/freebsd-src/contrib/bearssl/inc/ |
H A D | bearssl_x509.h | 41 * # X.509 Certificate Chain Processing 43 * An X.509 processing engine receives an X.509 chain, chunk by chunk, 59 * **The "minimal" engine** implements minimal X.509 decoding and chain 65 * - X.509 v1, v2 and v3 certificates are supported. 125 * X.509 error codes are in the 32..63 range. 128 /** \brief X.509 status: validation was successful; this is not actually 132 /** \brief X.509 status: invalid value in an ASN.1 structure. */ 135 /** \brief X.509 status: truncated certificate. */ 138 /** \brief X.509 status: empty certificate chain (no certificate at all). */ 141 /** \brief X.509 status: decoding error: inner element extends beyond [all …]
|
/freebsd-src/crypto/openssl/doc/man7/ |
H A D | x509.pod | 5 x509 - X.509 certificate handling 13 An X.509 certificate is a structured grouping of information about 14 an individual, a device, or anything one can imagine. An X.509 CRL 17 found in the X.509 document from ITU-T, or in RFC3280 from PKIX. 34 handle X.509 certificates, with some exceptions, shown below. 37 functions handle X.509 CRLs.
|
H A D | ossl_store.pod | 66 /* Print the X.509 certificate text */ 68 /* Print the X.509 certificate PEM output */
|
/freebsd-src/crypto/heimdal/doc/doxyout/hx509/html/ |
H A D | index.html | 3 <title>Heimdalx509library: Heimdal PKIX/X.509 library</title> 22 <h1>Heimdal PKIX/X.509 library</h1> 26 Heimdal libhx509 library is a implementation of the PKIX/X.509 and related protocols.<p> 27 PKIX/X.509 is ...<p> 29 <li><a class="el" href="page_name.html">PKIX/X.509 Names</a></li><li><a class="el" href="page_cert.…
|
H A D | page_name.html | 3 <title>Heimdalx509library: PKIX/X.509 Names</title> 22 <h1><a class="anchor" name="page_name">PKIX/X.509 Names </a></h1>There are several names in PKIX/X.…
|
/freebsd-src/secure/lib/libcrypto/man/man7/ |
H A D | x509.7 | 140 x509 \- X.509 certificate handling 148 An X.509 certificate is a structured grouping of information about 149 an individual, a device, or anything one can imagine. An X.509 \s-1CRL\s0 152 found in the X.509 document from ITU-T, or in \s-1RFC3280\s0 from \s-1PKIX.\s0 169 handle X.509 certificates, with some exceptions, shown below. 172 functions handle X.509 CRLs.
|
/freebsd-src/crypto/heimdal/doc/ |
H A D | hx509.texi | 25 * hx509: (hx509). The X.509 distribution from KTH 32 @subtitle X.509 distribution from KTH 181 * What is X.509 ?:: 217 @node Introduction, What is X.509 ?, Top, Top 240 hx509 (Heimdal x509 support) is a near complete X.509 stack that can 250 @node What is X.509 ?, Setting up a CA, Introduction, Top 251 @chapter What is X.509, PKIX, PKCS7 and CMS ? 253 X.509 was created by CCITT (later ITU) for the X.500 directory 254 service. Today, X.509 discussions and implementations commonly reference 255 the IETF's PKIX Certificate and CRL Profile of the X.509 v3 certificate [all …]
|
H A D | layman.asc | 482 on an ASN.1 value. DER is defined in Section 8.7 of X.509. 600 version component of X.509's Certificate type. 635 Example 2: X.509's Certificate type has a version component 644 the ASN.1 "module" in X.509 that defines the Certificate 675 particular algorithm in X.509's AlgorithmIdentifier type, 698 Example: X.509's AlgorithmIdentifier type has a component of 728 for digital signatures on certificates in X.509's 730 X.509's SubjectPublicKeyInfo type. 736 Example: X.509's SubjectPublicKeyInfo type has a component 798 extended certificate and an X.509 certificate in PKCS #7's [all …]
|
/freebsd-src/lib/libsecureboot/efi/include/Guid/ |
H A D | ImageAuthentication.h | 96 /// The SHA256 hash of an X.509 certificate's To-Be-Signed contents. 107 /// The SHA384 hash of an X.509 certificate's To-Be-Signed contents. 118 /// The SHA512 hash of an X.509 certificate's To-Be-Signed contents. 181 /// This identifies a signature based on an X.509 certificate. If the signature is an X.509 183 /// key certificate in the image using certificate path verification, up to this X.509 225 /// This identifies a signature containing the SHA256 hash of an X.509 certificate's 238 /// This identifies a signature containing the SHA384 hash of an X.509 certificate's 251 /// This identifies a signature containing the SHA512 hash of an X.509 certificate's
|
/freebsd-src/crypto/openssl/doc/man3/ |
H A D | X509_REQ_get_extensions.pod | 7 - handle X.509 extension attributes of a CSR 20 X509_REQ_get_extensions() returns the first list of X.509 extensions 25 X509_REQ_add_extensions() adds to I<req> a list of X.509 extensions I<exts>,
|
H A D | X509V3_set_ctx.pod | 6 X509V3_set_issuer_pkey - X.509 v3 extension generation utilities 34 or B<X509V3_CTX_REPLACE>, which means that each X.509v3 extension added as
|
/freebsd-src/share/snmp/mibs/ |
H A D | FREEBSD-MIB.txt | 27 "Added entries for the otherName component of a X.509 cert" 43 "Subtree for X.509 Certificate otherName entries" 52 "Entry for X.509 Certificate for NFS user@domain name"
|
/freebsd-src/contrib/bearssl/src/ssl/ |
H A D | ssl_client_full.c | 102 * Note: the X.509 validation engine will nonetheless refuse to in br_ssl_client_init_full() 124 * X.509 engine uses SHA-256 to hash certificate DN (for in br_ssl_client_init_full() 148 * X.509 engine. in br_ssl_client_init_full() 159 * Link the X.509 engine in the SSL engine. in br_ssl_client_init_full()
|
/freebsd-src/crypto/heimdal/lib/hx509/ |
H A D | doxygen.c | 34 /** @mainpage Heimdal PKIX/X.509 library 38 * Heimdal libhx509 library is a implementation of the PKIX/X.509 and 41 * PKIX/X.509 is ...
|
/freebsd-src/sys/contrib/device-tree/src/arm64/qcom/ |
H A D | sdm636.dtsi | 14 * 509 instead of 512 and lack of 22 /* Adreno 509 shares the frequency table with 512 */
|
/freebsd-src/crypto/heimdal/doc/doxyout/hx509/man/man3/ |
H A D | page_name.3 | 5 page_name \- PKIX/X.509 Names 6 There are several names in PKIX/X.509, GeneralName and Name.
|
/freebsd-src/contrib/wpa/wpa_supplicant/examples/ |
H A D | openCryptoki.conf | 11 # Certificate Object, type = X.509 cert 14 # Certificate Object, type = X.509 cert
|
/freebsd-src/crypto/openssl/doc/internal/man3/ |
H A D | x509v3_cache_extensions.pod | 6 - cache info on various X.509v3 extensions and further derived certificate data 18 for instance whether the certificate is self-issued or has version X.509v1.
|
/freebsd-src/crypto/openssl/doc/man1/ |
H A D | openssl-verification-options.pod | 5 openssl-verification-options - generic X.509 certificate verification options 16 There are many situations where X.509 certificates are verified 67 (EKUs) that may be given in X.509 extensions of end-entity certificates. 217 Files should be named with the hash value of the X.509 SubjectName of each 317 The authorityKeyIdentifier must be given for X.509v3 certs unless they 322 The subjectKeyIdentifier must be given for all X.509v3 CA certs. 563 which includes the case that it is an X.509v1 certificate, 582 basicConstraints and keyUsage and X.509v1 certificates above apply to B<all>
|
H A D | openssl-x509.pod.in | 132 X.509 extensions included in a certificate input are not copied by default. 133 X.509 extensions to be added can be specified using the B<-extfile> option. 141 X.509 extensions included in the request are not copied by default. 142 X.509 extensions to be added can be specified using the B<-extfile> option. 146 Determines how to handle X.509 extensions 429 Configuration file containing certificate and request X.509 extensions to add. 433 The section in the extfile to add X.509 extensions from. 754 wrong private key, using unsuitable X.509 extensions,
|
/freebsd-src/secure/usr.bin/openssl/man/ |
H A D | openssl-x509.1 | 261 X.509 extensions included in a certificate input are not copied by default. 262 X.509 extensions to be added can be specified using the \fB\-extfile\fR option. 269 X.509 extensions included in the request are not copied by default. 270 X.509 extensions to be added can be specified using the \fB\-extfile\fR option. 273 Determines how to handle X.509 extensions 501 Configuration file containing certificate and request X.509 extensions to add. 504 The section in the extfile to add X.509 extensions from. 806 wrong private key, using unsuitable X.509 extensions,
|
H A D | openssl-verification-options.1 | 140 openssl\-verification\-options \- generic X.509 certificate verification options 149 There are many situations where X.509 certificates are verified 199 (EKUs) that may be given in X.509 extensions of end-entity certificates. 321 Files should be named with the hash value of the X.509 SubjectName of each 388 The authorityKeyIdentifier must be given for X.509v3 certs unless they 391 The subjectKeyIdentifier must be given for all X.509v3 \s-1CA\s0 certs. 595 which includes the case that it is an X.509v1 certificate, 616 basicConstraints and keyUsage and X.509v1 certificates above apply to \fBall\fR
|
/freebsd-src/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.h | 195 /* X.509 Certificate - Signature: DER encoded X.509 certificate whose 199 /* DER encoded X.509 certificate revocation list */
|
/freebsd-src/contrib/wpa/src/tls/ |
H A D | x509v3.c | 2 * X.509v3 certificate parsing and processing (RFC 3280 profile) 42 * x509_certificate_free - Free an X.509 certificate 64 * x509_certificate_free - Free an X.509 certificate chain 142 * x509_name_compare - Compare X.509 certificate names 264 * TODO: should this be rejected? X.509 certificates are in x509_parse_public_key() 487 * x509_name_string - Convert an X.509 certificate name into a string 748 /* id-ce arc from X.509 for standard X.509v3 extensions */ in x509_id_ce_oid() 1397 * one of the X.509v3 extensions, so let's accept that instead in x509_parse_extension() 1517 wpa_printf(MSG_MSGDUMP, "X509: Version X.509v%d", cert->version + 1); in x509_parse_tbs_certificate() 1625 wpa_printf(MSG_DEBUG, "X509: X.509%d certificate and " in x509_parse_tbs_certificate() [all …]
|
/freebsd-src/lib/libsecureboot/ |
H A D | README.rst | 20 X.509 certificate chains offer a lot of flexibility over time and are 138 Note for the X.509 case we simply extract the 2nd last certificate
|