Lines Matching refs:CA
23 This system is about trust. In your local CA certificate store you have certs
38 by using a CA certificate store that the SSL library can use to make sure the
45 If the remote server uses a self-signed certificate, if you don't install a CA
46 cert store, if the server uses a certificate signed by a CA that isn't
56 2. Get a CA certificate that can verify the remote server and use the proper
57 option to point out this CA cert for verification when connecting. For
62 3. Add the CA cert for your server to the existing default CA certificate
63 store. The default CA certificate store can be changed at compile time with
66 --with-ca-bundle=FILE: use the specified file as CA certificate store. CA
69 --with-ca-path=PATH: use the specified path as CA certificate store. CA
79 If you use Internet Explorer, this is one way to get extract the CA cert
83 - Find out where the CA certificate is kept (Certificate>
89 - Add the 'outcert.pem' to the CA certificate store or use it stand-alone
92 If you use the 'openssl' tool, this is one way to get extract the CA cert
102 - If you want to trust the certificate, you can add it to your CA
106 4. If you're using the curl command line tool, you can specify your own CA
111 for a CA cert file named "curl-ca-bundle.crt" in these directories and in
119 5. Get a better/different/newer CA cert bundle! One option is to extract the
122 way for you: [CA Extract](https://curl.haxx.se/docs/caextract.html)
125 certificate that isn't signed by one of the certificates in the installed CA
135 CA cert db. RedHat ships with an additional module, libnsspem.so, which
136 enables NSS to read the OpenSSL PEM CA bundle. On openSUSE you can install
137 p11-kit-nss-trust which makes NSS use the system wide CA certificate store. NSS
153 peer certificate verification, but instead of using a CA cert bundle, it will