/openssl-master/test/recipes/80-test_cmp_http_data/ |
A D | test_verification.csv | 4 1,default test, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -unp… 6 0,recipient missing arg, -section,, -recipient,,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -… 7 …recipient name, -section,, -recipient,_CA_DN/ABC=123,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BL… 25 0,srvcert missing arg, -section,, -recipient,"""",BLANK,, -srvcert,, -trusted,trusted.crt,BLANK,,BL… 31 0,trusted missing arg, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,,BLANK,,BLANK, -unprote… 33 0,trusted empty file, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,empty.txt,BLANK,,BLANK, … 34 0,trusted random file, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,random.bin,BLANK,,BLANK… 35 0,trusted file does not exist, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,idontexist,BLAN… 37 0,untrusted missing arg, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,trusted.crt, -untrust… 42 1,ignore key usage, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,, -ignor… [all …]
|
/openssl-master/test/ |
A D | x509aux.c | 38 const int trusted = (strcmp(name, PEM_STRING_X509_TRUSTED) == 0); in test_certs() local 39 d2i_X509_t d2i = trusted ? d2i_X509_AUX : d2i_X509; in test_certs() 40 i2d_X509_t i2d = trusted ? i2d_X509_AUX : i2d_X509; in test_certs() 48 if (!trusted in test_certs() 124 if (trusted) { in test_certs()
|
A D | verify_extra_test.c | 181 STACK_OF(X509) *trusted = sk_X509_new_null(); in test_self_signed() 189 ret = ret && TEST_true(sk_X509_push(trusted, cert)); in test_self_signed() 191 X509_STORE_CTX_set0_trusted_stack(ctx, trusted); in test_self_signed() 196 sk_X509_free(trusted); in test_self_signed()
|
/openssl-master/crypto/cmp/ |
A D | cmp_vfy.c | 231 X509_STORE *ts = ctx->trusted; in cert_acceptable() 349 && (check_cert_path(ctx, ctx->trusted, cert) in check_msg_given_cert() 383 : check_cert_path(ctx, ctx->trusted, cert)) { in check_msg_with_certs() 424 if (ctx->trusted == NULL) { in check_msg_all_certs() 428 STACK_OF(X509) *trusted = X509_STORE_get1_all_certs(ctx->trusted); in check_msg_all_certs() 429 ret = check_msg_with_certs(ctx, trusted, in check_msg_all_certs() 434 sk_X509_pop_free(trusted, X509_free); in check_msg_all_certs() 588 if (ctx->trusted != NULL) { in OSSL_CMP_validate_msg() 621 if (ctx->trusted == NULL) { in OSSL_CMP_validate_msg() 803 if (ctx->trusted != NULL) { in ossl_cmp_msg_check_update() [all …]
|
A D | cmp_ctx.c | 32 return ctx->trusted; in OSSL_CMP_CTX_get0_trustedStore() 46 X509_STORE_free(ctx->trusted); in OSSL_CMP_CTX_set0_trustedStore() 47 ctx->trusted = store; in OSSL_CMP_CTX_set0_trustedStore() 191 X509_STORE_free(ctx->trusted); in OSSL_CMP_CTX_free()
|
/openssl-master/doc/man3/ |
A D | X509_STORE_add_cert.pod | 51 and validating chains of certificates terminating in trusted roots. 61 no information about trusted certificates or where such certificates 62 are located on disk, and is generally not usable. Normally, trusted 74 trusted entities such as root certificate authorities (CAs). 75 OpenSSL represents these trusted certificates internally as B<X509> objects 78 The public interfaces that operate on such trusted certificates still 98 X509_STORE_load_file_ex() loads trusted certificate(s) into an 105 X509_STORE_load_path() loads trusted certificate(s) into an 110 X509_STORE_load_store_ex() loads trusted certificate(s) into an
|
A D | PKCS7_verify.pod | 20 the signer's certificate. B<store> is a trusted certificate store (used for 51 the supplied trusted certificate store. Any internal certificates in the message 75 the signer's certificate) must be contained in the trusted store. 95 signer it cannot be trusted without additional evidence (such as a trusted 109 The trusted certificate store is not searched for the signers certificate,
|
A D | CMS_verify.pod | 20 the signing certificate(s). B<store> is a trusted certificate store used for 44 the supplied trusted certificate store. Any internal certificates in the message 102 signer it cannot be trusted without additional evidence (such as a trusted 116 The trusted certificate store is not searched for the signing certificate,
|
A D | OSSL_CMP_validate_msg.pod | 30 then all trusted certificates provided via L<OSSL_CMP_CTX_set0_trustedStore(3)>, 50 path using the given store of trusted certs (possibly including CRLs and a cert 51 verification callback) and non-trusted intermediate certs from the I<ctx>.
|
A D | RAND_add.pod | 34 itself automatically using trusted system entropy sources. 42 random input obtained from polling various trusted entropy sources. 59 be a trusted entropy source. It is mixed into the internal state of the RNG as
|
A D | X509_STORE_CTX_new.pod | 73 The trusted certificate store is set to I<trust_store> of type B<X509_STORE>. 74 This may be NULL because there are no trusted certificates or because 87 X509_STORE_CTX_set0_trusted_stack() sets the set of trusted certificates of 88 I<ctx> to I<sk>. This is an alternative way of specifying trusted certificates 90 or to make sure that only the given set I<sk> of certificates are trusted.
|
A D | SSL_CTX_set_cert_store.pod | 30 In order to verify the certificates presented by the peer, trusted CA 35 Typically the trusted certificate store is handled indirectly via using
|
A D | RAND_bytes.pod | 52 was able to seed itself from a trusted entropy source. 62 On other platforms, there might not be a trusted entropy source available
|
A D | CMS_verify_receipt.pod | 20 signing certificate. B<store> is a trusted certificate store (used for chain
|
A D | SSL_CTX_set_client_cert_cb.pod | 78 either adding the intermediate CA certificates into the trusted 80 CA certificates that otherwise maybe would not be trusted), or by adding
|
/openssl-master/apps/ |
A D | verify.c | 82 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; in verify_main() 157 if (!load_certs(opt_arg(), 0, &trusted, NULL, "trusted certificates")) in verify_main() 201 if (trusted != NULL in verify_main() 224 if (check(store, NULL, untrusted, trusted, crls, show_chain, in verify_main() 229 if (check(store, argv[i], untrusted, trusted, crls, show_chain, in verify_main() 238 sk_X509_pop_free(trusted, X509_free); in verify_main()
|
A D | ct_log_list.cnf | 2 # that are to be trusted.
|
/openssl-master/test/recipes/80-test_cmp_http_data/Mock/ |
A D | test.cnf | 4 trusted = trusted.crt 80 trusted =
|
/openssl-master/test/recipes/ |
A D | 25-test_req.t | 408 my $trusted = shift @_; 409 $trusted = $cert unless $trusted; 410 ok(run(app(["openssl", "verify", "-x509_strict", "-trusted", $trusted,
|
A D | 25-test_verify.t | 21 my ($cert, $purpose, $trusted, $untrusted, @opts) = @_; 26 for (@$trusted) { push(@args, "-trusted", srctop_file(@path, "$_.pem")) }
|
/openssl-master/doc/man1/ |
A D | openssl-verify.pod.in | 16 [B<-trusted> I<filename>|I<uri>] 59 =item B<-trusted> I<filename>|I<uri> 61 A file or URI of (more or less) trusted certificates. 84 B<-trusted>, B<-untrusted> or B<-CRLfile> options.
|
A D | openssl-verification-options.pod | 26 and ending in a certificate that due to some policy is trusted. 41 for some reason is considered trusted 54 which is a collection of certificates that are trusted for certain uses. 76 enables all uses when trusted. 166 It must be trusted for the given use. 211 Do not load the default file of trusted certificates. 215 Use the specified directory as a collection of trusted certificates, 224 Do not use the default directory of trusted certificates. 241 Do not use the default store of trusted CA certificates. 404 via B<-CAfile>, B<-CApath>, B<-CAstore> or B<-trusted> are always used [all …]
|
A D | openssl-x509.pod.in | 521 A B<trusted certificate> is an ordinary certificate which has several 526 must be "trusted". By default a trusted certificate must be stored 532 For example, a CA may be trusted for SSL client but not SSL server use. 544 Mark any certificate PEM output as <trusted> certificate rather than ordinary. 545 An ordinary or trusted certificate can be input but by default an ordinary 547 With the B<-trustout> option a trusted certificate is output. A trusted 557 Clears all the permitted or trusted uses of the certificate. 561 Adds a trusted certificate use. 565 enables all purposes when trusted. 730 Set a certificate to be trusted for SSL client use and change set its alias to
|
A D | openssl-rand.pod.in | 26 seed itself successfully from a trusted operating system entropy source.
|
/openssl-master/doc/man7/ |
A D | RAND.pod | 24 It seeds and reseeds itself automatically using trusted random sources 31 Although (re-)seeding is automatic, it can fail because no trusted random source 32 is available or the trusted source(s) temporarily fail to provide sufficient
|