/external/llvm-project/lldb/scripts/ |
D | macos-setup-codesign.sh | 3 CERT="lldb_codesign" 12 rm -f "$TMPDIR/$CERT.tmpl" "$TMPDIR/$CERT.cer" "$TMPDIR/$CERT.key" > /dev/null 2>&1 18 security find-certificate -Z -p -c "$CERT" /Library/Keychains/System.keychain > /dev/null 2>&1 25 cat <<EOF >$TMPDIR/$CERT.tmpl 33 commonName = "$CERT" 42 …3650 -nodes -config "$TMPDIR/$CERT.tmpl" -extensions codesign_reqext -batch -out "$TMPDIR/$CERT.ce… 46 … -r trustRoot -p codeSign -k /Library/Keychains/System.keychain "$TMPDIR/$CERT.cer" > /dev/null 2>… 50 sudo security import "$TMPDIR/$CERT.key" -A -k /Library/Keychains/System.keychain > /dev/null 2>&1
|
/external/libwebsockets/lib/tls/mbedtls/wrapper/library/ |
D | ssl_cert.c | 24 CERT *__ssl_cert_new(CERT *ic) in __ssl_cert_new() 26 CERT *cert; in __ssl_cert_new() 31 cert = ssl_mem_zalloc(sizeof(CERT)); in __ssl_cert_new() 70 CERT *ssl_cert_new(void) in ssl_cert_new() 78 void ssl_cert_free(CERT *cert) in ssl_cert_free()
|
/external/libwebsockets/lib/tls/mbedtls/wrapper/include/internal/ |
D | ssl_cert.h | 31 CERT *__ssl_cert_new(CERT *ic); 40 CERT* ssl_cert_new(void); 49 void ssl_cert_free(CERT *cert);
|
D | ssl_types.h | 81 typedef struct cert_st CERT; typedef 176 CERT *cert; 207 CERT *cert;
|
/external/boringssl/src/ssl/ |
D | tls_method.cc | 171 static void ssl_noop_x509_clear(CERT *cert) {} in ssl_noop_x509_clear() 172 static void ssl_noop_x509_free(CERT *cert) {} in ssl_noop_x509_free() 173 static void ssl_noop_x509_dup(CERT *new_cert, const CERT *cert) {} in ssl_noop_x509_dup() 174 static void ssl_noop_x509_flush_cached_leaf(CERT *cert) {} in ssl_noop_x509_flush_cached_leaf() 175 static void ssl_noop_x509_flush_cached_chain(CERT *cert) {} in ssl_noop_x509_flush_cached_chain()
|
D | ssl_cert.cc | 137 CERT::CERT(const SSL_X509_METHOD *x509_method_arg) in CERT() function in CERT 140 CERT::~CERT() { in ~CERT() 150 UniquePtr<CERT> ssl_cert_dup(CERT *cert) { in ssl_cert_dup() 151 UniquePtr<CERT> ret = MakeUnique<CERT>(cert->x509_method); in ssl_cert_dup() 196 void ssl_cert_clear_certs(CERT *cert) { in ssl_cert_clear_certs() 212 static void ssl_cert_set_cert_cb(CERT *cert, int (*cb)(SSL *ssl, void *arg), in ssl_cert_set_cert_cb() 264 CERT *cert, CRYPTO_BUFFER *const *certs, size_t num_certs, in cert_set_chain_and_key() 305 bool ssl_set_cert(CERT *cert, UniquePtr<CRYPTO_BUFFER> buffer) { in ssl_set_cert() 518 bool ssl_cert_check_private_key(const CERT *cert, const EVP_PKEY *privkey) { in ssl_cert_check_private_key() 809 const CERT *cert = hs->config->cert.get(); in ssl_can_serve_dc() [all …]
|
D | ssl_x509.cc | 203 static bool ssl_cert_set_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set_chain() 238 static void ssl_crypto_x509_cert_flush_cached_leaf(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_leaf() 243 static void ssl_crypto_x509_cert_flush_cached_chain(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_chain() 263 static void ssl_crypto_x509_cert_clear(CERT *cert) { in ssl_crypto_x509_cert_clear() 271 static void ssl_crypto_x509_cert_free(CERT *cert) { in ssl_crypto_x509_cert_free() 276 static void ssl_crypto_x509_cert_dup(CERT *new_cert, const CERT *cert) { in ssl_crypto_x509_cert_dup() 728 static int ssl_use_certificate(CERT *cert, X509 *x) { in ssl_use_certificate() 757 static int ssl_cert_cache_leaf_cert(CERT *cert) { in ssl_cert_cache_leaf_cert() 774 static X509 *ssl_cert_get0_leaf(CERT *cert) { in ssl_cert_get0_leaf() 798 static int ssl_cert_set0_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set0_chain() [all …]
|
D | internal.h | 2061 struct CERT { 2064 explicit CERT(const SSL_X509_METHOD *x509_method); 2065 ~CERT(); 2232 void (*cert_clear)(CERT *cert); 2234 void (*cert_free)(CERT *cert); 2238 void (*cert_dup)(CERT *new_cert, const CERT *cert); 2239 void (*cert_flush_cached_chain)(CERT *cert); 2242 void (*cert_flush_cached_leaf)(CERT *cert); 2696 UniquePtr<CERT> cert; 2807 UniquePtr<CERT> ssl_cert_dup(CERT *cert); [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | tls_method.cc | 171 static void ssl_noop_x509_clear(CERT *cert) {} in ssl_noop_x509_clear() 172 static void ssl_noop_x509_free(CERT *cert) {} in ssl_noop_x509_free() 173 static void ssl_noop_x509_dup(CERT *new_cert, const CERT *cert) {} in ssl_noop_x509_dup() 174 static void ssl_noop_x509_flush_cached_leaf(CERT *cert) {} in ssl_noop_x509_flush_cached_leaf() 175 static void ssl_noop_x509_flush_cached_chain(CERT *cert) {} in ssl_noop_x509_flush_cached_chain()
|
D | ssl_cert.cc | 137 CERT::CERT(const SSL_X509_METHOD *x509_method_arg) in CERT() function in CERT 140 CERT::~CERT() { in ~CERT() 150 UniquePtr<CERT> ssl_cert_dup(CERT *cert) { in ssl_cert_dup() 151 UniquePtr<CERT> ret = MakeUnique<CERT>(cert->x509_method); in ssl_cert_dup() 196 void ssl_cert_clear_certs(CERT *cert) { in ssl_cert_clear_certs() 212 static void ssl_cert_set_cert_cb(CERT *cert, int (*cb)(SSL *ssl, void *arg), in ssl_cert_set_cert_cb() 264 CERT *cert, CRYPTO_BUFFER *const *certs, size_t num_certs, in cert_set_chain_and_key() 305 bool ssl_set_cert(CERT *cert, UniquePtr<CRYPTO_BUFFER> buffer) { in ssl_set_cert() 518 bool ssl_cert_check_private_key(const CERT *cert, const EVP_PKEY *privkey) { in ssl_cert_check_private_key() 809 const CERT *cert = hs->config->cert.get(); in ssl_can_serve_dc() [all …]
|
D | ssl_x509.cc | 203 static bool ssl_cert_set_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set_chain() 238 static void ssl_crypto_x509_cert_flush_cached_leaf(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_leaf() 243 static void ssl_crypto_x509_cert_flush_cached_chain(CERT *cert) { in ssl_crypto_x509_cert_flush_cached_chain() 263 static void ssl_crypto_x509_cert_clear(CERT *cert) { in ssl_crypto_x509_cert_clear() 271 static void ssl_crypto_x509_cert_free(CERT *cert) { in ssl_crypto_x509_cert_free() 276 static void ssl_crypto_x509_cert_dup(CERT *new_cert, const CERT *cert) { in ssl_crypto_x509_cert_dup() 728 static int ssl_use_certificate(CERT *cert, X509 *x) { in ssl_use_certificate() 757 static int ssl_cert_cache_leaf_cert(CERT *cert) { in ssl_cert_cache_leaf_cert() 774 static X509 *ssl_cert_get0_leaf(CERT *cert) { in ssl_cert_get0_leaf() 798 static int ssl_cert_set0_chain(CERT *cert, STACK_OF(X509) *chain) { in ssl_cert_set0_chain() [all …]
|
D | internal.h | 2018 struct CERT { 2021 explicit CERT(const SSL_X509_METHOD *x509_method); 2022 ~CERT(); 2189 void (*cert_clear)(CERT *cert); 2191 void (*cert_free)(CERT *cert); 2195 void (*cert_dup)(CERT *new_cert, const CERT *cert); 2196 void (*cert_flush_cached_chain)(CERT *cert); 2199 void (*cert_flush_cached_leaf)(CERT *cert); 2650 UniquePtr<CERT> cert; 2753 UniquePtr<CERT> ssl_cert_dup(CERT *cert); [all …]
|
/external/llvm-project/clang-tools-extra/clang-tidy/cert/ |
D | LICENSE.TXT | 2 clang-tidy CERT Files 7 Any file referencing a CERT Secure Coding guideline: 9 http://llvm.org are permitted to link via hypertext to the CERT(R) secure coding
|
/external/llvm-project/clang-tools-extra/docs/clang-tidy/checks/ |
D | cert-err09-cpp.rst | 12 This check corresponds to the CERT C++ Coding Standard recommendation 13 ERR09-CPP. Throw anonymous temporaries. However, all of the CERT recommendations
|
D | cert-oop11-cpp.rst | 12 This check corresponds to the CERT C++ Coding Standard recommendation 14 constructor. However, all of the CERT recommendations have been removed from
|
D | bugprone-spuriously-wake-up-functions.rst | 24 This check corresponds to the CERT C++ Coding Standard rule 27 and CERT C Coding Standard rule
|
D | cert-dcl21-cpp.rst | 20 This check corresponds to the CERT C++ Coding Standard recommendation 22 const object. However, all of the CERT recommendations have been removed from
|
D | misc-throw-by-value-catch-by-reference.rst | 11 the CERT C++ Coding Standard rule `ERR61-CPP. Catch exceptions by lvalue reference 34 Triggers detection of violations of the CERT recommendation ERR09-CPP. Throw
|
D | cert-err52-cpp.rst | 8 This check corresponds to the CERT C++ Coding Standard rule
|
D | cert-err60-cpp.rst | 9 This check corresponds to the CERT C++ Coding Standard rule
|
D | cert-dcl50-cpp.rst | 9 This check corresponds to the CERT C++ Coding Standard rule
|
D | cert-oop58-cpp.rst | 9 This check corresponds to the CERT C Coding Standard rule
|
D | cert-err58-cpp.rst | 9 This check corresponds to the CERT C++ Coding Standard rule
|
D | cert-flp30-c.rst | 9 This check corresponds to the CERT C Coding Standard rule
|
/external/python/cryptography/docs/ |
D | limitations.rst | 14 `CERT secure coding guidelines`_ assesses this issue as "Severity: medium, 19 .. _`CERT secure coding guidelines`: https://www.securecoding.cert.org/confluence/display/c/MEM03-C…
|