Home
last modified time | relevance | path

Searched refs:chain (Results 326 - 350 of 664) sorted by relevance

1...<<11121314151617181920>>...27

/third_party/mesa3d/src/vulkan/overlay-layer/
H A Doverlay.cpp277 unreachable("instance chain info not found"); in get_instance_chain_info()
289 unreachable("device chain info not found"); in get_device_chain_info()
294 clone_chain(const struct VkBaseInStructure *chain) in clone_chain() argument
298 vk_foreach_struct_const(item, chain) { in clone_chain()
316 free_chain(struct VkBaseOutStructure *chain) in free_chain() argument
318 while (chain) { in free_chain()
319 void *node = chain; in free_chain()
320 chain = chain->pNext; in free_chain()
2514 // Advance the link info for the next element on the chain in overlay_CreateDevice()
[all...]
/third_party/skia/third_party/externals/harfbuzz/src/
H A Dhb-ot-layout-gpos-table.hh1869 * chain and reverse the link direction, such that the whole tree of its in apply()
1871 * where new parent is on the path from old chain... in apply()
2862 int chain = pos[i].attach_chain(), type = pos[i].attach_type(); in reverse_cursive_minor_offset() local
2863 if (likely (!chain || 0 == (type & ATTACH_TYPE_CURSIVE))) in reverse_cursive_minor_offset()
2868 unsigned int j = (int) i + chain; in reverse_cursive_minor_offset()
2870 /* Stop if we see new parent in the chain. */ in reverse_cursive_minor_offset()
2881 pos[j].attach_chain() = -chain; in reverse_cursive_minor_offset()
2892 int chain = pos[i].attach_chain(), type = pos[i].attach_type(); in propagate_attachment_offsets() local
2893 if (likely (!chain)) in propagate_attachment_offsets()
2898 unsigned int j = (int) i + chain; in propagate_attachment_offsets()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_openssl.c2401 STACK_OF(X509) *chain; in tls_verify_cb()
2403 chain = X509_STORE_CTX_get1_chain(x509_ctx); in tls_verify_cb()
2404 if (chain && sk_X509_num(chain) > 0) { in tls_verify_cb()
2408 cert = sk_X509_value(chain, 0); in tls_verify_cb()
2414 if (chain) in tls_verify_cb()
2415 sk_X509_pop_free(chain, X509_free); in tls_verify_cb()
2480 "Server certificate chain probe", in tls_verify_cb()
2607 "chain"); in tls_connection_ca_cert()
3192 * Clear previously set extra chain certificate in tls_connection_client_cert()
[all...]
/third_party/node/src/crypto/
H A Dcrypto_common.cc148 STACK_OF(X509)* chain; in UseSNIContext()
150 int err = SSL_CTX_get0_chain_certs(ctx, &chain); in UseSNIContext()
153 if (err == 1 && chain != nullptr) err = SSL_set1_chain(ssl.get(), chain); in UseSNIContext()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dx509v3.c64 * x509_certificate_free - Free an X.509 certificate chain
65 * @cert: Pointer to the first certificate in the chain
2071 * x509_certificate_chain_validate - Validate X.509 certificate chain
2073 * @chain: Certificate chain to be validated (first chain must be issued by
2074 * signed by the second certificate in the chain and so on)
2076 * Returns: 0 if chain is valid, -1 if not
2079 struct x509_certificate *chain, in x509_certificate_chain_validate()
2090 wpa_printf(MSG_DEBUG, "X509: Validate certificate chain"); in x509_certificate_chain_validate()
2078 x509_certificate_chain_validate(struct x509_certificate *trusted, struct x509_certificate *chain, int *reason, int disable_time_checks) x509_certificate_chain_validate() argument
2210 x509_certificate_get_subject(struct x509_certificate *chain, struct x509_name *name) x509_certificate_get_subject() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dx509v3.c64 * x509_certificate_free - Free an X.509 certificate chain
65 * @cert: Pointer to the first certificate in the chain
2133 * x509_certificate_chain_validate - Validate X.509 certificate chain
2135 * @chain: Certificate chain to be validated (first chain must be issued by
2136 * signed by the second certificate in the chain and so on)
2138 * Returns: 0 if chain is valid, -1 if not
2141 struct x509_certificate *chain, in x509_certificate_chain_validate()
2152 wpa_printf(MSG_DEBUG, "X509: Validate certificate chain"); in x509_certificate_chain_validate()
2140 x509_certificate_chain_validate(struct x509_certificate *trusted, struct x509_certificate *chain, int *reason, int disable_time_checks) x509_certificate_chain_validate() argument
2272 x509_certificate_get_subject(struct x509_certificate *chain, struct x509_name *name) x509_certificate_get_subject() argument
[all...]
/third_party/typescript/tests/baselines/reference/
H A DunderscoreTest1.js397 chain<T>(list: T[]): ChainedArray<T>;
398 chain<T>(list: Dictionary<T>): ChainedDictionary<T>;
399 chain<T>(obj: T): ChainedObject<T>;
808 _.chain([1, 2, 3, 200])
1022 _.chain([1, 2, 3, 200])
/third_party/rust/crates/rust-openssl/openssl/src/ssl/
H A Dmod.rs307 /// Disables automatic chain building when verifying a peer's certificate.
309 /// TLS peers are responsible for sending the entire certificate chain from the leaf to a
310 /// trusted root, but some will incorrectly not do so. OpenSSL will try to build the chain
747 /// chain. It should return a boolean indicating if verification succeeded.
762 /// has its own certificate chain and configuration.
792 /// If the peer's certificate chain is longer than this value, verification will fail.
968 /// of the certificate chain, or `set_certificate_chain_file` to load the entire chain from a
987 /// Loads a certificate chain from a file.
990 /// certificate, and the remainder forming the chain o
1833 let mut chain = ptr::null_mut(); extra_chain_certs() variables
[all...]
/third_party/spirv-tools/source/opt/
H A Dconst_folding_rules.cpp152 std::vector<const analysis::Constant*> chain; in FoldInsertWithConstants() local
168 chain.push_back(new_composite); in FoldInsertWithConstants()
178 chain.push_back(composite); in FoldInsertWithConstants()
197 // Work backwards up the chain and replace each index with new constant. in FoldInsertWithConstants()
198 for (size_t i = chain.size(); i > 0; i--) { in FoldInsertWithConstants()
208 composite = chain[i - 1]; in FoldInsertWithConstants()
/third_party/protobuf/ruby/ext/google/protobuf_c/
H A Dupb.c1532 /* Head of collider's chain. */ in insert()
1533 upb_tabent *chain = getentry_mutable(t, hashfunc(mainpos_e->key)); in insert() local
1534 if (chain == mainpos_e) { in insert()
1536 * is the head of our chain). Insert to new ent and append to this chain. */ in insert()
1542 * chain). This implies that no existing ent in the table has our hash. in insert()
1543 * Evict it (updating its chain) and use its ent for head of our chain. */ in insert()
1545 while (chain->next != mainpos_e) { in insert()
1546 chain in insert()
1561 upb_tabent *chain = getentry_mutable(t, hash); rm() local
[all...]
/third_party/mbedtls/scripts/mbedtls_dev/
H A Dmacro_collector.py215 return itertools.chain(*(
/third_party/jerryscript/tools/
H A Dgen-unicode.py629 return list(itertools.chain.from_iterable(unicodes)), unicode_lengths
/third_party/libwebsockets/lib/system/async-dns/
H A Dasync-dns-parse.c643 if (q->last) /* chain the second one on */ in lws_adns_parse_udp()
654 if (q->firstcache) { /* also need to free chain when we free this guy */ in lws_adns_parse_udp()
655 q->firstcache->chain = c; in lws_adns_parse_udp()
671 * we won't directly register it but will chain it on to this in lws_adns_parse_udp()
/third_party/ltp/testcases/network/iptables/
H A Diptables_lib.sh34 ROD nft flush chain ip${TST_IPV6} filter INPUT
/third_party/node/deps/openssl/config/archs/linux64-s390x/asm/crypto/bn/
H A Ds390x-gf2m.s189 stg %r0,0(%r15) # back chain
/third_party/node/deps/openssl/config/archs/linux64-s390x/asm_avx2/crypto/bn/
H A Ds390x-gf2m.s189 stg %r0,0(%r15) # back chain
/third_party/openssl/ohos_lite/include/openssl/
H A Dcms.h240 int CMS_SignerInfo_verify_content(CMS_SignerInfo *si, BIO *chain);
/third_party/vulkan-loader/loader/
H A Dloader.c88 // all entrypoints on the instance chain need to be locked except GPA
1135 // instance chain and will contain the necessary logic
1538 // Search through VkInstanceCreateInfo's pNext chain for any drivers from the direct driver loading extension and load them.
1558 // Find the VkDirectDriverLoadingListLUNARG struct in the pNext chain of vkInstanceCreateInfo in loader_scan_for_direct_drivers()
1559 const VkBaseOutStructure *chain = pCreateInfo->pNext; in loader_scan_for_direct_drivers() local
1560 while (chain) { in loader_scan_for_direct_drivers()
1561 if (chain->sType == VK_STRUCTURE_TYPE_DIRECT_DRIVER_LOADING_LIST_LUNARG) { in loader_scan_for_direct_drivers()
1562 ddl_list = (VkDirectDriverLoadingListLUNARG *)chain; in loader_scan_for_direct_drivers()
1565 chain = (const VkBaseOutStructure *)chain in loader_scan_for_direct_drivers()
[all...]
/third_party/node/deps/v8/src/diagnostics/
H A Dobjects-debug.cc1345 int chain = GetNextEntry(entry); in SmallOrderedHashTableVerify() local
1346 if (chain == kNotFound) continue; in SmallOrderedHashTableVerify()
1347 CHECK_GE(chain, 0); in SmallOrderedHashTableVerify()
1348 CHECK_LE(chain, capacity); in SmallOrderedHashTableVerify()
1711 // Verify empty slot chain. in Verify()
/third_party/node/deps/openssl/openssl/apps/
H A Ds_client.c523 "Client certificate chain file (in PEM format)"},
524 {"build_chain", OPT_BUILD_CHAIN, '-', "Build client certificate chain"},
678 "CA file for certificate chain (PEM format)"},
680 "Use dir as certificate store path to build CA certificate chain"},
682 "CA store URI for certificate chain"},
788 STACK_OF(X509) *chain = NULL; in s_client_main()
1642 if (!load_certs(chain_file, 0, &chain, pass, "client certificate chain")) in s_client_main()
1909 if (!set_cert_key_stuff(ctx, cert, key, chain, build_chain)) in s_client_main()
2176 * push a buffering BIO into the chain tha in s_client_main()
[all...]
/third_party/openssl/apps/
H A Ds_client.c523 "Client certificate chain file (in PEM format)"},
524 {"build_chain", OPT_BUILD_CHAIN, '-', "Build client certificate chain"},
678 "CA file for certificate chain (PEM format)"},
680 "Use dir as certificate store path to build CA certificate chain"},
682 "CA store URI for certificate chain"},
788 STACK_OF(X509) *chain = NULL; in s_client_main()
1642 if (!load_certs(chain_file, 0, &chain, pass, "client certificate chain")) in s_client_main()
1909 if (!set_cert_key_stuff(ctx, cert, key, chain, build_chain)) in s_client_main()
2176 * push a buffering BIO into the chain tha in s_client_main()
[all...]
/third_party/libunwind/libunwind/doc/
H A Dunw_create_addr_space.tex34 information it needs to unwind a chain of stack-frames. These
99 the frame-chain.
/third_party/jinja2/
H A Dfilters.py8 from itertools import chain namespace
394 elements that compare equal. This makes it is possible to chain
476 return func(chain([first], it), key=key_func)
544 in the chain without getting an :exc:`~jinja2.UndefinedError`.
/third_party/littlefs/scripts/
H A Dtracebd.py494 grid = list(it.chain.from_iterable(
496 it.islice(it.chain(h, it.repeat(Block())),
/third_party/node/deps/openssl/openssl/crypto/cms/
H A Dcms_env.c1230 int ossl_cms_EnvelopedData_final(CMS_ContentInfo *cms, BIO *chain) in ossl_cms_EnvelopedData_final() argument
1234 BIO *mbio = BIO_find_type(chain, BIO_TYPE_CIPHER); in ossl_cms_EnvelopedData_final()

Completed in 59 milliseconds

1...<<11121314151617181920>>...27