/external/libchrome/crypto/ |
H A D | scoped_test_nss_db.cc | 31 // Remove trust from any certs in the test DB before closing it. Otherwise NSS 38 CERTCertTrust trust = {0}; local 39 if (CERT_ChangeCertTrust(CERT_GetDefaultCertDB(), node->cert, &trust) !=
|
/external/libcups/cups/ |
H A D | testcreds.c | 37 http_trust_t trust; /* Trust evaluation for connection */ local 39 *tcreds; /* Credentials from trust store */ 41 tinfo[1024]; /* String for trust store credentials */ 78 trust = httpCredentialsGetTrust(hcreds, hostname); 83 if (trust == HTTP_TRUST_OK) 86 printf(" Trust: %s (%s)\n", trusts[trust], cupsLastErrorString());
|
H A D | testhttp.c | 629 http_trust_t trust = httpCredentialsGetTrust(creds, hostname); local 634 printf("Trust: %s\n", trusts[trust]); 661 if (trust != HTTP_TRUST_OK) 664 trust = httpCredentialsGetTrust(creds, hostname); 665 printf("New Trust: %s\n", trusts[trust]);
|
H A D | tls-gnutls.c | 419 * 'httpCredentialsGetTrust()' - Return the trust of credentials. 424 http_trust_t /* O - Level of trust */ 427 const char *common_name) /* I - Common name for trust lookup */ 429 http_trust_t trust = HTTP_TRUST_OK; local 479 * Do not trust certificates on first use... 484 trust = HTTP_TRUST_INVALID; 494 trust = HTTP_TRUST_INVALID; 504 trust = HTTP_TRUST_INVALID; 512 trust = HTTP_TRUST_RENEWED; 523 trust [all...] |
H A D | tls-darwin.c | 435 SecTrustRef peerTrust; /* Peer trust reference */ 590 * 'httpCredentialsGetTrust()' - Return the trust of credentials. 595 http_trust_t /* O - Level of trust */ 598 const char *common_name) /* I - Common name for trust lookup */ 601 http_trust_t trust = HTTP_TRUST_OK; local 647 * Do not trust certificates on first use... 652 trust = HTTP_TRUST_INVALID; 662 trust = HTTP_TRUST_INVALID; 672 trust = HTTP_TRUST_INVALID; 680 trust [all...] |
H A D | tls-sspi.c | 240 * 'httpCredentialsGetTrust()' - Return the trust of credentials. 245 http_trust_t /* O - Level of trust */ 248 const char *common_name) /* I - Common name for trust lookup */ 250 http_trust_t trust = HTTP_TRUST_OK; /* Level of trust */ local 276 trust = HTTP_TRUST_INVALID; 280 return (trust);
|
/external/google-breakpad/src/google_breakpad/processor/ |
H A D | stack_frame.h | 46 // In rough order of "trust metric". 65 trust(FRAME_TRUST_NONE) {} 71 switch (trust) { 137 // Amount of trust the stack walker has in the instruction pointer 139 FrameTrust trust; member in struct:google_breakpad::StackFrame
|
/external/boringssl/src/crypto/x509/ |
H A D | x509_trs.c | 66 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 67 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 68 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 74 * WARNING: the following table should be kept in order of trust and without 75 * any gaps so we can just subtract the minimum trust value to get an index 103 return (*a)->trust - (*b)->trust; 106 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, 110 default_trust = trust; 158 tmp.trust 167 X509_TRUST_set(int *t, int trust) argument 276 trust_1oidany(X509_TRUST *trust, X509 *x, int flags) argument 287 trust_1oid(X509_TRUST *trust, X509 *x, int flags) argument 294 trust_compat(X509_TRUST *trust, X509 *x, int flags) argument [all...] |
H A D | x509_lu.c | 694 int X509_STORE_set_trust(X509_STORE *ctx, int trust) argument 696 return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
|
H A D | x509_vpm.c | 135 param->trust = 0; 273 x509_verify_param_copy(trust, 0); 392 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust) argument 394 return X509_TRUST_set(¶m->trust, trust); 532 0, /* trust */ 542 X509_TRUST_EMAIL, /* trust */ 552 X509_TRUST_EMAIL, /* trust */ 562 X509_TRUST_SSL_CLIENT, /* trust */ 572 X509_TRUST_SSL_SERVER, /* trust */ [all...] |
H A D | x509_vfy.c | 189 int num, j, retry, trust; local 347 * version so we get any trust settings. 393 trust = check_trust(ctx); 396 if (trust == X509_TRUST_REJECTED) { 407 if (trust != X509_TRUST_TRUSTED 444 if (trust != X509_TRUST_TRUSTED && !bad_chain) { 727 * including trust anchor. Trust anchor not strictly speaking needed 812 ok = X509_check_trust(x, ctx->param->trust, 0); 1331 * strict and states that the two paths must end in the same trust anchor, 2193 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust) argument 2209 X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, int purpose, int trust) argument [all...] |
/external/google-breakpad/src/processor/ |
H A D | stackwalker_x86.cc | 132 frame->trust = StackFrame::FRAME_TRUST_CONTEXT; 142 StackFrame::FrameTrust trust = StackFrame::FRAME_TRUST_NONE; local 242 last_frame->trust == StackFrame::FRAME_TRUST_CONTEXT && 269 trust = StackFrame::FRAME_TRUST_CFI; 391 trust = StackFrame::FRAME_TRUST_SCAN; 399 // %ebp values of 0, trust that the end of the stack has been 431 trust = StackFrame::FRAME_TRUST_CFI_SCAN; 450 (trust != StackFrame::FRAME_TRUST_CFI && ebp <= raSearchStart + offset); 479 frame->trust = trust; 534 StackFrame::FrameTrust trust; local [all...] |
/external/boringssl/src/crypto/x509v3/ |
H A D | v3_purp.c | 213 int X509_PURPOSE_add(int id, int trust, int flags, argument 225 /* This will always be set for application modified trust entries */ 267 ptmp->trust = trust; 326 return xp->trust;
|
/external/boringssl/src/ssl/ |
H A D | ssl_x509.cc | 590 int SSL_CTX_set_trust(SSL_CTX *ctx, int trust) { argument 592 return X509_VERIFY_PARAM_set_trust(ctx->param, trust); 595 int SSL_set_trust(SSL *ssl, int trust) { argument 597 return X509_VERIFY_PARAM_set_trust(ssl->param, trust);
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | x509v3.c | 2028 struct x509_certificate *cert, *trust; local 2100 for (trust = trusted; trust; trust = trust->next) { 2101 if (x509_name_compare(&cert->issuer, &trust->subject) 2106 if (trust) { 2109 if (x509_valid_issuer(trust) < 0) { 2114 if (x509_certificate_check_signature(trust, cert) < 0)
|
/external/wpa_supplicant_8/src/tls/ |
H A D | x509v3.c | 2028 struct x509_certificate *cert, *trust; local 2100 for (trust = trusted; trust; trust = trust->next) { 2101 if (x509_name_compare(&cert->issuer, &trust->subject) 2106 if (trust) { 2109 if (x509_valid_issuer(trust) < 0) { 2114 if (x509_certificate_check_signature(trust, cert) < 0)
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | x509v3.c | 2028 struct x509_certificate *cert, *trust; local 2100 for (trust = trusted; trust; trust = trust->next) { 2101 if (x509_name_compare(&cert->issuer, &trust->subject) 2106 if (trust) { 2109 if (x509_valid_issuer(trust) < 0) { 2114 if (x509_certificate_check_signature(trust, cert) < 0)
|
/external/boringssl/include/openssl/ |
H A D | x509_vfy.h | 153 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 435 OPENSSL_EXPORT int X509_STORE_set_trust(X509_STORE *ctx, int trust); 522 OPENSSL_EXPORT int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 524 int purpose, int trust); 552 OPENSSL_EXPORT int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
H A D | x509.h | 232 STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ member in struct:x509_cert_aux_st 272 /* This is used for a table of trust checking functions */ 275 int trust; member in struct:x509_trust_st 285 /* standard trust ids */ 773 OPENSSL_EXPORT int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int); 774 OPENSSL_EXPORT int X509_TRUST_set(int *t, int trust);
|
H A D | x509v3.h | 471 int trust; /* Default trust ID */ member in struct:x509_purpose_st 689 OPENSSL_EXPORT int X509_PURPOSE_add(int id, int trust, int flags,
|
/external/boringssl/src/include/openssl/ |
H A D | x509_vfy.h | 153 int trust; /* trust setting to check */ member in struct:X509_VERIFY_PARAM_st 435 OPENSSL_EXPORT int X509_STORE_set_trust(X509_STORE *ctx, int trust); 522 OPENSSL_EXPORT int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); 524 int purpose, int trust); 552 OPENSSL_EXPORT int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
|
H A D | x509.h | 232 STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ member in struct:x509_cert_aux_st 272 /* This is used for a table of trust checking functions */ 275 int trust; member in struct:x509_trust_st 285 /* standard trust ids */ 773 OPENSSL_EXPORT int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int); 774 OPENSSL_EXPORT int X509_TRUST_set(int *t, int trust);
|
H A D | x509v3.h | 471 int trust; /* Default trust ID */ member in struct:x509_purpose_st 689 OPENSSL_EXPORT int X509_PURPOSE_add(int id, int trust, int flags,
|
/external/curl/lib/vtls/ |
H A D | darwinssl.c | 2112 SecTrustRef trust; local 2113 OSStatus ret = SSLCopyPeerTrust(ctx, &trust); 2114 if(trust == NULL) { 2124 ret = SecTrustSetAnchorCertificates(trust, array); 2126 CFRelease(trust); 2129 ret = SecTrustSetAnchorCertificatesOnly(trust, true); 2131 CFRelease(trust); 2136 ret = SecTrustEvaluate(trust, &trust_eval); 2138 CFRelease(trust); 2179 SecTrustRef trust; local 2434 SecTrustRef trust = NULL; local [all...] |
/external/wpa_supplicant_8/hs20/server/ |
H A D | spp_server.c | 1218 xml_node_t *pps, *c, *trust, *aaa, *aaa1, *upd, *homesp; local 1244 trust = xml_node_create(ctx->xml, upd, NULL, "TrustRoot"); 1245 add_text_node_conf(ctx, realm, trust, "CertURL", "trust_root_cert_url"); 1246 add_text_node_conf(ctx, realm, trust, "CertSHA256Fingerprint",
|