| /freebsd/crypto/openssl/test/recipes/80-test_cmp_http_data/ |
| H A D | test_verification.csv | 1 expected,description, -section,val, -recipient,val, -expect_sender,val, -srvcert,val, -trusted,val,… 4 1,default test, -section,, -recipient,_CA_DN,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -unp… 6 0,recipient missing arg, -section,, -recipient,,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BLANK, -… 7 …recipient name, -section,, -recipient,_CA_DN/ABC=123,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BL… 8 …uble '/' after value, -section,, -recipient,_CA_DN//,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BL… 9 …ipient name: missing '=', -section,, -recipient,/CDE,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BL… 10 …A v10/OU=For test purpose only/O=CMPforOpenSSL/C=DEE,BLANK,,BLANK,, -trusted,trusted.crt,BLANK,,BL… 12 …er, -section,, -recipient,_CA_DN, -expect_sender,_SERVER_DN,BLANK,, -trusted,trusted.crt,BLANK,,BL… 13 … missing arg, -section,, -recipient,_CA_DN, -expect_sender,,BLANK,, -trusted,trusted.crt,BLANK,,BL… 14 …ender,/CN=Sample Cert/OU=R&D/O=Company Ltd./L=Dublin 4/C=IE,BLANK,, -trusted,trusted.crt,BLANK,,BL… [all …]
|
| /freebsd/usr.sbin/certctl/tests/ |
| H A D | certctl_test.sh | 75 mkdir -p ${DESTDIR}${DISTBASE}/usr/share/certs/trusted 89 :>trusted.expect 94 trusted() { function 97 printf "%s\t%s\n" "${filename}" "${crtname}" >>trusted.expect 108 mv ${crtname}.crt ${DESTDIR}${DISTBASE}/usr/share/certs/trusted 109 trusted "${crtname}" "${hash}.0" 114 mv ${crtname}.crt ${DESTDIR}${DISTBASE}/usr/share/certs/trusted 115 trusted "${crtname}" "${hash}.${c}" 122 trusted "${crtname}" "${hash}.0" 131 unset -f trusted [all …]
|
| /freebsd/crypto/openssl/test/ |
| H A D | verify_extra_test.c | 184 STACK_OF(X509) *trusted = sk_X509_new_null(); in test_self_signed() 192 ret = ret && TEST_true(sk_X509_push(trusted, cert)); in test_self_signed() 194 X509_STORE_CTX_set0_trusted_stack(ctx, trusted); in test_self_signed() 199 sk_X509_free(trusted); in test_self_signed() 230 STACK_OF(X509) *trusted = sk_X509_new_null(); in do_test_purpose() 238 || !TEST_ptr(trusted) in do_test_purpose() 243 if (!TEST_true(sk_X509_push(trusted, trcert))) in do_test_purpose() 261 X509_STORE_CTX_set0_trusted_stack(ctx, trusted); in do_test_purpose() 268 OSSL_STACK_OF_X509_free(trusted); in do_test_purpose()
|
| H A D | x509aux.c | 37 const int trusted = (strcmp(name, PEM_STRING_X509_TRUSTED) == 0); in test_certs() local 38 d2i_X509_t d2i = trusted ? d2i_X509_AUX : d2i_X509; in test_certs() 39 i2d_X509_t i2d = trusted ? i2d_X509_AUX : i2d_X509; in test_certs() 47 if (!trusted in test_certs() 123 if (trusted) { in test_certs()
|
| /freebsd/sys/contrib/device-tree/Bindings/arm/firmware/ |
| H A D | tlm,trusted-foundations.txt | 5 presence by declaring a node compatible with "tlm,trusted-foundations" 9 - compatible: "tlm,trusted-foundations" 15 trusted-foundations { 16 compatible = "tlm,trusted-foundations";
|
| /freebsd/secure/caroot/ |
| H A D | Makefile | 3 SUBDIR+= trusted 13 @${MAKE} -C ${.CURDIR}/trusted ${.TARGET} 17 -t ${.CURDIR}/trusted -u ${.CURDIR}/untrusted
|
| H A D | README | 6 specifically when there is an important change to the list of trusted root 10 1) Remove the old trusted certificates (cleancerts) 15 1) Any no-longer-trusted certificates should be moved to the 33 in the trusted/ directory.
|
| H A D | ca-extract.pl | 220 my $trusted = 0; 239 $trusted++; 252 printf STDERR "## Trusted certificates: %4d\n", $trusted;
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/projectquota/ |
| H A D | projectid_003_pos.ksh | 68 log_must setfattr -n trusted.ea1 -v val1 $PRJFILE 69 log_must setfattr -n trusted.ea2 -v val2 $PRJFILE 70 log_must setfattr -n trusted.ea3 -v val3 $PRJFILE
|
| /freebsd/crypto/openssl/crypto/cmp/ |
| H A D | cmp_vfy.c | 252 X509_STORE *ts = ctx->trusted; in cert_acceptable() 371 && (check_cert_path(ctx, ctx->trusted, cert) in check_msg_given_cert() 405 : check_cert_path(ctx, ctx->trusted, cert)) { in check_msg_with_certs() 438 if (ctx->trusted == NULL) { in check_msg_all_certs() 441 STACK_OF(X509) *trusted = X509_STORE_get1_all_certs(ctx->trusted); in check_msg_all_certs() 443 ret = check_msg_with_certs(ctx, trusted, in check_msg_all_certs() 448 OSSL_STACK_OF_X509_free(trusted); in check_msg_all_certs() 597 if (ctx->trusted != NULL) { in OSSL_CMP_validate_msg() 601 if (!ossl_cmp_X509_STORE_add1_certs(ctx->trusted, certs, 0)) in OSSL_CMP_validate_msg() 630 if (ctx->trusted == NULL && ctx->secretValue != NULL) { in OSSL_CMP_validate_msg() [all …]
|
| H A D | cmp_genm.c | 247 verify_ss_cert_trans(OSSL_CMP_CTX *ctx, X509 *trusted /* may be NULL */, in verify_ss_cert_trans() argument 255 if (trusted != NULL) { in verify_ss_cert_trans() 261 || !X509_STORE_add_cert(ts, trusted)) in verify_ss_cert_trans() 275 desc, trusted == NULL ? "using trust store" : "with given certificate as trust anchor"); in verify_ss_cert_trans() 279 if (trusted != NULL) in verify_ss_cert_trans()
|
| /freebsd/release/scripts/ |
| H A D | make-oci-image.sh | 45 if [ ! -d ${rootdir}/usr/share/keys/pkg/trusted ]; then 46 mkdir -p ${rootdir}/usr/share/keys/pkg/trusted 48 for i in ${curdir}/../share/keys/pkg/trusted/pkg.*; do 49 if [ ! -f ${rootdir}/usr/share/keys/pkg/trusted/$(basename $i) ]; then 50 cp $i ${rootdir}/usr/share/keys/pkg/trusted
|
| /freebsd/usr.sbin/certctl/ |
| H A D | certctl.c | 248 static struct cert_tree trusted = RB_INITIALIZER(&trusted); variable 646 ret = read_certs(trusted_paths[i], &trusted, exclude); in load_trusted() 652 ret = read_certs(trusted_dest, &trusted, exclude); in load_trusted() 712 ret = write_certs(trusted_dest, &trusted); in save_trusted() 750 ret = write_bundle(dir, file, &trusted); in save_bundle() 802 list_certs(&trusted); in certctl_list() 803 free_certs(&trusted); in certctl_list() 855 free_certs(&trusted); in certctl_rehash() 886 ret = read_cert(argv[i], &extra, &trusted); in certctl_trust() 893 free_certs(&trusted); in certctl_trust() [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | X509_STORE_add_cert.pod | 51 and validating chains of certificates terminating in trusted roots. 61 no information about trusted certificates or where such certificates 62 are located on disk, and is generally not usable. Normally, trusted 74 trusted entities such as root certificate authorities (CAs). 75 OpenSSL represents these trusted certificates internally as B<X509> objects 78 The public interfaces that operate on such trusted certificates still 98 X509_STORE_load_file_ex() loads trusted certificate(s) into an 105 X509_STORE_load_path() loads trusted certificate(s) into an 110 X509_STORE_load_store_ex() loads trusted certificate(s) into an
|
| H A D | X509_get_default_cert_file.pod | 7 retrieve default locations for trusted CA certificates 22 to a file containing trusted CA certificates. OpenSSL will use this as 23 the default path when it is asked to load trusted CA certificates 28 list of paths to a directories containing trusted CA certificates named in the 30 asked to load trusted CA certificates from a directory and no other path is
|
| H A D | PKCS7_verify.pod | 27 the trusted certificate store to use for chain verification. 56 using the trusted certificate store I<store> if supplied. 89 the signer's certificates) must be contained in the trusted store. 109 signer it cannot be trusted without additional evidence (such as a trusted 122 The trusted certificate store is not searched for the signer's certificates.
|
| /freebsd/crypto/openssl/apps/ |
| H A D | verify.c | 93 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; in verify_main() 168 if (!load_certs(opt_arg(), 0, &trusted, NULL, "trusted certificates")) in verify_main() 212 if (trusted != NULL in verify_main() 236 if (check(store, NULL, untrusted, trusted, crls, show_chain, in verify_main() 242 if (check(store, argv[i], untrusted, trusted, crls, show_chain, in verify_main() 252 OSSL_STACK_OF_X509_free(trusted); in verify_main()
|
| /freebsd/release/packages/ucl/ |
| H A D | caroot-all.ucl | 19 comment = "Mozilla Root Store trusted TLS certificates" 22 This package contains trusted TLS certificates from the Mozilla Root Store. 24 hosts which provide a certificate signed by any of the trusted root certificate
|
| /freebsd/crypto/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
| H A D | test.cnf | 5 trusted = trusted.crt 79 trusted =
|
| /freebsd/contrib/sendmail/cf/feature/ |
| H A D | use_ct_file.m4 | 19 # if defined, the sendmail.cf will read the /etc/mail/trusted-users file to 20 # find the names of trusted users. There should only be a few of these.
|
| /freebsd/usr.sbin/pkg/ |
| H A D | pkg.c | 731 struct fingerprint_list *trusted, *revoked; in verify_signature() local 744 trusted = revoked = NULL; in verify_signature() 762 if ((trusted = load_fingerprints(path, &trusted_count)) == NULL) { in verify_signature() 767 if (trusted_count == 0 || trusted == NULL) { in verify_signature() 784 sc->trusted = false; in verify_signature() 801 STAILQ_FOREACH(fingerprint, trusted, next) { in verify_signature() 803 sc->trusted = true; in verify_signature() 809 if (sc->trusted == false) { in verify_signature() 832 if (trusted) in verify_signature() 833 free_fingerprint_list(trusted); in verify_signature()
|
| /freebsd/contrib/ntp/util/ |
| H A D | ntp-keygen-opts.def | 243 name = trusted-cert; 245 descrip = "trusted certificate (TC scheme)"; 247 Generate a trusted certificate. By default, the program generates 248 a non-trusted certificate. 491 but it is possible for a trusted agent (TA) to generate these files 493 The subject name and trusted name default to the hostname 495 It is convenient to designate the owner name and trusted name 498 while the trusted name is used for the identity files. 551 Designate one of them as the trusted host (TH) using 594 Additional information on trusted groups and identity schemes is on the [all …]
|
| H A D | invoke-ntp-keygen.texi | 225 but it is possible for a trusted agent (TA) to generate these files 227 The subject name and trusted name default to the hostname 229 It is convenient to designate the owner name and trusted name 232 while the trusted name is used for the identity files. 285 Designate one of them as the trusted host (TH) using 328 Additional information on trusted groups and identity schemes is on the 372 trusted hosts from which all other hosts derive synchronization 374 Trusted hosts have trusted certificates; 377 certificate trails to one or more trusted hosts. 378 A trusted grou [all...] |
| /freebsd/crypto/openssl/demos/guide/ |
| H A D | README.md | 24 The above assumes that your default trusted certificate store containing trusted 35 your default trusted certificate store. The CA certificate to use is also 36 available in this directory. To use it you can override the default trusted
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-verify.pod.in | 16 [B<-trusted> I<filename>|I<uri>] 59 =item B<-trusted> I<filename>|I<uri> 61 A file or URI of (more or less) trusted certificates. 84 B<-trusted>, B<-untrusted> or B<-CRLfile> options.
|