Home
last modified time | relevance | path

Searched refs:trust (Results 1 – 25 of 163) sorted by relevance

1234567

/third_party/openssl/crypto/x509/
Dx509_trs.c18 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags);
19 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags);
20 static int trust_compat(X509_TRUST *trust, X509 *x, int flags);
54 return (*a)->trust - (*b)->trust; in tr_cmp()
57 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, in X509_TRUST_set_default()
61 default_trust = trust; in X509_TRUST_set_default()
106 tmp.trust = id; in X509_TRUST_get_by_id()
113 int X509_TRUST_set(int *t, int trust) in X509_TRUST_set() argument
115 if (X509_TRUST_get_by_id(trust) == -1) { in X509_TRUST_set()
119 *t = trust; in X509_TRUST_set()
[all …]
Dx_x509a.c27 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT),
114 if (aux->trust == NULL in X509_add1_trust_object()
115 && (aux->trust = sk_ASN1_OBJECT_new_null()) == NULL) in X509_add1_trust_object()
117 if (!objtmp || sk_ASN1_OBJECT_push(aux->trust, objtmp)) in X509_add1_trust_object()
144 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free); in X509_trust_clear()
145 x->aux->trust = NULL; in X509_trust_clear()
160 return x->aux->trust; in STACK_OF()
Dx509_vfy.c427 tr_ok = X509_check_trust(x, ctx->param->trust, X509_TRUST_NO_SS_COMPAT); in check_purpose()
784 int trust; in check_trust() local
791 switch (trust = check_dane_issuer(ctx, num_untrusted)) { in check_trust()
794 return trust; in check_trust()
806 trust = X509_check_trust(x, ctx->param->trust, 0); in check_trust()
808 if (trust == X509_TRUST_TRUSTED) in check_trust()
810 if (trust == X509_TRUST_REJECTED) in check_trust()
839 trust = X509_check_trust(mx, ctx->param->trust, 0); in check_trust()
840 if (trust == X509_TRUST_REJECTED) { in check_trust()
2184 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) in X509_STORE_CTX_set_trust() argument
[all …]
Dt_x509.c330 STACK_OF(ASN1_OBJECT) *trust, *reject; in X509_aux_print()
336 trust = X509_get0_trust_objects(x); in X509_aux_print()
338 if (trust) { in X509_aux_print()
341 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) { in X509_aux_print()
347 sk_ASN1_OBJECT_value(trust, i), 0); in X509_aux_print()
Dx509_vpm.c91 param->trust = X509_TRUST_DEFAULT; in X509_VERIFY_PARAM_new()
180 x509_verify_param_copy(trust, X509_TRUST_DEFAULT); in X509_VERIFY_PARAM_inherit()
306 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) in X509_VERIFY_PARAM_set_trust() argument
308 return X509_TRUST_set(&param->trust, trust); in X509_VERIFY_PARAM_set_trust()
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-policy2c/
Dminimal-secure-streams.c266 if (pol->trust.store) { in main()
269 if (a->orig == (const char *)pol->trust.store) in main()
284 a->orig = (const char *)pol->trust.store; in main()
292 for (n = 0; n < pol->trust.store->count; n++) { in main()
293 if (!pol->trust.store->ssx509[n]) in main()
297 if (a1->orig == (const char *)pol->trust.store->ssx509[n]) in main()
313 a1->orig = (const char *)pol->trust.store->ssx509[n]; in main()
317 purify_csymbol(pol->trust.store->ssx509[n]->vhost_name, in main()
320 for (m = 0; m < (int)pol->trust.store->ssx509[n]->ca_der_len; m++) { in main()
324 printf("0x%02X, ", pol->trust.store->ssx509[n]->ca_der[m]); in main()
[all …]
/third_party/libwebsockets/READMEs/
DREADME.jit-trust.md1 # JIT trust
3 ![JIT Trust logo](../doc-assets/jit-trust-logo.png)
7 Most systems using openssl rely on a system trust bundle that openssl was
14 ![Using system trust bundles](../doc-assets/jit-trust-system-trust.png)
25 ![Using system trust bundles](../doc-assets/jit-trust-single-trust.png)
29 "JIT trust".
31 ## JIT trust overview
37 ![JIT Trust overview](../doc-assets/jit-trust-overview.png)
41 connection, if it is one that we do actually trust. If it lies about what CA it
42 needs to validate, or we do not trust the one it asks for, subsequent
[all …]
DREADME.libressl.md27 Libressl by default will look for a trust bundle in `/usr/local/etc/ssl/cert.pem`, you either have …
28 symlink this to your trust bundle if that doesnt happen to be where it is, or give your app the tru…
31 In Fedora, the system trust store can be found at `/etc/pki/tls/cert.pem`, so you can symlink it
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-staticpolicy/
Dstatic-policy.h1346 .trust = {.store = &_ss_ts_mqtt_amz_iot},
1363 .trust = {.store = &_ss_ts_mqtt_amz_iot},
1379 .trust = {.store = &_ss_ts_le_via_isrg},
1395 .trust = {.store = &_ss_ts_le_via_isrg},
1411 .trust = {.store = &_ss_ts_le_via_isrg},
1429 .trust = {.store = &_ss_ts_le_via_isrg},
1451 .trust = {.store = &_ss_ts_avs_via_starfield},
1474 .trust = {.store = &_ss_ts_avs_via_starfield},
1494 .trust = {.store = &_ss_ts_avs_via_starfield},
1510 .trust = {.store = &_ss_ts_api_amazon_com},
/third_party/openssl/doc/man3/
DX509_STORE_CTX_new.pod51 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
53 int purpose, int trust);
134 certificate itself. In addition the trust store containing trusted certificates
135 can declare what purposes we trust different certificates for. This "trust"
141 administrator might only trust it for the former. An X.509 certificate extension
158 purpose also has an associated default trust value which will also be set at the
159 same time. During verification this trust setting will be verified to check it
160 is consistent with the trust set by the system administrator for certificates in
163 X509_STORE_CTX_set_trust() sets the trust value for the target certificate
164 being verified in the I<ctx>. Built-in available values for the I<trust>
[all …]
DX509_VERIFY_PARAM_set_flags.pod36 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
89 X509_VERIFY_PARAM_set_trust() sets the trust setting in B<param> to
90 B<trust>.
108 neither the end-entity certificate nor the trust-anchor count against this
111 directly by the trust-anchor, while with a B<depth> limit of 1 there can be one
112 intermediate CA certificate between the trust-anchor and the end-entity
121 The signature algorithm security level is not enforced for the chain's I<trust
279 in L<X509_verify_cert(3)> will search the trust store for issuer certificates
283 This is especially important when some certificates in the trust store have
284 explicit trust settings (see "TRUST SETTINGS" in L<x509(1)>).
[all …]
Di2d_re_X509_tbs.pod25 consist of an X509 certificate followed by auxiliary trust information.
30 contains both the certificate and any auxiliary trust information.
/third_party/libwebsockets/lib/secure-streams/
Dpolicy-common.c311 if (!pol->trust.store) { in lws_ss_policy_ref_trust_store()
329 v = lws_get_vhost_by_name(context, pol->trust.store->name); in lws_ss_policy_ref_trust_store()
336 i.vhost_name = pol->trust.store->name; in lws_ss_policy_ref_trust_store()
339 i.client_ssl_ca_mem = pol->trust.store->ssx509[0]->ca_der; in lws_ss_policy_ref_trust_store()
341 pol->trust.store->ssx509[0]->ca_der_len; in lws_ss_policy_ref_trust_store()
345 i.vhost_name, pol->trust.store->ssx509[0]->vhost_name); in lws_ss_policy_ref_trust_store()
355 for (n = 1; v && n < pol->trust.store->count; n++) { in lws_ss_policy_ref_trust_store()
357 pol->trust.store->ssx509[n]->vhost_name); in lws_ss_policy_ref_trust_store()
360 pol->trust.store->ssx509[n]->ca_der, in lws_ss_policy_ref_trust_store()
361 pol->trust.store->ssx509[n]->ca_der_len)) { in lws_ss_policy_ref_trust_store()
[all …]
Dsecure-streams.c771 if (!h->policy->trust.store) in _lws_ss_client_connect()
776 h->policy->trust.store->name); in _lws_ss_client_connect()
780 h->policy->trust.store->name); in _lws_ss_client_connect()
1229 h->policy->trust.server.cert->ca_der; in lws_ss_create()
1231 h->policy->trust.server.cert->ca_der_len; in lws_ss_create()
1233 h->policy->trust.server.key->ca_der; in lws_ss_create()
1235 h->policy->trust.server.key->ca_der_len; in lws_ss_create()
/third_party/curl/docs/
DSSLCERTS.md20 It is about trust
23 This system is about trust. In your local CA certificate store you have certs
26 trust.
28 Which CAs do you trust? You can decide to trust the same set of companies your
29 operating system trusts, or the set one of the known browsers trust. That's
30 basically trust via someone else you trust. You should just be aware that
31 modern operating systems and browsers are setup to trust *hundreds* of
102 - If you want to trust the certificate, you can add it to your CA
137 p11-kit-nss-trust which makes NSS use the system wide CA certificate store. NSS
172 With these options, you make sure that the TLS connection and the trust of the
/third_party/curl/lib/vtls/
Dsectransp.c2339 SecTrustRef trust; local
2340 OSStatus ret = SSLCopyPeerTrust(ctx, &trust);
2341 if(!trust) {
2352 ret = SecTrustSetAnchorCertificates(trust, array);
2355 CFRelease(trust);
2359 ret = SecTrustSetAnchorCertificatesOnly(trust, true);
2362 CFRelease(trust);
2368 ret = SecTrustEvaluate(trust, &trust_eval);
2370 CFRelease(trust);
2444 SecTrustRef trust; local
[all …]
/third_party/openssl/apps/
Dx509.c161 STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL; in x509_main()
294 if (trust == NULL && (trust = sk_ASN1_OBJECT_new_null()) == NULL) in x509_main()
296 sk_ASN1_OBJECT_push(trust, objtmp); in x509_main()
610 if (trust != NULL) { in x509_main()
611 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) { in x509_main()
612 objtmp = sk_ASN1_OBJECT_value(trust, i); in x509_main()
903 sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_free); in x509_main()
/third_party/openssl/doc/man1/
Dverify.pod175 self-signed trust-anchor, provided it is possible to construct a chain to a
221 trust store to see if an alternative chain can be found that is trusted.
228 to construct a certificate chain from the subject certificate to a trust-anchor.
240 That is, the only trust-anchors are those listed in B<file>.
263 the chain except for the chain's I<trust anchor>, which is either directly
277 end-entity certificate nor the trust-anchor certificate count against the
297 Use default verification policies like trust model and required certificate
299 The trust model determines which auxiliary trust or reject OIDs are applicable
305 These mimics the combinations of purpose and trust settings used in SSL, CMS
307 As of OpenSSL 1.1.0, the trust model is inferred from the purpose when not
[all …]
/third_party/node/doc/guides/contributing/
Dcode-of-conduct.md19 Open, diverse, and inclusive communities live and die on the basis of trust.
20 Contributors can disagree with one another so long as they trust that those
/third_party/libwebsockets/minimal-examples/embedded/esp32/esp-wrover-kit/main/
Dstatic-policy.h242 .trust = {.store = &_ss_ts_le_via_isrg},
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
Dx509v3.c2146 struct x509_certificate *cert, *trust; in x509_certificate_chain_validate() local
2218 for (trust = trusted; trust; trust = trust->next) { in x509_certificate_chain_validate()
2219 if (x509_name_compare(&cert->issuer, &trust->subject) in x509_certificate_chain_validate()
2224 if (trust) { in x509_certificate_chain_validate()
2227 if (x509_valid_issuer(trust) < 0) { in x509_certificate_chain_validate()
2232 if (x509_certificate_check_signature(trust, cert) < 0) in x509_certificate_chain_validate()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
Dx509v3.c2084 struct x509_certificate *cert, *trust; in x509_certificate_chain_validate() local
2156 for (trust = trusted; trust; trust = trust->next) { in x509_certificate_chain_validate()
2157 if (x509_name_compare(&cert->issuer, &trust->subject) in x509_certificate_chain_validate()
2162 if (trust) { in x509_certificate_chain_validate()
2165 if (x509_valid_issuer(trust) < 0) { in x509_certificate_chain_validate()
2170 if (x509_certificate_check_signature(trust, cert) < 0) in x509_certificate_chain_validate()
/third_party/flutter/skia/resources/text/
Denglish.txt3 …ountry or territory to which a person belongs, whether it be independent, trust, non-self-governin…
/third_party/skia/resources/text/
Denglish.txt3 …ountry or territory to which a person belongs, whether it be independent, trust, non-self-governin…
/third_party/openssl/include/openssl/
Dx509_vfy.h282 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
508 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
510 int purpose, int trust);
545 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);

1234567