/external/openssl/crypto/x509/ |
H A D | x509_trs.c | 68 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 69 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 70 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 75 /* WARNING: the following table should be kept in order of trust 76 * and without any gaps so we can just subtract the minimum trust 100 return (*a)->trust - (*b)->trust; 103 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int) 107 default_trust = trust; 142 tmp.trust 149 X509_TRUST_set(int *t, int trust) argument 244 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) argument 254 trust_1oid(X509_TRUST *trust, X509 *x, int flags) argument 260 trust_compat(X509_TRUST *trust, X509 *x, int flags) argument [all...] |
H A D | x509_vpm.c | 76 param->trust = 0; 173 x509_verify_param_copy(trust, 0); 244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) argument 246 return X509_TRUST_set(¶m->trust, trust); 327 0, /* trust */ 337 X509_TRUST_EMAIL, /* trust */ 347 X509_TRUST_EMAIL, /* trust */ 357 X509_TRUST_SSL_CLIENT, /* trust */ 367 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
H A D | x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
H A D | x509_vfy.c | 266 * so we get any trust settings. 349 /* The chain extensions are OK: check trust */ 351 if (param->trust > 0) ok = check_trust(ctx); 619 * chain including trust anchor. Trust anchor not strictly 655 ok = X509_check_trust(x, ctx->param->trust, 0); 1143 * end in the same trust anchor, though some discussions remain... 1914 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) argument 1916 return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust); 1919 /* This function is used to set the X509_STORE_CTX purpose and trust 1921 * own trust an 1929 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) argument [all...] |
H A D | x509_lu.c | 699 int X509_STORE_set_trust(X509_STORE *ctx, int trust) argument 701 return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
|
H A D | x509.h | 272 STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ member in struct:x509_cert_aux_st 314 /* This is used for a table of trust checking functions */ 317 int trust; member in struct:x509_trust_st 332 /* standard trust ids */ 855 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int); 856 int X509_TRUST_set(int *t, int trust);
|
/external/chromium/net/base/ |
H A D | test_root_certs_nss.cc | 17 // for a certificate whose trust status has been changed by the 22 // and copying |trust|. 23 TrustEntry(CERTCertificate* certificate, CERTCertTrust trust); 27 CERTCertTrust trust() const { return trust_; } function in class:net::TestRootCerts::TrustEntry 33 // The original trust settings, before |certificate_| was manipulated to 41 CERTCertTrust trust) 43 trust_(trust) { 51 // Preserve the original trust bits so that they can be restored when 58 // particular trust settings associated with it, and attempts to use 59 // |original_trust| later to restore the original trust setting 40 TrustEntry(CERTCertificate* certificate, CERTCertTrust trust) argument [all...] |
H A D | cert_database_nss_unittest.cc | 210 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust); 211 EXPECT_TRUE(trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE)); 212 EXPECT_FALSE(trust.HasTrustedCA(PR_FALSE, PR_TRUE, PR_FALSE)); 213 EXPECT_FALSE(trust.HasTrustedCA(PR_FALSE, PR_FALSE, PR_TRUE)); 214 EXPECT_FALSE(trust.HasTrustedCA(PR_TRUE, PR_TRUE, PR_TRUE)); 215 EXPECT_TRUE(trust.HasCA(PR_TRUE, PR_TRUE, PR_TRUE)); 242 psm::nsNSSCertTrust trust(cert->os_cert_handle()->trust); 243 EXPECT_FALSE(trust [all...] |
H A D | cert_database_nss.cc | 224 psm::nsNSSCertTrust trust(&nsstrust); 227 return trust.HasTrustedCA(PR_TRUE, PR_FALSE, PR_FALSE) * TRUSTED_SSL + 228 trust.HasTrustedCA(PR_FALSE, PR_TRUE, PR_FALSE) * TRUSTED_EMAIL + 229 trust.HasTrustedCA(PR_FALSE, PR_FALSE, PR_TRUE) * TRUSTED_OBJ_SIGN; 231 return trust.HasTrustedPeer(PR_TRUE, PR_FALSE, PR_FALSE) * TRUSTED_SSL + 232 trust.HasTrustedPeer(PR_FALSE, PR_TRUE, PR_FALSE) * TRUSTED_EMAIL + 233 trust.HasTrustedPeer(PR_FALSE, PR_FALSE, PR_TRUE) * TRUSTED_OBJ_SIGN;
|
/external/openssl/crypto/asn1/ |
H A D | t_x509a.c | 73 if(aux->trust) { 77 for(i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) { 81 sk_ASN1_OBJECT_value(aux->trust, i), 0);
|
H A D | x_x509a.c | 75 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT), 143 if(!aux->trust 144 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0; 145 return sk_ASN1_OBJECT_push(aux->trust, objtmp); 161 if(x->aux && x->aux->trust) { 162 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free); 163 x->aux->trust = NULL;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | CertPathValidatorUtilities.java | 161 TrustAnchor trust = null; 174 throw new AnnotatedException("Cannot set subject search criteria for trust anchor.", ex); 178 while (iter.hasNext() && trust == null) 180 trust = (TrustAnchor)iter.next(); 181 if (trust.getTrustedCert() != null) 183 if (certSelectX509.match(trust.getTrustedCert())) 185 trustPublicKey = trust.getTrustedCert().getPublicKey(); 189 trust = null; 192 else if (trust.getCAName() != null 193 && trust [all...] |
H A D | PKIXCertPathValidatorSpi.java | 114 TrustAnchor trust; 117 trust = CertPathValidatorUtilities.findTrustAnchor((X509Certificate) certs.get(certs.size() - 1), 125 if (trust == null) 213 X509Certificate sign = trust.getTrustedCert(); 223 workingIssuerName = new X500Principal(trust.getCAName()); 224 workingPublicKey = trust.getCAPublicKey(); 229 throw new ExtCertPathValidatorException("Subject of trust anchor could not be (re)encoded.", ex, certPath, 241 "Algorithm identifier of public key of trust anchor could not be read.", e, certPath, -1); 456 return new PKIXCertPathValidatorResult(trust, intersection, cert.getPublicKey());
|
/external/openssl/include/openssl/ |
H A D | x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
H A D | x509.h | 272 STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ member in struct:x509_cert_aux_st 314 /* This is used for a table of trust checking functions */ 317 int trust; member in struct:x509_trust_st 332 /* standard trust ids */ 855 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int); 856 int X509_TRUST_set(int *t, int trust);
|
/external/openssl/apps/ |
H A D | x509.c | 127 " -addtrust arg - trust certificate for a given purpose\n", 182 STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL; 356 "Invalid trust object value %s\n", *argv); 359 if (!trust) trust = sk_ASN1_OBJECT_new_null(); 360 sk_ASN1_OBJECT_push(trust, objtmp); 707 if (trust) 709 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) 711 objtmp = sk_ASN1_OBJECT_value(trust, i); 1100 sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_fre [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | x509v3.c | 1578 struct x509_certificate *cert, *trust; local 1648 for (trust = trusted; trust; trust = trust->next) { 1649 if (x509_name_compare(&cert->issuer, &trust->subject) 1654 if (trust) { 1657 if (x509_valid_issuer(trust) < 0) { 1662 if (x509_certificate_check_signature(trust, cert) < 0)
|
/external/openssl/crypto/x509v3/ |
H A D | v3_purp.c | 172 int X509_PURPOSE_add(int id, int trust, int flags, argument 180 /* This will always be set for application modified trust entries */ 211 ptmp->trust = trust; 267 return xp->trust;
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | x509v3.c | 1835 struct x509_certificate *cert, *trust; local 1906 for (trust = trusted; trust; trust = trust->next) { 1907 if (x509_name_compare(&cert->issuer, &trust->subject) 1912 if (trust) { 1915 if (x509_valid_issuer(trust) < 0) { 1920 if (x509_certificate_check_signature(trust, cert) < 0)
|
/external/wpa_supplicant_8/src/tls/ |
H A D | x509v3.c | 1835 struct x509_certificate *cert, *trust; local 1906 for (trust = trusted; trust; trust = trust->next) { 1907 if (x509_name_compare(&cert->issuer, &trust->subject) 1912 if (trust) { 1915 if (x509_valid_issuer(trust) < 0) { 1920 if (x509_certificate_check_signature(trust, cert) < 0)
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | x509v3.c | 1835 struct x509_certificate *cert, *trust; local 1906 for (trust = trusted; trust; trust = trust->next) { 1907 if (x509_name_compare(&cert->issuer, &trust->subject) 1912 if (trust) { 1915 if (x509_valid_issuer(trust) < 0) { 1920 if (x509_certificate_check_signature(trust, cert) < 0)
|
/external/chromium/chrome/browser/ui/webui/options/ |
H A D | certificate_manager_handler.cc | 467 int trust = certificate_manager_model_->cert_db().GetCertTrust( local 469 FundamentalValue ssl_value(bool(trust & net::CertDatabase::TRUSTED_SSL)); 470 FundamentalValue email_value(bool(trust & net::CertDatabase::TRUSTED_EMAIL)); 472 bool(trust & net::CertDatabase::TRUSTED_OBJ_SIGN));
|
/external/llvm/utils/ |
H A D | codegen-diff | 117 disassemble to the same thing. This puts a lot of trust in the
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStore_Impl1Test.java | 375 KeyStoreTestSupport.MCertificate trust = new KeyStoreTestSupport.MCertificate( 378 trust); 435 .getCertificate(aliases[j]), trust);
|
/external/openssl/ssl/ |
H A D | ssl_lib.c | 341 s->trust = ctx->trust; 486 int SSL_CTX_set_trust(SSL_CTX *s, int trust) argument 488 return X509_VERIFY_PARAM_set_trust(s->param, trust); 491 int SSL_set_trust(SSL *s, int trust) argument 493 return X509_VERIFY_PARAM_set_trust(s->param, trust);
|