Home
last modified time | relevance | path

Searched full:509 (Results 1 – 25 of 491) sorted by relevance

12345678910>>...20

/freebsd-src/contrib/bearssl/inc/
H A Dbearssl_x509.h41 * # X.509 Certificate Chain Processing
43 * An X.509 processing engine receives an X.509 chain, chunk by chunk,
59 * **The "minimal" engine** implements minimal X.509 decoding and chain
65 * - X.509 v1, v2 and v3 certificates are supported.
125 * X.509 error codes are in the 32..63 range.
128 /** \brief X.509 status: validation was successful; this is not actually
132 /** \brief X.509 status: invalid value in an ASN.1 structure. */
135 /** \brief X.509 status: truncated certificate. */
138 /** \brief X.509 status: empty certificate chain (no certificate at all). */
141 /** \brief X.509 status: decoding error: inner element extends beyond
[all …]
/freebsd-src/crypto/openssl/doc/man7/
H A Dx509.pod5 x509 - X.509 certificate handling
13 An X.509 certificate is a structured grouping of information about
14 an individual, a device, or anything one can imagine. An X.509 CRL
17 found in the X.509 document from ITU-T, or in RFC3280 from PKIX.
34 handle X.509 certificates, with some exceptions, shown below.
37 functions handle X.509 CRLs.
H A Dossl_store.pod66 /* Print the X.509 certificate text */
68 /* Print the X.509 certificate PEM output */
/freebsd-src/crypto/heimdal/doc/doxyout/hx509/html/
H A Dindex.html3 <title>Heimdalx509library: Heimdal PKIX/X.509 library</title>
22 <h1>Heimdal PKIX/X.509 library</h1>
26 Heimdal libhx509 library is a implementation of the PKIX/X.509 and related protocols.<p>
27 PKIX/X.509 is ...<p>
29 <li><a class="el" href="page_name.html">PKIX/X.509 Names</a></li><li><a class="el" href="page_cert.…
H A Dpage_name.html3 <title>Heimdalx509library: PKIX/X.509 Names</title>
22 <h1><a class="anchor" name="page_name">PKIX/X.509 Names </a></h1>There are several names in PKIX/X.
/freebsd-src/secure/lib/libcrypto/man/man7/
H A Dx509.7140 x509 \- X.509 certificate handling
148 An X.509 certificate is a structured grouping of information about
149 an individual, a device, or anything one can imagine. An X.509 \s-1CRL\s0
152 found in the X.509 document from ITU-T, or in \s-1RFC3280\s0 from \s-1PKIX.\s0
169 handle X.509 certificates, with some exceptions, shown below.
172 functions handle X.509 CRLs.
/freebsd-src/crypto/heimdal/doc/
H A Dhx509.texi25 * hx509: (hx509). The X.509 distribution from KTH
32 @subtitle X.509 distribution from KTH
181 * What is X.509 ?::
217 @node Introduction, What is X.509 ?, Top, Top
240 hx509 (Heimdal x509 support) is a near complete X.509 stack that can
250 @node What is X.509 ?, Setting up a CA, Introduction, Top
251 @chapter What is X.509, PKIX, PKCS7 and CMS ?
253 X.509 was created by CCITT (later ITU) for the X.500 directory
254 service. Today, X.509 discussions and implementations commonly reference
255 the IETF's PKIX Certificate and CRL Profile of the X.509 v3 certificate
[all …]
H A Dlayman.asc482 on an ASN.1 value. DER is defined in Section 8.7 of X.509.
600 version component of X.509's Certificate type.
635 Example 2: X.509's Certificate type has a version component
644 the ASN.1 "module" in X.509 that defines the Certificate
675 particular algorithm in X.509's AlgorithmIdentifier type,
698 Example: X.509's AlgorithmIdentifier type has a component of
728 for digital signatures on certificates in X.509's
730 X.509's SubjectPublicKeyInfo type.
736 Example: X.509's SubjectPublicKeyInfo type has a component
798 extended certificate and an X.509 certificate in PKCS #7's
[all …]
/freebsd-src/lib/libsecureboot/efi/include/Guid/
H A DImageAuthentication.h96 /// The SHA256 hash of an X.509 certificate's To-Be-Signed contents.
107 /// The SHA384 hash of an X.509 certificate's To-Be-Signed contents.
118 /// The SHA512 hash of an X.509 certificate's To-Be-Signed contents.
181 /// This identifies a signature based on an X.509 certificate. If the signature is an X.509
183 /// key certificate in the image using certificate path verification, up to this X.509
225 /// This identifies a signature containing the SHA256 hash of an X.509 certificate's
238 /// This identifies a signature containing the SHA384 hash of an X.509 certificate's
251 /// This identifies a signature containing the SHA512 hash of an X.509 certificate's
/freebsd-src/crypto/openssl/doc/man3/
H A DX509_REQ_get_extensions.pod7 - handle X.509 extension attributes of a CSR
20 X509_REQ_get_extensions() returns the first list of X.509 extensions
25 X509_REQ_add_extensions() adds to I<req> a list of X.509 extensions I<exts>,
H A DX509V3_set_ctx.pod6 X509V3_set_issuer_pkey - X.509 v3 extension generation utilities
34 or B<X509V3_CTX_REPLACE>, which means that each X.509v3 extension added as
/freebsd-src/share/snmp/mibs/
H A DFREEBSD-MIB.txt27 "Added entries for the otherName component of a X.509 cert"
43 "Subtree for X.509 Certificate otherName entries"
52 "Entry for X.509 Certificate for NFS user@domain name"
/freebsd-src/contrib/bearssl/src/ssl/
H A Dssl_client_full.c102 * Note: the X.509 validation engine will nonetheless refuse to in br_ssl_client_init_full()
124 * X.509 engine uses SHA-256 to hash certificate DN (for in br_ssl_client_init_full()
148 * X.509 engine. in br_ssl_client_init_full()
159 * Link the X.509 engine in the SSL engine. in br_ssl_client_init_full()
/freebsd-src/crypto/heimdal/lib/hx509/
H A Ddoxygen.c34 /** @mainpage Heimdal PKIX/X.509 library
38 * Heimdal libhx509 library is a implementation of the PKIX/X.509 and
41 * PKIX/X.509 is ...
/freebsd-src/sys/contrib/device-tree/src/arm64/qcom/
H A Dsdm636.dtsi14 * 509 instead of 512 and lack of
22 /* Adreno 509 shares the frequency table with 512 */
/freebsd-src/crypto/heimdal/doc/doxyout/hx509/man/man3/
H A Dpage_name.35 page_name \- PKIX/X.509 Names
6 There are several names in PKIX/X.509, GeneralName and Name.
/freebsd-src/contrib/wpa/wpa_supplicant/examples/
H A DopenCryptoki.conf11 # Certificate Object, type = X.509 cert
14 # Certificate Object, type = X.509 cert
/freebsd-src/crypto/openssl/doc/internal/man3/
H A Dx509v3_cache_extensions.pod6 - cache info on various X.509v3 extensions and further derived certificate data
18 for instance whether the certificate is self-issued or has version X.509v1.
/freebsd-src/crypto/openssl/doc/man1/
H A Dopenssl-verification-options.pod5 openssl-verification-options - generic X.509 certificate verification options
16 There are many situations where X.509 certificates are verified
67 (EKUs) that may be given in X.509 extensions of end-entity certificates.
217 Files should be named with the hash value of the X.509 SubjectName of each
317 The authorityKeyIdentifier must be given for X.509v3 certs unless they
322 The subjectKeyIdentifier must be given for all X.509v3 CA certs.
563 which includes the case that it is an X.509v1 certificate,
582 basicConstraints and keyUsage and X.509v1 certificates above apply to B<all>
H A Dopenssl-x509.pod.in132 X.509 extensions included in a certificate input are not copied by default.
133 X.509 extensions to be added can be specified using the B<-extfile> option.
141 X.509 extensions included in the request are not copied by default.
142 X.509 extensions to be added can be specified using the B<-extfile> option.
146 Determines how to handle X.509 extensions
429 Configuration file containing certificate and request X.509 extensions to add.
433 The section in the extfile to add X.509 extensions from.
754 wrong private key, using unsuitable X.509 extensions,
/freebsd-src/secure/usr.bin/openssl/man/
H A Dopenssl-x509.1261 X.509 extensions included in a certificate input are not copied by default.
262 X.509 extensions to be added can be specified using the \fB\-extfile\fR option.
269 X.509 extensions included in the request are not copied by default.
270 X.509 extensions to be added can be specified using the \fB\-extfile\fR option.
273 Determines how to handle X.509 extensions
501 Configuration file containing certificate and request X.509 extensions to add.
504 The section in the extfile to add X.509 extensions from.
806 wrong private key, using unsuitable X.509 extensions,
H A Dopenssl-verification-options.1140 openssl\-verification\-options \- generic X.509 certificate verification options
149 There are many situations where X.509 certificates are verified
199 (EKUs) that may be given in X.509 extensions of end-entity certificates.
321 Files should be named with the hash value of the X.509 SubjectName of each
388 The authorityKeyIdentifier must be given for X.509v3 certs unless they
391 The subjectKeyIdentifier must be given for all X.509v3 \s-1CA\s0 certs.
595 which includes the case that it is an X.509v1 certificate,
616 basicConstraints and keyUsage and X.509v1 certificates above apply to \fBall\fR
/freebsd-src/contrib/wpa/src/eap_common/
H A Dikev2_common.h195 /* X.509 Certificate - Signature: DER encoded X.509 certificate whose
199 /* DER encoded X.509 certificate revocation list */
/freebsd-src/contrib/wpa/src/tls/
H A Dx509v3.c2 * X.509v3 certificate parsing and processing (RFC 3280 profile)
42 * x509_certificate_free - Free an X.509 certificate
64 * x509_certificate_free - Free an X.509 certificate chain
142 * x509_name_compare - Compare X.509 certificate names
264 * TODO: should this be rejected? X.509 certificates are in x509_parse_public_key()
487 * x509_name_string - Convert an X.509 certificate name into a string
748 /* id-ce arc from X.509 for standard X.509v3 extensions */ in x509_id_ce_oid()
1397 * one of the X.509v3 extensions, so let's accept that instead in x509_parse_extension()
1517 wpa_printf(MSG_MSGDUMP, "X509: Version X.509v%d", cert->version + 1); in x509_parse_tbs_certificate()
1625 wpa_printf(MSG_DEBUG, "X509: X.509%d certificate and " in x509_parse_tbs_certificate()
[all …]
/freebsd-src/lib/libsecureboot/
H A DREADME.rst20 X.509 certificate chains offer a lot of flexibility over time and are
138 Note for the X.509 case we simply extract the 2nd last certificate

12345678910>>...20