/freebsd-10.0-release/crypto/openssl/crypto/x509/ |
H A D | x509_trs.c | 68 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 69 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 70 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 75 /* WARNING: the following table should be kept in order of trust 76 * and without any gaps so we can just subtract the minimum trust 100 return (*a)->trust - (*b)->trust; 103 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int) 107 default_trust = trust; 142 tmp.trust 149 X509_TRUST_set(int *t, int trust) argument 244 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) argument 254 trust_1oid(X509_TRUST *trust, X509 *x, int flags) argument 260 trust_compat(X509_TRUST *trust, X509 *x, int flags) argument [all...] |
H A D | x509_vpm.c | 76 param->trust = 0; 175 x509_verify_param_copy(trust, 0); 246 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) argument 248 return X509_TRUST_set(¶m->trust, trust); 329 0, /* trust */ 339 X509_TRUST_EMAIL, /* trust */ 349 X509_TRUST_EMAIL, /* trust */ 359 X509_TRUST_SSL_CLIENT, /* trust */ 369 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
H A D | x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
H A D | x509_vfy.c | 266 * so we get any trust settings. 349 /* The chain extensions are OK: check trust */ 351 if (param->trust > 0) ok = check_trust(ctx); 619 * chain including trust anchor. Trust anchor not strictly 655 ok = X509_check_trust(x, ctx->param->trust, 0); 1154 * end in the same trust anchor, though some discussions remain... 1924 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) argument 1926 return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust); 1929 /* This function is used to set the X509_STORE_CTX purpose and trust 1931 * own trust an 1939 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) argument [all...] |
H A D | x509_lu.c | 699 int X509_STORE_set_trust(X509_STORE *ctx, int trust) argument 701 return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
|
H A D | x509.h | 272 STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ member in struct:x509_cert_aux_st 314 /* This is used for a table of trust checking functions */ 317 int trust; member in struct:x509_trust_st 332 /* standard trust ids */ 856 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int); 857 int X509_TRUST_set(int *t, int trust);
|
/freebsd-10.0-release/crypto/openssl/crypto/asn1/ |
H A D | t_x509a.c | 73 if(aux->trust) { 77 for(i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) { 81 sk_ASN1_OBJECT_value(aux->trust, i), 0);
|
H A D | x_x509a.c | 75 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT), 143 if(!aux->trust 144 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0; 145 return sk_ASN1_OBJECT_push(aux->trust, objtmp); 161 if(x->aux && x->aux->trust) { 162 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free); 163 x->aux->trust = NULL;
|
/freebsd-10.0-release/contrib/unbound/services/cache/ |
H A D | rrset.c | 137 if( newd->trust > cached->trust ) { 148 /* o same trust, but different in data - insert it */ 149 if( newd->trust == cached->trust && !equal ) { 351 if(updata->trust > cachedata->trust) 352 cachedata->trust = updata->trust; 398 if(cachedata->trust > updat [all...] |
H A D | dns.c | 610 newd->trust = rrset_trust_ans_noAA; 697 if(d->trust != rrset_trust_add_noAA && 698 d->trust != rrset_trust_add_AA && 700 (d->trust != rrset_trust_auth_noAA 701 && d->trust != rrset_trust_auth_AA) )) {
|
/freebsd-10.0-release/contrib/ntp/libntp/ |
H A D | authkeys.c | 199 u_long trust 206 printf("authtrust: keyid %08x life %lu\n", keyno, trust); 215 if (sk == 0 && !trust) 224 if (trust > 0) { 226 if (trust > 1) 227 sk->lifetime = current_time + trust;
|
/freebsd-10.0-release/contrib/ntp/ntpdate/ |
H A D | ntpdate.h | 23 u_char trust; /* trustability of the filtered data */ member in struct:server
|
H A D | ntptimeset.c | 1056 server->trust <<= 1; 1058 server->trust |= 1; 1146 if (server->trust != 0) 1147 return; /* can not trust it */ 1277 if (server->trust != 0) { 1345 if (server->trust != 0) { 2095 (void) fprintf(fp, "stratum %d, precision %d, leap %c%c, trust %03o\n", 2099 pp->trust);
|
H A D | ntpdate.c | 856 server->trust <<= 1; 858 server->trust |= 1; 1094 if (server->trust != 0) { 2165 (void) fprintf(fp, "stratum %d, precision %d, leap %c%c, trust %03o\n", 2169 pp->trust);
|
/freebsd-10.0-release/lib/libc/sparc64/gen/ |
H A D | fixunsdfsi.S | 57 .word 0 ! (who me, not trust the assembler?)
|
/freebsd-10.0-release/contrib/unbound/util/data/ |
H A D | packed_rrset.h | 118 * RRset trustworthiness. Bigger value is more trust. RFC 2181. 128 * Added validated and ultimate trust for keys and rrsig validated content. 131 /** initial value for trust */ 157 /** ultimately trusted, no more trust is possible; 174 * below a configured trust anchor. */ 177 * insecure. Generally this means that this RRset is below a trust 224 enum rrset_trust trust; member in struct:packed_rrset_data 304 * Compared rdata and rrsigdata, not the trust or ttl value. 363 * Get a printable string for a rrset trust value 364 * @param s: rrset trust valu [all...] |
/freebsd-10.0-release/crypto/openssl/apps/ |
H A D | x509.c | 127 " -addtrust arg - trust certificate for a given purpose\n", 182 STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL; 356 "Invalid trust object value %s\n", *argv); 359 if (!trust) trust = sk_ASN1_OBJECT_new_null(); 360 sk_ASN1_OBJECT_push(trust, objtmp); 707 if (trust) 709 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) 711 objtmp = sk_ASN1_OBJECT_value(trust, i); 1100 sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_fre [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/x509v3/ |
H A D | v3_purp.c | 172 int X509_PURPOSE_add(int id, int trust, int flags, argument 180 /* This will always be set for application modified trust entries */ 211 ptmp->trust = trust; 267 return xp->trust;
|
/freebsd-10.0-release/usr.bin/calendar/calendars/ |
H A D | calendar.computer | 18 01/17 Justice Dept. begins IBM anti-trust suit, 1969 (drops it, January 8, 1982)
|
/freebsd-10.0-release/contrib/wpa/src/tls/ |
H A D | x509v3.c | 1835 struct x509_certificate *cert, *trust; local 1906 for (trust = trusted; trust; trust = trust->next) { 1907 if (x509_name_compare(&cert->issuer, &trust->subject) 1912 if (trust) { 1915 if (x509_valid_issuer(trust) < 0) { 1920 if (x509_certificate_check_signature(trust, cert) < 0)
|
/freebsd-10.0-release/contrib/unbound/daemon/ |
H A D | cachedump.c | 134 (int)d->trust, (int)d->security 533 unsigned int ttl, rr_count, rrsig_count, trust, security; local 556 &trust, &security) != 5) { 567 d->trust = (enum rrset_trust)trust;
|
/freebsd-10.0-release/contrib/bmake/mk/ |
H A D | warnings.mk | 90 # may make your brain hurt - trust me; it works --sjg
|
/freebsd-10.0-release/contrib/unbound/iterator/ |
H A D | iter_utils.c | 551 /* a trust anchor exists with this name, RRSIGs expected */ 668 d1->trust != d2->trust || 812 newd->trust = rrset_trust_ans_noAA;
|
/freebsd-10.0-release/crypto/openssl/ssl/ |
H A D | ssl_lib.c | 340 s->trust = ctx->trust; 479 int SSL_CTX_set_trust(SSL_CTX *s, int trust) argument 481 return X509_VERIFY_PARAM_set_trust(s->param, trust); 484 int SSL_set_trust(SSL *s, int trust) argument 486 return X509_VERIFY_PARAM_set_trust(s->param, trust);
|
/freebsd-10.0-release/contrib/atf/atf-report/ |
H A D | integration_test.sh | 305 tp5: BOGUS TEST PROGRAM: Cannot trust its results because of \`Invalid format for test case list: 1: Unexpected token \`<<NEWLINE>>'; expected \`:''
|