/external/chromium_org/v8/tools/testrunner/server/ |
presence_handler.py | 63 trusted = self.server.daemon.IsTrusted(pubkey_fingerprint) 66 self.server.daemon.pubkey_fingerprint, trusted] 71 p.trusted = trusted 79 p.trusted = self.server.daemon.IsTrusted(pubkey_fingerprint)
|
main.py | 140 if p.trusted: continue 142 p.trusted = True 146 if not p2.trusted: continue 157 if peer.trusted: 197 return os.path.join(self.root, "trusted", "%s.pem" % pubkey_fingerprint) 203 path = os.path.join(self.root, "trusted")
|
/external/chromium_org/ppapi/cpp/private/ |
tcp_socket_private.h | 40 bool trusted);
|
tcp_socket_private.cc | 167 bool trusted) { 171 PP_FromBool(trusted))); 176 PP_FromBool(trusted)));
|
/external/chromium_org/ppapi/thunk/ |
ppb_tcp_socket_private_api.h | 35 PP_Bool trusted) = 0;
|
ppb_tcp_socket_private_thunk.cc | 89 PP_Bool trusted) { 93 return enter.object()->AddChainBuildingCertificate(certificate, trusted);
|
/external/chromium_org/chrome/browser/chromeos/settings/ |
stub_cros_settings_provider_unittest.cc | 94 CrosSettingsProvider::TrustedStatus trusted = local 96 EXPECT_EQ(CrosSettingsProvider::TRUSTED, trusted);
|
/external/chromium_org/ppapi/proxy/ |
tcp_socket_private_resource.cc | 74 PP_Bool trusted) { 75 return AddChainBuildingCertificateImpl(certificate, trusted);
|
tcp_socket_private_resource.h | 50 PP_Bool trusted) OVERRIDE;
|
tcp_socket_resource_base.h | 85 PP_Bool trusted);
|
/external/chromium_org/v8/tools/testrunner/objects/ |
peer.py | 40 self.trusted = False # I trust this peer's public key. 45 self.trusting_me, self.trusted))
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
verify.c | 86 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; 138 else if (strcmp(*argv,"-trusted") == 0) 211 trusted = load_certs(bio_err, trustfile, FORMAT_PEM, 212 NULL, e, "trusted certificates"); 213 if(!trusted) 228 if (1 != check(cert_ctx, NULL, untrusted, trusted, crls, e)) 234 if (1 != check(cert_ctx,argv[i], untrusted, trusted, crls, e)) 260 sk_X509_pop_free(trusted, X509_free);
|
/external/openssl/apps/ |
verify.c | 86 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; 138 else if (strcmp(*argv,"-trusted") == 0) 211 trusted = load_certs(bio_err, trustfile, FORMAT_PEM, 212 NULL, e, "trusted certificates"); 213 if(!trusted) 228 if (1 != check(cert_ctx, NULL, untrusted, trusted, crls, e)) 234 if (1 != check(cert_ctx,argv[i], untrusted, trusted, crls, e)) 260 sk_X509_pop_free(trusted, X509_free);
|
/external/smack/src/org/jivesoftware/smack/ |
ServerTrustManager.java | 40 * knows and trusted CA root certificates can also be configure in {@link ConnectionConfiguration}. 141 boolean trusted = false; 143 trusted = trustStore.getCertificateAlias(x509Certificates[nSize - 1]) != null; 144 if (!trusted && nSize == 1 && configuration.isSelfSignedCertificateEnabled()) 148 trusted = true; 154 if (!trusted) { 155 throw new CertificateException("root certificate not trusted of " + peerIdentities);
|
/external/chromium_org/chrome/browser/safe_browsing/ |
binary_feature_extractor_win_unittest.cc | 64 EXPECT_FALSE(signature_info.trusted()); 84 EXPECT_TRUE(signature_info.trusted());
|
/external/chromium_org/chrome/browser/sessions/ |
session_restore_browsertest_chromeos.cc | 78 bool trusted) { 80 name, trusted, gfx::Rect(), profile(), chrome::GetActiveDesktop()); 123 // Create a trusted app popup. 125 // Create a second trusted app with two popup windows. 146 EXPECT_EQ(2u, app2_count); // Only the trusted app windows are restored.
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.h | 115 int x509_certificate_chain_validate(struct x509_certificate *trusted,
|
/frameworks/base/core/java/android/os/ |
RecoverySystem.java | 98 HashSet<X509Certificate> trusted = new HashSet<X509Certificate>(); local 110 trusted.add((X509Certificate) cf.generateCertificate(is)); 118 return trusted; 229 // in the package equals one of our trusted public keys. 231 HashSet<X509Certificate> trusted = getTrustedCerts( local 236 for (X509Certificate c : trusted) { 243 throw new SignatureException("signature doesn't match any trusted key"); 246 // The signature cert matches a trusted key. Now verify that
|
/external/conscrypt/src/platform/java/org/conscrypt/ |
TrustManagerImpl.java | 178 List<X509Certificate> trusted = new ArrayList<X509Certificate>(); local 183 trusted.add(cert); 186 return trusted.toArray(new X509Certificate[trusted.size()]); 213 * Validates whether a server is trusted. If hostname is given and non-null it also checks if 231 * Validates whether a server is trusted. If session is given and non-null 278 // trusted a non-self-signed cert. 313 // chain was entirely trusted, skip the validator 550 * already trusted and failing that check the KeyStore if it is 559 // not trusted and no TrustedCertificateStore to chec [all...] |
/frameworks/av/include/media/nbaio/ |
NBLog.h | 142 void log(const Entry *entry, bool trusted = false);
|
/external/chromium_org/third_party/WebKit/Source/core/page/ |
WindowFeatures.cpp | 180 const bool trusted = false; local 186 // - dialogHide: trusted && boolFeature(features, "dialoghide"), makes dialog hide when you print 188 // - unadorned: trusted && boolFeature(features, "unadorned"); 211 statusBarVisible = boolFeature(features, "status", !trusted);
|
/libcore/luni/src/main/java/java/nio/charset/ |
CharsetEncoder.java | 132 CharsetEncoder(Charset cs, float averageBytesPerChar, float maxBytesPerChar, byte[] replacement, boolean trusted) { 142 if (trusted) {
|
/external/chromium_org/chromeos/dbus/ |
bluetooth_device_client.h | 57 // Whether the device is trusted, and connections should be always 59 dbus::Property<bool> trusted; member in struct:chromeos::BluetoothDeviceClient::Properties
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
rexec.py | 539 trusted = [] 544 trusted.append(a) 546 if trusted: 547 r.ok_builtin_modules = r.ok_builtin_modules + tuple(trusted)
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
rexec.py | 539 trusted = [] 544 trusted.append(a) 546 if trusted: 547 r.ok_builtin_modules = r.ok_builtin_modules + tuple(trusted)
|