/third_party/openssl/test/ |
D | x509aux.c | 38 const int trusted = (strcmp(name, PEM_STRING_X509_TRUSTED) == 0); in test_certs() local 39 d2i_X509_t d2i = trusted ? d2i_X509_AUX : d2i_X509; in test_certs() 40 i2d_X509_t i2d = trusted ? i2d_X509_AUX : i2d_X509; in test_certs() 48 if (!trusted in test_certs() 124 if (trusted) { in test_certs()
|
D | verify_extra_test.c | 208 STACK_OF(X509) *trusted = sk_X509_new_null(); in test_self_signed() 213 && TEST_true(sk_X509_push(trusted, cert)) in test_self_signed() 215 X509_STORE_CTX_set0_trusted_stack(ctx, trusted); in test_self_signed() 219 sk_X509_free(trusted); in test_self_signed()
|
/third_party/uboot/u-boot-2020.01/doc/ |
D | README.armada-secureboot | 1 The trusted boot framework on Marvell Armada 38x 6 1. Overview of the trusted boot 15 1. Overview of the trusted boot 18 The Armada's trusted boot framework enables the SoC to cryptographically verify 48 image, which employs this trusted boot framework, the following tasks need to 61 The documentation of the trusted boot mode is contained in part 1, chapter 88 trusted boot (also known as "security header") 92 Trusted debug mode - A special mode for the trusted boot that allows 93 debugging of devices employing the trusted boot 124 For the trusted boot framework, a additional header is added to the boot image. [all …]
|
/third_party/openssl/apps/ |
D | verify.c | 66 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; in verify_main() 132 if (!load_certs(opt_arg(), &trusted, FORMAT_PEM, NULL, in verify_main() 165 if (trusted != NULL && (CAfile || CApath)) { in verify_main() 186 if (check(store, NULL, untrusted, trusted, crls, show_chain) != 1) in verify_main() 190 if (check(store, argv[i], untrusted, trusted, crls, in verify_main() 199 sk_X509_pop_free(trusted, X509_free); in verify_main()
|
/third_party/openssl/doc/man3/ |
D | X509_STORE_add_cert.pod | 37 and validating chains of certificates terminating in trusted roots. 43 no information about trusted certificates or where such certificates 44 are located on disk, and is generally not usable. Normally, trusted 56 trusted entities such as root certificate authorities (CAs). 57 OpenSSL represents these trusted certificates internally as B<X509> objects 60 The public interfaces that operate on such trusted certificates still 80 X509_STORE_load_locations() loads trusted certificate(s) into an
|
D | PKCS7_verify.pod | 20 the signer's certificate. B<store> is a trusted certificate store (used for 51 the supplied trusted certificate store. Any internal certificates in the message 75 the signer's certificate) must be contained in the trusted store. 95 signer it cannot be trusted without additional evidence (such as a trusted 109 The trusted certificate store is not searched for the signers certificate,
|
D | CMS_verify.pod | 20 the signing certificate(s). B<store> is a trusted certificate store used for 44 the supplied trusted certificate store. Any internal certificates in the message 98 signer it cannot be trusted without additional evidence (such as a trusted 112 The trusted certificate store is not searched for the signing certificate,
|
/third_party/glib/gio/gvdb/ |
D | gvdb-reader.c | 32 gboolean trusted; member 141 gboolean trusted, in gvdb_table_new_from_bytes() argument 150 file->trusted = trusted; in gvdb_table_new_from_bytes() 203 gboolean trusted, in gvdb_table_new() argument 215 table = gvdb_table_new_from_bytes (bytes, trusted, error); in gvdb_table_new() 591 variant = g_variant_new_from_bytes (G_VARIANT_TYPE_VARIANT, bytes, table->trusted); in gvdb_table_value_from_item() 698 new->trusted = file->trusted; in gvdb_table_get_table()
|
D | gvdb-reader.h | 46 gboolean trusted, 50 gboolean trusted,
|
/third_party/curl/tests/data/ |
D | test976 | 5 --location-trusted 61 HTTP with auth redirected to HTTP on a diff port --location-trusted 64 -x http://%HOSTIP:%HTTPPORT http://firsthost.com --location-trusted -u joe:secret
|
D | test234 | 9 --location-trusted 67 HTTP, proxy, site+proxy auth and Location: to new host using location-trusted 70 …age/%TESTNUMBER -x %HOSTIP:%HTTPPORT --user iam:myself --proxy-user testing:this --location-trusted
|
D | test1088 | 10 --location-trusted 79 HTTP, proxy with --anyauth and Location: to new host using location-trusted 82 …/want/that/page/%TESTNUMBER1000 -x %HOSTIP:%HTTPPORT --user iam:myself --location-trusted --anyauth
|
D | test975 | 6 --location-trusted 62 http://%HOSTIP:%HTTPPORT/%TESTNUMBER --location-trusted -u joe:secret
|
/third_party/uboot/u-boot-2020.01/board/st/stm32mp1/ |
D | README | 134 - For trusted boot mode : "stm32mp15_trusted_defconfig" 135 - For trusted with OP-TEE boot mode : "stm32mp15_optee_defconfig" 143 a) trusted boot on ev1 148 b) trusted with OP-TEE boot on dk2 288 for trusted boot mode : 472 $> dfu-util -d 0483:5720 -a 3 -D tf-a-stm32mp157c-ev1-trusted.stm32 473 $> dfu-util -d 0483:5720 -a 4 -D tf-a-stm32mp157c-ev1-trusted.stm32 474 $> dfu-util -d 0483:5720 -a 5 -D u-boot-stm32mp157c-ev1-trusted.img 481 $> dfu-util -d 0483:5720 -a 10 -D tf-a-stm32mp157c-ev1-trusted.stm32 482 $> dfu-util -d 0483:5720 -a 11 -D tf-a-stm32mp157c-ev1-trusted.stm32 [all …]
|
/third_party/uboot/u-boot-2020.01/include/crypto/ |
D | public_key.h | 70 struct key *trusted); 75 struct key *trusted);
|
/third_party/uboot/u-boot-2020.01/board/rockchip/evb_rk3328/ |
D | README | 31 > git clone https://github.com/ARM-software/arm-trusted-firmware.git 38 > cd arm-trusted-firmware 57 > cp arm-trusted-firmware/build/rk3328/release/bl31.bin rkbin/rk33
|
/third_party/openssl/doc/man1/ |
D | verify.pod | 42 [B<-trusted file>] 70 A B<file> of trusted certificates. 75 A directory of trusted certificates. The certificates should have names 83 Do not load the trusted CA certificates from the default file location. 87 Do not load the trusted CA certificates from the default directory location. 133 the B<-trusted>, B<-untrusted> or B<-CRLfile> options, the B<-engine> option 176 trusted certificate that might not be self-signed. 210 When constructing the certificate chain, use the trusted certificates specified 211 via B<-CAfile>, B<-CApath> or B<-trusted> before any certificates specified via 219 chain, if the first certificate chain found is not trusted, then OpenSSL will [all …]
|
/third_party/glib/glib/ |
D | gvariant.c | 668 gboolean trusted; in NUMERIC_TYPE() local 672 trusted = g_variant_is_trusted (children[0]); in NUMERIC_TYPE() 674 value = g_variant_new_from_children (maybe_type, children, 1, trusted); in NUMERIC_TYPE() 785 gboolean trusted; in g_variant_new_array() local 795 trusted = TRUE; in g_variant_new_array() 805 trusted &= g_variant_is_trusted (children[i]); in g_variant_new_array() 809 n_children, trusted); in g_variant_new_array() 865 gboolean trusted; in g_variant_new_tuple() local 872 trusted = TRUE; in g_variant_new_tuple() 877 trusted &= g_variant_is_trusted (children[i]); in g_variant_new_tuple() [all …]
|
D | gvariant-core.c | 482 gboolean trusted) in g_variant_alloc() argument 489 (trusted ? STATE_TRUSTED : 0) | in g_variant_alloc() 521 gboolean trusted) in g_variant_new_from_bytes() argument 529 value = g_variant_alloc (type, TRUE, trusted); in g_variant_new_from_bytes() 620 gboolean trusted) in g_variant_new_from_children() argument 624 value = g_variant_alloc (type, FALSE, trusted); in g_variant_new_from_children()
|
D | gvariant-core.h | 31 … gboolean trusted);
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_x509parse.function | 617 mbedtls_x509_crt trusted, chain; 624 mbedtls_x509_crt_init( &trusted ); 627 /* Load trusted root */ 628 TEST_ASSERT( mbedtls_x509_crt_parse_file( &trusted, ca_file ) == 0 ); 638 ret = mbedtls_x509_crt_verify( &chain, &trusted, NULL, NULL, &flags, 645 mbedtls_x509_crt_free( &trusted ); 657 mbedtls_x509_crt trusted, chain; 661 mbedtls_x509_crt_init( &trusted ); 665 TEST_ASSERT( mbedtls_x509_crt_parse_file( &trusted, trusted_ca ) == 0 ); 678 res = mbedtls_x509_crt_verify_with_profile( &chain, &trusted, NULL, profile, [all …]
|
/third_party/uboot/u-boot-2020.01/board/hisilicon/hikey960/ |
D | README | 26 > git clone https://github.com/ARM-software/arm-trusted-firmware 52 > cd ~/hikey960/src/arm-trusted-firmware 63 > ln -sf ~/hikey960/src/arm-trusted-firmware/build/hikey960/debug/bl1.bin 64 > ln -sf ~/hikey960/src/arm-trusted-firmware/build/hikey960/debug/bl2.bin 65 > ln -sf ~/hikey960/src/arm-trusted-firmware/build/hikey960/debug/fip.bin 74 https://github.com/ARM-software/arm-trusted-firmware/blob/master/docs/plat/hikey960.rst
|
/third_party/uboot/u-boot-2020.01/board/rockchip/evb_rk3399/ |
D | README | 34 > git clone https://github.com/ARM-software/arm-trusted-firmware.git 42 > cd arm-trusted-firmware 95 > cp arm-trusted-firmware/build/rk3399/release/bl31.elf rkbin/rk33
|
/third_party/openssl/doc/man7/ |
D | RAND.pod | 24 It seeds and reseeds itself automatically using trusted random sources 31 Although (re-)seeding is automatic, it can fail because no trusted random source 32 is available or the trusted source(s) temporarily fail to provide sufficient
|
/third_party/uboot/u-boot-2020.01/board/theobroma-systems/lion_rk3368/ |
D | README | 6 > git clone git://git.theobroma-systems.com/arm-trusted-firmware.git 7 > cd arm-trusted-firmware
|