/openssl/test/certs/ |
H A D | setup.sh | 4 ./mkcert.sh genroot "Root CA" root-key root-cert 6 ./mkcert.sh genss "Root CA" root-key root-nonca 7 ./mkcert.sh genroot "Root CA" root-key2 root-cert2 8 ./mkcert.sh genroot "Root Cert 2" root-key root-name2 9 DAYS=-1 ./mkcert.sh genroot "Root CA" root-key root-expired 12 ./mkcert.sh genca "Root CA" root-key root-cross-cert cross-key cross-root 43 ./mkcert.sh genroot "Root CA" root-key root-cert-md5 46 ./mkcert.sh genroot "Root CA" root-key-768 root-cert-768 81 ./mkcert.sh genca "CA" ca-key ca-cert root-key root-cert 418 root-key root-cert [all …]
|
/openssl/test/ssl-tests/ |
H A D | 03-custom_verify.cnf | 12 test-7 = 7-verify-fail-no-root 13 test-8 = 8-verify-custom-success-no-root 14 test-9 = 9-verify-custom-fail-no-root 193 [7-verify-fail-no-root] 194 ssl_conf = 7-verify-fail-no-root-ssl 196 [7-verify-fail-no-root-ssl] 200 [7-verify-fail-no-root-server] 205 [7-verify-fail-no-root-client] 216 [8-verify-custom-success-no-root] 242 [9-verify-custom-fail-no-root] [all …]
|
H A D | 26-tls13_client_auth.cnf.in | 55 "VerifyCAFile" => test_pem("root-cert.pem"), 73 "VerifyCAFile" => test_pem("root-cert.pem"), 96 "ClientCAFile" => test_pem("root-cert.pem"), 97 "VerifyCAFile" => test_pem("root-cert.pem"), 111 "ExpectedClientCANames" => test_pem("root-cert.pem"), 153 "VerifyCAFile" => test_pem("root-cert.pem"), 171 "VerifyCAFile" => test_pem("root-cert.pem"), 198 "ClientCAFile" => test_pem("root-cert.pem"), 199 "VerifyCAFile" => test_pem("root-cert.pem"), 217 "ExpectedClientCANames" => test_pem("root-cert.pem"),
|
H A D | 20-cert-select.cnf.in | 70 "RequestCAFile" => test_pem("root-cert.pem"), 94 "RequestCAFile" => test_pem("root-cert.pem"), 118 "RequestCAFile" => test_pem("root-cert.pem"), 267 "VerifyCAFile" => test_pem("p384-root.pem"), 286 "VerifyCAFile" => test_pem("p384-root.pem"), 303 "RequestCAFile" => test_pem("root-cert.pem"), 334 "VerifyCAFile" => test_pem("root-cert.pem"), 352 "VerifyCAFile" => test_pem("root-cert.pem"), 403 "RequestCAFile" => test_pem("root-cert.pem"), 761 "VerifyCAFile" => test_pem("root-cert.pem"), [all …]
|
H A D | 28-seclevel.cnf.in | 33 "VerifyCAFile" => test_pem("root-ed448-cert.pem") }, 46 "VerifyCAFile" => test_pem("root-ed448-cert.pem") }, 57 "VerifyCAFile" => test_pem("root-ed448-cert.pem") }, 70 "VerifyCAFile" => test_pem("p384-root.pem") }, 82 client => { "VerifyCAFile" => test_pem("root-ed448-cert.pem") },
|
H A D | 32-compressed-certificate.cnf.in | 79 "VerifyCAFile" => test_pem("root-cert.pem"), 97 "VerifyCAFile" => test_pem("root-cert.pem"), 115 "VerifyCAFile" => test_pem("root-cert.pem"), 133 "VerifyCAFile" => test_pem("root-cert.pem"),
|
H A D | 04-client_auth.cnf | 105 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 131 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 220 ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 222 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 335 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 365 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 395 ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 399 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 518 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 548 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem [all …]
|
H A D | 28-seclevel.cnf | 50 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 73 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 96 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem 120 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/p384-root.pem 144 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-ed448-cert.pem
|
H A D | 03-custom_verify.cnf.in | 117 name => "verify-fail-no-root", 120 # Don't set up the client root file. 131 name => "verify-custom-success-no-root", 146 name => "verify-custom-fail-no-root",
|
H A D | 04-client_auth.cnf.in | 108 "VerifyCAFile" => test_pem("root-cert.pem"), 137 "VerifyCAFile" => test_pem("root-cert.pem"), 226 "ClientCAFile" => test_pem("root-cert.pem"), 227 "VerifyCAFile" => test_pem("root-cert.pem"), 242 "ExpectedClientCANames" => test_pem("root-cert.pem"), 248 # Handshake with client authentication but without the root certificate.
|
H A D | 01-simple.cnf.in | 34 # Don't set up the client root file. 50 "VerifyCAFile" => test_pem("root-cert.pem"),
|
H A D | 26-tls13_client_auth.cnf | 89 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 120 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 152 ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 157 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 170 ExpectedClientCANames = ${ENV::TEST_CERTS_DIR}/root-cert.pem 252 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 283 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 320 ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 325 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 338 ExpectedClientCANames = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
H A D | 32-compressed-certificate.cnf | 135 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 166 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 197 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem 228 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
/openssl/test/recipes/80-test_cmp_http_data/ |
H A D | test_enrollment.csv | 6 …BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,, ,,, -out_trusted,root.crt,,BLANK,,BLANK,,… 8 …ANK,,BLANK,, -certout,_RESULT_DIR/test.certout_newkey1.pem,, -out_trusted,root.crt,,BLANK,,BLANK,,, 31 …,BLANK,,BLANK,, -certout,_RESULT_DIR/test.certout_days.pem,, -out_trusted,root.crt,,BLANK,,BLANK,,, 32 …K,,BLANK,, -certout,_RESULT_DIR/test.certout_days_zero.pem,, -out_trusted,root.crt,,BLANK,,BLANK,,, 60 …BLANK,,BLANK,, -certout,_RESULT_DIR/test.certout_popo5.pem,, -out_trusted,root.crt,,BLANK,,BLANK,,, 72 …,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,, -certout,"""",, -out_trusted,root.crt,,BLANK,,BLANK,,, 73 …LANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,, -certout,,, -out_trusted,root.crt,,BLANK,,BLANK,,, 75 …BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,, -certout,abc,def, -out_trusted,root.crt,,BLANK,,BLANK,,, 99 …BLANK,,BLANK,, -certout,_RESULT_DIR/test.certout_p10cr.pem,, -out_trusted,root.crt,,BLANK,, -csr,c… 110 …K,,BLANK,,BLANK,, -certout,_RESULT_DIR/test.certout_cr.pem,, -out_trusted,root.crt,,BLANK,,BLANK,,, [all …]
|
/openssl/demos/certs/ |
H A D | mkcerts.sh | 14 -keyout root.pem -out root.pem -newkey rsa:2048 -days 3650 19 opensslcmd x509 -req -in intreq.pem -CA root.pem -days 3600 \ 65 opensslcmd x509 -req -in dhsreq.pem -CA root.pem -days 3600 \ 75 opensslcmd x509 -req -in dhcreq.pem -CA root.pem -days 3600 \ 86 opensslcmd ca -valid server.pem -keyfile root.pem -cert root.pem \ 88 opensslcmd ca -valid client.pem -keyfile root.pem -cert root.pem \ 90 opensslcmd ca -valid rev.pem -keyfile root.pem -cert root.pem \ 93 opensslcmd ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \ 97 -keyfile root.pem -cert root.pem -config ca.cnf -md sha1 99 opensslcmd ca -gencrl -keyfile root.pem -cert root.pem -config ca.cnf \
|
H A D | ocspquery.sh | 18 opensslcmd ocsp -issuer intca.pem -cert client.pem -CAfile root.pem \ 20 opensslcmd ocsp -issuer intca.pem -cert server.pem -CAfile root.pem \ 22 opensslcmd ocsp -issuer intca.pem -cert rev.pem -CAfile root.pem \ 28 -CAfile root.pem -url http://127.0.0.1:8888/
|
H A D | README.txt | 7 automatically using scripts. Example creates a root CA, an intermediate CA 8 signed by the root and several certificates signed by the intermediate CA.
|
/openssl/test/recipes/25-test_eai_data/ |
H A D | kdc.sh | 9 rm -f root-key.pem root-cert.pem 10 openssl req -nodes -new -newkey rsa:2048 -keyout kdc-root-key.pem \ 11 -x509 -subj /CN=Root -days 36524 -out kdc-root-cert.pem
|
/openssl/test/ocsp-tests/ |
H A D | mk-ocsp-cert-chain.sh | 19 -out root-key.pem 26 -key root-key.pem \ 28 -out root-cert.pem 51 -CA root-cert.pem \ 52 -CAkey root-key.pem \
|
/openssl/demos/bio/ |
H A D | accept.cnf | 18 ChainCAFile=root.pem 19 VerifyCAFile=root.pem 23 ClientCAFile=root.pem
|
/openssl/test/ |
H A D | cmp_protect_test.c | 78 *root = NULL, *intermediate = NULL; variable 356 && TEST_true(X509_STORE_add_cert(store, root))) { in execute_cmp_build_cert_chain_test() 381 || !TEST_true(sk_X509_push(fixture->certs, root)) in test_cmp_build_cert_chain() 407 || !TEST_true(sk_X509_push(fixture->certs, root)) in test_cmp_build_cert_chain_missing_intermediate() 440 fixture->cert = root; in test_cmp_build_cert_chain_only_root() 443 || !TEST_true(sk_X509_push(fixture->certs, root)) in test_cmp_build_cert_chain_only_root() 444 || !TEST_true(sk_X509_push(fixture->chain, root))) { in test_cmp_build_cert_chain_only_root() 497 || !sk_X509_push(fixture->certs, root) in test_X509_STORE() 515 || !TEST_true(sk_X509_push(fixture->certs, root)) in test_X509_STORE_only_self_issued() 536 X509_free(root); in cleanup_tests() [all …]
|
H A D | crltest.c | 253 static int verify(X509 *leaf, X509 *root, STACK_OF(X509_CRL) *crls, in verify() argument 269 X509_up_ref(root); in verify() 270 if (!TEST_true(sk_X509_push(roots, root)) in verify()
|
/openssl/demos/certs/apps/ |
H A D | mkacerts.sh | 13 -keyout root.pem -out root.pem -key rootkey.pem -new -days 3650 18 opensslcmd x509 -req -in intreq.pem -CA root.pem -CAkey rootkey.pem -days 3630 \ 48 opensslcmd verify -CAfile root.pem -untrusted intca.pem \
|
/openssl/crypto/ |
H A D | README-sparse_array.md | 47 An empty tree is represented by a NULL root pointer. Inserting a value at 74 Inserting at element 2N+1 creates a new root node and pushes down the old root 109 along a path from the root of the tree to an added leaf will be allocated.
|
/openssl/test/recipes/95-test_external_cf_quiche_data/ |
H A D | quiche-server.sh | 27 --http-version HTTP/0.9 --root "$SRCTOP" --no-grease --disable-hystart &
|