Lightweight client for the RFC8555 ACMEv2 protocol, written in plain C with minimal dependencies (libcurl and one of GnuTLS, OpenSSL or mbedTLS). The ACMEv2 protocol allows a Certificate Authority (Let's Encrypt is a popular one) and an applicant to automate the process of verification and certificate issuance. The protocol also provides facilities for other certificate management functions, such as certificate revocation.
OS | Architecture | Version |
---|---|---|
NetBSD 10.0 | aarch64 | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | aarch64 | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | aarch64eb | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | aarch64eb | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | alpha | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | alpha | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | earmv6hf | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | earmv6hf | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | earmv7hf | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | earmv7hf | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | i386 | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | i386 | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | sparc64 | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | sparc64 | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | sparc | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | x86_64 | uacme-1.7.5nb2.tgz |
NetBSD 10.0 | x86_64 | uacme-1.7.5nb2.tgz |
NetBSD 9.0 | aarch64 | uacme-1.7.5nb2.tgz |
NetBSD 9.0 | aarch64 | uacme-1.7.5nb2.tgz |
NetBSD 9.0 | earmv6hf | uacme-1.7.5nb2.tgz |
NetBSD 9.0 | earmv6hf | uacme-1.7.5nb2.tgz |
NetBSD 9.0 | earmv7hf | uacme-1.7.5nb2.tgz |
NetBSD 9.0 | earmv7hf | uacme-1.7.5nb2.tgz |
NetBSD 9.0 | i386 | uacme-1.7.5nb2.tgz |
NetBSD 9.0 | i386 | uacme-1.7.5nb2.tgz |
NetBSD 9.0 | sparc64 | uacme-1.7.5nb2.tgz |
NetBSD 9.0 | x86_64 | uacme-1.7.5nb2.tgz |
NetBSD 9.0 | x86_64 | uacme-1.7.5nb2.tgz |
NetBSD 9.3 | x86_64 | uacme-1.7.5nb2.tgz |
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.