| /third_party/openssl/ssl/statem/ |
| H A D | statem_lib.c | 897 static int ssl_add_cert_to_wpacket(SSL *s, WPACKET *pkt, X509 *x, int chain) in ssl_add_cert_to_wpacket() argument 915 chain)) { in ssl_add_cert_to_wpacket() 923 /* Add certificate chain to provided WPACKET */ 929 STACK_OF(X509) *chain = NULL; in ssl_add_cert_chain() 938 * If we have a certificate specific chain use it, else use parent ctx. in ssl_add_cert_chain() 940 if (cpk->chain != NULL) in ssl_add_cert_chain() 941 extra_certs = cpk->chain; in ssl_add_cert_chain() 966 * It is valid for the chain not to be complete (because normally we in ssl_add_cert_chain() 967 * don't include the root cert in the chain). Therefore we deliberately in ssl_add_cert_chain() 969 * the cert - we're just building as much of the chain a in ssl_add_cert_chain() [all...] |
| /test/xts/tools/sample/ServerSampleE/java/jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/sample/entity/ |
| H A D | OhSampleBusinessGoods.java | 37 @Accessors(chain = true)
|
| H A D | OhSampleBusiness.java | 37 @Accessors(chain = true)
|
| /third_party/mesa3d/src/gallium/frontends/clover/core/ |
| H A D | queue.cpp | 149 queued_events.back()().chain(ev); in sequence()
|
| H A D | event.hpp | 82 void chain(event &ev);
|
| /third_party/python/Lib/ctypes/macholib/ |
| H A D | dyld.py | 125 for path in dyld_image_suffix_search(chain(
|
| /third_party/skia/third_party/externals/spirv-tools/source/opt/ |
| H A D | scalar_replacement_pass.h | 74 // Examines the use chain of |varInst| to verify all uses are valid for 224 // Replaces an access chain to the composite variable with either a direct use 225 // of the appropriate replacement variable or another access chain with the 228 bool ReplaceAccessChain(Instruction* chain,
|
| /third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/opt/ |
| H A D | scalar_replacement_pass.h | 74 // Examines the use chain of |varInst| to verify all uses are valid for 224 // Replaces an access chain to the composite variable with either a direct use 225 // of the appropriate replacement variable or another access chain with the 228 bool ReplaceAccessChain(Instruction* chain,
|
| /third_party/skia/third_party/externals/brotli/python/tests/ |
| H A D | _test_utils.py | 80 opts_name = '_'.join([str(i) for i in itertools.chain(*o)])
|
| /third_party/littlefs/scripts/ |
| H A D | structs.py | 268 for k in it.chain(by or [], (k for k, _ in defines or [])): 453 ((max(it.chain([w], (len(l[i]) for l in lines)))+1+4-1)//4)*4-1 455 it.chain([23], it.repeat(7)),
|
| /third_party/python/Lib/test/ |
| H A D | test_heapq.py | 193 self.assertEqual(sorted(chain(*inputs), key=key, reverse=reverse), 362 from itertools import chain namespace 365 return chain(map(lambda x:x, R(Ig(G(seqn)))))
|
| /foundation/communication/netmanager_base/services/netsyscontroller/src/ |
| H A D | netsys_native_client.cpp | 1267 int32_t NetsysNativeClient::FirewallSetUidsAllowedListChain(uint32_t chain, const std::vector<uint32_t> &uids) in FirewallSetUidsAllowedListChain() argument 1274 return proxy->FirewallSetUidsAllowedListChain(chain, uids); in FirewallSetUidsAllowedListChain() 1277 int32_t NetsysNativeClient::FirewallSetUidsDeniedListChain(uint32_t chain, const std::vector<uint32_t> &uids) in FirewallSetUidsDeniedListChain() argument 1284 return proxy->FirewallSetUidsDeniedListChain(chain, uids); in FirewallSetUidsDeniedListChain() 1287 int32_t NetsysNativeClient::FirewallEnableChain(uint32_t chain, bool enable) in FirewallEnableChain() argument 1294 return proxy->FirewallEnableChain(chain, enable); in FirewallEnableChain() 1297 int32_t NetsysNativeClient::FirewallSetUidRule(uint32_t chain, const std::vector<uint32_t> &uids, uint32_t firewallRule) in FirewallSetUidRule() argument 1304 return proxy->FirewallSetUidRule(chain, uids, firewallRule); in FirewallSetUidRule()
|
| /foundation/communication/netmanager_base/test/fuzztest/netsysclient_fuzzer/ |
| H A D | net_sys_client_fuzzer.cpp | 545 auto chain = NetSysGetData<uint32_t>(); in FirewallSetUidsAllowedListChainFuzzTest() local 548 dataParcel.WriteUint32(chain); in FirewallSetUidsAllowedListChainFuzzTest() 565 auto chain = NetSysGetData<uint32_t>(); in FirewallSetUidsDeniedListChainFuzzTest() local 568 dataParcel.WriteUint32(chain); in FirewallSetUidsDeniedListChainFuzzTest() 584 int32_t chain = NetSysGetData<int32_t>(); in FirewallSetUidRuleFuzzTest() local 587 dataParcel.WriteInt32(chain); in FirewallSetUidRuleFuzzTest() 871 uint32_t chain = NetSysGetData<uint32_t>(); in FirewallEnableChainFuzzTest() local 874 dataParcel.WriteInt32(chain); in FirewallEnableChainFuzzTest()
|
| /third_party/mbedtls/library/ |
| H A D | ssl_tls.c | 7726 * Once the certificate message is read, parse it into a cert chain and 7731 mbedtls_x509_crt *chain) in ssl_parse_certificate_chain() 7775 /* Make &ssl->in_msg[i] point to the beginning of the CRT chain. */ in ssl_parse_certificate_chain() 7778 /* Iterate through and parse the CRTs in the provided chain. */ in ssl_parse_certificate_chain() 7798 /* Read length of the next CRT in the chain. */ in ssl_parse_certificate_chain() 7810 /* Check if we're handling the first CRT in the chain. */ in ssl_parse_certificate_chain() 7830 /* Now we can safely free the original chain. */ in ssl_parse_certificate_chain() 7835 /* Parse the next certificate in the chain. */ in ssl_parse_certificate_chain() 7837 ret = mbedtls_x509_crt_parse_der(chain, ssl->in_msg + i, n); in ssl_parse_certificate_chain() 7839 /* If we don't need to store the CRT chain permanentl in ssl_parse_certificate_chain() 7730 ssl_parse_certificate_chain(mbedtls_ssl_context *ssl, mbedtls_x509_crt *chain) ssl_parse_certificate_chain() argument 7931 ssl_parse_certificate_verify(mbedtls_ssl_context *ssl, int authmode, mbedtls_x509_crt *chain, void *rs_ctx) ssl_parse_certificate_verify() argument 8184 mbedtls_x509_crt *chain = NULL; mbedtls_ssl_parse_certificate() local [all...] |
| /third_party/elfutils/src/ |
| H A D | strip.c | 2294 Elf32_Word *chain = bucket + nbucket; in handle_elf() local 2326 while (chain[hidx] != 0 && chain[hidx] < nchain) in handle_elf() 2327 hidx = chain[hidx]; in handle_elf() 2329 chain[hidx] = inner; in handle_elf() 2355 Elf64_Xword *chain = bucket + nbucket; in handle_elf() local 2387 while (chain[hidx] != 0 && chain[hidx] < nchain) in handle_elf() 2388 hidx = chain[hidx]; in handle_elf() 2390 chain[hid in handle_elf() [all...] |
| /third_party/icu/ohos_icu4j/src/main/tests/ohos/global/icu/dev/test/util/ |
| H A D | ULocaleTest.java | 4289 for (String[] chain : TESTIDS) { in TestGetFallback() 4290 for (int i = 1; i < chain.length; i++) { in TestGetFallback() 4291 String fallback = ULocale.getFallback(chain[i-1]); in TestGetFallback() 4292 assertEquals("getFallback(\"" + chain[i-1] + "\")", chain[i], fallback); in TestGetFallback() 4306 for(ULocale[] chain : TESTLOCALES) { in TestGetFallback() 4307 for (int i = 1; i < chain.length; i++) { in TestGetFallback() 4308 ULocale fallback = chain[i-1].getFallback(); in TestGetFallback() 4309 assertEquals("ULocale(" + chain[i-1] + ").getFallback()", chain[ in TestGetFallback() [all...] |
| /foundation/communication/netmanager_base/test/netmanagernative/unittest/netsys_manager_test/ |
| H A D | netsys_native_service_test.cpp | 399 uint32_t chain = 0; in HWTEST_F() local 401 ret = instance_->FirewallSetUidsAllowedListChain(chain, uids); in HWTEST_F() 404 ret = instance_->FirewallSetUidsDeniedListChain(chain, uids); in HWTEST_F() 407 ret = instance_->FirewallEnableChain(chain, false); in HWTEST_F() 411 ret = instance_->FirewallSetUidRule(chain, {uid}, firewallRule); in HWTEST_F()
|
| /third_party/libunwind/libunwind/doc/ |
| H A D | libunwind.tex | 79 uncover the entire call-chain that led to the activation of function 81 that there are more frames in the chain, zero indicates that the end 82 of the chain has been reached, and any negative value indicates that 96 frame and that way it could move up and down the callframe-chain at 198 \Func{unw\_step}() to move ``up'' in the call-chain, read and write
|
| H A D | unw_step.tex | 26 previous stack frame was the last frame in the chain. On error, the
|
| /third_party/libfuse/test/ |
| H A D | util.py | 151 return itertools.chain.from_iterable(
|
| /third_party/node/deps/openssl/openssl/apps/include/ |
| H A D | s_apps.h | 28 STACK_OF(X509) *chain, int build_chain);
|
| /third_party/rust/crates/bindgen/bindgen/ir/ |
| H A D | template.rs | 232 args.chain(canonical_args.skip(arg_count)) in from_ty()
|
| /third_party/rust/crates/codespan/codespan/src/ |
| H A D | file.rs | 386 std::iter::once(0).chain(source.match_indices('\n').map(|(i, _)| i + 1)) in line_starts()
|
| /third_party/openssl/apps/include/ |
| H A D | s_apps.h | 28 STACK_OF(X509) *chain, int build_chain);
|
| /third_party/skia/third_party/externals/dawn/generator/templates/ |
| H A D | api.h | 118 {{c_prefix}}ChainedStruct{{Out}} chain;
|