HomeSort by relevance Sort by last modified time
    Searched full:trusted (Results 226 - 250 of 873) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium_org/chrome/browser/chromeos/settings/
cros_settings.h 52 // Requests all providers to fetch their values from a trusted store, if they
54 // are trusted during the current loop cycle; otherwise returns false, and
55 // |callback| will be invoked later when trusted values become available.
  /external/chromium_org/components/nacl/browser/
nacl_browser.h 79 // PPAPI. This allows the NaCl process to get trusted information about the
82 // trusted the handle was read only but it was not, an mmapped file could be
84 // Similarly, if we trusted the file path corresponded to the file handle but
  /external/chromium_org/ppapi/cpp/private/
tcp_socket_private.cc 167 bool trusted) {
171 PP_FromBool(trusted)));
176 PP_FromBool(trusted)));
  /external/chromium_org/ppapi/native_client/src/trusted/plugin/
scriptable_plugin.cc 7 #include "ppapi/native_client/src/trusted/plugin/scriptable_plugin.h"
20 #include "ppapi/native_client/src/trusted/plugin/plugin.h"
21 #include "ppapi/native_client/src/trusted/plugin/utility.h"
file_downloader.h 12 #include "native_client/src/trusted/validator/nacl_file_info.h"
15 #include "ppapi/c/trusted/ppb_url_loader_trusted.h"
20 #include "ppapi/native_client/src/trusted/plugin/callback_source.h"
  /external/chromium_org/device/bluetooth/
bluetooth_chromeos_unittest.cc 908 // Connect the device so it becomes trusted and remembered.
923 // Make sure the trusted property has been set to true.
927 ASSERT_TRUE(properties->trusted.value());
972 // Two changes for connecting, one for connected and one for for trusted
    [all...]
  /external/chromium_org/chrome/browser/chromeos/policy/
network_configuration_updater_unittest.cc 253 false /* do not allow trusted certs from policy */ );
272 false /* do not allow trusted certs from policy */);
308 true /* allow trusted certs from policy */);
331 true /* allow trusted certs from policy */);
405 false /* do not allow trusted certs from policy */);
policy_cert_verifier_browsertest.cc 109 // No certificate is trusted right after it's loaded.
155 // Verify that it is now trusted.
171 // trusted from the database.
user_network_configuration_updater.h 62 // Sets |certs| to the list of Web trusted server and CA certificates from the
  /external/apache-http/src/org/apache/http/conn/ssl/
SSLSocketFactory.java 63 * server against a list of trusted certificates and to authenticate to
69 * a {@link KeyStore truststore} file containg one or several trusted
72 * authenticate itself with a non-trusted certificate.
76 * Use JDK keytool utility to import a trusted certificate and generate a truststore file:
111 * Send the certificate request to the trusted Certificate Authority for signature.
118 * Import the trusted CA root certificate
119 * <pre>keytool -import -alias "my trusted ca" -file caroot.crt -keystore my.keystore</pre>
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/
ExtendedPKIXParameters.java 44 * <code>Set</code> of most-trusted CAs. Each element of the set is a
470 * Returns the trusted attribute certificate issuers. If attribute
471 * certificates is verified the trusted AC issuers must be set.
477 * @return Returns an immutable set of the trusted AC issuers.
485 * Sets the trusted attribute certificate issuers. If attribute certificates
486 * is verified the trusted AC issuers must be set.
493 * @param trustedACIssuers The trusted AC issuers to set. Is never
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/
SSLSocketFactory.java 69 * server against a list of trusted certificates and to authenticate to
75 * a {@link KeyStore truststore} file containg one or several trusted
78 * authenticate itself with a non-trusted certificate.
82 * Use JDK keytool utility to import a trusted certificate and generate a truststore file:
117 * Send the certificate request to the trusted Certificate Authority for signature.
124 * Import the trusted CA root certificate
125 * <pre>keytool -import -alias "my trusted ca" -file caroot.crt -keystore my.keystore</pre>
  /docs/source.android.com/src/devices/
drm.jd 45 The content protection provided by the Widevine DRM plugin depends on the security and content protection capabilities of the underlying hardware platform. The hardware capabilities of the device include hardware secure boot to establish a chain of trust of security and protection of cryptographic keys. Content protection capabilities of the device include protection of decrypted frames in the device and content output protection via a trusted output protection mechanism. Not all hardware platforms support all the above security and content protection features. Security is never implemented in a single place in the stack, but instead relies on the integration of hardware, software, and services. The combination of hardware security functions, a trusted boot mechanism, and an isolated secure OS for handling security functions is critical to provide a secure device.</p>
87 <p>Security is never implemented in a single place in the stack, but instead relies on the integration of hardware, software, and services. The combination of hardware security functions, a trusted boot mechanism, and an isolated secure OS for handling security functions is critical to provide a secure device.</p>
132 <p><superscript>*</superscript>Device implementations may use a trusted bootloader, where in the bootloader is authenticated via an OEM key stored on a system partition.</p>
147 <li>Device manufacturers must provide an implementation of the Widevine Level 1 OEMCrypto API that performs all key processing and decryption in a trusted environment.</li>
160 <li>Device manufacturers must provide an implementation of the Widevine Level 2 OEMCrypto API that performs all key processing and decryption in a trusted environment.</li>
  /external/chromium_org/chrome/browser/extensions/api/cast_channel/
cast_auth_util_nss.cc 83 // 2. |certificate| is signed by a trusted CA.
103 // Check that the certificate is signed by trusted CA.
113 VLOG(1)<< "Cert not signed by trusted CA";
  /external/chromium_org/native_client_sdk/src/doc/sdk/
release-notes.rst 382 Pepper plugin** (sometimes called a "trusted" or "in-process" plugin) using
397 * Chrome uses different threading models for trusted plugins and Native
400 may succeed during trusted development, but fail in Native Client.
467 plugin** (sometimes called a "trusted" or "in-process" plugin) using the
485 * Chrome uses different threading models for trusted plugins and Native
488 may succeed during trusted development, but fail in Native Client.
503 **Note:** It's also possible to build a module as a trusted plugin on Mac and
506 for Mac and Linux systems. To build and debug a trusted plugin on Mac and
510 <http://www.chromium.org/nativeclient/how-tos/debugging-documentation/debugging-a-trusted-plugin/trusted-debugging-on-mac>`
    [all...]
  /frameworks/base/docs/html/training/articles/
security-ssl.jd 59 server is not to be trusted.</p>
164 because you have a CA that isn't trusted by the system. It could be because
165 you have a certificate from a new CA that isn't yet trusted by Android or your app is
178 will be the only CAs trusted by that {@link javax.net.ssl.TrustManager}.</p>
204 // Create a KeyStore containing our trusted CAs
230 that your server certificate come from a trusted issuer.</p>
240 validates that the certificate comes from a trusted
276 trusted root CA.</p>
297 trusted by Android.</p>
314 cause. This is because most desktop browsers cache trusted intermediate CAs over time. Onc
    [all...]
  /bionic/libc/kernel/common/linux/
xattr.h 31 #define XATTR_TRUSTED_PREFIX "trusted."
  /external/chromium_org/base/android/
jni_string.cc 58 // a trusted source. We can't guarantee that all UTF8 will be sanitized before
  /external/chromium_org/chrome/browser/chromeos/extensions/
echo_private_api.h 115 // provider is not yet trusted.
  /external/chromium_org/chrome/browser/component_updater/
component_unpacker.h 31 // - Does not use a sandboxed unpacker. A valid component is fully trusted.
  /external/chromium_org/chrome/browser/safe_browsing/
signature_util_win.cc 50 // chains up to a trusted root CA, and that it has appropriate permission to
  /external/chromium_org/content/renderer/pepper/
audio_helper.cc 59 // Trusted side of proxy can specify a callback to recieve handles. In
ppb_graphics_3d_impl.h 24 // PPB_Graphics3D_API trusted implementation.
  /external/chromium_org/gpu/
gpu_untrusted.gyp 8 # nacl_win64_target is for building the trusted Win64 NaCl broker.
  /external/chromium_org/ppapi/
PRESUBMIT.py 67 if name_parts[2] in ['dev', 'private', 'trusted']:
101 # Only examine public stable and trusted interfaces.
134 if name_parts[2] in ('documentation', 'trusted'):
228 if 'trusted' in name_parts:

Completed in 1978 milliseconds

1 2 3 4 5 6 7 8 91011>>