/external/openssl/crypto/x509/ |
x509_trs.c | 68 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 69 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 70 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 75 /* WARNING: the following table should be kept in order of trust 76 * and without any gaps so we can just subtract the minimum trust 100 return (*a)->trust - (*b)->trust; 103 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int) 107 default_trust = trust; 142 tmp.trust = id [all...] |
x509_vpm.c | 76 param->trust = 0; 173 x509_verify_param_copy(trust, 0); 244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) 246 return X509_TRUST_set(¶m->trust, trust); 327 0, /* trust */ 337 X509_TRUST_EMAIL, /* trust */ 347 X509_TRUST_EMAIL, /* trust */ 357 X509_TRUST_SSL_CLIENT, /* trust */ 367 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
x509_vfy.c | 269 * so we get any trust settings. 354 /* The chain extensions are OK: check trust */ 356 if (param->trust > 0) ok = check_trust(ctx); 624 * chain including trust anchor. Trust anchor not strictly 660 ok = X509_check_trust(x, ctx->param->trust, 0); 1148 * end in the same trust anchor, though some discussions remain... [all...] |
x509_lu.c | 699 int X509_STORE_set_trust(X509_STORE *ctx, int trust) 701 return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
|
/external/chromium/net/base/ |
test_root_certs_nss.cc | 17 // for a certificate whose trust status has been changed by the 22 // and copying |trust|. 23 TrustEntry(CERTCertificate* certificate, CERTCertTrust trust); 27 CERTCertTrust trust() const { return trust_; } function in class:net::TestRootCerts::TrustEntry 33 // The original trust settings, before |certificate_| was manipulated to 41 CERTCertTrust trust) 43 trust_(trust) { 51 // Preserve the original trust bits so that they can be restored when 58 // particular trust settings associated with it, and attempts to use 59 // |original_trust| later to restore the original trust settings will no [all...] |
cert_database_nss_unittest.cc | 210 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust); 211 EXPECT_TRUE(trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE)); 212 EXPECT_FALSE(trust.HasTrustedCA(PR_FALSE, PR_TRUE, PR_FALSE)); 213 EXPECT_FALSE(trust.HasTrustedCA(PR_FALSE, PR_FALSE, PR_TRUE)); 214 EXPECT_FALSE(trust.HasTrustedCA(PR_TRUE, PR_TRUE, PR_TRUE)); 215 EXPECT_TRUE(trust.HasCA(PR_TRUE, PR_TRUE, PR_TRUE)); 242 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust); 243 EXPECT_FALSE(trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE)) [all...] |
cert_database_nss.cc | 224 psm::nsNSSCertTrust trust(&nsstrust); 227 return trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE) * TRUSTED_SSL + 228 trust.HasTrustedCA(PR_FALSE, PR_TRUE, PR_FALSE) * TRUSTED_EMAIL + 229 trust.HasTrustedCA(PR_FALSE, PR_FALSE, PR_TRUE) * TRUSTED_OBJ_SIGN; 231 return trust.HasTrustedPeer(PR_TRUE, PR_FALSE, PR_FALSE) * TRUSTED_SSL + 232 trust.HasTrustedPeer(PR_FALSE, PR_TRUE, PR_FALSE) * TRUSTED_EMAIL + 233 trust.HasTrustedPeer(PR_FALSE, PR_FALSE, PR_TRUE) * TRUSTED_OBJ_SIGN;
|
/external/openssl/crypto/asn1/ |
t_x509a.c | 73 if(aux->trust) { 77 for(i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) { 81 sk_ASN1_OBJECT_value(aux->trust, i), 0);
|
x_x509a.c | 75 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT), 143 if(!aux->trust 144 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0; 145 return sk_ASN1_OBJECT_push(aux->trust, objtmp); 161 if(x->aux && x->aux->trust) { 162 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free); 163 x->aux->trust = NULL;
|
/frameworks/base/core/java/android/text/ |
BoringLayout.java | 94 boolean trust; 103 trust = true; 111 trust = false; 115 metrics, includepad, trust); local 147 boolean trust; 153 trust = true; 162 trust = false; 166 metrics, includepad, trust); local
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
CertPathValidatorUtilities.java | 166 TrustAnchor trust = null; local 179 throw new AnnotatedException("Cannot set subject search criteria for trust anchor.", ex); 183 while (iter.hasNext() && trust == null) 185 trust = (TrustAnchor) iter.next(); 186 if (trust.getTrustedCert() != null) 188 if (certSelectX509.match(trust.getTrustedCert())) 190 trustPublicKey = trust.getTrustedCert().getPublicKey(); 194 trust = null; 197 else if (trust.getCAName() != null 198 && trust.getCAPublicKey() != null [all...] |
PKIXCertPathValidatorSpi.java | 173 TrustAnchor trust; local 176 trust = CertPathValidatorUtilities.findTrustAnchor((X509Certificate) certs.get(certs.size() - 1), 184 if (trust == null) 186 throw new CertPathValidatorException("Trust anchor for certification path not found.", null, certPath, -1); 272 X509Certificate sign = trust.getTrustedCert(); 282 workingIssuerName = new X500Principal(trust.getCAName()); 283 workingPublicKey = trust.getCAPublicKey(); 288 throw new ExtCertPathValidatorException("Subject of trust anchor could not be (re)encoded.", ex, certPath, 300 "Algorithm identifier of public key of trust anchor could not be read.", e, certPath, -1); 515 return new PKIXCertPathValidatorResult(trust, intersection, cert.getPublicKey()) [all...] |
/external/openssl/include/openssl/ |
x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
/external/openssl/apps/ |
x509.c | 127 " -addtrust arg - trust certificate for a given purpose\n", 180 STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL; 345 "Invalid trust object value %s\n", *argv); 348 if (!trust) trust = sk_ASN1_OBJECT_new_null(); 349 sk_ASN1_OBJECT_push(trust, objtmp); 696 if (trust) 698 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) 700 objtmp = sk_ASN1_OBJECT_value(trust, i); 1086 sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_free) [all...] |
/external/wpa_supplicant/ |
x509v3.c | 1538 struct x509_certificate *cert, *trust; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
x509v3.c | 1578 struct x509_certificate *cert, *trust; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
x509v3.c | 1841 struct x509_certificate *cert, *trust; local [all...] |
/external/openssl/crypto/x509v3/ |
v3_purp.c | 172 int X509_PURPOSE_add(int id, int trust, int flags, 180 /* This will always be set for application modified trust entries */ 211 ptmp->trust = trust; 267 return xp->trust;
|
/packages/apps/Bluetooth/src/com/android/bluetooth/pbap/ |
BluetoothPbapService.java | 526 boolean trust = mRemoteDevice.getTrustState(); 527 if (VERBOSE) Log.v(TAG, "GetTrustState() = " + trust); 529 if (trust) {
|
/libcore/luni/src/main/java/javax/security/auth/ |
Subject.java | 543 boolean trust = s.getClass().getClassLoader() == null; 547 if (trust || !elements.contains(o)) {
|
/packages/apps/Phone/src/com/android/phone/ |
BluetoothAtPhonebook.java | 490 boolean trust = remoteDevice.getTrustState(); 492 if (trust) {
|
/external/bluetooth/bluez/src/ |
storage.h | 54 int write_trust(const char *src, const char *addr, const char *service, gboolean trust);
|
/external/chromium/chrome/browser/ui/webui/options/ |
certificate_manager_handler.cc | 332 // Edit CA Trust & Import CA overlay strings. 467 int trust = certificate_manager_model_->cert_db().GetCertTrust( local 469 FundamentalValue ssl_value(bool(trust & net::CertDatabase::TRUSTED_SSL)); 470 FundamentalValue email_value(bool(trust & net::CertDatabase::TRUSTED_EMAIL)); 472 bool(trust & net::CertDatabase::TRUSTED_OBJ_SIGN)); [all...] |
/external/llvm/utils/ |
codegen-diff | 117 disassemble to the same thing. This puts a lot of trust in the
|