| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 80-test_ocsp.t | 32 my $untrusted = shift; 33 if ($untrusted eq "") { 34 $untrusted = $CAfile; 45 "-verify_other", catfile($ocspdir, $untrusted),
|
| 60-test_x509_store.t | 29 my ($cert, $purpose, $trustedpath, $untrusted, @opts) = @_; 34 for (@$untrusted) { push(@args, "-untrusted", srctop_file(@path, "$_.pem")) }
|
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 60-test_x509_store.t | 29 my ($cert, $purpose, $trustedpath, $untrusted, @opts) = @_; 34 for (@$untrusted) { push(@args, "-untrusted", srctop_file(@path, "$_.pem")) }
|
| 80-test_ocsp.t | 34 my $untrusted = shift; 35 if ($untrusted eq "") { 36 $untrusted = $CAfile; 49 "-verify_other", catfile($ocspdir, $untrusted),
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 60-test_x509_store.t | 29 my ($cert, $purpose, $trustedpath, $untrusted, @opts) = @_; 34 for (@$untrusted) { push(@args, "-untrusted", srctop_file(@path, "$_.pem")) }
|
| 80-test_ocsp.t | 33 my $untrusted = shift; 34 if ($untrusted eq "") { 35 $untrusted = $CAfile; 48 "-verify_other", catfile($ocspdir, $untrusted),
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| verify_extra_test.c | 103 * leaf and subinterCA are in the untrusted list (untrusted.pem) 115 STACK_OF(X509) *untrusted = NULL; 131 untrusted = load_certs_from_file(untrusted_f); 143 if (!X509_STORE_CTX_init(sctx, store, x, untrusted)) 155 if (!X509_STORE_CTX_init(sctx, store, x, untrusted)) 168 sk_X509_pop_free(untrusted, X509_free); 245 STACK_OF(X509) *untrusted = sk_X509_new_null(); 253 || !TEST_ptr(untrusted) 261 if (!TEST_true(sk_X509_push(untrusted, untrcert)) [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| verify_extra_test.c | 54 * leaf and subinterCA are in the untrusted list (untrusted.pem) 66 STACK_OF(X509) *untrusted = NULL; 81 untrusted = load_certs_pem(untrusted_f); 90 if (!X509_STORE_CTX_init(sctx, store, x, untrusted)) 102 OSSL_STACK_OF_X509_free(untrusted); 231 STACK_OF(X509) *untrusted = sk_X509_new_null(); 239 || !TEST_ptr(untrusted) 246 if (!TEST_true(sk_X509_push(untrusted, untrcert))) 250 if (!TEST_true(X509_STORE_CTX_init(ctx, NULL, eecert, untrusted))) [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| verify_extra_test.c | 54 * leaf and subinterCA are in the untrusted list (untrusted.pem) 66 STACK_OF(X509) *untrusted = NULL; 81 untrusted = load_certs_pem(untrusted_f); 90 if (!X509_STORE_CTX_init(sctx, store, x, untrusted)) 102 sk_X509_pop_free(untrusted, X509_free); 231 STACK_OF(X509) *untrusted = sk_X509_new_null(); 239 || !TEST_ptr(untrusted) 247 if (!TEST_true(sk_X509_push(untrusted, untrcert))) 251 if (!TEST_true(X509_STORE_CTX_init(ctx, NULL, eecert, untrusted))) [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/ts/ |
| ts_rsp_verify.c | 19 static int ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, 92 STACK_OF(X509) *untrusted = NULL; 129 untrusted = sk_X509_new_reserve(NULL, sk_X509_num(certs) + sk_X509_num(token->d.sign->cert)); 130 if (untrusted == NULL 131 || !X509_add_certs(untrusted, certs, 0) 132 || !X509_add_certs(untrusted, token->d.sign->cert, 0)) 134 if (!ts_verify_cert(store, untrusted, signer, &chain)) 160 sk_X509_free(untrusted); 171 static int ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, 184 if (!X509_STORE_CTX_init(cert_ctx, store, signer, untrusted)) [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/ts/ |
| ts_rsp_verify.c | 19 static int ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, 93 STACK_OF(X509) *untrusted = NULL; 130 untrusted = sk_X509_new_reserve(NULL, sk_X509_num(certs) 132 if (untrusted == NULL 133 || !X509_add_certs(untrusted, certs, 0) 134 || !X509_add_certs(untrusted, token->d.sign->cert, 0)) 136 if (!ts_verify_cert(store, untrusted, signer, &chain)) 160 sk_X509_free(untrusted); 171 static int ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, 184 if (!X509_STORE_CTX_init(cert_ctx, store, signer, untrusted)) [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/cmp/ |
| cmp_genm.c | 190 STACK_OF(X509) *untrusted = X509_STORE_CTX_get0_untrusted(store_ctx); 195 for (i = 0; i < sk_X509_num(untrusted); i++) { 196 cert = sk_X509_value(untrusted, i); 224 X509_STORE *ts, STACK_OF(X509) *untrusted, 236 || !X509_STORE_CTX_init(csc, ts, target, untrusted)) 248 X509 *trans /* the only untrusted cert, may be NULL */, 252 STACK_OF(X509) *untrusted = NULL; 266 && !ossl_x509_add_cert_new(&untrusted, trans, X509_ADD_FLAG_UP_REF)) 271 ts, untrusted, target); 278 sk_X509_pop_free(untrusted, X509_free) [all...] |
| cmp_vfy.c | 127 cert, ctx->untrusted)) 416 * Verify msg trying first ctx->untrusted, which should include extraCerts 434 if (check_msg_with_certs(ctx, ctx->untrusted, "untrusted certs", 446 msg->extraCerts, ctx->untrusted, 546 * else it is searched in msg->extraCerts, ctx->untrusted, in ctx->trusted 681 * Any msg->extraCerts are prepended to ctx->untrusted. 752 num_untrusted = ctx->untrusted == NULL ? 0 : sk_X509_num(ctx->untrusted); 753 res = ossl_x509_add_certs_new(&ctx->untrusted, msg->extraCerts [all...] |
| cmp_ctx.c | 65 DEFINE_OSSL_CMP_CTX_get0(untrusted, STACK_OF(X509)) 68 * Set untrusted certificates for path construction in authentication of 73 STACK_OF(X509) *untrusted = NULL; 79 if (!ossl_x509_add_certs_new(&untrusted, certs, 82 OSSL_STACK_OF_X509_free(ctx->untrusted); 83 ctx->untrusted = untrusted; 86 OSSL_STACK_OF_X509_free(untrusted); 128 if ((ctx->untrusted = sk_X509_new_null()) == NULL) { 214 OSSL_STACK_OF_X509_free(ctx->untrusted); [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| verify.c | 47 {"untrusted", OPT_UNTRUSTED, '<', "A file of untrusted certificates"}, 66 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; 124 if (!load_certs(opt_arg(), &untrusted, FORMAT_PEM, NULL, 125 "untrusted certificates")) 186 if (check(store, NULL, untrusted, trusted, crls, show_chain) != 1) 190 if (check(store, argv[i], untrusted, trusted, crls, 198 sk_X509_pop_free(untrusted, X509_free); 254 printf(" (untrusted)");
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/ocsp/ |
| ocsp_vfy.c | 35 STACK_OF(X509) *untrusted = NULL; 67 untrusted = NULL; 69 untrusted = sk_X509_dup(bs->certs); 71 if (!sk_X509_push(untrusted, sk_X509_value(certs, i))) { 77 untrusted = certs; 79 untrusted = bs->certs; 81 init_res = X509_STORE_CTX_init(ctx, st, signer, untrusted); 130 sk_X509_free(untrusted);
|
| /src/tests/usr.sbin/certctl/ |
| t_certctl.sh | 30 CERTCTL="certctl -C certs.conf -c certs -u untrusted" 171 atf_check -s exit:0 test -e "untrusted/$diginotar_base" 172 atf_check -s exit:0 test -h "untrusted/$diginotar_base" 180 atf_check -s exit:0 test ! -e "untrusted/$diginotar_base" 181 atf_check -s exit:0 test ! -h "untrusted/$diginotar_base" 191 atf_check -s exit:0 test -e "untrusted/$diginotar_base" 192 atf_check -s exit:0 test -h "untrusted/$diginotar_base" 291 atf_check -s exit:0 -o not-match:bogus $CERTCTL untrusted 320 evildistrustdir=$(printf '-evil untrusted\n.') 331 atf_check -s exit:0 test ! -e untrusted [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/ocsp/ |
| ocsp_vfy.c | 32 STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) 42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) { 103 STACK_OF(X509) *untrusted = NULL; 118 if ((untrusted = sk_X509_dup(bs->certs)) == NULL) 120 if (!X509_add_certs(untrusted, certs, X509_ADD_FLAG_DEFAULT)) 123 ret = ocsp_verify_signer(signer, 1, st, flags, untrusted, &chain); 158 sk_X509_free(untrusted);
|
| /src/crypto/external/bsd/openssl/dist/crypto/ocsp/ |
| ocsp_vfy.c | 32 STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) 42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) { 103 STACK_OF(X509) *untrusted = NULL; 118 if ((untrusted = sk_X509_dup(bs->certs)) == NULL) 120 if (!X509_add_certs(untrusted, certs, X509_ADD_FLAG_DEFAULT)) 123 ret = ocsp_verify_signer(signer, 1, st, flags, untrusted, &chain); 158 sk_X509_free(untrusted);
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| verify.c | 72 { "untrusted", OPT_UNTRUSTED, '<', "A file of untrusted certificates" }, 93 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; 159 if (!load_certs(opt_arg(), 0, &untrusted, NULL, 160 "untrusted certificates")) 236 if (check(store, NULL, untrusted, trusted, crls, show_chain, 242 if (check(store, argv[i], untrusted, trusted, crls, show_chain, 251 OSSL_STACK_OF_X509_free(untrusted); 322 BIO_printf(bio_out, " (untrusted)");
|
| ts.c | 66 char *untrusted, X509_VERIFY_PARAM *vpm); 71 char *untrusted, 124 { "untrusted", OPT_UNTRUSTED, '<', "Extra untrusted certs" }, 174 " -untrusted extra-certs.pem [-data file] [-digest hexstring]", 183 char *untrusted = NULL; local 298 untrusted = opt_arg(); 362 CApath, CAfile, CAstore, untrusted, 876 const char *CAstore, char *untrusted, 896 CApath, CAfile, CAstore, untrusted, [all...] |
| /src/crypto/external/bsd/openssl/dist/apps/ |
| verify.c | 61 {"untrusted", OPT_UNTRUSTED, '<', "A file of untrusted certificates"}, 82 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; 148 if (!load_certs(opt_arg(), 0, &untrusted, NULL, 149 "untrusted certificates")) 224 if (check(store, NULL, untrusted, trusted, crls, show_chain, 229 if (check(store, argv[i], untrusted, trusted, crls, show_chain, 237 sk_X509_pop_free(untrusted, X509_free); 308 BIO_printf(bio_out, " (untrusted)");
|
| /src/crypto/external/apache2/openssl/dist/crypto/pkcs7/ |
| pk7_smime.c | 216 STACK_OF(X509) *untrusted = NULL; 275 if (!ossl_x509_add_certs_new(&untrusted, certs, X509_ADD_FLAG_NO_DUP)) 279 && !ossl_x509_add_certs_new(&untrusted, included_certs, 285 if (!X509_STORE_CTX_init(cert_ctx, store, signer, untrusted)) { 359 sk_X509_free(untrusted);
|
| /src/crypto/external/bsd/openssl/dist/crypto/cmp/ |
| cmp_ctx.c | 58 return ctx->untrusted; 62 * Set untrusted certificates for path construction in authentication of 67 STACK_OF(X509) *untrusted = NULL; 73 if (!ossl_x509_add_certs_new(&untrusted, certs, 76 sk_X509_pop_free(ctx->untrusted, X509_free); 77 ctx->untrusted = untrusted; 80 sk_X509_pop_free(untrusted, X509_free); 121 if ((ctx->untrusted = sk_X509_new_null()) == NULL) 202 sk_X509_pop_free(ctx->untrusted, X509_free) [all...] |
| /src/external/bsd/wpa/dist/src/crypto/ |
| tls_openssl_ocsp.c | 498 STACK_OF(X509) *untrusted = NULL, *certs = NULL, *chain = NULL; 559 untrusted = sk_X509_dup(basic->certs); 560 if (!untrusted) 573 if (!sk_X509_push(untrusted, extra_cert)) { 575 "OpenSSL: Could not add certificate to the untrusted stack"); 612 signer = ocsp_find_signer(untrusted, rd->responderID); 641 if (!ctx || !X509_STORE_CTX_init(ctx, store, signer, untrusted)) 833 sk_X509_free(untrusted);
|