| /third_party/python/Lib/test/libregrtest/ |
| H A D | setup.py | 41 faulthandler.register(signum, chain=True, file=stderr_fd)
|
| /third_party/rust/crates/clap/clap_complete/src/shells/ |
| H A D | fish.rs | 72 .chain( in gen_fish_inner()
|
| /third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
| H A D | x509_vfy.rs | 38 chain: *mut stack_st_X509, in X509_STORE_CTX_init()
|
| /third_party/spirv-tools/source/opt/ |
| H A D | scalar_replacement_pass.h | 86 // Examines the use chain of |varInst| to verify all uses are valid for 236 // Replaces an access chain to the composite variable with either a direct use 237 // of the appropriate replacement variable or another access chain with the 240 bool ReplaceAccessChain(Instruction* chain,
|
| /device/soc/rockchip/common/sdk_linux/kernel/power/ |
| H A D | snapshot.c | 261 * a linked list of pages called 'the chain'. 263 * The chain grows each time when there is no room for a new object in 266 * chain. 268 * NOTE: The chain allocator may be inefficient if the allocated objects 272 struct linked_page *chain; /* the chain */ member 281 ca->chain = NULL; in chain_init() 299 lp->next = ca->chain; in chain_alloc() 300 ca->chain = lp; in chain_alloc() 303 ret = ca->chain in chain_alloc() [all...] |
| /third_party/node/deps/openssl/openssl/ssl/ |
| H A D | t1_lib.c | 2602 * chain. If the peer has specified peer_cert_sigalgs then we use them in tls1_check_sig_alg() 2634 * Check certificate chain is consistent with TLS extensions and is usable by 2649 int tls1_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain, in tls1_check_chain() argument 2670 chain = cpk->chain; in tls1_check_chain() 2697 ok = X509_chain_check_suiteb(NULL, x, chain, suiteb_flags); in tls1_check_chain() 2772 /* Check signature algorithm of each cert in chain */ in tls1_check_chain() 2786 for (i = 0; i < sk_X509_num(chain); i++) { in tls1_check_chain() 2787 if (!tls1_check_sig_alg(s, sk_X509_value(chain, i), default_nid)) { in tls1_check_chain() 2807 /* In strict mode check rest of chain to in tls1_check_chain() 2910 SSL_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain) SSL_check_chain() argument [all...] |
| /third_party/openssl/ssl/ |
| H A D | t1_lib.c | 2582 * chain. If the peer has specified peer_cert_sigalgs then we use them in tls1_check_sig_alg() 2614 * Check certificate chain is consistent with TLS extensions and is usable by 2629 int tls1_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain, in tls1_check_chain() argument 2650 chain = cpk->chain; in tls1_check_chain() 2677 ok = X509_chain_check_suiteb(NULL, x, chain, suiteb_flags); in tls1_check_chain() 2752 /* Check signature algorithm of each cert in chain */ in tls1_check_chain() 2766 for (i = 0; i < sk_X509_num(chain); i++) { in tls1_check_chain() 2767 if (!tls1_check_sig_alg(s, sk_X509_value(chain, i), default_nid)) { in tls1_check_chain() 2787 /* In strict mode check rest of chain to in tls1_check_chain() 2890 SSL_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain) SSL_check_chain() argument [all...] |
| /third_party/node/deps/npm/node_modules/node-gyp/gyp/pylib/packaging/ |
| H A D | specifiers.py | 700 return (list(itertools.chain(*left_split)), list(itertools.chain(*right_split)))
|
| /third_party/rust/crates/clap/src/parser/ |
| H A D | validator.rs | 212 .chain(used_filtered.iter()) in build_conflict_err_usage() 451 .chain(raw_req_args) in missing_required_error()
|
| /third_party/python/Lib/test/ |
| H A D | test_finalization.py | 313 def chain(self, left): member in ChainedBase 354 Test finalization of a cyclic chain. These tests are similar in 362 nodes[i].chain(nodes[i-1])
|
| /third_party/rust/crates/bindgen/bindgen/ir/ |
| H A D | function.rs | 381 .chain(std::iter::repeat(None)) in args_from_ty_and_cursor() 382 .zip(type_args.map(Some).chain(std::iter::repeat(None))) in args_from_ty_and_cursor()
|
| /third_party/littlefs/scripts/ |
| H A D | cov.py | 307 for k in it.chain(by or [], (k for k, _ in defines or [])): 492 ((max(it.chain([w], (len(l[i]) for l in lines)))+1+4-1)//4)*4-1 494 it.chain([23], it.repeat(7)),
|
| H A D | code.py | 320 for k in it.chain(by or [], (k for k, _ in defines or [])): 505 ((max(it.chain([w], (len(l[i]) for l in lines)))+1+4-1)//4)*4-1 507 it.chain([23], it.repeat(7)),
|
| H A D | data.py | 320 for k in it.chain(by or [], (k for k, _ in defines or [])): 505 ((max(it.chain([w], (len(l[i]) for l in lines)))+1+4-1)//4)*4-1 507 it.chain([23], it.repeat(7)),
|
| H A D | stack.py | 283 for k in it.chain(by or [], (k for k, _ in defines or [])): 470 ((max(it.chain([w], (len(l[i]) for l in lines)))+1+4-1)//4)*4-1 472 it.chain([23], it.repeat(7)),
|
| H A D | readtree.py | 21 for m in it.chain((m for d in dirs for m in d), mdirs):
|
| /third_party/node/deps/openssl/openssl/crypto/cms/ |
| H A D | cms_smime.c | 46 /* Read all content through chain to process digest, decrypt etc */ in cms_copy_content() 264 STACK_OF(X509) **chain, in cms_signerinfo_verify_cert() 295 /* also send back the trust chain when required */ in cms_signerinfo_verify_cert() 296 if (chain != NULL) in cms_signerinfo_verify_cert() 297 *chain = X509_STORE_CTX_get1_chain(ctx); in cms_signerinfo_verify_cert() 356 /* Certificate trust chain is required to check CAdES signature */ in CMS_verify() 260 cms_signerinfo_verify_cert(CMS_SignerInfo *si, X509_STORE *store, STACK_OF(X509) *certs, STACK_OF(X509_CRL) *crls, STACK_OF(X509) **chain, const CMS_CTX *cms_ctx) cms_signerinfo_verify_cert() argument
|
| /third_party/openssl/crypto/cms/ |
| H A D | cms_smime.c | 46 /* Read all content through chain to process digest, decrypt etc */ in cms_copy_content() 265 STACK_OF(X509) **chain, in cms_signerinfo_verify_cert() 296 /* also send back the trust chain when required */ in cms_signerinfo_verify_cert() 297 if (chain != NULL) in cms_signerinfo_verify_cert() 298 *chain = X509_STORE_CTX_get1_chain(ctx); in cms_signerinfo_verify_cert() 357 /* Certificate trust chain is required to check CAdES signature */ in CMS_verify() 261 cms_signerinfo_verify_cert(CMS_SignerInfo *si, X509_STORE *store, STACK_OF(X509) *certs, STACK_OF(X509_CRL) *crls, STACK_OF(X509) **chain, const CMS_CTX *cms_ctx) cms_signerinfo_verify_cert() argument
|
| /third_party/skia/third_party/externals/spirv-cross/ |
| H A D | spirv_cross.hpp | 673 SPIRVariable *maybe_get_backing_variable(uint32_t chain); 675 void register_read(uint32_t expr, uint32_t chain, bool forwarded); 676 void register_write(uint32_t chain); 996 // Access chains used in multiple blocks mean hoisting all the variables used to construct the access chain as not all backends can use pointers.
|
| /third_party/protobuf/php/ext/google/protobuf/ |
| H A D | php-upb.c | 1557 /* Head of collider's chain. */ in insert() 1558 upb_tabent *chain = getentry_mutable(t, hashfunc(mainpos_e->key)); in insert() local 1559 if (chain == mainpos_e) { in insert() 1561 * is the head of our chain). Insert to new ent and append to this chain. */ in insert() 1567 * chain). This implies that no existing ent in the table has our hash. in insert() 1568 * Evict it (updating its chain) and use its ent for head of our chain. */ in insert() 1570 while (chain->next != mainpos_e) { in insert() 1571 chain in insert() 1586 upb_tabent *chain = getentry_mutable(t, hash); rm() local [all...] |
| /foundation/communication/netmanager_base/services/netmanagernative/src/ |
| H A D | netsys_native_service_stub.cpp | 1250 uint32_t chain = data.ReadUint32(); in CmdFirewallSetUidsAllowedListChain() local 1258 int32_t result = FirewallSetUidsAllowedListChain(chain, uids); in CmdFirewallSetUidsAllowedListChain() 1266 uint32_t chain = data.ReadUint32(); in CmdFirewallSetUidsDeniedListChain() local 1274 int32_t result = FirewallSetUidsDeniedListChain(chain, uids); in CmdFirewallSetUidsDeniedListChain() 1282 uint32_t chain = data.ReadUint32(); in CmdFirewallEnableChain() local 1284 int32_t result = FirewallEnableChain(chain, enable); in CmdFirewallEnableChain() 1292 uint32_t chain = (unsigned)data.ReadUint32(); in CmdFirewallSetUidRule() local 1296 int32_t result = FirewallSetUidRule(chain, uids, firewallRule); in CmdFirewallSetUidRule()
|
| /base/security/certificate_framework/test/unittest/v1.0/include/ |
| H A D | cf_mock.h | 48 int, X509_STORE_CTX_init, (X509_STORE_CTX * ctx, X509_STORE *store, X509 *x509, STACK_OF(X509) * chain));
|
| /third_party/libunwind/libunwind/doc/ |
| H A D | unw_init_remote.tex | 31 stack-frame chain to be unwound. In other words, the interpretation
|
| /third_party/openssl/ohos_lite/include/crypto/ |
| H A D | x509.h | 192 * cert chain can take some time (and have to be 'retried', this needs to be 200 /* chain of X509s - untrusted - passed in */ 216 /* Check revocation status of chain */ 224 /* Check policy status of the chain */ 230 /* if 0, rebuild chain */ 234 /* chain of X509s - built up and trusted */ 235 STACK_OF(X509) *chain; member
|
| /third_party/rust/crates/which-rs/src/ |
| H A D | finder.rs | 200 .chain(PATH_EXTENSIONS.iter().map(move |e| { in append_extension()
|