/netbsd-current/crypto/external/bsd/openssl.old/dist/test/recipes/ |
H A D | 25-test_verify.t | 20 my ($cert, $purpose, $trusted, $untrusted, @opts) = @_; 26 push(@args, srctop_file(@path, "$cert.pem")); 33 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 37 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]), 39 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]), 41 ok(!verify("ee-cert", "sslserve [all...] |
/netbsd-current/external/bsd/unbound/dist/testdata/dnscrypt_cert_chacha.tdir/ |
H A D | dnscrypt_cert_chacha.conf | 21 dnscrypt-provider: 2.dnscrypt-cert.example.com. 24 dnscrypt-provider-cert: 1_salsa.cert 25 dnscrypt-provider-cert: 2_chacha.cert 26 dnscrypt-provider-cert: 2_salsa.cert
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hx509/data/ |
H A D | mkcert.sh | 27 cert() { function 28 local cert=$1; shift 31 openssl x509 -req -sha256 -out "${cert}.pem" \ 38 local cert=$1; shift 46 cert "$cert" "$exts" -signkey "${key}.pem" \ 53 local cert=$1; shift 64 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 70 secp256r1TestCA.key secp256r1TestCA.cert [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/test/recipes/ |
H A D | 25-test_verify.t | 21 my ($cert, $purpose, $trusted, $untrusted, @opts) = @_; 28 push(@args, srctop_file(@path, "$cert.pem")); 35 ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), 39 ok(!verify("ee-cert", "sslserver", [qw(root-nonca)], [qw(ca-cert)]), 41 ok(!verify("ee-cert", "sslserver", [qw(nroot+serverAuth)], [qw(ca-cert)]), 43 ok(!verify("ee-cert", "sslserve [all...] |
H A D | 25-test_req.t | 384 my $cert = shift @_; 385 my $ss = $cert =~ m/self-signed/; 386 my $is_ca = $cert =~ m/CA/; 391 "-subj", "/CN=$cn", @_, "-out", $cert); 394 ok(run(app([@cmd])), "generate $cert"); 397 my $cert = shift @_; 399 cert_contains($cert, "Subject Key Identifier", $expect); 402 my $cert = shift @_; 404 cert_contains($cert, "Authority Key Identifier", $expect); 407 my $cert [all...] |
/netbsd-current/external/ibm-public/postfix/dist/src/tls/ |
H A D | mkcert.sh | 92 cert() { function 93 local cert=$1; shift 97 openssl x509 "${dopts[@]}" -req -out "${cert}.pem" \ 104 local cert=$1; shift 115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}" 121 local cert=$1; shift 137 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 144 local cert [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/certs/ |
H A D | setup.sh | 3 # Primary root: root-cert 4 # root cert variants: CA:false, key2, DN2 7 ./mkcert.sh genroot "Root CA" root-key root-cert 13 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 15 openssl x509 -in root-cert.pem -trustout \ 17 openssl x509 -in root-cert.pem -trustout \ 19 openssl x509 -in root-cert.pem -trustout \ 21 openssl x509 -in root-cert.pem -trustout \ 23 openssl x509 -in root-cert.pem -trustout \ 25 openssl x509 -in root-cert [all...] |
H A D | mkcert.sh | 90 cert() { function 91 local cert=$1; shift 95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \ 102 local cert=$1; shift 113 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}" 132 local cert=$1; shift 147 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 154 local cert [all...] |
/netbsd-current/external/bsd/unbound/dist/testdata/dnscrypt_cert.tdir/ |
H A D | dnscrypt_cert.conf | 21 dnscrypt-provider: 2.dnscrypt-cert.example.com. 24 dnscrypt-provider-cert: 1_salsa.cert 25 dnscrypt-provider-cert: 2_salsa.cert
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hx509/ |
H A D | test_ca.in | 62 --certificate="FILE:cert-ee.pem" || exit 1 66 cert:FILE:cert-ee.pem \ 69 echo "issue crl (no cert)" 76 cert:FILE:cert-ee.pem \ 80 echo "issue crl (with cert)" 84 FILE:cert-ee.pem || exit 1 88 cert:FILE:cert [all...] |
H A D | test_cert.in | 61 FILE:${srcdir}/data/test.crt PEM-FILE:cert-pem.tmp || exit 1 63 ${hxtool} certificate-copy PEM-FILE:cert-pem.tmp DER-FILE:cert-der.tmp || exit 1 64 ${hxtool} certificate-copy DER-FILE:cert-der.tmp PEM-FILE:cert-pem2.tmp || exit 1 66 cmp cert-pem.tmp cert-pem2.tmp || exit 1 68 echo "verify n0ll cert (fail)" 71 cert:FILE:$srcdir/data/n0ll.pem \ 74 echo "verify n0ll cert (fai [all...] |
/netbsd-current/crypto/external/cpl/trousers/etc/ |
H A D | tcsd.conf | 8 platform_cred = /etc/tpm/platform.cert 9 conformance_cred = /etc/tpm/conformance.cert 10 endorsement_cred = /etc/tpm/endorsement.cert
|
/netbsd-current/crypto/external/bsd/openssl/dist/demos/certs/ |
H A D | ocspquery.sh | 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \ 13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \ 15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \ 20 -cert client.pem -cert server.pem -cert rev.pem \
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/demos/certs/ |
H A D | ocspquery.sh | 11 $OPENSSL ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \ 13 $OPENSSL ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \ 15 $OPENSSL ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \ 20 -cert client.pem -cert server.pem -cert rev.pem \
|
/netbsd-current/crypto/external/bsd/openssl/dist/test/certs/ |
H A D | mkcert.sh | 90 cert() { function 91 local cert=$1; shift 95 openssl x509 -req -"${OPENSSL_SIGALG}" -out "${cert}.pem" \ 102 local cert=$1; shift 115 cert "$cert" "$exts" -signkey "${key}.pem" -set_serial 1 -days "${DAYS}" 135 local cert=$1; shift 156 cert "$cert" "$exts" -CA "${cacert}.pem" -CAkey "${cakey}.pem" \ 163 local cert [all...] |
H A D | setup.sh | 3 # Primary root: root-cert 4 ./mkcert.sh genroot "Root CA" root-key root-cert 5 # root cert variants: CA:false, key2, DN2, expired 10 # cross root and root cross cert 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 14 openssl x509 -in root-cert.pem -trustout \ 16 openssl x509 -in root-cert.pem -trustout \ 18 openssl x509 -in root-cert.pem -trustout \ 20 openssl x509 -in root-cert.pem -trustout \ 23 openssl x509 -in root-cert [all...] |
/netbsd-current/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
H A D | cert_37.c | 27 dns_cert_t cert; local 42 RETTOK(dns_cert_fromtext(&cert, &token.value.as_textregion)); 43 RETERR(uint16_tobuffer(cert, target)); 171 dns_rdata_cert_t *cert = source; local 174 REQUIRE(cert != NULL); 175 REQUIRE(cert->common.rdtype == type); 176 REQUIRE(cert->common.rdclass == rdclass); 181 RETERR(uint16_tobuffer(cert->type, target)); 182 RETERR(uint16_tobuffer(cert->key_tag, target)); 183 RETERR(uint8_tobuffer(cert 190 dns_rdata_cert_t *cert = target; local 222 dns_rdata_cert_t *cert = source; local [all...] |
/netbsd-current/external/mpl/bind/dist/lib/dns/rdata/generic/ |
H A D | cert_37.c | 27 dns_cert_t cert; local 42 RETTOK(dns_cert_fromtext(&cert, &token.value.as_textregion)); 43 RETERR(uint16_tobuffer(cert, target)); 171 dns_rdata_cert_t *cert = source; local 174 REQUIRE(cert != NULL); 175 REQUIRE(cert->common.rdtype == type); 176 REQUIRE(cert->common.rdclass == rdclass); 181 RETERR(uint16_tobuffer(cert->type, target)); 182 RETERR(uint16_tobuffer(cert->key_tag, target)); 183 RETERR(uint8_tobuffer(cert 190 dns_rdata_cert_t *cert = target; local 222 dns_rdata_cert_t *cert = source; local [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/ |
H A D | cmsapitest.c | 10 static X509 *cert = NULL; variable 26 if (!TEST_int_gt(sk_X509_push(certstack, cert), 0)) 33 if (!TEST_true(CMS_decrypt(content, privkey, cert, NULL, outmsgbio, 64 if (!TEST_true(PEM_read_bio_X509(certbio, &cert, NULL, NULL))) { 72 X509_free(cert); 73 cert = NULL; 78 X509_free(cert); 79 cert = NULL; 91 X509_free(cert);
|
/netbsd-current/external/bsd/wpa/dist/src/crypto/ |
H A D | tls_openssl.h | 16 enum ocsp_result check_ocsp_resp(SSL_CTX *ssl_ctx, SSL *ssl, X509 *cert,
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/ssl-tests/ |
H A D | 01-simple.conf | 7 test-2 = 2-verify-cert 58 [2-verify-cert] 59 ssl_conf = 2-verify-cert-ssl 61 [2-verify-cert-ssl] 62 server = 2-verify-cert-server 63 client = 2-verify-cert-client 65 [2-verify-cert-server] 70 [2-verify-cert-client]
|
/netbsd-current/crypto/dist/ipsec-tools/src/racoon/ |
H A D | dnssec.c | 62 vchar_t *cert = NULL; local 118 /* create cert holder */ 119 cert = vmalloc(res->ci_certlen + 1); 120 if (cert == NULL) { 122 "failed to get cert buffer.\n"); 125 cert->v[0] = type; 126 memcpy(&cert->v[1], res->ci_cert, res->ci_certlen); 129 plogdump(LLV_DEBUG, cert->v, cert->l); 136 return cert; [all...] |
/netbsd-current/external/bsd/unbound/dist/testdata/padding.tdir/ |
H A D | padding.conf | 11 tls-cert-bundle: "unbound_server.pem" 19 server-cert-file: "unbound_server.pem" 21 control-cert-file: "unbound_control.pem"
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/ct/ |
H A D | ct_policy.c | 48 X509_free(ctx->cert); 53 int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert) argument 55 if (!X509_up_ref(cert)) 57 ctx->cert = cert; 82 return ctx->cert;
|
/netbsd-current/usr.sbin/certctl/ |
H A D | certctl.sh | 46 printf ' %s trust <cert>\n' "$progname" 47 printf ' %s untrust <cert>\n' "$progname" 252 local vpath path cert base vcert vbase 259 for cert in "$path"/*.pem "$path"/*.cer "$path"/*.crt; do 261 vcert=$(printf '%s' "$cert" | vis -M) 269 if [ ! -e "$cert" ]; then 270 if [ -h "$cert" ]; then 295 local status link vlink cert vcert 322 cert=$(readlink -n -- "$link" && printf .) 323 cert [all...] |