE=/logs/keys.log FILEPREFIX=/www quic-hq-interop-server 443 /certs/cert.pem /certs/priv.ke [all...] |
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 06-test_algorithmid.t | 47 my @certs = sort keys %certs_info; 50 scalar @certs 53 foreach (@certs) { 55 srctop_file('test', 'certs', "$_.pem"), 56 srctop_file('test', 'certs', "$certs_info{$_}.pem")])));
|
| 25-test_x509.t | 27 my @certs = qw(test certs); 28 my $pem = srctop_file(@certs, "cyrillic.pem"); 33 my $msb = srctop_file(@certs, "cyrillic.msb"); 34 my $utf = srctop_file(@certs, "cyrillic.utf8"); 48 $pem = srctop_file(@certs, "tab-in-dn.pem"); 50 my $text = srctop_file(@certs, "tab-in-dn.text"); 82 my $pkey = srctop_file(@certs, "ca-key.pem"); # issuer private key 85 my $key = srctop_file(@certs, "serverkey.pem"); 87 my $testcert = srctop_file(@certs, "ee-cert.pem") [all...] |
| 30-test_engine.t | 18 my @path = qw(test certs);
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 06-test_algorithmid.t | 46 my @certs = sort keys %certs_info; 49 scalar @certs 52 foreach (@certs) { 54 srctop_file('test', 'certs', "$_.pem"), 55 srctop_file('test', 'certs', "$certs_info{$_}.pem")])));
|
| 30-test_engine.t | 18 my @path = qw(test certs);
|
| 25-test_x509.t | 27 my @certs = qw(test certs); 28 my $pem = srctop_file(@certs, "cyrillic.pem"); 33 my $msb = srctop_file(@certs, "cyrillic.msb"); 34 my $utf = srctop_file(@certs, "cyrillic.utf8"); 70 my $pkey = srctop_file(@certs, "ca-key.pem"); # issuer private key 73 my $signkey = srctop_file(@certs, "serverkey.pem"); 75 my $testcert = srctop_file(@certs, "ee-cert.pem"); 99 ok(run(test(["v3ext", srctop_file(@certs, "pathlen.pem")]))); 102 cert_contains(srctop_file(@certs, "fake-gp.pem") [all...] |
| /src/tests/usr.sbin/certctl/ |
| t_certctl.sh | 30 CERTCTL="certctl -C certs.conf -c certs -u untrusted" 34 # Create certs/ and set up certs.conf to search the specified 41 mkdir certs 42 cat <<EOF >certs.conf 55 cat <<EOF >>certs.conf 64 # Verify the certs directory is empty after dry runs or after 72 for x in certs/*; do 74 atf_fail "certs/ should be empty after $why [all...] |
| /src/crypto/external/apache2/openssl/dist/demos/quic/server/ |
| Makefile | 6 # ../../../test/certs/servercert.pem \ 7 # ../../../test/certs/serverkey.pem 25 ../../../test/certs/servercert.pem \ 26 ../../../test/certs/serverkey.pem
|
| /src/crypto/external/apache2/openssl/dist/include/internal/ |
| cms.h | 16 CMS_EnvelopedData *ossl_cms_sign_encrypt(BIO *data, X509 *sign_cert, STACK_OF(X509) *certs,
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| x509_load_cert_file_test.c | 22 STACK_OF(X509) *certs = NULL; 28 || !TEST_ptr(certs = X509_STORE_get1_all_certs(store)) 29 || !TEST_int_eq(sk_X509_num(certs), 4) 46 OSSL_STACK_OF_X509_free(certs);
|
| /src/external/bsd/openldap/dist/tests/data/remoteauth/ |
| remoteauth.conf | 8 tls_cert=@TESTDIR@/tls/certs/localhost.crt 10 tls_cacert=@TESTDIR@/tls/ca/certs/testsuiteCA.crt
|
| /src/external/mpl/mozilla-certdata/share/ |
| Makefile | 4 MOZCERTS= /usr/share/certs/mozilla 13 CERTS!= cd ${.CURDIR:Q} && echo certs/*.pem 14 FILES+= ${CERTS} 57 # any new files and cvs rm any deleted files under certs/, 58 # and commit certs/ and *.trust. 65 rm -f certs/*.pem 70 -v CERTDIR=certs \
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/ocsp/ |
| ocsp_vfy.c | 16 STACK_OF(X509) *certs, unsigned long flags); 17 static X509 *ocsp_find_signer_sk(STACK_OF(X509) *certs, OCSP_RESPID *id); 25 X509_NAME *nm, STACK_OF(X509) *certs, 30 int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs, 37 int i, ret = ocsp_find_signer(&signer, bs, certs, flags); 68 } else if (bs->certs && certs) { 69 untrusted = sk_X509_dup(bs->certs); 70 for (i = 0; i < sk_X509_num(certs); i++) { 71 if (!sk_X509_push(untrusted, sk_X509_value(certs, i))) [all...] |
| /src/crypto/external/apache2/openssl/dist/test/smime-certs/ |
| mksmime-certs.sh | 23 -keyout smroot.pem -out smroot.pem -key ../certs/ca-key.pem -days 36524 26 cp ../certs/ee-key.pem smrsa1.pem 28 cp ../certs/ee-key-3072.pem smrsa2.pem 30 cp ../certs/ee-key-4096.pem smrsa3.pem 38 cp ../certs/server-dsa-key.pem smdsa1.pem 40 cp ../certs/server-dsa-key.pem smdsa2.pem 42 cp ../certs/server-dsa-key.pem smdsa3.pem 47 cp ../certs/ee-ecdsa-key.pem smec1.pem 49 cp ../certs/server-ecdsa-key.pem smec2.pem 68 cp ../certs/ee-key.pem csrsa1.pe [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/ts/ |
| ts_verify_ctx.c | 81 STACK_OF(X509) *certs) 83 ctx->certs = certs; 84 return ctx->certs; 88 int TS_VERIFY_CTX_set0_certs(TS_VERIFY_CTX *ctx, STACK_OF(X509) *certs) 90 OSSL_STACK_OF_X509_free(ctx->certs); 91 ctx->certs = certs; 121 OSSL_STACK_OF_X509_free(ctx->certs);
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| nseq.c | 92 seq->certs = sk_X509_new_null(); 93 if (seq->certs == NULL) 96 if (!sk_X509_push(seq->certs, x509)) 100 if (!sk_X509_num(seq->certs)) { 101 BIO_printf(bio_err, "%s: Error reading certs file %s\n", 119 for (i = 0; i < sk_X509_num(seq->certs); i++) { 120 x509 = sk_X509_value(seq->certs, i);
|