Searched refs:ca (Results 1 - 25 of 420) sorted by relevance

1234567891011>>

/macosx-10.10/Heimdal-398.1.2/lib/hx509/
H A Dtest_ca.in59 --ca-certificate=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key \
67 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1
72 --signer=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key || exit 1
78 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1
83 --signer=FILE:$srcdir/data/ca.crt,$srcdir/data/ca.key \
90 anchor:FILE:$srcdir/data/ca
[all...]
H A Dtest_chain.in54 chain:FILE:$srcdir/data/ca.crt \
55 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1
60 chain:FILE:$srcdir/data/ca.crt \
61 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1
66 anchor:FILE:$srcdir/data/ca.crt > /dev/null || exit 1
71 chain:FILE:$srcdir/data/ca.crt \
72 anchor:FILE:$srcdir/data/ca.crt > /dev/null && exit 1
74 echo "sub-cert -> sub-ca -> root"
77 chain:FILE:$srcdir/data/sub-ca.crt \
78 chain:FILE:$srcdir/data/ca
[all...]
H A Dtest_windows.in54 --issue-ca \
70 --ca-certificate=FILE:wca.pem || exit 1
82 --ca-certificate=FILE:wca.pem || exit 1
/macosx-10.10/curl-83.1.2/curl/tests/certs/scripts/
H A Dgenroot.sh26 if [ ! -f $PREFIX-ca.prm ] ; then
27 echo No configuration file $PREFIX-ca.prm
43 echo "openssl genrsa -out $PREFIX-ca.key $KEYSIZE -passout XXX"
44 openssl genrsa -out $PREFIX-ca.key $KEYSIZE -passout pass:secret
46 echo "openssl req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca.csr"
47 $OPENSSL req -config $PREFIX-ca.prm -new -key $PREFIX-ca.key -out $PREFIX-ca
[all...]
H A Dgenserv.sh41 if [ ! -f $CAPREFIX-ca.cacert ] ; then
42 echo No CA certficate file $CAPREFIX-ca.caert
45 if [ ! -f $CAPREFIX-ca.key ] ; then
78 echo "openssl x509 -set_serial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.key -in $PREFIX-sv.csr -req -out $PREFIX-sv.crt -text -nameopt multiline -sha1"
80 $OPENSSL x509 -set_serial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.key -in $PREFIX-sv.csr -req -out $PREFIX-sv.crt -text -nameopt multiline -sha1
84 echo "$OPENSSL pkcs12 -export -des3 -out $PREFIX-sv.p12 -caname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt "
86 $OPENSSL pkcs12 -export -des3 -out $PREFIX-sv.p12 -caname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt
93 touch $CAPREFIX-ca
[all...]
/macosx-10.10/apr-32/apr/apr/strings/
H A Dapr_strnatcmp.c91 char ca, cb; local
95 ca = a[ai]; cb = b[bi];
98 while (apr_isspace(ca))
99 ca = a[++ai];
105 if (apr_isdigit(ca) && apr_isdigit(cb)) {
106 fractional = (ca == '0' || cb == '0');
117 if (!ca && !cb) {
124 ca = apr_toupper(ca);
128 if (ca < c
[all...]
/macosx-10.10/ksh-23/ksh/src/lib/libast/string/
H A Dccnative.c45 register unsigned char* ca = (unsigned char*)a;
50 cb[c] = ca[m[c]];
53 memcpy(cb + n * c, ca + n * m[c], n);
/macosx-10.10/ruby-106/ruby/sample/openssl/
H A Dcrlstore.rb22 unless ca = find_ca(cert)
25 unless crlfiles = @c_store.get_crls(ca.subject)
26 if crl = renew_crl(cert, ca)
35 if new_crl = renew_crl(cert, ca)
41 if check_valid(crl, ca)
50 ca = load_cert(cafile)
51 if cert.verify(ca.public_key)
52 return ca
87 def check_valid(crl, ca)
88 unless crl.verify(ca
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/emptySubject/
H A DemptySubject.scr13 root = ca.pem
/macosx-10.10/OpenSSL098-52/src/demos/pkcs12/
H A Dpkread.c16 STACK_OF(X509) *ca = NULL;
36 if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) {
54 if (ca && sk_num(ca)) {
56 for (i = 0; i < sk_X509_num(ca); i++)
57 PEM_write_X509_AUX(fp, sk_X509_value(ca, i));
/macosx-10.10/curl-83.1.2/curl/lib/
H A Dcurl_addrinfo.c80 Curl_addrinfo *ca; local
82 for(ca = cahead; ca != NULL; ca = canext) {
84 if(ca->ai_addr)
85 free(ca->ai_addr);
87 if(ca->ai_canonname)
88 free(ca->ai_canonname);
90 canext = ca->ai_next;
92 free(ca);
122 Curl_addrinfo *ca; local
[all...]
/macosx-10.10/vim-55/runtime/compiler/
H A Dfortran_F.vim3 " URL: http://www.unb.ca/chem/ajit/compiler/fortran_F.vim
4 " Maintainer: Ajit J. Thakkar (ajit AT unb.ca); <http://www.unb.ca/chem/ajit/>
H A Dfortran_elf90.vim4 " URL: http://www.unb.ca/chem/ajit/compiler/fortran_elf90.vim
5 " Maintainer: Ajit J. Thakkar (ajit AT unb.ca); <http://www.unb.ca/chem/ajit/>
H A Dfortran_lf95.vim3 " URL: http://www.unb.ca/chem/ajit/compiler/fortran_lf95.vim
4 " Maintainer: Ajit J. Thakkar (ajit AT unb.ca); <http://www.unb.ca/chem/ajit/>
/macosx-10.10/OpenSSL098-52/src/crypto/pkcs12/
H A Dp12_kiss.c66 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca);
70 STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid,
74 EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca,
78 * and other (CA) certs. Note either ca should be NULL, *ca should be NULL,
84 STACK_OF(X509) **ca)
94 /* Allocate stack for ca certificates if needed */
95 if ((ca != NULL) && (*ca == NULL)) {
96 if (!(*ca
83 PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
144 parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca) argument
199 parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, X509 **cert, STACK_OF(X509) **ca, ASN1_OCTET_STRING **keyid, char *keymatch) argument
[all...]
/macosx-10.10/OpenSSL098-52/src/util/
H A Dmkcerts.sh6 # mv ca-cert.pem pca-cert.pem ../certs
54 # create ca request.
58 -keyout ca-key.pem \
59 -out ca-req.pem -nodes >/dev/null <<EOF
83 -in ca-req.pem -out ca-cert.pem
118 -CAcreateserial -CAserial ca-cert.srl \
119 -CA ca-cert.pem -CAkey ca-key.pem \
155 -CAcreateserial -CAserial ca
[all...]
/macosx-10.10/curl-83.1.2/curl/packages/vms/
H A Dgnv_curl_configure.sh45 --with-ca-path=gnv\$curl_ca_path
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/transfer/include/
H A Dsecure.inc11 tls::init -cafile /path/to/ca/cert -keyfile ...
/macosx-10.10/Heimdal-398.1.2/lib/hx509/data/
H A Dgen-req.sh23 if [ "$3" = "ca" ] ; then
33 ln -s ca.crt `${openssl} x509 -hash -noout -in cert.crt`.0
53 ${openssl} ca \
75 gen_cert "/CN=hx509 Test Root CA/C=SE" "root" "ca" "v3_ca"
76 gen_cert "/CN=OCSP responder/C=SE" "ca" "ocsp-responder" "ocsp"
77 gen_cert "/CN=Test cert/C=SE" "ca" "test" "usr"
78 gen_cert "/CN=localhost/C=SE" "ca" "localhost" "https"
79 gen_cert "/CN=Revoke cert/C=SE" "ca" "revoke" "usr"
80 gen_cert "/CN=Test cert KeyEncipherment/C=SE" "ca" "test-ke-only" "usr_ke"
81 gen_cert "/CN=Test cert DigitalSignature/C=SE" "ca" "tes
[all...]
/macosx-10.10/postfix-255/postfix/src/tls/
H A Dtls_dane.sh64 local ca=$1; shift
69 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
77 local ca=$1; shift
87 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
120 local ca=$1; shift
133 if [ -n "$ca" ]; then ca="$ca.pem"; fi
134 "$TEST" "$usage" "$selector" "$digest" "$tlsa.pem" "$ca" "$chain.pem" \
179 for ca i
[all...]
/macosx-10.10/ntp-92/libntp/
H A Daudio.c139 char *cp, *cc, *ca; local
161 for (ca = cc; *ca; ca++) {
162 if (isascii((int)*ca)) {
163 if (islower((int)*ca)) {
164 *ca = toupper(*ca);
165 } else if (isspace((int)*ca) || (*ca
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_transform/lib/
H A Dmisc.c87 CFMutableSetRef ca = (CFMutableSetRef)CFDictionaryGetValue(t2ca, t); local
88 if (!ca) {
89 ca = CFSetCreateMutable(NULL, 0, &kCFCopyStringSetCallBacks);
90 CFDictionarySetValue(t2ca, t, ca);
92 CFSetAddValue(ca, a);
132 CFMutableSetRef ca = (CFMutableSetRef)CFDictionaryGetValue(t2ca, name); local
133 if (ca) {
134 CFIndex cnt = CFSetGetCount(ca);
136 CFSetGetValues(ca, (const void **)attrs);
/macosx-10.10/ruby-106/ruby/test/openssl/
H A Dtest_x509cert.rb11 @ca = OpenSSL::X509::Name.parse("/DC=org/DC=ruby-lang/CN=CA")
25 cert = issue_cert(@ca, @rsa2048, s, Time.now, Time.now+3600, [],
46 cert = issue_cert(@ca, pk, 1, Time.now, Time.now+3600, exts,
58 cert = issue_cert(@ca, @rsa2048, 1, now, now+3600, [],
64 cert = issue_cert(@ca, @rsa2048, 1, now, now+3600, [],
70 cert = issue_cert(@ca, @rsa2048, 1, now, now, [],
76 cert = issue_cert(@ca, @rsa2048, 1, now, now, [],
89 ca_cert = issue_cert(@ca, @rsa2048, 1, Time.now, Time.now+3600, ca_exts,
129 cert = issue_cert(@ca, @rsa2048, 1, Time.now, Time.now+3600, [],
138 cert = issue_cert(@ca,
[all...]
/macosx-10.10/tcl-105/tcl_ext/tkimg/tkimg/compat/libjpeg/
H A Dcdjpeg.c124 register int ca, ck; local
127 while ((ca = *arg++) != '\0') {
130 if (isupper(ca)) /* force arg to lcase (assume ck is already) */
131 ca = tolower(ca);
132 if (ca != ck)
/macosx-10.10/OpenSSL098-52/src/crypto/x509v3/
H A Dv3_purp.c67 static int check_purpose_ssl_client(const X509_PURPOSE *xp, const X509 *x, int ca);
68 static int check_purpose_ssl_server(const X509_PURPOSE *xp, const X509 *x, int ca);
69 static int check_purpose_ns_ssl_server(const X509_PURPOSE *xp, const X509 *x, int ca);
70 static int purpose_smime(const X509 *x, int ca);
71 static int check_purpose_smime_sign(const X509_PURPOSE *xp, const X509 *x, int ca);
72 static int check_purpose_smime_encrypt(const X509_PURPOSE *xp, const X509 *x, int ca);
73 static int check_purpose_crl_sign(const X509_PURPOSE *xp, const X509 *x, int ca);
74 static int no_check(const X509_PURPOSE *xp, const X509 *x, int ca);
75 static int ocsp_helper(const X509_PURPOSE *xp, const X509 *x, int ca);
107 int X509_check_purpose(X509 *x, int id, int ca) argument
500 check_purpose_ssl_client(const X509_PURPOSE *xp, const X509 *x, int ca) argument
511 check_purpose_ssl_server(const X509_PURPOSE *xp, const X509 *x, int ca) argument
524 check_purpose_ns_ssl_server(const X509_PURPOSE *xp, const X509 *x, int ca) argument
535 purpose_smime(const X509 *x, int ca) argument
555 check_purpose_smime_sign(const X509_PURPOSE *xp, const X509 *x, int ca) argument
564 check_purpose_smime_encrypt(const X509_PURPOSE *xp, const X509 *x, int ca) argument
573 check_purpose_crl_sign(const X509_PURPOSE *xp, const X509 *x, int ca) argument
588 ocsp_helper(const X509_PURPOSE *xp, const X509 *x, int ca) argument
597 no_check(const X509_PURPOSE *xp, const X509 *x, int ca) argument
[all...]

Completed in 225 milliseconds

1234567891011>>