/external/chromium_org/net/third_party/mozilla_security_manager/ |
nsNSSCertificateDB.cpp | 80 // TODO(mattm): should we set/add trust if it differs from the present 224 LOG(ERROR) << "SetCertTrust called with conflicting trust bits " 233 // Note that we start with CERTDB_VALID_CA for default trust and explicit 234 // trust, but explicitly distrusted usages will be set to 236 CERTCertTrust trust = {CERTDB_VALID_CA, CERTDB_VALID_CA, CERTDB_VALID_CA}; local 239 trust.sslFlags = CERTDB_TERMINAL_RECORD; 241 trust.sslFlags |= CERTDB_TRUSTED_CA | CERTDB_TRUSTED_CLIENT_CA; 244 trust.emailFlags = CERTDB_TERMINAL_RECORD; 246 trust.emailFlags |= CERTDB_TRUSTED_CA | CERTDB_TRUSTED_CLIENT_CA; 249 trust.objectSigningFlags = CERTDB_TERMINAL_RECORD 255 CERTCertTrust trust = {0}; local [all...] |
/external/chromium_org/net/cert/ |
test_root_certs_nss.cc | 21 // for a certificate whose trust status has been changed by the 26 // and copying |trust|. 27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust); 31 const CERTCertTrust& trust() const { return trust_; } function in class:net::TestRootCerts::TrustEntry 37 // The original trust settings, before |certificate_| was manipulated to 45 const CERTCertTrust& trust) 47 trust_(trust) { 61 // Preserve the original trust bits so that they can be restored when 67 // particular trust settings associated with it, and attempts to use 68 // |original_trust| later to restore the original trust settings will no [all...] |
nss_cert_database.cc | 255 CERTCertTrust trust; local 256 SECStatus srv = CERT_GetCertTrust(cert->os_cert_handle(), &trust); 262 // round-trip all possible NSS trust flag combinations. We try to map them in 270 if ((trust.sslFlags & kCAFlags) == CERTDB_TERMINAL_RECORD) 272 else if (trust.sslFlags & kTrustedCA) 275 if ((trust.emailFlags & kCAFlags) == CERTDB_TERMINAL_RECORD) 277 else if (trust.emailFlags & kTrustedCA) 280 if ((trust.objectSigningFlags & kCAFlags) == CERTDB_TERMINAL_RECORD) 282 else if (trust.objectSigningFlags & kTrustedCA) 288 if (trust.sslFlags & CERTDB_TERMINAL_RECORD) [all...] |
/external/chromium_org/chrome/browser/chromeos/policy/ |
policy_cert_verifier_browsertest.cc | 87 // trust anchors (i.e. of |test_ca_cert_|) for the first time or since the 114 net::NSSCertDatabase::TrustBits trust = local 116 EXPECT_EQ(net::NSSCertDatabase::TRUST_DEFAULT, trust); 153 // Make the database trust |test_ca_cert_|. 160 net::NSSCertDatabase::TrustBits trust = local 162 EXPECT_EQ(net::NSSCertDatabase::TRUSTED_SSL, trust); 174 // The additional trust anchors were not used, since the certificate is 195 // Verify() again with the additional trust anchors. 209 // Verify() again with the additional trust anchors will hit the cache. 220 // Verifying after removing the trust anchors should now fail [all...] |
/frameworks/base/core/java/android/app/trust/ |
TrustManager.java | 17 package android.app.trust; 28 * See {@link com.android.server.trust.TrustManagerService} 63 * Reports that the list of enabled trust agents changed for user {@param userId}. 76 * Reports that trust is disabled until credentials have been entered for user {@param userId}. 104 * Registers a listener for trust events. 135 * Unregisters a listener for trust events. 174 * Reports that the trust state has changed. 176 * @param userId the user, for which the trust changed. 183 * Reports that whether trust is managed has changed 184 * @param enabled if true, at least one trust agent is managing trust [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PKIXCertPathValidatorSpi.java | 116 TrustAnchor trust; local 119 trust = CertPathValidatorUtilities.findTrustAnchor((X509Certificate) certs.get(certs.size() - 1), 127 if (trust == null) 129 throw new CertPathValidatorException("Trust anchor for certification path not found.", null, certPath, -1); 215 X509Certificate sign = trust.getTrustedCert(); 225 workingIssuerName = new X500Principal(trust.getCAName()); 226 workingPublicKey = trust.getCAPublicKey(); 231 throw new ExtCertPathValidatorException("Subject of trust anchor could not be (re)encoded.", ex, certPath, 243 "Algorithm identifier of public key of trust anchor could not be read.", e, certPath, -1); 458 return new PKIXCertPathValidatorResult(trust, intersection, cert.getPublicKey()) [all...] |
CertPathValidatorUtilities.java | 164 TrustAnchor trust = null; local 177 throw new AnnotatedException("Cannot set subject search criteria for trust anchor.", ex); 181 while (iter.hasNext() && trust == null) 183 trust = (TrustAnchor)iter.next(); 184 if (trust.getTrustedCert() != null) 186 if (certSelectX509.match(trust.getTrustedCert())) 188 trustPublicKey = trust.getTrustedCert().getPublicKey(); 192 trust = null; 195 else if (trust.getCAName() != null 196 && trust.getCAPublicKey() != null [all...] |
/external/chromium_org/chromeos/network/onc/ |
onc_certificate_importer_impl.cc | 95 // Web trust is only granted to certificates imported by the user. 255 // Trust bits should only increase trust and never restrict. Thus, 257 LOG(WARNING) << "Certificate contains unknown trust type " 266 LOG(WARNING) << "Web trust not granted for certificate: " << guid; 288 net::NSSCertDatabase::TrustBits trust = (import_with_ssl_trust ? local 298 trust & ~nssdb->GetCertTrust(x509_cert.get(), net_cert_type); 305 success = nssdb->SetCertTrust(x509_cert.get(), net_cert_type, trust); 309 << " was already present, but trust couldn't be set." 319 success = nssdb->ImportServerCert(cert_list, trust, &failures) [all...] |
onc_certificate_importer_impl_unittest.cc | 41 CERTCertTrust trust = {0}; local 42 CERT_GetCertTrust(cert, &trust); 44 unsigned all_flags = trust.sslFlags | trust.emailFlags | 45 trust.objectSigningFlags; 52 if (trust.sslFlags & CERTDB_TERMINAL_RECORD) 114 ::onc::ONC_SOURCE_USER_IMPORT, // allow web trust
|
/frameworks/base/core/java/android/service/trust/ |
TrustAgentService.java | 17 package android.service.trust; 44 * <p>Trust agents may only be provided by the platform. It is expected that there is only 45 * one trust agent installed on the platform. In the event there is more than one, 46 * either trust agent can enable trust. 57 * <action android:name="android.service.trust.TrustAgentService" /> 59 * <meta-data android:name="android.service.trust.trustagent" 64 * and should allow configuring the trust agent, as defined in 68 * <trust-agent xmlns:android="http://schemas.android.com/apk/res/android" 84 = "android.service.trust.TrustAgentService" [all...] |
/frameworks/base/services/core/java/com/android/server/trust/ |
TrustArchive.java | 17 package com.android.server.trust; 29 * An archive of trust events.
|
TrustAgentWrapper.java | 17 package com.android.server.trust; 40 import android.service.trust.ITrustAgentService; 41 import android.service.trust.ITrustAgentServiceCallback; 51 private static final String TRUST_EXPIRED_ACTION = "android.server.trust.TRUST_EXPIRED_ACTION"; 84 // Trust state 112 Log.w(TAG, "Agent is not connected, cannot grant trust: " 124 // ensure trust agents are evaluating trust state at least as often as 147 if (DEBUG) Slog.v(TAG, "Trust timed out : " + mName.flattenToShortString()); 298 * @see android.service.trust.TrustAgentService#onUnlockAttempt(boolean [all...] |
TrustManagerService.java | 17 package com.android.server.trust; 30 import android.app.trust.ITrustListener; 31 import android.app.trust.ITrustManager; 56 import android.service.trust.TrustAgentService; 73 * Manages trust agents and trust listeners. 75 * It is responsible for binding to the enabled {@link android.service.trust.TrustAgentService}s 80 * It also keeps a set of {@link android.app.trust.ITrustListener}s that are notified whenever the 81 * trust state changes for any user. 83 * Trust state and the setting of enabled agents is kept per user and each user has its ow [all...] |
/external/conscrypt/src/platform/java/org/conscrypt/ |
TrustManagerImpl.java | 215 * The return value is a list of the certificates used for making the trust decision. 234 * the certificates used for making the trust decision. 259 // get the cleaned up chain and trust anchor 263 // add the first trust anchor to the chain, which may be an intermediate 267 for (TrustAnchor trust : trustAnchor) { 268 wholeChain.add(trust.getTrustedCert()); 283 // at this point we have a cached trust anchor, but don't know if its one we got from 296 // build the cert path from the array of certs sans trust anchors 319 "Trust anchor for certification path not found.", null, certPath, -1)); 322 // There's no point in checking trust anchors here, and it will throw off the MD5 check [all...] |
/frameworks/base/core/java/android/text/ |
BoringLayout.java | 94 boolean trust; 103 trust = true; 111 trust = false; 115 metrics, includepad, trust); local 147 boolean trust; 153 trust = true; 162 trust = false; 166 metrics, includepad, trust); local
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl1Test.java | 373 KeyStoreTestSupport.MCertificate trust = new KeyStoreTestSupport.MCertificate( local 376 trust); 433 .getCertificate(aliases[j]), trust); [all...] |
/external/chromium_org/chrome/third_party/mozilla_security_manager/ |
nsNSSCertHelper.cpp | 1067 CERTCertTrust trust = {0}; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
x509v3.c | 1845 struct x509_certificate *cert, *trust; local [all...] |
/external/wpa_supplicant_8/hs20/server/ |
spp_server.c | 1196 xml_node_t *pps, *c, *trust, *aaa, *aaa1, *upd, *homesp; local 1222 trust = xml_node_create(ctx->xml, upd, NULL, "TrustRoot"); 1223 add_text_node_conf(ctx, realm, trust, "CertURL", "trust_root_cert_url"); 1224 add_text_node_conf(ctx, realm, trust, "CertSHA256Fingerprint", [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
x509_vfy.h | 170 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 440 OPENSSL_EXPORT int X509_STORE_set_trust(X509_STORE *ctx, int trust); 518 OPENSSL_EXPORT int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 520 int purpose, int trust); 548 OPENSSL_EXPORT int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
/external/openssl/crypto/x509/ |
x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
x509.h | 272 STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ member in struct:x509_cert_aux_st 314 /* This is used for a table of trust checking functions */ 317 int trust; member in struct:x509_trust_st 332 /* standard trust ids */ 855 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int); 856 int X509_TRUST_set(int *t, int trust); [all...] |
/external/openssl/include/openssl/ |
x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
x509.h | 272 STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ member in struct:x509_cert_aux_st 314 /* This is used for a table of trust checking functions */ 317 int trust; member in struct:x509_trust_st 332 /* standard trust ids */ 855 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int); 856 int X509_TRUST_set(int *t, int trust); [all...] |
/prebuilts/sdk/tools/lib/ |
shrinkedAndroid.jar | |