/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | x509_trs.c | 66 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 67 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 68 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 73 /* WARNING: the following table should be kept in order of trust 74 * and without any gaps so we can just subtract the minimum trust 96 return (*a)->trust - (*b)->trust; 99 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int) 103 default_trust = trust; 148 tmp.trust 156 X509_TRUST_set(int *t, int trust) argument 251 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) argument 261 trust_1oid(X509_TRUST *trust, X509 *x, int flags) argument 267 trust_compat(X509_TRUST *trust, X509 *x, int flags) argument [all...] |
H A D | t_x509a.c | 72 if(aux->trust) { 76 for(i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) { 80 sk_ASN1_OBJECT_value(aux->trust, i), 0);
|
H A D | x_x509a.c | 72 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT), 140 if(!aux->trust 141 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0; 142 return sk_ASN1_OBJECT_push(aux->trust, objtmp); 158 if(x->aux && x->aux->trust) { 159 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free); 160 x->aux->trust = NULL;
|
H A D | x509_vpm.c | 73 param->trust = 0; 209 x509_verify_param_copy(trust, 0); 328 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) argument 330 return X509_TRUST_set(¶m->trust, trust); 458 0, /* trust */ 469 X509_TRUST_EMAIL, /* trust */ 480 X509_TRUST_EMAIL, /* trust */ 491 X509_TRUST_SSL_CLIENT, /* trust */ 502 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
H A D | x509_vfy.c | 316 * so we get any trust settings. 675 * chain including trust anchor. Trust anchor not strictly 742 ok = X509_check_trust(x, ctx->param->trust, 0); 1270 * end in the same trust anchor, though some discussions remain... 2168 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) argument 2170 return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust); 2173 /* This function is used to set the X509_STORE_CTX purpose and trust 2175 * own trust and purpose values which (if set) will be inherited by 2177 * purpose in mind which should then be used to set the trust value. 2179 * purpose and trust setting 2183 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) argument [all...] |
/external/openssl/crypto/x509/ |
H A D | x509_trs.c | 68 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 69 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 70 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 75 /* WARNING: the following table should be kept in order of trust 76 * and without any gaps so we can just subtract the minimum trust 100 return (*a)->trust - (*b)->trust; 103 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int) 107 default_trust = trust; 142 tmp.trust 149 X509_TRUST_set(int *t, int trust) argument 244 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) argument 254 trust_1oid(X509_TRUST *trust, X509 *x, int flags) argument 260 trust_compat(X509_TRUST *trust, X509 *x, int flags) argument [all...] |
H A D | x509_vpm.c | 76 param->trust = 0; 173 x509_verify_param_copy(trust, 0); 244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) argument 246 return X509_TRUST_set(¶m->trust, trust); 327 0, /* trust */ 337 X509_TRUST_EMAIL, /* trust */ 347 X509_TRUST_EMAIL, /* trust */ 357 X509_TRUST_SSL_CLIENT, /* trust */ 367 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
H A D | x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
H A D | x509_vfy.c | 266 * so we get any trust settings. 349 /* The chain extensions are OK: check trust */ 351 if (param->trust > 0) ok = check_trust(ctx); 619 * chain including trust anchor. Trust anchor not strictly 655 ok = X509_check_trust(x, ctx->param->trust, 0); 1154 * end in the same trust anchor, though some discussions remain... 1924 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) argument 1926 return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust); 1929 /* This function is used to set the X509_STORE_CTX purpose and trust 1931 * own trust an 1939 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) argument [all...] |
/external/chromium_org/net/cert/ |
H A D | test_root_certs_nss.cc | 21 // for a certificate whose trust status has been changed by the 26 // and copying |trust|. 27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust); 31 const CERTCertTrust& trust() const { return trust_; } function in class:net::TestRootCerts::TrustEntry 37 // The original trust settings, before |certificate_| was manipulated to 45 const CERTCertTrust& trust) 47 trust_(trust) { 61 // Preserve the original trust bits so that they can be restored when 67 // particular trust settings associated with it, and attempts to use 68 // |original_trust| later to restore the original trust setting 44 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust) argument [all...] |
H A D | nss_cert_database.cc | 255 CERTCertTrust trust; local 256 SECStatus srv = CERT_GetCertTrust(cert->os_cert_handle(), &trust); 262 // round-trip all possible NSS trust flag combinations. We try to map them in 270 if ((trust.sslFlags & kCAFlags) == CERTDB_TERMINAL_RECORD) 272 else if (trust.sslFlags & kTrustedCA) 275 if ((trust.emailFlags & kCAFlags) == CERTDB_TERMINAL_RECORD) 277 else if (trust.emailFlags & kTrustedCA) 280 if ((trust.objectSigningFlags & kCAFlags) == CERTDB_TERMINAL_RECORD) 282 else if (trust.objectSigningFlags & kTrustedCA) 288 if (trust [all...] |
H A D | nss_cert_database_unittest.cc | 302 cert->os_cert_handle()->trust->sslFlags); 304 cert->os_cert_handle()->trust->emailFlags); 306 cert->os_cert_handle()->trust->objectSigningFlags); 332 cert->os_cert_handle()->trust->sslFlags); 335 cert->os_cert_handle()->trust->emailFlags); 337 cert->os_cert_handle()->trust->objectSigningFlags); 363 cert->os_cert_handle()->trust->sslFlags); 365 cert->os_cert_handle()->trust->emailFlags); 368 cert->os_cert_handle()->trust->objectSigningFlags); 400 // Have to specify email trust fo [all...] |
/external/chromium_org/net/third_party/mozilla_security_manager/ |
H A D | nsNSSCertificateDB.cpp | 80 // TODO(mattm): should we set/add trust if it differs from the present 224 LOG(ERROR) << "SetCertTrust called with conflicting trust bits " 233 // Note that we start with CERTDB_VALID_CA for default trust and explicit 234 // trust, but explicitly distrusted usages will be set to 236 CERTCertTrust trust = {CERTDB_VALID_CA, CERTDB_VALID_CA, CERTDB_VALID_CA}; local 239 trust.sslFlags = CERTDB_TERMINAL_RECORD; 241 trust.sslFlags |= CERTDB_TRUSTED_CA | CERTDB_TRUSTED_CLIENT_CA; 244 trust.emailFlags = CERTDB_TERMINAL_RECORD; 246 trust.emailFlags |= CERTDB_TRUSTED_CA | CERTDB_TRUSTED_CLIENT_CA; 249 trust 255 CERTCertTrust trust = {0}; local [all...] |
/external/openssl/crypto/asn1/ |
H A D | t_x509a.c | 73 if(aux->trust) { 77 for(i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) { 81 sk_ASN1_OBJECT_value(aux->trust, i), 0);
|
H A D | x_x509a.c | 75 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT), 143 if(!aux->trust 144 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0; 145 return sk_ASN1_OBJECT_push(aux->trust, objtmp); 161 if(x->aux && x->aux->trust) { 162 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free); 163 x->aux->trust = NULL;
|
/external/chromium_org/chromeos/network/onc/ |
H A D | onc_certificate_importer_impl_unittest.cc | 41 CERTCertTrust trust = {0}; local 42 CERT_GetCertTrust(cert, &trust); 44 unsigned all_flags = trust.sslFlags | trust.emailFlags | 45 trust.objectSigningFlags; 52 if (trust.sslFlags & CERTDB_TERMINAL_RECORD) 114 ::onc::ONC_SOURCE_USER_IMPORT, // allow web trust
|
H A D | onc_certificate_importer_impl.cc | 95 // Web trust is only granted to certificates imported by the user. 255 // Trust bits should only increase trust and never restrict. Thus, 257 LOG(WARNING) << "Certificate contains unknown trust type " 266 LOG(WARNING) << "Web trust not granted for certificate: " << guid; 288 net::NSSCertDatabase::TrustBits trust = (import_with_ssl_trust ? local 298 trust & ~nssdb->GetCertTrust(x509_cert.get(), net_cert_type); 305 success = nssdb->SetCertTrust(x509_cert.get(), net_cert_type, trust); 309 << " was already present, but trust couldn't be set." 319 success = nssdb->ImportServerCert(cert_list, trust, &failures); 321 success = nssdb->ImportCACerts(cert_list, trust, [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | CertPathValidatorUtilities.java | 164 TrustAnchor trust = null; 177 throw new AnnotatedException("Cannot set subject search criteria for trust anchor.", ex); 181 while (iter.hasNext() && trust == null) 183 trust = (TrustAnchor)iter.next(); 184 if (trust.getTrustedCert() != null) 186 if (certSelectX509.match(trust.getTrustedCert())) 188 trustPublicKey = trust.getTrustedCert().getPublicKey(); 192 trust = null; 195 else if (trust.getCAName() != null 196 && trust [all...] |
H A D | PKIXCertPathValidatorSpi.java | 116 TrustAnchor trust; 119 trust = CertPathValidatorUtilities.findTrustAnchor((X509Certificate) certs.get(certs.size() - 1), 127 if (trust == null) 215 X509Certificate sign = trust.getTrustedCert(); 225 workingIssuerName = new X500Principal(trust.getCAName()); 226 workingPublicKey = trust.getCAPublicKey(); 231 throw new ExtCertPathValidatorException("Subject of trust anchor could not be (re)encoded.", ex, certPath, 243 "Algorithm identifier of public key of trust anchor could not be read.", e, certPath, -1); 458 return new PKIXCertPathValidatorResult(trust, intersection, cert.getPublicKey());
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | policy_cert_verifier_browsertest.cc | 87 // trust anchors (i.e. of |test_ca_cert_|) for the first time or since the 114 net::NSSCertDatabase::TrustBits trust = local 116 EXPECT_EQ(net::NSSCertDatabase::TRUST_DEFAULT, trust); 153 // Make the database trust |test_ca_cert_|. 160 net::NSSCertDatabase::TrustBits trust = local 162 EXPECT_EQ(net::NSSCertDatabase::TRUSTED_SSL, trust); 174 // The additional trust anchors were not used, since the certificate is 195 // Verify() again with the additional trust anchors. 209 // Verify() again with the additional trust anchors will hit the cache. 220 // Verifying after removing the trust anchor [all...] |
/external/chromium_org/net/ssl/ |
H A D | client_cert_store_mac.cc | 35 // This function calls SecTrust but doesn't actually pay attention to the trust 36 // result: it shouldn't be used to determine trust, just to traverse the chain. 62 ScopedCFTypeRef<SecTrustRef> trust(trust_ref); 64 // Evaluate trust, which creates the cert chain. 69 result = SecTrustEvaluate(trust, &status); 75 result = SecTrustGetResult(trust, &status, out_cert_chain, &status_chain);
|
/external/openssl/include/openssl/ |
H A D | x509_vfy.h | 173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 419 int X509_STORE_set_trust(X509_STORE *ctx, int trust); 492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 494 int purpose, int trust); 522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
/external/openssl/apps/ |
H A D | x509.c | 127 " -addtrust arg - trust certificate for a given purpose\n", 182 STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL; 356 "Invalid trust object value %s\n", *argv); 359 if (!trust) trust = sk_ASN1_OBJECT_new_null(); 360 sk_ASN1_OBJECT_push(trust, objtmp); 707 if (trust) 709 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) 711 objtmp = sk_ASN1_OBJECT_value(trust, i); 1100 sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_fre [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | x509_vfy.h | 170 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 440 OPENSSL_EXPORT int X509_STORE_set_trust(X509_STORE *ctx, int trust); 518 OPENSSL_EXPORT int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 520 int purpose, int trust); 548 OPENSSL_EXPORT int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
/external/chromium_org/third_party/boringssl/src/crypto/x509v3/ |
H A D | v3_purp.c | 174 int X509_PURPOSE_add(int id, int trust, int flags, argument 182 /* This will always be set for application modified trust entries */ 213 ptmp->trust = trust; 269 return xp->trust;
|