/external/mockwebserver/src/main/java/com/google/mockwebserver/ |
SocketPolicy.java | 60 * Don't trust the client during the SSL handshake.
|
/frameworks/base/packages/Shell/res/values/ |
strings.xml | 26 <string name="bugreport_confirm">Bug reports contain data from the system\'s various log files, including personal and private information. Only share bug reports with apps and people you trust.</string>
|
/packages/apps/KeyChain/res/values-en-rGB/ |
strings.xml | 23 <string name="requesting_server" msgid="5832565605998634370">"The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app."</string>
|
/packages/apps/KeyChain/res/values-en-rIN/ |
strings.xml | 23 <string name="requesting_server" msgid="5832565605998634370">"The app has identified the requesting server as %s, but you should only give the app access to the certificate if you trust the app."</string>
|
/external/ceres-solver/internal/ceres/ |
dogleg_strategy.h | 40 // Dogleg step computation and trust region sizing strategy based on 138 // user wants to solve the trust region problem with the same matrix 139 // but a different trust region radius and the Gauss-Newton and
|
trust_region_minimizer.cc | 272 // We are going to try and reduce the trust region radius and 328 // improvements are not accounted for by the trust region. 404 // Normally, the quality of a trust region step is measured by 411 // All the change in the nonlinear objective is due to the trust 413 // the trust region radius. However, when inner iterations are 416 // trust region algorithm. So we change the ratio to be 424 // and the trust region step is so bad, that this ratio can become 427 // This can cause the trust region loop to reject this step. To 430 // they did, we accept the step even if the trust region ratio 496 // Based on algorithm 10.1.2 (page 357) of "Trust Regio [all...] |
trust_region_minimizer.h | 41 // Generic trust region minimization algorithm. The heavy lifting is
|
/external/chromium_org/net/cert/ |
x509_cert_types_unittest.cc | 110 EXPECT_EQ("A-Trust-Qual-01", 114 EXPECT_EQ("A-Trust Ges. für Sicherheitssysteme im elektr. Datenverkehr GmbH", 117 EXPECT_EQ("A-Trust-Qual-01",
|
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
t_x509a.c | 73 if(aux->trust) { 77 for(i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) { 81 sk_ASN1_OBJECT_value(aux->trust, i), 0);
|
/external/openssl/crypto/asn1/ |
t_x509a.c | 73 if(aux->trust) { 77 for(i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) { 81 sk_ASN1_OBJECT_value(aux->trust, i), 0);
|
/libcore/luni/src/main/files/cacerts/ |
a15b3b6b.0 | 25 Issuer: C=US, O=Digital Signature Trust Co., OU=DSTCA E2 29 Subject: C=US, O=Digital Signature Trust Co., OU=DSTCA E2 50 DirName: C = US, O = Digital Signature Trust Co., OU = DSTCA E2, CN = CRL1
|
c215bc69.0 | 25 Issuer: C=US, O=Digital Signature Trust Co., OU=DSTCA E1 29 Subject: C=US, O=Digital Signature Trust Co., OU=DSTCA E1 50 DirName: C = US, O = Digital Signature Trust Co., OU = DSTCA E1, CN = CRL1
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
network_configuration_updater_impl_cros_unittest.cc | 306 // The initial list of trust anchors is empty. 310 // Initially, certificates imported from policy don't have trust flags. 317 // Certificates with the "Web" trust flag set should be forwarded to the 318 // trust provider. 334 // Certificates are only provided as trust anchors if they come from user
|
/external/smack/src/org/jivesoftware/smack/ |
ConnectionConfiguration.java | 286 * Retuns the path to the trust store file. The trust store file contains the root 297 * Sets the path to the trust store file. The truststore file contains the root 308 * Returns the trust store type, or <tt>null</tt> if it's not set. 310 * @return the trust store type. 317 * Sets the trust store type. 319 * @param truststoreType the trust store type. 326 * Returns the password to use to access the trust store file. It is assumed that all 327 * certificates share the same password in the trust store. 336 * Sets the password to use to access the trust store file. It is assumed that al [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
x509_vfy.c | 266 * so we get any trust settings. 349 /* The chain extensions are OK: check trust */ 351 if (param->trust > 0) ok = check_trust(ctx); 619 * chain including trust anchor. Trust anchor not strictly 655 ok = X509_check_trust(x, ctx->param->trust, 0); 1143 * end in the same trust anchor, though some discussions remain... [all...] |
x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
/external/openssl/crypto/x509/ |
x509_vfy.c | 266 * so we get any trust settings. 349 /* The chain extensions are OK: check trust */ 351 if (param->trust > 0) ok = check_trust(ctx); 619 * chain including trust anchor. Trust anchor not strictly 655 ok = X509_check_trust(x, ctx->param->trust, 0); 1143 * end in the same trust anchor, though some discussions remain... [all...] |
x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
/external/openssl/include/openssl/ |
x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
/external/chromium_org/net/socket/ |
client_socket_pool_manager_impl.cc | 379 // We should flush the socket pools if we removed trust from a 383 // We should not flush the socket pools if we added trust to a 387 // kind of trust change it is, we have to flush the socket
|
/libcore/crypto/src/test/java/org/conscrypt/ |
TrustManagerImplTest.java | 67 * Ensure that our non-standard behavior of learning to trust new 118 // build the trust manager 177 // insert it into the trust manager
|
/packages/apps/Email/tests/src/com/android/email/activity/setup/ |
AccountSetupExchangeTests.java | 172 // The default URI has no SSL and no "trust" 179 // "trust certificates" checkbox (not checked, but visible now). 194 // "trust certificates" checkbox (not checked, but visible now).
|
/external/chromium/base/ |
file_descriptor_shuffle.h | 23 // and trust the the Right Thing will get done.
|
/external/chromium/net/base/ |
test_root_certs.h | 87 // It is necessary to maintain a cache of the original certificate trust
|