HomeSort by relevance Sort by last modified time
    Searched full:trust (Results 26 - 50 of 880) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/chromium_org/net/cert/
nss_cert_database.h 42 // Will be called when a certificate's trust is changed.
66 // They are used in combination with CertType to specify trust for each type
75 // usage, regardless of whether it would otherwise inherit trust from the
77 // Use TRUST_DEFAULT to inherit trust as normal.
147 // not given any trust.
150 // |trust_bits| can be set to explicitly trust or distrust the certificate, or
151 // use TRUST_DEFAULT to inherit trust as normal.
159 // Get trust bits for certificate.
167 // Set trust values for certificate.
  /external/chromium_org/chrome/common/net/
x509_certificate_model_unittest.cc 50 // trust. Currently this doesn't work.
52 // tell server certs even if they have no trust bits set.
57 // Test GetCertType with server certs and explicit trust.
  /external/chromium_org/chromeos/network/onc/
onc_certificate_importer_impl.cc 39 // Web trust is only granted to certificates imported by the user.
197 // Trust bits should only increase trust and never restrict. Thus,
199 ONC_LOG_WARNING("Certificate contains unknown trust type " +
208 ONC_LOG_WARNING("Web trust not granted for certificate: " + guid);
231 net::NSSCertDatabase::TrustBits trust = (import_with_ssl_trust ? local
241 trust & ~cert_database->GetCertTrust(x509_cert.get(), net_cert_type);
250 trust);
254 " was already present, but trust couldn't be set." +
264 success = cert_database->ImportServerCert(cert_list, trust, &failures)
    [all...]
onc_certificate_importer_impl_unittest.cc 36 CERTCertTrust trust = {0}; local
37 CERT_GetCertTrust(cert, &trust);
39 unsigned all_flags = trust.sslFlags | trust.emailFlags |
40 trust.objectSigningFlags;
47 if (trust.sslFlags & CERTDB_TERMINAL_RECORD)
95 importer.ParseAndStoreCertificates(true, // allow web trust
  /external/ceres-solver/internal/ceres/
dogleg_strategy.cc 117 // elliptical trust region
160 // The trust region is assumed to be elliptical with the
163 // The trust region for step' is spherical.
189 // The dogleg step is defined as the intersection of the trust region
193 // within the trust region.
197 // Case 1. The Gauss-Newton step lies inside the trust region, and
198 // is therefore the optimal solution to the trust-region problem.
211 // the trust region. Rescale the Cauchy point to the trust region
222 // Case 3. The Cauchy point is inside the trust region and th
    [all...]
trust_region_strategy.cc 49 LOG(FATAL) << "Unknown trust region strategy: "
53 LOG(FATAL) << "Unknown trust region strategy: "
  /external/chromium/net/base/
cert_database.h 36 // The change could be either a new user certificate is added or trust on
48 // Will be called when a certificate's trust is changed.
71 // They are used in combination with CertType to specify trust for each type
146 // not given any trust.
155 // Get trust bits for certificate.
158 // Set trust values for certificate.
cert_database_nss.cc 224 psm::nsNSSCertTrust trust(&nsstrust);
227 return trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE) * TRUSTED_SSL +
228 trust.HasTrustedCA(PR_FALSE, PR_TRUE, PR_FALSE) * TRUSTED_EMAIL +
229 trust.HasTrustedCA(PR_FALSE, PR_FALSE, PR_TRUE) * TRUSTED_OBJ_SIGN;
231 return trust.HasTrustedPeer(PR_TRUE, PR_FALSE, PR_FALSE) * TRUSTED_SSL +
232 trust.HasTrustedPeer(PR_FALSE, PR_TRUE, PR_FALSE) * TRUSTED_EMAIL +
233 trust.HasTrustedPeer(PR_FALSE, PR_FALSE, PR_TRUE) * TRUSTED_OBJ_SIGN;
  /external/chromium_org/chrome/browser/
certificate_manager_model.h 70 // |trust_bits| should be a bit field of TRUST* values from NSSCertDatabase.
80 // not given any trust.
83 // |trust_bits| can be set to explicitly trust or distrust the certificate, or
84 // use TRUST_DEFAULT to inherit trust as normal.
93 // Set trust values for certificate.
94 // |trust_bits| should be a bit field of TRUST* values from NSSCertDatabase.
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
PKIXCertPathValidatorSpi.java 114 TrustAnchor trust; local
117 trust = CertPathValidatorUtilities.findTrustAnchor((X509Certificate) certs.get(certs.size() - 1),
125 if (trust == null)
127 throw new CertPathValidatorException("Trust anchor for certification path not found.", null, certPath, -1);
213 X509Certificate sign = trust.getTrustedCert();
223 workingIssuerName = new X500Principal(trust.getCAName());
224 workingPublicKey = trust.getCAPublicKey();
229 throw new ExtCertPathValidatorException("Subject of trust anchor could not be (re)encoded.", ex, certPath,
241 "Algorithm identifier of public key of trust anchor could not be read.", e, certPath, -1);
456 return new PKIXCertPathValidatorResult(trust, intersection, cert.getPublicKey())
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/x509/
x509_vpm.c 76 param->trust = 0;
173 x509_verify_param_copy(trust, 0);
244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust)
246 return X509_TRUST_set(&param->trust, trust);
327 0, /* trust */
337 X509_TRUST_EMAIL, /* trust */
347 X509_TRUST_EMAIL, /* trust */
357 X509_TRUST_SSL_CLIENT, /* trust */
367 X509_TRUST_SSL_SERVER, /* trust */
    [all...]
  /external/openssl/crypto/x509/
x509_vpm.c 76 param->trust = 0;
173 x509_verify_param_copy(trust, 0);
244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust)
246 return X509_TRUST_set(&param->trust, trust);
327 0, /* trust */
337 X509_TRUST_EMAIL, /* trust */
347 X509_TRUST_EMAIL, /* trust */
357 X509_TRUST_SSL_CLIENT, /* trust */
367 X509_TRUST_SSL_SERVER, /* trust */
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/asn1/
x_x509a.c 75 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT),
143 if(!aux->trust
144 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0;
145 return sk_ASN1_OBJECT_push(aux->trust, objtmp);
161 if(x->aux && x->aux->trust) {
162 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free);
163 x->aux->trust = NULL;
  /external/openssl/crypto/asn1/
x_x509a.c 75 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT),
143 if(!aux->trust
144 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0;
145 return sk_ASN1_OBJECT_push(aux->trust, objtmp);
161 if(x->aux && x->aux->trust) {
162 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free);
163 x->aux->trust = NULL;
  /external/chromium_org/chrome/browser/chromeos/policy/
policy_cert_verifier_browsertest.cc 86 net::NSSCertDatabase::TrustBits trust = local
88 EXPECT_EQ(net::NSSCertDatabase::TRUST_DEFAULT, trust);
161 // Make the database trust |ca_cert|.
170 net::NSSCertDatabase::TrustBits trust = local
172 EXPECT_EQ(net::NSSCertDatabase::TRUSTED_SSL, trust);
239 // The profile becomes tainted after using the trust anchors that came from
288 // Verify() again with the additional trust anchors.
305 // The profile becomes tainted after using the trust anchors that came from
311 // Verifying after removing the trust anchors should now fail.
  /external/chromium_org/chrome/browser/ui/webui/options/
certificate_manager_browsertest.cc 55 // Enable web trust certs from policy.
103 // Ensure policy-installed certificates without web trust do not display
116 // Ensure policy-installed certificates with web trust display the
  /external/ceres-solver/include/ceres/
iteration_callback.h 75 // acceptance criterion used by the non-monotonic trust region
82 // ordinary trust region algorithm is used, this means that the
85 // non-monotonic trust region algorithm is used
107 // For trust region algorithms, the ratio of the actual change in
111 // Size of the trust region at the end of the current iteration. For
145 // Time (in seconds) spent inside the trust region step solver.
  /external/chromium_org/net/ssl/
client_cert_store_impl_mac.cc 34 // This function calls SecTrust but doesn't actually pay attention to the trust
35 // result: it shouldn't be used to determine trust, just to traverse the chain.
61 ScopedCFTypeRef<SecTrustRef> trust(trust_ref);
63 // Evaluate trust, which creates the cert chain.
68 result = SecTrustEvaluate(trust, &status);
74 result = SecTrustGetResult(trust, &status, out_cert_chain, &status_chain);
  /external/chromium_org/chrome/browser/chromeos/kiosk_mode/
kiosk_mode_settings.h 25 // refactorings easier. This class also handles getting trust for the policies
37 // Initialize the settings; this will call the callback once trust is
  /external/chromium_org/net/android/
network_library.h 28 // Adds a certificate as a root trust certificate to the trust manager.
  /external/chromium_org/sandbox/win/src/
sync_interception.cc 29 // We don't trust that the IPC can work this early.
74 // We don't trust that the IPC can work this early.
  /external/chromium_org/v8/tools/testrunner/server/
constants.py 50 TRUST_YOU_NOW = "trust you now"
51 DO_YOU_TRUST = "do you trust"
  /frameworks/base/core/java/android/text/
BoringLayout.java 94 boolean trust;
103 trust = true;
111 trust = false;
115 metrics, includepad, trust); local
147 boolean trust;
153 trust = true;
162 trust = false;
166 metrics, includepad, trust); local
  /frameworks/base/packages/VpnDialogs/res/values-en-rGB/
strings.xml 20 <string name="warning" msgid="5470743576660160079">"By proceeding, you are giving the application permission to intercept all network traffic. "<b>"Do NOT accept unless you trust the application."</b>" Otherwise, you run the risk of having your data compromised by malicious software."</string>
21 <string name="accept" msgid="2889226408765810173">"I trust this application."</string>
  /frameworks/base/packages/VpnDialogs/res/values-en-rIN/
strings.xml 20 <string name="warning" msgid="5470743576660160079">"By proceeding, you are giving the application permission to intercept all network traffic. "<b>"Do NOT accept unless you trust the application."</b>" Otherwise, you run the risk of having your data compromised by malicious software."</string>
21 <string name="accept" msgid="2889226408765810173">"I trust this application."</string>

Completed in 1100 milliseconds

12 3 4 5 6 7 8 91011>>