Searched refs:certificate (Results 1 - 24 of 24) sorted by relevance

/openbsd-current/regress/usr.sbin/acme-client/
H A Dacme-client.conf7 domain certificate "${.OBJDIR}/etc/ssl/acme/cert.pem"
/openbsd-current/regress/usr.sbin/syslogd/
H A Dargs-tls-cafile-fake.pl23 qr/certificate verification failed: /.
24 "(".qr/self signed certificate in certificate chain/."|".
25 qr/certificate signature failure/.")" => 1,
H A Dargs-tls-cafile-default.pl26 qr/certificate verification failed: /.
27 qr/self signed certificate in certificate chain/ => 1,
H A Dargs-error.pl31 qr/certificate file 'cccc'/ => 1,
H A Dargs-server-tls-client-fake.pl3 # The syslogd passes it via TLS with client certificate to the loghost.
36 qr/.*certificate verify failed/ => 1.
H A Dargs-tls-cert-empty.pl1 # Syslogd gets an empty TLS server certificate.
43 qr{tls_configure server: failed to load certificate} => 1,
H A Dargs-tls-cert-noexist.pl1 # Syslogd gets no TLS server certificate.
44 qr{load server TLS cert: failed to open certificate file} => 1,
/openbsd-current/etc/examples/
H A Dhttpd.conf17 certificate "/etc/ssl/example.com.fullchain.pem"
H A Dacme-client.conf29 domain full chain certificate "/etc/ssl/example.com.fullchain.pem"
/openbsd-current/gnu/llvm/lldb/scripts/
H A Dmacos-setup-codesign.sh17 # Check if the certificate is already present in the system keychain
18 security find-certificate -Z -p -c "$CERT" /Library/Keychains/System.keychain > /dev/null 2>&1
24 # Create the certificate template
39 echo Generating and installing lldb_codesign certificate
41 # Generate a new certificate
43 [ $? -eq 0 ] || error Something went wrong when generating the certificate
45 # Install the certificate in the system keychain
47 [ $? -eq 0 ] || error Something went wrong when installing the certificate
49 # Install the key for the certificate in the system keychain
56 # Exit indicating the certificate i
[all...]
/openbsd-current/regress/usr.bin/openssl/
H A Dtest_server.sh4 echo This starts a tls1 mode server using the DSA certificate in ./server.pem
/openbsd-current/lib/libssl/test/
H A Dtestss33 echo "make a certificate request using 'req'"
45 echo "error using 'req' to generate a certificate request"
49 echo "convert the certificate request into a self signed certificate using 'x509'"
52 echo "error using 'x509' to self sign a certificate request"
57 echo "convert a certificate into a certificate request using 'x509'"
60 echo "error using 'x509' convert a certificate to a certificate request"
83 echo "make a user certificate reques
[all...]
/openbsd-current/regress/lib/libcrypto/pkcs7/
H A Dpkcs7test.c30 const char certificate[] = "\ variable
98 /* Pretend the certificate issuer is valid... */
154 bio_cert = BIO_new_mem_buf((char *)certificate, sizeof(certificate));
156 fatal("BIO_new_mem_buf certificate");
/openbsd-current/usr.sbin/acme-client/
H A Dextern.h178 char *certificate; /* uri for issued certificate */ member in struct:order
191 char *neworder; /* order new certificate */
192 char *revokecert; /* revoke certificate */
H A Djson.c491 char *certificate; local
493 if ((certificate = json_getstr(n, "certificate")) != NULL) {
494 if ((order->certificate = strdup(certificate)) == NULL)
694 "\"certificate\": \"%s\""
H A Dnetproc.c428 * Submit a new order for a certificate.
554 dodbg("%s: certificate", uri);
574 * Get certificate from CA
582 dodbg("%s: certificate", uri);
627 * Look up directories from the certificate authority.
657 * We need the certificate we want to upload and our account key information.
699 * Then check whether revokeproc indicates that the certificate on file
726 /* If our certificate is up-to-date, return now. */
749 * the certificate (if it's found at all).
848 /* Wait to receive the certificate itsel
[all...]
/openbsd-current/lib/libcrypto/cms/
H A Dcms_lib.c542 if (!X509_cmp(cch->d.certificate, cert)) {
552 cch->d.certificate = cert;
661 if (!sk_X509_push(certs, cch->d.certificate)) {
665 X509_up_ref(cch->d.certificate);
H A Dcms_local.h134 /* Signing certificate and key */
331 X509 *certificate; member in union:CMS_CertificateChoices::__anon7
H A Dcms_sd.c636 x = cch->d.certificate;
H A Dcms_asn1.c120 .offset = offsetof(CMS_CertificateChoices, d.certificate),
121 .field_name = "d.certificate",
/openbsd-current/usr.sbin/smtpd/
H A Dca.c131 ca_X509_verify(void *certificate, void *chain, const char *CAfile, argument
151 if (X509_STORE_CTX_init(xsc, store, certificate, chain) != 1)
/openbsd-current/gnu/usr.bin/perl/cpan/HTTP-Tiny/lib/HTTP/
H A DTiny.pm44 #pod certificate of an C<https> ��� connection (default is true). Changed from false
49 #pod certificate verification behavior to not check server identity if set to 1.
150 # Check if insecure default certificate verification behaviour has been
1676 die qq/Couldn't find a CA bundle with which to verify the SSL certificate.\n/
1823 C<verify_SSL> ��� A boolean that indicates whether to validate the TLS/SSL certificate of an C<https> ��� connection (default is true). Changed from false to true in version 0.083.
1831 C<$ENV{PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT}> - Changes the default certificate verification behavior to not check server identity if set to 1. Only effective if C<verify_SSL> is not set. Added in version 0.083.
2110 certificate corresponding to the host name of the connection and that the
2111 certificate has been verified by a CA. Assuming you trust the CA, this will
2118 will try to find a CA certificate file in that location.
2124 system-specific default locations for a CA certificate fil
[all...]
/openbsd-current/gnu/usr.bin/perl/cpan/Win32/
H A DWin32.pm1331 such as when testing locally using a self-signed certificate.
/openbsd-current/usr.sbin/unbound/
H A Dconfigure1669 set default pathname to root update certificate file

Completed in 364 milliseconds