/external/chromium/net/base/ |
test_root_certs_nss.cc | 17 // for a certificate whose trust status has been changed by the 22 // and copying |trust|. 23 TrustEntry(CERTCertificate* certificate, CERTCertTrust trust); 27 CERTCertTrust trust() const { return trust_; } function in class:net::TestRootCerts::TrustEntry 33 // The original trust settings, before |certificate_| was manipulated to 41 CERTCertTrust trust) 43 trust_(trust) { 51 // Preserve the original trust bits so that they can be restored when 58 // particular trust settings associated with it, and attempts to use 59 // |original_trust| later to restore the original trust settings will no [all...] |
cert_type.h | 14 // Certificate Authority Basic Constraint, and assigned trust values. For 15 // example, a cert with no basic constraints or trust would be classified as
|
cert_database_nss_unittest.cc | 210 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust); 211 EXPECT_TRUE(trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE)); 212 EXPECT_FALSE(trust.HasTrustedCA(PR_FALSE, PR_TRUE, PR_FALSE)); 213 EXPECT_FALSE(trust.HasTrustedCA(PR_FALSE, PR_FALSE, PR_TRUE)); 214 EXPECT_FALSE(trust.HasTrustedCA(PR_TRUE, PR_TRUE, PR_TRUE)); 215 EXPECT_TRUE(trust.HasCA(PR_TRUE, PR_TRUE, PR_TRUE)); 242 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust); 243 EXPECT_FALSE(trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE)) [all...] |
cert_database.h | 36 // The change could be either a new user certificate is added or trust on 48 // Will be called when a certificate's trust is changed. 71 // They are used in combination with CertType to specify trust for each type 146 // not given any trust. 155 // Get trust bits for certificate. 158 // Set trust values for certificate.
|
cert_database_nss.cc | 224 psm::nsNSSCertTrust trust(&nsstrust); 227 return trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE) * TRUSTED_SSL + 228 trust.HasTrustedCA(PR_FALSE, PR_TRUE, PR_FALSE) * TRUSTED_EMAIL + 229 trust.HasTrustedCA(PR_FALSE, PR_FALSE, PR_TRUE) * TRUSTED_OBJ_SIGN; 231 return trust.HasTrustedPeer(PR_TRUE, PR_FALSE, PR_FALSE) * TRUSTED_SSL + 232 trust.HasTrustedPeer(PR_FALSE, PR_TRUE, PR_FALSE) * TRUSTED_EMAIL + 233 trust.HasTrustedPeer(PR_FALSE, PR_FALSE, PR_TRUE) * TRUSTED_OBJ_SIGN;
|
/libcore/luni/src/main/java/javax/net/ssl/ |
TrustManager.java | 21 * The marker interface for JSSE trust managers. The purpose is to group trust 22 * managers. The responsibility a trust manager is to handle the trust data used to 23 * make trust decisions for deciding whether credentials of a peer should be
|
TrustManagerFactory.java | 56 * trust management algorithm. 59 * the name of the requested trust management algorithm. 60 * @return a trust manager factory for the requested algorithm. 78 * trust management algorithm from the specified provider. 81 * the name of the requested trust management algorithm name. 85 * @return a trust manager factory for the requested algorithm. 109 * trust management algorithm from the specified provider. 183 * of certificate authorities and trust material. 196 * parameters for a source of trust material. 210 * of trust material [all...] |
TrustManagerFactorySpi.java | 38 * of certificate authorities and trust material. 49 * parameters for a source of trust material. 61 * of trust material.
|
/external/openssl/crypto/x509/ |
x509_trs.c | 68 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 69 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 70 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 75 /* WARNING: the following table should be kept in order of trust 76 * and without any gaps so we can just subtract the minimum trust 100 return (*a)->trust - (*b)->trust; 103 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int) 107 default_trust = trust; 142 tmp.trust = id [all...] |
x509_vpm.c | 76 param->trust = 0; 173 x509_verify_param_copy(trust, 0); 244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) 246 return X509_TRUST_set(¶m->trust, trust); 327 0, /* trust */ 337 X509_TRUST_EMAIL, /* trust */ 347 X509_TRUST_EMAIL, /* trust */ 357 X509_TRUST_SSL_CLIENT, /* trust */ 367 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
/libcore/luni/src/main/java/java/security/cert/ |
PKIXCertPathValidatorResult.java | 29 // A trust anchor used during validation of certification path 39 * trust anchor, the valid policy tree and the subject public key. 42 * the trust anchor describing the certification authority (CA) 43 * that served as trust anchor for the certification path. 81 * Returns the trust anchor describing the certification authority (CA) that 82 * served as trust anchor for this certification path. 84 * @return the trust anchor. 112 sb.append(": [\n Trust Anchor: ");
|
PKIXCertPathBuilderResult.java | 34 * specified validated certification path, the trust anchor of the 40 * the trust anchor.
|
TrustAnchor.java | 29 * This class represents a trust anchor for validation of X.509 certification 191 * @return the certificate of this CA or {@code null}, if the trust anchor 202 * trust anchor of this instance was not created with a {@code 214 * 2253 format or {@code null} if the trust anchor of this instance 225 * the trust anchor if this instance was not created with a public
|
/external/chromium/chrome/browser/resources/options/ |
certificate_edit_ca_trust_overlay.js | 10 * Encapsulated handling of the 'edit ca trust' and 'import ca' overlay pages. 96 * Callback from CertificateManagerHandler with the trust values. 97 * @param {boolean} trustSSL The initial value of SSL trust checkbox. 98 * @param {boolean} trustEmail The initial value of Email trust checkbox. 99 * @param {boolean} trustObjSign The initial value of Object Signing trust 110 * Show the Edit CA Trust overlay.
|
/ndk/sources/host-tools/sed-4.2.1/testsuite/ |
distrib.good | 25 Trust, that's purer than pearl, -- 26 Brightest truth, purest trust in the universe --
|
distrib.inp | 24 Trust, that's purer than pearl, -- 25 Brightest truth, purest trust in the universe --
|
/frameworks/base/cmds/system_server/ |
system_main.cpp | 51 // You can trust me, honestly!
|
/external/openssl/crypto/asn1/ |
x_x509a.c | 75 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT), 143 if(!aux->trust 144 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0; 145 return sk_ASN1_OBJECT_push(aux->trust, objtmp); 161 if(x->aux && x->aux->trust) { 162 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free); 163 x->aux->trust = NULL;
|
/frameworks/base/core/java/android/text/ |
BoringLayout.java | 94 boolean trust; 103 trust = true; 111 trust = false; 115 metrics, includepad, trust); local 147 boolean trust; 153 trust = true; 162 trust = false; 166 metrics, includepad, trust); local
|
/frameworks/base/packages/VpnDialogs/res/values-en-rGB/ |
strings.xml | 20 <string name="warning" msgid="5470743576660160079">"By proceeding, you are giving the application permission to intercept all network traffic. "<b>"Do NOT accept unless you trust the application."</b>" Otherwise, you run the risk of having your data compromised by malicious software."</string> 21 <string name="accept" msgid="2889226408765810173">"I trust this application."</string>
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | 166 TrustAnchor trust = null; local 179 throw new AnnotatedException("Cannot set subject search criteria for trust anchor.", ex); 183 while (iter.hasNext() && trust == null) 185 trust = (TrustAnchor) iter.next(); 186 if (trust.getTrustedCert() != null) 188 if (certSelectX509.match(trust.getTrustedCert())) 190 trustPublicKey = trust.getTrustedCert().getPublicKey(); 194 trust = null; 197 else if (trust.getCAName() != null 198 && trust.getCAPublicKey() != null [all...] |
PKIXCertPathValidatorSpi.java | 173 TrustAnchor trust; local 176 trust = CertPathValidatorUtilities.findTrustAnchor((X509Certificate) certs.get(certs.size() - 1), 184 if (trust == null) 186 throw new CertPathValidatorException("Trust anchor for certification path not found.", null, certPath, -1); 272 X509Certificate sign = trust.getTrustedCert(); 282 workingIssuerName = new X500Principal(trust.getCAName()); 283 workingPublicKey = trust.getCAPublicKey(); 288 throw new ExtCertPathValidatorException("Subject of trust anchor could not be (re)encoded.", ex, certPath, 300 "Algorithm identifier of public key of trust anchor could not be read.", e, certPath, -1); 515 return new PKIXCertPathValidatorResult(trust, intersection, cert.getPublicKey()) [all...] |
/external/openssl/crypto/rc2/ |
version | 17 far I trust it. It is about the same speed as IDEA and DES.
|
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/nfsd/ |
export.h | 34 #define NFSEXP_NOAUTHNLM 0x0800 /* Don't authenticate NLM requests - just trust */
|
/system/core/libcutils/ |
sockets.c | 21 /* For the socket trust (credentials) check */
|