Searched refs:untrusted (Results 1 – 25 of 160) sorted by relevance
1234567
14 untrusted data. Naturally, if the attacker can modify the contents of a16 Therefore the application itself must be prepared to receive untrusted values.23 Division of trusted and untrusted data36 The following data is regarded as **untrusted**. Invalid/malicious data in47 untrusted data has been maliciously crafted:74 checked if they are used with untrusted data.
82 bool untrusted; // don't really trust the answer member429 result->untrusted = true; in RunSearch()515 if (!r.untrusted) in RunCase()518 LogMatch(r.untrusted ? "(Untrusted) Mismatch: " : "Mismatch: ", i, text, in RunCase()
1 # blkid for untrusted block devices
1 # Any fsck program run on untrusted block devices
4 ### This file defines the rules for untrusted apps.129 # Do not allow untrusted apps to register services.
12 # domain when working with untrusted block devices
281 # Never read/follow symlinks created by shell or untrusted apps.
225 if (ctx->untrusted != NULL in X509_verify_cert()226 && (sktmp=sk_X509_dup(ctx->untrusted)) == NULL) in X509_verify_cert()266 if (ctx->untrusted != NULL) in X509_verify_cert()1228 for (i = 0; i < sk_X509_num(ctx->untrusted); i++) in crl_akid_check()1230 crl_issuer = sk_X509_value(ctx->untrusted, i); in crl_akid_check()1256 if (!X509_STORE_CTX_init(&crl_ctx, ctx->ctx, x, ctx->untrusted)) in check_crl_path()2132 ctx->untrusted=sk; in X509_STORE_CTX_set_chain()2233 ctx->untrusted=chain; in X509_STORE_CTX_init()
41 untrusted code.
441 WARNING: if you use ssvnc from an "Internet Cafe", i.e. an untrusted665 machines you connect to via SSVNC. Note that an untrusted local680 If the untrusted local user tries to connect to these ports, he may688 SSL authentication of the viewer that helps, unless the untrusted692 at a time, then the window of opportunity that the untrusted local696 untrusted local user cannot connect once your session is established).719 connections to be from you (this assumes the untrusted local726 time the untrusted local user can connect to the tunnel much smaller.
845 STACK_OF(X509) *chain = NULL, *untrusted = NULL; in ssl_build_cert_chain()890 untrusted = cpk->chain; in ssl_build_cert_chain()894 if (!X509_STORE_CTX_init(&xs_ctx, chain_store, cpk->x509, untrusted)) { in ssl_build_cert_chain()
56 // output if the input is untrusted.
207 $OPENSSL verify -CAfile rootCA/cacert.pem -untrusted demoCA/cacert.pem *.pem
165 Implementations that retrieve KRLs over untrusted channels must verify
374 Specify a timeout for untrusted X11 forwarding using the format377 The default is to disable untrusted X11 forwarding after twenty385 considered untrusted and prevented from stealing or tampering394 the restrictions imposed on untrusted clients.
15 communications between two untrusted hosts over an insecure network.
103 by untrusted users, you may want to use the "safe_mode" option which ensures
75 …your server. So don't trust Cookie and other headers if you allow connection from untrusted origin.
54 two untrusted hosts over an insecure network. X11 connections and
236 STACK_OF(X509) *untrusted; /* chain of X509s - untrusted - passed in */
276 decompress bitstreams from untrusted sources, an upgrade
26 man page for details. DO NOT give untrusted users the ability to
138 untrusted hosts over an insecure network. X11 connections and
META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF ...