/external/chromium_org/v8/tools/testrunner/server/ |
presence_handler.py | 63 trusted = self.server.daemon.IsTrusted(pubkey_fingerprint) 66 self.server.daemon.pubkey_fingerprint, trusted] 71 p.trusted = trusted 79 p.trusted = self.server.daemon.IsTrusted(pubkey_fingerprint)
|
main.py | 140 if p.trusted: continue 142 p.trusted = True 146 if not p2.trusted: continue 157 if peer.trusted: 197 return os.path.join(self.root, "trusted", "%s.pem" % pubkey_fingerprint) 203 path = os.path.join(self.root, "trusted")
|
/external/chromium_org/ppapi/cpp/private/ |
tcp_socket_private.h | 40 bool trusted);
|
tcp_socket_private.cc | 167 bool trusted) { 171 PP_FromBool(trusted))); 176 PP_FromBool(trusted)));
|
/external/chromium_org/ppapi/thunk/ |
ppb_tcp_socket_private_api.h | 35 PP_Bool trusted) = 0;
|
ppb_tcp_socket_private_thunk.cc | 89 PP_Bool trusted) { 93 return enter.object()->AddChainBuildingCertificate(certificate, trusted);
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
stub_cros_settings_provider_unittest.cc | 93 CrosSettingsProvider::TrustedStatus trusted = local 95 EXPECT_EQ(CrosSettingsProvider::TRUSTED, trusted);
|
/external/chromium_org/ppapi/proxy/ |
tcp_socket_private_resource.cc | 74 PP_Bool trusted) { 75 return AddChainBuildingCertificateImpl(certificate, trusted);
|
tcp_socket_private_resource.h | 50 PP_Bool trusted) OVERRIDE;
|
tcp_socket_resource_base.h | 85 PP_Bool trusted);
|
/external/chromium_org/v8/tools/testrunner/objects/ |
peer.py | 40 self.trusted = False # I trust this peer's public key. 45 self.trusting_me, self.trusted))
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
verify.c | 86 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; 138 else if (strcmp(*argv,"-trusted") == 0) 211 trusted = load_certs(bio_err, trustfile, FORMAT_PEM, 212 NULL, e, "trusted certificates"); 213 if(!trusted) 228 if (1 != check(cert_ctx, NULL, untrusted, trusted, crls, e)) 234 if (1 != check(cert_ctx,argv[i], untrusted, trusted, crls, e)) 260 sk_X509_pop_free(trusted, X509_free);
|
/external/openssl/apps/ |
verify.c | 86 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; 138 else if (strcmp(*argv,"-trusted") == 0) 211 trusted = load_certs(bio_err, trustfile, FORMAT_PEM, 212 NULL, e, "trusted certificates"); 213 if(!trusted) 228 if (1 != check(cert_ctx, NULL, untrusted, trusted, crls, e)) 234 if (1 != check(cert_ctx,argv[i], untrusted, trusted, crls, e)) 260 sk_X509_pop_free(trusted, X509_free);
|
/external/smack/src/org/jivesoftware/smack/ |
ServerTrustManager.java | 40 * knows and trusted CA root certificates can also be configure in {@link ConnectionConfiguration}. 141 boolean trusted = false; 143 trusted = trustStore.getCertificateAlias(x509Certificates[nSize - 1]) != null; 144 if (!trusted && nSize == 1 && configuration.isSelfSignedCertificateEnabled()) 148 trusted = true; 154 if (!trusted) { 155 throw new CertificateException("root certificate not trusted of " + peerIdentities);
|
/external/chromium_org/chrome/browser/safe_browsing/ |
signature_util_win_unittest.cc | 63 EXPECT_FALSE(signature_info.trusted()); 83 EXPECT_TRUE(signature_info.trusted());
|
/frameworks/base/core/java/android/os/ |
RecoverySystem.java | 98 HashSet<Certificate> trusted = new HashSet<Certificate>(); local 110 trusted.add(cf.generateCertificate(is)); 118 return trusted; 227 // in the package equals one of our trusted public keys. 229 HashSet<Certificate> trusted = getTrustedCerts( local 234 for (Certificate c : trusted) { 241 throw new SignatureException("signature doesn't match any trusted key"); 244 // The signature cert matches a trusted key. Now verify that
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.h | 115 int x509_certificate_chain_validate(struct x509_certificate *trusted,
|
/external/chromium_org/chromeos/dbus/ |
bluetooth_device_client.h | 57 // Whether the device is trusted, and connections should be always 59 dbus::Property<bool> trusted; member in struct:chromeos::BluetoothDeviceClient::Properties
|
/frameworks/av/include/media/nbaio/ |
NBLog.h | 140 void log(const Entry *entry, bool trusted = false);
|
/libcore/crypto/src/main/java/org/conscrypt/ |
TrustManagerImpl.java | 163 List<X509Certificate> trusted = new ArrayList<X509Certificate>(); local 168 trusted.add(cert); 171 return trusted.toArray(new X509Certificate[trusted.size()]); 196 * Validates whether a server is trusted. If hostname is given and non-null it also checks if 242 // trusted a non-self-signed cert. 277 // chain was entirely trusted, skip the validator 510 * already trusted and failing that check the KeyStore if it is 519 // not trusted and no TrustedCertificateStore to check
|
/external/chromium/net/base/ |
cert_database_nss.cc | 241 unsigned int trusted) { 242 bool success = psm::SetCertTrust(cert, type, trusted);
|
/external/chromium_org/chrome/installer/linux/sysroot_scripts/ |
sysroot-creator-debian.wheezy.sh | 465 if [ ! -e "/etc/apt/trusted.gpg.d/debian-archive-wheezy-automatic.gpg" ] || 466 [ ! -e "/etc/apt/trusted.gpg.d/debian-archive-wheezy-stable.gpg" ]; then 488 gpgv --keyring /etc/apt/trusted.gpg.d/debian-archive-wheezy-automatic.gpg \ 489 --keyring /etc/apt/trusted.gpg.d/debian-archive-wheezy-stable.gpg \
|
/external/chromium_org/third_party/WebKit/Source/core/page/ |
WindowFeatures.cpp | 175 const bool trusted = false; local 181 // - dialogHide: trusted && boolFeature(features, "dialoghide"), makes dialog hide when you print 183 // - unadorned: trusted && boolFeature(features, "unadorned"); 206 statusBarVisible = boolFeature(features, "status", !trusted);
|
/libcore/luni/src/main/java/java/nio/charset/ |
CharsetEncoder.java | 132 CharsetEncoder(Charset cs, float averageBytesPerChar, float maxBytesPerChar, byte[] replacement, boolean trusted) { 142 if (trusted) {
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
rexec.py | 539 trusted = [] 544 trusted.append(a) 546 if trusted: 547 r.ok_builtin_modules = r.ok_builtin_modules + tuple(trusted)
|