Searched +full:thread +full:- +full:cert (Results 1 – 25 of 412) sorted by relevance
12345678910>>...17
| /external/openthread/script/ |
| D | test | 33 set -euo pipefail 35 OT_BUILDDIR="${OT_BUILDDIR:-${PWD}/build}" 53 OT_NODE_TYPE="${OT_NODE_TYPE:-cli}" 56 OT_NATIVE_IP="${OT_NATIVE_IP:-0}" 59 THREAD_VERSION="${THREAD_VERSION:-1.4}" 62 INTER_OP="${INTER_OP:-0}" 65 VERBOSE="${VERBOSE:-0}" 68 BORDER_ROUTING="${BORDER_ROUTING:-1}" 71 NAT64="${NAT64:-0}" 74 NAT64_SERVICE="${NAT64_SERVICE:-openthread}" [all …]
|
| /external/openthread/.github/workflows/ |
| D | simulation-1.4.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 43 permissions: # added using https://github.com/step-security/secure-workflows 48 thread-1-4: 49 name: thread-1-4-${{ matrix.compiler.c }}-${{ matrix.arch }} 50 runs-on: ubuntu-22.04 52 CFLAGS: -${{ matrix.arch }} [all …]
|
| D | simulation-1.1.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 48 packet-verification: 49 runs-on: ubuntu-24.04 57 - name: Harden Runner 58 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2 60 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs [all …]
|
| D | otbr.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 48 backbone-router: 49 runs-on: ubuntu-22.04 65 - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2 68 - name: Build OTBR Docker 73 - name: Bootstrap [all …]
|
| D | posix.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 48 expects-linux: 49 runs-on: ubuntu-22.04 51 CFLAGS: -DCLI_COAP_SECURE_USE_COAP_DEFAULT_HANDLER=1 -DOPENTHREAD_CONFIG_MLE_MAX_CHILDREN=15 52 CXXFLAGS: -DCLI_COAP_SECURE_USE_COAP_DEFAULT_HANDLER=1 -DOPENTHREAD_CONFIG_MLE_MAX_CHILDREN=15 54 - name: Harden Runner [all …]
|
| /external/cronet/tot/net/cert/ |
| D | nss_cert_database.h | 2 // Use of this source code is governed by a BSD-style license that can be 23 #include "net/cert/cert_type.h" 24 #include "net/cert/scoped_nss_types.h" 25 #include "net/cert/x509_certificate.h" 58 ScopedCERTCertificate cert; member 60 // The certificate is stored on a read-only slot. 70 // The certificate is hardware-backed. 73 // The certificate is device-wide. 78 // Stores per-certificate error codes for import failures. 81 ImportCertFailure(ScopedCERTCertificate cert, int err); [all …]
|
| D | x509_util_win.h | 2 // Use of this source code is governed by a BSD-style license that can be 19 #include "net/cert/x509_certificate.h" 31 // Creates an X509Certificate with non-standard parsing options. 46 // preferable for each thread that needs such a context to obtain its own, 47 // rather than risk thread-safety issues by sharing. 49 const X509Certificate* cert); 57 // specifies behavior if intermediates of |cert| could not be converted. 59 const X509Certificate* cert, 62 // Calculates the SHA-256 fingerprint of the certificate. Returns an empty 64 NET_EXPORT SHA256HashValue CalculateFingerprint256(PCCERT_CONTEXT cert); [all …]
|
| /external/cronet/stable/net/cert/ |
| D | nss_cert_database.h | 2 // Use of this source code is governed by a BSD-style license that can be 23 #include "net/cert/cert_type.h" 24 #include "net/cert/scoped_nss_types.h" 25 #include "net/cert/x509_certificate.h" 58 ScopedCERTCertificate cert; member 60 // The certificate is stored on a read-only slot. 70 // The certificate is hardware-backed. 73 // The certificate is device-wide. 78 // Stores per-certificate error codes for import failures. 81 ImportCertFailure(ScopedCERTCertificate cert, int err); [all …]
|
| D | x509_util_win.h | 2 // Use of this source code is governed by a BSD-style license that can be 19 #include "net/cert/x509_certificate.h" 31 // Creates an X509Certificate with non-standard parsing options. 46 // preferable for each thread that needs such a context to obtain its own, 47 // rather than risk thread-safety issues by sharing. 49 const X509Certificate* cert); 57 // specifies behavior if intermediates of |cert| could not be converted. 59 const X509Certificate* cert, 62 // Calculates the SHA-256 fingerprint of the certificate. Returns an empty 64 NET_EXPORT SHA256HashValue CalculateFingerprint256(PCCERT_CONTEXT cert); [all …]
|
| /external/ot-br-posix/.github/workflows/ |
| D | border_router.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 45 border-router: 46 runs-on: ubuntu-22.04 49 fail-fast: false 52 - name: "Border Router (mDNSResponder)" 53 …_options: "-DOT_DUA=ON -DOT_ECDSA=ON -DOT_MLR=ON -DOT_SERVICE=ON -DOT_SRP_SERVER=ON -DOTBR_COVERAG… [all …]
|
| /external/cronet/stable/net/tools/cert_verify_tool/ |
| D | cert_verify_tool.cc | 2 // Use of this source code is governed by a BSD-style license that can be 16 #include "base/threading/thread.h" 19 #include "net/cert/cert_net_fetcher.h" 20 #include "net/cert/cert_verify_proc.h" 21 #include "net/cert/cert_verify_proc_builtin.h" 22 #include "net/cert/crl_set.h" 23 #include "net/cert/do_nothing_ct_verifier.h" 24 #include "net/cert/internal/platform_trust_store.h" 25 #include "net/cert/internal/system_trust_store.h" 26 #include "net/cert/x509_util.h" [all …]
|
| /external/cronet/tot/net/tools/cert_verify_tool/ |
| D | cert_verify_tool.cc | 2 // Use of this source code is governed by a BSD-style license that can be 16 #include "base/threading/thread.h" 19 #include "net/cert/cert_net_fetcher.h" 20 #include "net/cert/cert_verify_proc.h" 21 #include "net/cert/cert_verify_proc_builtin.h" 22 #include "net/cert/crl_set.h" 23 #include "net/cert/do_nothing_ct_verifier.h" 24 #include "net/cert/internal/platform_trust_store.h" 25 #include "net/cert/internal/system_trust_store.h" 26 #include "net/cert/x509_util.h" [all …]
|
| /external/libcups/scheduler/ |
| D | Dependencies | 1 auth.o: auth.c cupsd.h ../cups/cups-private.h ../cups/string-private.h \ 2 ../config.h ../cups/versioning.h ../cups/array-private.h \ 3 ../cups/array.h ../cups/ipp-private.h ../cups/cups.h ../cups/file.h \ 5 ../cups/http-private.h ../cups/language-private.h ../cups/transcode.h \ 6 ../cups/pwg-private.h ../cups/thread-private.h ../cups/file-private.h \ 7 ../cups/ppd-private.h ../cups/ppd.h ../cups/raster.h mime.h sysman.h \ 8 statbuf.h cert.h auth.h client.h policy.h printers.h classes.h job.h \ 10 banners.o: banners.c cupsd.h ../cups/cups-private.h \ 11 ../cups/string-private.h ../config.h ../cups/versioning.h \ 12 ../cups/array-private.h ../cups/array.h ../cups/ipp-private.h \ [all …]
|
| /external/cronet/stable/net/cert/internal/ |
| D | system_trust_store.h | 2 // Use of this source code is governed by a BSD-style license that can be 11 #include "net/cert/internal/platform_trust_store.h" 22 // must be thread-safe. 24 // This is primarily used to abstract out the platform-specific bits that 32 // added trust anchors added via AddTrustAnchor(). This pointer is non-owned, 34 // returned from this method must be thread-safe. 40 // user-installed one. (It may *also* be trusted as a user-installed root.) 41 virtual bool IsKnownRoot(const bssl::ParsedCertificate* cert) const = 0; 45 // platform-specific user-added trust settings. This pointer is non-owned, 47 // objects returned from this method must be thread-safe. [all …]
|
| D | trust_store_mac.cc | 2 // Use of this source code is governed by a BSD-style license that can be 10 #include "net/cert/internal/trust_store_mac.h" 38 #include "net/cert/internal/platform_trust_store.h" 39 #include "net/cert/test_keychain_search_list_mac.h" 40 #include "net/cert/x509_util.h" 41 #include "net/cert/x509_util_apple.h" 55 // https://developer.apple.com/reference/security/1400261-sectrustsettingscopytrustsetting?language… 116 // Trust settings may be scoped using policy-specific constraints. For in IsTrustDictionaryTrustedForPolicy() 119 // As this is not presently supported, skip any policy-specific trust in IsTrustDictionaryTrustedForPolicy() 165 // This is a bit of a hack: if the cert is self-issued allow either in IsTrustDictionaryTrustedForPolicy() [all …]
|
| D | trust_store_win.h | 2 // Use of this source code is governed by a BSD-style license that can be 15 #include "net/cert/internal/platform_trust_store.h" 21 // cert systems to find user-added trust anchors for path building. It ignores 22 // the Windows builtin trust anchors. This bssl::TrustStore is thread-safe (we 24 // TODO(crbug.com/40784682): confirm this is thread safe. 36 // Create a CertStores object with the stores pre-initialized with 37 // in-memory cert stores for testing purposes. 40 // Create a CertStores object with null cert store pointers for testing 44 // Returns true if any of the cert stores are not initialized. 80 void SyncGetIssuersOf(const bssl::ParsedCertificate* cert, [all …]
|
| D | system_trust_store.cc | 2 // Use of this source code is governed by a BSD-style license that can be 5 #include "net/cert/internal/system_trust_store.h" 21 #include "net/cert/x509_certificate.h" 22 #include "net/cert/x509_util.h" 29 #include "net/cert/internal/system_trust_store_nss.h" 30 #include "net/cert/internal/trust_store_nss.h" 35 #include "net/cert/internal/trust_store_mac.h" 36 #include "net/cert/x509_util_apple.h" 41 #include "net/cert/internal/trust_store_win.h" 43 #include "net/cert/internal/trust_store_android.h" [all …]
|
| /external/cronet/tot/net/cert/internal/ |
| D | system_trust_store.h | 2 // Use of this source code is governed by a BSD-style license that can be 11 #include "net/cert/internal/platform_trust_store.h" 22 // must be thread-safe. 24 // This is primarily used to abstract out the platform-specific bits that 32 // added trust anchors added via AddTrustAnchor(). This pointer is non-owned, 34 // returned from this method must be thread-safe. 40 // user-installed one. (It may *also* be trusted as a user-installed root.) 41 virtual bool IsKnownRoot(const bssl::ParsedCertificate* cert) const = 0; 45 // platform-specific user-added trust settings. This pointer is non-owned, 47 // objects returned from this method must be thread-safe. [all …]
|
| D | trust_store_mac.cc | 2 // Use of this source code is governed by a BSD-style license that can be 10 #include "net/cert/internal/trust_store_mac.h" 38 #include "net/cert/internal/platform_trust_store.h" 39 #include "net/cert/test_keychain_search_list_mac.h" 40 #include "net/cert/x509_util.h" 41 #include "net/cert/x509_util_apple.h" 55 // https://developer.apple.com/reference/security/1400261-sectrustsettingscopytrustsetting?language… 116 // Trust settings may be scoped using policy-specific constraints. For in IsTrustDictionaryTrustedForPolicy() 119 // As this is not presently supported, skip any policy-specific trust in IsTrustDictionaryTrustedForPolicy() 165 // This is a bit of a hack: if the cert is self-issued allow either in IsTrustDictionaryTrustedForPolicy() [all …]
|
| D | trust_store_win.h | 2 // Use of this source code is governed by a BSD-style license that can be 15 #include "net/cert/internal/platform_trust_store.h" 21 // cert systems to find user-added trust anchors for path building. It ignores 22 // the Windows builtin trust anchors. This bssl::TrustStore is thread-safe (we 24 // TODO(crbug.com/40784682): confirm this is thread safe. 36 // Create a CertStores object with the stores pre-initialized with 37 // in-memory cert stores for testing purposes. 40 // Create a CertStores object with null cert store pointers for testing 44 // Returns true if any of the cert stores are not initialized. 80 void SyncGetIssuersOf(const bssl::ParsedCertificate* cert, [all …]
|
| D | system_trust_store.cc | 2 // Use of this source code is governed by a BSD-style license that can be 5 #include "net/cert/internal/system_trust_store.h" 21 #include "net/cert/x509_certificate.h" 22 #include "net/cert/x509_util.h" 29 #include "net/cert/internal/system_trust_store_nss.h" 30 #include "net/cert/internal/trust_store_nss.h" 35 #include "net/cert/internal/trust_store_mac.h" 36 #include "net/cert/x509_util_apple.h" 41 #include "net/cert/internal/trust_store_win.h" 43 #include "net/cert/internal/trust_store_android.h" [all …]
|
| /external/cronet/stable/net/test/embedded_test_server/ |
| D | embedded_test_server.h | 2 // Use of this source code is governed by a BSD-style license that can be 24 #include "base/threading/thread.h" 30 #include "net/cert/test_root_certs.h" 31 #include "net/cert/x509_certificate.h" 59 // - kUpgraded: The request was successfully upgraded to a WebSocket connection. 60 // - kNotHandled: The request was not handled as an upgrade and should be 97 // test_server_->RegisterRequestHandler( 103 // GURL absolute_url = test_server_->GetURL(request.relative_url); 108 // http_response->set_code(net::HTTP_OK); 109 // http_response->set_content("hello"); [all …]
|
| /external/cronet/tot/net/test/embedded_test_server/ |
| D | embedded_test_server.h | 2 // Use of this source code is governed by a BSD-style license that can be 24 #include "base/threading/thread.h" 30 #include "net/cert/test_root_certs.h" 31 #include "net/cert/x509_certificate.h" 59 // - kUpgraded: The request was successfully upgraded to a WebSocket connection. 60 // - kNotHandled: The request was not handled as an upgrade and should be 97 // test_server_->RegisterRequestHandler( 103 // GURL absolute_url = test_server_->GetURL(request.relative_url); 108 // http_response->set_code(net::HTTP_OK); 109 // http_response->set_content("hello"); [all …]
|
| /external/openthread/tests/toranj/ |
| D | README_CLI.md | 1 # `toranj-cli` 3 `toranj-cli` is a test framework for OpenThread using its CLI interface. 7 - It is developed in Python. 8 - It can be used to simulate multiple nodes forming complex network topologies. 9 - It allows testing of network interactions between many nodes. 10 - `toranj` in CLI mode runs `ot-cli-ftd` on simulation platform (real-time). 21 -- OpenThread Source Directory: /Users/abtink/GitHub/openthread 22 -- OpenThread CMake build type: Debug 23 -- Package Name: OPENTHREAD 28 …-cli` tests are included in `tests/toranj/cli` folder. Each test-case has its own script following… [all …]
|
| /external/cronet/tot/net/cert_net/ |
| D | cert_net_fetcher_url_request_unittest.cc | 2 // Use of this source code is governed by a BSD-style license that can be 16 #include "net/cert/cert_net_fetcher.h" 17 #include "net/cert/mock_cert_verifier.h" 18 #include "net/cert/multi_log_ct_verifier.h" 58 request->WaitForResult(&actual_error, &actual_body); in VerifySuccess() 69 request->WaitForResult(&actual_error, &actual_body); in VerifyFailure() 91 network_thread_->task_runner()->PostTask( in ~CertNetFetcherURLRequestTest() 95 network_thread_->Stop(); in ~CertNetFetcherURLRequestTest() 103 fetcher_->SetURLRequestContext(state_->context.get()); in CreateFetcherOnNetworkThread() 104 done->Signal(); in CreateFetcherOnNetworkThread() [all …]
|
12345678910>>...17