Home
last modified time | relevance | path

Searched refs:trusted (Results 1 – 25 of 29) sorted by relevance

12

/external/sepolicy/
Dmls21 # Process transition: Require equivalence unless the subject is trusted.
25 # Process read operations: No read up unless trusted.
29 # Process write operations: No write down unless trusted.
44 # trusted.
49 # is trusted.
58 # the subject is trusted. Also, files should always be single-level.
69 # Subject must be equivalent to object unless the subject is trusted.
80 # or the object is trusted.
88 # subject or the object is trusted.
98 # is a MLS trusted subject and can receive data at any level.
[all …]
/external/openssl/apps/
Dverify.c86 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; in MAIN()
211 trusted = load_certs(bio_err, trustfile, FORMAT_PEM, in MAIN()
213 if(!trusted) in MAIN()
225 if (argc < 1) check(cert_ctx, NULL, untrusted, trusted, crls, e); in MAIN()
228 check(cert_ctx,argv[i], untrusted, trusted, crls, e); in MAIN()
249 sk_X509_pop_free(trusted, X509_free); in MAIN()
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
Dx509v3.h101 int x509_certificate_chain_validate(struct x509_certificate *trusted,
133 x509_certificate_chain_validate(struct x509_certificate *trusted, in x509_certificate_chain_validate() argument
Dx509v3.c1572 int x509_certificate_chain_validate(struct x509_certificate *trusted, in x509_certificate_chain_validate() argument
1648 for (trust = trusted; trust; trust = trust->next) { in x509_certificate_chain_validate()
1679 if (trusted) { in x509_certificate_chain_validate()
/external/webkit/Source/WebCore/page/
DWindowFeatures.cpp176 const bool trusted = false; in WindowFeatures() local
207 statusBarVisible = boolFeature(features, "status", !trusted); in WindowFeatures()
/external/chromium/net/base/
Dcert_database_nss.cc241 unsigned int trusted) { in SetCertTrust() argument
242 bool success = psm::SetCertTrust(cert, type, trusted); in SetCertTrust()
/external/wpa_supplicant_8/src/tls/
Dx509v3.h115 int x509_certificate_chain_validate(struct x509_certificate *trusted,
Dx509v3.c1829 int x509_certificate_chain_validate(struct x509_certificate *trusted, in x509_certificate_chain_validate() argument
1906 for (trust = trusted; trust; trust = trust->next) { in x509_certificate_chain_validate()
1937 if (trusted) { in x509_certificate_chain_validate()
/external/guava/
DREADME40 You should not use them for communication between trusted and
/external/bouncycastle/src/main/java/org/bouncycastle/x509/
DCertPathReviewerMessages.properties155 # {1} number of trusted root certificates (trustanchors) provided
156 CertPathReviewer.noTrustAnchorFound.title = No trusted root certificate found
157 …ficate of the certificate path was issued by a CA that is not in the the trusted-root-certificate-…
158 …ficate of the certificate path was issued by a CA that is not in the the trusted-root-certificate-…
159 …CA that is not in the the trusted-root-certificate-store used for the path validation. The name of…
165 …tingTrustAnchors.text = Warning: corrupt trust root store: There are {0} trusted public keys for t…
166 …gTrustAnchors.summary = Warning: corrupt trust root store: There are {0} trusted public keys for t…
167 …gTrustAnchors.details = Warning: corrupt trust root store: There are {0} trusted public keys for t…
/external/wpa_supplicant_6/wpa_supplicant/
Dwpa_supplicant.conf.orig369 # or more trusted CA certificates. If ca_cert and ca_path are not
371 # a trusted CA certificate should always be configured when using
374 # On Windows, trusted CA certificates can be loaded from the system
382 # is to point to system trusted CA list which is often installed into
384 # added to the list of trusted CAs. ca_cert may also be included in that
463 # trusted CA certificates. If ca_cert2 and ca_path2 are not included,
464 # server certificate will not be verified. This is insecure and a trusted
/external/webkit/Tools/DumpRenderTree/mac/
DObjCPlugin.m36 // for testing inside of DumpRenderTree, and only with trusted code. By default, it has
/external/bluetooth/bluez/src/
Dstorage.c668 gboolean trusted; in write_trust() local
680 trusted = match ? TRUE : FALSE; in write_trust()
683 if (trusted == trust) { in write_trust()
Ddevice.c132 gboolean trusted; member
236 return device->trusted; in device_is_trusted()
393 if (device->trusted == value) in set_trust()
404 device->trusted = value; in set_trust()
988 device->trusted = read_trust(&src, address, GLOBAL_TRUST); in device_create()
/external/openssh/
Dclientloop.c287 u_int trusted, u_int timeout, char **_proto, char **_data) in client_x11_get_proto() argument
323 if (trusted == 0) { in client_x11_get_proto()
353 if (trusted || generated) { in client_x11_get_proto()
Dsshd.0297 that is trusted to validate signed certificates for user
379 ignored for keys that are not marked as trusted certificate
442 trusted as a certification authority, it must use the ``@cert-authority''
DPROTOCOL.certkeys19 with some other trusted key.
Dsshd_config.0110 authorities trusted via ~/.ssh/authorized_keys, though the
589 authorities that are trusted to sign user certificates for
Dssh.0377 -Y Enables trusted X11 forwarding. Trusted X11 forwardings are not
451 trusted certification authority can be used in place of many
Dssh-keygen.0397 public key must be trusted by sshd(8) or ssh(1). Please refer to those
/external/bluetooth/bluez/doc/
Ddevice-api.txt158 Indicates if the remote is seen as trusted. This
/external/bluetooth/bluez/
DTODO152 authorization per characteristic if the remote is not in the trusted list.
/external/webkit/Source/WebKit/qt/docs/
Dqtwebkit-bridge.qdoc416 …shouldn't be open, and whether the web content loaded by that web page comes from a trusted source…
419 …access to trusted URLs only with HTTPS, and by utilizing other measures as part of a security stra…
/external/llvm/docs/HistoricalNotes/
D2000-11-18-EarlyDesignIdeasResp.txt38 the trusted compiler generated the code. This would be much quicker
/external/wpa_supplicant_8/wpa_supplicant/
DChangeLog10 certificate) instead of trusted CA certificate configuration
630 * added support for loading trusted CA certificates from Windows
686 system-wide trusted CA list

12