| /third_party/node/deps/openssl/openssl/crypto/x509/ |
| H A D | x509_trust.c | 18 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 19 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 20 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 26 * WARNING: the following table should be kept in order of trust and without 27 * any gaps so we can just subtract the minimum trust value to get an index 54 return (*a)->trust - (*b)->trust; in tr_cmp() 57 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, in X509_TRUST_set_default() 61 default_trust = trust; in X509_TRUST_set_default() 106 tmp.trust in X509_TRUST_get_by_id() 113 X509_TRUST_set(int *t, int trust) X509_TRUST_set() argument 217 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) trust_1oidany() argument 229 trust_1oid(X509_TRUST *trust, X509 *x, int flags) trust_1oid() argument 240 trust_compat(X509_TRUST *trust, X509 *x, int flags) trust_compat() argument [all...] |
| H A D | x509_vfy.c | 202 * except those of the trust anchor at index num-1. in check_auth_level() 397 * auxiliary trust can be used to override EKU-restrictions. 406 * For trusted certificates we want to see whether any auxiliary trust in check_purpose() 409 * This is complicated by the fact that the trust ordinals in in check_purpose() 410 * ctx->param->trust are entirely independent of the purpose ordinals in in check_purpose() 415 * related values of both param->trust and param->purpose. It is however in check_purpose() 416 * typically possible to infer associated trust values from a purpose value in check_purpose() 419 * Therefore, we can only check for trust overrides when the purpose we're in check_purpose() 420 * checking is the same as ctx->param->purpose and ctx->param->trust is in check_purpose() 424 tr_ok = X509_check_trust(x, ctx->param->trust, X509_TRUST_NO_SS_COMPA in check_purpose() 817 int trust; check_trust() local 2212 X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) X509_STORE_CTX_set_trust() argument 2231 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) X509_STORE_CTX_purpose_inherit() argument 2996 int trust = X509_TRUST_UNTRUSTED; build_chain() local [all...] |
| H A D | t_x509.c | 343 STACK_OF(ASN1_OBJECT) *trust, *reject; in X509_aux_print() 349 trust = X509_get0_trust_objects(x); in X509_aux_print() 351 if (trust) { in X509_aux_print() 354 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) { in X509_aux_print() 360 sk_ASN1_OBJECT_value(trust, i), 0); in X509_aux_print() 518 BIO_printf(bio, "Certs in trust store:\n"); in X509_STORE_CTX_print_verify_cb()
|
| H A D | x509_vpm.c | 91 param->trust = X509_TRUST_DEFAULT; in X509_VERIFY_PARAM_new() 173 x509_verify_param_copy(trust, X509_TRUST_DEFAULT); in X509_VERIFY_PARAM_inherit() 306 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) in X509_VERIFY_PARAM_set_trust() argument 308 return X509_TRUST_set(¶m->trust, trust); in X509_VERIFY_PARAM_set_trust() 515 0, /* trust */ 526 X509_TRUST_EMAIL, /* trust */ 537 X509_TRUST_EMAIL, /* trust */ 548 X509_TRUST_SSL_CLIENT, /* trust */ 559 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
| /third_party/openssl/crypto/x509/ |
| H A D | x509_trust.c | 18 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 19 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 20 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 26 * WARNING: the following table should be kept in order of trust and without 27 * any gaps so we can just subtract the minimum trust value to get an index 54 return (*a)->trust - (*b)->trust; in tr_cmp() 57 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, in X509_TRUST_set_default() 61 default_trust = trust; in X509_TRUST_set_default() 106 tmp.trust in X509_TRUST_get_by_id() 113 X509_TRUST_set(int *t, int trust) X509_TRUST_set() argument 217 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) trust_1oidany() argument 229 trust_1oid(X509_TRUST *trust, X509 *x, int flags) trust_1oid() argument 240 trust_compat(X509_TRUST *trust, X509 *x, int flags) trust_compat() argument [all...] |
| H A D | x509_vfy.c | 202 * except those of the trust anchor at index num-1. in check_auth_level() 397 * auxiliary trust can be used to override EKU-restrictions. 406 * For trusted certificates we want to see whether any auxiliary trust in check_purpose() 409 * This is complicated by the fact that the trust ordinals in in check_purpose() 410 * ctx->param->trust are entirely independent of the purpose ordinals in in check_purpose() 415 * related values of both param->trust and param->purpose. It is however in check_purpose() 416 * typically possible to infer associated trust values from a purpose value in check_purpose() 419 * Therefore, we can only check for trust overrides when the purpose we're in check_purpose() 420 * checking is the same as ctx->param->purpose and ctx->param->trust is in check_purpose() 424 tr_ok = X509_check_trust(x, ctx->param->trust, X509_TRUST_NO_SS_COMPA in check_purpose() 817 int trust; check_trust() local 2214 X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) X509_STORE_CTX_set_trust() argument 2233 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) X509_STORE_CTX_purpose_inherit() argument 2998 int trust = X509_TRUST_UNTRUSTED; build_chain() local [all...] |
| H A D | t_x509.c | 345 STACK_OF(ASN1_OBJECT) *trust, *reject; in X509_aux_print() 351 trust = X509_get0_trust_objects(x); in X509_aux_print() 353 if (trust) { in X509_aux_print() 356 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) { in X509_aux_print() 362 sk_ASN1_OBJECT_value(trust, i), 0); in X509_aux_print() 520 BIO_printf(bio, "Certs in trust store:\n"); in X509_STORE_CTX_print_verify_cb()
|
| H A D | x509_vpm.c | 91 param->trust = X509_TRUST_DEFAULT; in X509_VERIFY_PARAM_new() 173 x509_verify_param_copy(trust, X509_TRUST_DEFAULT); in X509_VERIFY_PARAM_inherit() 306 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) in X509_VERIFY_PARAM_set_trust() argument 308 return X509_TRUST_set(¶m->trust, trust); in X509_VERIFY_PARAM_set_trust() 512 0, /* trust */ 523 X509_TRUST_EMAIL, /* trust */ 534 X509_TRUST_EMAIL, /* trust */ 545 X509_TRUST_SSL_CLIENT, /* trust */ 556 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
| /kernel/linux/linux-5.10/drivers/media/radio/ |
| H A D | radio-trust.c | 2 /* radio-trust.c - Trust FM Radio card driver for Linux 2.2 51 struct trust { struct 58 struct trust *tr = kzalloc(sizeof(*tr), GFP_KERNEL); in trust_alloc() 73 static void write_i2c(struct trust *tr, int n, ...) in write_i2c() 121 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_mute_volume() 131 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_stereo() 149 struct trust *tr = container_of(isa, struct trust, is in trust_s_frequency() [all...] |
| /kernel/linux/linux-6.6/drivers/media/radio/ |
| H A D | radio-trust.c | 2 /* radio-trust.c - Trust FM Radio card driver for Linux 2.2 51 struct trust { struct 58 struct trust *tr = kzalloc(sizeof(*tr), GFP_KERNEL); in trust_alloc() 73 static void write_i2c(struct trust *tr, int n, ...) in write_i2c() 121 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_mute_volume() 131 struct trust *tr = container_of(isa, struct trust, isa); in trust_s_stereo() 149 struct trust *tr = container_of(isa, struct trust, is in trust_s_frequency() [all...] |
| /third_party/libwebsockets/minimal-examples/secure-streams/minimal-secure-streams-policy2c/ |
| H A D | minimal-secure-streams.c | 43 *trustmap, /* trust store map */ 263 * How about his trust store, it's new to us? in main() 266 if (pol->trust.store) { in main() 269 if (a->orig == (const char *)pol->trust.store) in main() 284 a->orig = (const char *)pol->trust.store; in main() 292 for (n = 0; n < pol->trust.store->count; n++) { in main() 293 if (!pol->trust.store->ssx509[n]) in main() 297 if (a1->orig == (const char *)pol->trust.store->ssx509[n]) in main() 313 a1->orig = (const char *)pol->trust.store->ssx509[n]; in main() 317 purify_csymbol(pol->trust in main() [all...] |
| /third_party/libwebsockets/lib/secure-streams/ |
| H A D | policy-common.c | 295 * trust store behind it. 297 * Static policy: We want to make use of a trust store / vhost from the policy and add to its 311 if (!pol->trust.store) { in lws_ss_policy_ref_trust_store() 314 /* corner case... there's no trust store used */ in lws_ss_policy_ref_trust_store() 329 v = lws_get_vhost_by_name(context, pol->trust.store->name); in lws_ss_policy_ref_trust_store() 336 i.vhost_name = pol->trust.store->name; in lws_ss_policy_ref_trust_store() 339 i.client_ssl_ca_mem = pol->trust.store->ssx509[0]->ca_der; in lws_ss_policy_ref_trust_store() 341 pol->trust.store->ssx509[0]->ca_der_len; in lws_ss_policy_ref_trust_store() 344 lwsl_info("%s: %s trust store initial '%s'\n", __func__, in lws_ss_policy_ref_trust_store() 345 i.vhost_name, pol->trust in lws_ss_policy_ref_trust_store() [all...] |
| /kernel/linux/linux-6.6/tools/testing/selftests/rcutorture/bin/ |
| H A D | torture.sh | 394 tools/testing/selftests/rcutorture/bin/kvm.sh --datestamp "$ds/results-rcutasksflavors/$flavor" --buildonly --configs "TINY01 TREE04" --kconfig "CONFIG_RCU_EXPERT=y CONFIG_RCU_SCALE_TEST=y $forceflavor=y $deselectedflavors" --trust-make > $T/$flavor.out 2>&1 416 torture_set "rcutorture" tools/testing/selftests/rcutorture/bin/kvm.sh --allcpus --duration "$duration_rcutorture" --configs "$configs_rcutorture" --trust-make 422 torture_set "locktorture" tools/testing/selftests/rcutorture/bin/kvm.sh --torture lock --allcpus --duration "$duration_locktorture" --configs "$configs_locktorture" --trust-make 430 torture_set "scftorture" tools/testing/selftests/rcutorture/bin/kvm.sh --torture scf --allcpus --duration "$duration_scftorture" --configs "$configs_scftorture" --kconfig "CONFIG_NR_CPUS=$HALF_ALLOTED_CPUS" --memory ${scfmem}G --trust-make 437 torture_set "rcurttorture" tools/testing/selftests/rcutorture/bin/kvm.sh --allcpus --duration "$duration_rcutorture" --configs "TREE03" --trust-make 441 torture_set "rcurttorture-exp" tools/testing/selftests/rcutorture/bin/kvm.sh --allcpus --duration "$duration_rcutorture" --configs "TREE03" --trust-make 475 torture_set "refscale-$prim" tools/testing/selftests/rcutorture/bin/kvm.sh --torture refscale --allcpus --duration 5 --kconfig "CONFIG_TASKS_TRACE_RCU=y CONFIG_NR_CPUS=$HALF_ALLOTED_CPUS" --bootargs "verbose_batched=$VERBOSE_BATCH_CPUS torture.verbose_sleep_frequency=8 torture.verbose_sleep_duration=$VERBOSE_BATCH_CPUS" --trust-make 524 torture_set "rcuscale-$prim" tools/testing/selftests/rcutorture/bin/kvm.sh --torture rcuscale --allcpus --duration 5 --kconfig "CONFIG_TASKS_TRACE_RCU=y CONFIG_NR_CPUS=$HALF_ALLOTED_CPUS" --trust-make 562 torture_set "rcuscale-kvfree" tools/testing/selftests/rcutorture/bin/kvm.sh --torture rcuscale --allcpus --duration 10 --kconfig "CONFIG_NR_CPUS=$HALF_ALLOTED_CPUS" --memory 2G --trust-make 568 torture_set "clocksourcewd-1" tools/testing/selftests/rcutorture/bin/kvm.sh --allcpus --duration 45s --configs TREE03 --kconfig "CONFIG_TEST_CLOCKSOURCE_WATCHDOG=y" --trust [all...] |
| H A D | srcu_lockdep.sh | 52 tools/testing/selftests/rcutorture/bin/kvm.sh --allcpus --duration 5s --configs "SRCU-P" --bootargs "rcutorture.test_srcu_lockdep=$val" --trust-make --datestamp "$ds/$val" > "$T/kvm.sh.out" 2>&1
|
| /kernel/linux/linux-6.6/drivers/net/ethernet/microchip/sparx5/ |
| H A D | sparx5_dcb.c | 111 /* Requested trust configuration is not supported */ in sparx5_dcb_apptrust_validate() 318 const struct sparx5_dcb_apptrust *trust; in sparx5_dcb_getapptrust() local 320 trust = sparx5_port_apptrust[port->portno]; in sparx5_dcb_getapptrust() 322 memcpy(selectors, trust->selectors, trust->nselectors); in sparx5_dcb_getapptrust() 323 *nselectors = trust->nselectors; in sparx5_dcb_getapptrust() 394 /* Initialize [dscp, pcp] default trust */ in sparx5_dcb_init()
|
| /kernel/linux/linux-6.6/drivers/net/ethernet/microchip/lan966x/ |
| H A D | lan966x_dcb.c | 277 const struct lan966x_dcb_apptrust *trust; in lan966x_dcb_getapptrust() local 279 trust = lan966x_port_apptrust[port->chip_port]; in lan966x_dcb_getapptrust() 281 memcpy(selectors, trust->selectors, trust->nselectors); in lan966x_dcb_getapptrust() 282 *nselectors = trust->nselectors; in lan966x_dcb_getapptrust()
|
| /third_party/curl/lib/vtls/ |
| H A D | sectransp.c | 2247 SecTrustRef trust = NULL; local 2306 ret = SSLCopyPeerTrust(ctx, &trust); 2307 if(!trust) { 2316 CURL_TRC_CF(data, cf, "setting %d trust anchors", n); 2317 ret = SecTrustSetAnchorCertificates(trust, array); 2322 ret = SecTrustSetAnchorCertificatesOnly(trust, true); 2329 ret = SecTrustEvaluate(trust, &trust_eval); 2338 CURL_TRC_CF(data, cf, "trust result: Unspecified"); 2342 CURL_TRC_CF(data, cf, "trust result: Proceed"); 2358 if(trust) 2420 SecTrustRef trust; global() local 2903 SecTrustRef trust = NULL; global() local [all...] |
| /kernel/linux/linux-6.6/drivers/net/ethernet/netronome/nfp/nic/ |
| H A D | dcb.c | 162 /* We only refresh dscp in dscp trust mode. */ in update_dscp_maxrate() 178 u8 trust; in nfp_nic_set_trust() local 185 trust = dcb->dscp_cnt > 0 ? NFP_DCB_TRUST_DSCP : NFP_DCB_TRUST_PCP; in nfp_nic_set_trust() 186 writeb(trust, dcb->dcbcfg_tbl + dcb->cfg_offset + in nfp_nic_set_trust() 189 dcb->trust_status = trust; in nfp_nic_set_trust() 449 /* Check trust status */ in nfp_nic_dcbnl_ieee_setapp() 506 /* If no dscp mapping is configured, trust pcp */ in nfp_nic_dcbnl_ieee_delapp()
|
| /kernel/linux/linux-5.10/include/linux/qed/ |
| H A D | qed_iov_if.h | 31 int (*set_trust) (struct qed_dev *cdev, int vfid, bool trust);
|
| /kernel/linux/linux-6.6/include/linux/qed/ |
| H A D | qed_iov_if.h | 31 int (*set_trust) (struct qed_dev *cdev, int vfid, bool trust);
|
| /third_party/node/deps/openssl/openssl/apps/ |
| H A D | x509.c | 165 OPT_SECTION("Certificate trust output"), 268 STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL; in x509_main() 430 if (trust == NULL && (trust = sk_ASN1_OBJECT_new_null()) == NULL) in x509_main() 433 BIO_printf(bio_err, "%s: Invalid trust object value %s\n", in x509_main() 437 sk_ASN1_OBJECT_push(trust, objtmp); in x509_main() 788 if (trust != NULL) { in x509_main() 789 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) in x509_main() 790 X509_add1_trust_object(x, sk_ASN1_OBJECT_value(trust, i)); in x509_main() 1081 sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_fre in x509_main() [all...] |
| /third_party/openssl/apps/ |
| H A D | x509.c | 165 OPT_SECTION("Certificate trust output"), 268 STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL; in x509_main() 430 if (trust == NULL && (trust = sk_ASN1_OBJECT_new_null()) == NULL) in x509_main() 433 BIO_printf(bio_err, "%s: Invalid trust object value %s\n", in x509_main() 437 sk_ASN1_OBJECT_push(trust, objtmp); in x509_main() 788 if (trust != NULL) { in x509_main() 789 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) in x509_main() 790 X509_add1_trust_object(x, sk_ASN1_OBJECT_value(trust, i)); in x509_main() 1081 sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_fre in x509_main() [all...] |
| /kernel/linux/linux-6.6/include/linux/pds/ |
| H A D | pds_core_if.h | 358 * @trust: enable VF trust 374 u8 trust; member 414 u8 trust; member
|
| /kernel/linux/linux-5.10/drivers/net/ethernet/broadcom/bnxt/ |
| H A D | bnxt_sriov.h | 37 int bnxt_set_vf_trust(struct net_device *dev, int vf_id, bool trust);
|
| /kernel/linux/linux-6.6/drivers/net/ethernet/broadcom/bnxt/ |
| H A D | bnxt_sriov.h | 38 int bnxt_set_vf_trust(struct net_device *dev, int vf_id, bool trust);
|