Searched refs:CA (Results 1 - 25 of 112) sorted by relevance

12345

/netbsd-current/crypto/external/bsd/openssl/dist/demos/certs/
H A Docsprun.sh13 $OPENSSL ocsp -port $PORT -index index.txt -CA intca.pem \
H A Dmkcerts.sh7 # Root CA: create certificate directly
8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \
10 # Intermediate CA: request first
11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \
13 # Sign request: CA extensions
14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -days 3600 \
21 $OPENSSL x509 -req -in req.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
27 # Sign using intermediate CA
28 $OPENSSL x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
34 # Sign using intermediate CA
[all...]
/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/certs/
H A Docsprun.sh13 $OPENSSL ocsp -port $PORT -index index.txt -CA intca.pem \
H A Dmkcerts.sh7 # Root CA: create certificate directly
8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \
10 # Intermediate CA: request first
11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \
13 # Sign request: CA extensions
14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -days 3600 \
21 $OPENSSL x509 -req -in req.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
27 # Sign using intermediate CA
28 $OPENSSL x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
34 # Sign using intermediate CA
[all...]
/netbsd-current/external/bsd/pkg_install/dist/x509/
H A Dpkgsrc.sh6 CA="openssl ca -config pkgsrc.cnf"
13 echo "CA already exists, exiting" >& 2
21 echo "Making CA certificate ..."
24 $CA -out $1/cacert.pem -batch \
31 $CA -extensions pkgkey -policy policy_match -out pkgkey_cert.pem -infiles pkgkey_req.pem
38 $CA -extensions pkgsec -policy policy_match -out pkgsec_cert.pem -infiles pkgsec_req.pem
45 echo "setup - create new CA in ./pkgsrc for use by pkg_install"
/netbsd-current/external/apache2/llvm/dist/llvm/lib/Transforms/Utils/
H A DCtorUtils.cpp38 Constant *CA = ConstantArray::get(ATy, CAList); local
41 if (CA->getType() == OldCA->getType()) {
42 GCL->setInitializer(CA);
48 new GlobalVariable(CA->getType(), GCL->isConstant(), GCL->getLinkage(),
49 CA, "", GCL->getThreadLocalMode());
68 ConstantArray *CA = cast<ConstantArray>(GV->getInitializer());
70 Result.reserve(CA->getNumOperands());
71 for (auto &V : CA->operands()) {
92 ConstantArray *CA = cast<ConstantArray>(GV->getInitializer());
94 for (auto &V : CA
[all...]
/netbsd-current/crypto/external/bsd/openssl/dist/apps/
H A DCA.pl.in26 my $CA = "$openssl ca $OPENSSL_CONFIG";
124 CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-extra-cmd parameter]
125 CA.pl -pkcs12 [certname]
126 CA.pl -verify certfile ...
127 CA.pl -revoke certfile [reason]
167 # ask user for existing CA certificate
168 print "CA certificate filename (or enter to create)\n";
176 print "Making CA certificate ...\n";
179 $RET = run("$CA -create_serial"
184 print "CA certificat
[all...]
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/smime-certs/
H A Dmksmime-certs.sh16 # Root CA: create certificate directly
24 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
29 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
34 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
43 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
47 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
51 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
61 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
65 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
69 $OPENSSL x509 -req -in req.pem -CA smroo
[all...]
/netbsd-current/crypto/external/bsd/openssl/dist/test/smime-certs/
H A Dmksmime-certs.sh16 # Root CA: create certificate directly
24 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
29 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
34 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
43 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
47 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
51 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
61 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
65 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \
70 #$OPENSSL x509 -req -in req.pem -CA smroo
[all...]
/netbsd-current/crypto/external/bsd/openssl.old/bin/
H A DMakefile93 FILES= CA.pl openssl.cnf
97 CA.pl: CA.pl.in
104 CLEANFILES+=CA.pl
/netbsd-current/crypto/external/bsd/openssl.old/dist/apps/
H A DCA.pl.in30 my $CA = "$openssl ca $OPENSSL_CONFIG";
116 print STDERR "usage: CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-extra-cmd extra-params]\n";
117 print STDERR " CA.pl -pkcs12 [-extra-pkcs12 extra-params] [certname]\n";
118 print STDERR " CA.pl -verify [-extra-verify extra-params] certfile ...\n";
119 print STDERR " CA.pl -revoke [-extra-ca extra-params] certfile [reason]\n";
146 # ask user for existing CA certificate
147 print "CA certificate filename (or enter to create)\n";
154 print "Making CA certificate ...\n";
158 $RET = run("$CA -create_serial"
163 print "CA certificat
[all...]
/netbsd-current/crypto/external/bsd/openssl/bin/
H A DMakefile124 FILES= CA.pl openssl.cnf
128 CA.pl: CA.pl.in
135 CLEANFILES+=CA.pl
/netbsd-current/external/gpl3/autoconf/dist/doc/
H A DMakefile.am32 autoconf.ca autoconf.CA autoconf.cas autoconf.CAs \
/netbsd-current/crypto/external/bsd/openssl/dist/demos/certs/apps/
H A Dmkacerts.sh7 # Root CA: create certificate directly
8 CN="OpenSSL Test Root CA" $OPENSSL req -config apps.cnf -x509 -nodes \
10 # Intermediate CA: request first
11 CN="OpenSSL Test Intermediate CA" $OPENSSL req -config apps.cnf -nodes \
13 # Sign request: CA extensions
14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \
19 # Sign using intermediate CA
20 $OPENSSL x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
26 # Sign using intermediate CA
27 $OPENSSL x509 -req -in sreq.pem -CA intc
[all...]
/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/certs/apps/
H A Dmkacerts.sh7 # Root CA: create certificate directly
8 CN="OpenSSL Test Root CA" $OPENSSL req -config apps.cnf -x509 -nodes \
10 # Intermediate CA: request first
11 CN="OpenSSL Test Intermediate CA" $OPENSSL req -config apps.cnf -nodes \
13 # Sign request: CA extensions
14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \
19 # Sign using intermediate CA
20 $OPENSSL x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \
26 # Sign using intermediate CA
27 $OPENSSL x509 -req -in sreq.pem -CA intc
[all...]
/netbsd-current/external/ibm-public/postfix/dist/src/tls/
H A Dmkcert.sh108 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true")
127 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true")
137 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
158 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
176 "basicConstraints = CA:false" \
180 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
198 "basicConstraints = CA:false" \
202 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
229 "basicConstraints = CA:false" \
234 cert "$cert" "$exts" -CA "
[all...]
/netbsd-current/crypto/external/bsd/openssl/dist/test/certs/
H A Dmkcert.sh103 local bcon="basicConstraints = critical,CA:true"
138 local bcon="basicConstraints = critical,CA:true"
156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
195 "basicConstraints = CA:false" \
199 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
213 "basicConstraints = CA:false"; \
216 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
261 "basicConstraints = CA:false" \
266 cert "$cert" "$exts" -CA "
[all...]
/netbsd-current/external/bsd/nsd/dist/
H A Dnsd-control-setup.sh.in134 basicConstraints=critical,CA:TRUE,pathlen:0
170 basicConstraints=critical,CA:FALSE
189 -CA "${SVR_BASE}_trust.pem" \
/netbsd-current/external/gpl3/gcc.old/dist/libgcc/config/libbid/
H A Dbid_div_macros.h39 UINT128 CB, CB2, CB4, CB8, CQB, CA; local
108 __sub_128_128 (CA, CX, CQB);
109 if (__unsigned_compare_ge_128 (CA, CY)) {
110 __sub_128_128 (CA, CA, CY);
112 if (__unsigned_compare_ge_128 (CA, CY)) {
113 __sub_128_128 (CA, CA, CY);
117 pCR->w[1] = CA.w[1];
118 pCR->w[0] = CA
[all...]
/netbsd-current/external/gpl3/gcc/dist/libgcc/config/libbid/
H A Dbid_div_macros.h39 UINT128 CB, CB2, CB4, CB8, CQB, CA; local
108 __sub_128_128 (CA, CX, CQB);
109 if (__unsigned_compare_ge_128 (CA, CY)) {
110 __sub_128_128 (CA, CA, CY);
112 if (__unsigned_compare_ge_128 (CA, CY)) {
113 __sub_128_128 (CA, CA, CY);
117 pCR->w[1] = CA.w[1];
118 pCR->w[0] = CA
[all...]
/netbsd-current/external/bsd/unbound/dist/smallapp/
H A Dunbound-control-setup.sh.in134 basicConstraints=critical,CA:TRUE,pathlen:0
170 basicConstraints=critical,CA:FALSE
189 -CA "${SVR_BASE}_trust.pem" \
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/certs/
H A Dmkcert.sh106 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true")
138 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true")
147 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
168 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \
186 "basicConstraints = CA:false" \
190 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
208 "basicConstraints = CA:false" \
212 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \
239 "basicConstraints = CA:false" \
244 cert "$cert" "$exts" -CA "
[all...]
/netbsd-current/external/apache2/llvm/dist/clang/include/clang/StaticAnalyzer/Core/PathSensitive/
H A DCallEvent.h510 static bool classof(const CallEvent *CA) { argument
511 return CA->getKind() >= CE_BEG_FUNCTION_CALLS &&
512 CA->getKind() <= CE_END_FUNCTION_CALLS;
548 static bool classof(const CallEvent *CA) { argument
549 return CA->getKind() == CE_Function;
656 static bool classof(const CallEvent *CA) { return CA->getKind() == CE_Block; } argument
688 static bool classof(const CallEvent *CA) { argument
689 return CA->getKind() >= CE_BEG_CXX_INSTANCE_CALLS &&
690 CA
730 classof(const CallEvent *CA) argument
770 classof(const CallEvent *CA) argument
839 classof(const CallEvent *CA) argument
912 classof(const CallEvent *CA) argument
992 classof(const CallEvent *CA) argument
1223 classof(const CallEvent *CA) argument
[all...]
/netbsd-current/external/gpl3/gdb.old/dist/sim/ppc/
H A Didecode_expression.h74 #define ALU_END(TARG,CA,OE,Rc) \
76 signed_word const alu_result = _ALU_RESULT_VAL(CA,OE,Rc); \
87 if (CA) { \
105 #define _ALU_RESULT_VAL(CA,OE,Rc) (WITH_TARGET_WORD_BITSIZE == 64 \
109 : (CA \
/netbsd-current/external/gpl3/gdb/dist/sim/ppc/
H A Didecode_expression.h76 #define ALU_END(TARG,CA,OE,Rc) \
78 signed_word const alu_result = _ALU_RESULT_VAL(CA,OE,Rc); \
89 if (CA) { \
107 #define _ALU_RESULT_VAL(CA,OE,Rc) (WITH_TARGET_WORD_BITSIZE == 64 \
111 : (CA \

Completed in 339 milliseconds

12345