/external/chromium_org/net/cert/ |
nss_cert_database.h | 42 // Will be called when a certificate's trust is changed. 66 // They are used in combination with CertType to specify trust for each type 75 // usage, regardless of whether it would otherwise inherit trust from the 77 // Use TRUST_DEFAULT to inherit trust as normal. 147 // not given any trust. 150 // |trust_bits| can be set to explicitly trust or distrust the certificate, or 151 // use TRUST_DEFAULT to inherit trust as normal. 159 // Get trust bits for certificate. 167 // Set trust values for certificate.
|
/external/chromium_org/chrome/common/net/ |
x509_certificate_model_unittest.cc | 50 // trust. Currently this doesn't work. 52 // tell server certs even if they have no trust bits set. 57 // Test GetCertType with server certs and explicit trust.
|
/external/chromium_org/chromeos/network/onc/ |
onc_certificate_importer_impl.cc | 39 // Web trust is only granted to certificates imported by the user. 197 // Trust bits should only increase trust and never restrict. Thus, 199 ONC_LOG_WARNING("Certificate contains unknown trust type " + 208 ONC_LOG_WARNING("Web trust not granted for certificate: " + guid); 231 net::NSSCertDatabase::TrustBits trust = (import_with_ssl_trust ? local 241 trust & ~cert_database->GetCertTrust(x509_cert.get(), net_cert_type); 250 trust); 254 " was already present, but trust couldn't be set." + 264 success = cert_database->ImportServerCert(cert_list, trust, &failures) [all...] |
onc_certificate_importer_impl_unittest.cc | 36 CERTCertTrust trust = {0}; local 37 CERT_GetCertTrust(cert, &trust); 39 unsigned all_flags = trust.sslFlags | trust.emailFlags | 40 trust.objectSigningFlags; 47 if (trust.sslFlags & CERTDB_TERMINAL_RECORD) 95 importer.ParseAndStoreCertificates(true, // allow web trust
|
/external/ceres-solver/internal/ceres/ |
dogleg_strategy.cc | 117 // elliptical trust region 160 // The trust region is assumed to be elliptical with the 163 // The trust region for step' is spherical. 189 // The dogleg step is defined as the intersection of the trust region 193 // within the trust region. 197 // Case 1. The Gauss-Newton step lies inside the trust region, and 198 // is therefore the optimal solution to the trust-region problem. 211 // the trust region. Rescale the Cauchy point to the trust region 222 // Case 3. The Cauchy point is inside the trust region and th [all...] |
trust_region_strategy.cc | 49 LOG(FATAL) << "Unknown trust region strategy: " 53 LOG(FATAL) << "Unknown trust region strategy: "
|
/external/chromium/net/base/ |
cert_database.h | 36 // The change could be either a new user certificate is added or trust on 48 // Will be called when a certificate's trust is changed. 71 // They are used in combination with CertType to specify trust for each type 146 // not given any trust. 155 // Get trust bits for certificate. 158 // Set trust values for certificate.
|
cert_database_nss.cc | 224 psm::nsNSSCertTrust trust(&nsstrust); 227 return trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE) * TRUSTED_SSL + 228 trust.HasTrustedCA(PR_FALSE, PR_TRUE, PR_FALSE) * TRUSTED_EMAIL + 229 trust.HasTrustedCA(PR_FALSE, PR_FALSE, PR_TRUE) * TRUSTED_OBJ_SIGN; 231 return trust.HasTrustedPeer(PR_TRUE, PR_FALSE, PR_FALSE) * TRUSTED_SSL + 232 trust.HasTrustedPeer(PR_FALSE, PR_TRUE, PR_FALSE) * TRUSTED_EMAIL + 233 trust.HasTrustedPeer(PR_FALSE, PR_FALSE, PR_TRUE) * TRUSTED_OBJ_SIGN;
|
/external/chromium_org/chrome/browser/ |
certificate_manager_model.h | 70 // |trust_bits| should be a bit field of TRUST* values from NSSCertDatabase. 80 // not given any trust. 83 // |trust_bits| can be set to explicitly trust or distrust the certificate, or 84 // use TRUST_DEFAULT to inherit trust as normal. 93 // Set trust values for certificate. 94 // |trust_bits| should be a bit field of TRUST* values from NSSCertDatabase.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCertPathValidatorSpi.java | 114 TrustAnchor trust; local 117 trust = CertPathValidatorUtilities.findTrustAnchor((X509Certificate) certs.get(certs.size() - 1), 125 if (trust == null) 127 throw new CertPathValidatorException("Trust anchor for certification path not found.", null, certPath, -1); 213 X509Certificate sign = trust.getTrustedCert(); 223 workingIssuerName = new X500Principal(trust.getCAName()); 224 workingPublicKey = trust.getCAPublicKey(); 229 throw new ExtCertPathValidatorException("Subject of trust anchor could not be (re)encoded.", ex, certPath, 241 "Algorithm identifier of public key of trust anchor could not be read.", e, certPath, -1); 456 return new PKIXCertPathValidatorResult(trust, intersection, cert.getPublicKey()) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
x509_vpm.c | 76 param->trust = 0; 173 x509_verify_param_copy(trust, 0); 244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) 246 return X509_TRUST_set(¶m->trust, trust); 327 0, /* trust */ 337 X509_TRUST_EMAIL, /* trust */ 347 X509_TRUST_EMAIL, /* trust */ 357 X509_TRUST_SSL_CLIENT, /* trust */ 367 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
/external/openssl/crypto/x509/ |
x509_vpm.c | 76 param->trust = 0; 173 x509_verify_param_copy(trust, 0); 244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) 246 return X509_TRUST_set(¶m->trust, trust); 327 0, /* trust */ 337 X509_TRUST_EMAIL, /* trust */ 347 X509_TRUST_EMAIL, /* trust */ 357 X509_TRUST_SSL_CLIENT, /* trust */ 367 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
x_x509a.c | 75 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT), 143 if(!aux->trust 144 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0; 145 return sk_ASN1_OBJECT_push(aux->trust, objtmp); 161 if(x->aux && x->aux->trust) { 162 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free); 163 x->aux->trust = NULL;
|
/external/openssl/crypto/asn1/ |
x_x509a.c | 75 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT), 143 if(!aux->trust 144 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0; 145 return sk_ASN1_OBJECT_push(aux->trust, objtmp); 161 if(x->aux && x->aux->trust) { 162 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free); 163 x->aux->trust = NULL;
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
policy_cert_verifier_browsertest.cc | 86 net::NSSCertDatabase::TrustBits trust = local 88 EXPECT_EQ(net::NSSCertDatabase::TRUST_DEFAULT, trust); 161 // Make the database trust |ca_cert|. 170 net::NSSCertDatabase::TrustBits trust = local 172 EXPECT_EQ(net::NSSCertDatabase::TRUSTED_SSL, trust); 239 // The profile becomes tainted after using the trust anchors that came from 288 // Verify() again with the additional trust anchors. 305 // The profile becomes tainted after using the trust anchors that came from 311 // Verifying after removing the trust anchors should now fail.
|
/external/chromium_org/chrome/browser/ui/webui/options/ |
certificate_manager_browsertest.cc | 55 // Enable web trust certs from policy. 103 // Ensure policy-installed certificates without web trust do not display 116 // Ensure policy-installed certificates with web trust display the
|
/external/ceres-solver/include/ceres/ |
iteration_callback.h | 75 // acceptance criterion used by the non-monotonic trust region 82 // ordinary trust region algorithm is used, this means that the 85 // non-monotonic trust region algorithm is used 107 // For trust region algorithms, the ratio of the actual change in 111 // Size of the trust region at the end of the current iteration. For 145 // Time (in seconds) spent inside the trust region step solver.
|
/external/chromium_org/net/ssl/ |
client_cert_store_impl_mac.cc | 34 // This function calls SecTrust but doesn't actually pay attention to the trust 35 // result: it shouldn't be used to determine trust, just to traverse the chain. 61 ScopedCFTypeRef<SecTrustRef> trust(trust_ref); 63 // Evaluate trust, which creates the cert chain. 68 result = SecTrustEvaluate(trust, &status); 74 result = SecTrustGetResult(trust, &status, out_cert_chain, &status_chain);
|
/external/chromium_org/chrome/browser/chromeos/kiosk_mode/ |
kiosk_mode_settings.h | 25 // refactorings easier. This class also handles getting trust for the policies 37 // Initialize the settings; this will call the callback once trust is
|
/external/chromium_org/net/android/ |
network_library.h | 28 // Adds a certificate as a root trust certificate to the trust manager.
|
/external/chromium_org/sandbox/win/src/ |
sync_interception.cc | 29 // We don't trust that the IPC can work this early. 74 // We don't trust that the IPC can work this early.
|
/external/chromium_org/v8/tools/testrunner/server/ |
constants.py | 50 TRUST_YOU_NOW = "trust you now" 51 DO_YOU_TRUST = "do you trust"
|
/frameworks/base/core/java/android/text/ |
BoringLayout.java | 94 boolean trust; 103 trust = true; 111 trust = false; 115 metrics, includepad, trust); local 147 boolean trust; 153 trust = true; 162 trust = false; 166 metrics, includepad, trust); local
|
/frameworks/base/packages/VpnDialogs/res/values-en-rGB/ |
strings.xml | 20 <string name="warning" msgid="5470743576660160079">"By proceeding, you are giving the application permission to intercept all network traffic. "<b>"Do NOT accept unless you trust the application."</b>" Otherwise, you run the risk of having your data compromised by malicious software."</string> 21 <string name="accept" msgid="2889226408765810173">"I trust this application."</string>
|
/frameworks/base/packages/VpnDialogs/res/values-en-rIN/ |
strings.xml | 20 <string name="warning" msgid="5470743576660160079">"By proceeding, you are giving the application permission to intercept all network traffic. "<b>"Do NOT accept unless you trust the application."</b>" Otherwise, you run the risk of having your data compromised by malicious software."</string> 21 <string name="accept" msgid="2889226408765810173">"I trust this application."</string>
|