/external/chromium/net/base/ |
H A D | test_root_certs_nss.cc | 17 // for a certificate whose trust status has been changed by the 22 // and copying |trust|. 23 TrustEntry(CERTCertificate* certificate, CERTCertTrust trust); 27 CERTCertTrust trust() const { return trust_; } function in class:net::TestRootCerts::TrustEntry 33 // The original trust settings, before |certificate_| was manipulated to 41 CERTCertTrust trust) 43 trust_(trust) { 51 // Preserve the original trust bits so that they can be restored when 58 // particular trust settings associated with it, and attempts to use 59 // |original_trust| later to restore the original trust setting 40 TrustEntry(CERTCertificate* certificate, CERTCertTrust trust) argument [all...] |
/external/chromium_org/net/cert/ |
H A D | test_root_certs_nss.cc | 21 // for a certificate whose trust status has been changed by the 26 // and copying |trust|. 27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust); 31 const CERTCertTrust& trust() const { return trust_; } function in class:net::TestRootCerts::TrustEntry 37 // The original trust settings, before |certificate_| was manipulated to 45 const CERTCertTrust& trust) 47 trust_(trust) { 61 // Preserve the original trust bits so that they can be restored when 67 // particular trust settings associated with it, and attempts to use 68 // |original_trust| later to restore the original trust setting 44 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust) argument [all...] |
H A D | nss_cert_database.cc | 185 CERTCertTrust trust; local 186 SECStatus srv = CERT_GetCertTrust(cert->os_cert_handle(), &trust); 192 // round-trip all possible NSS trust flag combinations. We try to map them in 200 if ((trust.sslFlags & kCAFlags) == CERTDB_TERMINAL_RECORD) 202 else if (trust.sslFlags & kTrustedCA) 205 if ((trust.emailFlags & kCAFlags) == CERTDB_TERMINAL_RECORD) 207 else if (trust.emailFlags & kTrustedCA) 210 if ((trust.objectSigningFlags & kCAFlags) == CERTDB_TERMINAL_RECORD) 212 else if (trust.objectSigningFlags & kTrustedCA) 218 if (trust [all...] |
/external/chromium_org/net/third_party/mozilla_security_manager/ |
H A D | nsNSSCertificateDB.cpp | 87 // TODO(mattm): should we set/add trust if it differs from the present 236 LOG(ERROR) << "SetCertTrust called with conflicting trust bits " 245 // Note that we start with CERTDB_VALID_CA for default trust and explicit 246 // trust, but explicitly distrusted usages will be set to 248 CERTCertTrust trust = {CERTDB_VALID_CA, CERTDB_VALID_CA, CERTDB_VALID_CA}; local 251 trust.sslFlags = CERTDB_TERMINAL_RECORD; 253 trust.sslFlags |= CERTDB_TRUSTED_CA | CERTDB_TRUSTED_CLIENT_CA; 256 trust.emailFlags = CERTDB_TERMINAL_RECORD; 258 trust.emailFlags |= CERTDB_TRUSTED_CA | CERTDB_TRUSTED_CLIENT_CA; 261 trust 267 CERTCertTrust trust = {0}; local [all...] |
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | policy_cert_verifier_browsertest.cc | 86 net::NSSCertDatabase::TrustBits trust = local 88 EXPECT_EQ(net::NSSCertDatabase::TRUST_DEFAULT, trust); 161 // Make the database trust |ca_cert|. 170 net::NSSCertDatabase::TrustBits trust = local 172 EXPECT_EQ(net::NSSCertDatabase::TRUSTED_SSL, trust); 239 // The profile becomes tainted after using the trust anchors that came from 288 // Verify() again with the additional trust anchors. 305 // The profile becomes tainted after using the trust anchors that came from 311 // Verifying after removing the trust anchors should now fail.
|
/external/chromium_org/third_party/openssl/openssl/crypto/x509/ |
H A D | x509_trs.c | 68 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 69 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 70 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 75 /* WARNING: the following table should be kept in order of trust 76 * and without any gaps so we can just subtract the minimum trust 100 return (*a)->trust - (*b)->trust; 103 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int) 107 default_trust = trust; 142 tmp.trust 149 X509_TRUST_set(int *t, int trust) argument 244 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) argument 254 trust_1oid(X509_TRUST *trust, X509 *x, int flags) argument 260 trust_compat(X509_TRUST *trust, X509 *x, int flags) argument [all...] |
H A D | x509_vpm.c | 76 param->trust = 0; 173 x509_verify_param_copy(trust, 0); 244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) argument 246 return X509_TRUST_set(¶m->trust, trust); 327 0, /* trust */ 337 X509_TRUST_EMAIL, /* trust */ 347 X509_TRUST_EMAIL, /* trust */ 357 X509_TRUST_SSL_CLIENT, /* trust */ 367 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
H A D | x509_lu.c | 699 int X509_STORE_set_trust(X509_STORE *ctx, int trust) argument 701 return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
|
H A D | x509_vfy.c | 266 * so we get any trust settings. 349 /* The chain extensions are OK: check trust */ 351 if (param->trust > 0) ok = check_trust(ctx); 619 * chain including trust anchor. Trust anchor not strictly 655 ok = X509_check_trust(x, ctx->param->trust, 0); 1143 * end in the same trust anchor, though some discussions remain... 1914 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) argument 1916 return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust); 1919 /* This function is used to set the X509_STORE_CTX purpose and trust 1921 * own trust an 1929 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) argument [all...] |
H A D | x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
/external/openssl/crypto/x509/ |
H A D | x509_trs.c | 68 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 69 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 70 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 75 /* WARNING: the following table should be kept in order of trust 76 * and without any gaps so we can just subtract the minimum trust 100 return (*a)->trust - (*b)->trust; 103 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int) 107 default_trust = trust; 142 tmp.trust 149 X509_TRUST_set(int *t, int trust) argument 244 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) argument 254 trust_1oid(X509_TRUST *trust, X509 *x, int flags) argument 260 trust_compat(X509_TRUST *trust, X509 *x, int flags) argument [all...] |
H A D | x509_vpm.c | 76 param->trust = 0; 173 x509_verify_param_copy(trust, 0); 244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) argument 246 return X509_TRUST_set(¶m->trust, trust); 327 0, /* trust */ 337 X509_TRUST_EMAIL, /* trust */ 347 X509_TRUST_EMAIL, /* trust */ 357 X509_TRUST_SSL_CLIENT, /* trust */ 367 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
H A D | x509_lu.c | 699 int X509_STORE_set_trust(X509_STORE *ctx, int trust) argument 701 return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
|
H A D | x509_vfy.c | 266 * so we get any trust settings. 349 /* The chain extensions are OK: check trust */ 351 if (param->trust > 0) ok = check_trust(ctx); 619 * chain including trust anchor. Trust anchor not strictly 655 ok = X509_check_trust(x, ctx->param->trust, 0); 1143 * end in the same trust anchor, though some discussions remain... 1914 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) argument 1916 return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust); 1919 /* This function is used to set the X509_STORE_CTX purpose and trust 1921 * own trust an 1929 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) argument [all...] |
H A D | x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_certificate_importer_impl.cc | 39 // Web trust is only granted to certificates imported by the user. 197 // Trust bits should only increase trust and never restrict. Thus, 199 ONC_LOG_WARNING("Certificate contains unknown trust type " + 208 ONC_LOG_WARNING("Web trust not granted for certificate: " + guid); 231 net::NSSCertDatabase::TrustBits trust = (import_with_ssl_trust ? local 241 trust & ~cert_database->GetCertTrust(x509_cert.get(), net_cert_type); 250 trust); 254 " was already present, but trust couldn't be set." + 264 success = cert_database->ImportServerCert(cert_list, trust, &failures); 266 success = cert_database->ImportCACerts(cert_list, trust, [all...] |
H A D | onc_certificate_importer_impl_unittest.cc | 36 CERTCertTrust trust = {0}; local 37 CERT_GetCertTrust(cert, &trust); 39 unsigned all_flags = trust.sslFlags | trust.emailFlags | 40 trust.objectSigningFlags; 47 if (trust.sslFlags & CERTDB_TERMINAL_RECORD) 95 importer.ParseAndStoreCertificates(true, // allow web trust
|
/external/chromium_org/third_party/openssl/openssl/crypto/x509v3/ |
H A D | v3_purp.c | 172 int X509_PURPOSE_add(int id, int trust, int flags, argument 180 /* This will always be set for application modified trust entries */ 211 ptmp->trust = trust; 267 return xp->trust;
|
/external/openssl/crypto/x509v3/ |
H A D | v3_purp.c | 172 int X509_PURPOSE_add(int id, int trust, int flags, argument 180 /* This will always be set for application modified trust entries */ 211 ptmp->trust = trust; 267 return xp->trust;
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | x509v3.c | 1834 struct x509_certificate *cert, *trust; local 1905 for (trust = trusted; trust; trust = trust->next) { 1906 if (x509_name_compare(&cert->issuer, &trust->subject) 1911 if (trust) { 1914 if (x509_valid_issuer(trust) < 0) { 1919 if (x509_certificate_check_signature(trust, cert) < 0)
|
/external/wpa_supplicant_8/src/tls/ |
H A D | x509v3.c | 1834 struct x509_certificate *cert, *trust; local 1905 for (trust = trusted; trust; trust = trust->next) { 1906 if (x509_name_compare(&cert->issuer, &trust->subject) 1911 if (trust) { 1914 if (x509_valid_issuer(trust) < 0) { 1919 if (x509_certificate_check_signature(trust, cert) < 0)
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | x509v3.c | 1834 struct x509_certificate *cert, *trust; local 1905 for (trust = trusted; trust; trust = trust->next) { 1906 if (x509_name_compare(&cert->issuer, &trust->subject) 1911 if (trust) { 1914 if (x509_valid_issuer(trust) < 0) { 1919 if (x509_certificate_check_signature(trust, cert) < 0)
|
/external/chromium/chrome/browser/ui/webui/options/ |
H A D | certificate_manager_handler.cc | 467 int trust = certificate_manager_model_->cert_db().GetCertTrust( local 469 FundamentalValue ssl_value(bool(trust & net::CertDatabase::TRUSTED_SSL)); 470 FundamentalValue email_value(bool(trust & net::CertDatabase::TRUSTED_EMAIL)); 472 bool(trust & net::CertDatabase::TRUSTED_OBJ_SIGN));
|
/external/chromium_org/chrome/third_party/mozilla_security_manager/ |
H A D | nsNSSCertHelper.cpp | 1049 CERTCertTrust trust = {0}; local 1050 CERT_GetCertTrust(cert, &trust); 1052 unsigned all_flags = trust.sslFlags | trust.emailFlags | 1053 trust.objectSigningFlags; 1060 if (trust.sslFlags & CERTDB_TERMINAL_RECORD)
|
/external/chromium_org/third_party/openssl/openssl/include/openssl/ |
H A D | x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|