| /third_party/mesa3d/src/vulkan/overlay-layer/ |
| H A D | overlay.cpp | 277 unreachable("instance chain info not found"); in get_instance_chain_info() 289 unreachable("device chain info not found"); in get_device_chain_info() 294 clone_chain(const struct VkBaseInStructure *chain) in clone_chain() argument 298 vk_foreach_struct_const(item, chain) { in clone_chain() 316 free_chain(struct VkBaseOutStructure *chain) in free_chain() argument 318 while (chain) { in free_chain() 319 void *node = chain; in free_chain() 320 chain = chain->pNext; in free_chain() 2514 // Advance the link info for the next element on the chain in overlay_CreateDevice() [all...] |
| /third_party/skia/third_party/externals/harfbuzz/src/ |
| H A D | hb-ot-layout-gpos-table.hh | 1869 * chain and reverse the link direction, such that the whole tree of its in apply() 1871 * where new parent is on the path from old chain... in apply() 2862 int chain = pos[i].attach_chain(), type = pos[i].attach_type(); in reverse_cursive_minor_offset() local 2863 if (likely (!chain || 0 == (type & ATTACH_TYPE_CURSIVE))) in reverse_cursive_minor_offset() 2868 unsigned int j = (int) i + chain; in reverse_cursive_minor_offset() 2870 /* Stop if we see new parent in the chain. */ in reverse_cursive_minor_offset() 2881 pos[j].attach_chain() = -chain; in reverse_cursive_minor_offset() 2892 int chain = pos[i].attach_chain(), type = pos[i].attach_type(); in propagate_attachment_offsets() local 2893 if (likely (!chain)) in propagate_attachment_offsets() 2898 unsigned int j = (int) i + chain; in propagate_attachment_offsets() [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
| H A D | tls_openssl.c | 2401 STACK_OF(X509) *chain; in tls_verify_cb() 2403 chain = X509_STORE_CTX_get1_chain(x509_ctx); in tls_verify_cb() 2404 if (chain && sk_X509_num(chain) > 0) { in tls_verify_cb() 2408 cert = sk_X509_value(chain, 0); in tls_verify_cb() 2414 if (chain) in tls_verify_cb() 2415 sk_X509_pop_free(chain, X509_free); in tls_verify_cb() 2480 "Server certificate chain probe", in tls_verify_cb() 2607 "chain"); in tls_connection_ca_cert() 3192 * Clear previously set extra chain certificate in tls_connection_client_cert() [all...] |
| /third_party/node/src/crypto/ |
| H A D | crypto_common.cc | 148 STACK_OF(X509)* chain; in UseSNIContext() 150 int err = SSL_CTX_get0_chain_certs(ctx, &chain); in UseSNIContext() 153 if (err == 1 && chain != nullptr) err = SSL_set1_chain(ssl.get(), chain); in UseSNIContext()
|
| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
| H A D | x509v3.c | 64 * x509_certificate_free - Free an X.509 certificate chain 65 * @cert: Pointer to the first certificate in the chain 2071 * x509_certificate_chain_validate - Validate X.509 certificate chain 2073 * @chain: Certificate chain to be validated (first chain must be issued by 2074 * signed by the second certificate in the chain and so on) 2076 * Returns: 0 if chain is valid, -1 if not 2079 struct x509_certificate *chain, in x509_certificate_chain_validate() 2090 wpa_printf(MSG_DEBUG, "X509: Validate certificate chain"); in x509_certificate_chain_validate() 2078 x509_certificate_chain_validate(struct x509_certificate *trusted, struct x509_certificate *chain, int *reason, int disable_time_checks) x509_certificate_chain_validate() argument 2210 x509_certificate_get_subject(struct x509_certificate *chain, struct x509_name *name) x509_certificate_get_subject() argument [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| H A D | x509v3.c | 64 * x509_certificate_free - Free an X.509 certificate chain 65 * @cert: Pointer to the first certificate in the chain 2133 * x509_certificate_chain_validate - Validate X.509 certificate chain 2135 * @chain: Certificate chain to be validated (first chain must be issued by 2136 * signed by the second certificate in the chain and so on) 2138 * Returns: 0 if chain is valid, -1 if not 2141 struct x509_certificate *chain, in x509_certificate_chain_validate() 2152 wpa_printf(MSG_DEBUG, "X509: Validate certificate chain"); in x509_certificate_chain_validate() 2140 x509_certificate_chain_validate(struct x509_certificate *trusted, struct x509_certificate *chain, int *reason, int disable_time_checks) x509_certificate_chain_validate() argument 2272 x509_certificate_get_subject(struct x509_certificate *chain, struct x509_name *name) x509_certificate_get_subject() argument [all...] |
| /third_party/typescript/tests/baselines/reference/ |
| H A D | underscoreTest1.js | 397 chain<T>(list: T[]): ChainedArray<T>; 398 chain<T>(list: Dictionary<T>): ChainedDictionary<T>; 399 chain<T>(obj: T): ChainedObject<T>; 808 _.chain([1, 2, 3, 200]) 1022 _.chain([1, 2, 3, 200])
|
| /third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
| H A D | mod.rs | 307 /// Disables automatic chain building when verifying a peer's certificate. 309 /// TLS peers are responsible for sending the entire certificate chain from the leaf to a 310 /// trusted root, but some will incorrectly not do so. OpenSSL will try to build the chain 747 /// chain. It should return a boolean indicating if verification succeeded. 762 /// has its own certificate chain and configuration. 792 /// If the peer's certificate chain is longer than this value, verification will fail. 968 /// of the certificate chain, or `set_certificate_chain_file` to load the entire chain from a 987 /// Loads a certificate chain from a file. 990 /// certificate, and the remainder forming the chain o 1833 let mut chain = ptr::null_mut(); extra_chain_certs() variables [all...] |
| /third_party/spirv-tools/source/opt/ |
| H A D | const_folding_rules.cpp | 152 std::vector<const analysis::Constant*> chain; in FoldInsertWithConstants() local 168 chain.push_back(new_composite); in FoldInsertWithConstants() 178 chain.push_back(composite); in FoldInsertWithConstants() 197 // Work backwards up the chain and replace each index with new constant. in FoldInsertWithConstants() 198 for (size_t i = chain.size(); i > 0; i--) { in FoldInsertWithConstants() 208 composite = chain[i - 1]; in FoldInsertWithConstants()
|
| /third_party/protobuf/ruby/ext/google/protobuf_c/ |
| H A D | upb.c | 1532 /* Head of collider's chain. */ in insert() 1533 upb_tabent *chain = getentry_mutable(t, hashfunc(mainpos_e->key)); in insert() local 1534 if (chain == mainpos_e) { in insert() 1536 * is the head of our chain). Insert to new ent and append to this chain. */ in insert() 1542 * chain). This implies that no existing ent in the table has our hash. in insert() 1543 * Evict it (updating its chain) and use its ent for head of our chain. */ in insert() 1545 while (chain->next != mainpos_e) { in insert() 1546 chain in insert() 1561 upb_tabent *chain = getentry_mutable(t, hash); rm() local [all...] |
| /third_party/mbedtls/scripts/mbedtls_dev/ |
| H A D | macro_collector.py | 215 return itertools.chain(*(
|
| /third_party/jerryscript/tools/ |
| H A D | gen-unicode.py | 629 return list(itertools.chain.from_iterable(unicodes)), unicode_lengths
|
| /third_party/libwebsockets/lib/system/async-dns/ |
| H A D | async-dns-parse.c | 643 if (q->last) /* chain the second one on */ in lws_adns_parse_udp() 654 if (q->firstcache) { /* also need to free chain when we free this guy */ in lws_adns_parse_udp() 655 q->firstcache->chain = c; in lws_adns_parse_udp() 671 * we won't directly register it but will chain it on to this in lws_adns_parse_udp()
|
| /third_party/ltp/testcases/network/iptables/ |
| H A D | iptables_lib.sh | 34 ROD nft flush chain ip${TST_IPV6} filter INPUT
|
| /third_party/node/deps/openssl/config/archs/linux64-s390x/asm/crypto/bn/ |
| H A D | s390x-gf2m.s | 189 stg %r0,0(%r15) # back chain
|
| /third_party/node/deps/openssl/config/archs/linux64-s390x/asm_avx2/crypto/bn/ |
| H A D | s390x-gf2m.s | 189 stg %r0,0(%r15) # back chain
|
| /third_party/openssl/ohos_lite/include/openssl/ |
| H A D | cms.h | 240 int CMS_SignerInfo_verify_content(CMS_SignerInfo *si, BIO *chain);
|
| /third_party/vulkan-loader/loader/ |
| H A D | loader.c | 88 // all entrypoints on the instance chain need to be locked except GPA 1135 // instance chain and will contain the necessary logic 1538 // Search through VkInstanceCreateInfo's pNext chain for any drivers from the direct driver loading extension and load them. 1558 // Find the VkDirectDriverLoadingListLUNARG struct in the pNext chain of vkInstanceCreateInfo in loader_scan_for_direct_drivers() 1559 const VkBaseOutStructure *chain = pCreateInfo->pNext; in loader_scan_for_direct_drivers() local 1560 while (chain) { in loader_scan_for_direct_drivers() 1561 if (chain->sType == VK_STRUCTURE_TYPE_DIRECT_DRIVER_LOADING_LIST_LUNARG) { in loader_scan_for_direct_drivers() 1562 ddl_list = (VkDirectDriverLoadingListLUNARG *)chain; in loader_scan_for_direct_drivers() 1565 chain = (const VkBaseOutStructure *)chain in loader_scan_for_direct_drivers() [all...] |
| /third_party/node/deps/v8/src/diagnostics/ |
| H A D | objects-debug.cc | 1345 int chain = GetNextEntry(entry); in SmallOrderedHashTableVerify() local 1346 if (chain == kNotFound) continue; in SmallOrderedHashTableVerify() 1347 CHECK_GE(chain, 0); in SmallOrderedHashTableVerify() 1348 CHECK_LE(chain, capacity); in SmallOrderedHashTableVerify() 1711 // Verify empty slot chain. in Verify()
|
| /third_party/node/deps/openssl/openssl/apps/ |
| H A D | s_client.c | 523 "Client certificate chain file (in PEM format)"}, 524 {"build_chain", OPT_BUILD_CHAIN, '-', "Build client certificate chain"}, 678 "CA file for certificate chain (PEM format)"}, 680 "Use dir as certificate store path to build CA certificate chain"}, 682 "CA store URI for certificate chain"}, 788 STACK_OF(X509) *chain = NULL; in s_client_main() 1642 if (!load_certs(chain_file, 0, &chain, pass, "client certificate chain")) in s_client_main() 1909 if (!set_cert_key_stuff(ctx, cert, key, chain, build_chain)) in s_client_main() 2176 * push a buffering BIO into the chain tha in s_client_main() [all...] |
| /third_party/openssl/apps/ |
| H A D | s_client.c | 523 "Client certificate chain file (in PEM format)"}, 524 {"build_chain", OPT_BUILD_CHAIN, '-', "Build client certificate chain"}, 678 "CA file for certificate chain (PEM format)"}, 680 "Use dir as certificate store path to build CA certificate chain"}, 682 "CA store URI for certificate chain"}, 788 STACK_OF(X509) *chain = NULL; in s_client_main() 1642 if (!load_certs(chain_file, 0, &chain, pass, "client certificate chain")) in s_client_main() 1909 if (!set_cert_key_stuff(ctx, cert, key, chain, build_chain)) in s_client_main() 2176 * push a buffering BIO into the chain tha in s_client_main() [all...] |
| /third_party/libunwind/libunwind/doc/ |
| H A D | unw_create_addr_space.tex | 34 information it needs to unwind a chain of stack-frames. These 99 the frame-chain.
|
| /third_party/jinja2/ |
| H A D | filters.py | 8 from itertools import chain namespace 394 elements that compare equal. This makes it is possible to chain 476 return func(chain([first], it), key=key_func) 544 in the chain without getting an :exc:`~jinja2.UndefinedError`.
|
| /third_party/littlefs/scripts/ |
| H A D | tracebd.py | 494 grid = list(it.chain.from_iterable( 496 it.islice(it.chain(h, it.repeat(Block())),
|
| /third_party/node/deps/openssl/openssl/crypto/cms/ |
| H A D | cms_env.c | 1230 int ossl_cms_EnvelopedData_final(CMS_ContentInfo *cms, BIO *chain) in ossl_cms_EnvelopedData_final() argument 1234 BIO *mbio = BIO_find_type(chain, BIO_TYPE_CIPHER); in ossl_cms_EnvelopedData_final()
|