/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | x509_trust.c | 18 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 19 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 20 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 26 * WARNING: the following table should be kept in order of trust and without 27 * any gaps so we can just subtract the minimum trust value to get an index 54 return (*a)->trust - (*b)->trust; in tr_cmp() 57 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, in X509_TRUST_set_default() 61 default_trust = trust; in X509_TRUST_set_default() 106 tmp.trust in X509_TRUST_get_by_id() 113 X509_TRUST_set(int *t, int trust) X509_TRUST_set() argument 217 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) trust_1oidany() argument 229 trust_1oid(X509_TRUST *trust, X509 *x, int flags) trust_1oid() argument 240 trust_compat(X509_TRUST *trust, X509 *x, int flags) trust_compat() argument [all...] |
H A D | x509_vfy.c | 202 * except those of the trust anchor at index num-1. in check_auth_level() 397 * auxiliary trust can be used to override EKU-restrictions. 406 * For trusted certificates we want to see whether any auxiliary trust in check_purpose() 409 * This is complicated by the fact that the trust ordinals in in check_purpose() 410 * ctx->param->trust are entirely independent of the purpose ordinals in in check_purpose() 415 * related values of both param->trust and param->purpose. It is however in check_purpose() 416 * typically possible to infer associated trust values from a purpose value in check_purpose() 419 * Therefore, we can only check for trust overrides when the purpose we're in check_purpose() 420 * checking is the same as ctx->param->purpose and ctx->param->trust is in check_purpose() 424 tr_ok = X509_check_trust(x, ctx->param->trust, X509_TRUST_NO_SS_COMPA in check_purpose() 817 int trust; check_trust() local 2212 X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) X509_STORE_CTX_set_trust() argument 2231 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) X509_STORE_CTX_purpose_inherit() argument 2996 int trust = X509_TRUST_UNTRUSTED; build_chain() local [all...] |
H A D | t_x509.c | 343 STACK_OF(ASN1_OBJECT) *trust, *reject; in X509_aux_print() 349 trust = X509_get0_trust_objects(x); in X509_aux_print() 351 if (trust) { in X509_aux_print() 354 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) { in X509_aux_print() 360 sk_ASN1_OBJECT_value(trust, i), 0); in X509_aux_print() 518 BIO_printf(bio, "Certs in trust store:\n"); in X509_STORE_CTX_print_verify_cb()
|
H A D | x509_vpm.c | 91 param->trust = X509_TRUST_DEFAULT; in X509_VERIFY_PARAM_new() 173 x509_verify_param_copy(trust, X509_TRUST_DEFAULT); in X509_VERIFY_PARAM_inherit() 306 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) in X509_VERIFY_PARAM_set_trust() argument 308 return X509_TRUST_set(¶m->trust, trust); in X509_VERIFY_PARAM_set_trust() 515 0, /* trust */ 526 X509_TRUST_EMAIL, /* trust */ 537 X509_TRUST_EMAIL, /* trust */ 548 X509_TRUST_SSL_CLIENT, /* trust */ 559 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
/third_party/openssl/crypto/x509/ |
H A D | x509_trust.c | 18 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 19 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 20 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 26 * WARNING: the following table should be kept in order of trust and without 27 * any gaps so we can just subtract the minimum trust value to get an index 54 return (*a)->trust - (*b)->trust; in tr_cmp() 57 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, in X509_TRUST_set_default() 61 default_trust = trust; in X509_TRUST_set_default() 106 tmp.trust in X509_TRUST_get_by_id() 113 X509_TRUST_set(int *t, int trust) X509_TRUST_set() argument 217 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) trust_1oidany() argument 229 trust_1oid(X509_TRUST *trust, X509 *x, int flags) trust_1oid() argument 240 trust_compat(X509_TRUST *trust, X509 *x, int flags) trust_compat() argument [all...] |
H A D | x509_vfy.c | 202 * except those of the trust anchor at index num-1. in check_auth_level() 397 * auxiliary trust can be used to override EKU-restrictions. 406 * For trusted certificates we want to see whether any auxiliary trust in check_purpose() 409 * This is complicated by the fact that the trust ordinals in in check_purpose() 410 * ctx->param->trust are entirely independent of the purpose ordinals in in check_purpose() 415 * related values of both param->trust and param->purpose. It is however in check_purpose() 416 * typically possible to infer associated trust values from a purpose value in check_purpose() 419 * Therefore, we can only check for trust overrides when the purpose we're in check_purpose() 420 * checking is the same as ctx->param->purpose and ctx->param->trust is in check_purpose() 424 tr_ok = X509_check_trust(x, ctx->param->trust, X509_TRUST_NO_SS_COMPA in check_purpose() 817 int trust; check_trust() local 2214 X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) X509_STORE_CTX_set_trust() argument 2233 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) X509_STORE_CTX_purpose_inherit() argument 2998 int trust = X509_TRUST_UNTRUSTED; build_chain() local [all...] |
H A D | t_x509.c | 345 STACK_OF(ASN1_OBJECT) *trust, *reject; in X509_aux_print() 351 trust = X509_get0_trust_objects(x); in X509_aux_print() 353 if (trust) { in X509_aux_print() 356 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) { in X509_aux_print() 362 sk_ASN1_OBJECT_value(trust, i), 0); in X509_aux_print() 520 BIO_printf(bio, "Certs in trust store:\n"); in X509_STORE_CTX_print_verify_cb()
|
H A D | x509_vpm.c | 91 param->trust = X509_TRUST_DEFAULT; in X509_VERIFY_PARAM_new() 173 x509_verify_param_copy(trust, X509_TRUST_DEFAULT); in X509_VERIFY_PARAM_inherit() 306 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) in X509_VERIFY_PARAM_set_trust() argument 308 return X509_TRUST_set(¶m->trust, trust); in X509_VERIFY_PARAM_set_trust() 512 0, /* trust */ 523 X509_TRUST_EMAIL, /* trust */ 534 X509_TRUST_EMAIL, /* trust */ 545 X509_TRUST_SSL_CLIENT, /* trust */ 556 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
/third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-policy2c/ |
H A D | minimal-secure-streams.c | 43 *trustmap, /* trust store map */ 263 * How about his trust store, it's new to us? in main() 266 if (pol->trust.store) { in main() 269 if (a->orig == (const char *)pol->trust.store) in main() 284 a->orig = (const char *)pol->trust.store; in main() 292 for (n = 0; n < pol->trust.store->count; n++) { in main() 293 if (!pol->trust.store->ssx509[n]) in main() 297 if (a1->orig == (const char *)pol->trust.store->ssx509[n]) in main() 313 a1->orig = (const char *)pol->trust.store->ssx509[n]; in main() 317 purify_csymbol(pol->trust in main() [all...] |
/third_party/libwebsockets/lib/secure-streams/ |
H A D | policy-common.c | 295 * trust store behind it. 297 * Static policy: We want to make use of a trust store / vhost from the policy and add to its 311 if (!pol->trust.store) { in lws_ss_policy_ref_trust_store() 314 /* corner case... there's no trust store used */ in lws_ss_policy_ref_trust_store() 329 v = lws_get_vhost_by_name(context, pol->trust.store->name); in lws_ss_policy_ref_trust_store() 336 i.vhost_name = pol->trust.store->name; in lws_ss_policy_ref_trust_store() 339 i.client_ssl_ca_mem = pol->trust.store->ssx509[0]->ca_der; in lws_ss_policy_ref_trust_store() 341 pol->trust.store->ssx509[0]->ca_der_len; in lws_ss_policy_ref_trust_store() 344 lwsl_info("%s: %s trust store initial '%s'\n", __func__, in lws_ss_policy_ref_trust_store() 345 i.vhost_name, pol->trust in lws_ss_policy_ref_trust_store() [all...] |
H A D | secure-streams.c | 777 if (!h->policy->trust.store) in _lws_ss_client_connect() 778 lwsl_info("%s: using platform trust store\n", __func__); in _lws_ss_client_connect() 782 h->policy->trust.store->name); in _lws_ss_client_connect() 786 h->policy->trust.store->name); in _lws_ss_client_connect() 1235 h->policy->trust.server.cert->ca_der; in lws_ss_create() 1237 h->policy->trust.server.cert->ca_der_len; in lws_ss_create() 1239 h->policy->trust.server.key->ca_der; in lws_ss_create() 1241 h->policy->trust.server.key->ca_der_len; in lws_ss_create() 1279 * trust store and vhost. We do it by logical ss rather than connection in lws_ss_create() 1281 * trust stor in lws_ss_create() [all...] |
/third_party/curl/lib/vtls/ |
H A D | sectransp.c | 2247 SecTrustRef trust = NULL; local 2306 ret = SSLCopyPeerTrust(ctx, &trust); 2307 if(!trust) { 2316 CURL_TRC_CF(data, cf, "setting %d trust anchors", n); 2317 ret = SecTrustSetAnchorCertificates(trust, array); 2322 ret = SecTrustSetAnchorCertificatesOnly(trust, true); 2329 ret = SecTrustEvaluate(trust, &trust_eval); 2338 CURL_TRC_CF(data, cf, "trust result: Unspecified"); 2342 CURL_TRC_CF(data, cf, "trust result: Proceed"); 2358 if(trust) 2420 SecTrustRef trust; global() local 2903 SecTrustRef trust = NULL; global() local [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | x509.c | 165 OPT_SECTION("Certificate trust output"), 268 STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL; in x509_main() 430 if (trust == NULL && (trust = sk_ASN1_OBJECT_new_null()) == NULL) in x509_main() 433 BIO_printf(bio_err, "%s: Invalid trust object value %s\n", in x509_main() 437 sk_ASN1_OBJECT_push(trust, objtmp); in x509_main() 788 if (trust != NULL) { in x509_main() 789 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) in x509_main() 790 X509_add1_trust_object(x, sk_ASN1_OBJECT_value(trust, i)); in x509_main() 1081 sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_fre in x509_main() [all...] |
/third_party/openssl/apps/ |
H A D | x509.c | 165 OPT_SECTION("Certificate trust output"), 268 STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL; in x509_main() 430 if (trust == NULL && (trust = sk_ASN1_OBJECT_new_null()) == NULL) in x509_main() 433 BIO_printf(bio_err, "%s: Invalid trust object value %s\n", in x509_main() 437 sk_ASN1_OBJECT_push(trust, objtmp); in x509_main() 788 if (trust != NULL) { in x509_main() 789 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) in x509_main() 790 X509_add1_trust_object(x, sk_ASN1_OBJECT_value(trust, i)); in x509_main() 1081 sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_fre in x509_main() [all...] |
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | x509_vfy.h | 282 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 508 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 510 int purpose, int trust); 545 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
/third_party/node/deps/openssl/config/archs/linux-armv4/asm_avx2/include/openssl/ |
H A D | x509_vfy.h | 148 /* This is used for a table of trust checking functions */ 150 int trust; member 185 /* standard trust ids */ 202 /* No compat trust if self-signed, preempts "DO_SS" */ 204 /* Compat trust if no explicit accepted trust EKUs */ 206 /* Accept "anyEKU" as a wildcard rejection OID and as a wildcard trust OID */ 214 int X509_TRUST_set(int *t, int trust); 233 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 506 int X509_STORE_set_trust(X509_STORE *ctx, int trust); [all...] |
/third_party/node/deps/openssl/config/archs/linux-elf/asm/include/openssl/ |
H A D | x509_vfy.h | 148 /* This is used for a table of trust checking functions */ 150 int trust; member 185 /* standard trust ids */ 202 /* No compat trust if self-signed, preempts "DO_SS" */ 204 /* Compat trust if no explicit accepted trust EKUs */ 206 /* Accept "anyEKU" as a wildcard rejection OID and as a wildcard trust OID */ 214 int X509_TRUST_set(int *t, int trust); 233 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 506 int X509_STORE_set_trust(X509_STORE *ctx, int trust); [all...] |
/third_party/node/deps/openssl/config/archs/darwin64-arm64-cc/asm/include/openssl/ |
H A D | x509_vfy.h | 148 /* This is used for a table of trust checking functions */ 150 int trust; member 185 /* standard trust ids */ 202 /* No compat trust if self-signed, preempts "DO_SS" */ 204 /* Compat trust if no explicit accepted trust EKUs */ 206 /* Accept "anyEKU" as a wildcard rejection OID and as a wildcard trust OID */ 214 int X509_TRUST_set(int *t, int trust); 233 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 506 int X509_STORE_set_trust(X509_STORE *ctx, int trust); [all...] |
/third_party/node/deps/openssl/config/archs/linux-aarch64/asm/include/openssl/ |
H A D | x509_vfy.h | 148 /* This is used for a table of trust checking functions */ 150 int trust; member 185 /* standard trust ids */ 202 /* No compat trust if self-signed, preempts "DO_SS" */ 204 /* Compat trust if no explicit accepted trust EKUs */ 206 /* Accept "anyEKU" as a wildcard rejection OID and as a wildcard trust OID */ 214 int X509_TRUST_set(int *t, int trust); 233 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 506 int X509_STORE_set_trust(X509_STORE *ctx, int trust); [all...] |
/third_party/node/deps/openssl/config/archs/linux-aarch64/no-asm/include/openssl/ |
H A D | x509_vfy.h | 148 /* This is used for a table of trust checking functions */ 150 int trust; member 185 /* standard trust ids */ 202 /* No compat trust if self-signed, preempts "DO_SS" */ 204 /* Compat trust if no explicit accepted trust EKUs */ 206 /* Accept "anyEKU" as a wildcard rejection OID and as a wildcard trust OID */ 214 int X509_TRUST_set(int *t, int trust); 233 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 506 int X509_STORE_set_trust(X509_STORE *ctx, int trust); [all...] |
/third_party/node/deps/openssl/config/archs/linux-armv4/no-asm/include/openssl/ |
H A D | x509_vfy.h | 148 /* This is used for a table of trust checking functions */ 150 int trust; member 185 /* standard trust ids */ 202 /* No compat trust if self-signed, preempts "DO_SS" */ 204 /* Compat trust if no explicit accepted trust EKUs */ 206 /* Accept "anyEKU" as a wildcard rejection OID and as a wildcard trust OID */ 214 int X509_TRUST_set(int *t, int trust); 233 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 506 int X509_STORE_set_trust(X509_STORE *ctx, int trust); [all...] |
/third_party/node/deps/openssl/config/archs/darwin64-arm64-cc/asm_avx2/include/openssl/ |
H A D | x509_vfy.h | 148 /* This is used for a table of trust checking functions */ 150 int trust; member 185 /* standard trust ids */ 202 /* No compat trust if self-signed, preempts "DO_SS" */ 204 /* Compat trust if no explicit accepted trust EKUs */ 206 /* Accept "anyEKU" as a wildcard rejection OID and as a wildcard trust OID */ 214 int X509_TRUST_set(int *t, int trust); 233 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 506 int X509_STORE_set_trust(X509_STORE *ctx, int trust); [all...] |
/third_party/node/deps/openssl/config/archs/linux-armv4/asm/include/openssl/ |
H A D | x509_vfy.h | 148 /* This is used for a table of trust checking functions */ 150 int trust; member 185 /* standard trust ids */ 202 /* No compat trust if self-signed, preempts "DO_SS" */ 204 /* Compat trust if no explicit accepted trust EKUs */ 206 /* Accept "anyEKU" as a wildcard rejection OID and as a wildcard trust OID */ 214 int X509_TRUST_set(int *t, int trust); 233 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 506 int X509_STORE_set_trust(X509_STORE *ctx, int trust); [all...] |
/third_party/node/deps/openssl/config/archs/darwin64-arm64-cc/no-asm/include/openssl/ |
H A D | x509_vfy.h | 148 /* This is used for a table of trust checking functions */ 150 int trust; member 185 /* standard trust ids */ 202 /* No compat trust if self-signed, preempts "DO_SS" */ 204 /* Compat trust if no explicit accepted trust EKUs */ 206 /* Accept "anyEKU" as a wildcard rejection OID and as a wildcard trust OID */ 214 int X509_TRUST_set(int *t, int trust); 233 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 506 int X509_STORE_set_trust(X509_STORE *ctx, int trust); [all...] |
/third_party/node/deps/openssl/config/archs/linux-elf/asm_avx2/include/openssl/ |
H A D | x509_vfy.h | 148 /* This is used for a table of trust checking functions */ 150 int trust; member 185 /* standard trust ids */ 202 /* No compat trust if self-signed, preempts "DO_SS" */ 204 /* Compat trust if no explicit accepted trust EKUs */ 206 /* Accept "anyEKU" as a wildcard rejection OID and as a wildcard trust OID */ 214 int X509_TRUST_set(int *t, int trust); 233 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 506 int X509_STORE_set_trust(X509_STORE *ctx, int trust); [all...] |