/freebsd-11-stable/crypto/openssl/crypto/x509/ |
H A D | x509_trs.c | 67 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 68 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 69 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 75 * WARNING: the following table should be kept in order of trust and without 76 * any gaps so we can just subtract the minimum trust value to get an index 105 return (*a)->trust - (*b)->trust; 108 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 112 default_trust = trust; 159 tmp.trust 168 X509_TRUST_set(int *t, int trust) argument 268 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) argument 279 trust_1oid(X509_TRUST *trust, X509 *x, int flags) argument 286 trust_compat(X509_TRUST *trust, X509 *x, int flags) argument [all...] |
H A D | x509_vpm.c | 140 param->trust = 0; 284 x509_verify_param_copy(trust, 0); 403 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) argument 405 return X509_TRUST_set(¶m->trust, trust); 542 0, /* trust */ 552 X509_TRUST_EMAIL, /* trust */ 562 X509_TRUST_EMAIL, /* trust */ 572 X509_TRUST_SSL_CLIENT, /* trust */ 582 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
H A D | x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 474 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 556 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 558 int purpose, int trust); 587 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
H A D | x509_vfy.c | 198 int trust = X509_TRUST_UNTRUSTED; local 335 * version so we get any trust settings. 381 if ((trust = check_trust(ctx)) == X509_TRUST_REJECTED) { 394 if (trust != X509_TRUST_TRUSTED 433 if (trust != X509_TRUST_TRUSTED && !bad_chain) { 836 * including trust anchor. Trust anchor not strictly speaking needed 919 ok = X509_check_trust(x, ctx->param->trust, 0); 1428 * strict and states that the two paths must end in the same trust anchor, 2271 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) argument 2273 return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust); 2287 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) argument [all...] |
H A D | x509_lu.c | 712 int X509_STORE_set_trust(X509_STORE *ctx, int trust) argument 714 return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
|
H A D | x509.h | 263 STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ member in struct:x509_cert_aux_st 304 /* This is used for a table of trust checking functions */ 307 int trust; member in struct:x509_trust_st 322 /* standard trust ids */ 845 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 847 int X509_TRUST_set(int *t, int trust);
|
/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | t_x509a.c | 76 if (aux->trust) { 79 for (i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) { 85 sk_ASN1_OBJECT_value(aux->trust, i), 0);
|
H A D | x_x509a.c | 76 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT), 154 if (!aux->trust && !(aux->trust = sk_ASN1_OBJECT_new_null())) 156 return sk_ASN1_OBJECT_push(aux->trust, objtmp); 177 if (x->aux && x->aux->trust) { 178 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free); 179 x->aux->trust = NULL;
|
/freebsd-11-stable/contrib/unbound/services/cache/ |
H A D | rrset.c | 140 if( newd->trust > cached->trust ) { 151 /* o same trust, but different in data - insert it */ 152 if( newd->trust == cached->trust && !equal ) { 389 if(updata->trust > cachedata->trust) 390 cachedata->trust = updata->trust; 437 if(cachedata->trust > updat [all...] |
H A D | dns.c | 718 newd->trust = rrset_trust_ans_noAA; 772 if(d->trust == rrset_trust_add_noAA || 773 d->trust == rrset_trust_auth_noAA || 774 d->trust == rrset_trust_add_AA || 775 d->trust == rrset_trust_auth_AA) { 906 if(d->trust != rrset_trust_add_noAA && 907 d->trust != rrset_trust_add_AA && 909 (d->trust != rrset_trust_auth_noAA 910 && d->trust != rrset_trust_auth_AA) )) {
|
/freebsd-11-stable/secure/caroot/ |
H A D | MAca-bundle.pl | 207 confess "Unknown trust setting on line $.:\n" 215 print STDERR "line $.: no explicit trust/distrust found for $cka_label\n"; 218 my $trust = ($maytrust and not $distrust); 219 return ($serial, $cka_label, $trust); 243 my ($serial, $label, $trust) = grabtrust($inputfh); 247 $trusts{$label."\0".$serial} = $trust; 264 warn "Found trust for nonexistent certificate $labels{$it}\n" if $debug; 283 die "Found certificate without trust block,\naborting";
|
/freebsd-11-stable/contrib/ntp/ntpdate/ |
H A D | ntpdate.h | 23 u_char trust; /* trustability of the filtered data */ member in struct:server
|
H A D | ntpdate.c | 833 server->trust <<= 1; 835 server->trust |= 1; 1099 if (server->trust != 0) { 2170 (void) fprintf(fp, "stratum %d, precision %d, leap %c%c, trust %03o\n", 2174 pp->trust);
|
/freebsd-11-stable/lib/libc/sparc64/gen/ |
H A D | fixunsdfsi.S | 57 .word 0 ! (who me, not trust the assembler?)
|
/freebsd-11-stable/contrib/ntp/libntp/ |
H A D | authkeys.c | 633 u_long trust 645 if (!trust && sk == NULL) 661 if (trust > 0) { 663 if (trust > 1) 664 sk->lifetime = current_time + trust; 677 if (trust > 1) { 678 lifetime = current_time + trust;
|
/freebsd-11-stable/contrib/unbound/util/data/ |
H A D | packed_rrset.h | 128 * RRset trustworthiness. Bigger value is more trust. RFC 2181. 138 * Added validated and ultimate trust for keys and rrsig validated content. 141 /** initial value for trust */ 167 /** ultimately trusted, no more trust is possible; 184 * below a configured trust anchor. */ 187 * insecure. Generally this means that this RRset is below a trust 247 enum rrset_trust trust; member in struct:packed_rrset_data 327 * Compared rdata and rrsigdata, not the trust or ttl value. 386 * Get a printable string for a rrset trust value 387 * @param s: rrset trust valu [all...] |
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | x509.c | 127 " -addtrust arg - trust certificate for a given purpose\n", 188 STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL; 354 BIO_printf(bio_err, "Invalid trust object value %s\n", *argv); 357 if (!trust) 358 trust = sk_ASN1_OBJECT_new_null(); 359 sk_ASN1_OBJECT_push(trust, objtmp); 697 if (trust) { 698 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) { 699 objtmp = sk_ASN1_OBJECT_value(trust, i); 1037 sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_fre [all...] |
/freebsd-11-stable/crypto/openssl/crypto/x509v3/ |
H A D | v3_purp.c | 197 int X509_PURPOSE_add(int id, int trust, int flags, argument 207 /* This will always be set for application modified trust entries */ 239 ptmp->trust = trust; 296 return xp->trust;
|
H A D | x509v3.h | 460 int trust; /* Default trust ID */ member in struct:x509_purpose_st 707 int X509_PURPOSE_add(int id, int trust, int flags,
|
/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | x509v3.c | 2063 struct x509_certificate *cert, *trust; local 2135 for (trust = trusted; trust; trust = trust->next) { 2136 if (x509_name_compare(&cert->issuer, &trust->subject) 2141 if (trust) { 2144 if (x509_valid_issuer(trust) < 0) { 2149 if (x509_certificate_check_signature(trust, cert) < 0)
|
/freebsd-11-stable/contrib/unbound/daemon/ |
H A D | cachedump.c | 90 (int)d->trust, (int)d->security 444 unsigned int rr_count, rrsig_count, trust, security; local 468 &trust, &security) != 5) { 483 d->trust = (enum rrset_trust)trust;
|
/freebsd-11-stable/contrib/unbound/iterator/ |
H A D | iter_utils.c | 783 /* a trust anchor exists above the name? */ 787 /* insecure trust point */ 794 /* no trust anchor above it. */ 806 /* a trust anchor exists with this name, RRSIGs expected */ 810 /* insecure trust point */ 928 d1->trust != d2->trust || 1154 newd->trust = rrset_trust_ans_noAA;
|
/freebsd-11-stable/contrib/unbound/dns64/ |
H A D | dns64.c | 742 dd->trust = fd->trust;
|
/freebsd-11-stable/contrib/unbound/smallapp/ |
H A D | unbound-anchor.c | 44 * trust anchor. It is a small tool, called "unbound-anchor", that 249 /** return the built in root DS trust anchor */ 616 * no trust anchor). Without DNSSEC validation. 1586 * https://data.iana.org/root-anchors/draft-icann-dnssec-trust-anchor.txt 1756 verify_p7sig(BIO* data, BIO* p7s, STACK_OF(X509)* trust, const char* p7signer) argument 1798 /* convert trust to trusted certificate store */ 1799 for(i=0; i<sk_X509_num(trust); i++) { 1800 if(!X509_STORE_add_cert(store, sk_X509_value(trust, i))) { 1843 if(fprintf(out, "; autotrust trust anchor file\n" 1987 * 1 if trust [all...] |
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | ssl.h | 1056 int trust; /* Trust setting */ 1504 int trust; /* Trust setting */ 2297 int SSL_CTX_set_trust(SSL_CTX *s, int trust); 2298 int SSL_set_trust(SSL *s, int trust);
|