Trust
Evaluate trust based on a given policy.
Overview
Before using a certificate, you evaluate its trustworthiness for a particular purpose.
If you know that a certificate comes unaltered from its sender, you can be confident that its embedded public key does as well. You can also take at face value claims made by the certificate about when and for what purpose the public key may be used. You can securely engage in the operations described in Using Keys for Encryption and Signing and Verifying without prior arrangement between sender and receiver.
Topics
Essentials
Trust Evaluation
Evaluating a Trust and Parsing the ResultSecTrustEvaluateWithError(_:_:)SecTrustEvaluateAsyncWithError(_:_:_:)SecTrustWithErrorCallback
Trust Evaluation Result
Discovering Why a Trust Evaluation FailedSecTrustGetTrustResult(_:_:)SecTrustResultTypeSecTrustCopyResult(_:)Trust Result Dictionary Keys
Trust Components
SecTrustCopyPublicKey(_:)SecTrustGetCertificateCount(_:)SecTrustGetCertificateAtIndex(_:_:)SecTrustGetVerifyTime(_:)SecTrustCopyAnchorCertificates(_:)SecTrustCopyCustomAnchorCertificates(_:_:)SecTrustCopyExceptions(_:)SecTrustCopyPolicies(_:_:)SecTrustCopyProperties(_:)
Advanced Trust Configuation
Configuring a TrustSecTrustSetVerifyDate(_:_:)SecTrustSetAnchorCertificates(_:_:)SecTrustSetAnchorCertificatesOnly(_:_:)SecTrustSetExceptions(_:_:)SecTrustSetPolicies(_:_:)SecTrustSetOptions(_:_:)SecTrustOptionFlagsSecTrustGetNetworkFetchAllowed(_:_:)SecTrustSetNetworkFetchAllowed(_:_:)SecTrustSetOCSPResponse(_:_:)SecTrustSetSignedCertificateTimestamps(_:_:)
Trust Settings
SecTrustSettingsCopyCertificates(_:_:)SecTrustSettingsCopyModificationDate(_:_:_:)Usage Constraints Dictionary KeysSecTrustSettingsCopyTrustSettings(_:_:_:)SecTrustSettingsCreateExternalRepresentation(_:_:)SecTrustSettingsImportExternalRepresentation(_:_:)SecTrustSettingsRemoveTrustSettings(_:_:)SecTrustSettingsSetTrustSettings(_:_:_:)SecTrustSettingsKeyUsageSecTrustSettingsResultSecTrustSettingsDomain