| /third_party/skia/third_party/externals/icu/source/i18n/ |
| H A D | number_formatimpl.cpp | 126 const MicroPropsGenerator* chain = &fMicros; in macrosToMicroGenerator() local 256 new UsagePrefsHandler(macros.locale, macros.unit, macros.usage.fValue, chain, status); in macrosToMicroGenerator() 258 chain = fUsagePrefsHandler.getAlias(); in macrosToMicroGenerator() 260 auto unitConversionHandler = new UnitConversionHandler(macros.unit, chain, status); in macrosToMicroGenerator() 262 chain = fUnitConversionHandler.getAlias(); in macrosToMicroGenerator() 267 fMicros.helpers.multiplier.setAndChain(macros.scale, chain); in macrosToMicroGenerator() 268 chain = &fMicros.helpers.multiplier; in macrosToMicroGenerator() 336 auto newScientificHandler = new ScientificHandler(¯os.notation, fMicros.symbols, chain); in macrosToMicroGenerator() 342 chain = fScientificHandler.getAlias(); in macrosToMicroGenerator() 388 resolvePluralRules(macros.rules, macros.locale, status), chain, statu in macrosToMicroGenerator() [all...] |
| /third_party/mesa3d/src/vulkan/wsi/ |
| H A D | wsi_common_display.c | 137 struct wsi_display_swapchain *chain; member 1083 struct wsi_display_swapchain *chain = in wsi_display_image_init() local 1085 struct wsi_display *wsi = chain->wsi; in wsi_display_image_init() 1099 VkResult result = wsi_create_image(&chain->base, &chain->base.image_info, in wsi_display_image_init() 1113 image->chain = chain; in wsi_display_image_init() 1138 wsi_destroy_image(&chain->base, &image->base); in wsi_display_image_init() 1148 struct wsi_display_swapchain *chain = in wsi_display_image_finish() local 1150 struct wsi_display *wsi = chain in wsi_display_image_finish() 1162 struct wsi_display_swapchain *chain = wsi_display_swapchain_destroy() local 1178 struct wsi_display_swapchain *chain = wsi_display_get_wsi_image() local 1187 struct wsi_display_swapchain *chain = active_image->chain; wsi_display_idle_old_displaying() local 1212 struct wsi_display_swapchain *chain = image->chain; wsi_display_page_flip_handler2() local 1354 struct wsi_display_swapchain *chain = wsi_display_acquire_next_image() local 1795 struct wsi_display_swapchain *chain = _wsi_display_queue_next() local 1901 struct wsi_display_swapchain *chain = wsi_display_queue_present() local 1946 struct wsi_display_swapchain *chain = wsi_display_surface_create_swapchain() local [all...] |
| /foundation/communication/netmanager_base/test/netmanagernative/unittest/bandwidth_manager_test/ |
| H A D | bandwidth_manager_class_test.cpp | 72 ChainType chain = ChainType::CHAIN_OHBW_INPUT; in HWTEST_F() local 73 std::string resultStr = g_BandwidthManager->FetchChainName(chain); in HWTEST_F() 76 chain = ChainType::CHAIN_OHBW_OUTPUT; in HWTEST_F() 77 resultStr = g_BandwidthManager->FetchChainName(chain); in HWTEST_F() 80 chain = ChainType::CHAIN_OHBW_FORWARD; in HWTEST_F() 81 resultStr = g_BandwidthManager->FetchChainName(chain); in HWTEST_F() 84 chain = ChainType::CHAIN_OHBW_DENIED_LIST_BOX; in HWTEST_F() 85 resultStr = g_BandwidthManager->FetchChainName(chain); in HWTEST_F() 88 chain = ChainType::CHAIN_OHBW_ALLOWED_LIST_BOX; in HWTEST_F() 89 resultStr = g_BandwidthManager->FetchChainName(chain); in HWTEST_F() [all...] |
| /third_party/node/deps/openssl/openssl/ssl/ |
| H A D | ssl_cert.c | 125 if (cpk->chain) { in ssl_cert_dup() 126 rpk->chain = X509_chain_up_ref(cpk->chain); in ssl_cert_dup() 127 if (!rpk->chain) { in ssl_cert_dup() 225 sk_X509_pop_free(cpk->chain, X509_free); in ssl_cert_clear_certs() 226 cpk->chain = NULL; in ssl_cert_clear_certs() 261 int ssl_cert_set0_chain(SSL *s, SSL_CTX *ctx, STACK_OF(X509) *chain) in ssl_cert_set0_chain() argument 268 for (i = 0; i < sk_X509_num(chain); i++) { in ssl_cert_set0_chain() 269 X509 *x = sk_X509_value(chain, i); in ssl_cert_set0_chain() 277 sk_X509_pop_free(cpk->chain, X509_fre in ssl_cert_set0_chain() 282 ssl_cert_set1_chain(SSL *s, SSL_CTX *ctx, STACK_OF(X509) *chain) ssl_cert_set1_chain() argument 982 ssl_cert_set_cert_store(CERT *c, X509_STORE *store, int chain, int ref) ssl_cert_set_cert_store() argument 996 ssl_cert_get_cert_store(CERT *c, X509_STORE **pstore, int chain) ssl_cert_get_cert_store() argument [all...] |
| /third_party/openssl/ssl/ |
| H A D | ssl_cert.c | 125 if (cpk->chain) { in ssl_cert_dup() 126 rpk->chain = X509_chain_up_ref(cpk->chain); in ssl_cert_dup() 127 if (!rpk->chain) { in ssl_cert_dup() 225 sk_X509_pop_free(cpk->chain, X509_free); in ssl_cert_clear_certs() 226 cpk->chain = NULL; in ssl_cert_clear_certs() 261 int ssl_cert_set0_chain(SSL *s, SSL_CTX *ctx, STACK_OF(X509) *chain) in ssl_cert_set0_chain() argument 268 for (i = 0; i < sk_X509_num(chain); i++) { in ssl_cert_set0_chain() 269 X509 *x = sk_X509_value(chain, i); in ssl_cert_set0_chain() 277 sk_X509_pop_free(cpk->chain, X509_fre in ssl_cert_set0_chain() 282 ssl_cert_set1_chain(SSL *s, SSL_CTX *ctx, STACK_OF(X509) *chain) ssl_cert_set1_chain() argument 982 ssl_cert_set_cert_store(CERT *c, X509_STORE *store, int chain, int ref) ssl_cert_set_cert_store() argument 996 ssl_cert_get_cert_store(CERT *c, X509_STORE **pstore, int chain) ssl_cert_get_cert_store() argument [all...] |
| /foundation/communication/netmanager_base/test/netpolicymanager/unittest/net_policy_manager_test/ |
| H A D | ut_netsys_policy_wrapper.cpp | 113 uint32_t chain = 2; in HWTEST_F() local 115 auto ret = instance_->FirewallSetUidsAllowedListChain(chain, uids); in HWTEST_F() 121 uint32_t chain = 2; in HWTEST_F() local 123 auto ret = instance_->FirewallSetUidsDeniedListChain(chain, uids); in HWTEST_F() 129 uint32_t chain = 2; in HWTEST_F() local 132 auto ret = instance_->FirewallSetUidRule(chain, {uid}, firewallRule); in HWTEST_F() 138 uint32_t chain = 2; in HWTEST_F() local 139 auto ret = instance_->FirewallEnableChain(chain, false); in HWTEST_F()
|
| /third_party/node/deps/openssl/openssl/crypto/x509/ |
| H A D | x509_vfy.c | 150 * The error cert is |x| if not NULL, else defaults to the chain cert at depth. 160 ctx->current_cert = (x != NULL) ? x : sk_X509_value(ctx->chain, depth); in verify_cb_cert() 186 int num = sk_X509_num(ctx->chain); in check_auth_level() 192 X509 *cert = sk_X509_value(ctx->chain, i); in check_auth_level() 220 || (ok = X509_get_pubkey_parameters(NULL, ctx->chain) ? 1 : -1) <= 0 in verify_chain() 224 err = X509_chain_check_suiteb(&ctx->error_depth, NULL, ctx->chain, in verify_chain() 228 /* Verify chain signatures and expiration times */ in verify_chain() 275 if (ctx->chain != NULL) { in X509_verify_cert() 285 if (!ossl_x509_add_cert_new(&ctx->chain, ctx->cert, X509_ADD_FLAG_UP_REF)) { in X509_verify_cert() 299 * so that the chain i in X509_verify_cert() 1981 X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) X509_get_pubkey_parameters() argument 2321 X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, STACK_OF(X509) *chain) X509_STORE_CTX_init() argument [all...] |
| /third_party/openssl/crypto/x509/ |
| H A D | x509_vfy.c | 150 * The error cert is |x| if not NULL, else defaults to the chain cert at depth. 160 ctx->current_cert = (x != NULL) ? x : sk_X509_value(ctx->chain, depth); in verify_cb_cert() 186 int num = sk_X509_num(ctx->chain); in check_auth_level() 192 X509 *cert = sk_X509_value(ctx->chain, i); in check_auth_level() 220 || (ok = X509_get_pubkey_parameters(NULL, ctx->chain) ? 1 : -1) <= 0 in verify_chain() 224 err = X509_chain_check_suiteb(&ctx->error_depth, NULL, ctx->chain, in verify_chain() 228 /* Verify chain signatures and expiration times */ in verify_chain() 275 if (ctx->chain != NULL) { in X509_verify_cert() 285 if (!ossl_x509_add_cert_new(&ctx->chain, ctx->cert, X509_ADD_FLAG_UP_REF)) { in X509_verify_cert() 299 * so that the chain i in X509_verify_cert() 1983 X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) X509_get_pubkey_parameters() argument 2323 X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, STACK_OF(X509) *chain) X509_STORE_CTX_init() argument [all...] |
| /third_party/mbedtls/library/ |
| H A D | ssl_cache.c | 48 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_find_entry() 152 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot() 169 for (cur = cache->chain; cur != NULL; cur = cur->next) { in ssl_cache_pick_writing_slot() 193 cache->chain = cur; in ssl_cache_pick_writing_slot() 212 /* Reuse first entry in chain, but move to last place. */ in ssl_cache_pick_writing_slot() 213 if (cache->chain == NULL) { in ssl_cache_pick_writing_slot() 218 old = cache->chain; in ssl_cache_pick_writing_slot() 219 cache->chain = old->next; in ssl_cache_pick_writing_slot() 231 /* `ssl_cache_entry_zeroize` would break the chain, in ssl_cache_pick_writing_slot() 343 /* Now we remove the entry from the chain */ in mbedtls_ssl_cache_remove() [all...] |
| /third_party/skia/src/gpu/ops/ |
| H A D | OpsTask.cpp | 191 // the two chains are chainable. Returns the new chain. 195 // We process ops in chain b from head to tail. We attempt to merge with nodes in a, starting in DoConcat() 196 // at chain a's tail and working toward the head. We produce one of the following outcomes: in DoConcat() 198 // 2) An op from chain a is merged into b's head. (In this case b's head gets processed again.) in DoConcat() 199 // 3) b's head is popped from chain a and added at the tail of a. in DoConcat() 201 // as we assume merges were already attempted when chain b was created. So we keep track of the in DoConcat() 203 // appended to chain a that will be skipped for bounds testing. If the original tail of a is in DoConcat() 233 // chain b. in DoConcat() 243 // We merged all the nodes in chain a to chain in DoConcat() 1048 OpChain& chain = fOpChains[i]; forwardCombine() local [all...] |
| /third_party/ltp/libs/libltpvdso/ |
| H A D | parse_vdso.c | 48 void *bucket, *chain; member 185 vdso_info.chain = get_hash_ptr(hash, vdso_info.nbucket + 2); in vdso_init_from_sysinfo_ehdr() 236 ELF(Word) chain = get_hash_val(vdso_info.bucket, in vdso_sym() 239 for (; chain != STN_UNDEF; chain = get_hash_val(vdso_info.chain, chain)) { in vdso_sym() 240 ELF(Sym) *sym = &vdso_info.symtab[chain]; in vdso_sym() 255 && !vdso_match_version(vdso_info.versym[chain], in vdso_sym()
|
| /third_party/openssl/test/ |
| H A D | danetest.c | 55 static int verify_chain(SSL *ssl, STACK_OF(X509) *chain) in verify_chain() argument 66 || !TEST_true(X509_STORE_CTX_init(store_ctx, store, NULL, chain)) in verify_chain() 99 STACK_OF(X509) *chain; in STACK_OF() 102 if (!TEST_ptr(chain = sk_X509_new_null())) in STACK_OF() 123 if (!TEST_true(sk_X509_push(chain, cert))) in STACK_OF() 126 TEST_info("Unknown chain file object %s", name); in STACK_OF() 139 return chain; in STACK_OF() 146 sk_X509_pop_free(chain, X509_free); in STACK_OF() 299 STACK_OF(X509) *chain; in test_tlsafile() 341 if (!TEST_ptr(chain in test_tlsafile() [all...] |
| /third_party/elfutils/libdw/ |
| H A D | dwarf_getfuncs.c | 58 struct Dwarf_Die_Chain *chain, void *arg) in tree_visitor() 61 Dwarf_Die *die = &chain->die; in tree_visitor() 74 chain->prune = true; in tree_visitor() 110 struct Dwarf_Die_Chain chain = { .die = CUDIE (cudie->cu), in dwarf_getfuncs() local 112 int res = __libdw_visit_scopes (0, &chain, NULL, &tree_visitor, NULL, &v); in dwarf_getfuncs() 57 tree_visitor(unsigned int depth __attribute__ ((unused)), struct Dwarf_Die_Chain *chain, void *arg) tree_visitor() argument
|
| /third_party/node/deps/openssl/openssl/crypto/ocsp/ |
| H A D | ocsp_vfy.c | 19 static int ocsp_check_issuer(OCSP_BASICRESP *bs, STACK_OF(X509) *chain); 32 STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) in ocsp_verify_signer() 68 if (chain != NULL) in ocsp_verify_signer() 69 *chain = X509_STORE_CTX_get1_chain(ctx); in ocsp_verify_signer() 102 STACK_OF(X509) *chain = NULL; in OCSP_basic_verify() 123 ret = ocsp_verify_signer(signer, 1, st, flags, untrusted, &chain); in OCSP_basic_verify() 131 * At this point we have a valid certificate chain need to verify it in OCSP_basic_verify() 134 ret = ocsp_check_issuer(bs, chain); in OCSP_basic_verify() 147 x = sk_X509_value(chain, sk_X509_num(chain) in OCSP_basic_verify() 30 ocsp_verify_signer(X509 *signer, int response, X509_STORE *st, unsigned long flags, STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) ocsp_verify_signer() argument 222 ocsp_check_issuer(OCSP_BASICRESP *bs, STACK_OF(X509) *chain) ocsp_check_issuer() argument [all...] |
| /third_party/openssl/crypto/ocsp/ |
| H A D | ocsp_vfy.c | 19 static int ocsp_check_issuer(OCSP_BASICRESP *bs, STACK_OF(X509) *chain); 32 STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) in ocsp_verify_signer() 68 if (chain != NULL) in ocsp_verify_signer() 69 *chain = X509_STORE_CTX_get1_chain(ctx); in ocsp_verify_signer() 102 STACK_OF(X509) *chain = NULL; in OCSP_basic_verify() 123 ret = ocsp_verify_signer(signer, 1, st, flags, untrusted, &chain); in OCSP_basic_verify() 131 * At this point we have a valid certificate chain need to verify it in OCSP_basic_verify() 134 ret = ocsp_check_issuer(bs, chain); in OCSP_basic_verify() 147 x = sk_X509_value(chain, sk_X509_num(chain) in OCSP_basic_verify() 30 ocsp_verify_signer(X509 *signer, int response, X509_STORE *st, unsigned long flags, STACK_OF(X509) *untrusted, STACK_OF(X509) **chain) ocsp_verify_signer() argument 222 ocsp_check_issuer(OCSP_BASICRESP *bs, STACK_OF(X509) *chain) ocsp_check_issuer() argument [all...] |
| /third_party/rust/crates/rustix/src/backend/linux_raw/ |
| H A D | vdso.rs | 33 chain: *const u32, 77 chain: null(), in init_from_sysinfo_ehdr() 187 vdso.chain = hash.add(vdso.nbucket as usize + 2); in init_from_sysinfo_ehdr() 260 let mut chain = *self.bucket.add((name_hash % self.nbucket) as usize); variables 262 while chain != STN_UNDEF { 263 let sym = &*self.symtab.add(chain as usize); 280 && !self.match_version(*self.versym.add(chain as usize), version, ver_hash)) 282 chain = *self.chain.add(chain a [all...] |
| /foundation/communication/netmanager_base/services/netpolicymanager/include/ |
| H A D | netsys_policy_wrapper.h | 42 int32_t FirewallSetUidsAllowedListChain(uint32_t chain, const std::vector<uint32_t> &uids); 43 int32_t FirewallSetUidsDeniedListChain(uint32_t chain, const std::vector<uint32_t> &uids); 44 int32_t FirewallSetUidRule(uint32_t chain, const std::vector<uint32_t> &uids, uint32_t firewallRule); 45 int32_t FirewallEnableChain(uint32_t chain, bool enable);
|
| /third_party/python/Lib/ |
| H A D | traceback.py | 112 file=None, chain=True): 125 te.print(file=file, chain=chain) 129 chain=True): 140 return list(te.format(chain=chain)) 181 def print_exc(limit=None, file=None, chain=True): 183 print_exception(*sys.exc_info(), limit=limit, file=file, chain=chain) 185 def format_exc(limit=None, chain [all...] |
| /foundation/multimedia/media_library/frameworks/services/media_cloud_sync_notify_handle/src/ |
| H A D | cloud_sync_notify_handler.cpp | 182 shared_ptr<BaseHandler> chain = nullptr; in MakeResponsibilityChain() local 185 chain = NotifyResponsibilityChainFactory::CreateChain(TRANSPARENT); in MakeResponsibilityChain() 190 chain = NotifyResponsibilityChainFactory::CreateChain(PHOTODELETE); in MakeResponsibilityChain() 192 chain = NotifyResponsibilityChainFactory::CreateChain(TRANSPARENT); in MakeResponsibilityChain() 197 if (chain == nullptr) { in MakeResponsibilityChain() 201 chain->Handle(handleData); in MakeResponsibilityChain()
|
| /third_party/rust/crates/rust-openssl/openssl/src/x509/ |
| H A D | tests.rs | 526 let chain = Stack::new().unwrap(); in test_verify_cert() 534 .init(&store, &cert, &chain, |c| c.verify_cert()) in test_verify_cert() 537 .init(&store, &cert, &chain, |c| c.verify_cert()) in test_verify_cert() 547 let chain = Stack::new().unwrap(); in test_verify_fails() 555 .init(&store, &cert, &chain, |c| c.verify_cert()) in test_verify_fails() 566 let chain = Stack::new().unwrap(); in test_verify_fails_with_crl_flag_set_and_no_crl() 576 .init(&store, &cert, &chain, |c| { in test_verify_fails_with_crl_flag_set_and_no_crl() 593 let chain = Stack::new().unwrap(); in test_verify_cert_with_purpose() 609 .init(&store, &cert, &chain, |c| c.verify_cert()) in test_verify_cert_with_purpose() 620 let chain in test_verify_cert_with_wrong_purpose_fails() 894 let mut chain = Stack::new().unwrap(); test_verify_param_set_depth() variables 922 let mut chain = Stack::new().unwrap(); test_verify_param_set_depth_fails_verification() variables 996 let mut chain = Stack::new().unwrap(); test_set_purpose() variables 1021 let mut chain = Stack::new().unwrap(); test_set_purpose_fails_verification() variables [all...] |
| /third_party/icu/ohos_icu4j/src/main/java/ohos/global/icu/number/ |
| H A D | NumberFormatterImpl.java | 178 MicroPropsGenerator chain = micros; in macrosToMicroGenerator() 252 chain = new MultiplierFormatHandler(macros.scale, chain); in macrosToMicroGenerator() 317 chain = ((ScientificNotation) macros.notation).withLocaleData(micros.symbols, safe, chain); in macrosToMicroGenerator() 348 chain = LongNameHandler in macrosToMicroGenerator() 349 .forMeasureUnit(macros.loc, macros.unit, macros.perUnit, unitWidth, rules, chain); in macrosToMicroGenerator() 355 chain = LongNameHandler.forCurrencyLongNames(macros.loc, currency, rules, chain); in macrosToMicroGenerator() 370 chain in macrosToMicroGenerator() [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
| H A D | tlsv1_client_read.c | 352 struct x509_certificate *chain = NULL, *last = NULL, *cert; in tls_process_certificate() local 445 x509_certificate_chain_free(chain); in tls_process_certificate() 459 x509_certificate_chain_free(chain); in tls_process_certificate() 474 x509_certificate_chain_free(chain); in tls_process_certificate() 485 x509_certificate_chain_free(chain); in tls_process_certificate() 492 chain = cert; in tls_process_certificate() 501 if (conn->cred && conn->cred->server_cert_only && chain) { in tls_process_certificate() 507 x509_name_string(&chain->subject, buf, sizeof(buf)); in tls_process_certificate() 509 if (sha256_vector(1, &chain->cert_start, &chain in tls_process_certificate() [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| H A D | tlsv1_client_read.c | 360 struct x509_certificate *chain = NULL, *last = NULL, *cert; in tls_process_certificate() local 453 x509_certificate_chain_free(chain); in tls_process_certificate() 467 x509_certificate_chain_free(chain); in tls_process_certificate() 482 x509_certificate_chain_free(chain); in tls_process_certificate() 493 x509_certificate_chain_free(chain); in tls_process_certificate() 500 chain = cert; in tls_process_certificate() 509 if (conn->cred && conn->cred->server_cert_only && chain) { in tls_process_certificate() 515 x509_name_string(&chain->subject, buf, sizeof(buf)); in tls_process_certificate() 517 if (sha256_vector(1, &chain->cert_start, &chain in tls_process_certificate() [all...] |
| /third_party/ltp/testcases/network/iptables/ |
| H A D | nft01.sh | 21 if ! nft list chain $ip_table filter INPUT > /dev/null 2>&1; then 22 ROD nft add chain $ip_table filter INPUT '{ type filter hook input priority 0; }' 31 [ "$cleanup_chain" = 1 ] && nft delete chain $ip_table filter INPUT >/dev/null 2>&1
|
| /third_party/typescript/tests/baselines/reference/ |
| H A D | mappedTypeNestedGenericInstantiation.js | 9 declare function chain<T>(t: T): Chainable<T>; 13 const v = chain({a: 1, b: 2}).mapValues(square).value(); 19 var v = chain({ a: 1, b: 2 }).mapValues(square).value();
|