/netbsd-current/crypto/external/bsd/openssl/dist/demos/certs/ |
H A D | ocsprun.sh | 13 $OPENSSL ocsp -port $PORT -index index.txt -CA intca.pem \
|
H A D | mkcerts.sh | 7 # Root CA: create certificate directly 8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \ 10 # Intermediate CA: request first 11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \ 13 # Sign request: CA extensions 14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -days 3600 \ 21 $OPENSSL x509 -req -in req.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 27 # Sign using intermediate CA 28 $OPENSSL x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 34 # Sign using intermediate CA [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/certs/ |
H A D | ocsprun.sh | 13 $OPENSSL ocsp -port $PORT -index index.txt -CA intca.pem \
|
H A D | mkcerts.sh | 7 # Root CA: create certificate directly 8 CN="Test Root CA" $OPENSSL req -config ca.cnf -x509 -nodes \ 10 # Intermediate CA: request first 11 CN="Test Intermediate CA" $OPENSSL req -config ca.cnf -nodes \ 13 # Sign request: CA extensions 14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -days 3600 \ 21 $OPENSSL x509 -req -in req.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 27 # Sign using intermediate CA 28 $OPENSSL x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 34 # Sign using intermediate CA [all...] |
/netbsd-current/external/bsd/pkg_install/dist/x509/ |
H A D | pkgsrc.sh | 6 CA="openssl ca -config pkgsrc.cnf" 13 echo "CA already exists, exiting" >& 2 21 echo "Making CA certificate ..." 24 $CA -out $1/cacert.pem -batch \ 31 $CA -extensions pkgkey -policy policy_match -out pkgkey_cert.pem -infiles pkgkey_req.pem 38 $CA -extensions pkgsec -policy policy_match -out pkgsec_cert.pem -infiles pkgsec_req.pem 45 echo "setup - create new CA in ./pkgsrc for use by pkg_install"
|
/netbsd-current/external/apache2/llvm/dist/llvm/lib/Transforms/Utils/ |
H A D | CtorUtils.cpp | 38 Constant *CA = ConstantArray::get(ATy, CAList); local 41 if (CA->getType() == OldCA->getType()) { 42 GCL->setInitializer(CA); 48 new GlobalVariable(CA->getType(), GCL->isConstant(), GCL->getLinkage(), 49 CA, "", GCL->getThreadLocalMode()); 68 ConstantArray *CA = cast<ConstantArray>(GV->getInitializer()); 70 Result.reserve(CA->getNumOperands()); 71 for (auto &V : CA->operands()) { 92 ConstantArray *CA = cast<ConstantArray>(GV->getInitializer()); 94 for (auto &V : CA [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/apps/ |
H A D | CA.pl.in | 26 my $CA = "$openssl ca $OPENSSL_CONFIG"; 124 CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-extra-cmd parameter] 125 CA.pl -pkcs12 [certname] 126 CA.pl -verify certfile ... 127 CA.pl -revoke certfile [reason] 167 # ask user for existing CA certificate 168 print "CA certificate filename (or enter to create)\n"; 176 print "Making CA certificate ...\n"; 179 $RET = run("$CA -create_serial" 184 print "CA certificat [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/smime-certs/ |
H A D | mksmime-certs.sh | 16 # Root CA: create certificate directly 24 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 29 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 34 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 43 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 47 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 51 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 61 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 65 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 69 $OPENSSL x509 -req -in req.pem -CA smroo [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/test/smime-certs/ |
H A D | mksmime-certs.sh | 16 # Root CA: create certificate directly 24 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 29 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 34 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 43 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 47 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 51 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 61 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 65 $OPENSSL x509 -req -in req.pem -CA smroot.pem -days 36500 \ 70 #$OPENSSL x509 -req -in req.pem -CA smroo [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/bin/ |
H A D | Makefile | 93 FILES= CA.pl openssl.cnf 97 CA.pl: CA.pl.in 104 CLEANFILES+=CA.pl
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/apps/ |
H A D | CA.pl.in | 30 my $CA = "$openssl ca $OPENSSL_CONFIG"; 116 print STDERR "usage: CA.pl -newcert | -newreq | -newreq-nodes | -xsign | -sign | -signCA | -signcert | -crl | -newca [-extra-cmd extra-params]\n"; 117 print STDERR " CA.pl -pkcs12 [-extra-pkcs12 extra-params] [certname]\n"; 118 print STDERR " CA.pl -verify [-extra-verify extra-params] certfile ...\n"; 119 print STDERR " CA.pl -revoke [-extra-ca extra-params] certfile [reason]\n"; 146 # ask user for existing CA certificate 147 print "CA certificate filename (or enter to create)\n"; 154 print "Making CA certificate ...\n"; 158 $RET = run("$CA -create_serial" 163 print "CA certificat [all...] |
/netbsd-current/crypto/external/bsd/openssl/bin/ |
H A D | Makefile | 124 FILES= CA.pl openssl.cnf 128 CA.pl: CA.pl.in 135 CLEANFILES+=CA.pl
|
/netbsd-current/external/gpl3/autoconf/dist/doc/ |
H A D | Makefile.am | 32 autoconf.ca autoconf.CA autoconf.cas autoconf.CAs \
|
/netbsd-current/crypto/external/bsd/openssl/dist/demos/certs/apps/ |
H A D | mkacerts.sh | 7 # Root CA: create certificate directly 8 CN="OpenSSL Test Root CA" $OPENSSL req -config apps.cnf -x509 -nodes \ 10 # Intermediate CA: request first 11 CN="OpenSSL Test Intermediate CA" $OPENSSL req -config apps.cnf -nodes \ 13 # Sign request: CA extensions 14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \ 19 # Sign using intermediate CA 20 $OPENSSL x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 26 # Sign using intermediate CA 27 $OPENSSL x509 -req -in sreq.pem -CA intc [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/certs/apps/ |
H A D | mkacerts.sh | 7 # Root CA: create certificate directly 8 CN="OpenSSL Test Root CA" $OPENSSL req -config apps.cnf -x509 -nodes \ 10 # Intermediate CA: request first 11 CN="OpenSSL Test Intermediate CA" $OPENSSL req -config apps.cnf -nodes \ 13 # Sign request: CA extensions 14 $OPENSSL x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \ 19 # Sign using intermediate CA 20 $OPENSSL x509 -req -in creq.pem -CA intca.pem -CAkey intkey.pem -days 3600 \ 26 # Sign using intermediate CA 27 $OPENSSL x509 -req -in sreq.pem -CA intc [all...] |
/netbsd-current/external/ibm-public/postfix/dist/src/tls/ |
H A D | mkcert.sh | 108 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true") 127 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true") 137 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 158 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 176 "basicConstraints = CA:false" \ 180 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 198 "basicConstraints = CA:false" \ 202 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 229 "basicConstraints = CA:false" \ 234 cert "$cert" "$exts" -CA " [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/test/certs/ |
H A D | mkcert.sh | 103 local bcon="basicConstraints = critical,CA:true" 138 local bcon="basicConstraints = critical,CA:true" 156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 177 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 195 "basicConstraints = CA:false" \ 199 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 213 "basicConstraints = CA:false"; \ 216 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 261 "basicConstraints = CA:false" \ 266 cert "$cert" "$exts" -CA " [all...] |
/netbsd-current/external/bsd/nsd/dist/ |
H A D | nsd-control-setup.sh.in | 134 basicConstraints=critical,CA:TRUE,pathlen:0 170 basicConstraints=critical,CA:FALSE 189 -CA "${SVR_BASE}_trust.pem" \
|
/netbsd-current/external/gpl3/gcc.old/dist/libgcc/config/libbid/ |
H A D | bid_div_macros.h | 39 UINT128 CB, CB2, CB4, CB8, CQB, CA; local 108 __sub_128_128 (CA, CX, CQB); 109 if (__unsigned_compare_ge_128 (CA, CY)) { 110 __sub_128_128 (CA, CA, CY); 112 if (__unsigned_compare_ge_128 (CA, CY)) { 113 __sub_128_128 (CA, CA, CY); 117 pCR->w[1] = CA.w[1]; 118 pCR->w[0] = CA [all...] |
/netbsd-current/external/gpl3/gcc/dist/libgcc/config/libbid/ |
H A D | bid_div_macros.h | 39 UINT128 CB, CB2, CB4, CB8, CQB, CA; local 108 __sub_128_128 (CA, CX, CQB); 109 if (__unsigned_compare_ge_128 (CA, CY)) { 110 __sub_128_128 (CA, CA, CY); 112 if (__unsigned_compare_ge_128 (CA, CY)) { 113 __sub_128_128 (CA, CA, CY); 117 pCR->w[1] = CA.w[1]; 118 pCR->w[0] = CA [all...] |
/netbsd-current/external/bsd/unbound/dist/smallapp/ |
H A D | unbound-control-setup.sh.in | 134 basicConstraints=critical,CA:TRUE,pathlen:0 170 basicConstraints=critical,CA:FALSE 189 -CA "${SVR_BASE}_trust.pem" \
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/certs/ |
H A D | mkcert.sh | 106 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true") 138 exts=$(printf "%s\n%s\n%s\n" "$skid" "$akid" "basicConstraints = critical,CA:true") 147 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 168 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 186 "basicConstraints = CA:false" \ 190 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 208 "basicConstraints = CA:false" \ 212 cert "$cert" "$exts" -CA "${ca}.pem" -CAkey "${cakey}.pem" \ 239 "basicConstraints = CA:false" \ 244 cert "$cert" "$exts" -CA " [all...] |
/netbsd-current/external/apache2/llvm/dist/clang/include/clang/StaticAnalyzer/Core/PathSensitive/ |
H A D | CallEvent.h | 510 static bool classof(const CallEvent *CA) { argument 511 return CA->getKind() >= CE_BEG_FUNCTION_CALLS && 512 CA->getKind() <= CE_END_FUNCTION_CALLS; 548 static bool classof(const CallEvent *CA) { argument 549 return CA->getKind() == CE_Function; 656 static bool classof(const CallEvent *CA) { return CA->getKind() == CE_Block; } argument 688 static bool classof(const CallEvent *CA) { argument 689 return CA->getKind() >= CE_BEG_CXX_INSTANCE_CALLS && 690 CA 730 classof(const CallEvent *CA) argument 770 classof(const CallEvent *CA) argument 839 classof(const CallEvent *CA) argument 912 classof(const CallEvent *CA) argument 992 classof(const CallEvent *CA) argument 1223 classof(const CallEvent *CA) argument [all...] |
/netbsd-current/external/gpl3/gdb.old/dist/sim/ppc/ |
H A D | idecode_expression.h | 74 #define ALU_END(TARG,CA,OE,Rc) \ 76 signed_word const alu_result = _ALU_RESULT_VAL(CA,OE,Rc); \ 87 if (CA) { \ 105 #define _ALU_RESULT_VAL(CA,OE,Rc) (WITH_TARGET_WORD_BITSIZE == 64 \ 109 : (CA \
|
/netbsd-current/external/gpl3/gdb/dist/sim/ppc/ |
H A D | idecode_expression.h | 76 #define ALU_END(TARG,CA,OE,Rc) \ 78 signed_word const alu_result = _ALU_RESULT_VAL(CA,OE,Rc); \ 89 if (CA) { \ 107 #define _ALU_RESULT_VAL(CA,OE,Rc) (WITH_TARGET_WORD_BITSIZE == 64 \ 111 : (CA \
|