Home
last modified time | relevance | path

Searched refs:chain (Results 251 - 275 of 730) sorted by relevance

1...<<11121314151617181920>>...30

/third_party/python/Lib/test/libregrtest/
H A Dsetup.py41 faulthandler.register(signum, chain=True, file=stderr_fd)
/third_party/rust/crates/clap/clap_complete/src/shells/
H A Dfish.rs72 .chain( in gen_fish_inner()
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/
H A Dx509_vfy.rs38 chain: *mut stack_st_X509, in X509_STORE_CTX_init()
/third_party/spirv-tools/source/opt/
H A Dscalar_replacement_pass.h86 // Examines the use chain of |varInst| to verify all uses are valid for
236 // Replaces an access chain to the composite variable with either a direct use
237 // of the appropriate replacement variable or another access chain with the
240 bool ReplaceAccessChain(Instruction* chain,
/device/soc/rockchip/common/sdk_linux/kernel/power/
H A Dsnapshot.c261 * a linked list of pages called 'the chain'.
263 * The chain grows each time when there is no room for a new object in
266 * chain.
268 * NOTE: The chain allocator may be inefficient if the allocated objects
272 struct linked_page *chain; /* the chain */ member
281 ca->chain = NULL; in chain_init()
299 lp->next = ca->chain; in chain_alloc()
300 ca->chain = lp; in chain_alloc()
303 ret = ca->chain in chain_alloc()
[all...]
/third_party/node/deps/openssl/openssl/ssl/
H A Dt1_lib.c2602 * chain. If the peer has specified peer_cert_sigalgs then we use them in tls1_check_sig_alg()
2634 * Check certificate chain is consistent with TLS extensions and is usable by
2649 int tls1_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain, in tls1_check_chain() argument
2670 chain = cpk->chain; in tls1_check_chain()
2697 ok = X509_chain_check_suiteb(NULL, x, chain, suiteb_flags); in tls1_check_chain()
2772 /* Check signature algorithm of each cert in chain */ in tls1_check_chain()
2786 for (i = 0; i < sk_X509_num(chain); i++) { in tls1_check_chain()
2787 if (!tls1_check_sig_alg(s, sk_X509_value(chain, i), default_nid)) { in tls1_check_chain()
2807 /* In strict mode check rest of chain to in tls1_check_chain()
2910 SSL_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain) SSL_check_chain() argument
[all...]
/third_party/openssl/ssl/
H A Dt1_lib.c2582 * chain. If the peer has specified peer_cert_sigalgs then we use them in tls1_check_sig_alg()
2614 * Check certificate chain is consistent with TLS extensions and is usable by
2629 int tls1_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain, in tls1_check_chain() argument
2650 chain = cpk->chain; in tls1_check_chain()
2677 ok = X509_chain_check_suiteb(NULL, x, chain, suiteb_flags); in tls1_check_chain()
2752 /* Check signature algorithm of each cert in chain */ in tls1_check_chain()
2766 for (i = 0; i < sk_X509_num(chain); i++) { in tls1_check_chain()
2767 if (!tls1_check_sig_alg(s, sk_X509_value(chain, i), default_nid)) { in tls1_check_chain()
2787 /* In strict mode check rest of chain to in tls1_check_chain()
2890 SSL_check_chain(SSL *s, X509 *x, EVP_PKEY *pk, STACK_OF(X509) *chain) SSL_check_chain() argument
[all...]
/third_party/node/deps/npm/node_modules/node-gyp/gyp/pylib/packaging/
H A Dspecifiers.py700 return (list(itertools.chain(*left_split)), list(itertools.chain(*right_split)))
/third_party/rust/crates/clap/src/parser/
H A Dvalidator.rs212 .chain(used_filtered.iter()) in build_conflict_err_usage()
451 .chain(raw_req_args) in missing_required_error()
/third_party/python/Lib/test/
H A Dtest_finalization.py313 def chain(self, left): member in ChainedBase
354 Test finalization of a cyclic chain. These tests are similar in
362 nodes[i].chain(nodes[i-1])
/third_party/rust/crates/bindgen/bindgen/ir/
H A Dfunction.rs381 .chain(std::iter::repeat(None)) in args_from_ty_and_cursor()
382 .zip(type_args.map(Some).chain(std::iter::repeat(None))) in args_from_ty_and_cursor()
/third_party/littlefs/scripts/
H A Dcov.py307 for k in it.chain(by or [], (k for k, _ in defines or [])):
492 ((max(it.chain([w], (len(l[i]) for l in lines)))+1+4-1)//4)*4-1
494 it.chain([23], it.repeat(7)),
H A Dcode.py320 for k in it.chain(by or [], (k for k, _ in defines or [])):
505 ((max(it.chain([w], (len(l[i]) for l in lines)))+1+4-1)//4)*4-1
507 it.chain([23], it.repeat(7)),
H A Ddata.py320 for k in it.chain(by or [], (k for k, _ in defines or [])):
505 ((max(it.chain([w], (len(l[i]) for l in lines)))+1+4-1)//4)*4-1
507 it.chain([23], it.repeat(7)),
H A Dstack.py283 for k in it.chain(by or [], (k for k, _ in defines or [])):
470 ((max(it.chain([w], (len(l[i]) for l in lines)))+1+4-1)//4)*4-1
472 it.chain([23], it.repeat(7)),
H A Dreadtree.py21 for m in it.chain((m for d in dirs for m in d), mdirs):
/third_party/node/deps/openssl/openssl/crypto/cms/
H A Dcms_smime.c46 /* Read all content through chain to process digest, decrypt etc */ in cms_copy_content()
264 STACK_OF(X509) **chain, in cms_signerinfo_verify_cert()
295 /* also send back the trust chain when required */ in cms_signerinfo_verify_cert()
296 if (chain != NULL) in cms_signerinfo_verify_cert()
297 *chain = X509_STORE_CTX_get1_chain(ctx); in cms_signerinfo_verify_cert()
356 /* Certificate trust chain is required to check CAdES signature */ in CMS_verify()
260 cms_signerinfo_verify_cert(CMS_SignerInfo *si, X509_STORE *store, STACK_OF(X509) *certs, STACK_OF(X509_CRL) *crls, STACK_OF(X509) **chain, const CMS_CTX *cms_ctx) cms_signerinfo_verify_cert() argument
/third_party/openssl/crypto/cms/
H A Dcms_smime.c46 /* Read all content through chain to process digest, decrypt etc */ in cms_copy_content()
265 STACK_OF(X509) **chain, in cms_signerinfo_verify_cert()
296 /* also send back the trust chain when required */ in cms_signerinfo_verify_cert()
297 if (chain != NULL) in cms_signerinfo_verify_cert()
298 *chain = X509_STORE_CTX_get1_chain(ctx); in cms_signerinfo_verify_cert()
357 /* Certificate trust chain is required to check CAdES signature */ in CMS_verify()
261 cms_signerinfo_verify_cert(CMS_SignerInfo *si, X509_STORE *store, STACK_OF(X509) *certs, STACK_OF(X509_CRL) *crls, STACK_OF(X509) **chain, const CMS_CTX *cms_ctx) cms_signerinfo_verify_cert() argument
/third_party/skia/third_party/externals/spirv-cross/
H A Dspirv_cross.hpp673 SPIRVariable *maybe_get_backing_variable(uint32_t chain);
675 void register_read(uint32_t expr, uint32_t chain, bool forwarded);
676 void register_write(uint32_t chain);
996 // Access chains used in multiple blocks mean hoisting all the variables used to construct the access chain as not all backends can use pointers.
/third_party/protobuf/php/ext/google/protobuf/
H A Dphp-upb.c1557 /* Head of collider's chain. */ in insert()
1558 upb_tabent *chain = getentry_mutable(t, hashfunc(mainpos_e->key)); in insert() local
1559 if (chain == mainpos_e) { in insert()
1561 * is the head of our chain). Insert to new ent and append to this chain. */ in insert()
1567 * chain). This implies that no existing ent in the table has our hash. in insert()
1568 * Evict it (updating its chain) and use its ent for head of our chain. */ in insert()
1570 while (chain->next != mainpos_e) { in insert()
1571 chain in insert()
1586 upb_tabent *chain = getentry_mutable(t, hash); rm() local
[all...]
/foundation/communication/netmanager_base/services/netmanagernative/src/
H A Dnetsys_native_service_stub.cpp1250 uint32_t chain = data.ReadUint32(); in CmdFirewallSetUidsAllowedListChain() local
1258 int32_t result = FirewallSetUidsAllowedListChain(chain, uids); in CmdFirewallSetUidsAllowedListChain()
1266 uint32_t chain = data.ReadUint32(); in CmdFirewallSetUidsDeniedListChain() local
1274 int32_t result = FirewallSetUidsDeniedListChain(chain, uids); in CmdFirewallSetUidsDeniedListChain()
1282 uint32_t chain = data.ReadUint32(); in CmdFirewallEnableChain() local
1284 int32_t result = FirewallEnableChain(chain, enable); in CmdFirewallEnableChain()
1292 uint32_t chain = (unsigned)data.ReadUint32(); in CmdFirewallSetUidRule() local
1296 int32_t result = FirewallSetUidRule(chain, uids, firewallRule); in CmdFirewallSetUidRule()
/base/security/certificate_framework/test/unittest/v1.0/include/
H A Dcf_mock.h48 int, X509_STORE_CTX_init, (X509_STORE_CTX * ctx, X509_STORE *store, X509 *x509, STACK_OF(X509) * chain));
/third_party/libunwind/libunwind/doc/
H A Dunw_init_remote.tex31 stack-frame chain to be unwound. In other words, the interpretation
/third_party/openssl/ohos_lite/include/crypto/
H A Dx509.h192 * cert chain can take some time (and have to be 'retried', this needs to be
200 /* chain of X509s - untrusted - passed in */
216 /* Check revocation status of chain */
224 /* Check policy status of the chain */
230 /* if 0, rebuild chain */
234 /* chain of X509s - built up and trusted */
235 STACK_OF(X509) *chain; member
/third_party/rust/crates/which-rs/src/
H A Dfinder.rs200 .chain(PATH_EXTENSIONS.iter().map(move |e| { in append_extension()

Completed in 38 milliseconds

1...<<11121314151617181920>>...30