HomeSort by relevance Sort by last modified time
    Searched refs:trust (Results 1 - 25 of 72) sorted by null

1 2 3

  /external/chromium_org/third_party/openssl/openssl/crypto/x509/
x509_trs.c 68 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags);
69 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags);
70 static int trust_compat(X509_TRUST *trust, X509 *x, int flags);
75 /* WARNING: the following table should be kept in order of trust
76 * and without any gaps so we can just subtract the minimum trust
100 return (*a)->trust - (*b)->trust;
103 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int)
107 default_trust = trust;
142 tmp.trust = id
    [all...]
x509_vpm.c 76 param->trust = 0;
173 x509_verify_param_copy(trust, 0);
244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust)
246 return X509_TRUST_set(&param->trust, trust);
327 0, /* trust */
337 X509_TRUST_EMAIL, /* trust */
347 X509_TRUST_EMAIL, /* trust */
357 X509_TRUST_SSL_CLIENT, /* trust */
367 X509_TRUST_SSL_SERVER, /* trust */
    [all...]
x509_vfy.h 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
  /external/openssl/crypto/x509/
x509_trs.c 68 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags);
69 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags);
70 static int trust_compat(X509_TRUST *trust, X509 *x, int flags);
75 /* WARNING: the following table should be kept in order of trust
76 * and without any gaps so we can just subtract the minimum trust
100 return (*a)->trust - (*b)->trust;
103 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int)
107 default_trust = trust;
142 tmp.trust = id
    [all...]
x509_vpm.c 76 param->trust = 0;
173 x509_verify_param_copy(trust, 0);
244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust)
246 return X509_TRUST_set(&param->trust, trust);
327 0, /* trust */
337 X509_TRUST_EMAIL, /* trust */
347 X509_TRUST_EMAIL, /* trust */
357 X509_TRUST_SSL_CLIENT, /* trust */
367 X509_TRUST_SSL_SERVER, /* trust */
    [all...]
x509_vfy.h 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
  /external/chromium/net/base/
test_root_certs_nss.cc 17 // for a certificate whose trust status has been changed by the
22 // and copying |trust|.
23 TrustEntry(CERTCertificate* certificate, CERTCertTrust trust);
27 CERTCertTrust trust() const { return trust_; } function in class:net::TestRootCerts::TrustEntry
33 // The original trust settings, before |certificate_| was manipulated to
41 CERTCertTrust trust)
43 trust_(trust) {
51 // Preserve the original trust bits so that they can be restored when
58 // particular trust settings associated with it, and attempts to use
59 // |original_trust| later to restore the original trust settings will no
    [all...]
cert_database_nss_unittest.cc 210 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust);
211 EXPECT_TRUE(trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE));
212 EXPECT_FALSE(trust.HasTrustedCA(PR_FALSE, PR_TRUE, PR_FALSE));
213 EXPECT_FALSE(trust.HasTrustedCA(PR_FALSE, PR_FALSE, PR_TRUE));
214 EXPECT_FALSE(trust.HasTrustedCA(PR_TRUE, PR_TRUE, PR_TRUE));
215 EXPECT_TRUE(trust.HasCA(PR_TRUE, PR_TRUE, PR_TRUE));
242 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust);
243 EXPECT_FALSE(trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE))
    [all...]
cert_database_nss.cc 224 psm::nsNSSCertTrust trust(&nsstrust);
227 return trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE) * TRUSTED_SSL +
228 trust.HasTrustedCA(PR_FALSE, PR_TRUE, PR_FALSE) * TRUSTED_EMAIL +
229 trust.HasTrustedCA(PR_FALSE, PR_FALSE, PR_TRUE) * TRUSTED_OBJ_SIGN;
231 return trust.HasTrustedPeer(PR_TRUE, PR_FALSE, PR_FALSE) * TRUSTED_SSL +
232 trust.HasTrustedPeer(PR_FALSE, PR_TRUE, PR_FALSE) * TRUSTED_EMAIL +
233 trust.HasTrustedPeer(PR_FALSE, PR_FALSE, PR_TRUE) * TRUSTED_OBJ_SIGN;
  /external/chromium_org/net/cert/
test_root_certs_nss.cc 21 // for a certificate whose trust status has been changed by the
26 // and copying |trust|.
27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust);
31 const CERTCertTrust& trust() const { return trust_; } function in class:net::TestRootCerts::TrustEntry
37 // The original trust settings, before |certificate_| was manipulated to
45 const CERTCertTrust& trust)
47 trust_(trust) {
61 // Preserve the original trust bits so that they can be restored when
67 // particular trust settings associated with it, and attempts to use
68 // |original_trust| later to restore the original trust settings will no
    [all...]
nss_cert_database.cc 185 CERTCertTrust trust; local
186 SECStatus srv = CERT_GetCertTrust(cert->os_cert_handle(), &trust);
192 // round-trip all possible NSS trust flag combinations. We try to map them in
200 if ((trust.sslFlags & kCAFlags) == CERTDB_TERMINAL_RECORD)
202 else if (trust.sslFlags & kTrustedCA)
205 if ((trust.emailFlags & kCAFlags) == CERTDB_TERMINAL_RECORD)
207 else if (trust.emailFlags & kTrustedCA)
210 if ((trust.objectSigningFlags & kCAFlags) == CERTDB_TERMINAL_RECORD)
212 else if (trust.objectSigningFlags & kTrustedCA)
218 if (trust.sslFlags & CERTDB_TERMINAL_RECORD)
    [all...]
nss_cert_database_unittest.cc 112 // Reset cert trust values to defaults before deleting. Otherwise NSS
113 // somehow seems to remember the trust which can break following tests.
292 cert->os_cert_handle()->trust->sslFlags);
294 cert->os_cert_handle()->trust->emailFlags);
296 cert->os_cert_handle()->trust->objectSigningFlags);
322 cert->os_cert_handle()->trust->sslFlags);
325 cert->os_cert_handle()->trust->emailFlags);
327 cert->os_cert_handle()->trust->objectSigningFlags);
353 cert->os_cert_handle()->trust->sslFlags);
355 cert->os_cert_handle()->trust->emailFlags)
    [all...]
  /external/chromium_org/net/third_party/mozilla_security_manager/
nsNSSCertificateDB.cpp 87 // TODO(mattm): should we set/add trust if it differs from the present
236 LOG(ERROR) << "SetCertTrust called with conflicting trust bits "
245 // Note that we start with CERTDB_VALID_CA for default trust and explicit
246 // trust, but explicitly distrusted usages will be set to
248 CERTCertTrust trust = {CERTDB_VALID_CA, CERTDB_VALID_CA, CERTDB_VALID_CA}; local
251 trust.sslFlags = CERTDB_TERMINAL_RECORD;
253 trust.sslFlags |= CERTDB_TRUSTED_CA | CERTDB_TRUSTED_CLIENT_CA;
256 trust.emailFlags = CERTDB_TERMINAL_RECORD;
258 trust.emailFlags |= CERTDB_TRUSTED_CA | CERTDB_TRUSTED_CLIENT_CA;
261 trust.objectSigningFlags = CERTDB_TERMINAL_RECORD
267 CERTCertTrust trust = {0}; local
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/asn1/
t_x509a.c 73 if(aux->trust) {
77 for(i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) {
81 sk_ASN1_OBJECT_value(aux->trust, i), 0);
x_x509a.c 75 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT),
143 if(!aux->trust
144 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0;
145 return sk_ASN1_OBJECT_push(aux->trust, objtmp);
161 if(x->aux && x->aux->trust) {
162 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free);
163 x->aux->trust = NULL;
  /external/openssl/crypto/asn1/
t_x509a.c 73 if(aux->trust) {
77 for(i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) {
81 sk_ASN1_OBJECT_value(aux->trust, i), 0);
x_x509a.c 75 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT),
143 if(!aux->trust
144 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0;
145 return sk_ASN1_OBJECT_push(aux->trust, objtmp);
161 if(x->aux && x->aux->trust) {
162 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free);
163 x->aux->trust = NULL;
  /frameworks/base/core/java/android/text/
BoringLayout.java 94 boolean trust;
103 trust = true;
111 trust = false;
115 metrics, includepad, trust); local
147 boolean trust;
153 trust = true;
162 trust = false;
166 metrics, includepad, trust); local
  /external/chromium_org/chromeos/network/onc/
onc_certificate_importer_impl_unittest.cc 36 CERTCertTrust trust = {0}; local
37 CERT_GetCertTrust(cert, &trust);
39 unsigned all_flags = trust.sslFlags | trust.emailFlags |
40 trust.objectSigningFlags;
47 if (trust.sslFlags & CERTDB_TERMINAL_RECORD)
95 importer.ParseAndStoreCertificates(true, // allow web trust
onc_certificate_importer_impl.cc 39 // Web trust is only granted to certificates imported by the user.
197 // Trust bits should only increase trust and never restrict. Thus,
199 ONC_LOG_WARNING("Certificate contains unknown trust type " +
208 ONC_LOG_WARNING("Web trust not granted for certificate: " + guid);
231 net::NSSCertDatabase::TrustBits trust = (import_with_ssl_trust ? local
241 trust & ~cert_database->GetCertTrust(x509_cert.get(), net_cert_type);
250 trust);
254 " was already present, but trust couldn't be set." +
264 success = cert_database->ImportServerCert(cert_list, trust, &failures)
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
CertPathValidatorUtilities.java 162 TrustAnchor trust = null; local
175 throw new AnnotatedException("Cannot set subject search criteria for trust anchor.", ex);
179 while (iter.hasNext() && trust == null)
181 trust = (TrustAnchor)iter.next();
182 if (trust.getTrustedCert() != null)
184 if (certSelectX509.match(trust.getTrustedCert()))
186 trustPublicKey = trust.getTrustedCert().getPublicKey();
190 trust = null;
193 else if (trust.getCAName() != null
194 && trust.getCAPublicKey() != null
    [all...]
PKIXCertPathValidatorSpi.java 114 TrustAnchor trust; local
117 trust = CertPathValidatorUtilities.findTrustAnchor((X509Certificate) certs.get(certs.size() - 1),
125 if (trust == null)
127 throw new CertPathValidatorException("Trust anchor for certification path not found.", null, certPath, -1);
213 X509Certificate sign = trust.getTrustedCert();
223 workingIssuerName = new X500Principal(trust.getCAName());
224 workingPublicKey = trust.getCAPublicKey();
229 throw new ExtCertPathValidatorException("Subject of trust anchor could not be (re)encoded.", ex, certPath,
241 "Algorithm identifier of public key of trust anchor could not be read.", e, certPath, -1);
456 return new PKIXCertPathValidatorResult(trust, intersection, cert.getPublicKey())
    [all...]
  /external/chromium_org/chrome/browser/chromeos/policy/
policy_cert_verifier_browsertest.cc 86 net::NSSCertDatabase::TrustBits trust = local
88 EXPECT_EQ(net::NSSCertDatabase::TRUST_DEFAULT, trust);
161 // Make the database trust |ca_cert|.
170 net::NSSCertDatabase::TrustBits trust = local
172 EXPECT_EQ(net::NSSCertDatabase::TRUSTED_SSL, trust);
239 // The profile becomes tainted after using the trust anchors that came from
288 // Verify() again with the additional trust anchors.
305 // The profile becomes tainted after using the trust anchors that came from
311 // Verifying after removing the trust anchors should now fail.
  /external/chromium_org/net/ssl/
client_cert_store_impl_mac.cc 34 // This function calls SecTrust but doesn't actually pay attention to the trust
35 // result: it shouldn't be used to determine trust, just to traverse the chain.
61 ScopedCFTypeRef<SecTrustRef> trust(trust_ref);
63 // Evaluate trust, which creates the cert chain.
68 result = SecTrustEvaluate(trust, &status);
74 result = SecTrustGetResult(trust, &status, out_cert_chain, &status_chain);
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
x509_vfy.h 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);

Completed in 885 milliseconds

1 2 3