Home
last modified time | relevance | path

Searched +full:thread +full:- +full:cert (Results 1 – 25 of 412) sorted by relevance

12345678910>>...17

/external/openthread/script/
Dtest33 set -euo pipefail
35 OT_BUILDDIR="${OT_BUILDDIR:-${PWD}/build}"
53 OT_NODE_TYPE="${OT_NODE_TYPE:-cli}"
56 OT_NATIVE_IP="${OT_NATIVE_IP:-0}"
59 THREAD_VERSION="${THREAD_VERSION:-1.4}"
62 INTER_OP="${INTER_OP:-0}"
65 VERBOSE="${VERBOSE:-0}"
68 BORDER_ROUTING="${BORDER_ROUTING:-1}"
71 NAT64="${NAT64:-0}"
74 NAT64_SERVICE="${NAT64_SERVICE:-openthread}"
[all …]
/external/openthread/.github/workflows/
Dsimulation-1.4.yml33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
43 permissions: # added using https://github.com/step-security/secure-workflows
48 thread-1-4:
49 name: thread-1-4-${{ matrix.compiler.c }}-${{ matrix.arch }}
50 runs-on: ubuntu-22.04
52 CFLAGS: -${{ matrix.arch }}
[all …]
Dsimulation-1.1.yml33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
48 packet-verification:
49 runs-on: ubuntu-24.04
57 - name: Harden Runner
58 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
60 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
[all …]
Dotbr.yml33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
48 backbone-router:
49 runs-on: ubuntu-22.04
65 - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
68 - name: Build OTBR Docker
73 - name: Bootstrap
[all …]
Dposix.yml33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
48 expects-linux:
49 runs-on: ubuntu-22.04
51 CFLAGS: -DCLI_COAP_SECURE_USE_COAP_DEFAULT_HANDLER=1 -DOPENTHREAD_CONFIG_MLE_MAX_CHILDREN=15
52 CXXFLAGS: -DCLI_COAP_SECURE_USE_COAP_DEFAULT_HANDLER=1 -DOPENTHREAD_CONFIG_MLE_MAX_CHILDREN=15
54 - name: Harden Runner
[all …]
/external/cronet/tot/net/cert/
Dnss_cert_database.h2 // Use of this source code is governed by a BSD-style license that can be
23 #include "net/cert/cert_type.h"
24 #include "net/cert/scoped_nss_types.h"
25 #include "net/cert/x509_certificate.h"
58 ScopedCERTCertificate cert; member
60 // The certificate is stored on a read-only slot.
70 // The certificate is hardware-backed.
73 // The certificate is device-wide.
78 // Stores per-certificate error codes for import failures.
81 ImportCertFailure(ScopedCERTCertificate cert, int err);
[all …]
Dx509_util_win.h2 // Use of this source code is governed by a BSD-style license that can be
19 #include "net/cert/x509_certificate.h"
31 // Creates an X509Certificate with non-standard parsing options.
46 // preferable for each thread that needs such a context to obtain its own,
47 // rather than risk thread-safety issues by sharing.
49 const X509Certificate* cert);
57 // specifies behavior if intermediates of |cert| could not be converted.
59 const X509Certificate* cert,
62 // Calculates the SHA-256 fingerprint of the certificate. Returns an empty
64 NET_EXPORT SHA256HashValue CalculateFingerprint256(PCCERT_CONTEXT cert);
[all …]
/external/cronet/stable/net/cert/
Dnss_cert_database.h2 // Use of this source code is governed by a BSD-style license that can be
23 #include "net/cert/cert_type.h"
24 #include "net/cert/scoped_nss_types.h"
25 #include "net/cert/x509_certificate.h"
58 ScopedCERTCertificate cert; member
60 // The certificate is stored on a read-only slot.
70 // The certificate is hardware-backed.
73 // The certificate is device-wide.
78 // Stores per-certificate error codes for import failures.
81 ImportCertFailure(ScopedCERTCertificate cert, int err);
[all …]
Dx509_util_win.h2 // Use of this source code is governed by a BSD-style license that can be
19 #include "net/cert/x509_certificate.h"
31 // Creates an X509Certificate with non-standard parsing options.
46 // preferable for each thread that needs such a context to obtain its own,
47 // rather than risk thread-safety issues by sharing.
49 const X509Certificate* cert);
57 // specifies behavior if intermediates of |cert| could not be converted.
59 const X509Certificate* cert,
62 // Calculates the SHA-256 fingerprint of the certificate. Returns an empty
64 NET_EXPORT SHA256HashValue CalculateFingerprint256(PCCERT_CONTEXT cert);
[all …]
/external/ot-br-posix/.github/workflows/
Dborder_router.yml33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
45 border-router:
46 runs-on: ubuntu-22.04
49 fail-fast: false
52 - name: "Border Router (mDNSResponder)"
53 …_options: "-DOT_DUA=ON -DOT_ECDSA=ON -DOT_MLR=ON -DOT_SERVICE=ON -DOT_SRP_SERVER=ON -DOTBR_COVERAG…
[all …]
/external/cronet/stable/net/tools/cert_verify_tool/
Dcert_verify_tool.cc2 // Use of this source code is governed by a BSD-style license that can be
16 #include "base/threading/thread.h"
19 #include "net/cert/cert_net_fetcher.h"
20 #include "net/cert/cert_verify_proc.h"
21 #include "net/cert/cert_verify_proc_builtin.h"
22 #include "net/cert/crl_set.h"
23 #include "net/cert/do_nothing_ct_verifier.h"
24 #include "net/cert/internal/platform_trust_store.h"
25 #include "net/cert/internal/system_trust_store.h"
26 #include "net/cert/x509_util.h"
[all …]
/external/cronet/tot/net/tools/cert_verify_tool/
Dcert_verify_tool.cc2 // Use of this source code is governed by a BSD-style license that can be
16 #include "base/threading/thread.h"
19 #include "net/cert/cert_net_fetcher.h"
20 #include "net/cert/cert_verify_proc.h"
21 #include "net/cert/cert_verify_proc_builtin.h"
22 #include "net/cert/crl_set.h"
23 #include "net/cert/do_nothing_ct_verifier.h"
24 #include "net/cert/internal/platform_trust_store.h"
25 #include "net/cert/internal/system_trust_store.h"
26 #include "net/cert/x509_util.h"
[all …]
/external/libcups/scheduler/
DDependencies1 auth.o: auth.c cupsd.h ../cups/cups-private.h ../cups/string-private.h \
2 ../config.h ../cups/versioning.h ../cups/array-private.h \
3 ../cups/array.h ../cups/ipp-private.h ../cups/cups.h ../cups/file.h \
5 ../cups/http-private.h ../cups/language-private.h ../cups/transcode.h \
6 ../cups/pwg-private.h ../cups/thread-private.h ../cups/file-private.h \
7 ../cups/ppd-private.h ../cups/ppd.h ../cups/raster.h mime.h sysman.h \
8 statbuf.h cert.h auth.h client.h policy.h printers.h classes.h job.h \
10 banners.o: banners.c cupsd.h ../cups/cups-private.h \
11 ../cups/string-private.h ../config.h ../cups/versioning.h \
12 ../cups/array-private.h ../cups/array.h ../cups/ipp-private.h \
[all …]
/external/cronet/stable/net/cert/internal/
Dsystem_trust_store.h2 // Use of this source code is governed by a BSD-style license that can be
11 #include "net/cert/internal/platform_trust_store.h"
22 // must be thread-safe.
24 // This is primarily used to abstract out the platform-specific bits that
32 // added trust anchors added via AddTrustAnchor(). This pointer is non-owned,
34 // returned from this method must be thread-safe.
40 // user-installed one. (It may *also* be trusted as a user-installed root.)
41 virtual bool IsKnownRoot(const bssl::ParsedCertificate* cert) const = 0;
45 // platform-specific user-added trust settings. This pointer is non-owned,
47 // objects returned from this method must be thread-safe.
[all …]
Dtrust_store_mac.cc2 // Use of this source code is governed by a BSD-style license that can be
10 #include "net/cert/internal/trust_store_mac.h"
38 #include "net/cert/internal/platform_trust_store.h"
39 #include "net/cert/test_keychain_search_list_mac.h"
40 #include "net/cert/x509_util.h"
41 #include "net/cert/x509_util_apple.h"
55 // https://developer.apple.com/reference/security/1400261-sectrustsettingscopytrustsetting?language…
116 // Trust settings may be scoped using policy-specific constraints. For in IsTrustDictionaryTrustedForPolicy()
119 // As this is not presently supported, skip any policy-specific trust in IsTrustDictionaryTrustedForPolicy()
165 // This is a bit of a hack: if the cert is self-issued allow either in IsTrustDictionaryTrustedForPolicy()
[all …]
Dtrust_store_win.h2 // Use of this source code is governed by a BSD-style license that can be
15 #include "net/cert/internal/platform_trust_store.h"
21 // cert systems to find user-added trust anchors for path building. It ignores
22 // the Windows builtin trust anchors. This bssl::TrustStore is thread-safe (we
24 // TODO(crbug.com/40784682): confirm this is thread safe.
36 // Create a CertStores object with the stores pre-initialized with
37 // in-memory cert stores for testing purposes.
40 // Create a CertStores object with null cert store pointers for testing
44 // Returns true if any of the cert stores are not initialized.
80 void SyncGetIssuersOf(const bssl::ParsedCertificate* cert,
[all …]
Dsystem_trust_store.cc2 // Use of this source code is governed by a BSD-style license that can be
5 #include "net/cert/internal/system_trust_store.h"
21 #include "net/cert/x509_certificate.h"
22 #include "net/cert/x509_util.h"
29 #include "net/cert/internal/system_trust_store_nss.h"
30 #include "net/cert/internal/trust_store_nss.h"
35 #include "net/cert/internal/trust_store_mac.h"
36 #include "net/cert/x509_util_apple.h"
41 #include "net/cert/internal/trust_store_win.h"
43 #include "net/cert/internal/trust_store_android.h"
[all …]
/external/cronet/tot/net/cert/internal/
Dsystem_trust_store.h2 // Use of this source code is governed by a BSD-style license that can be
11 #include "net/cert/internal/platform_trust_store.h"
22 // must be thread-safe.
24 // This is primarily used to abstract out the platform-specific bits that
32 // added trust anchors added via AddTrustAnchor(). This pointer is non-owned,
34 // returned from this method must be thread-safe.
40 // user-installed one. (It may *also* be trusted as a user-installed root.)
41 virtual bool IsKnownRoot(const bssl::ParsedCertificate* cert) const = 0;
45 // platform-specific user-added trust settings. This pointer is non-owned,
47 // objects returned from this method must be thread-safe.
[all …]
Dtrust_store_mac.cc2 // Use of this source code is governed by a BSD-style license that can be
10 #include "net/cert/internal/trust_store_mac.h"
38 #include "net/cert/internal/platform_trust_store.h"
39 #include "net/cert/test_keychain_search_list_mac.h"
40 #include "net/cert/x509_util.h"
41 #include "net/cert/x509_util_apple.h"
55 // https://developer.apple.com/reference/security/1400261-sectrustsettingscopytrustsetting?language…
116 // Trust settings may be scoped using policy-specific constraints. For in IsTrustDictionaryTrustedForPolicy()
119 // As this is not presently supported, skip any policy-specific trust in IsTrustDictionaryTrustedForPolicy()
165 // This is a bit of a hack: if the cert is self-issued allow either in IsTrustDictionaryTrustedForPolicy()
[all …]
Dtrust_store_win.h2 // Use of this source code is governed by a BSD-style license that can be
15 #include "net/cert/internal/platform_trust_store.h"
21 // cert systems to find user-added trust anchors for path building. It ignores
22 // the Windows builtin trust anchors. This bssl::TrustStore is thread-safe (we
24 // TODO(crbug.com/40784682): confirm this is thread safe.
36 // Create a CertStores object with the stores pre-initialized with
37 // in-memory cert stores for testing purposes.
40 // Create a CertStores object with null cert store pointers for testing
44 // Returns true if any of the cert stores are not initialized.
80 void SyncGetIssuersOf(const bssl::ParsedCertificate* cert,
[all …]
Dsystem_trust_store.cc2 // Use of this source code is governed by a BSD-style license that can be
5 #include "net/cert/internal/system_trust_store.h"
21 #include "net/cert/x509_certificate.h"
22 #include "net/cert/x509_util.h"
29 #include "net/cert/internal/system_trust_store_nss.h"
30 #include "net/cert/internal/trust_store_nss.h"
35 #include "net/cert/internal/trust_store_mac.h"
36 #include "net/cert/x509_util_apple.h"
41 #include "net/cert/internal/trust_store_win.h"
43 #include "net/cert/internal/trust_store_android.h"
[all …]
/external/cronet/stable/net/test/embedded_test_server/
Dembedded_test_server.h2 // Use of this source code is governed by a BSD-style license that can be
24 #include "base/threading/thread.h"
30 #include "net/cert/test_root_certs.h"
31 #include "net/cert/x509_certificate.h"
59 // - kUpgraded: The request was successfully upgraded to a WebSocket connection.
60 // - kNotHandled: The request was not handled as an upgrade and should be
97 // test_server_->RegisterRequestHandler(
103 // GURL absolute_url = test_server_->GetURL(request.relative_url);
108 // http_response->set_code(net::HTTP_OK);
109 // http_response->set_content("hello");
[all …]
/external/cronet/tot/net/test/embedded_test_server/
Dembedded_test_server.h2 // Use of this source code is governed by a BSD-style license that can be
24 #include "base/threading/thread.h"
30 #include "net/cert/test_root_certs.h"
31 #include "net/cert/x509_certificate.h"
59 // - kUpgraded: The request was successfully upgraded to a WebSocket connection.
60 // - kNotHandled: The request was not handled as an upgrade and should be
97 // test_server_->RegisterRequestHandler(
103 // GURL absolute_url = test_server_->GetURL(request.relative_url);
108 // http_response->set_code(net::HTTP_OK);
109 // http_response->set_content("hello");
[all …]
/external/openthread/tests/toranj/
DREADME_CLI.md1 # `toranj-cli`
3 `toranj-cli` is a test framework for OpenThread using its CLI interface.
7 - It is developed in Python.
8 - It can be used to simulate multiple nodes forming complex network topologies.
9 - It allows testing of network interactions between many nodes.
10 - `toranj` in CLI mode runs `ot-cli-ftd` on simulation platform (real-time).
21 -- OpenThread Source Directory: /Users/abtink/GitHub/openthread
22 -- OpenThread CMake build type: Debug
23 -- Package Name: OPENTHREAD
28-cli` tests are included in `tests/toranj/cli` folder. Each test-case has its own script following…
[all …]
/external/cronet/tot/net/cert_net/
Dcert_net_fetcher_url_request_unittest.cc2 // Use of this source code is governed by a BSD-style license that can be
16 #include "net/cert/cert_net_fetcher.h"
17 #include "net/cert/mock_cert_verifier.h"
18 #include "net/cert/multi_log_ct_verifier.h"
58 request->WaitForResult(&actual_error, &actual_body); in VerifySuccess()
69 request->WaitForResult(&actual_error, &actual_body); in VerifyFailure()
91 network_thread_->task_runner()->PostTask( in ~CertNetFetcherURLRequestTest()
95 network_thread_->Stop(); in ~CertNetFetcherURLRequestTest()
103 fetcher_->SetURLRequestContext(state_->context.get()); in CreateFetcherOnNetworkThread()
104 done->Signal(); in CreateFetcherOnNetworkThread()
[all …]

12345678910>>...17