| /external/libwebsockets/READMEs/ |
| D | README.jit-trust.md | 1 # JIT trust 3  7 Most systems using openssl rely on a system trust bundle that openssl was 14  25  29 "JIT trust". 31 ## JIT trust overview 37  41 connection, if it is one that we do actually trust. If it lies about what CA it 42 needs to validate, or we do not trust the one it asks for, subsequent [all …]
|
| /external/google-cloud-java/java-managed-identities/proto-google-cloud-managed-identities-v1/src/main/java/com/google/cloud/managedidentities/v1/ |
| D | Trust.java | 29 * Protobuf type {@code google.cloud.managedidentities.v1.Trust} 31 public final class Trust extends com.google.protobuf.GeneratedMessageV3 class 33 // @@protoc_insertion_point(message_implements:google.cloud.managedidentities.v1.Trust) 36 // Use Trust.newBuilder() to construct. 37 private Trust(com.google.protobuf.GeneratedMessageV3.Builder<?> builder) { in Trust() method in Trust 41 private Trust() { in Trust() method in Trust 54 return new Trust(); in newInstance() 73 com.google.cloud.managedidentities.v1.Trust.class, in internalGetFieldAccessorTable() 74 com.google.cloud.managedidentities.v1.Trust.Builder.class); in internalGetFieldAccessorTable() 81 * Represents the different states of a domain trust. [all …]
|
| D | ValidateTrustRequest.java | 129 private com.google.cloud.managedidentities.v1.Trust trust_; 134 * Required. The domain trust to validate trust state for. 138 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED]; 141 * @return Whether the trust field is set. 151 * Required. The domain trust to validate trust state for. 155 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED]; 158 * @return The trust. 161 public com.google.cloud.managedidentities.v1.Trust getTrust() { in getTrust() 163 ? com.google.cloud.managedidentities.v1.Trust.getDefaultInstance() in getTrust() 170 * Required. The domain trust to validate trust state for. [all …]
|
| D | TrustOrBuilder.java | 23 // @@protoc_insertion_point(interface_extends:google.cloud.managedidentities.v1.Trust) 30 * Required. The fully qualified target domain name which will be in trust with the 43 * Required. The fully qualified target domain name which will be in trust with the 57 * Required. The type of trust represented by the trust resource. 61 …* .google.cloud.managedidentities.v1.Trust.TrustType trust_type = 2 [(.google.api.field_behavior) … 71 * Required. The type of trust represented by the trust resource. 75 …* .google.cloud.managedidentities.v1.Trust.TrustType trust_type = 2 [(.google.api.field_behavior) … 80 com.google.cloud.managedidentities.v1.Trust.TrustType getTrustType(); in getTrustType() 86 * Required. The trust direction, which decides if the current domain is trusted, 91 …* .google.cloud.managedidentities.v1.Trust.TrustDirection trust_direction = 3 [(.google.api.field_… [all …]
|
| D | ValidateTrustRequestOrBuilder.java | 61 * Required. The domain trust to validate trust state for. 65 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED]; 68 * @return Whether the trust field is set. 75 * Required. The domain trust to validate trust state for. 79 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED]; 82 * @return The trust. 84 com.google.cloud.managedidentities.v1.Trust getTrust(); in getTrust() 89 * Required. The domain trust to validate trust state for. 93 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
|
| D | AttachTrustRequest.java | 129 private com.google.cloud.managedidentities.v1.Trust trust_; 134 * Required. The domain trust resource. 138 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED]; 141 * @return Whether the trust field is set. 151 * Required. The domain trust resource. 155 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED]; 158 * @return The trust. 161 public com.google.cloud.managedidentities.v1.Trust getTrust() { in getTrust() 163 ? com.google.cloud.managedidentities.v1.Trust.getDefaultInstance() in getTrust() 170 * Required. The domain trust resource. [all …]
|
| D | DetachTrustRequest.java | 129 private com.google.cloud.managedidentities.v1.Trust trust_; 134 * Required. The domain trust resource to removed. 138 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED]; 141 * @return Whether the trust field is set. 151 * Required. The domain trust resource to removed. 155 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED]; 158 * @return The trust. 161 public com.google.cloud.managedidentities.v1.Trust getTrust() { in getTrust() 163 ? com.google.cloud.managedidentities.v1.Trust.getDefaultInstance() in getTrust() 170 * Required. The domain trust resource to removed. [all …]
|
| D | AttachTrustRequestOrBuilder.java | 61 * Required. The domain trust resource. 65 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED]; 68 * @return Whether the trust field is set. 75 * Required. The domain trust resource. 79 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED]; 82 * @return The trust. 84 com.google.cloud.managedidentities.v1.Trust getTrust(); in getTrust() 89 * Required. The domain trust resource. 93 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
|
| D | DetachTrustRequestOrBuilder.java | 61 * Required. The domain trust resource to removed. 65 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED]; 68 * @return Whether the trust field is set. 75 * Required. The domain trust resource to removed. 79 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED]; 82 * @return The trust. 84 com.google.cloud.managedidentities.v1.Trust getTrust(); in getTrust() 89 * Required. The domain trust resource to removed. 93 * .google.cloud.managedidentities.v1.Trust trust = 2 [(.google.api.field_behavior) = REQUIRED];
|
| /external/cronet/tot/third_party/boringssl/src/pki/ |
| D | trust_store_collection_unittest.cc | 79 CertificateTrust trust = collection.GetTrust(newroot_.get()); in TEST_F() local 81 trust.ToDebugString()); in TEST_F() 84 trust = collection.GetTrust(oldroot_.get()); in TEST_F() 86 trust.ToDebugString()); in TEST_F() 107 CertificateTrust trust = collection.GetTrust(newroot_.get()); in TEST_F() local 109 trust.ToDebugString()); in TEST_F() 112 trust = collection.GetTrust(newrootrollover_.get()); in TEST_F() 114 trust.ToDebugString()); in TEST_F() 135 CertificateTrust trust = collection.GetTrust(newroot_.get()); in TEST_F() local 137 trust.ToDebugString()); in TEST_F() [all …]
|
| D | trust_store.cc | 137 CertificateTrust trust; in FromDebugString() local 140 trust = CertificateTrust::ForUnspecified(); in FromDebugString() 142 trust = CertificateTrust::ForDistrusted(); in FromDebugString() 144 trust = CertificateTrust::ForTrustAnchor(); in FromDebugString() 146 trust = CertificateTrust::ForTrustAnchorOrLeaf(); in FromDebugString() 148 trust = CertificateTrust::ForTrustedLeaf(); in FromDebugString() 155 trust = trust.WithEnforceAnchorExpiry(); in FromDebugString() 157 trust = trust.WithEnforceAnchorConstraints(); in FromDebugString() 159 trust = trust.WithRequireAnchorBasicConstraints(); in FromDebugString() 161 trust = trust.WithRequireLeafSelfSigned(); in FromDebugString() [all …]
|
| /external/cronet/stable/third_party/boringssl/src/pki/ |
| D | trust_store_collection_unittest.cc | 79 CertificateTrust trust = collection.GetTrust(newroot_.get()); in TEST_F() local 81 trust.ToDebugString()); in TEST_F() 84 trust = collection.GetTrust(oldroot_.get()); in TEST_F() 86 trust.ToDebugString()); in TEST_F() 107 CertificateTrust trust = collection.GetTrust(newroot_.get()); in TEST_F() local 109 trust.ToDebugString()); in TEST_F() 112 trust = collection.GetTrust(newrootrollover_.get()); in TEST_F() 114 trust.ToDebugString()); in TEST_F() 135 CertificateTrust trust = collection.GetTrust(newroot_.get()); in TEST_F() local 137 trust.ToDebugString()); in TEST_F() [all …]
|
| D | trust_store.cc | 137 CertificateTrust trust; in FromDebugString() local 140 trust = CertificateTrust::ForUnspecified(); in FromDebugString() 142 trust = CertificateTrust::ForDistrusted(); in FromDebugString() 144 trust = CertificateTrust::ForTrustAnchor(); in FromDebugString() 146 trust = CertificateTrust::ForTrustAnchorOrLeaf(); in FromDebugString() 148 trust = CertificateTrust::ForTrustedLeaf(); in FromDebugString() 155 trust = trust.WithEnforceAnchorExpiry(); in FromDebugString() 157 trust = trust.WithEnforceAnchorConstraints(); in FromDebugString() 159 trust = trust.WithRequireAnchorBasicConstraints(); in FromDebugString() 161 trust = trust.WithRequireLeafSelfSigned(); in FromDebugString() [all …]
|
| /external/boringssl/src/crypto/x509/ |
| D | x509_trs.cc | 22 int trust; member 27 static int trust_1oidany(const X509_TRUST *trust, X509 *x); 28 static int trust_compat(const X509_TRUST *trust, X509 *x); 42 if (trstandard[i].trust == id) { in X509_TRUST_get0() 63 // Unknown trust IDs are silently reintrepreted as NIDs. This is unreachable in X509_check_trust() 65 // Note this relies on commonly-used NIDs and trust IDs not colliding. in X509_check_trust() 71 int X509_is_valid_trust_id(int trust) { in X509_is_valid_trust_id() argument 72 return X509_TRUST_get0(trust) != NULL; in X509_is_valid_trust_id() 75 static int trust_1oidany(const X509_TRUST *trust, X509 *x) { in trust_1oidany() argument 76 if (x->aux && (x->aux->trust || x->aux->reject)) { in trust_1oidany() [all …]
|
| /external/cronet/tot/net/data/ssl/chrome_root_store/ |
| D | faq.md | 22 Root stores, sometimes called “trust stores,” tell operating systems and 23 applications what certificates to trust. 67 [considers](#does-the-chrome-certificate-verifier-consider-local-trust-decisions) 125 ### Does the Chrome Certificate Verifier consider local trust decisions? 133 - Trust: 136 - Enterprise Trust -> Enterprise -> Trusted Root Certification Authorities 137 - Enterprise Trust -> Enterprise -> Trusted People 138 - Enterprise Trust -> Group Policy -> Trusted Root Certification Authorities 139 - Enterprise Trust -> Group Policy -> Trusted People 142 - Enterprise Trust -> Enterprise -> Untrusted Certificates [all …]
|
| /external/cronet/stable/net/data/ssl/chrome_root_store/ |
| D | faq.md | 22 Root stores, sometimes called “trust stores,” tell operating systems and 23 applications what certificates to trust. 67 [considers](#does-the-chrome-certificate-verifier-consider-local-trust-decisions) 125 ### Does the Chrome Certificate Verifier consider local trust decisions? 133 - Trust: 136 - Enterprise Trust -> Enterprise -> Trusted Root Certification Authorities 137 - Enterprise Trust -> Enterprise -> Trusted People 138 - Enterprise Trust -> Group Policy -> Trusted Root Certification Authorities 139 - Enterprise Trust -> Group Policy -> Trusted People 142 - Enterprise Trust -> Enterprise -> Untrusted Certificates [all …]
|
| /external/rust/android-crates-io/crates/quiche/deps/boringssl/src/crypto/x509/ |
| D | x509_trs.c | 69 static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); 70 static int trust_1oid(X509_TRUST *trust, X509 *x, int flags); 71 static int trust_compat(X509_TRUST *trust, X509 *x, int flags); 77 * WARNING: the following table should be kept in order of trust and without 78 * any gaps so we can just subtract the minimum trust value to get an index 106 return (*a)->trust - (*b)->trust; in tr_cmp() 109 int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, in X509_TRUST_set_default() 113 default_trust = trust; in X509_TRUST_set_default() 161 tmp.trust = id; in X509_TRUST_get_by_id() 171 int X509_TRUST_set(int *t, int trust) in X509_TRUST_set() argument [all …]
|
| /external/googleapis/google/cloud/managedidentities/v1beta1/ |
| D | resource.proto | 119 repeated Trust trusts = 15 [(google.api.field_behavior) = OUTPUT_ONLY]; 124 message Trust { message 125 // Represents the different states of a domain trust. 130 // The domain trust is being created. 133 // The domain trust is being updated. 136 // The domain trust is being deleted. 139 // The domain trust is connected. 142 // The domain trust is disconnected. 146 // Represents the different inter-forest trust types. 151 // The forest trust. [all …]
|
| /external/googleapis/google/cloud/managedidentities/v1/ |
| D | resource.proto | 117 repeated Trust trusts = 15 [(google.api.field_behavior) = OUTPUT_ONLY]; 122 message Trust { message 123 // Represents the different states of a domain trust. 128 // The domain trust is being created. 131 // The domain trust is being updated. 134 // The domain trust is being deleted. 137 // The domain trust is connected. 140 // The domain trust is disconnected. 144 // Represents the different inter-forest trust types. 149 // The forest trust. [all …]
|
| /external/google-cloud-java/java-managed-identities/proto-google-cloud-managed-identities-v1/src/main/proto/google/cloud/managedidentities/v1/ |
| D | resource.proto | 117 repeated Trust trusts = 15 [(google.api.field_behavior) = OUTPUT_ONLY]; 122 message Trust { message 123 // Represents the different states of a domain trust. 128 // The domain trust is being created. 131 // The domain trust is being updated. 134 // The domain trust is being deleted. 137 // The domain trust is connected. 140 // The domain trust is disconnected. 144 // Represents the different inter-forest trust types. 149 // The forest trust. [all …]
|
| /external/cronet/stable/net/cert/internal/ |
| D | trust_store_nss.cc | 136 bssl::CertificateTrust trust) in ListCertsResult() argument 137 : cert(std::move(cert)), trust(trust) {} in ListCertsResult() 176 // certs that are valid at |sorttime|. Expiration isn't meaningful for trust in SyncGetIssuersOf() 263 // matching trust object. Do we need to do that too? (this pk11_isID0 thing: 275 // Find a matching NSS certificate object, if any. Note that NSS trust in GetTrust() 306 // See if NSS has any trust settings for the certificate at all. If not, in GetTrustIgnoringSystemTrust() 310 DVLOG(1) << "skipped cert that has no trust settings"; in GetTrustIgnoringSystemTrust() 314 // If there were trust settings, we may not be able to use the NSS calculated in GetTrustIgnoringSystemTrust() 315 // trust settings directly, since we don't know which slot those settings in GetTrustIgnoringSystemTrust() 316 // came from. Do a more careful check to only honor trust settings from slots in GetTrustIgnoringSystemTrust() [all …]
|
| D | trust_store_mac.cc | 54 // The rules for interpreting trust settings are documented at: 57 // Indicates the trust status of a certificate. 59 // Trust status is unknown / uninitialized. 61 // Certificate inherits trust value from its issuer. If the certificate is the 64 // Certificate is a trust anchor. 73 // Mac trust settings don't distinguish between trusted anchors and in TrustStatusToCertificateTrust() 74 // trusted leafs, return a trust record valid for both, which will in TrustStatusToCertificateTrust() 76 bssl::CertificateTrust trust = in TrustStatusToCertificateTrust() local 81 return trust; in TrustStatusToCertificateTrust() 96 // Returns trust status of usage constraints dictionary |trust_dict| for a [all …]
|
| /external/cronet/tot/net/cert/internal/ |
| D | trust_store_nss.cc | 136 bssl::CertificateTrust trust) in ListCertsResult() argument 137 : cert(std::move(cert)), trust(trust) {} in ListCertsResult() 176 // certs that are valid at |sorttime|. Expiration isn't meaningful for trust in SyncGetIssuersOf() 263 // matching trust object. Do we need to do that too? (this pk11_isID0 thing: 275 // Find a matching NSS certificate object, if any. Note that NSS trust in GetTrust() 306 // See if NSS has any trust settings for the certificate at all. If not, in GetTrustIgnoringSystemTrust() 310 DVLOG(1) << "skipped cert that has no trust settings"; in GetTrustIgnoringSystemTrust() 314 // If there were trust settings, we may not be able to use the NSS calculated in GetTrustIgnoringSystemTrust() 315 // trust settings directly, since we don't know which slot those settings in GetTrustIgnoringSystemTrust() 316 // came from. Do a more careful check to only honor trust settings from slots in GetTrustIgnoringSystemTrust() [all …]
|
| D | trust_store_mac.cc | 54 // The rules for interpreting trust settings are documented at: 57 // Indicates the trust status of a certificate. 59 // Trust status is unknown / uninitialized. 61 // Certificate inherits trust value from its issuer. If the certificate is the 64 // Certificate is a trust anchor. 73 // Mac trust settings don't distinguish between trusted anchors and in TrustStatusToCertificateTrust() 74 // trusted leafs, return a trust record valid for both, which will in TrustStatusToCertificateTrust() 76 bssl::CertificateTrust trust = in TrustStatusToCertificateTrust() local 81 return trust; in TrustStatusToCertificateTrust() 96 // Returns trust status of usage constraints dictionary |trust_dict| for a [all …]
|
| /external/google-cloud-java/java-managed-identities/google-cloud-managed-identities/src/test/java/com/google/cloud/managedidentities/v1/ |
| D | ManagedIdentitiesServiceClientTest.java | 105 .addAllTrusts(new ArrayList<Trust>()) in createMicrosoftAdDomainTest() 168 .addAllTrusts(new ArrayList<Trust>()) in createMicrosoftAdDomainTest2() 391 .addAllTrusts(new ArrayList<Trust>()) in getDomainTest() 439 .addAllTrusts(new ArrayList<Trust>()) in getDomainTest2() 487 .addAllTrusts(new ArrayList<Trust>()) in updateDomainTest() 630 .addAllTrusts(new ArrayList<Trust>()) in attachTrustTest() 641 Trust trust = Trust.newBuilder().build(); in attachTrustTest() local 643 Domain actualResponse = client.attachTrustAsync(name, trust).get(); in attachTrustTest() 651 Assert.assertEquals(trust, actualRequest.getTrust()); in attachTrustTest() 665 Trust trust = Trust.newBuilder().build(); in attachTrustExceptionTest() local [all …]
|