Searched defs:trust (Results 1 - 25 of 39) sorted by relevance

12

/external/chromium/net/base/
H A Dtest_root_certs_nss.cc17 // for a certificate whose trust status has been changed by the
22 // and copying |trust|.
23 TrustEntry(CERTCertificate* certificate, CERTCertTrust trust);
27 CERTCertTrust trust() const { return trust_; } function in class:net::TestRootCerts::TrustEntry
33 // The original trust settings, before |certificate_| was manipulated to
41 CERTCertTrust trust)
43 trust_(trust) {
51 // Preserve the original trust bits so that they can be restored when
58 // particular trust settings associated with it, and attempts to use
59 // |original_trust| later to restore the original trust setting
40 TrustEntry(CERTCertificate* certificate, CERTCertTrust trust) argument
[all...]
/external/chromium_org/net/cert/
H A Dtest_root_certs_nss.cc21 // for a certificate whose trust status has been changed by the
26 // and copying |trust|.
27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust);
31 const CERTCertTrust& trust() const { return trust_; } function in class:net::TestRootCerts::TrustEntry
37 // The original trust settings, before |certificate_| was manipulated to
45 const CERTCertTrust& trust)
47 trust_(trust) {
61 // Preserve the original trust bits so that they can be restored when
67 // particular trust settings associated with it, and attempts to use
68 // |original_trust| later to restore the original trust setting
44 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust) argument
[all...]
H A Dnss_cert_database.cc185 CERTCertTrust trust; local
186 SECStatus srv = CERT_GetCertTrust(cert->os_cert_handle(), &trust);
192 // round-trip all possible NSS trust flag combinations. We try to map them in
200 if ((trust.sslFlags & kCAFlags) == CERTDB_TERMINAL_RECORD)
202 else if (trust.sslFlags & kTrustedCA)
205 if ((trust.emailFlags & kCAFlags) == CERTDB_TERMINAL_RECORD)
207 else if (trust.emailFlags & kTrustedCA)
210 if ((trust.objectSigningFlags & kCAFlags) == CERTDB_TERMINAL_RECORD)
212 else if (trust.objectSigningFlags & kTrustedCA)
218 if (trust
[all...]
/external/chromium_org/net/third_party/mozilla_security_manager/
H A DnsNSSCertificateDB.cpp87 // TODO(mattm): should we set/add trust if it differs from the present
236 LOG(ERROR) << "SetCertTrust called with conflicting trust bits "
245 // Note that we start with CERTDB_VALID_CA for default trust and explicit
246 // trust, but explicitly distrusted usages will be set to
248 CERTCertTrust trust = {CERTDB_VALID_CA, CERTDB_VALID_CA, CERTDB_VALID_CA}; local
251 trust.sslFlags = CERTDB_TERMINAL_RECORD;
253 trust.sslFlags |= CERTDB_TRUSTED_CA | CERTDB_TRUSTED_CLIENT_CA;
256 trust.emailFlags = CERTDB_TERMINAL_RECORD;
258 trust.emailFlags |= CERTDB_TRUSTED_CA | CERTDB_TRUSTED_CLIENT_CA;
261 trust
267 CERTCertTrust trust = {0}; local
[all...]
/external/chromium_org/chrome/browser/chromeos/policy/
H A Dpolicy_cert_verifier_browsertest.cc86 net::NSSCertDatabase::TrustBits trust = local
88 EXPECT_EQ(net::NSSCertDatabase::TRUST_DEFAULT, trust);
161 // Make the database trust |ca_cert|.
170 net::NSSCertDatabase::TrustBits trust = local
172 EXPECT_EQ(net::NSSCertDatabase::TRUSTED_SSL, trust);
239 // The profile becomes tainted after using the trust anchors that came from
288 // Verify() again with the additional trust anchors.
305 // The profile becomes tainted after using the trust anchors that came from
311 // Verifying after removing the trust anchors should now fail.
/external/chromium_org/third_party/openssl/openssl/crypto/x509/
H A Dx509_trs.c68 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags);
69 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags);
70 static int trust_compat(X509_TRUST *trust, X509 *x, int flags);
75 /* WARNING: the following table should be kept in order of trust
76 * and without any gaps so we can just subtract the minimum trust
100 return (*a)->trust - (*b)->trust;
103 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int)
107 default_trust = trust;
142 tmp.trust
149 X509_TRUST_set(int *t, int trust) argument
244 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) argument
254 trust_1oid(X509_TRUST *trust, X509 *x, int flags) argument
260 trust_compat(X509_TRUST *trust, X509 *x, int flags) argument
[all...]
H A Dx509_vpm.c76 param->trust = 0;
173 x509_verify_param_copy(trust, 0);
244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) argument
246 return X509_TRUST_set(&param->trust, trust);
327 0, /* trust */
337 X509_TRUST_EMAIL, /* trust */
347 X509_TRUST_EMAIL, /* trust */
357 X509_TRUST_SSL_CLIENT, /* trust */
367 X509_TRUST_SSL_SERVER, /* trust */
[all...]
H A Dx509_lu.c699 int X509_STORE_set_trust(X509_STORE *ctx, int trust) argument
701 return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
H A Dx509_vfy.c266 * so we get any trust settings.
349 /* The chain extensions are OK: check trust */
351 if (param->trust > 0) ok = check_trust(ctx);
619 * chain including trust anchor. Trust anchor not strictly
655 ok = X509_check_trust(x, ctx->param->trust, 0);
1143 * end in the same trust anchor, though some discussions remain...
1914 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) argument
1916 return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust);
1919 /* This function is used to set the X509_STORE_CTX purpose and trust
1921 * own trust an
1929 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) argument
[all...]
H A Dx509_vfy.h173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
/external/openssl/crypto/x509/
H A Dx509_trs.c68 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags);
69 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags);
70 static int trust_compat(X509_TRUST *trust, X509 *x, int flags);
75 /* WARNING: the following table should be kept in order of trust
76 * and without any gaps so we can just subtract the minimum trust
100 return (*a)->trust - (*b)->trust;
103 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int)
107 default_trust = trust;
142 tmp.trust
149 X509_TRUST_set(int *t, int trust) argument
244 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) argument
254 trust_1oid(X509_TRUST *trust, X509 *x, int flags) argument
260 trust_compat(X509_TRUST *trust, X509 *x, int flags) argument
[all...]
H A Dx509_vpm.c76 param->trust = 0;
173 x509_verify_param_copy(trust, 0);
244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) argument
246 return X509_TRUST_set(&param->trust, trust);
327 0, /* trust */
337 X509_TRUST_EMAIL, /* trust */
347 X509_TRUST_EMAIL, /* trust */
357 X509_TRUST_SSL_CLIENT, /* trust */
367 X509_TRUST_SSL_SERVER, /* trust */
[all...]
H A Dx509_lu.c699 int X509_STORE_set_trust(X509_STORE *ctx, int trust) argument
701 return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
H A Dx509_vfy.c266 * so we get any trust settings.
349 /* The chain extensions are OK: check trust */
351 if (param->trust > 0) ok = check_trust(ctx);
619 * chain including trust anchor. Trust anchor not strictly
655 ok = X509_check_trust(x, ctx->param->trust, 0);
1143 * end in the same trust anchor, though some discussions remain...
1914 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) argument
1916 return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust);
1919 /* This function is used to set the X509_STORE_CTX purpose and trust
1921 * own trust an
1929 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) argument
[all...]
H A Dx509_vfy.h173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
/external/chromium_org/chromeos/network/onc/
H A Donc_certificate_importer_impl.cc39 // Web trust is only granted to certificates imported by the user.
197 // Trust bits should only increase trust and never restrict. Thus,
199 ONC_LOG_WARNING("Certificate contains unknown trust type " +
208 ONC_LOG_WARNING("Web trust not granted for certificate: " + guid);
231 net::NSSCertDatabase::TrustBits trust = (import_with_ssl_trust ? local
241 trust & ~cert_database->GetCertTrust(x509_cert.get(), net_cert_type);
250 trust);
254 " was already present, but trust couldn't be set." +
264 success = cert_database->ImportServerCert(cert_list, trust, &failures);
266 success = cert_database->ImportCACerts(cert_list, trust,
[all...]
H A Donc_certificate_importer_impl_unittest.cc36 CERTCertTrust trust = {0}; local
37 CERT_GetCertTrust(cert, &trust);
39 unsigned all_flags = trust.sslFlags | trust.emailFlags |
40 trust.objectSigningFlags;
47 if (trust.sslFlags & CERTDB_TERMINAL_RECORD)
95 importer.ParseAndStoreCertificates(true, // allow web trust
/external/chromium_org/third_party/openssl/openssl/crypto/x509v3/
H A Dv3_purp.c172 int X509_PURPOSE_add(int id, int trust, int flags, argument
180 /* This will always be set for application modified trust entries */
211 ptmp->trust = trust;
267 return xp->trust;
/external/openssl/crypto/x509v3/
H A Dv3_purp.c172 int X509_PURPOSE_add(int id, int trust, int flags, argument
180 /* This will always be set for application modified trust entries */
211 ptmp->trust = trust;
267 return xp->trust;
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dx509v3.c1834 struct x509_certificate *cert, *trust; local
1905 for (trust = trusted; trust; trust = trust->next) {
1906 if (x509_name_compare(&cert->issuer, &trust->subject)
1911 if (trust) {
1914 if (x509_valid_issuer(trust) < 0) {
1919 if (x509_certificate_check_signature(trust, cert) < 0)
/external/wpa_supplicant_8/src/tls/
H A Dx509v3.c1834 struct x509_certificate *cert, *trust; local
1905 for (trust = trusted; trust; trust = trust->next) {
1906 if (x509_name_compare(&cert->issuer, &trust->subject)
1911 if (trust) {
1914 if (x509_valid_issuer(trust) < 0) {
1919 if (x509_certificate_check_signature(trust, cert) < 0)
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dx509v3.c1834 struct x509_certificate *cert, *trust; local
1905 for (trust = trusted; trust; trust = trust->next) {
1906 if (x509_name_compare(&cert->issuer, &trust->subject)
1911 if (trust) {
1914 if (x509_valid_issuer(trust) < 0) {
1919 if (x509_certificate_check_signature(trust, cert) < 0)
/external/chromium/chrome/browser/ui/webui/options/
H A Dcertificate_manager_handler.cc467 int trust = certificate_manager_model_->cert_db().GetCertTrust( local
469 FundamentalValue ssl_value(bool(trust & net::CertDatabase::TRUSTED_SSL));
470 FundamentalValue email_value(bool(trust & net::CertDatabase::TRUSTED_EMAIL));
472 bool(trust & net::CertDatabase::TRUSTED_OBJ_SIGN));
/external/chromium_org/chrome/third_party/mozilla_security_manager/
H A DnsNSSCertHelper.cpp1049 CERTCertTrust trust = {0}; local
1050 CERT_GetCertTrust(cert, &trust);
1052 unsigned all_flags = trust.sslFlags | trust.emailFlags |
1053 trust.objectSigningFlags;
1060 if (trust.sslFlags & CERTDB_TERMINAL_RECORD)
/external/chromium_org/third_party/openssl/openssl/include/openssl/
H A Dx509_vfy.h173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);

Completed in 480 milliseconds

12