/external/openssl/crypto/x509/ |
x509_trs.c | 68 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 69 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 70 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 75 /* WARNING: the following table should be kept in order of trust 76 * and without any gaps so we can just subtract the minimum trust 100 return (*a)->trust - (*b)->trust; 103 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int) 107 default_trust = trust; 142 tmp.trust = id [all...] |
x509_vpm.c | 76 param->trust = 0; 173 x509_verify_param_copy(trust, 0); 244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) 246 return X509_TRUST_set(¶m->trust, trust); 327 0, /* trust */ 337 X509_TRUST_EMAIL, /* trust */ 347 X509_TRUST_EMAIL, /* trust */ 357 X509_TRUST_SSL_CLIENT, /* trust */ 367 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
x509_vfy.c | 269 * so we get any trust settings. 354 /* The chain extensions are OK: check trust */ 356 if (param->trust > 0) ok = check_trust(ctx); 624 * chain including trust anchor. Trust anchor not strictly 660 ok = X509_check_trust(x, ctx->param->trust, 0); 1147 * end in the same trust anchor, though some discussions remain... [all...] |
x509_lu.c | 699 int X509_STORE_set_trust(X509_STORE *ctx, int trust) 701 return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
|
x509.h | 271 STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ member in struct:x509_cert_aux_st 313 /* This is used for a table of trust checking functions */ 316 int trust; member in struct:x509_trust_st 331 /* standard trust ids */ 849 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int); 850 int X509_TRUST_set(int *t, int trust); [all...] |
/external/openssl/crypto/asn1/ |
t_x509a.c | 73 if(aux->trust) { 77 for(i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) { 81 sk_ASN1_OBJECT_value(aux->trust, i), 0);
|
x_x509a.c | 75 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT), 143 if(!aux->trust 144 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0; 145 return sk_ASN1_OBJECT_push(aux->trust, objtmp); 161 if(x->aux && x->aux->trust) { 162 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free); 163 x->aux->trust = NULL;
|
/frameworks/base/core/java/android/text/ |
BoringLayout.java | 94 boolean trust; 103 trust = true; 111 trust = false; 115 metrics, includepad, trust); local 147 boolean trust; 153 trust = true; 162 trust = false; 166 metrics, includepad, trust); local
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCertPathValidatorSpi.java | 93 TrustAnchor trust; local 100 trust = CertPathValidatorUtilities.findTrustAnchor(lastCert, paramsPKIX); 108 if (trust == null) 110 throw new CertPathValidatorException("Trust anchor for certification path not found.", null, certPath, -1); 196 X509Certificate sign = trust.getTrustedCert(); 219 workingIssuerName = new X500Principal(trust.getCAName()); 220 workingPublicKey = trust.getCAPublicKey(); 225 throw new ExtCertPathValidatorException("Subject of trust anchor could not be (re)encoded.", ex, certPath, 237 "Algorithm identifier of public key of trust anchor could not be read.", e, certPath, -1); 454 return new PKIXCertPathValidatorResult(trust, intersection, cert.getPublicKey()) [all...] |
CertPathValidatorUtilities.java | 155 * @param params used to find the trust anchors and signature provider 171 // If we have a trust anchor index, use it. 181 TrustAnchor trust = null; local 194 throw new AnnotatedException("Cannot set subject search criteria for trust anchor.", ex); 208 while (iter.hasNext() && trust == null) 210 trust = (TrustAnchor) iter.next(); 212 X509Certificate trustCert = trust.getTrustedCert(); 215 // If the trust anchor is identical to the certificate we're 221 return trust; 236 trust = null [all...] |
/external/openssl/include/openssl/ |
x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
x509.h | 271 STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ member in struct:x509_cert_aux_st 313 /* This is used for a table of trust checking functions */ 316 int trust; member in struct:x509_trust_st 331 /* standard trust ids */ 849 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int); 850 int X509_TRUST_set(int *t, int trust); [all...] |
ssl.h | [all...] |
/external/openssl/apps/ |
x509.c | 127 " -addtrust arg - trust certificate for a given purpose\n", 180 STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL; 345 "Invalid trust object value %s\n", *argv); 348 if (!trust) trust = sk_ASN1_OBJECT_new_null(); 349 sk_ASN1_OBJECT_push(trust, objtmp); 698 if (trust) 700 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) 702 objtmp = sk_ASN1_OBJECT_value(trust, i); 1088 sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_free) [all...] |
/external/wpa_supplicant/ |
x509v3.c | 1538 struct x509_certificate *cert, *trust; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
x509v3.c | 1578 struct x509_certificate *cert, *trust; local [all...] |
/external/chromium/net/socket/ |
ssl_test_util.cc | 66 CERTCertTrust trust; local 67 int rv = CERT_DecodeTrustString(&trust, const_cast<char *>("TCu,Cu,Tu")); 69 LOG(ERROR) << "Can't decode trust string"; 74 rv = CERT_ChangeCertTrust(CERT_GetDefaultCertDB(), cert, &trust); 76 LOG(ERROR) << "Can't change trust for certificate " << filename.value();
|
/external/bluetooth/bluez/src/ |
storage.h | 59 int write_trust(const char *src, const char *addr, const char *service, gboolean trust);
|
storage.c | 745 gboolean trust) 764 if (trusted == trust) { 770 if (trust) 776 if (!trust && !services)
|
/external/openssl/crypto/x509v3/ |
v3_purp.c | 172 int X509_PURPOSE_add(int id, int trust, int flags, 180 /* This will always be set for application modified trust entries */ 211 ptmp->trust = trust; 267 return xp->trust;
|
/packages/apps/Bluetooth/src/com/android/bluetooth/pbap/ |
BluetoothPbapService.java | 523 boolean trust = mRemoteDevice.getTrustState(); 524 if (VERBOSE) Log.v(TAG, "GetTrustState() = " + trust); 526 if (trust) {
|
/libcore/luni/src/main/java/javax/security/auth/ |
Subject.java | 568 boolean trust = s.getClass().getClassLoader() == null; 572 if (trust || !elements.contains(o)) {
|
/external/openssl/ssl/ |
ssl_lib.c | 338 s->trust = ctx->trust; 480 int SSL_CTX_set_trust(SSL_CTX *s, int trust) 482 return X509_VERIFY_PARAM_set_trust(s->param, trust); 485 int SSL_set_trust(SSL *s, int trust) 487 return X509_VERIFY_PARAM_set_trust(s->param, trust); [all...] |
ssl.h | [all...] |