HomeSort by relevance Sort by last modified time
    Searched full:trust (Results 101 - 125 of 880) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/mockwebserver/src/main/java/com/google/mockwebserver/
SocketPolicy.java 60 * Don't trust the client during the SSL handshake.
  /frameworks/base/packages/Shell/res/values/
strings.xml 26 <string name="bugreport_confirm">Bug reports contain data from the system\'s various log files, including personal and private information. Only share bug reports with apps and people you trust.</string>
  /packages/apps/KeyChain/res/values-en-rGB/
strings.xml 23 <string name="requesting_server" msgid="5832565605998634370">"The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app."</string>
  /packages/apps/KeyChain/res/values-en-rIN/
strings.xml 23 <string name="requesting_server" msgid="5832565605998634370">"The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app."</string>
  /external/ceres-solver/internal/ceres/
dogleg_strategy.h 40 // Dogleg step computation and trust region sizing strategy based on
138 // user wants to solve the trust region problem with the same matrix
139 // but a different trust region radius and the Gauss-Newton and
trust_region_minimizer.cc 272 // We are going to try and reduce the trust region radius and
328 // improvements are not accounted for by the trust region.
404 // Normally, the quality of a trust region step is measured by
411 // All the change in the nonlinear objective is due to the trust
413 // the trust region radius. However, when inner iterations are
416 // trust region algorithm. So we change the ratio to be
424 // and the trust region step is so bad, that this ratio can become
427 // This can cause the trust region loop to reject this step. To
430 // they did, we accept the step even if the trust region ratio
496 // Based on algorithm 10.1.2 (page 357) of "Trust Regio
    [all...]
trust_region_minimizer.h 41 // Generic trust region minimization algorithm. The heavy lifting is
  /external/chromium_org/net/cert/
x509_cert_types_unittest.cc 110 EXPECT_EQ("A-Trust-Qual-01",
114 EXPECT_EQ("A-Trust Ges. für Sicherheitssysteme im elektr. Datenverkehr GmbH",
117 EXPECT_EQ("A-Trust-Qual-01",
  /external/chromium_org/third_party/openssl/openssl/crypto/asn1/
t_x509a.c 73 if(aux->trust) {
77 for(i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) {
81 sk_ASN1_OBJECT_value(aux->trust, i), 0);
  /external/openssl/crypto/asn1/
t_x509a.c 73 if(aux->trust) {
77 for(i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) {
81 sk_ASN1_OBJECT_value(aux->trust, i), 0);
  /libcore/luni/src/main/files/cacerts/
a15b3b6b.0 25 Issuer: C=US, O=Digital Signature Trust Co., OU=DSTCA E2
29 Subject: C=US, O=Digital Signature Trust Co., OU=DSTCA E2
50 DirName: C = US, O = Digital Signature Trust Co., OU = DSTCA E2, CN = CRL1
c215bc69.0 25 Issuer: C=US, O=Digital Signature Trust Co., OU=DSTCA E1
29 Subject: C=US, O=Digital Signature Trust Co., OU=DSTCA E1
50 DirName: C = US, O = Digital Signature Trust Co., OU = DSTCA E1, CN = CRL1
  /external/chromium_org/chrome/browser/chromeos/policy/
network_configuration_updater_impl_cros_unittest.cc 306 // The initial list of trust anchors is empty.
310 // Initially, certificates imported from policy don't have trust flags.
317 // Certificates with the "Web" trust flag set should be forwarded to the
318 // trust provider.
334 // Certificates are only provided as trust anchors if they come from user
  /external/smack/src/org/jivesoftware/smack/
ConnectionConfiguration.java 286 * Retuns the path to the trust store file. The trust store file contains the root
297 * Sets the path to the trust store file. The truststore file contains the root
308 * Returns the trust store type, or <tt>null</tt> if it's not set.
310 * @return the trust store type.
317 * Sets the trust store type.
319 * @param truststoreType the trust store type.
326 * Returns the password to use to access the trust store file. It is assumed that all
327 * certificates share the same password in the trust store.
336 * Sets the password to use to access the trust store file. It is assumed that al
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/x509/
x509_vfy.c 266 * so we get any trust settings.
349 /* The chain extensions are OK: check trust */
351 if (param->trust > 0) ok = check_trust(ctx);
619 * chain including trust anchor. Trust anchor not strictly
655 ok = X509_check_trust(x, ctx->param->trust, 0);
1143 * end in the same trust anchor, though some discussions remain...
    [all...]
x509_vfy.h 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
  /external/openssl/crypto/x509/
x509_vfy.c 266 * so we get any trust settings.
349 /* The chain extensions are OK: check trust */
351 if (param->trust > 0) ok = check_trust(ctx);
619 * chain including trust anchor. Trust anchor not strictly
655 ok = X509_check_trust(x, ctx->param->trust, 0);
1143 * end in the same trust anchor, though some discussions remain...
    [all...]
x509_vfy.h 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
x509_vfy.h 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
  /external/openssl/include/openssl/
x509_vfy.h 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
  /external/chromium_org/net/socket/
client_socket_pool_manager_impl.cc 379 // We should flush the socket pools if we removed trust from a
383 // We should not flush the socket pools if we added trust to a
387 // kind of trust change it is, we have to flush the socket
  /libcore/crypto/src/test/java/org/conscrypt/
TrustManagerImplTest.java 67 * Ensure that our non-standard behavior of learning to trust new
118 // build the trust manager
177 // insert it into the trust manager
  /packages/apps/Email/tests/src/com/android/email/activity/setup/
AccountSetupExchangeTests.java 172 // The default URI has no SSL and no "trust"
179 // "trust certificates" checkbox (not checked, but visible now).
194 // "trust certificates" checkbox (not checked, but visible now).
  /external/chromium/base/
file_descriptor_shuffle.h 23 // and trust the the Right Thing will get done.
  /external/chromium/net/base/
test_root_certs.h 87 // It is necessary to maintain a cache of the original certificate trust

Completed in 281 milliseconds

1 2 3 45 6 7 8 91011>>