Lines Matching defs:trust

18 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags);
19 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags);
20 static int trust_compat(X509_TRUST *trust, X509 *x, int flags);
26 * WARNING: the following table should be kept in order of trust and without
27 * any gaps so we can just subtract the minimum trust value to get an index
54 return (*a)->trust - (*b)->trust;
57 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *,
61 default_trust = trust;
106 tmp.trust = id;
113 int X509_TRUST_set(int *t, int trust)
115 if (X509_TRUST_get_by_id(trust) < 0) {
119 *t = trust;
132 /* This will always be set for application modified trust entries */
159 trtmp->trust = id;
214 return xp->trust;
217 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags)
220 * Declare the chain verified if the desired trust OID is not rejected in
221 * any auxiliary trust info for this certificate, and the OID is either
226 return obj_trust(trust->arg1, x, flags);
229 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags)
232 * Declare the chain verified only if the desired trust OID is not
234 * trust in self-signed certificates apply.
237 return obj_trust(trust->arg1, x, flags);
240 static int trust_compat(X509_TRUST *trust, X509 *x, int flags)
267 if (ax && ax->trust) {
268 for (i = 0; i < sk_ASN1_OBJECT_num(ax->trust); i++) {
269 ASN1_OBJECT *obj = sk_ASN1_OBJECT_value(ax->trust, i);
277 * Reject when explicit trust EKU are set and none match.
280 * self-signed roots, because when explicit trust is specified it
281 * suppresses the default blanket trust of self-signed objects.
284 * trust-self-signed policy, non matching EKUs are indistinguishable