Searched refs:trust (Results 1 - 25 of 58) sorted by relevance

123

/external/chromium_org/third_party/boringssl/src/crypto/x509/
H A Dx509_trs.c66 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags);
67 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags);
68 static int trust_compat(X509_TRUST *trust, X509 *x, int flags);
73 /* WARNING: the following table should be kept in order of trust
74 * and without any gaps so we can just subtract the minimum trust
96 return (*a)->trust - (*b)->trust;
99 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int)
103 default_trust = trust;
148 tmp.trust
156 X509_TRUST_set(int *t, int trust) argument
251 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) argument
261 trust_1oid(X509_TRUST *trust, X509 *x, int flags) argument
267 trust_compat(X509_TRUST *trust, X509 *x, int flags) argument
[all...]
H A Dt_x509a.c72 if(aux->trust) {
76 for(i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) {
80 sk_ASN1_OBJECT_value(aux->trust, i), 0);
H A Dx_x509a.c72 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT),
140 if(!aux->trust
141 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0;
142 return sk_ASN1_OBJECT_push(aux->trust, objtmp);
158 if(x->aux && x->aux->trust) {
159 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free);
160 x->aux->trust = NULL;
H A Dx509_vpm.c73 param->trust = 0;
209 x509_verify_param_copy(trust, 0);
328 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) argument
330 return X509_TRUST_set(&param->trust, trust);
458 0, /* trust */
469 X509_TRUST_EMAIL, /* trust */
480 X509_TRUST_EMAIL, /* trust */
491 X509_TRUST_SSL_CLIENT, /* trust */
502 X509_TRUST_SSL_SERVER, /* trust */
[all...]
H A Dx509_vfy.c316 * so we get any trust settings.
675 * chain including trust anchor. Trust anchor not strictly
742 ok = X509_check_trust(x, ctx->param->trust, 0);
1270 * end in the same trust anchor, though some discussions remain...
2168 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) argument
2170 return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust);
2173 /* This function is used to set the X509_STORE_CTX purpose and trust
2175 * own trust and purpose values which (if set) will be inherited by
2177 * purpose in mind which should then be used to set the trust value.
2179 * purpose and trust setting
2183 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) argument
[all...]
/external/openssl/crypto/x509/
H A Dx509_trs.c68 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags);
69 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags);
70 static int trust_compat(X509_TRUST *trust, X509 *x, int flags);
75 /* WARNING: the following table should be kept in order of trust
76 * and without any gaps so we can just subtract the minimum trust
100 return (*a)->trust - (*b)->trust;
103 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int)
107 default_trust = trust;
142 tmp.trust
149 X509_TRUST_set(int *t, int trust) argument
244 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) argument
254 trust_1oid(X509_TRUST *trust, X509 *x, int flags) argument
260 trust_compat(X509_TRUST *trust, X509 *x, int flags) argument
[all...]
H A Dx509_vpm.c76 param->trust = 0;
173 x509_verify_param_copy(trust, 0);
244 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) argument
246 return X509_TRUST_set(&param->trust, trust);
327 0, /* trust */
337 X509_TRUST_EMAIL, /* trust */
347 X509_TRUST_EMAIL, /* trust */
357 X509_TRUST_SSL_CLIENT, /* trust */
367 X509_TRUST_SSL_SERVER, /* trust */
[all...]
H A Dx509_vfy.h173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
H A Dx509_vfy.c266 * so we get any trust settings.
349 /* The chain extensions are OK: check trust */
351 if (param->trust > 0) ok = check_trust(ctx);
619 * chain including trust anchor. Trust anchor not strictly
655 ok = X509_check_trust(x, ctx->param->trust, 0);
1154 * end in the same trust anchor, though some discussions remain...
1924 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) argument
1926 return X509_STORE_CTX_purpose_inherit(ctx, 0, 0, trust);
1929 /* This function is used to set the X509_STORE_CTX purpose and trust
1931 * own trust an
1939 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) argument
[all...]
/external/chromium_org/net/cert/
H A Dtest_root_certs_nss.cc21 // for a certificate whose trust status has been changed by the
26 // and copying |trust|.
27 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust);
31 const CERTCertTrust& trust() const { return trust_; } function in class:net::TestRootCerts::TrustEntry
37 // The original trust settings, before |certificate_| was manipulated to
45 const CERTCertTrust& trust)
47 trust_(trust) {
61 // Preserve the original trust bits so that they can be restored when
67 // particular trust settings associated with it, and attempts to use
68 // |original_trust| later to restore the original trust setting
44 TrustEntry(CERTCertificate* certificate, const CERTCertTrust& trust) argument
[all...]
H A Dnss_cert_database.cc255 CERTCertTrust trust; local
256 SECStatus srv = CERT_GetCertTrust(cert->os_cert_handle(), &trust);
262 // round-trip all possible NSS trust flag combinations. We try to map them in
270 if ((trust.sslFlags & kCAFlags) == CERTDB_TERMINAL_RECORD)
272 else if (trust.sslFlags & kTrustedCA)
275 if ((trust.emailFlags & kCAFlags) == CERTDB_TERMINAL_RECORD)
277 else if (trust.emailFlags & kTrustedCA)
280 if ((trust.objectSigningFlags & kCAFlags) == CERTDB_TERMINAL_RECORD)
282 else if (trust.objectSigningFlags & kTrustedCA)
288 if (trust
[all...]
H A Dnss_cert_database_unittest.cc302 cert->os_cert_handle()->trust->sslFlags);
304 cert->os_cert_handle()->trust->emailFlags);
306 cert->os_cert_handle()->trust->objectSigningFlags);
332 cert->os_cert_handle()->trust->sslFlags);
335 cert->os_cert_handle()->trust->emailFlags);
337 cert->os_cert_handle()->trust->objectSigningFlags);
363 cert->os_cert_handle()->trust->sslFlags);
365 cert->os_cert_handle()->trust->emailFlags);
368 cert->os_cert_handle()->trust->objectSigningFlags);
400 // Have to specify email trust fo
[all...]
/external/chromium_org/net/third_party/mozilla_security_manager/
H A DnsNSSCertificateDB.cpp80 // TODO(mattm): should we set/add trust if it differs from the present
224 LOG(ERROR) << "SetCertTrust called with conflicting trust bits "
233 // Note that we start with CERTDB_VALID_CA for default trust and explicit
234 // trust, but explicitly distrusted usages will be set to
236 CERTCertTrust trust = {CERTDB_VALID_CA, CERTDB_VALID_CA, CERTDB_VALID_CA}; local
239 trust.sslFlags = CERTDB_TERMINAL_RECORD;
241 trust.sslFlags |= CERTDB_TRUSTED_CA | CERTDB_TRUSTED_CLIENT_CA;
244 trust.emailFlags = CERTDB_TERMINAL_RECORD;
246 trust.emailFlags |= CERTDB_TRUSTED_CA | CERTDB_TRUSTED_CLIENT_CA;
249 trust
255 CERTCertTrust trust = {0}; local
[all...]
/external/openssl/crypto/asn1/
H A Dt_x509a.c73 if(aux->trust) {
77 for(i = 0; i < sk_ASN1_OBJECT_num(aux->trust); i++) {
81 sk_ASN1_OBJECT_value(aux->trust, i), 0);
H A Dx_x509a.c75 ASN1_SEQUENCE_OF_OPT(X509_CERT_AUX, trust, ASN1_OBJECT),
143 if(!aux->trust
144 && !(aux->trust = sk_ASN1_OBJECT_new_null())) return 0;
145 return sk_ASN1_OBJECT_push(aux->trust, objtmp);
161 if(x->aux && x->aux->trust) {
162 sk_ASN1_OBJECT_pop_free(x->aux->trust, ASN1_OBJECT_free);
163 x->aux->trust = NULL;
/external/chromium_org/chromeos/network/onc/
H A Donc_certificate_importer_impl_unittest.cc41 CERTCertTrust trust = {0}; local
42 CERT_GetCertTrust(cert, &trust);
44 unsigned all_flags = trust.sslFlags | trust.emailFlags |
45 trust.objectSigningFlags;
52 if (trust.sslFlags & CERTDB_TERMINAL_RECORD)
114 ::onc::ONC_SOURCE_USER_IMPORT, // allow web trust
H A Donc_certificate_importer_impl.cc95 // Web trust is only granted to certificates imported by the user.
255 // Trust bits should only increase trust and never restrict. Thus,
257 LOG(WARNING) << "Certificate contains unknown trust type "
266 LOG(WARNING) << "Web trust not granted for certificate: " << guid;
288 net::NSSCertDatabase::TrustBits trust = (import_with_ssl_trust ? local
298 trust & ~nssdb->GetCertTrust(x509_cert.get(), net_cert_type);
305 success = nssdb->SetCertTrust(x509_cert.get(), net_cert_type, trust);
309 << " was already present, but trust couldn't be set."
319 success = nssdb->ImportServerCert(cert_list, trust, &failures);
321 success = nssdb->ImportCACerts(cert_list, trust,
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
H A DCertPathValidatorUtilities.java164 TrustAnchor trust = null;
177 throw new AnnotatedException("Cannot set subject search criteria for trust anchor.", ex);
181 while (iter.hasNext() && trust == null)
183 trust = (TrustAnchor)iter.next();
184 if (trust.getTrustedCert() != null)
186 if (certSelectX509.match(trust.getTrustedCert()))
188 trustPublicKey = trust.getTrustedCert().getPublicKey();
192 trust = null;
195 else if (trust.getCAName() != null
196 && trust
[all...]
H A DPKIXCertPathValidatorSpi.java116 TrustAnchor trust;
119 trust = CertPathValidatorUtilities.findTrustAnchor((X509Certificate) certs.get(certs.size() - 1),
127 if (trust == null)
215 X509Certificate sign = trust.getTrustedCert();
225 workingIssuerName = new X500Principal(trust.getCAName());
226 workingPublicKey = trust.getCAPublicKey();
231 throw new ExtCertPathValidatorException("Subject of trust anchor could not be (re)encoded.", ex, certPath,
243 "Algorithm identifier of public key of trust anchor could not be read.", e, certPath, -1);
458 return new PKIXCertPathValidatorResult(trust, intersection, cert.getPublicKey());
/external/chromium_org/chrome/browser/chromeos/policy/
H A Dpolicy_cert_verifier_browsertest.cc87 // trust anchors (i.e. of |test_ca_cert_|) for the first time or since the
114 net::NSSCertDatabase::TrustBits trust = local
116 EXPECT_EQ(net::NSSCertDatabase::TRUST_DEFAULT, trust);
153 // Make the database trust |test_ca_cert_|.
160 net::NSSCertDatabase::TrustBits trust = local
162 EXPECT_EQ(net::NSSCertDatabase::TRUSTED_SSL, trust);
174 // The additional trust anchors were not used, since the certificate is
195 // Verify() again with the additional trust anchors.
209 // Verify() again with the additional trust anchors will hit the cache.
220 // Verifying after removing the trust anchor
[all...]
/external/chromium_org/net/ssl/
H A Dclient_cert_store_mac.cc35 // This function calls SecTrust but doesn't actually pay attention to the trust
36 // result: it shouldn't be used to determine trust, just to traverse the chain.
62 ScopedCFTypeRef<SecTrustRef> trust(trust_ref);
64 // Evaluate trust, which creates the cert chain.
69 result = SecTrustEvaluate(trust, &status);
75 result = SecTrustGetResult(trust, &status, out_cert_chain, &status_chain);
/external/openssl/include/openssl/
H A Dx509_vfy.h173 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
419 int X509_STORE_set_trust(X509_STORE *ctx, int trust);
492 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
494 int purpose, int trust);
522 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
/external/openssl/apps/
H A Dx509.c127 " -addtrust arg - trust certificate for a given purpose\n",
182 STACK_OF(ASN1_OBJECT) *trust = NULL, *reject = NULL;
356 "Invalid trust object value %s\n", *argv);
359 if (!trust) trust = sk_ASN1_OBJECT_new_null();
360 sk_ASN1_OBJECT_push(trust, objtmp);
707 if (trust)
709 for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++)
711 objtmp = sk_ASN1_OBJECT_value(trust, i);
1100 sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_fre
[all...]
/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Dx509_vfy.h170 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st
440 OPENSSL_EXPORT int X509_STORE_set_trust(X509_STORE *ctx, int trust);
518 OPENSSL_EXPORT int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
520 int purpose, int trust);
548 OPENSSL_EXPORT int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
/external/chromium_org/third_party/boringssl/src/crypto/x509v3/
H A Dv3_purp.c174 int X509_PURPOSE_add(int id, int trust, int flags, argument
182 /* This will always be set for application modified trust entries */
213 ptmp->trust = trust;
269 return xp->trust;

Completed in 9497 milliseconds

123