Home
last modified time | relevance | path

Searched refs:untrusted (Results 1 - 25 of 102) sorted by relevance

12345

/third_party/mesa3d/src/gallium/drivers/vc4/kernel/
H A Dvc4_validate.c48 void *untrusted
126 validate_bin_pos(struct vc4_exec_info *exec, void *untrusted, uint32_t pos) in validate_bin_pos() argument
128 /* Note that the untrusted pointer passed to these functions is in validate_bin_pos()
131 return (untrusted - 1 == exec->bin_u + pos); in validate_bin_pos()
206 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 1)) { in validate_flush()
235 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 2)) { in validate_increment_semaphore()
249 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_indexed_prim_list()
250 uint32_t offset = *(uint32_t *)(untrusted + 5); in validate_indexed_prim_list()
251 uint32_t max_index = *(uint32_t *)(untrusted + 9); in validate_indexed_prim_list()
252 uint32_t index_size = (*(uint8_t *)(untrusted in validate_indexed_prim_list()
[all...]
/third_party/openssl/test/
H A Dverify_extra_test.c54 * leaf and subinterCA are in the untrusted list (untrusted.pem)
66 STACK_OF(X509) *untrusted = NULL; in test_alt_chains_cert_forgery()
81 untrusted = load_certs_pem(untrusted_f); in test_alt_chains_cert_forgery()
90 if (!X509_STORE_CTX_init(sctx, store, x, untrusted)) in test_alt_chains_cert_forgery()
102 sk_X509_pop_free(untrusted, X509_free); in test_alt_chains_cert_forgery()
231 STACK_OF(X509) *untrusted = sk_X509_new_null(); in do_test_purpose()
239 || !TEST_ptr(untrusted) in do_test_purpose()
247 if (!TEST_true(sk_X509_push(untrusted, untrcert))) in do_test_purpose()
251 if (!TEST_true(X509_STORE_CTX_init(ctx, NULL, eecert, untrusted))) in do_test_purpose()
[all...]
/third_party/node/deps/openssl/openssl/crypto/ts/
H A Dts_rsp_verify.c19 static int ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted,
93 STACK_OF(X509) *untrusted = NULL; in TS_RESP_verify_signature()
130 untrusted = sk_X509_new_reserve(NULL, sk_X509_num(certs) in TS_RESP_verify_signature()
132 if (untrusted == NULL in TS_RESP_verify_signature()
133 || !X509_add_certs(untrusted, certs, 0) in TS_RESP_verify_signature()
134 || !X509_add_certs(untrusted, token->d.sign->cert, 0)) in TS_RESP_verify_signature()
136 if (!ts_verify_cert(store, untrusted, signer, &chain)) in TS_RESP_verify_signature()
160 sk_X509_free(untrusted); in TS_RESP_verify_signature()
171 static int ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, in ts_verify_cert() argument
184 if (!X509_STORE_CTX_init(cert_ctx, store, signer, untrusted)) in ts_verify_cert()
[all...]
/third_party/openssl/crypto/ts/
H A Dts_rsp_verify.c19 static int ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted,
93 STACK_OF(X509) *untrusted = NULL; in TS_RESP_verify_signature()
130 untrusted = sk_X509_new_reserve(NULL, sk_X509_num(certs) in TS_RESP_verify_signature()
132 if (untrusted == NULL in TS_RESP_verify_signature()
133 || !X509_add_certs(untrusted, certs, 0) in TS_RESP_verify_signature()
134 || !X509_add_certs(untrusted, token->d.sign->cert, 0)) in TS_RESP_verify_signature()
136 if (!ts_verify_cert(store, untrusted, signer, &chain)) in TS_RESP_verify_signature()
160 sk_X509_free(untrusted); in TS_RESP_verify_signature()
171 static int ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, in ts_verify_cert() argument
184 if (!X509_STORE_CTX_init(cert_ctx, store, signer, untrusted)) in ts_verify_cert()
[all...]
/third_party/node/deps/openssl/openssl/crypto/ocsp/
H A Docsp_vfy.c32 STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) in ocsp_verify_signer()
42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) { in ocsp_verify_signer()
103 STACK_OF(X509) *untrusted = NULL; in OCSP_basic_verify()
118 if ((untrusted = sk_X509_dup(bs->certs)) == NULL) in OCSP_basic_verify()
120 if (!X509_add_certs(untrusted, certs, X509_ADD_FLAG_DEFAULT)) in OCSP_basic_verify()
123 ret = ocsp_verify_signer(signer, 1, st, flags, untrusted, &chain); in OCSP_basic_verify()
158 sk_X509_free(untrusted); in OCSP_basic_verify()
30 ocsp_verify_signer(X509 *signer, int response, X509_STORE *st, unsigned long flags, STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) ocsp_verify_signer() argument
/third_party/openssl/crypto/ocsp/
H A Docsp_vfy.c32 STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) in ocsp_verify_signer()
42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) { in ocsp_verify_signer()
103 STACK_OF(X509) *untrusted = NULL; in OCSP_basic_verify()
118 if ((untrusted = sk_X509_dup(bs->certs)) == NULL) in OCSP_basic_verify()
120 if (!X509_add_certs(untrusted, certs, X509_ADD_FLAG_DEFAULT)) in OCSP_basic_verify()
123 ret = ocsp_verify_signer(signer, 1, st, flags, untrusted, &chain); in OCSP_basic_verify()
158 sk_X509_free(untrusted); in OCSP_basic_verify()
30 ocsp_verify_signer(X509 *signer, int response, X509_STORE *st, unsigned long flags, STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) ocsp_verify_signer() argument
/third_party/node/deps/openssl/openssl/apps/
H A Dverify.c61 {"untrusted", OPT_UNTRUSTED, '<', "A file of untrusted certificates"},
82 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; in verify_main()
148 if (!load_certs(opt_arg(), 0, &untrusted, NULL, in verify_main()
149 "untrusted certificates")) in verify_main()
224 if (check(store, NULL, untrusted, trusted, crls, show_chain, in verify_main()
229 if (check(store, argv[i], untrusted, trusted, crls, show_chain, in verify_main()
237 sk_X509_pop_free(untrusted, X509_free); in verify_main()
308 BIO_printf(bio_out, " (untrusted)"); in check()
H A Dts.c68 char *untrusted, X509_VERIFY_PARAM *vpm);
73 char *untrusted,
103 {"untrusted", OPT_UNTRUSTED, '<', "Extra untrusted certs"},
153 " -untrusted extra-certs.pem [-data file] [-digest hexstring]",
162 char *untrusted = NULL; in ts_main() local
274 untrusted = opt_arg(); in ts_main()
338 CApath, CAfile, CAstore, untrusted, in ts_main()
849 const char *CAstore, char *untrusted, in verify_command()
869 CApath, CAfile, CAstore, untrusted, in verify_command()
846 verify_command(const char *data, const char *digest, const char *queryfile, const char *in, int token_in, const char *CApath, const char *CAfile, const char *CAstore, char *untrusted, X509_VERIFY_PARAM *vpm) verify_command() argument
893 create_verify_ctx(const char *data, const char *digest, const char *queryfile, const char *CApath, const char *CAfile, const char *CAstore, char *untrusted, X509_VERIFY_PARAM *vpm) create_verify_ctx() argument
[all...]
H A Dpkcs12.c120 {"untrusted", OPT_UNTRUSTED, '<', "Untrusted certificates for chain building"},
158 char *untrusted = NULL, *ciphername = NULL, *enc_flag = NULL; in pkcs12_main() local
290 untrusted = opt_arg(); in pkcs12_main()
391 if (untrusted != NULL) in pkcs12_main()
392 WARN_NO_EXPORT("untrusted"); in pkcs12_main()
577 /* Load any untrusted certificates for chain building */ in pkcs12_main()
578 if (untrusted != NULL) { in pkcs12_main()
579 if (!load_certs(untrusted, 0, &untrusted_certs, passcerts, in pkcs12_main()
580 "untrusted certificates")) in pkcs12_main()
/third_party/openssl/apps/
H A Dverify.c61 {"untrusted", OPT_UNTRUSTED, '<', "A file of untrusted certificates"},
82 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; in verify_main()
148 if (!load_certs(opt_arg(), 0, &untrusted, NULL, in verify_main()
149 "untrusted certificates")) in verify_main()
224 if (check(store, NULL, untrusted, trusted, crls, show_chain, in verify_main()
229 if (check(store, argv[i], untrusted, trusted, crls, show_chain, in verify_main()
237 sk_X509_pop_free(untrusted, X509_free); in verify_main()
308 BIO_printf(bio_out, " (untrusted)"); in check()
H A Dts.c68 char *untrusted, X509_VERIFY_PARAM *vpm);
73 char *untrusted,
103 {"untrusted", OPT_UNTRUSTED, '<', "Extra untrusted certs"},
153 " -untrusted extra-certs.pem [-data file] [-digest hexstring]",
162 char *untrusted = NULL; in ts_main() local
274 untrusted = opt_arg(); in ts_main()
338 CApath, CAfile, CAstore, untrusted, in ts_main()
849 const char *CAstore, char *untrusted, in verify_command()
869 CApath, CAfile, CAstore, untrusted, in verify_command()
846 verify_command(const char *data, const char *digest, const char *queryfile, const char *in, int token_in, const char *CApath, const char *CAfile, const char *CAstore, char *untrusted, X509_VERIFY_PARAM *vpm) verify_command() argument
893 create_verify_ctx(const char *data, const char *digest, const char *queryfile, const char *CApath, const char *CAfile, const char *CAstore, char *untrusted, X509_VERIFY_PARAM *vpm) create_verify_ctx() argument
[all...]
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_ctx.c58 return ctx->untrusted; in STACK_OF()
62 * Set untrusted certificates for path construction in authentication of
67 STACK_OF(X509) *untrusted = NULL; in OSSL_CMP_CTX_set1_untrusted()
73 if (!ossl_x509_add_certs_new(&untrusted, certs, in OSSL_CMP_CTX_set1_untrusted()
76 sk_X509_pop_free(ctx->untrusted, X509_free); in OSSL_CMP_CTX_set1_untrusted()
77 ctx->untrusted = untrusted; in OSSL_CMP_CTX_set1_untrusted()
80 sk_X509_pop_free(untrusted, X509_free); in OSSL_CMP_CTX_set1_untrusted()
121 if ((ctx->untrusted = sk_X509_new_null()) == NULL) in OSSL_CMP_CTX_new()
202 sk_X509_pop_free(ctx->untrusted, X509_fre in OSSL_CMP_CTX_free()
[all...]
H A Dcmp_vfy.c124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path()
400 * Verify msg trying first ctx->untrusted, which should include extraCerts
420 if (check_msg_with_certs(ctx, ctx->untrusted, "untrusted certs", in check_msg_all_certs()
432 msg->extraCerts, ctx->untrusted, in check_msg_all_certs()
538 * else it is searched in msg->extraCerts, ctx->untrusted, in ctx->trusted
647 * Any msg->extraCerts are prepended to ctx->untrusted.
704 if (!X509_add_certs(ctx->untrusted, msg->extraCerts, in ossl_cmp_msg_check_update()
786 if (!X509_add_certs(ctx->untrusted, msg->extraCerts, in ossl_cmp_msg_check_update()
/third_party/openssl/crypto/cmp/
H A Dcmp_ctx.c58 return ctx->untrusted; in STACK_OF()
62 * Set untrusted certificates for path construction in authentication of
67 STACK_OF(X509) *untrusted = NULL; in OSSL_CMP_CTX_set1_untrusted()
73 if (!ossl_x509_add_certs_new(&untrusted, certs, in OSSL_CMP_CTX_set1_untrusted()
76 sk_X509_pop_free(ctx->untrusted, X509_free); in OSSL_CMP_CTX_set1_untrusted()
77 ctx->untrusted = untrusted; in OSSL_CMP_CTX_set1_untrusted()
80 sk_X509_pop_free(untrusted, X509_free); in OSSL_CMP_CTX_set1_untrusted()
121 if ((ctx->untrusted = sk_X509_new_null()) == NULL) in OSSL_CMP_CTX_new()
202 sk_X509_pop_free(ctx->untrusted, X509_fre in OSSL_CMP_CTX_free()
[all...]
H A Dcmp_vfy.c124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path()
400 * Verify msg trying first ctx->untrusted, which should include extraCerts
420 if (check_msg_with_certs(ctx, ctx->untrusted, "untrusted certs", in check_msg_all_certs()
432 msg->extraCerts, ctx->untrusted, in check_msg_all_certs()
538 * else it is searched in msg->extraCerts, ctx->untrusted, in ctx->trusted
647 * Any msg->extraCerts are prepended to ctx->untrusted.
704 if (!X509_add_certs(ctx->untrusted, msg->extraCerts, in ossl_cmp_msg_check_update()
786 if (!X509_add_certs(ctx->untrusted, msg->extraCerts, in ossl_cmp_msg_check_update()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_openssl_ocsp.c504 STACK_OF(X509) *untrusted = NULL, *certs = NULL, *chain = NULL; in check_ocsp_resp()
565 untrusted = sk_X509_dup(basic->certs); in check_ocsp_resp()
566 if (!untrusted) in check_ocsp_resp()
579 if (!sk_X509_push(untrusted, extra_cert)) { in check_ocsp_resp()
581 "OpenSSL: Could not add certificate to the untrusted stack"); in check_ocsp_resp()
618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp()
646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted)) in check_ocsp_resp()
838 sk_X509_free(untrusted); in check_ocsp_resp()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_openssl_ocsp.c504 STACK_OF(X509) *untrusted = NULL, *certs = NULL, *chain = NULL; in check_ocsp_resp()
565 untrusted = sk_X509_dup(basic->certs); in check_ocsp_resp()
566 if (!untrusted) in check_ocsp_resp()
579 if (!sk_X509_push(untrusted, extra_cert)) { in check_ocsp_resp()
581 "OpenSSL: Could not add certificate to the untrusted stack"); in check_ocsp_resp()
618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp()
646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted)) in check_ocsp_resp()
838 sk_X509_free(untrusted); in check_ocsp_resp()
/third_party/rust/crates/cxx/gen/lib/src/syntax/
H A Dtypes.rs22 pub untrusted: UnorderedMap<&'a Ident, &'a ExternType>,
38 let mut untrusted = UnorderedMap::new(); variables
130 untrusted.insert(ident, ety);
207 untrusted,
/third_party/rust/crates/cxx/gen/build/src/syntax/
H A Dtypes.rs22 pub untrusted: UnorderedMap<&'a Ident, &'a ExternType>,
38 let mut untrusted = UnorderedMap::new(); variables
130 untrusted.insert(ident, ety);
207 untrusted,
/third_party/rust/crates/cxx/gen/cmd/src/syntax/
H A Dtypes.rs22 pub untrusted: UnorderedMap<&'a Ident, &'a ExternType>,
38 let mut untrusted = UnorderedMap::new(); variables
130 untrusted.insert(ident, ety);
207 untrusted,
/third_party/rust/crates/cxx/syntax/
H A Dtypes.rs22 pub untrusted: UnorderedMap<&'a Ident, &'a ExternType>,
38 let mut untrusted = UnorderedMap::new(); variables
130 untrusted.insert(ident, ety);
207 untrusted,
/third_party/rust/crates/cxx/macro/src/syntax/
H A Dtypes.rs22 pub untrusted: UnorderedMap<&'a Ident, &'a ExternType>,
38 let mut untrusted = UnorderedMap::new(); variables
130 untrusted.insert(ident, ety);
207 untrusted,
/third_party/node/test/parallel/
H A Dtest-abortcontroller.js62 const untrusted = Reflect.getOwnPropertyDescriptor(Object.getPrototypeOf(ev3), 'isTrusted').get;
64 strictEqual(untrusted, firstTrusted);
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dx509_vfy.c256 if (ctx->cert == NULL && sk_X509_num(ctx->untrusted) >= 1) in X509_STORE_CTX_verify()
257 ctx->cert = sk_X509_value(ctx->untrusted, 0); in X509_STORE_CTX_verify()
887 * If no trusted certs in chain at all return untrusted and allow in check_trust()
1299 * untrusted certificates. in crl_akid_check()
1301 for (i = 0; i < sk_X509_num(ctx->untrusted); i++) { in crl_akid_check()
1302 crl_issuer = sk_X509_value(ctx->untrusted, i); in crl_akid_check()
1327 if (!X509_STORE_CTX_init(&crl_ctx, ctx->store, x, ctx->untrusted)) in check_crl_path()
2332 ctx->untrusted = chain; in X509_STORE_CTX_init()
2515 return ctx->untrusted; in STACK_OF()
2520 ctx->untrusted in X509_STORE_CTX_set0_untrusted()
[all...]
/third_party/openssl/crypto/x509/
H A Dx509_vfy.c256 if (ctx->cert == NULL && sk_X509_num(ctx->untrusted) >= 1) in X509_STORE_CTX_verify()
257 ctx->cert = sk_X509_value(ctx->untrusted, 0); in X509_STORE_CTX_verify()
887 * If no trusted certs in chain at all return untrusted and allow in check_trust()
1299 * untrusted certificates. in crl_akid_check()
1301 for (i = 0; i < sk_X509_num(ctx->untrusted); i++) { in crl_akid_check()
1302 crl_issuer = sk_X509_value(ctx->untrusted, i); in crl_akid_check()
1327 if (!X509_STORE_CTX_init(&crl_ctx, ctx->store, x, ctx->untrusted)) in check_crl_path()
2334 ctx->untrusted = chain; in X509_STORE_CTX_init()
2517 return ctx->untrusted; in STACK_OF()
2522 ctx->untrusted in X509_STORE_CTX_set0_untrusted()
[all...]

Completed in 25 milliseconds

12345