| /third_party/node/deps/openssl/openssl/crypto/cms/ |
| H A D | cms_sd.c | 679 CMS_SignerInfo *si, BIO *chain) in cms_SignerInfo_content_sign() 696 if (!ossl_cms_DigestAlgorithm_find_ctx(mctx, chain, si->digestAlgorithm)) in cms_SignerInfo_content_sign() 769 int ossl_cms_SignedData_final(CMS_ContentInfo *cms, BIO *chain) in ossl_cms_SignedData_final() argument 778 if (!cms_SignerInfo_content_sign(cms, si, chain)) in ossl_cms_SignedData_final() 914 /* Create a chain of digest BIOs from a CMS ContentInfo */ 920 BIO *chain = NULL; in ossl_cms_SignedData_init_bio() local 936 if (chain != NULL) in ossl_cms_SignedData_init_bio() 937 BIO_push(chain, mdbio); in ossl_cms_SignedData_init_bio() 939 chain = mdbio; in ossl_cms_SignedData_init_bio() 941 return chain; in ossl_cms_SignedData_init_bio() 678 cms_SignerInfo_content_sign(CMS_ContentInfo *cms, CMS_SignerInfo *si, BIO *chain) cms_SignerInfo_content_sign() argument 947 CMS_SignerInfo_verify_content(CMS_SignerInfo *si, BIO *chain) CMS_SignerInfo_verify_content() argument [all...] |
| H A D | cms_local.h | 404 BIO *chain, int verify); 407 int ossl_cms_SignedData_final(CMS_ContentInfo *cms, BIO *chain); 423 int ossl_cms_DigestAlgorithm_find_ctx(EVP_MD_CTX *mctx, BIO *chain, 444 int ossl_cms_EnvelopedData_final(CMS_ContentInfo *cms, BIO *chain); 478 const STACK_OF(X509) *chain);
|
| /third_party/openssl/crypto/cms/ |
| H A D | cms_sd.c | 675 CMS_SignerInfo *si, BIO *chain) in cms_SignerInfo_content_sign() 692 if (!ossl_cms_DigestAlgorithm_find_ctx(mctx, chain, si->digestAlgorithm)) in cms_SignerInfo_content_sign() 766 int ossl_cms_SignedData_final(CMS_ContentInfo *cms, BIO *chain) in ossl_cms_SignedData_final() argument 775 if (!cms_SignerInfo_content_sign(cms, si, chain)) in ossl_cms_SignedData_final() 919 /* Create a chain of digest BIOs from a CMS ContentInfo */ 925 BIO *chain = NULL; in ossl_cms_SignedData_init_bio() local 941 if (chain != NULL) in ossl_cms_SignedData_init_bio() 942 BIO_push(chain, mdbio); in ossl_cms_SignedData_init_bio() 944 chain = mdbio; in ossl_cms_SignedData_init_bio() 946 return chain; in ossl_cms_SignedData_init_bio() 674 cms_SignerInfo_content_sign(CMS_ContentInfo *cms, CMS_SignerInfo *si, BIO *chain) cms_SignerInfo_content_sign() argument 952 CMS_SignerInfo_verify_content(CMS_SignerInfo *si, BIO *chain) CMS_SignerInfo_verify_content() argument [all...] |
| H A D | cms_local.h | 405 BIO *chain, int verify); 408 int ossl_cms_SignedData_final(CMS_ContentInfo *cms, BIO *chain); 424 int ossl_cms_DigestAlgorithm_find_ctx(EVP_MD_CTX *mctx, BIO *chain, 445 int ossl_cms_EnvelopedData_final(CMS_ContentInfo *cms, BIO *chain); 478 const STACK_OF(X509) *chain);
|
| /third_party/skia/third_party/externals/harfbuzz/src/ |
| H A D | hb-aat-layout-morx-table.hh | 1087 HBUINT subtableCount; /* The number of subtables in the chain. */ 1112 const Chain<Types> *chain = &firstChain; in compile_flags() local 1116 map->chain_flags.push (chain->compile_flags (mapper)); in compile_flags() 1117 chain = &StructAfter<Chain<Types>> (*chain); in compile_flags() 1125 const Chain<Types> *chain = &firstChain; in apply() local 1129 chain->apply (c, c->plan->aat_map.chain_flags[i]); in apply() 1131 chain = &StructAfter<Chain<Types>> (*chain); in apply() 1141 const Chain<Types> *chain in sanitize() local [all...] |
| /third_party/spirv-tools/source/opt/ |
| H A D | scalar_replacement_pass.cpp | 338 Instruction* chain, const std::vector<Instruction*>& replacements) { in ReplaceAccessChain() 339 // Replaces the access chain with either another access chain (with one fewer in ReplaceAccessChain() 341 uint32_t indexId = chain->GetSingleWordInOperand(1u); in ReplaceAccessChain() 354 if (chain->NumInOperands() > 2) { in ReplaceAccessChain() 355 // Replace input access chain with another access chain. in ReplaceAccessChain() 356 BasicBlock::iterator chainIter(chain); in ReplaceAccessChain() 362 context(), chain->opcode(), chain in ReplaceAccessChain() 337 ReplaceAccessChain( Instruction* chain, const std::vector<Instruction*>& replacements) ReplaceAccessChain() argument [all...] |
| /third_party/gn/src/gn/ |
| H A D | header_checker.h | 34 // Represents a dependency chain. 144 // If found, the vector given in "chain" will be filled with the reverse 145 // dependency chain from the dest target (chain[0] = search_for) to the src 146 // target (chain[chain.size() - 1] = search_from). 149 // permitted match is found, *is_permitted will be set to true. A chain with 158 Chain* chain, 166 Chain* chain) const;
|
| /third_party/jinja2/ |
| H A D | nativetypes.py | 4 from itertools import chain namespace 36 values = chain(head, values)
|
| /third_party/libevdev/libevdev/ |
| H A D | make-event-names.py | 228 from itertools import chain namespace 229 lines = chain(*[open(f).readlines() for f in sys.argv[1:]])
|
| /third_party/vk-gl-cts/scripts/egl/ |
| H A D | proc_address_tests.py | 28 from itertools import chain namespace 129 chain(makeFunctionList ("EGL14", eglCoreIface),
|
| /third_party/vk-gl-cts/scripts/khr_util/ |
| H A D | format.py | 25 from itertools import chain namespace 100 writeLines(filename, chain([header], source))
|
| H A D | gen_str_util.py | 23 from itertools import chain namespace 68 return chain(genNameProtos(), genBitfieldProtos(), genStrImpl())
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
| H A D | x509v3.h | 145 struct x509_certificate *chain, 148 x509_certificate_get_subject(struct x509_certificate *chain,
|
| H A D | tlsv1_cred.c | 45 static int tlsv1_add_cert_der(struct x509_certificate **chain, in tlsv1_add_cert_der() argument 58 p = *chain; in tlsv1_add_cert_der() 64 * the chain - add the new certificate to the end. in tlsv1_add_cert_der() 68 /* Add to the beginning of the chain */ in tlsv1_add_cert_der() 69 cert->next = *chain; in tlsv1_add_cert_der() 70 *chain = cert; in tlsv1_add_cert_der() 107 static int tlsv1_add_cert(struct x509_certificate **chain, in tlsv1_add_cert() argument 118 return tlsv1_add_cert_der(chain, buf, len); in tlsv1_add_cert() 140 if (tlsv1_add_cert_der(chain, der, der_len) < 0) { in tlsv1_add_cert() 157 static int tlsv1_set_cert_chain(struct x509_certificate **chain, in tlsv1_set_cert_chain() argument [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| H A D | x509v3.h | 152 struct x509_certificate *chain, 155 x509_certificate_get_subject(struct x509_certificate *chain,
|
| /foundation/multimedia/audio_framework/services/audio_policy/server/src/service/effect/ |
| H A D | audio_effect_manager.cpp | 450 auto index = std::find(availableLayout.begin(), availableLayout.end(), devicePort.chain); in UpdateUnavailableEffectChainsRecord() 461 streamEffectMode.devicePort[*it].chain = "LAYOUT_BYPASS"; in UpdateUnavailableEffectChainsRecord() 493 auto chainName = device.chain; in UpdateSupportedEffectProperty() 560 // Update duplicate defined modes, devices, and unsupported effect chain. in BuildAvailableAEConfig() 617 defaultChain = device.chain; in ConstructEffectChainMode() 620 AddKeyValueIntoMap(map, key, device.chain); in ConstructEffectChainMode() 622 ConstructDefaultEffectProperty(device.chain, effectChainMgrParam.effectDefaultProperty); in ConstructEffectChainMode() 708 AddKeyValueIntoMap(map, key, device.chain); in ConstructEnhanceChainManagerParam() 709 ConstructDefaultEffectProperty(device.chain, enhanceDefaultProperty); in ConstructEnhanceChainManagerParam()
|
| /third_party/skia/third_party/externals/libwebp/src/enc/ |
| H A D | backward_references_enc.c | 237 // Returns the maximum number of hash chain lookups to do for a 266 // Temporarily use the p->offset_length_ as a hash chain. in VP8LHashChainFill() 267 int32_t* chain = (int32_t*)p->offset_length_; in VP8LHashChainFill() local 283 // Fill the chain linking pixels with the same hash. in VP8LHashChainFill() 306 // predecessor in the chain, hence -1. in VP8LHashChainFill() 307 memset(chain + pos, 0xff, (len - MAX_LENGTH) * sizeof(*chain)); in VP8LHashChainFill() 311 // Process the rest of the hash chain. in VP8LHashChainFill() 315 chain[pos] = hash_to_first_index[hash_code]; in VP8LHashChainFill() 322 chain[po in VP8LHashChainFill() [all...] |
| /third_party/vulkan-loader/loader/ |
| H A D | unknown_ext_chain_gas_x86.S | 22 # This code is used to pass on device (including physical device) extensions through the call chain. It must do this without 25 # jump to the next function in the call chain 60 cmp qword ptr [rax + (DISPATCH_OFFSET_ICD_TERM + (PTR_SIZE * \num))], 0 # Check if the next function in the chain is NULL 63 jmp [rax + (DISPATCH_OFFSET_ICD_TERM + (PTR_SIZE * \num))] # Jump to the next function in the chain 85 jmp [rax + (EXT_OFFSET_DEVICE_DISPATCH + (PTR_SIZE * \num))] # Jump to the appropriate call chain 113 cmp dword ptr [eax + (DISPATCH_OFFSET_ICD_TERM + (PTR_SIZE * \num))], 0 # Check if the next function in the chain is NULL 117 jmp [eax + (DISPATCH_OFFSET_ICD_TERM + (PTR_SIZE * \num))] # Jump to the next function in the chain 139 jmp dword ptr [eax + (EXT_OFFSET_DEVICE_DISPATCH + (PTR_SIZE * \num))] # Jump to the appropriate call chain
|
| /foundation/communication/netmanager_base/services/netsyscontroller/src/ |
| H A D | netsys_controller.cpp | 1028 int32_t NetsysController::FirewallSetUidsAllowedListChain(uint32_t chain, const std::vector<uint32_t> &uids) in FirewallSetUidsAllowedListChain() argument 1030 NETMGR_LOG_I("NetsysController::FirewallSetUidsAllowedListChain: chain=%{public}d", chain); in FirewallSetUidsAllowedListChain() 1037 return netsysService_->FirewallSetUidsAllowedListChain(chain, uids); in FirewallSetUidsAllowedListChain() 1040 int32_t NetsysController::FirewallSetUidsDeniedListChain(uint32_t chain, const std::vector<uint32_t> &uids) in FirewallSetUidsDeniedListChain() argument 1042 NETMGR_LOG_I("NetsysController::FirewallSetUidsDeniedListChain: chain=%{public}d", chain); in FirewallSetUidsDeniedListChain() 1049 return netsysService_->FirewallSetUidsDeniedListChain(chain, uids); in FirewallSetUidsDeniedListChain() 1052 int32_t NetsysController::FirewallEnableChain(uint32_t chain, bool enable) in FirewallEnableChain() argument 1054 NETMGR_LOG_I("NetsysController::FirewallEnableChain: chain in FirewallEnableChain() 1064 FirewallSetUidRule(uint32_t chain, const std::vector<uint32_t> &uids, uint32_t firewallRule) FirewallSetUidRule() argument [all...] |
| H A D | netsys_controller_service_impl.cpp | 652 int32_t NetsysControllerServiceImpl::FirewallSetUidsAllowedListChain(uint32_t chain, const std::vector<uint32_t> &uids) in FirewallSetUidsAllowedListChain() argument 654 NETMGR_LOG_D("FirewallSetUidsAllowedListChain: chain=%{public}d", chain); in FirewallSetUidsAllowedListChain() 655 return netsysClient_.FirewallSetUidsAllowedListChain(chain, uids); in FirewallSetUidsAllowedListChain() 658 int32_t NetsysControllerServiceImpl::FirewallSetUidsDeniedListChain(uint32_t chain, const std::vector<uint32_t> &uids) in FirewallSetUidsDeniedListChain() argument 660 NETMGR_LOG_D("FirewallSetUidsDeniedListChain: chain=%{public}d", chain); in FirewallSetUidsDeniedListChain() 661 return netsysClient_.FirewallSetUidsDeniedListChain(chain, uids); in FirewallSetUidsDeniedListChain() 664 int32_t NetsysControllerServiceImpl::FirewallEnableChain(uint32_t chain, bool enable) in FirewallEnableChain() argument 666 NETMGR_LOG_D("FirewallEnableChain: chain in FirewallEnableChain() 670 FirewallSetUidRule(uint32_t chain, const std::vector<uint32_t> &uids, uint32_t firewallRule) FirewallSetUidRule() argument [all...] |
| /third_party/node/deps/openssl/openssl/apps/lib/ |
| H A D | s_cb.c | 152 STACK_OF(X509) *chain, int build_chain) in set_cert_key_stuff() 154 int chflags = chain ? SSL_BUILD_CHAIN_FLAG_CHECK : 0; in set_cert_key_stuff() 178 if (chain && !SSL_CTX_set1_chain(ctx, chain)) { in set_cert_key_stuff() 179 BIO_printf(bio_err, "error setting certificate chain\n"); in set_cert_key_stuff() 184 BIO_printf(bio_err, "error building certificate chain\n"); in set_cert_key_stuff() 866 STACK_OF(X509) *chain; 900 * Very basic selection callback: just use any certificate chain reported as 934 rv = SSL_check_chain(ssl, exc->cert, exc->key, exc->chain); in set_cert_cb() 935 BIO_printf(bio_err, "Checking cert chain in set_cert_cb() 151 set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key, STACK_OF(X509) *chain, int build_chain) set_cert_key_stuff() argument [all...] |
| /third_party/openssl/apps/lib/ |
| H A D | s_cb.c | 152 STACK_OF(X509) *chain, int build_chain) in set_cert_key_stuff() 154 int chflags = chain ? SSL_BUILD_CHAIN_FLAG_CHECK : 0; in set_cert_key_stuff() 178 if (chain && !SSL_CTX_set1_chain(ctx, chain)) { in set_cert_key_stuff() 179 BIO_printf(bio_err, "error setting certificate chain\n"); in set_cert_key_stuff() 184 BIO_printf(bio_err, "error building certificate chain\n"); in set_cert_key_stuff() 866 STACK_OF(X509) *chain; 900 * Very basic selection callback: just use any certificate chain reported as 934 rv = SSL_check_chain(ssl, exc->cert, exc->key, exc->chain); in set_cert_cb() 935 BIO_printf(bio_err, "Checking cert chain in set_cert_cb() 151 set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key, STACK_OF(X509) *chain, int build_chain) set_cert_key_stuff() argument [all...] |
| /third_party/typescript/tests/baselines/reference/ |
| H A D | parserRealSource8.js | 22 var chain = new ScopeChain(null, context.scopeChain, scope); 23 chain.thisType = type; 24 chain.classType = classType; 25 chain.fnc = fnc; 26 context.scopeChain = chain; 485 var chain = new ScopeChain(null, context.scopeChain, scope);
486 chain.thisType = type;
487 chain.classType = classType;
488 chain.fnc = fnc;
489 context.scopeChain = chain;
[all...] |
| /base/security/code_signature/test/unittest/ |
| H A D | local_code_sign_utils_mock_test.cpp | 189 std::vector<ByteBuffer> chain;
in HWTEST_F() local 190 bool bRet = OHOS::Security::CodeSign::GetCertChainFormBuffer(certChainBuffer, signCert, issuer, chain);
in HWTEST_F()
|
| /base/security/code_signature/utils/src/ |
| H A D | cert_utils.cpp | 143 ByteBuffer &signCert, ByteBuffer &issuer, std::vector<ByteBuffer> &chain)
in GetCertChainFormBuffer() 147 LOG_ERROR("empty cert chain buffer.");
in GetCertChainFormBuffer() 170 chain.emplace_back(cert);
in GetCertChainFormBuffer() 142 GetCertChainFormBuffer(const ByteBuffer &certChainBuffer, ByteBuffer &signCert, ByteBuffer &issuer, std::vector<ByteBuffer> &chain) GetCertChainFormBuffer() argument
|