/freebsd/crypto/openssl/test/recipes/80-test_cmp_http_data/ |
H A D | test_verification.csv | 1 expected,description, -section,val, -recipient,val, -expect_sender,val, -srvcert,val, -trusted,val,… 4 1,default test, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -unp… 6 0,recipient missing arg, -section,, -recipient,,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -… 7 …recipient name, -section,, -recipient,_CA_DN/ABC=123,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BL… 8 …uble '/' after value, -section,, -recipient,_CA_DN//,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BL… 9 …ipient name: missing '=', -section,, -recipient,/CDE,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BL… 10 …A v10/OU=For test purpose only/O=CMPforOpenSSL/C=DEE,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BL… 12 …er, -section,, -recipient,_CA_DN, -expect_sender,_SERVER_DN,BLANK,, -trusted,trusted.crt,BLANK,,BL… 13 … missing arg, -section,, -recipient,_CA_DN, -expect_sender,,BLANK,, -trusted,trusted.crt,BLANK,,BL… 14 …ender,/CN=Sample Cert/OU=R&D/O=Company Ltd./L=Dublin 4/C=IE,BLANK,, -trusted,trusted.crt,BLANK,,BL… [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | verify_extra_test.c | 184 STACK_OF(X509) *trusted = sk_X509_new_null(); in test_self_signed() 192 ret = ret && TEST_true(sk_X509_push(trusted, cert)); in test_self_signed() 194 X509_STORE_CTX_set0_trusted_stack(ctx, trusted); in test_self_signed() 199 sk_X509_free(trusted); in test_self_signed() 230 STACK_OF(X509) *trusted = sk_X509_new_null(); in do_test_purpose() 238 || !TEST_ptr(trusted) in do_test_purpose() 244 if (!TEST_true(sk_X509_push(trusted, trcert))) in do_test_purpose() 262 X509_STORE_CTX_set0_trusted_stack(ctx, trusted); in do_test_purpose() 269 sk_X509_pop_free(trusted, X509_free); in do_test_purpose()
|
H A D | x509aux.c | 38 const int trusted = (strcmp(name, PEM_STRING_X509_TRUSTED) == 0); in test_certs() local 39 d2i_X509_t d2i = trusted ? d2i_X509_AUX : d2i_X509; in test_certs() 40 i2d_X509_t i2d = trusted ? i2d_X509_AUX : i2d_X509; in test_certs() 48 if (!trusted in test_certs() 124 if (trusted) { in test_certs()
|
/freebsd/sys/contrib/device-tree/Bindings/arm/firmware/ |
H A D | tlm,trusted-foundations.txt | 5 presence by declaring a node compatible with "tlm,trusted-foundations" 9 - compatible: "tlm,trusted-foundations" 15 trusted-foundations { 16 compatible = "tlm,trusted-foundations";
|
/freebsd/crypto/openssl/crypto/cmp/ |
H A D | cmp_vfy.c | 231 X509_STORE *ts = ctx->trusted; in cert_acceptable() 349 && (check_cert_path(ctx, ctx->trusted, cert) in check_msg_given_cert() 383 : check_cert_path(ctx, ctx->trusted, cert)) { in check_msg_with_certs() 424 if (ctx->trusted == NULL) { in check_msg_all_certs() 428 STACK_OF(X509) *trusted = X509_STORE_get1_all_certs(ctx->trusted); in check_msg_all_certs() 429 ret = check_msg_with_certs(ctx, trusted, in check_msg_all_certs() 434 sk_X509_pop_free(trusted, X509_free); in check_msg_all_certs() 589 if (ctx->trusted != NULL) { in OSSL_CMP_validate_msg() 593 if (!ossl_cmp_X509_STORE_add1_certs(ctx->trusted, certs, 0)) in OSSL_CMP_validate_msg() 622 if (ctx->trusted == NULL && ctx->secretValue != NULL) { in OSSL_CMP_validate_msg() [all …]
|
/freebsd/secure/caroot/ |
H A D | Makefile | 3 SUBDIR+= trusted 13 @${MAKE} -C ${.CURDIR}/trusted ${.TARGET} 16 perl ${.CURDIR}/MAca-bundle.pl -i certdata.txt -o ${.CURDIR}/trusted
|
H A D | README | 6 specifically when there is an important change to the list of trusted root 10 1) Remove the old trusted certificates (cleancerts) 15 1) Any no-longer-trusted certificates should be moved to the 33 in the trusted/ directory.
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/projectquota/ |
H A D | projectid_003_pos.ksh | 67 log_must setfattr -n trusted.ea1 -v val1 $PRJFILE 68 log_must setfattr -n trusted.ea2 -v val2 $PRJFILE 69 log_must setfattr -n trusted.ea3 -v val3 $PRJFILE
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | X509_STORE_add_cert.pod | 51 and validating chains of certificates terminating in trusted roots. 61 no information about trusted certificates or where such certificates 62 are located on disk, and is generally not usable. Normally, trusted 74 trusted entities such as root certificate authorities (CAs). 75 OpenSSL represents these trusted certificates internally as B<X509> objects 78 The public interfaces that operate on such trusted certificates still 98 X509_STORE_load_file_ex() loads trusted certificate(s) into an 105 X509_STORE_load_path() loads trusted certificate(s) into an 110 X509_STORE_load_store_ex() loads trusted certificate(s) into an
|
H A D | PKCS7_verify.pod | 25 the trusted certificate store to use for chain verification. 54 using the trusted certificate store I<store> if supplied. 87 the signer's certificates) must be contained in the trusted store. 107 signer it cannot be trusted without additional evidence (such as a trusted 120 The trusted certificate store is not searched for the signer's certificates.
|
H A D | CMS_verify.pod | 26 the trusted certificate store to use for chain verification. 49 using the trusted certificate store I<store> if supplied. 110 signer it cannot be trusted without additional evidence (such as a trusted 123 The trusted certificate store is not searched for the signing certificate.
|
H A D | OSSL_CMP_validate_msg.pod | 33 then all trusted certificates provided via L<OSSL_CMP_CTX_set0_trustedStore(3)>, 56 path using the given store of trusted certs (possibly including CRLs and a cert 57 verification callback) and non-trusted intermediate certs from the I<ctx>.
|
/freebsd/crypto/openssl/apps/ |
H A D | verify.c | 82 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; in verify_main() 157 if (!load_certs(opt_arg(), 0, &trusted, NULL, "trusted certificates")) in verify_main() 201 if (trusted != NULL in verify_main() 224 if (check(store, NULL, untrusted, trusted, crls, show_chain, in verify_main() 229 if (check(store, argv[i], untrusted, trusted, crls, show_chain, in verify_main() 238 sk_X509_pop_free(trusted, X509_free); in verify_main()
|
/freebsd/release/scripts/ |
H A D | make-oci-image.sh | 42 if [ ! -d ${rootdir}/usr/share/keys/pkg/trusted ]; then 43 mkdir -p ${rootdir}/usr/share/keys/pkg/trusted 45 cp /usr/share/keys/pkg/trusted/* ${rootdir}/usr/share/keys/pkg/trusted
|
/freebsd/crypto/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
H A D | test.cnf | 4 trusted = trusted.crt 80 trusted =
|
/freebsd/contrib/sendmail/cf/feature/ |
H A D | use_ct_file.m4 | 19 # if defined, the sendmail.cf will read the /etc/mail/trusted-users file to 20 # find the names of trusted users. There should only be a few of these.
|
/freebsd/usr.sbin/pkg/ |
H A D | pkg.c | 725 struct fingerprint_list *trusted, *revoked; in verify_signature() local 738 trusted = revoked = NULL; in verify_signature() 755 snprintf(path, MAXPATHLEN, "%s/trusted", fingerprints); in verify_signature() 756 if ((trusted = load_fingerprints(path, &trusted_count)) == NULL) { in verify_signature() 757 warnx("Error loading trusted certificates"); in verify_signature() 761 if (trusted_count == 0 || trusted == NULL) { in verify_signature() 762 fprintf(stderr, "No trusted certificates found.\n"); in verify_signature() 777 /* Explicitly mark as non-trusted until proven otherwise. */ in verify_signature() 778 sc->trusted = false; in verify_signature() 795 STAILQ_FOREACH(fingerprint, trusted, nex in verify_signature() [all...] |
/freebsd/contrib/ntp/util/ |
H A D | ntp-keygen-opts.def | 243 name = trusted-cert; 245 descrip = "trusted certificate (TC scheme)"; 247 Generate a trusted certificate. By default, the program generates 248 a non-trusted certificate. 491 but it is possible for a trusted agent (TA) to generate these files 493 The subject name and trusted name default to the hostname 495 It is convenient to designate the owner name and trusted name 498 while the trusted name is used for the identity files. 551 Designate one of them as the trusted host (TH) using 594 Additional information on trusted groups and identity schemes is on the [all …]
|
H A D | invoke-ntp-keygen.texi | 225 but it is possible for a trusted agent (TA) to generate these files 227 The subject name and trusted name default to the hostname 229 It is convenient to designate the owner name and trusted name 232 while the trusted name is used for the identity files. 285 Designate one of them as the trusted host (TH) using 328 Additional information on trusted groups and identity schemes is on the 372 trusted hosts from which all other hosts derive synchronization 374 Trusted hosts have trusted certificates; 377 certificate trails to one or more trusted hosts. 378 A trusted grou [all...] |
/freebsd/crypto/openssl/test/recipes/ |
H A D | 25-test_req.t | 420 my $trusted = shift @_; 421 $trusted = $cert unless $trusted; 422 ok(run(app(["openssl", "verify", "-x509_strict", "-trusted", $trusted,
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-verify.pod.in | 16 [B<-trusted> I<filename>|I<uri>] 59 =item B<-trusted> I<filename>|I<uri> 61 A file or URI of (more or less) trusted certificates. 84 B<-trusted>, B<-untrusted> or B<-CRLfile> options.
|
H A D | openssl-verification-options.pod | 26 and ending in a certificate that due to some policy is trusted. 42 for some reason is considered trusted 55 which is a collection of certificates that are trusted for certain uses. 77 enables all uses when trusted. 168 It must be trusted for the given use. 213 Do not load the default file of trusted certificates. 217 Use the specified directory as a collection of trusted certificates, 226 Do not use the default directory of trusted certificates. 243 Do not use the default store of trusted CA certificates. 373 I<trust anchor>, which is either directly trusted or validated by means [all …]
|
/freebsd/share/examples/etc/ |
H A D | README.examples | 26 hosts.allow - defines allow trusted hosts 27 hosts.equiv - defines system-wide trusted hosts (see ruserok(3)) 28 hosts.lpd - defines trusted hosts for lpd(8)
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | RAND.pod | 24 It seeds and reseeds itself automatically using trusted random sources 31 Although (re-)seeding is automatic, it can fail because no trusted random source 32 is available or the trusted source(s) temporarily fail to provide sufficient
|
/freebsd/share/keys/pkg/ |
H A D | Makefile | 1 SUBDIR= trusted
|