HomeSort by relevance Sort by last modified time
    Searched defs:trust (Results 1 - 25 of 37) sorted by null

1 2

  /external/chromium_org/net/third_party/mozilla_security_manager/
nsNSSCertificateDB.cpp 80 // TODO(mattm): should we set/add trust if it differs from the present
224 LOG(ERROR) << "SetCertTrust called with conflicting trust bits "
233 // Note that we start with CERTDB_VALID_CA for default trust and explicit
234 // trust, but explicitly distrusted usages will be set to
236 CERTCertTrust trust = {CERTDB_VALID_CA, CERTDB_VALID_CA, CERTDB_VALID_CA}; local
239 trust.sslFlags = CERTDB_TERMINAL_RECORD;
241 trust.sslFlags |= CERTDB_TRUSTED_CA | CERTDB_TRUSTED_CLIENT_CA;
244 trust.emailFlags = CERTDB_TERMINAL_RECORD;
246 trust.emailFlags |= CERTDB_TRUSTED_CA | CERTDB_TRUSTED_CLIENT_CA;
249 trust.objectSigningFlags = CERTDB_TERMINAL_RECORD
255 CERTCertTrust trust = {0}; local
    [all...]
  /external/chromium_org/net/cert/
test_root_certs_nss.cc 21 // for a certificate whose trust status has been changed by the
26 // and copying |trust|.
27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust);
31 const CERTCertTrust& trust() const { return trust_; } function in class:net::TestRootCerts::TrustEntry
37 // The original trust settings, before |certificate_| was manipulated to
45 const CERTCertTrust& trust)
47 trust_(trust) {
61 // Preserve the original trust bits so that they can be restored when
67 // particular trust settings associated with it, and attempts to use
68 // |original_trust| later to restore the original trust settings will no
    [all...]
nss_cert_database.cc 227 CERTCertTrust trust; local
228 SECStatus srv = CERT_GetCertTrust(cert->os_cert_handle(), &trust);
234 // round-trip all possible NSS trust flag combinations. We try to map them in
242 if ((trust.sslFlags & kCAFlags) == CERTDB_TERMINAL_RECORD)
244 else if (trust.sslFlags & kTrustedCA)
247 if ((trust.emailFlags & kCAFlags) == CERTDB_TERMINAL_RECORD)
249 else if (trust.emailFlags & kTrustedCA)
252 if ((trust.objectSigningFlags & kCAFlags) == CERTDB_TERMINAL_RECORD)
254 else if (trust.objectSigningFlags & kTrustedCA)
260 if (trust.sslFlags & CERTDB_TERMINAL_RECORD)
    [all...]
  /external/chromium_org/chrome/browser/chromeos/policy/
policy_cert_verifier_browsertest.cc 85 // trust anchors (i.e. of |test_ca_cert_|) for the first time or since the
112 net::NSSCertDatabase::TrustBits trust = local
114 EXPECT_EQ(net::NSSCertDatabase::TRUST_DEFAULT, trust);
151 // Make the database trust |test_ca_cert_|.
158 net::NSSCertDatabase::TrustBits trust = local
160 EXPECT_EQ(net::NSSCertDatabase::TRUSTED_SSL, trust);
172 // The additional trust anchors were not used, since the certificate is
193 // Verify() again with the additional trust anchors.
207 // Verify() again with the additional trust anchors will hit the cache.
218 // Verifying after removing the trust anchors should now fail
    [all...]
  /frameworks/base/core/java/android/app/trust/
TrustManager.java 17 package android.app.trust;
28 * See {@link com.android.server.trust.TrustManagerService}
63 * Reports that the list of enabled trust agents changed for user {@param userId}.
76 * Reports that trust is disabled until credentials have been entered for user {@param userId}.
91 * Registers a listener for trust events.
122 * Unregisters a listener for trust events.
161 * Reports that the trust state has changed.
163 * @param userId the user, for which the trust changed.
170 * Reports that whether trust is managed has changed
171 * @param enabled if true, at least one trust agent is managing trust
    [all...]
  /external/chromium_org/chromeos/network/onc/
onc_certificate_importer_impl.cc 43 // Web trust is only granted to certificates imported by the user.
209 // Trust bits should only increase trust and never restrict. Thus,
211 ONC_LOG_WARNING("Certificate contains unknown trust type " +
220 ONC_LOG_WARNING("Web trust not granted for certificate: " + guid);
243 net::NSSCertDatabase::TrustBits trust = (import_with_ssl_trust ? local
253 trust & ~target_nssdb_->GetCertTrust(x509_cert.get(), net_cert_type);
262 trust);
266 " was already present, but trust couldn't be set." +
276 success = target_nssdb_->ImportServerCert(cert_list, trust, &failures)
    [all...]
onc_certificate_importer_impl_unittest.cc 40 CERTCertTrust trust = {0}; local
41 CERT_GetCertTrust(cert, &trust);
43 unsigned all_flags = trust.sslFlags | trust.emailFlags |
44 trust.objectSigningFlags;
51 if (trust.sslFlags & CERTDB_TERMINAL_RECORD)
105 importer.ParseAndStoreCertificates(true, // allow web trust
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
PKIXCertPathValidatorSpi.java 114 TrustAnchor trust; local
117 trust = CertPathValidatorUtilities.findTrustAnchor((X509Certificate) certs.get(certs.size() - 1),
125 if (trust == null)
127 throw new CertPathValidatorException("Trust anchor for certification path not found.", null, certPath, -1);
213 X509Certificate sign = trust.getTrustedCert();
223 workingIssuerName = new X500Principal(trust.getCAName());
224 workingPublicKey = trust.getCAPublicKey();
229 throw new ExtCertPathValidatorException("Subject of trust anchor could not be (re)encoded.", ex, certPath,
241 "Algorithm identifier of public key of trust anchor could not be read.", e, certPath, -1);
456 return new PKIXCertPathValidatorResult(trust, intersection, cert.getPublicKey())
    [all...]
CertPathValidatorUtilities.java 164 TrustAnchor trust = null; local
177 throw new AnnotatedException("Cannot set subject search criteria for trust anchor.", ex);
181 while (iter.hasNext() && trust == null)
183 trust = (TrustAnchor)iter.next();
184 if (trust.getTrustedCert() != null)
186 if (certSelectX509.match(trust.getTrustedCert()))
188 trustPublicKey = trust.getTrustedCert().getPublicKey();
192 trust = null;
195 else if (trust.getCAName() != null
196 && trust.getCAPublicKey() != null
    [all...]
  /frameworks/base/core/java/android/service/trust/
TrustAgentService.java 17 package android.service.trust;
41 * <p>Trust agents may only be provided by the platform. It is expected that there is only
42 * one trust agent installed on the platform. In the event there is more than one,
43 * either trust agent can enable trust.
54 * &lt;action android:name="android.service.trust.TrustAgentService" />
56 * &lt;meta-data android:name="android.service.trust.trustagent"
61 * and should allow configuring the trust agent, as defined in
65 * &lt;trust-agent xmlns:android="http://schemas.android.com/apk/res/android"
81 = "android.service.trust.TrustAgentService"
    [all...]
  /frameworks/base/services/core/java/com/android/server/trust/
TrustArchive.java 17 package com.android.server.trust;
29 * An archive of trust events.
TrustAgentWrapper.java 17 package com.android.server.trust;
40 import android.service.trust.ITrustAgentService;
41 import android.service.trust.ITrustAgentServiceCallback;
42 import android.service.trust.TrustAgentService;
53 private static final String TRUST_EXPIRED_ACTION = "android.server.trust.TRUST_EXPIRED_ACTION";
86 // Trust state
114 Log.w(TAG, "Agent is not connected, cannot grant trust: "
126 // ensure trust agents are evaluating trust state at least as often as
149 if (DEBUG) Slog.v(TAG, "Trust timed out : " + mName.flattenToShortString())
    [all...]
TrustManagerService.java 17 package com.android.server.trust;
29 import android.app.trust.ITrustListener;
30 import android.app.trust.ITrustManager;
53 import android.service.trust.TrustAgentService;
68 * Manages trust agents and trust listeners.
70 * It is responsible for binding to the enabled {@link android.service.trust.TrustAgentService}s
75 * It also keeps a set of {@link android.app.trust.ITrustListener}s that are notified whenever the
76 * trust state changes for any user.
78 * Trust state and the setting of enabled agents is kept per user and each user has its ow
    [all...]
  /external/conscrypt/src/platform/java/org/conscrypt/
TrustManagerImpl.java 215 * The return value is a list of the certificates used for making the trust decision.
234 * the certificates used for making the trust decision.
259 // get the cleaned up chain and trust anchor
263 // add the first trust anchor to the chain, which may be an intermediate
267 for (TrustAnchor trust : trustAnchor) {
268 wholeChain.add(trust.getTrustedCert());
283 // at this point we have a cached trust anchor, but don't know if its one we got from
296 // build the cert path from the array of certs sans trust anchors
319 "Trust anchor for certification path not found.", null, certPath, -1));
322 // There's no point in checking trust anchors here, and it will throw off the MD5 check
    [all...]
  /frameworks/base/core/java/android/text/
BoringLayout.java 94 boolean trust;
103 trust = true;
111 trust = false;
115 metrics, includepad, trust); local
147 boolean trust;
153 trust = true;
162 trust = false;
166 metrics, includepad, trust); local
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/
KeyStore_Impl1Test.java 373 KeyStoreTestSupport.MCertificate trust = new KeyStoreTestSupport.MCertificate( local
376 trust);
433 .getCertificate(aliases[j]), trust);
    [all...]
  /external/chromium_org/chrome/third_party/mozilla_security_manager/
nsNSSCertHelper.cpp 1067 CERTCertTrust trust = {0}; local
    [all...]
  /external/wpa_supplicant_8/src/tls/
x509v3.c 1845 struct x509_certificate *cert, *trust; local
    [all...]
  /external/wpa_supplicant_8/hs20/server/
spp_server.c 1196 xml_node_t *pps, *c, *trust, *aaa, *aaa1, *upd, *homesp; local
1222 trust = xml_node_create(ctx->xml, upd, NULL, "TrustRoot");
1223 add_text_node_conf(ctx, realm, trust, "CertURL", "trust_root_cert_url");
1224 add_text_node_conf(ctx, realm, trust, "CertSHA256Fingerprint",
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/x509/
x509_vfy.h 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
x509.h 272 STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ member in struct:x509_cert_aux_st
314 /* This is used for a table of trust checking functions */
317 int trust; member in struct:x509_trust_st
332 /* standard trust ids */
855 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int);
856 int X509_TRUST_set(int *t, int trust);
    [all...]
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
x509_vfy.h 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
  /external/openssl/crypto/x509/
x509_vfy.h 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
  /external/openssl/include/openssl/
x509_vfy.h 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
  /prebuilts/sdk/tools/lib/
shrinkedAndroid.jar 

Completed in 1047 milliseconds

1 2