Home
last modified time | relevance | path

Searched refs:trusted (Results 1 – 25 of 62) sorted by relevance

123

/openssl-master/test/recipes/80-test_cmp_http_data/
A Dtest_verification.csv4 1,default test, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -unp…
6 0,recipient missing arg, -section,, -recipient,,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -…
7 …recipient name, -section,, -recipient,_CA_DN/ABC=123,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BL…
25 0,srvcert missing arg, -section,, -recipient,"""",BLANK,, -srvcert,, -trusted,trusted.crt,BLANK,,BL…
31 0,trusted missing arg, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,,BLANK,,BLANK, -unprote…
33 0,trusted empty file, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,empty.txt,BLANK,,BLANK, …
34 0,trusted random file, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,random.bin,BLANK,,BLANK…
35 0,trusted file does not exist, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,idontexist,BLAN…
37 0,untrusted missing arg, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,trusted.crt, -untrust…
42 1,ignore key usage, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,, -ignor…
[all …]
/openssl-master/test/
A Dx509aux.c38 const int trusted = (strcmp(name, PEM_STRING_X509_TRUSTED) == 0); in test_certs() local
39 d2i_X509_t d2i = trusted ? d2i_X509_AUX : d2i_X509; in test_certs()
40 i2d_X509_t i2d = trusted ? i2d_X509_AUX : i2d_X509; in test_certs()
48 if (!trusted in test_certs()
124 if (trusted) { in test_certs()
A Dverify_extra_test.c181 STACK_OF(X509) *trusted = sk_X509_new_null(); in test_self_signed()
189 ret = ret && TEST_true(sk_X509_push(trusted, cert)); in test_self_signed()
191 X509_STORE_CTX_set0_trusted_stack(ctx, trusted); in test_self_signed()
196 sk_X509_free(trusted); in test_self_signed()
/openssl-master/crypto/cmp/
A Dcmp_vfy.c231 X509_STORE *ts = ctx->trusted; in cert_acceptable()
349 && (check_cert_path(ctx, ctx->trusted, cert) in check_msg_given_cert()
383 : check_cert_path(ctx, ctx->trusted, cert)) { in check_msg_with_certs()
424 if (ctx->trusted == NULL) { in check_msg_all_certs()
428 STACK_OF(X509) *trusted = X509_STORE_get1_all_certs(ctx->trusted); in check_msg_all_certs()
429 ret = check_msg_with_certs(ctx, trusted, in check_msg_all_certs()
434 sk_X509_pop_free(trusted, X509_free); in check_msg_all_certs()
588 if (ctx->trusted != NULL) { in OSSL_CMP_validate_msg()
621 if (ctx->trusted == NULL) { in OSSL_CMP_validate_msg()
803 if (ctx->trusted != NULL) { in ossl_cmp_msg_check_update()
[all …]
A Dcmp_ctx.c32 return ctx->trusted; in OSSL_CMP_CTX_get0_trustedStore()
46 X509_STORE_free(ctx->trusted); in OSSL_CMP_CTX_set0_trustedStore()
47 ctx->trusted = store; in OSSL_CMP_CTX_set0_trustedStore()
191 X509_STORE_free(ctx->trusted); in OSSL_CMP_CTX_free()
/openssl-master/doc/man3/
A DX509_STORE_add_cert.pod51 and validating chains of certificates terminating in trusted roots.
61 no information about trusted certificates or where such certificates
62 are located on disk, and is generally not usable. Normally, trusted
74 trusted entities such as root certificate authorities (CAs).
75 OpenSSL represents these trusted certificates internally as B<X509> objects
78 The public interfaces that operate on such trusted certificates still
98 X509_STORE_load_file_ex() loads trusted certificate(s) into an
105 X509_STORE_load_path() loads trusted certificate(s) into an
110 X509_STORE_load_store_ex() loads trusted certificate(s) into an
A DPKCS7_verify.pod20 the signer's certificate. B<store> is a trusted certificate store (used for
51 the supplied trusted certificate store. Any internal certificates in the message
75 the signer's certificate) must be contained in the trusted store.
95 signer it cannot be trusted without additional evidence (such as a trusted
109 The trusted certificate store is not searched for the signers certificate,
A DCMS_verify.pod20 the signing certificate(s). B<store> is a trusted certificate store used for
44 the supplied trusted certificate store. Any internal certificates in the message
102 signer it cannot be trusted without additional evidence (such as a trusted
116 The trusted certificate store is not searched for the signing certificate,
A DOSSL_CMP_validate_msg.pod30 then all trusted certificates provided via L<OSSL_CMP_CTX_set0_trustedStore(3)>,
50 path using the given store of trusted certs (possibly including CRLs and a cert
51 verification callback) and non-trusted intermediate certs from the I<ctx>.
A DRAND_add.pod34 itself automatically using trusted system entropy sources.
42 random input obtained from polling various trusted entropy sources.
59 be a trusted entropy source. It is mixed into the internal state of the RNG as
A DX509_STORE_CTX_new.pod73 The trusted certificate store is set to I<trust_store> of type B<X509_STORE>.
74 This may be NULL because there are no trusted certificates or because
87 X509_STORE_CTX_set0_trusted_stack() sets the set of trusted certificates of
88 I<ctx> to I<sk>. This is an alternative way of specifying trusted certificates
90 or to make sure that only the given set I<sk> of certificates are trusted.
A DSSL_CTX_set_cert_store.pod30 In order to verify the certificates presented by the peer, trusted CA
35 Typically the trusted certificate store is handled indirectly via using
A DRAND_bytes.pod52 was able to seed itself from a trusted entropy source.
62 On other platforms, there might not be a trusted entropy source available
A DCMS_verify_receipt.pod20 signing certificate. B<store> is a trusted certificate store (used for chain
A DSSL_CTX_set_client_cert_cb.pod78 either adding the intermediate CA certificates into the trusted
80 CA certificates that otherwise maybe would not be trusted), or by adding
/openssl-master/apps/
A Dverify.c82 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; in verify_main()
157 if (!load_certs(opt_arg(), 0, &trusted, NULL, "trusted certificates")) in verify_main()
201 if (trusted != NULL in verify_main()
224 if (check(store, NULL, untrusted, trusted, crls, show_chain, in verify_main()
229 if (check(store, argv[i], untrusted, trusted, crls, show_chain, in verify_main()
238 sk_X509_pop_free(trusted, X509_free); in verify_main()
A Dct_log_list.cnf2 # that are to be trusted.
/openssl-master/test/recipes/80-test_cmp_http_data/Mock/
A Dtest.cnf4 trusted = trusted.crt
80 trusted =
/openssl-master/test/recipes/
A D25-test_req.t408 my $trusted = shift @_;
409 $trusted = $cert unless $trusted;
410 ok(run(app(["openssl", "verify", "-x509_strict", "-trusted", $trusted,
A D25-test_verify.t21 my ($cert, $purpose, $trusted, $untrusted, @opts) = @_;
26 for (@$trusted) { push(@args, "-trusted", srctop_file(@path, "$_.pem")) }
/openssl-master/doc/man1/
A Dopenssl-verify.pod.in16 [B<-trusted> I<filename>|I<uri>]
59 =item B<-trusted> I<filename>|I<uri>
61 A file or URI of (more or less) trusted certificates.
84 B<-trusted>, B<-untrusted> or B<-CRLfile> options.
A Dopenssl-verification-options.pod26 and ending in a certificate that due to some policy is trusted.
41 for some reason is considered trusted
54 which is a collection of certificates that are trusted for certain uses.
76 enables all uses when trusted.
166 It must be trusted for the given use.
211 Do not load the default file of trusted certificates.
215 Use the specified directory as a collection of trusted certificates,
224 Do not use the default directory of trusted certificates.
241 Do not use the default store of trusted CA certificates.
404 via B<-CAfile>, B<-CApath>, B<-CAstore> or B<-trusted> are always used
[all …]
A Dopenssl-x509.pod.in521 A B<trusted certificate> is an ordinary certificate which has several
526 must be "trusted". By default a trusted certificate must be stored
532 For example, a CA may be trusted for SSL client but not SSL server use.
544 Mark any certificate PEM output as <trusted> certificate rather than ordinary.
545 An ordinary or trusted certificate can be input but by default an ordinary
547 With the B<-trustout> option a trusted certificate is output. A trusted
557 Clears all the permitted or trusted uses of the certificate.
561 Adds a trusted certificate use.
565 enables all purposes when trusted.
730 Set a certificate to be trusted for SSL client use and change set its alias to
A Dopenssl-rand.pod.in26 seed itself successfully from a trusted operating system entropy source.
/openssl-master/doc/man7/
A DRAND.pod24 It seeds and reseeds itself automatically using trusted random sources
31 Although (re-)seeding is automatic, it can fail because no trusted random source
32 is available or the trusted source(s) temporarily fail to provide sufficient

Completed in 23 milliseconds

123