Home
last modified time | relevance | path

Searched full:trust (Results 1 – 25 of 2340) sorted by relevance

12345678910>>...94

/external/libwebsockets/READMEs/
DREADME.jit-trust.md1 # JIT trust
3 ![JIT Trust logo](../doc-assets/jit-trust-logo.png)
7 Most systems using openssl rely on a system trust bundle that openssl was
14 ![Using system trust bundles](../doc-assets/jit-trust-system-trust.png)
25 ![Using system trust bundles](../doc-assets/jit-trust-single-trust.png)
29 "JIT trust".
31 ## JIT trust overview
37 ![JIT Trust overview](../doc-assets/jit-trust-overview.png)
41 connection, if it is one that we do actually trust. If it lies about what CA it
42 needs to validate, or we do not trust the one it asks for, subsequent
[all …]
/external/google-cloud-java/java-managed-identities/proto-google-cloud-managed-identities-v1/src/main/java/com/google/cloud/managedidentities/v1/
DTrust.java29 * Protobuf type {@code google.cloud.managedidentities.v1.Trust}
31 public final class Trust extends com.google.protobuf.GeneratedMessageV3 class
33 // @@protoc_insertion_point(message_implements:google.cloud.managedidentities.v1.Trust)
36 // Use Trust.newBuilder() to construct.
37 private Trust(com.google.protobuf.GeneratedMessageV3.Builder<?> builder) { in Trust() method in Trust
41 private Trust() { in Trust() method in Trust
54 return new Trust(); in newInstance()
73 com.google.cloud.managedidentities.v1.Trust.class, in internalGetFieldAccessorTable()
74 com.google.cloud.managedidentities.v1.Trust.Builder.class); in internalGetFieldAccessorTable()
81 * Represents the different states of a domain trust.
[all …]
DValidateTrustRequest.java129 private com.google.cloud.managedidentities.v1.Trust trust_;
134 * Required. The domain trust to validate trust state for.
138 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
141 * @return Whether the trust field is set.
151 * Required. The domain trust to validate trust state for.
155 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
158 * @return The trust.
161 public com.google.cloud.managedidentities.v1.Trust getTrust() { in getTrust()
163 ? com.google.cloud.managedidentities.v1.Trust.getDefaultInstance() in getTrust()
170 * Required. The domain trust to validate trust state for.
[all …]
DTrustOrBuilder.java23 // @@protoc_insertion_point(interface_extends:google.cloud.managedidentities.v1.Trust)
30 * Required. The fully qualified target domain name which will be in trust with the
43 * Required. The fully qualified target domain name which will be in trust with the
57 * Required. The type of trust represented by the trust resource.
61 …* .google.cloud.managedidentities.v1.Trust.TrustType trust_type = 2 [(.google.api.field_behavior) …
71 * Required. The type of trust represented by the trust resource.
75 …* .google.cloud.managedidentities.v1.Trust.TrustType trust_type = 2 [(.google.api.field_behavior) …
80 com.google.cloud.managedidentities.v1.Trust.TrustType getTrustType(); in getTrustType()
86 * Required. The trust direction, which decides if the current domain is trusted,
91 …* .google.cloud.managedidentities.v1.Trust.TrustDirection trust_direction = 3 [(.google.api.field_…
[all …]
DValidateTrustRequestOrBuilder.java61 * Required. The domain trust to validate trust state for.
65 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
68 * @return Whether the trust field is set.
75 * Required. The domain trust to validate trust state for.
79 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
82 * @return The trust.
84 com.google.cloud.managedidentities.v1.Trust getTrust(); in getTrust()
89 * Required. The domain trust to validate trust state for.
93 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
DAttachTrustRequest.java129 private com.google.cloud.managedidentities.v1.Trust trust_;
134 * Required. The domain trust resource.
138 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
141 * @return Whether the trust field is set.
151 * Required. The domain trust resource.
155 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
158 * @return The trust.
161 public com.google.cloud.managedidentities.v1.Trust getTrust() { in getTrust()
163 ? com.google.cloud.managedidentities.v1.Trust.getDefaultInstance() in getTrust()
170 * Required. The domain trust resource.
[all …]
DDetachTrustRequest.java129 private com.google.cloud.managedidentities.v1.Trust trust_;
134 * Required. The domain trust resource to removed.
138 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
141 * @return Whether the trust field is set.
151 * Required. The domain trust resource to removed.
155 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
158 * @return The trust.
161 public com.google.cloud.managedidentities.v1.Trust getTrust() { in getTrust()
163 ? com.google.cloud.managedidentities.v1.Trust.getDefaultInstance() in getTrust()
170 * Required. The domain trust resource to removed.
[all …]
DAttachTrustRequestOrBuilder.java61 * Required. The domain trust resource.
65 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
68 * @return Whether the trust field is set.
75 * Required. The domain trust resource.
79 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
82 * @return The trust.
84 com.google.cloud.managedidentities.v1.Trust getTrust(); in getTrust()
89 * Required. The domain trust resource.
93 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
DDetachTrustRequestOrBuilder.java61 * Required. The domain trust resource to removed.
65 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
68 * @return Whether the trust field is set.
75 * Required. The domain trust resource to removed.
79 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
82 * @return The trust.
84 com.google.cloud.managedidentities.v1.Trust getTrust(); in getTrust()
89 * Required. The domain trust resource to removed.
93 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
/external/cronet/tot/third_party/boringssl/src/pki/
Dtrust_store_collection_unittest.cc79 CertificateTrust trust = collection.GetTrust(newroot_.get()); in TEST_F() local
81 trust.ToDebugString()); in TEST_F()
84 trust = collection.GetTrust(oldroot_.get()); in TEST_F()
86 trust.ToDebugString()); in TEST_F()
107 CertificateTrust trust = collection.GetTrust(newroot_.get()); in TEST_F() local
109 trust.ToDebugString()); in TEST_F()
112 trust = collection.GetTrust(newrootrollover_.get()); in TEST_F()
114 trust.ToDebugString()); in TEST_F()
135 CertificateTrust trust = collection.GetTrust(newroot_.get()); in TEST_F() local
137 trust.ToDebugString()); in TEST_F()
[all …]
Dtrust_store.cc137 CertificateTrust trust; in FromDebugString() local
140 trust = CertificateTrust::ForUnspecified(); in FromDebugString()
142 trust = CertificateTrust::ForDistrusted(); in FromDebugString()
144 trust = CertificateTrust::ForTrustAnchor(); in FromDebugString()
146 trust = CertificateTrust::ForTrustAnchorOrLeaf(); in FromDebugString()
148 trust = CertificateTrust::ForTrustedLeaf(); in FromDebugString()
155 trust = trust.WithEnforceAnchorExpiry(); in FromDebugString()
157 trust = trust.WithEnforceAnchorConstraints(); in FromDebugString()
159 trust = trust.WithRequireAnchorBasicConstraints(); in FromDebugString()
161 trust = trust.WithRequireLeafSelfSigned(); in FromDebugString()
[all …]
/external/cronet/stable/third_party/boringssl/src/pki/
Dtrust_store_collection_unittest.cc79 CertificateTrust trust = collection.GetTrust(newroot_.get()); in TEST_F() local
81 trust.ToDebugString()); in TEST_F()
84 trust = collection.GetTrust(oldroot_.get()); in TEST_F()
86 trust.ToDebugString()); in TEST_F()
107 CertificateTrust trust = collection.GetTrust(newroot_.get()); in TEST_F() local
109 trust.ToDebugString()); in TEST_F()
112 trust = collection.GetTrust(newrootrollover_.get()); in TEST_F()
114 trust.ToDebugString()); in TEST_F()
135 CertificateTrust trust = collection.GetTrust(newroot_.get()); in TEST_F() local
137 trust.ToDebugString()); in TEST_F()
[all …]
Dtrust_store.cc137 CertificateTrust trust; in FromDebugString() local
140 trust = CertificateTrust::ForUnspecified(); in FromDebugString()
142 trust = CertificateTrust::ForDistrusted(); in FromDebugString()
144 trust = CertificateTrust::ForTrustAnchor(); in FromDebugString()
146 trust = CertificateTrust::ForTrustAnchorOrLeaf(); in FromDebugString()
148 trust = CertificateTrust::ForTrustedLeaf(); in FromDebugString()
155 trust = trust.WithEnforceAnchorExpiry(); in FromDebugString()
157 trust = trust.WithEnforceAnchorConstraints(); in FromDebugString()
159 trust = trust.WithRequireAnchorBasicConstraints(); in FromDebugString()
161 trust = trust.WithRequireLeafSelfSigned(); in FromDebugString()
[all …]
/external/boringssl/src/crypto/x509/
Dx509_trs.cc22 int trust; member
27 static int trust_1oidany(const X509_TRUST *trust, X509 *x);
28 static int trust_compat(const X509_TRUST *trust, X509 *x);
42 if (trstandard[i].trust == id) { in X509_TRUST_get0()
63 // Unknown trust IDs are silently reintrepreted as NIDs. This is unreachable in X509_check_trust()
65 // Note this relies on commonly-used NIDs and trust IDs not colliding. in X509_check_trust()
71 int X509_is_valid_trust_id(int trust) { in X509_is_valid_trust_id() argument
72 return X509_TRUST_get0(trust) != NULL; in X509_is_valid_trust_id()
75 static int trust_1oidany(const X509_TRUST *trust, X509 *x) { in trust_1oidany() argument
76 if (x->aux && (x->aux->trust || x->aux->reject)) { in trust_1oidany()
[all …]
/external/cronet/tot/net/data/ssl/chrome_root_store/
Dfaq.md22 Root stores, sometimes called “trust stores,” tell operating systems and
23 applications what certificates to trust.
67 [considers](#does-the-chrome-certificate-verifier-consider-local-trust-decisions)
125 ### Does the Chrome Certificate Verifier consider local trust decisions?
133 - Trust:
136 - Enterprise Trust -> Enterprise -> Trusted Root Certification Authorities
137 - Enterprise Trust -> Enterprise -> Trusted People
138 - Enterprise Trust -> Group Policy -> Trusted Root Certification Authorities
139 - Enterprise Trust -> Group Policy -> Trusted People
142 - Enterprise Trust -> Enterprise -> Untrusted Certificates
[all …]
/external/cronet/stable/net/data/ssl/chrome_root_store/
Dfaq.md22 Root stores, sometimes called “trust stores,” tell operating systems and
23 applications what certificates to trust.
67 [considers](#does-the-chrome-certificate-verifier-consider-local-trust-decisions)
125 ### Does the Chrome Certificate Verifier consider local trust decisions?
133 - Trust:
136 - Enterprise Trust -> Enterprise -> Trusted Root Certification Authorities
137 - Enterprise Trust -> Enterprise -> Trusted People
138 - Enterprise Trust -> Group Policy -> Trusted Root Certification Authorities
139 - Enterprise Trust -> Group Policy -> Trusted People
142 - Enterprise Trust -> Enterprise -> Untrusted Certificates
[all …]
/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/crypto/x509/
Dx509_trs.c69 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags);
70 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags);
71 static int trust_compat(X509_TRUST *trust, X509 *x, int flags);
77 * WARNING: the following table should be kept in order of trust and without
78 * any gaps so we can just subtract the minimum trust value to get an index
106 return (*a)->trust - (*b)->trust; in tr_cmp()
109 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, in X509_TRUST_set_default()
113 default_trust = trust; in X509_TRUST_set_default()
161 tmp.trust = id; in X509_TRUST_get_by_id()
171 int X509_TRUST_set(int *t, int trust) in X509_TRUST_set() argument
[all …]
/external/googleapis/google/cloud/managedidentities/v1beta1/
Dresource.proto119 repeated Trust trusts = 15 [(google.api.field_behavior) = OUTPUT_ONLY];
124 message Trust { message
125 // Represents the different states of a domain trust.
130 // The domain trust is being created.
133 // The domain trust is being updated.
136 // The domain trust is being deleted.
139 // The domain trust is connected.
142 // The domain trust is disconnected.
146 // Represents the different inter-forest trust types.
151 // The forest trust.
[all …]
/external/googleapis/google/cloud/managedidentities/v1/
Dresource.proto117 repeated Trust trusts = 15 [(google.api.field_behavior) = OUTPUT_ONLY];
122 message Trust { message
123 // Represents the different states of a domain trust.
128 // The domain trust is being created.
131 // The domain trust is being updated.
134 // The domain trust is being deleted.
137 // The domain trust is connected.
140 // The domain trust is disconnected.
144 // Represents the different inter-forest trust types.
149 // The forest trust.
[all …]
/external/google-cloud-java/java-managed-identities/proto-google-cloud-managed-identities-v1/src/main/proto/google/cloud/managedidentities/v1/
Dresource.proto117 repeated Trust trusts = 15 [(google.api.field_behavior) = OUTPUT_ONLY];
122 message Trust { message
123 // Represents the different states of a domain trust.
128 // The domain trust is being created.
131 // The domain trust is being updated.
134 // The domain trust is being deleted.
137 // The domain trust is connected.
140 // The domain trust is disconnected.
144 // Represents the different inter-forest trust types.
149 // The forest trust.
[all …]
/external/cronet/stable/net/cert/internal/
Dtrust_store_nss.cc136 bssl::CertificateTrust trust) in ListCertsResult() argument
137 : cert(std::move(cert)), trust(trust) {} in ListCertsResult()
176 // certs that are valid at |sorttime|. Expiration isn't meaningful for trust in SyncGetIssuersOf()
263 // matching trust object. Do we need to do that too? (this pk11_isID0 thing:
275 // Find a matching NSS certificate object, if any. Note that NSS trust in GetTrust()
306 // See if NSS has any trust settings for the certificate at all. If not, in GetTrustIgnoringSystemTrust()
310 DVLOG(1) << "skipped cert that has no trust settings"; in GetTrustIgnoringSystemTrust()
314 // If there were trust settings, we may not be able to use the NSS calculated in GetTrustIgnoringSystemTrust()
315 // trust settings directly, since we don't know which slot those settings in GetTrustIgnoringSystemTrust()
316 // came from. Do a more careful check to only honor trust settings from slots in GetTrustIgnoringSystemTrust()
[all …]
Dtrust_store_mac.cc54 // The rules for interpreting trust settings are documented at:
57 // Indicates the trust status of a certificate.
59 // Trust status is unknown / uninitialized.
61 // Certificate inherits trust value from its issuer. If the certificate is the
64 // Certificate is a trust anchor.
73 // Mac trust settings don't distinguish between trusted anchors and in TrustStatusToCertificateTrust()
74 // trusted leafs, return a trust record valid for both, which will in TrustStatusToCertificateTrust()
76 bssl::CertificateTrust trust = in TrustStatusToCertificateTrust() local
81 return trust; in TrustStatusToCertificateTrust()
96 // Returns trust status of usage constraints dictionary |trust_dict| for a
[all …]
/external/cronet/tot/net/cert/internal/
Dtrust_store_nss.cc136 bssl::CertificateTrust trust) in ListCertsResult() argument
137 : cert(std::move(cert)), trust(trust) {} in ListCertsResult()
176 // certs that are valid at |sorttime|. Expiration isn't meaningful for trust in SyncGetIssuersOf()
263 // matching trust object. Do we need to do that too? (this pk11_isID0 thing:
275 // Find a matching NSS certificate object, if any. Note that NSS trust in GetTrust()
306 // See if NSS has any trust settings for the certificate at all. If not, in GetTrustIgnoringSystemTrust()
310 DVLOG(1) << "skipped cert that has no trust settings"; in GetTrustIgnoringSystemTrust()
314 // If there were trust settings, we may not be able to use the NSS calculated in GetTrustIgnoringSystemTrust()
315 // trust settings directly, since we don't know which slot those settings in GetTrustIgnoringSystemTrust()
316 // came from. Do a more careful check to only honor trust settings from slots in GetTrustIgnoringSystemTrust()
[all …]
Dtrust_store_mac.cc54 // The rules for interpreting trust settings are documented at:
57 // Indicates the trust status of a certificate.
59 // Trust status is unknown / uninitialized.
61 // Certificate inherits trust value from its issuer. If the certificate is the
64 // Certificate is a trust anchor.
73 // Mac trust settings don't distinguish between trusted anchors and in TrustStatusToCertificateTrust()
74 // trusted leafs, return a trust record valid for both, which will in TrustStatusToCertificateTrust()
76 bssl::CertificateTrust trust = in TrustStatusToCertificateTrust() local
81 return trust; in TrustStatusToCertificateTrust()
96 // Returns trust status of usage constraints dictionary |trust_dict| for a
[all …]
/external/google-cloud-java/java-managed-identities/google-cloud-managed-identities/src/test/java/com/google/cloud/managedidentities/v1/
DManagedIdentitiesServiceClientTest.java105 .addAllTrusts(new ArrayList<Trust>()) in createMicrosoftAdDomainTest()
168 .addAllTrusts(new ArrayList<Trust>()) in createMicrosoftAdDomainTest2()
391 .addAllTrusts(new ArrayList<Trust>()) in getDomainTest()
439 .addAllTrusts(new ArrayList<Trust>()) in getDomainTest2()
487 .addAllTrusts(new ArrayList<Trust>()) in updateDomainTest()
630 .addAllTrusts(new ArrayList<Trust>()) in attachTrustTest()
641 Trust trust = Trust.newBuilder().build(); in attachTrustTest() local
643 Domain actualResponse = client.attachTrustAsync(name, trust).get(); in attachTrustTest()
651 Assert.assertEquals(trust, actualRequest.getTrust()); in attachTrustTest()
665 Trust trust = Trust.newBuilder().build(); in attachTrustExceptionTest() local
[all …]

12345678910>>...94