/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/ |
H A D | bind.keys | 2 # The bind.keys file is used to override the built-in DNSSEC trust anchors 4 # trust anchors it contains are those for the DNS root zone ("."), and for 5 # the ISC DNSSEC Lookaside Validation zone ("dlv.isc.org"). Trust anchors 9 # The built-in trust anchors are provided for convenience of configuration. 35 # ROOT KEY: See https://data.iana.org/root-anchors/root-anchors.xml
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hx509/ |
H A D | test_cms.in | 63 --anchors=FILE:$srcdir/data/secp160r1TestCA.cert.pem \ 77 --anchors=FILE:$srcdir/data/ca.crt \ 92 --anchors=FILE:$srcdir/data/ca.crt \ 100 --anchors=FILE:$srcdir/data/ca.crt \ 114 --anchors=FILE:$srcdir/data/ca.crt \ 121 --anchors=FILE:$srcdir/data/test.crt \ 135 --anchors=FILE:$srcdir/data/ca.crt \ 148 --anchors=FILE:$srcdir/data/ca.crt \ 162 --anchors=FILE:$srcdir/data/ca.crt \ 177 --anchors [all...] |
H A D | ks_keychain.c | 318 int anchors; member in struct:ks_keychain 336 if (strcasecmp(residue, "system-anchors") == 0) { 337 ctx->anchors = 1; 396 if (ctx->anchors) { 397 CFArrayRef anchors; local 408 ret = SecTrustCopyAnchorCertificates(&anchors); 413 "Can't get trust anchors from Keychain"); 416 for (i = 0; i < CFArrayGetCount(anchors); i++) { 421 cr = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, i); 432 CFRelease(anchors); [all...] |
H A D | hxtool.c | 188 hx509_certs anchors = NULL; local 205 ret = hx509_certs_init(context, "MEMORY:cms-anchors", 0, NULL, &anchors); 212 certs_strings(context, "anchors", anchors, lock, &opt->anchors_strings); 283 hx509_verify_attach_anchors(ctx, anchors); 317 hx509_certs_free(&anchors); 366 hx509_certs store, pool, anchors, signer = NULL; local 396 ret = hx509_certs_init(context, "MEMORY:cert-anchors", 397 0, NULL, &anchors); 864 hx509_certs anchors, chain, certs; local [all...] |
H A D | cms.c | 1132 * @param anchors trust anchors that the client will use, used to 1135 * trust anchors. 1150 hx509_certs anchors, 1168 digest_alg, certs, peer, anchors, pool, 1185 hx509_certs anchors; member in struct:sigctx 1378 sigctx->anchors, 1443 hx509_certs anchors, 1491 sigctx.anchors = anchors; 1143 hx509_cms_create_signed_1(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_cert cert, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument 1436 hx509_cms_create_signed(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_certs certs, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument [all...] |
H A D | cert.c | 435 * Set the trust anchors in the verification context, makes an 441 * @param set a keyset containing the trust anchors. 556 * Allow using the operating system builtin trust anchors if no other 557 * trust anchors are configured. 561 * trust anchors. 1220 * If the trust anchors are not given, calculate optimistic path, just 1236 hx509_certs anchors, 1254 while (!certificate_is_anchor(context, anchors, current)) { 1256 ret = find_parent(context, time_now, anchors, path, 1278 certificate_is_anchor(context, anchors, pat 1233 _hx509_calculate_path(hx509_context context, int flags, time_t time_now, hx509_certs anchors, unsigned int max_depth, hx509_cert cert, hx509_certs pool, hx509_path *path) argument 1979 hx509_certs anchors = NULL; local [all...] |
H A D | test_ca.in | 303 --anchors=FILE:cert-ca.pem \
|
/netbsd-6-1-5-RELEASE/sbin/newfs_udf/ |
H A D | udf_create.h | 91 uint32_t anchors[UDF_ANCHORS]; member in struct:udf_disclayout 154 struct anchor_vdp *anchors[UDF_ANCHORS]; /* anchors to VDS */ member in struct:udf_create_context
|
H A D | udf_create.c | 137 layout.anchors[0] = first_lba + 256; 139 layout.anchors[0] = first_lba + 512; 140 layout.anchors[1] = last_lba - 256; 141 layout.anchors[2] = last_lba; 144 first_lba = layout.anchors[0] + blockingnr; 145 last_lba = layout.anchors[1] - 1; 159 layout.vds2 = layout.anchors[1] - layout.vds_size; 300 printf("\tanchor0\t\t\t%d\n", layout.anchors[0]); 301 printf("\tanchor1\t\t\t%d\n", layout.anchors[1]); 302 printf("\tanchor2\t\t\t%d\n", layout.anchors[ [all...] |
H A D | newfs_udf.c | 1086 /* Create anchors */ 1130 /* Writeout anchors */ 1132 dscr = (union dscrptr *) context.anchors[cnt]; 1133 loc = layout.anchors[cnt];
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/g++.dg/torture/ |
H A D | pr36745.C | 110 QMap < int, int >anchors; member in struct:QRegExpAutomatonState
|
/netbsd-6-1-5-RELEASE/usr.bin/nbsvtool/ |
H A D | nbsvtool.c | 100 * `infile'. The trust anchor file `anchor' to the trust anchors must 303 const char *anchors = NULL; local 317 anchors = optarg; 406 verify_file(crypto_state.cert_chain, anchors, file, sigfile);
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.dg/vect/ |
H A D | vect.exp | 199 # -fsection-anchors tests 201 lappend DEFAULT_VECTCFLAGS "-fsection-anchors" 202 dg-runtest [lsort [glob -nocomplain $srcdir/$subdir/section-anchors-*.\[cS\]]] \ 205 # alignment-sensitive -fsection-anchors tests 207 lappend DEFAULT_VECTCFLAGS "-fsection-anchors" "-fdump-ipa-increase_alignment" 208 dg-runtest [lsort [glob -nocomplain $srcdir/$subdir/aligned-section-anchors-*.\[cS\]]] \ 211 # -fno-section-anchors tests 213 lappend DEFAULT_VECTCFLAGS "-fno-section-anchors" 214 dg-runtest [lsort [glob -nocomplain $srcdir/$subdir/no-section-anchors-*.\[cS\]]] \
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | krb5_locl.h | 336 hx509_certs anchors; member in struct:krb5_pk_identity
|
H A D | pkinit.c | 773 ctx->id->anchors, req.trustedCertifiers); 1899 ret = hx509_certs_init(context->hx509ctx, anchor_id, 0, NULL, &id->anchors); 1902 "Failed to init anchors"); 1955 hx509_verify_attach_anchors(id->verify_ctx, id->anchors); 1962 hx509_certs_free(&id->anchors); 2337 hx509_certs_free(&ctx->id->anchors); 2369 char *anchors = NULL; local 2405 "pkinit_anchors", NULL, &anchors); 2406 x509_anchors = anchors;
|
/netbsd-6-1-5-RELEASE/external/gpl3/binutils/dist/bfd/ |
H A D | pef.c | 136 struct traceback_table_anchors anchors; local 140 anchors.ctl_info = bfd_getb32 (buf + pos + offset); 143 if (anchors.ctl_info > 1024) 146 offset += anchors.ctl_info * 4;
|
/netbsd-6-1-5-RELEASE/external/gpl3/gdb/dist/bfd/ |
H A D | pef.c | 136 struct traceback_table_anchors anchors; local 140 anchors.ctl_info = bfd_getb32 (buf + pos + offset); 143 if (anchors.ctl_info > 1024) 146 offset += anchors.ctl_info * 4;
|
/netbsd-6-1-5-RELEASE/sys/fs/udf/ |
H A D | udf.h | 271 struct anchor_vdp *anchors[UDF_ANCHORS]; /* anchors to VDS */ member in struct:udf_mount
|
H A D | udf_vfsops.c | 250 MPFREE(ump->anchors[i], M_UDFVOLD); 662 /* read all anchors to get volume descriptor sequence */ 667 DPRINTF(VOLUMES, ("Read %d anchors on this disc, session %d\n",
|
H A D | udf_subr.c | 929 /* read anchors start+256, start+512, end-256, end */ 937 anchorsp = ump->anchors; 1130 * read in VDS space provided by the anchors; if one descriptor read 1138 anchor = ump->anchors[0]; 1139 anchor2 = ump->anchors[1]; 1872 if (ump->anchors[0] == NULL) 3679 (union dscrptr *) ump->anchors[0], sector, sector); 3807 (union dscrptr *) ump->anchors[0],
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/kdc/ |
H A D | pkinit.c | 523 "MEMORY:trust-anchors", 526 krb5_set_error_message(context, ret, "failed to create trust anchors"); 531 kdc_identity->anchors); 538 /* Add any registered certificates for this client as trust anchors */ 624 "MEMORY:client-anchors", 629 "Can't allocate client anchors: %d", 1951 const char *anchors, 1972 anchors, 1948 krb5_kdc_pk_initialize(krb5_context context, krb5_kdc_configuration *config, const char *user_id, const char *anchors, char **pool, char **revoke_list) argument
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/ |
H A D | varasm.c | 6632 /* Don't use anchors for mergeable sections. The linker might move 6638 /* Don't use anchors for small data sections. The small data register 6646 /* Don't use section anchors for decls that might be defined by 6651 /* Don't use section anchors for decls that will be placed in a 6964 We try to place anchors RANGE bytes apart, so there can then be 6965 anchors at +/-RANGE, +/-2 * RANGE, and so on, up to the limits of 6968 likewise the highest anchor for the highest offset. Use anchors 7002 end = VEC_length (rtx, block->anchors); 7006 anchor = VEC_index (rtx, block->anchors, middle); 7026 VEC_safe_insert (rtx, gc, block->anchors, begi [all...] |
H A D | rtl.h | 235 VEC(rtx,gc) *anchors;
|
/netbsd-6-1-5-RELEASE/external/bsd/flex/dist/doc/ |
H A D | texinfo.tex | 5992 % empty for anchors.
|
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/doc/include/ |
H A D | texinfo.tex | 6016 % empty for anchors.
|