HomeSort by relevance Sort by last modified time
    Searched full:trust (Results 1 - 25 of 325) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium/net/base/
test_root_certs_nss.cc 17 // for a certificate whose trust status has been changed by the
22 // and copying |trust|.
23 TrustEntry(CERTCertificate* certificate, CERTCertTrust trust);
27 CERTCertTrust trust() const { return trust_; } function in class:net::TestRootCerts::TrustEntry
33 // The original trust settings, before |certificate_| was manipulated to
41 CERTCertTrust trust)
43 trust_(trust) {
51 // Preserve the original trust bits so that they can be restored when
58 // particular trust settings associated with it, and attempts to use
59 // |original_trust| later to restore the original trust settings will no
    [all...]
cert_type.h 14 // Certificate Authority Basic Constraint, and assigned trust values. For
15 // example, a cert with no basic constraints or trust would be classified as
cert_database_nss_unittest.cc 210 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust);
211 EXPECT_TRUE(trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE));
212 EXPECT_FALSE(trust.HasTrustedCA(PR_FALSE, PR_TRUE, PR_FALSE));
213 EXPECT_FALSE(trust.HasTrustedCA(PR_FALSE, PR_FALSE, PR_TRUE));
214 EXPECT_FALSE(trust.HasTrustedCA(PR_TRUE, PR_TRUE, PR_TRUE));
215 EXPECT_TRUE(trust.HasCA(PR_TRUE, PR_TRUE, PR_TRUE));
242 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust);
243 EXPECT_FALSE(trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE))
    [all...]
cert_database.h 36 // The change could be either a new user certificate is added or trust on
48 // Will be called when a certificate's trust is changed.
71 // They are used in combination with CertType to specify trust for each type
146 // not given any trust.
155 // Get trust bits for certificate.
158 // Set trust values for certificate.
cert_database_nss.cc 224 psm::nsNSSCertTrust trust(&nsstrust);
227 return trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE) * TRUSTED_SSL +
228 trust.HasTrustedCA(PR_FALSE, PR_TRUE, PR_FALSE) * TRUSTED_EMAIL +
229 trust.HasTrustedCA(PR_FALSE, PR_FALSE, PR_TRUE) * TRUSTED_OBJ_SIGN;
231 return trust.HasTrustedPeer(PR_TRUE, PR_FALSE, PR_FALSE) * TRUSTED_SSL +
232 trust.HasTrustedPeer(PR_FALSE, PR_TRUE, PR_FALSE) * TRUSTED_EMAIL +
233 trust.HasTrustedPeer(PR_FALSE, PR_FALSE, PR_TRUE) * TRUSTED_OBJ_SIGN;
  /libcore/luni/src/main/java/javax/net/ssl/
TrustManager.java 21 * The marker interface for JSSE trust managers. The purpose is to group trust
22 * managers. The responsibility a trust manager is to handle the trust data used to
23 * make trust decisions for deciding whether credentials of a peer should be
TrustManagerFactory.java 56 * trust management algorithm.
59 * the name of the requested trust management algorithm.
60 * @return a trust manager factory for the requested algorithm.
78 * trust management algorithm from the specified provider.
81 * the name of the requested trust management algorithm name.
85 * @return a trust manager factory for the requested algorithm.
109 * trust management algorithm from the specified provider.
183 * of certificate authorities and trust material.
196 * parameters for a source of trust material.
210 * of trust material
    [all...]
TrustManagerFactorySpi.java 38 * of certificate authorities and trust material.
49 * parameters for a source of trust material.
61 * of trust material.
  /external/openssl/crypto/x509/
x509_trs.c 68 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags);
69 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags);
70 static int trust_compat(X509_TRUST *trust, X509 *x, int flags);
75 /* WARNING: the following table should be kept in order of trust
76 * and without any gaps so we can just subtract the minimum trust
100 return (*a)->trust - (*b)->trust;
103 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int)
107 default_trust = trust;
142 tmp.trust = id
    [all...]
x509_vpm.c 76 param->trust = 0;
173 x509_verify_param_copy(trust, 0);
244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust)
246 return X509_TRUST_set(&param->trust, trust);
327 0, /* trust */
337 X509_TRUST_EMAIL, /* trust */
347 X509_TRUST_EMAIL, /* trust */
357 X509_TRUST_SSL_CLIENT, /* trust */
367 X509_TRUST_SSL_SERVER, /* trust */
    [all...]
  /libcore/luni/src/main/java/java/security/cert/
PKIXCertPathValidatorResult.java 29 // A trust anchor used during validation of certification path
39 * trust anchor, the valid policy tree and the subject public key.
42 * the trust anchor describing the certification authority (CA)
43 * that served as trust anchor for the certification path.
81 * Returns the trust anchor describing the certification authority (CA) that
82 * served as trust anchor for this certification path.
84 * @return the trust anchor.
112 sb.append(": [\n Trust Anchor: ");
PKIXCertPathBuilderResult.java 34 * specified validated certification path, the trust anchor of the
40 * the trust anchor.
TrustAnchor.java 29 * This class represents a trust anchor for validation of X.509 certification
191 * @return the certificate of this CA or {@code null}, if the trust anchor
202 * trust anchor of this instance was not created with a {@code
214 * 2253 format or {@code null} if the trust anchor of this instance
225 * the trust anchor if this instance was not created with a public
  /external/chromium/chrome/browser/resources/options/
certificate_edit_ca_trust_overlay.js 10 * Encapsulated handling of the 'edit ca trust' and 'import ca' overlay pages.
96 * Callback from CertificateManagerHandler with the trust values.
97 * @param {boolean} trustSSL The initial value of SSL trust checkbox.
98 * @param {boolean} trustEmail The initial value of Email trust checkbox.
99 * @param {boolean} trustObjSign The initial value of Object Signing trust
110 * Show the Edit CA Trust overlay.
  /ndk/sources/host-tools/sed-4.2.1/testsuite/
distrib.good 25 Trust, that's purer than pearl, --
26 Brightest truth, purest trust in the universe --
distrib.inp 24 Trust, that's purer than pearl, --
25 Brightest truth, purest trust in the universe --
  /frameworks/base/cmds/system_server/
system_main.cpp 51 // You can trust me, honestly!
  /external/openssl/crypto/asn1/
x_x509a.c 75 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT),
143 if(!aux->trust
144 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0;
145 return sk_ASN1_OBJECT_push(aux->trust, objtmp);
161 if(x->aux && x->aux->trust) {
162 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free);
163 x->aux->trust = NULL;
  /frameworks/base/core/java/android/text/
BoringLayout.java 94 boolean trust;
103 trust = true;
111 trust = false;
115 metrics, includepad, trust); local
147 boolean trust;
153 trust = true;
162 trust = false;
166 metrics, includepad, trust); local
  /frameworks/base/packages/VpnDialogs/res/values-en-rGB/
strings.xml 20 <string name="warning" msgid="5470743576660160079">"By proceeding, you are giving the application permission to intercept all network traffic. "<b>"Do NOT accept unless you trust the application."</b>" Otherwise, you run the risk of having your data compromised by malicious software."</string>
21 <string name="accept" msgid="2889226408765810173">"I trust this application."</string>
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
CertPathValidatorUtilities.java 166 TrustAnchor trust = null; local
179 throw new AnnotatedException("Cannot set subject search criteria for trust anchor.", ex);
183 while (iter.hasNext() && trust == null)
185 trust = (TrustAnchor) iter.next();
186 if (trust.getTrustedCert() != null)
188 if (certSelectX509.match(trust.getTrustedCert()))
190 trustPublicKey = trust.getTrustedCert().getPublicKey();
194 trust = null;
197 else if (trust.getCAName() != null
198 && trust.getCAPublicKey() != null
    [all...]
PKIXCertPathValidatorSpi.java 173 TrustAnchor trust; local
176 trust = CertPathValidatorUtilities.findTrustAnchor((X509Certificate) certs.get(certs.size() - 1),
184 if (trust == null)
186 throw new CertPathValidatorException("Trust anchor for certification path not found.", null, certPath, -1);
272 X509Certificate sign = trust.getTrustedCert();
282 workingIssuerName = new X500Principal(trust.getCAName());
283 workingPublicKey = trust.getCAPublicKey();
288 throw new ExtCertPathValidatorException("Subject of trust anchor could not be (re)encoded.", ex, certPath,
300 "Algorithm identifier of public key of trust anchor could not be read.", e, certPath, -1);
515 return new PKIXCertPathValidatorResult(trust, intersection, cert.getPublicKey())
    [all...]
  /external/openssl/crypto/rc2/
version 17 far I trust it. It is about the same speed as IDEA and DES.
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/nfsd/
export.h 34 #define NFSEXP_NOAUTHNLM 0x0800 /* Don't authenticate NLM requests - just trust */
  /system/core/libcutils/
sockets.c 21 /* For the socket trust (credentials) check */

Completed in 879 milliseconds

1 2 3 4 5 6 7 8 91011>>