/external/sepolicy/ |
D | mls | 21 # Process transition: Require equivalence unless the subject is trusted. 25 # Process read operations: No read up unless trusted. 29 # Process write operations: No write down unless trusted. 44 # trusted. 49 # is trusted. 58 # the subject is trusted. Also, files should always be single-level. 69 # Subject must be equivalent to object unless the subject is trusted. 80 # or the object is trusted. 88 # subject or the object is trusted. 98 # is a MLS trusted subject and can receive data at any level. [all …]
|
/external/openssl/apps/ |
D | verify.c | 86 STACK_OF(X509) *untrusted = NULL, *trusted = NULL; in MAIN() 211 trusted = load_certs(bio_err, trustfile, FORMAT_PEM, in MAIN() 213 if(!trusted) in MAIN() 225 if (argc < 1) check(cert_ctx, NULL, untrusted, trusted, crls, e); in MAIN() 228 check(cert_ctx,argv[i], untrusted, trusted, crls, e); in MAIN() 249 sk_X509_pop_free(trusted, X509_free); in MAIN()
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
D | x509v3.h | 101 int x509_certificate_chain_validate(struct x509_certificate *trusted, 133 x509_certificate_chain_validate(struct x509_certificate *trusted, in x509_certificate_chain_validate() argument
|
D | x509v3.c | 1572 int x509_certificate_chain_validate(struct x509_certificate *trusted, in x509_certificate_chain_validate() argument 1648 for (trust = trusted; trust; trust = trust->next) { in x509_certificate_chain_validate() 1679 if (trusted) { in x509_certificate_chain_validate()
|
/external/webkit/Source/WebCore/page/ |
D | WindowFeatures.cpp | 176 const bool trusted = false; in WindowFeatures() local 207 statusBarVisible = boolFeature(features, "status", !trusted); in WindowFeatures()
|
/external/chromium/net/base/ |
D | cert_database_nss.cc | 241 unsigned int trusted) { in SetCertTrust() argument 242 bool success = psm::SetCertTrust(cert, type, trusted); in SetCertTrust()
|
/external/wpa_supplicant_8/src/tls/ |
D | x509v3.h | 115 int x509_certificate_chain_validate(struct x509_certificate *trusted,
|
D | x509v3.c | 1829 int x509_certificate_chain_validate(struct x509_certificate *trusted, in x509_certificate_chain_validate() argument 1906 for (trust = trusted; trust; trust = trust->next) { in x509_certificate_chain_validate() 1937 if (trusted) { in x509_certificate_chain_validate()
|
/external/guava/ |
D | README | 40 You should not use them for communication between trusted and
|
/external/bouncycastle/src/main/java/org/bouncycastle/x509/ |
D | CertPathReviewerMessages.properties | 155 # {1} number of trusted root certificates (trustanchors) provided 156 CertPathReviewer.noTrustAnchorFound.title = No trusted root certificate found 157 …ficate of the certificate path was issued by a CA that is not in the the trusted-root-certificate-… 158 …ficate of the certificate path was issued by a CA that is not in the the trusted-root-certificate-… 159 …CA that is not in the the trusted-root-certificate-store used for the path validation. The name of… 165 …tingTrustAnchors.text = Warning: corrupt trust root store: There are {0} trusted public keys for t… 166 …gTrustAnchors.summary = Warning: corrupt trust root store: There are {0} trusted public keys for t… 167 …gTrustAnchors.details = Warning: corrupt trust root store: There are {0} trusted public keys for t…
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | wpa_supplicant.conf.orig | 369 # or more trusted CA certificates. If ca_cert and ca_path are not 371 # a trusted CA certificate should always be configured when using 374 # On Windows, trusted CA certificates can be loaded from the system 382 # is to point to system trusted CA list which is often installed into 384 # added to the list of trusted CAs. ca_cert may also be included in that 463 # trusted CA certificates. If ca_cert2 and ca_path2 are not included, 464 # server certificate will not be verified. This is insecure and a trusted
|
/external/webkit/Tools/DumpRenderTree/mac/ |
D | ObjCPlugin.m | 36 // for testing inside of DumpRenderTree, and only with trusted code. By default, it has
|
/external/bluetooth/bluez/src/ |
D | storage.c | 668 gboolean trusted; in write_trust() local 680 trusted = match ? TRUE : FALSE; in write_trust() 683 if (trusted == trust) { in write_trust()
|
D | device.c | 132 gboolean trusted; member 236 return device->trusted; in device_is_trusted() 393 if (device->trusted == value) in set_trust() 404 device->trusted = value; in set_trust() 988 device->trusted = read_trust(&src, address, GLOBAL_TRUST); in device_create()
|
/external/openssh/ |
D | clientloop.c | 287 u_int trusted, u_int timeout, char **_proto, char **_data) in client_x11_get_proto() argument 323 if (trusted == 0) { in client_x11_get_proto() 353 if (trusted || generated) { in client_x11_get_proto()
|
D | sshd.0 | 297 that is trusted to validate signed certificates for user 379 ignored for keys that are not marked as trusted certificate 442 trusted as a certification authority, it must use the ``@cert-authority''
|
D | PROTOCOL.certkeys | 19 with some other trusted key.
|
D | sshd_config.0 | 110 authorities trusted via ~/.ssh/authorized_keys, though the 589 authorities that are trusted to sign user certificates for
|
D | ssh.0 | 377 -Y Enables trusted X11 forwarding. Trusted X11 forwardings are not 451 trusted certification authority can be used in place of many
|
D | ssh-keygen.0 | 397 public key must be trusted by sshd(8) or ssh(1). Please refer to those
|
/external/bluetooth/bluez/doc/ |
D | device-api.txt | 158 Indicates if the remote is seen as trusted. This
|
/external/bluetooth/bluez/ |
D | TODO | 152 authorization per characteristic if the remote is not in the trusted list.
|
/external/webkit/Source/WebKit/qt/docs/ |
D | qtwebkit-bridge.qdoc | 416 …shouldn't be open, and whether the web content loaded by that web page comes from a trusted source… 419 …access to trusted URLs only with HTTPS, and by utilizing other measures as part of a security stra…
|
/external/llvm/docs/HistoricalNotes/ |
D | 2000-11-18-EarlyDesignIdeasResp.txt | 38 the trusted compiler generated the code. This would be much quicker
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ChangeLog | 10 certificate) instead of trusted CA certificate configuration 630 * added support for loading trusted CA certificates from Windows 686 system-wide trusted CA list
|