OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:trusted
(Results
226 - 250
of
873
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/chromium_org/chrome/browser/chromeos/settings/
cros_settings.h
52
// Requests all providers to fetch their values from a
trusted
store, if they
54
// are
trusted
during the current loop cycle; otherwise returns false, and
55
// |callback| will be invoked later when
trusted
values become available.
/external/chromium_org/components/nacl/browser/
nacl_browser.h
79
// PPAPI. This allows the NaCl process to get
trusted
information about the
82
//
trusted
the handle was read only but it was not, an mmapped file could be
84
// Similarly, if we
trusted
the file path corresponded to the file handle but
/external/chromium_org/ppapi/cpp/private/
tcp_socket_private.cc
167
bool
trusted
) {
171
PP_FromBool(
trusted
)));
176
PP_FromBool(
trusted
)));
/external/chromium_org/ppapi/native_client/src/trusted/plugin/
scriptable_plugin.cc
7
#include "ppapi/native_client/src/
trusted
/plugin/scriptable_plugin.h"
20
#include "ppapi/native_client/src/
trusted
/plugin/plugin.h"
21
#include "ppapi/native_client/src/
trusted
/plugin/utility.h"
file_downloader.h
12
#include "native_client/src/
trusted
/validator/nacl_file_info.h"
15
#include "ppapi/c/
trusted
/ppb_url_loader_trusted.h"
20
#include "ppapi/native_client/src/
trusted
/plugin/callback_source.h"
/external/chromium_org/device/bluetooth/
bluetooth_chromeos_unittest.cc
908
// Connect the device so it becomes
trusted
and remembered.
923
// Make sure the
trusted
property has been set to true.
927
ASSERT_TRUE(properties->
trusted
.value());
972
// Two changes for connecting, one for connected and one for for
trusted
[
all
...]
/external/chromium_org/chrome/browser/chromeos/policy/
network_configuration_updater_unittest.cc
253
false /* do not allow
trusted
certs from policy */ );
272
false /* do not allow
trusted
certs from policy */);
308
true /* allow
trusted
certs from policy */);
331
true /* allow
trusted
certs from policy */);
405
false /* do not allow
trusted
certs from policy */);
policy_cert_verifier_browsertest.cc
109
// No certificate is
trusted
right after it's loaded.
155
// Verify that it is now
trusted
.
171
//
trusted
from the database.
user_network_configuration_updater.h
62
// Sets |certs| to the list of Web
trusted
server and CA certificates from the
/external/apache-http/src/org/apache/http/conn/ssl/
SSLSocketFactory.java
63
* server against a list of
trusted
certificates and to authenticate to
69
* a {@link KeyStore truststore} file containg one or several
trusted
72
* authenticate itself with a non-
trusted
certificate.
76
* Use JDK keytool utility to import a
trusted
certificate and generate a truststore file:
111
* Send the certificate request to the
trusted
Certificate Authority for signature.
118
* Import the
trusted
CA root certificate
119
* <pre>keytool -import -alias "my
trusted
ca" -file caroot.crt -keystore my.keystore</pre>
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
ExtendedPKIXParameters.java
44
* <code>Set</code> of most-
trusted
CAs. Each element of the set is a
470
* Returns the
trusted
attribute certificate issuers. If attribute
471
* certificates is verified the
trusted
AC issuers must be set.
477
* @return Returns an immutable set of the
trusted
AC issuers.
485
* Sets the
trusted
attribute certificate issuers. If attribute certificates
486
* is verified the
trusted
AC issuers must be set.
493
* @param trustedACIssuers The
trusted
AC issuers to set. Is never
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/
SSLSocketFactory.java
69
* server against a list of
trusted
certificates and to authenticate to
75
* a {@link KeyStore truststore} file containg one or several
trusted
78
* authenticate itself with a non-
trusted
certificate.
82
* Use JDK keytool utility to import a
trusted
certificate and generate a truststore file:
117
* Send the certificate request to the
trusted
Certificate Authority for signature.
124
* Import the
trusted
CA root certificate
125
* <pre>keytool -import -alias "my
trusted
ca" -file caroot.crt -keystore my.keystore</pre>
/docs/source.android.com/src/devices/
drm.jd
45
The content protection provided by the Widevine DRM plugin depends on the security and content protection capabilities of the underlying hardware platform. The hardware capabilities of the device include hardware secure boot to establish a chain of trust of security and protection of cryptographic keys. Content protection capabilities of the device include protection of decrypted frames in the device and content output protection via a
trusted
output protection mechanism. Not all hardware platforms support all the above security and content protection features. Security is never implemented in a single place in the stack, but instead relies on the integration of hardware, software, and services. The combination of hardware security functions, a
trusted
boot mechanism, and an isolated secure OS for handling security functions is critical to provide a secure device.</p>
87
<p>Security is never implemented in a single place in the stack, but instead relies on the integration of hardware, software, and services. The combination of hardware security functions, a
trusted
boot mechanism, and an isolated secure OS for handling security functions is critical to provide a secure device.</p>
132
<p><superscript>*</superscript>Device implementations may use a
trusted
bootloader, where in the bootloader is authenticated via an OEM key stored on a system partition.</p>
147
<li>Device manufacturers must provide an implementation of the Widevine Level 1 OEMCrypto API that performs all key processing and decryption in a
trusted
environment.</li>
160
<li>Device manufacturers must provide an implementation of the Widevine Level 2 OEMCrypto API that performs all key processing and decryption in a
trusted
environment.</li>
/external/chromium_org/chrome/browser/extensions/api/cast_channel/
cast_auth_util_nss.cc
83
// 2. |certificate| is signed by a
trusted
CA.
103
// Check that the certificate is signed by
trusted
CA.
113
VLOG(1)<< "Cert not signed by
trusted
CA";
/external/chromium_org/native_client_sdk/src/doc/sdk/
release-notes.rst
382
Pepper plugin** (sometimes called a "
trusted
" or "in-process" plugin) using
397
* Chrome uses different threading models for
trusted
plugins and Native
400
may succeed during
trusted
development, but fail in Native Client.
467
plugin** (sometimes called a "
trusted
" or "in-process" plugin) using the
485
* Chrome uses different threading models for
trusted
plugins and Native
488
may succeed during
trusted
development, but fail in Native Client.
503
**Note:** It's also possible to build a module as a
trusted
plugin on Mac and
506
for Mac and Linux systems. To build and debug a
trusted
plugin on Mac and
510
<http://www.chromium.org/nativeclient/how-tos/debugging-documentation/debugging-a-
trusted
-plugin/
trusted
-debugging-on-mac>`
[
all
...]
/frameworks/base/docs/html/training/articles/
security-ssl.jd
59
server is not to be
trusted
.</p>
164
because you have a CA that isn't
trusted
by the system. It could be because
165
you have a certificate from a new CA that isn't yet
trusted
by Android or your app is
178
will be the only CAs
trusted
by that {@link javax.net.ssl.TrustManager}.</p>
204
// Create a KeyStore containing our
trusted
CAs
230
that your server certificate come from a
trusted
issuer.</p>
240
validates that the certificate comes from a
trusted
276
trusted
root CA.</p>
297
trusted
by Android.</p>
314
cause. This is because most desktop browsers cache
trusted
intermediate CAs over time. Onc
[
all
...]
/bionic/libc/kernel/common/linux/
xattr.h
31
#define XATTR_TRUSTED_PREFIX "
trusted
."
/external/chromium_org/base/android/
jni_string.cc
58
// a
trusted
source. We can't guarantee that all UTF8 will be sanitized before
/external/chromium_org/chrome/browser/chromeos/extensions/
echo_private_api.h
115
// provider is not yet
trusted
.
/external/chromium_org/chrome/browser/component_updater/
component_unpacker.h
31
// - Does not use a sandboxed unpacker. A valid component is fully
trusted
.
/external/chromium_org/chrome/browser/safe_browsing/
signature_util_win.cc
50
// chains up to a
trusted
root CA, and that it has appropriate permission to
/external/chromium_org/content/renderer/pepper/
audio_helper.cc
59
//
Trusted
side of proxy can specify a callback to recieve handles. In
ppb_graphics_3d_impl.h
24
// PPB_Graphics3D_API
trusted
implementation.
/external/chromium_org/gpu/
gpu_untrusted.gyp
8
# nacl_win64_target is for building the
trusted
Win64 NaCl broker.
/external/chromium_org/ppapi/
PRESUBMIT.py
67
if name_parts[2] in ['dev', 'private', '
trusted
']:
101
# Only examine public stable and
trusted
interfaces.
134
if name_parts[2] in ('documentation', '
trusted
'):
228
if '
trusted
' in name_parts:
Completed in 1978 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>