Home
last modified time | relevance | path

Searched refs:trusted (Results 1 – 25 of 176) sorted by relevance

12345678

/third_party/openssl/test/
Dx509aux.c38 const int trusted = (strcmp(name, PEM_STRING_X509_TRUSTED) == 0); in test_certs() local
39 d2i_X509_t d2i = trusted ? d2i_X509_AUX : d2i_X509; in test_certs()
40 i2d_X509_t i2d = trusted ? i2d_X509_AUX : i2d_X509; in test_certs()
48 if (!trusted in test_certs()
124 if (trusted) { in test_certs()
Dverify_extra_test.c208 STACK_OF(X509) *trusted = sk_X509_new_null(); in test_self_signed()
213 && TEST_true(sk_X509_push(trusted, cert)) in test_self_signed()
215 X509_STORE_CTX_set0_trusted_stack(ctx, trusted); in test_self_signed()
219 sk_X509_free(trusted); in test_self_signed()
/third_party/uboot/u-boot-2020.01/doc/
DREADME.armada-secureboot1 The trusted boot framework on Marvell Armada 38x
6 1. Overview of the trusted boot
15 1. Overview of the trusted boot
18 The Armada's trusted boot framework enables the SoC to cryptographically verify
48 image, which employs this trusted boot framework, the following tasks need to
61 The documentation of the trusted boot mode is contained in part 1, chapter
88 trusted boot (also known as "security header")
92 Trusted debug mode - A special mode for the trusted boot that allows
93 debugging of devices employing the trusted boot
124 For the trusted boot framework, a additional header is added to the boot image.
[all …]
/third_party/openssl/apps/
Dverify.c66 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; in verify_main()
132 if (!load_certs(opt_arg(), &trusted, FORMAT_PEM, NULL, in verify_main()
165 if (trusted != NULL && (CAfile || CApath)) { in verify_main()
186 if (check(store, NULL, untrusted, trusted, crls, show_chain) != 1) in verify_main()
190 if (check(store, argv[i], untrusted, trusted, crls, in verify_main()
199 sk_X509_pop_free(trusted, X509_free); in verify_main()
/third_party/openssl/doc/man3/
DX509_STORE_add_cert.pod37 and validating chains of certificates terminating in trusted roots.
43 no information about trusted certificates or where such certificates
44 are located on disk, and is generally not usable. Normally, trusted
56 trusted entities such as root certificate authorities (CAs).
57 OpenSSL represents these trusted certificates internally as B<X509> objects
60 The public interfaces that operate on such trusted certificates still
80 X509_STORE_load_locations() loads trusted certificate(s) into an
DPKCS7_verify.pod20 the signer's certificate. B<store> is a trusted certificate store (used for
51 the supplied trusted certificate store. Any internal certificates in the message
75 the signer's certificate) must be contained in the trusted store.
95 signer it cannot be trusted without additional evidence (such as a trusted
109 The trusted certificate store is not searched for the signers certificate,
DCMS_verify.pod20 the signing certificate(s). B<store> is a trusted certificate store used for
44 the supplied trusted certificate store. Any internal certificates in the message
98 signer it cannot be trusted without additional evidence (such as a trusted
112 The trusted certificate store is not searched for the signing certificate,
/third_party/glib/gio/gvdb/
Dgvdb-reader.c32 gboolean trusted; member
141 gboolean trusted, in gvdb_table_new_from_bytes() argument
150 file->trusted = trusted; in gvdb_table_new_from_bytes()
203 gboolean trusted, in gvdb_table_new() argument
215 table = gvdb_table_new_from_bytes (bytes, trusted, error); in gvdb_table_new()
591 variant = g_variant_new_from_bytes (G_VARIANT_TYPE_VARIANT, bytes, table->trusted); in gvdb_table_value_from_item()
698 new->trusted = file->trusted; in gvdb_table_get_table()
Dgvdb-reader.h46 gboolean trusted,
50 gboolean trusted,
/third_party/curl/tests/data/
Dtest9765 --location-trusted
61 HTTP with auth redirected to HTTP on a diff port --location-trusted
64 -x http://%HOSTIP:%HTTPPORT http://firsthost.com --location-trusted -u joe:secret
Dtest2349 --location-trusted
67 HTTP, proxy, site+proxy auth and Location: to new host using location-trusted
70 …age/%TESTNUMBER -x %HOSTIP:%HTTPPORT --user iam:myself --proxy-user testing:this --location-trusted
Dtest108810 --location-trusted
79 HTTP, proxy with --anyauth and Location: to new host using location-trusted
82 …/want/that/page/%TESTNUMBER1000 -x %HOSTIP:%HTTPPORT --user iam:myself --location-trusted --anyauth
Dtest9756 --location-trusted
62 http://%HOSTIP:%HTTPPORT/%TESTNUMBER --location-trusted -u joe:secret
/third_party/uboot/u-boot-2020.01/board/st/stm32mp1/
DREADME134 - For trusted boot mode : "stm32mp15_trusted_defconfig"
135 - For trusted with OP-TEE boot mode : "stm32mp15_optee_defconfig"
143 a) trusted boot on ev1
148 b) trusted with OP-TEE boot on dk2
288 for trusted boot mode :
472 $> dfu-util -d 0483:5720 -a 3 -D tf-a-stm32mp157c-ev1-trusted.stm32
473 $> dfu-util -d 0483:5720 -a 4 -D tf-a-stm32mp157c-ev1-trusted.stm32
474 $> dfu-util -d 0483:5720 -a 5 -D u-boot-stm32mp157c-ev1-trusted.img
481 $> dfu-util -d 0483:5720 -a 10 -D tf-a-stm32mp157c-ev1-trusted.stm32
482 $> dfu-util -d 0483:5720 -a 11 -D tf-a-stm32mp157c-ev1-trusted.stm32
[all …]
/third_party/uboot/u-boot-2020.01/include/crypto/
Dpublic_key.h70 struct key *trusted);
75 struct key *trusted);
/third_party/uboot/u-boot-2020.01/board/rockchip/evb_rk3328/
DREADME31 > git clone https://github.com/ARM-software/arm-trusted-firmware.git
38 > cd arm-trusted-firmware
57 > cp arm-trusted-firmware/build/rk3328/release/bl31.bin rkbin/rk33
/third_party/openssl/doc/man1/
Dverify.pod42 [B<-trusted file>]
70 A B<file> of trusted certificates.
75 A directory of trusted certificates. The certificates should have names
83 Do not load the trusted CA certificates from the default file location.
87 Do not load the trusted CA certificates from the default directory location.
133 the B<-trusted>, B<-untrusted> or B<-CRLfile> options, the B<-engine> option
176 trusted certificate that might not be self-signed.
210 When constructing the certificate chain, use the trusted certificates specified
211 via B<-CAfile>, B<-CApath> or B<-trusted> before any certificates specified via
219 chain, if the first certificate chain found is not trusted, then OpenSSL will
[all …]
/third_party/glib/glib/
Dgvariant.c668 gboolean trusted; in NUMERIC_TYPE() local
672 trusted = g_variant_is_trusted (children[0]); in NUMERIC_TYPE()
674 value = g_variant_new_from_children (maybe_type, children, 1, trusted); in NUMERIC_TYPE()
785 gboolean trusted; in g_variant_new_array() local
795 trusted = TRUE; in g_variant_new_array()
805 trusted &= g_variant_is_trusted (children[i]); in g_variant_new_array()
809 n_children, trusted); in g_variant_new_array()
865 gboolean trusted; in g_variant_new_tuple() local
872 trusted = TRUE; in g_variant_new_tuple()
877 trusted &= g_variant_is_trusted (children[i]); in g_variant_new_tuple()
[all …]
Dgvariant-core.c482 gboolean trusted) in g_variant_alloc() argument
489 (trusted ? STATE_TRUSTED : 0) | in g_variant_alloc()
521 gboolean trusted) in g_variant_new_from_bytes() argument
529 value = g_variant_alloc (type, TRUE, trusted); in g_variant_new_from_bytes()
620 gboolean trusted) in g_variant_new_from_children() argument
624 value = g_variant_alloc (type, FALSE, trusted); in g_variant_new_from_children()
Dgvariant-core.h31 … gboolean trusted);
/third_party/mbedtls/tests/suites/
Dtest_suite_x509parse.function617 mbedtls_x509_crt trusted, chain;
624 mbedtls_x509_crt_init( &trusted );
627 /* Load trusted root */
628 TEST_ASSERT( mbedtls_x509_crt_parse_file( &trusted, ca_file ) == 0 );
638 ret = mbedtls_x509_crt_verify( &chain, &trusted, NULL, NULL, &flags,
645 mbedtls_x509_crt_free( &trusted );
657 mbedtls_x509_crt trusted, chain;
661 mbedtls_x509_crt_init( &trusted );
665 TEST_ASSERT( mbedtls_x509_crt_parse_file( &trusted, trusted_ca ) == 0 );
678 res = mbedtls_x509_crt_verify_with_profile( &chain, &trusted, NULL, profile,
[all …]
/third_party/uboot/u-boot-2020.01/board/hisilicon/hikey960/
DREADME26 > git clone https://github.com/ARM-software/arm-trusted-firmware
52 > cd ~/hikey960/src/arm-trusted-firmware
63 > ln -sf ~/hikey960/src/arm-trusted-firmware/build/hikey960/debug/bl1.bin
64 > ln -sf ~/hikey960/src/arm-trusted-firmware/build/hikey960/debug/bl2.bin
65 > ln -sf ~/hikey960/src/arm-trusted-firmware/build/hikey960/debug/fip.bin
74 https://github.com/ARM-software/arm-trusted-firmware/blob/master/docs/plat/hikey960.rst
/third_party/uboot/u-boot-2020.01/board/rockchip/evb_rk3399/
DREADME34 > git clone https://github.com/ARM-software/arm-trusted-firmware.git
42 > cd arm-trusted-firmware
95 > cp arm-trusted-firmware/build/rk3399/release/bl31.elf rkbin/rk33
/third_party/openssl/doc/man7/
DRAND.pod24 It seeds and reseeds itself automatically using trusted random sources
31 Although (re-)seeding is automatic, it can fail because no trusted random source
32 is available or the trusted source(s) temporarily fail to provide sufficient
/third_party/uboot/u-boot-2020.01/board/theobroma-systems/lion_rk3368/
DREADME6 > git clone git://git.theobroma-systems.com/arm-trusted-firmware.git
7 > cd arm-trusted-firmware

12345678