/third_party/mesa3d/src/gallium/drivers/vc4/kernel/ |
H A D | vc4_validate.c | 48 void *untrusted 126 validate_bin_pos(struct vc4_exec_info *exec, void *untrusted, uint32_t pos) in validate_bin_pos() argument 128 /* Note that the untrusted pointer passed to these functions is in validate_bin_pos() 131 return (untrusted - 1 == exec->bin_u + pos); in validate_bin_pos() 206 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 1)) { in validate_flush() 235 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 2)) { in validate_increment_semaphore() 249 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_indexed_prim_list() 250 uint32_t offset = *(uint32_t *)(untrusted + 5); in validate_indexed_prim_list() 251 uint32_t max_index = *(uint32_t *)(untrusted + 9); in validate_indexed_prim_list() 252 uint32_t index_size = (*(uint8_t *)(untrusted in validate_indexed_prim_list() [all...] |
/third_party/openssl/test/ |
H A D | verify_extra_test.c | 54 * leaf and subinterCA are in the untrusted list (untrusted.pem) 66 STACK_OF(X509) *untrusted = NULL; in test_alt_chains_cert_forgery() 81 untrusted = load_certs_pem(untrusted_f); in test_alt_chains_cert_forgery() 90 if (!X509_STORE_CTX_init(sctx, store, x, untrusted)) in test_alt_chains_cert_forgery() 102 sk_X509_pop_free(untrusted, X509_free); in test_alt_chains_cert_forgery() 231 STACK_OF(X509) *untrusted = sk_X509_new_null(); in do_test_purpose() 239 || !TEST_ptr(untrusted) in do_test_purpose() 247 if (!TEST_true(sk_X509_push(untrusted, untrcert))) in do_test_purpose() 251 if (!TEST_true(X509_STORE_CTX_init(ctx, NULL, eecert, untrusted))) in do_test_purpose() [all...] |
/third_party/node/deps/openssl/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 19 static int ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, 93 STACK_OF(X509) *untrusted = NULL; in TS_RESP_verify_signature() 130 untrusted = sk_X509_new_reserve(NULL, sk_X509_num(certs) in TS_RESP_verify_signature() 132 if (untrusted == NULL in TS_RESP_verify_signature() 133 || !X509_add_certs(untrusted, certs, 0) in TS_RESP_verify_signature() 134 || !X509_add_certs(untrusted, token->d.sign->cert, 0)) in TS_RESP_verify_signature() 136 if (!ts_verify_cert(store, untrusted, signer, &chain)) in TS_RESP_verify_signature() 160 sk_X509_free(untrusted); in TS_RESP_verify_signature() 171 static int ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, in ts_verify_cert() argument 184 if (!X509_STORE_CTX_init(cert_ctx, store, signer, untrusted)) in ts_verify_cert() [all...] |
/third_party/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 19 static int ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, 93 STACK_OF(X509) *untrusted = NULL; in TS_RESP_verify_signature() 130 untrusted = sk_X509_new_reserve(NULL, sk_X509_num(certs) in TS_RESP_verify_signature() 132 if (untrusted == NULL in TS_RESP_verify_signature() 133 || !X509_add_certs(untrusted, certs, 0) in TS_RESP_verify_signature() 134 || !X509_add_certs(untrusted, token->d.sign->cert, 0)) in TS_RESP_verify_signature() 136 if (!ts_verify_cert(store, untrusted, signer, &chain)) in TS_RESP_verify_signature() 160 sk_X509_free(untrusted); in TS_RESP_verify_signature() 171 static int ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, in ts_verify_cert() argument 184 if (!X509_STORE_CTX_init(cert_ctx, store, signer, untrusted)) in ts_verify_cert() [all...] |
/third_party/node/deps/openssl/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 32 STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) in ocsp_verify_signer() 42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) { in ocsp_verify_signer() 103 STACK_OF(X509) *untrusted = NULL; in OCSP_basic_verify() 118 if ((untrusted = sk_X509_dup(bs->certs)) == NULL) in OCSP_basic_verify() 120 if (!X509_add_certs(untrusted, certs, X509_ADD_FLAG_DEFAULT)) in OCSP_basic_verify() 123 ret = ocsp_verify_signer(signer, 1, st, flags, untrusted, &chain); in OCSP_basic_verify() 158 sk_X509_free(untrusted); in OCSP_basic_verify() 30 ocsp_verify_signer(X509 *signer, int response, X509_STORE *st, unsigned long flags, STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) ocsp_verify_signer() argument
|
/third_party/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 32 STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) in ocsp_verify_signer() 42 if (!X509_STORE_CTX_init(ctx, st, signer, untrusted)) { in ocsp_verify_signer() 103 STACK_OF(X509) *untrusted = NULL; in OCSP_basic_verify() 118 if ((untrusted = sk_X509_dup(bs->certs)) == NULL) in OCSP_basic_verify() 120 if (!X509_add_certs(untrusted, certs, X509_ADD_FLAG_DEFAULT)) in OCSP_basic_verify() 123 ret = ocsp_verify_signer(signer, 1, st, flags, untrusted, &chain); in OCSP_basic_verify() 158 sk_X509_free(untrusted); in OCSP_basic_verify() 30 ocsp_verify_signer(X509 *signer, int response, X509_STORE *st, unsigned long flags, STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) ocsp_verify_signer() argument
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | verify.c | 61 {"untrusted", OPT_UNTRUSTED, '<', "A file of untrusted certificates"}, 82 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; in verify_main() 148 if (!load_certs(opt_arg(), 0, &untrusted, NULL, in verify_main() 149 "untrusted certificates")) in verify_main() 224 if (check(store, NULL, untrusted, trusted, crls, show_chain, in verify_main() 229 if (check(store, argv[i], untrusted, trusted, crls, show_chain, in verify_main() 237 sk_X509_pop_free(untrusted, X509_free); in verify_main() 308 BIO_printf(bio_out, " (untrusted)"); in check()
|
H A D | ts.c | 68 char *untrusted, X509_VERIFY_PARAM *vpm); 73 char *untrusted, 103 {"untrusted", OPT_UNTRUSTED, '<', "Extra untrusted certs"}, 153 " -untrusted extra-certs.pem [-data file] [-digest hexstring]", 162 char *untrusted = NULL; in ts_main() local 274 untrusted = opt_arg(); in ts_main() 338 CApath, CAfile, CAstore, untrusted, in ts_main() 849 const char *CAstore, char *untrusted, in verify_command() 869 CApath, CAfile, CAstore, untrusted, in verify_command() 846 verify_command(const char *data, const char *digest, const char *queryfile, const char *in, int token_in, const char *CApath, const char *CAfile, const char *CAstore, char *untrusted, X509_VERIFY_PARAM *vpm) verify_command() argument 893 create_verify_ctx(const char *data, const char *digest, const char *queryfile, const char *CApath, const char *CAfile, const char *CAstore, char *untrusted, X509_VERIFY_PARAM *vpm) create_verify_ctx() argument [all...] |
H A D | pkcs12.c | 120 {"untrusted", OPT_UNTRUSTED, '<', "Untrusted certificates for chain building"}, 158 char *untrusted = NULL, *ciphername = NULL, *enc_flag = NULL; in pkcs12_main() local 290 untrusted = opt_arg(); in pkcs12_main() 391 if (untrusted != NULL) in pkcs12_main() 392 WARN_NO_EXPORT("untrusted"); in pkcs12_main() 577 /* Load any untrusted certificates for chain building */ in pkcs12_main() 578 if (untrusted != NULL) { in pkcs12_main() 579 if (!load_certs(untrusted, 0, &untrusted_certs, passcerts, in pkcs12_main() 580 "untrusted certificates")) in pkcs12_main()
|
/third_party/openssl/apps/ |
H A D | verify.c | 61 {"untrusted", OPT_UNTRUSTED, '<', "A file of untrusted certificates"}, 82 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; in verify_main() 148 if (!load_certs(opt_arg(), 0, &untrusted, NULL, in verify_main() 149 "untrusted certificates")) in verify_main() 224 if (check(store, NULL, untrusted, trusted, crls, show_chain, in verify_main() 229 if (check(store, argv[i], untrusted, trusted, crls, show_chain, in verify_main() 237 sk_X509_pop_free(untrusted, X509_free); in verify_main() 308 BIO_printf(bio_out, " (untrusted)"); in check()
|
H A D | ts.c | 68 char *untrusted, X509_VERIFY_PARAM *vpm); 73 char *untrusted, 103 {"untrusted", OPT_UNTRUSTED, '<', "Extra untrusted certs"}, 153 " -untrusted extra-certs.pem [-data file] [-digest hexstring]", 162 char *untrusted = NULL; in ts_main() local 274 untrusted = opt_arg(); in ts_main() 338 CApath, CAfile, CAstore, untrusted, in ts_main() 849 const char *CAstore, char *untrusted, in verify_command() 869 CApath, CAfile, CAstore, untrusted, in verify_command() 846 verify_command(const char *data, const char *digest, const char *queryfile, const char *in, int token_in, const char *CApath, const char *CAfile, const char *CAstore, char *untrusted, X509_VERIFY_PARAM *vpm) verify_command() argument 893 create_verify_ctx(const char *data, const char *digest, const char *queryfile, const char *CApath, const char *CAfile, const char *CAstore, char *untrusted, X509_VERIFY_PARAM *vpm) create_verify_ctx() argument [all...] |
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_ctx.c | 58 return ctx->untrusted; in STACK_OF() 62 * Set untrusted certificates for path construction in authentication of 67 STACK_OF(X509) *untrusted = NULL; in OSSL_CMP_CTX_set1_untrusted() 73 if (!ossl_x509_add_certs_new(&untrusted, certs, in OSSL_CMP_CTX_set1_untrusted() 76 sk_X509_pop_free(ctx->untrusted, X509_free); in OSSL_CMP_CTX_set1_untrusted() 77 ctx->untrusted = untrusted; in OSSL_CMP_CTX_set1_untrusted() 80 sk_X509_pop_free(untrusted, X509_free); in OSSL_CMP_CTX_set1_untrusted() 121 if ((ctx->untrusted = sk_X509_new_null()) == NULL) in OSSL_CMP_CTX_new() 202 sk_X509_pop_free(ctx->untrusted, X509_fre in OSSL_CMP_CTX_free() [all...] |
H A D | cmp_vfy.c | 124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path() 400 * Verify msg trying first ctx->untrusted, which should include extraCerts 420 if (check_msg_with_certs(ctx, ctx->untrusted, "untrusted certs", in check_msg_all_certs() 432 msg->extraCerts, ctx->untrusted, in check_msg_all_certs() 538 * else it is searched in msg->extraCerts, ctx->untrusted, in ctx->trusted 647 * Any msg->extraCerts are prepended to ctx->untrusted. 704 if (!X509_add_certs(ctx->untrusted, msg->extraCerts, in ossl_cmp_msg_check_update() 786 if (!X509_add_certs(ctx->untrusted, msg->extraCerts, in ossl_cmp_msg_check_update()
|
/third_party/openssl/crypto/cmp/ |
H A D | cmp_ctx.c | 58 return ctx->untrusted; in STACK_OF() 62 * Set untrusted certificates for path construction in authentication of 67 STACK_OF(X509) *untrusted = NULL; in OSSL_CMP_CTX_set1_untrusted() 73 if (!ossl_x509_add_certs_new(&untrusted, certs, in OSSL_CMP_CTX_set1_untrusted() 76 sk_X509_pop_free(ctx->untrusted, X509_free); in OSSL_CMP_CTX_set1_untrusted() 77 ctx->untrusted = untrusted; in OSSL_CMP_CTX_set1_untrusted() 80 sk_X509_pop_free(untrusted, X509_free); in OSSL_CMP_CTX_set1_untrusted() 121 if ((ctx->untrusted = sk_X509_new_null()) == NULL) in OSSL_CMP_CTX_new() 202 sk_X509_pop_free(ctx->untrusted, X509_fre in OSSL_CMP_CTX_free() [all...] |
H A D | cmp_vfy.c | 124 cert, ctx->untrusted)) in OSSL_CMP_validate_cert_path() 400 * Verify msg trying first ctx->untrusted, which should include extraCerts 420 if (check_msg_with_certs(ctx, ctx->untrusted, "untrusted certs", in check_msg_all_certs() 432 msg->extraCerts, ctx->untrusted, in check_msg_all_certs() 538 * else it is searched in msg->extraCerts, ctx->untrusted, in ctx->trusted 647 * Any msg->extraCerts are prepended to ctx->untrusted. 704 if (!X509_add_certs(ctx->untrusted, msg->extraCerts, in ossl_cmp_msg_check_update() 786 if (!X509_add_certs(ctx->untrusted, msg->extraCerts, in ossl_cmp_msg_check_update()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_openssl_ocsp.c | 504 STACK_OF(X509) *untrusted = NULL, *certs = NULL, *chain = NULL; in check_ocsp_resp() 565 untrusted = sk_X509_dup(basic->certs); in check_ocsp_resp() 566 if (!untrusted) in check_ocsp_resp() 579 if (!sk_X509_push(untrusted, extra_cert)) { in check_ocsp_resp() 581 "OpenSSL: Could not add certificate to the untrusted stack"); in check_ocsp_resp() 618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp() 646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted)) in check_ocsp_resp() 838 sk_X509_free(untrusted); in check_ocsp_resp()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_openssl_ocsp.c | 504 STACK_OF(X509) *untrusted = NULL, *certs = NULL, *chain = NULL; in check_ocsp_resp() 565 untrusted = sk_X509_dup(basic->certs); in check_ocsp_resp() 566 if (!untrusted) in check_ocsp_resp() 579 if (!sk_X509_push(untrusted, extra_cert)) { in check_ocsp_resp() 581 "OpenSSL: Could not add certificate to the untrusted stack"); in check_ocsp_resp() 618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp() 646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted)) in check_ocsp_resp() 838 sk_X509_free(untrusted); in check_ocsp_resp()
|
/third_party/rust/crates/cxx/gen/lib/src/syntax/ |
H A D | types.rs | 22 pub untrusted: UnorderedMap<&'a Ident, &'a ExternType>, 38 let mut untrusted = UnorderedMap::new(); variables 130 untrusted.insert(ident, ety); 207 untrusted,
|
/third_party/rust/crates/cxx/gen/build/src/syntax/ |
H A D | types.rs | 22 pub untrusted: UnorderedMap<&'a Ident, &'a ExternType>, 38 let mut untrusted = UnorderedMap::new(); variables 130 untrusted.insert(ident, ety); 207 untrusted,
|
/third_party/rust/crates/cxx/gen/cmd/src/syntax/ |
H A D | types.rs | 22 pub untrusted: UnorderedMap<&'a Ident, &'a ExternType>, 38 let mut untrusted = UnorderedMap::new(); variables 130 untrusted.insert(ident, ety); 207 untrusted,
|
/third_party/rust/crates/cxx/syntax/ |
H A D | types.rs | 22 pub untrusted: UnorderedMap<&'a Ident, &'a ExternType>, 38 let mut untrusted = UnorderedMap::new(); variables 130 untrusted.insert(ident, ety); 207 untrusted,
|
/third_party/rust/crates/cxx/macro/src/syntax/ |
H A D | types.rs | 22 pub untrusted: UnorderedMap<&'a Ident, &'a ExternType>, 38 let mut untrusted = UnorderedMap::new(); variables 130 untrusted.insert(ident, ety); 207 untrusted,
|
/third_party/node/test/parallel/ |
H A D | test-abortcontroller.js | 62 const untrusted = Reflect.getOwnPropertyDescriptor(Object.getPrototypeOf(ev3), 'isTrusted').get; 64 strictEqual(untrusted, firstTrusted);
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | x509_vfy.c | 256 if (ctx->cert == NULL && sk_X509_num(ctx->untrusted) >= 1) in X509_STORE_CTX_verify() 257 ctx->cert = sk_X509_value(ctx->untrusted, 0); in X509_STORE_CTX_verify() 887 * If no trusted certs in chain at all return untrusted and allow in check_trust() 1299 * untrusted certificates. in crl_akid_check() 1301 for (i = 0; i < sk_X509_num(ctx->untrusted); i++) { in crl_akid_check() 1302 crl_issuer = sk_X509_value(ctx->untrusted, i); in crl_akid_check() 1327 if (!X509_STORE_CTX_init(&crl_ctx, ctx->store, x, ctx->untrusted)) in check_crl_path() 2332 ctx->untrusted = chain; in X509_STORE_CTX_init() 2515 return ctx->untrusted; in STACK_OF() 2520 ctx->untrusted in X509_STORE_CTX_set0_untrusted() [all...] |
/third_party/openssl/crypto/x509/ |
H A D | x509_vfy.c | 256 if (ctx->cert == NULL && sk_X509_num(ctx->untrusted) >= 1) in X509_STORE_CTX_verify() 257 ctx->cert = sk_X509_value(ctx->untrusted, 0); in X509_STORE_CTX_verify() 887 * If no trusted certs in chain at all return untrusted and allow in check_trust() 1299 * untrusted certificates. in crl_akid_check() 1301 for (i = 0; i < sk_X509_num(ctx->untrusted); i++) { in crl_akid_check() 1302 crl_issuer = sk_X509_value(ctx->untrusted, i); in crl_akid_check() 1327 if (!X509_STORE_CTX_init(&crl_ctx, ctx->store, x, ctx->untrusted)) in check_crl_path() 2334 ctx->untrusted = chain; in X509_STORE_CTX_init() 2517 return ctx->untrusted; in STACK_OF() 2522 ctx->untrusted in X509_STORE_CTX_set0_untrusted() [all...] |