Home
last modified time | relevance | path

Searched refs:root (Results 1 – 25 of 79) sorted by relevance

1234

/openssl/test/certs/
H A Dsetup.sh4 ./mkcert.sh genroot "Root CA" root-key root-cert
6 ./mkcert.sh genss "Root CA" root-key root-nonca
7 ./mkcert.sh genroot "Root CA" root-key2 root-cert2
8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2
9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired
12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root
43 ./mkcert.sh genroot "Root CA" root-key root-cert-md5
46 ./mkcert.sh genroot "Root CA" root-key-768 root-cert-768
81 ./mkcert.sh genca "CA" ca-key ca-cert root-key root-cert
418 root-key root-cert
[all …]
/openssl/test/ssl-tests/
H A D03-custom_verify.cnf12 test-7 = 7-verify-fail-no-root
13 test-8 = 8-verify-custom-success-no-root
14 test-9 = 9-verify-custom-fail-no-root
193 [7-verify-fail-no-root]
194 ssl_conf = 7-verify-fail-no-root-ssl
196 [7-verify-fail-no-root-ssl]
200 [7-verify-fail-no-root-server]
205 [7-verify-fail-no-root-client]
216 [8-verify-custom-success-no-root]
242 [9-verify-custom-fail-no-root]
[all …]
H A D26-tls13_client_auth.cnf.in55 "VerifyCAFile" => test_pem("root-cert.pem"),
73 "VerifyCAFile" => test_pem("root-cert.pem"),
96 "ClientCAFile" => test_pem("root-cert.pem"),
97 "VerifyCAFile" => test_pem("root-cert.pem"),
111 "ExpectedClientCANames" => test_pem("root-cert.pem"),
153 "VerifyCAFile" => test_pem("root-cert.pem"),
171 "VerifyCAFile" => test_pem("root-cert.pem"),
198 "ClientCAFile" => test_pem("root-cert.pem"),
199 "VerifyCAFile" => test_pem("root-cert.pem"),
217 "ExpectedClientCANames" => test_pem("root-cert.pem"),
H A D20-cert-select.cnf.in70 "RequestCAFile" => test_pem("root-cert.pem"),
94 "RequestCAFile" => test_pem("root-cert.pem"),
118 "RequestCAFile" => test_pem("root-cert.pem"),
267 "VerifyCAFile" => test_pem("p384-root.pem"),
286 "VerifyCAFile" => test_pem("p384-root.pem"),
303 "RequestCAFile" => test_pem("root-cert.pem"),
334 "VerifyCAFile" => test_pem("root-cert.pem"),
352 "VerifyCAFile" => test_pem("root-cert.pem"),
403 "RequestCAFile" => test_pem("root-cert.pem"),
761 "VerifyCAFile" => test_pem("root-cert.pem"),
[all …]
H A D28-seclevel.cnf.in33 "VerifyCAFile" => test_pem("root-ed448-cert.pem") },
46 "VerifyCAFile" => test_pem("root-ed448-cert.pem") },
57 "VerifyCAFile" => test_pem("root-ed448-cert.pem") },
70 "VerifyCAFile" => test_pem("p384-root.pem") },
82 client => { "VerifyCAFile" => test_pem("root-ed448-cert.pem") },
H A D32-compressed-certificate.cnf.in79 "VerifyCAFile" => test_pem("root-cert.pem"),
97 "VerifyCAFile" => test_pem("root-cert.pem"),
115 "VerifyCAFile" => test_pem("root-cert.pem"),
133 "VerifyCAFile" => test_pem("root-cert.pem"),
H A D04-client_auth.cnf105 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
131 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
220 ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
222 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
335 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
365 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
395 ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
399 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
518 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
548 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
[all …]
H A D28-seclevel.cnf50 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
73 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
96 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
120 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/p384-root.pem
144 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
H A D03-custom_verify.cnf.in117 name => "verify-fail-no-root",
120 # Don't set up the client root file.
131 name => "verify-custom-success-no-root",
146 name => "verify-custom-fail-no-root",
H A D04-client_auth.cnf.in108 "VerifyCAFile" => test_pem("root-cert.pem"),
137 "VerifyCAFile" => test_pem("root-cert.pem"),
226 "ClientCAFile" => test_pem("root-cert.pem"),
227 "VerifyCAFile" => test_pem("root-cert.pem"),
242 "ExpectedClientCANames" => test_pem("root-cert.pem"),
248 # Handshake with client authentication but without the root certificate.
H A D01-simple.cnf.in34 # Don't set up the client root file.
50 "VerifyCAFile" => test_pem("root-cert.pem"),
H A D26-tls13_client_auth.cnf89 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
120 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
152 ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
157 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
170 ExpectedClientCANames = ${ENV::TEST_CERTS_DIR}/root-cert.pem
252 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
283 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
320 ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
325 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
338 ExpectedClientCANames = ${ENV::TEST_CERTS_DIR}/root-cert.pem
H A D32-compressed-certificate.cnf135 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
166 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
197 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
228 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
/openssl/test/recipes/80-test_cmp_http_data/
H A Dtest_enrollment.csv6 …BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,, ,,, -out_trusted,root.crt,,BLANK,,BLANK,,…
8 …ANK,,BLANK,, -certout,_RESULT_DIR/test.certout_newkey1.pem,, -out_trusted,root.crt,,BLANK,,BLANK,,,
31 …,BLANK,,BLANK,, -certout,_RESULT_DIR/test.certout_days.pem,, -out_trusted,root.crt,,BLANK,,BLANK,,,
32 …K,,BLANK,, -certout,_RESULT_DIR/test.certout_days_zero.pem,, -out_trusted,root.crt,,BLANK,,BLANK,,,
60 …BLANK,,BLANK,, -certout,_RESULT_DIR/test.certout_popo5.pem,, -out_trusted,root.crt,,BLANK,,BLANK,,,
72 …,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,, -certout,"""",, -out_trusted,root.crt,,BLANK,,BLANK,,,
73 …LANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,, -certout,,, -out_trusted,root.crt,,BLANK,,BLANK,,,
75 …BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,, -certout,abc,def, -out_trusted,root.crt,,BLANK,,BLANK,,,
99 …BLANK,,BLANK,, -certout,_RESULT_DIR/test.certout_p10cr.pem,, -out_trusted,root.crt,,BLANK,, -csr,c…
110 …K,,BLANK,,BLANK,, -certout,_RESULT_DIR/test.certout_cr.pem,, -out_trusted,root.crt,,BLANK,,BLANK,,,
[all …]
/openssl/demos/certs/
H A Dmkcerts.sh14 -keyout root.pem -out root.pem -newkey rsa:2048 -days 3650
19 opensslcmd x509 -req -in intreq.pem -CA root.pem -days 3600 \
65 opensslcmd x509 -req -in dhsreq.pem -CA root.pem -days 3600 \
75 opensslcmd x509 -req -in dhcreq.pem -CA root.pem -days 3600 \
86 opensslcmd ca -valid server.pem -keyfile root.pem -cert root.pem \
88 opensslcmd ca -valid client.pem -keyfile root.pem -cert root.pem \
90 opensslcmd ca -valid rev.pem -keyfile root.pem -cert root.pem \
93 opensslcmd ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
97 -keyfile root.pem -cert root.pem -config ca.cnf -md sha1
99 opensslcmd ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
H A Docspquery.sh18 opensslcmd ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \
20 opensslcmd ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \
22 opensslcmd ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \
28 -CAfile root.pem -url http://127.0.0.1:8888/
H A DREADME.txt7 automatically using scripts. Example creates a root CA, an intermediate CA
8 signed by the root and several certificates signed by the intermediate CA.
/openssl/test/recipes/25-test_eai_data/
H A Dkdc.sh9 rm -f root-key.pem root-cert.pem
10 openssl req -nodes -new -newkey rsa:2048 -keyout kdc-root-key.pem \
11 -x509 -subj /CN=Root -days 36524 -out kdc-root-cert.pem
/openssl/test/ocsp-tests/
H A Dmk-ocsp-cert-chain.sh19 -out root-key.pem
26 -key root-key.pem \
28 -out root-cert.pem
51 -CA root-cert.pem \
52 -CAkey root-key.pem \
/openssl/demos/bio/
H A Daccept.cnf18 ChainCAFile=root.pem
19 VerifyCAFile=root.pem
23 ClientCAFile=root.pem
/openssl/test/
H A Dcmp_protect_test.c78 *root = NULL, *intermediate = NULL; variable
356 && TEST_true(X509_STORE_add_cert(store, root))) { in execute_cmp_build_cert_chain_test()
381 || !TEST_true(sk_X509_push(fixture->certs, root)) in test_cmp_build_cert_chain()
407 || !TEST_true(sk_X509_push(fixture->certs, root)) in test_cmp_build_cert_chain_missing_intermediate()
440 fixture->cert = root; in test_cmp_build_cert_chain_only_root()
443 || !TEST_true(sk_X509_push(fixture->certs, root)) in test_cmp_build_cert_chain_only_root()
444 || !TEST_true(sk_X509_push(fixture->chain, root))) { in test_cmp_build_cert_chain_only_root()
497 || !sk_X509_push(fixture->certs, root) in test_X509_STORE()
515 || !TEST_true(sk_X509_push(fixture->certs, root)) in test_X509_STORE_only_self_issued()
536 X509_free(root); in cleanup_tests()
[all …]
H A Dcrltest.c253 static int verify(X509 *leaf, X509 *root, STACK_OF(X509_CRL) *crls, in verify() argument
269 X509_up_ref(root); in verify()
270 if (!TEST_true(sk_X509_push(roots, root)) in verify()
/openssl/demos/certs/apps/
H A Dmkacerts.sh13 -keyout root.pem -out root.pem -key rootkey.pem -new -days 3650
18 opensslcmd x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \
48 opensslcmd verify -CAfile root.pem -untrusted intca.pem \
/openssl/crypto/
H A DREADME-sparse_array.md47 An empty tree is represented by a NULL root pointer. Inserting a value at
74 Inserting at element 2N+1 creates a new root node and pushes down the old root
109 along a path from the root of the tree to an added leaf will be allocated.
/openssl/test/recipes/95-test_external_cf_quiche_data/
H A Dquiche-server.sh27 --http-version HTTP/0.9 --root "$SRCTOP" --no-grease --disable-hystart &

Completed in 47 milliseconds

1234