/freebsd-11-stable/contrib/unbound/validator/ |
H A D | val_anchor.h | 39 * This file contains storage for the trust anchors for the validator. 70 /** Autotrust global data, anchors sorted by next probe time */ 131 * @param anchors: to delete. 133 void anchors_delete(struct val_anchors* anchors); 137 * @param anchors: struct anchor storage 141 int anchors_apply_cfg(struct val_anchors* anchors, struct config_file* cfg); 145 * anchors structure (say after removing an item from the rbtree). 146 * Caller must not hold any locks on trust anchors. 149 * @param anchors: the structure to update. 151 void anchors_init_parents_locked(struct val_anchors* anchors); [all...] |
H A D | val_anchor.c | 39 * This file contains storage for the trust anchors for the validator. 114 /** destroy locks in tree and delete autotrust anchors */ 140 anchors_delete(struct val_anchors* anchors) argument 142 if(!anchors) 144 lock_unprotect(&anchors->lock, anchors->autr); 145 lock_unprotect(&anchors->lock, anchors); 146 lock_basic_destroy(&anchors->lock); 147 if(anchors 155 anchors_init_parents_locked(struct val_anchors* anchors) argument 189 init_parents(struct val_anchors* anchors) argument 197 anchor_find(struct val_anchors* anchors, uint8_t* name, int namelabs, size_t namelen, uint16_t dclass) argument 221 anchor_new_ta(struct val_anchors* anchors, uint8_t* name, int namelabs, size_t namelen, uint16_t dclass, int lockit) argument 304 anchor_store_new_key(struct val_anchors* anchors, uint8_t* name, uint16_t type, uint16_t dclass, uint8_t* rdata, size_t rdata_len) argument 357 anchor_store_new_rr(struct val_anchors* anchors, uint8_t* rr, size_t rl, size_t dl) argument 381 anchor_insert_insecure(struct val_anchors* anchors, const char* str) argument 397 anchor_store_str(struct val_anchors* anchors, sldns_buffer* buffer, const char* str) argument 427 anchor_read_file(struct val_anchors* anchors, sldns_buffer* buffer, const char* fname, int onlyone) argument 636 process_bind_contents(struct val_anchors* anchors, sldns_buffer* buf, int* line, FILE* in) argument 734 anchor_read_bind_file(struct val_anchors* anchors, sldns_buffer* buffer, const char* fname) argument 785 anchor_read_bind_file_wild(struct val_anchors* anchors, sldns_buffer* buffer, const char* pat) argument 986 anchors_assemble_rrsets(struct val_anchors* anchors) argument 1045 anchors_apply_cfg(struct val_anchors* anchors, struct config_file* cfg) argument 1129 anchors_lookup(struct val_anchors* anchors, uint8_t* qname, size_t qname_len, uint16_t qclass) argument 1169 anchors_get_mem(struct val_anchors* anchors) argument 1183 anchors_add_insecure(struct val_anchors* anchors, uint16_t c, uint8_t* nm) argument 1208 anchors_delete_insecure(struct val_anchors* anchors, uint16_t c, uint8_t* nm) argument 1281 anchor_has_keytag(struct val_anchors* anchors, uint8_t* name, int namelabs, size_t namelen, uint16_t dclass, uint16_t keytag) argument [all...] |
H A D | autotrust.h | 128 /** rbtree of autotrust anchors sorted by next probe time. 146 * See if autotrust anchors are configured and how many. 147 * @param anchors: the trust anchors structure. 148 * @return number of autotrust trust anchors 150 size_t autr_get_num_anchors(struct val_anchors* anchors); 154 * @param env: module environment with time, with anchors and with the mesh. 165 * @param anchors: the anchors structure. 169 int autr_read_file(struct val_anchors* anchors, cons [all...] |
H A D | autotrust.c | 106 autr_get_num_anchors(struct val_anchors* anchors) argument 109 if(!anchors) 111 lock_basic_lock(&anchors->lock); 112 if(anchors->autr) 113 res = anchors->autr->probe.count; 114 lock_basic_unlock(&anchors->lock); 332 autr_tp_create(struct val_anchors* anchors, uint8_t* own, size_t own_len, argument 354 lock_basic_lock(&anchors->lock); 355 if(!rbtree_insert(anchors->tree, &tp->node)) { 356 lock_basic_unlock(&anchors 416 find_add_tp(struct val_anchors* anchors, uint8_t* rr, size_t rr_len, size_t dname_len) argument 440 add_trustanchor_frm_rr(struct val_anchors* anchors, uint8_t* rr, size_t rr_len, size_t dname_len, struct trust_anchor** tp) argument 472 add_trustanchor_frm_str(struct val_anchors* anchors, char* str, struct trust_anchor** tp, uint8_t* origin, size_t origin_len, uint8_t** prev, size_t* prev_len, int* skip) argument 525 load_trustanchor(struct val_anchors* anchors, char* str, const char* fname, uint8_t* origin, size_t origin_len, uint8_t** prev, size_t* prev_len, int* skip) argument 810 parse_id(struct val_anchors* anchors, char* line) argument 849 parse_var_line(char* line, struct val_anchors* anchors, struct trust_anchor** anchor) argument 985 autr_read_file(struct val_anchors* anchors, const char* nm) argument 2017 wait_probe_time(struct val_anchors* anchors) argument 2312 autr_debug_print(struct val_anchors* anchors) argument [all...] |
H A D | val_utils.h | 335 * @param anchors: the trust anchors. 340 struct val_anchors* anchors, struct rrset_cache* r,
|
H A D | validator.c | 118 if(!env->anchors) 119 env->anchors = anchors_create(); 120 if(!env->anchors) { 133 if(!anchors_apply_cfg(env->anchors, cfg)) { 200 anchors_delete(env->anchors); 201 env->anchors = NULL; 1523 val_mark_indeterminate(vq->chase_reply, qstate->env->anchors, 1528 anchor = anchors_lookup(qstate->env->anchors, 1553 anchor = anchors_lookup(qstate->env->anchors, 2123 !anchor_has_keytag(qstate->env->anchors, [all...] |
H A D | val_utils.c | 682 verbose(VERB_ALGO, "No usable trust anchors were found -- " 1001 check_no_anchor(struct val_anchors* anchors, uint8_t* nm, size_t l, uint16_t c) argument 1004 if((ta=anchors_lookup(anchors, nm, l, c))) { 1011 val_mark_indeterminate(struct reply_info* rep, struct val_anchors* anchors, argument 1019 check_no_anchor(anchors, rep->rrsets[i]->rk.dname,
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | test_cms.in | 63 --anchors=FILE:$srcdir/data/secp160r1TestCA.cert.pem \ 77 --anchors=FILE:$srcdir/data/ca.crt \ 92 --anchors=FILE:$srcdir/data/ca.crt \ 100 --anchors=FILE:$srcdir/data/ca.crt \ 114 --anchors=FILE:$srcdir/data/ca.crt \ 121 --anchors=FILE:$srcdir/data/test.crt \ 135 --anchors=FILE:$srcdir/data/ca.crt \ 148 --anchors=FILE:$srcdir/data/ca.crt \ 162 --anchors=FILE:$srcdir/data/ca.crt \ 177 --anchors [all...] |
H A D | ks_keychain.c | 316 int anchors; member in struct:ks_keychain 334 if (strcasecmp(residue, "system-anchors") == 0) { 335 ctx->anchors = 1; 394 if (ctx->anchors) { 395 CFArrayRef anchors; local 406 ret = SecTrustCopyAnchorCertificates(&anchors); 411 "Can't get trust anchors from Keychain"); 414 for (i = 0; i < CFArrayGetCount(anchors); i++) { 419 cr = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, i); 430 CFRelease(anchors); [all...] |
H A D | hxtool.c | 186 hx509_certs anchors = NULL; local 203 ret = hx509_certs_init(context, "MEMORY:cms-anchors", 0, NULL, &anchors); 210 certs_strings(context, "anchors", anchors, lock, &opt->anchors_strings); 281 hx509_verify_attach_anchors(ctx, anchors); 315 hx509_certs_free(&anchors); 364 hx509_certs store, pool, anchors, signer = NULL; local 394 ret = hx509_certs_init(context, "MEMORY:cert-anchors", 395 0, NULL, &anchors); 862 hx509_certs anchors, chain, certs; local [all...] |
H A D | cms.c | 1133 * @param anchors trust anchors that the client will use, used to 1136 * trust anchors. 1151 hx509_certs anchors, 1169 digest_alg, certs, peer, anchors, pool, 1186 hx509_certs anchors; member in struct:sigctx 1379 sigctx->anchors, 1444 hx509_certs anchors, 1492 sigctx.anchors = anchors; 1144 hx509_cms_create_signed_1(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_cert cert, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument 1437 hx509_cms_create_signed(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_certs certs, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument [all...] |
H A D | cert.c | 433 * Set the trust anchors in the verification context, makes an 439 * @param set a keyset containing the trust anchors. 554 * Allow using the operating system builtin trust anchors if no other 555 * trust anchors are configured. 559 * trust anchors. 1222 * If the trust anchors are not given, calculate optimistic path, just 1238 hx509_certs anchors, 1256 while (!certificate_is_anchor(context, anchors, current)) { 1258 ret = find_parent(context, time_now, anchors, path, 1280 certificate_is_anchor(context, anchors, pat 1235 _hx509_calculate_path(hx509_context context, int flags, time_t time_now, hx509_certs anchors, unsigned int max_depth, hx509_cert cert, hx509_certs pool, hx509_path *path) argument 1984 hx509_certs anchors = NULL; local [all...] |
H A D | test_ca.in | 303 --anchors=FILE:cert-ca.pem \
|
/freebsd-11-stable/contrib/blacklist/libexec/ |
H A D | blacklistd-helper | 121 # dynamically determine which anchors exist 122 anchors=$(/sbin/pfctl -a $2 -s Anchors) 123 for anchor in $anchors; do
|
/freebsd-11-stable/contrib/unbound/daemon/ |
H A D | remote.c | 2135 if(insecure && worker->env.anchors) { 2136 if(!anchors_add_insecure(worker->env.anchors, LDNS_RR_CLASS_IN, 2162 if(insecure && worker->env.anchors) 2163 anchors_delete_insecure(worker->env.anchors, LDNS_RR_CLASS_IN, 2180 if(insecure && worker->env.anchors) { 2181 if(!anchors_add_insecure(worker->env.anchors, LDNS_RR_CLASS_IN, 2190 if(insecure && worker->env.anchors) 2191 anchors_delete_insecure(worker->env.anchors, 2201 if(insecure && worker->env.anchors) 2202 anchors_delete_insecure(worker->env.anchors, [all...] |
H A D | worker.c | 137 anch = anchors_get_mem(worker->env.anchors); 172 "rrset=%u infra=%u iter=%u val=%u subnet=%u anchors=%u " 181 "rrset=%u infra=%u iter=%u val=%u anchors=%u " 892 lock_basic_lock(&w->env.anchors->lock); 893 RBTREE_FOR(ta, struct trust_anchor*, w->env.anchors->tree) { 919 lock_basic_unlock(&w->env.anchors->lock); 1892 /* one probe timer per process -- if we have 5011 anchors */ 1893 if(autr_get_num_anchors(worker->env.anchors) > 0
|
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | krb5_locl.h | 345 hx509_certs anchors; member in struct:krb5_pk_identity
|
H A D | pkinit.c | 773 ctx->id->anchors, req.trustedCertifiers); 1899 ret = hx509_certs_init(context->hx509ctx, anchor_id, 0, NULL, &id->anchors); 1902 "Failed to init anchors"); 1955 hx509_verify_attach_anchors(id->verify_ctx, id->anchors); 1962 hx509_certs_free(&id->anchors); 2337 hx509_certs_free(&ctx->id->anchors); 2369 char *anchors = NULL; local 2405 "pkinit_anchors", NULL, &anchors); 2406 x509_anchors = anchors;
|
/freebsd-11-stable/contrib/unbound/util/ |
H A D | module.h | 488 * otherwise configured by validator. These are the trust anchors, 491 struct val_anchors* anchors; member in struct:module_env
|
/freebsd-11-stable/contrib/unbound/iterator/ |
H A D | iter_utils.c | 781 if(!env || !env->anchors || !qinfo || !qinfo->qname) 784 if((a=anchors_lookup(env->anchors, qinfo->qname, qinfo->qname_len, 803 /* information not available, !env->anchors can be common */ 804 if(!env || !env->anchors || !dp || !dp->name) 807 if((a=anchor_find(env->anchors, dp->name, dp->namelabs, dp->namelen,
|
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | pkinit.c | 521 "MEMORY:trust-anchors", 524 krb5_set_error_message(context, ret, "failed to create trust anchors"); 529 kdc_identity->anchors); 536 /* Add any registered certificates for this client as trust anchors */ 622 "MEMORY:client-anchors", 627 "Can't allocate client anchors: %d", 1950 const char *anchors, 1971 anchors, 1947 krb5_kdc_pk_initialize(krb5_context context, krb5_kdc_configuration *config, const char *user_id, const char *anchors, char **pool, char **revoke_list) argument
|
/freebsd-11-stable/contrib/gcc/ |
H A D | varasm.c | 5836 /* Don't use anchors for mergeable sections. The linker might move 5842 /* Don't use anchors for small data sections. The small data register 5850 /* Don't use section anchors for decls that might be defined by 5855 /* Don't use section anchors for decls that will be placed in a 6122 We try to place anchors RANGE bytes apart, so there can then be 6123 anchors at +/-RANGE, +/-2 * RANGE, and so on, up to the limits of 6126 likewise the highest anchor for the highest offset. Use anchors 6160 end = VEC_length (rtx, block->anchors); 6164 anchor = VEC_index (rtx, block->anchors, middle); 6184 VEC_safe_insert (rtx, gc, block->anchors, begi [all...] |
H A D | rtl.h | 235 VEC(rtx,gc) *anchors;
|
/freebsd-11-stable/contrib/gcc/doc/include/ |
H A D | texinfo.tex | 6016 % empty for anchors.
|
/freebsd-11-stable/contrib/groff/doc/ |
H A D | texinfo.tex | 5892 % empty for anchors.
|