/freebsd-10.1-release/crypto/openssl/crypto/x509/ |
H A D | x509_trs.c | 67 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 68 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 69 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 75 * WARNING: the following table should be kept in order of trust and without 76 * any gaps so we can just subtract the minimum trust value to get an index 105 return (*a)->trust - (*b)->trust; 108 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 112 default_trust = trust; 151 tmp.trust 160 X509_TRUST_set(int *t, int trust) argument 260 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) argument 271 trust_1oid(X509_TRUST *trust, X509 *x, int flags) argument 278 trust_compat(X509_TRUST *trust, X509 *x, int flags) argument [all...] |
H A D | x509_vpm.c | 77 param->trust = 0; 179 x509_verify_param_copy(trust, 0); 249 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) argument 251 return X509_TRUST_set(¶m->trust, trust); 329 0, /* trust */ 339 X509_TRUST_EMAIL, /* trust */ 349 X509_TRUST_EMAIL, /* trust */ 359 X509_TRUST_SSL_CLIENT, /* trust */ 369 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
H A D | x509_vfy.c | 269 * version so we get any trust settings. 384 /* The chain extensions are OK: check trust */ 386 if (param->trust > 0) 649 * including trust anchor. Trust anchor not strictly speaking needed 682 ok = X509_check_trust(x, ctx->param->trust, 0); 1149 * strict and states that the two paths must end in the same trust anchor, 1924 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) argument 1926 return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust); 1930 * This function is used to set the X509_STORE_CTX purpose and trust values. 1931 * This is intended to be used when another structure has its own trust an 1940 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) argument [all...] |
H A D | x509_vfy.h | 171 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 442 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 517 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 519 int purpose, int trust); 548 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
H A D | x509_lu.c | 668 int X509_STORE_set_trust(X509_STORE *ctx, int trust) argument 670 return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
|
H A D | x509.h | 263 STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ member in struct:x509_cert_aux_st 304 /* This is used for a table of trust checking functions */ 307 int trust; member in struct:x509_trust_st 322 /* standard trust ids */ 835 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 837 int X509_TRUST_set(int *t, int trust);
|
/freebsd-10.1-release/crypto/openssl/crypto/asn1/ |
H A D | t_x509a.c | 76 if (aux->trust) { 79 for (i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) { 85 sk_ASN1_OBJECT_value(aux->trust, i), 0);
|
H A D | x_x509a.c | 76 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT), 154 if (!aux->trust && !(aux->trust = sk_ASN1_OBJECT_new_null())) 156 return sk_ASN1_OBJECT_push(aux->trust, objtmp); 174 if (x->aux && x->aux->trust) { 175 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free); 176 x->aux->trust = NULL;
|
/freebsd-10.1-release/contrib/unbound/services/cache/ |
H A D | rrset.c | 138 if( newd->trust > cached->trust ) { 149 /* o same trust, but different in data - insert it */ 150 if( newd->trust == cached->trust && !equal ) { 352 if(updata->trust > cachedata->trust) 353 cachedata->trust = updata->trust; 399 if(cachedata->trust > updat [all...] |
H A D | dns.c | 611 newd->trust = rrset_trust_ans_noAA; 698 if(d->trust != rrset_trust_add_noAA && 699 d->trust != rrset_trust_add_AA && 701 (d->trust != rrset_trust_auth_noAA 702 && d->trust != rrset_trust_auth_AA) )) {
|
/freebsd-10.1-release/contrib/ntp/ntpdate/ |
H A D | ntpdate.h | 23 u_char trust; /* trustability of the filtered data */ member in struct:server
|
H A D | ntpdate.c | 821 server->trust <<= 1; 823 server->trust |= 1; 1085 if (server->trust != 0) { 2138 (void) fprintf(fp, "stratum %d, precision %d, leap %c%c, trust %03o\n", 2142 pp->trust);
|
/freebsd-10.1-release/contrib/ntp/libntp/ |
H A D | authkeys.c | 533 u_long trust 545 if (!trust && sk == NULL) 561 if (trust > 0) { 563 if (trust > 1) 564 sk->lifetime = current_time + trust; 577 if (trust > 1) { 578 lifetime = current_time + trust;
|
/freebsd-10.1-release/lib/libc/sparc64/gen/ |
H A D | fixunsdfsi.S | 57 .word 0 ! (who me, not trust the assembler?)
|
/freebsd-10.1-release/contrib/unbound/util/data/ |
H A D | packed_rrset.h | 117 * RRset trustworthiness. Bigger value is more trust. RFC 2181. 127 * Added validated and ultimate trust for keys and rrsig validated content. 130 /** initial value for trust */ 156 /** ultimately trusted, no more trust is possible; 173 * below a configured trust anchor. */ 176 * insecure. Generally this means that this RRset is below a trust 223 enum rrset_trust trust; member in struct:packed_rrset_data 303 * Compared rdata and rrsigdata, not the trust or ttl value. 362 * Get a printable string for a rrset trust value 363 * @param s: rrset trust valu [all...] |
H A D | msgreply.c | 243 data->trust = rrset_trust_none; 297 /** get trust value for rrset */ 361 data->trust = get_rrset_trust(msg, pset);
|
/freebsd-10.1-release/crypto/openssl/apps/ |
H A D | x509.c | 127 " -addtrust arg - trust certificate for a given purpose\n", 182 STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL; 334 BIO_printf(bio_err, "Invalid trust object value %s\n", *argv); 337 if (!trust) 338 trust = sk_ASN1_OBJECT_new_null(); 339 sk_ASN1_OBJECT_push(trust, objtmp); 655 if (trust) { 656 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) { 657 objtmp = sk_ASN1_OBJECT_value(trust, i); 989 sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_fre [all...] |
/freebsd-10.1-release/crypto/openssl/crypto/x509v3/ |
H A D | v3_purp.c | 198 int X509_PURPOSE_add(int id, int trust, int flags, argument 208 /* This will always be set for application modified trust entries */ 240 ptmp->trust = trust; 297 return xp->trust;
|
/freebsd-10.1-release/usr.bin/calendar/calendars/ |
H A D | calendar.computer | 18 01/17 Justice Dept. begins IBM anti-trust suit, 1969 (drops it, January 8, 1982)
|
/freebsd-10.1-release/contrib/wpa/src/tls/ |
H A D | x509v3.c | 1835 struct x509_certificate *cert, *trust; local 1906 for (trust = trusted; trust; trust = trust->next) { 1907 if (x509_name_compare(&cert->issuer, &trust->subject) 1912 if (trust) { 1915 if (x509_valid_issuer(trust) < 0) { 1920 if (x509_certificate_check_signature(trust, cert) < 0)
|
/freebsd-10.1-release/contrib/unbound/daemon/ |
H A D | cachedump.c | 89 (int)d->trust, (int)d->security 441 unsigned int rr_count, rrsig_count, trust, security; local 465 &trust, &security) != 5) { 476 d->trust = (enum rrset_trust)trust;
|
/freebsd-10.1-release/contrib/bmake/mk/ |
H A D | warnings.mk | 90 # may make your brain hurt - trust me; it works --sjg
|
/freebsd-10.1-release/contrib/unbound/iterator/ |
H A D | iter_utils.c | 555 /* a trust anchor exists with this name, RRSIGs expected */ 672 d1->trust != d2->trust || 801 newd->trust = rrset_trust_ans_noAA;
|
/freebsd-10.1-release/crypto/openssl/ssl/ |
H A D | ssl_lib.c | 347 s->trust = ctx->trust; 488 int SSL_CTX_set_trust(SSL_CTX *s, int trust) argument 490 return X509_VERIFY_PARAM_set_trust(s->param, trust); 493 int SSL_set_trust(SSL *s, int trust) argument 495 return X509_VERIFY_PARAM_set_trust(s->param, trust);
|
H A D | ssl.h | 955 int trust; /* Trust setting */ 1329 int trust; /* Trust setting */ 1973 int SSL_CTX_set_trust(SSL_CTX *s, int trust); 1974 int SSL_set_trust(SSL *s, int trust);
|