/freebsd/crypto/openssl/test/recipes/80-test_cmp_http_data/ |
H A D | test_verification.csv | 1 expected,description, -section,val, -recipient,val, -expect_sender,val, -srvcert,val, -trusted,val,… 24 1,explicit srvcert, -section,,,,BLANK,, -srvcert,_SERVER_CERT, -trusted,"""",BLANK,,,, -unprotected… 25 0,srvcert missing arg, -section,, -recipient,"""",BLANK,, -srvcert,, -trusted,trusted.crt,BLANK,,BL… 26 0,wrong srvcert, -section,, -recipient,"""",BLANK,, -srvcert,signer.crt, -trusted,"""",BLANK,,BLANK… 27 0,srvcert is empty file, -section,, -recipient,"""",BLANK,, -srvcert,empty.txt, -trusted,"""",BLANK… 28 0,srvcert random content, -section,, -recipient,"""",BLANK,, -srvcert,random.bin, -trusted,"""",BLA… 30 1,no -trusted but srvcert, -section,, -recipient,_CA_DN,BLANK,, -srvcert,_SERVER_CERT,BLANK,,BLANK,…
|
H A D | test_enrollment.csv | 76 …usted5.pem,, -out_trusted,issuing.crt,,BLANK,,BLANK,,,-partial_chain,-crl_check,-srvcert,server.crt
|
/freebsd/crypto/openssl/test/ |
H A D | cmp_vfy_test.c | 75 static X509 *srvcert = NULL; variable 225 || !add_trusted(fixture->cmp_ctx, srvcert)) { in test_validate_msg_signature_partial_chain() 253 fixture->cert = srvcert; in test_validate_msg_signature_srvcert() 259 wrong? clcert : srvcert)) in test_validate_msg_signature_srvcert() 352 || !TEST_true(OSSL_CMP_CTX_set1_srvCert(fixture->cmp_ctx, srvcert))) { in test_validate_with_sender() 362 return test_validate_with_sender(X509_get_subject_name(srvcert), 1); in test_validate_msg_signature_expected_sender() 412 setup_path(&fixture, srvcert /* wrong/non-root cert */, 0); in test_validate_cert_path_wrong_anchor() 561 X509_free(srvcert); in cleanup_tests() 639 if (!TEST_ptr(srvcert = load_cert_pem(server_f, libctx)) in OPT_TEST_DECLARE_USAGE()
|
/freebsd/crypto/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
H A D | test.cnf | 79 srvcert =
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-cmp.pod.in | 63 [B<-srvcert> I<filename>|I<uri>] 298 If provided and neither B<-recipient> nor B<-srvcert> is given, 425 if neither B<-recipient>, B<-srvcert>, nor B<-issuer> is given. 498 the subject of the CMP server certificate given with the B<-srvcert> option, 545 This option is ignored if the B<-srvcert> option is given as well. 546 It provides more flexibility than B<-srvcert> because the CMP protection 550 If none of B<-trusted>, B<-srvcert>, and B<-secret> is given, message validation 575 =item B<-srvcert> I<filename>|I<uri> 588 Defaults to the subject DN of the pinned B<-srvcert>, if any. 593 Note that this option gives slightly more freedom than setting the B<-srvcert>, [all …]
|
/freebsd/crypto/openssl/apps/ |
H A D | cmp.c | 1183 X509 *srvcert; in setup_verification_ctx() local 1196 srvcert = load_cert_pwd(opt_srvcert, opt_otherpass, in setup_verification_ctx() 1198 ok = srvcert != NULL && OSSL_CMP_CTX_set1_srvCert(ctx, srvcert); in setup_verification_ctx() 1199 X509_free(srvcert); in setup_verification_ctx()
|
H A D | openssl.cnf | 345 recipient = "/C=FI/O=Insta Demo/CN=Insta Demo CA" # or set srvcert or issuer
|
H A D | openssl-vms.cnf | 344 recipient = "/C=FI/O=Insta Demo/CN=Insta Demo CA" # or set srvcert or issuer
|
/freebsd/crypto/openssl/crypto/err/ |
H A D | openssl.txt | 260 CMP_R_SRVCERT_DOES_NOT_VALIDATE_MSG:151:srvcert does not validate msg
|