/openbsd-current/regress/usr.sbin/acme-client/ |
H A D | acme-client.conf | 7 domain certificate "${.OBJDIR}/etc/ssl/acme/cert.pem"
|
/openbsd-current/regress/usr.sbin/syslogd/ |
H A D | args-tls-cafile-fake.pl | 23 qr/certificate verification failed: /. 24 "(".qr/self signed certificate in certificate chain/."|". 25 qr/certificate signature failure/.")" => 1,
|
H A D | args-tls-cafile-default.pl | 26 qr/certificate verification failed: /. 27 qr/self signed certificate in certificate chain/ => 1,
|
H A D | args-error.pl | 31 qr/certificate file 'cccc'/ => 1,
|
H A D | args-server-tls-client-fake.pl | 3 # The syslogd passes it via TLS with client certificate to the loghost. 36 qr/.*certificate verify failed/ => 1.
|
H A D | args-tls-cert-empty.pl | 1 # Syslogd gets an empty TLS server certificate. 43 qr{tls_configure server: failed to load certificate} => 1,
|
H A D | args-tls-cert-noexist.pl | 1 # Syslogd gets no TLS server certificate. 44 qr{load server TLS cert: failed to open certificate file} => 1,
|
/openbsd-current/etc/examples/ |
H A D | httpd.conf | 17 certificate "/etc/ssl/example.com.fullchain.pem"
|
H A D | acme-client.conf | 29 domain full chain certificate "/etc/ssl/example.com.fullchain.pem"
|
/openbsd-current/gnu/llvm/lldb/scripts/ |
H A D | macos-setup-codesign.sh | 17 # Check if the certificate is already present in the system keychain 18 security find-certificate -Z -p -c "$CERT" /Library/Keychains/System.keychain > /dev/null 2>&1 24 # Create the certificate template 39 echo Generating and installing lldb_codesign certificate 41 # Generate a new certificate 43 [ $? -eq 0 ] || error Something went wrong when generating the certificate 45 # Install the certificate in the system keychain 47 [ $? -eq 0 ] || error Something went wrong when installing the certificate 49 # Install the key for the certificate in the system keychain 56 # Exit indicating the certificate i [all...] |
/openbsd-current/regress/usr.bin/openssl/ |
H A D | test_server.sh | 4 echo This starts a tls1 mode server using the DSA certificate in ./server.pem
|
/openbsd-current/lib/libssl/test/ |
H A D | testss | 33 echo "make a certificate request using 'req'" 45 echo "error using 'req' to generate a certificate request" 49 echo "convert the certificate request into a self signed certificate using 'x509'" 52 echo "error using 'x509' to self sign a certificate request" 57 echo "convert a certificate into a certificate request using 'x509'" 60 echo "error using 'x509' convert a certificate to a certificate request" 83 echo "make a user certificate reques [all...] |
/openbsd-current/regress/lib/libcrypto/pkcs7/ |
H A D | pkcs7test.c | 30 const char certificate[] = "\ variable 98 /* Pretend the certificate issuer is valid... */ 154 bio_cert = BIO_new_mem_buf((char *)certificate, sizeof(certificate)); 156 fatal("BIO_new_mem_buf certificate");
|
/openbsd-current/usr.sbin/acme-client/ |
H A D | extern.h | 178 char *certificate; /* uri for issued certificate */ member in struct:order 191 char *neworder; /* order new certificate */ 192 char *revokecert; /* revoke certificate */
|
H A D | json.c | 491 char *certificate; local 493 if ((certificate = json_getstr(n, "certificate")) != NULL) { 494 if ((order->certificate = strdup(certificate)) == NULL) 694 "\"certificate\": \"%s\""
|
H A D | netproc.c | 428 * Submit a new order for a certificate. 554 dodbg("%s: certificate", uri); 574 * Get certificate from CA 582 dodbg("%s: certificate", uri); 627 * Look up directories from the certificate authority. 657 * We need the certificate we want to upload and our account key information. 699 * Then check whether revokeproc indicates that the certificate on file 726 /* If our certificate is up-to-date, return now. */ 749 * the certificate (if it's found at all). 848 /* Wait to receive the certificate itsel [all...] |
/openbsd-current/lib/libcrypto/cms/ |
H A D | cms_lib.c | 542 if (!X509_cmp(cch->d.certificate, cert)) { 552 cch->d.certificate = cert; 661 if (!sk_X509_push(certs, cch->d.certificate)) { 665 X509_up_ref(cch->d.certificate);
|
H A D | cms_local.h | 134 /* Signing certificate and key */ 331 X509 *certificate; member in union:CMS_CertificateChoices::__anon7
|
H A D | cms_sd.c | 636 x = cch->d.certificate;
|
H A D | cms_asn1.c | 120 .offset = offsetof(CMS_CertificateChoices, d.certificate), 121 .field_name = "d.certificate",
|
/openbsd-current/usr.sbin/smtpd/ |
H A D | ca.c | 131 ca_X509_verify(void *certificate, void *chain, const char *CAfile, argument 151 if (X509_STORE_CTX_init(xsc, store, certificate, chain) != 1)
|
/openbsd-current/gnu/usr.bin/perl/cpan/HTTP-Tiny/lib/HTTP/ |
H A D | Tiny.pm | 44 #pod certificate of an C<https> ��� connection (default is true). Changed from false 49 #pod certificate verification behavior to not check server identity if set to 1. 150 # Check if insecure default certificate verification behaviour has been 1676 die qq/Couldn't find a CA bundle with which to verify the SSL certificate.\n/ 1823 C<verify_SSL> ��� A boolean that indicates whether to validate the TLS/SSL certificate of an C<https> ��� connection (default is true). Changed from false to true in version 0.083. 1831 C<$ENV{PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT}> - Changes the default certificate verification behavior to not check server identity if set to 1. Only effective if C<verify_SSL> is not set. Added in version 0.083. 2110 certificate corresponding to the host name of the connection and that the 2111 certificate has been verified by a CA. Assuming you trust the CA, this will 2118 will try to find a CA certificate file in that location. 2124 system-specific default locations for a CA certificate fil [all...] |
/openbsd-current/gnu/usr.bin/perl/cpan/Win32/ |
H A D | Win32.pm | 1331 such as when testing locally using a self-signed certificate.
|
/openbsd-current/usr.sbin/unbound/ |
H A D | configure | 1669 set default pathname to root update certificate file
|