Home
last modified time | relevance | path

Searched refs:chain (Results 51 - 75 of 730) sorted by relevance

12345678910>>...30

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_client_read.c352 struct x509_certificate *chain = NULL, *last = NULL, *cert; in tls_process_certificate() local
445 x509_certificate_chain_free(chain); in tls_process_certificate()
459 x509_certificate_chain_free(chain); in tls_process_certificate()
474 x509_certificate_chain_free(chain); in tls_process_certificate()
485 x509_certificate_chain_free(chain); in tls_process_certificate()
492 chain = cert; in tls_process_certificate()
501 if (conn->cred && conn->cred->server_cert_only && chain) { in tls_process_certificate()
507 x509_name_string(&chain->subject, buf, sizeof(buf)); in tls_process_certificate()
509 if (sha256_vector(1, &chain->cert_start, &chain in tls_process_certificate()
[all...]
H A Dtlsv1_server_read.c402 struct x509_certificate *chain = NULL, *last = NULL, *cert; in tls_process_certificate() local
495 x509_certificate_chain_free(chain); in tls_process_certificate()
508 x509_certificate_chain_free(chain); in tls_process_certificate()
522 x509_certificate_chain_free(chain); in tls_process_certificate()
532 x509_certificate_chain_free(chain); in tls_process_certificate()
537 chain = cert; in tls_process_certificate()
546 if (x509_certificate_chain_validate(conn->cred->trusted_certs, chain, in tls_process_certificate()
549 tlsv1_server_log(conn, "Server certificate chain validation failed (reason=%d)", in tls_process_certificate()
575 x509_certificate_chain_free(chain); in tls_process_certificate()
579 if (chain in tls_process_certificate()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_client_read.c360 struct x509_certificate *chain = NULL, *last = NULL, *cert; in tls_process_certificate() local
453 x509_certificate_chain_free(chain); in tls_process_certificate()
467 x509_certificate_chain_free(chain); in tls_process_certificate()
482 x509_certificate_chain_free(chain); in tls_process_certificate()
493 x509_certificate_chain_free(chain); in tls_process_certificate()
500 chain = cert; in tls_process_certificate()
509 if (conn->cred && conn->cred->server_cert_only && chain) { in tls_process_certificate()
515 x509_name_string(&chain->subject, buf, sizeof(buf)); in tls_process_certificate()
517 if (sha256_vector(1, &chain->cert_start, &chain in tls_process_certificate()
[all...]
/device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/mbedtls/include/mbedtls/
H A Dx509_crl.h102 * \param chain points to the start of the chain
109 int mbedtls_x509_crl_parse_der( mbedtls_x509_crl *chain,
116 * \param chain points to the start of the chain
123 int mbedtls_x509_crl_parse( mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen );
131 * \param chain points to the start of the chain
136 int mbedtls_x509_crl_parse_file( mbedtls_x509_crl *chain, const char *path );
154 * \brief Initialize a CRL (chain)
[all...]
/third_party/skia/third_party/externals/spirv-cross/
H A Dspirv_hlsl.cpp3742 void CompilerHLSL::read_access_chain_array(const string &lhs, const SPIRAccessChain &chain) in read_access_chain_array() argument
3744 auto &type = get<SPIRType>(chain.basetype); in read_access_chain_array()
3746 // Need to use a reserved identifier here since it might shadow an identifier in the access chain input or other loops. in read_access_chain_array()
3753 auto subchain = chain; in read_access_chain_array()
3754 subchain.dynamic_index = join(ident, " * ", chain.array_stride, " + ", chain.dynamic_index); in read_access_chain_array()
3762 void CompilerHLSL::read_access_chain_struct(const string &lhs, const SPIRAccessChain &chain) in read_access_chain_struct() argument
3764 auto &type = get<SPIRType>(chain.basetype); in read_access_chain_struct()
3765 auto subchain = chain; in read_access_chain_struct()
3771 subchain.static_index = chain in read_access_chain_struct()
3792 read_access_chain(string *expr, const string &lhs, const SPIRAccessChain &chain) read_access_chain() argument
3981 auto *chain = maybe_get<SPIRAccessChain>(ops[2]); emit_load() local
4028 write_access_chain_array(const SPIRAccessChain &chain, uint32_t value, const SmallVector<uint32_t> &composite_chain) write_access_chain_array() argument
4065 write_access_chain_struct(const SPIRAccessChain &chain, uint32_t value, const SmallVector<uint32_t> &composite_chain) write_access_chain_struct() argument
4118 write_access_chain(const SPIRAccessChain &chain, uint32_t value, const SmallVector<uint32_t> &composite_chain) write_access_chain() argument
4299 auto *chain = maybe_get<SPIRAccessChain>(ops[0]); emit_store() local
4313 const auto *chain = maybe_get<SPIRAccessChain>(ops[2]); emit_access_chain() local
4477 auto *chain = maybe_get<SPIRAccessChain>(ops[0]); emit_atomic() local
4511 auto *chain = maybe_get<SPIRAccessChain>(ops[2]); emit_atomic() local
[all...]
H A Dspirv_hlsl.hpp254 void read_access_chain(std::string *expr, const std::string &lhs, const SPIRAccessChain &chain);
255 void read_access_chain_struct(const std::string &lhs, const SPIRAccessChain &chain);
256 void read_access_chain_array(const std::string &lhs, const SPIRAccessChain &chain);
257 void write_access_chain(const SPIRAccessChain &chain, uint32_t value, const SmallVector<uint32_t> &composite_chain);
258 void write_access_chain_struct(const SPIRAccessChain &chain, uint32_t value,
260 void write_access_chain_array(const SPIRAccessChain &chain, uint32_t value,
/third_party/node/deps/openssl/openssl/crypto/ts/
H A Dts_rsp_verify.c20 X509 *signer, STACK_OF(X509) **chain);
22 const STACK_OF(X509) *chain);
96 STACK_OF(X509) *chain = NULL; in TS_RESP_verify_signature()
136 if (!ts_verify_cert(store, untrusted, signer, &chain)) in TS_RESP_verify_signature()
138 if (!ts_check_signing_certs(si, chain)) in TS_RESP_verify_signature()
161 sk_X509_pop_free(chain, X509_free); in TS_RESP_verify_signature()
168 * The certificate chain is returned in chain. Caller is responsible for
172 X509 *signer, STACK_OF(X509) **chain) in ts_verify_cert()
178 *chain in ts_verify_cert()
171 ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) ts_verify_cert() argument
231 ts_check_signing_certs(const PKCS7_SIGNER_INFO *si, const STACK_OF(X509) *chain) ts_check_signing_certs() argument
[all...]
/third_party/openssl/crypto/ts/
H A Dts_rsp_verify.c20 X509 *signer, STACK_OF(X509) **chain);
22 const STACK_OF(X509) *chain);
96 STACK_OF(X509) *chain = NULL; in TS_RESP_verify_signature()
136 if (!ts_verify_cert(store, untrusted, signer, &chain)) in TS_RESP_verify_signature()
138 if (!ts_check_signing_certs(si, chain)) in TS_RESP_verify_signature()
161 sk_X509_pop_free(chain, X509_free); in TS_RESP_verify_signature()
168 * The certificate chain is returned in chain. Caller is responsible for
172 X509 *signer, STACK_OF(X509) **chain) in ts_verify_cert()
178 *chain in ts_verify_cert()
171 ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) ts_verify_cert() argument
231 ts_check_signing_certs(const PKCS7_SIGNER_INFO *si, const STACK_OF(X509) *chain) ts_check_signing_certs() argument
[all...]
/third_party/mbedtls/include/mbedtls/
H A Dx509_crl.h114 * \param chain points to the start of the chain
121 int mbedtls_x509_crl_parse_der(mbedtls_x509_crl *chain,
132 * \param chain points to the start of the chain
139 int mbedtls_x509_crl_parse(mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen);
151 * \param chain points to the start of the chain
156 int mbedtls_x509_crl_parse_file(mbedtls_x509_crl *chain, const char *path);
176 * \brief Initialize a CRL (chain)
[all...]
H A Dx509_crt.h87 /** Next certificate in the linked list that constitutes the CA chain.
129 * in the provided chain. */
248 * Item in a verification chain: cert and flags for it
256 * Max size of verification chain: end-entity + intermediates + trusted root
261 * Verification chain as built by \c mbedtls_crt_verify_chain()
352 * \param chain The pointer to the start of the CRT chain to attach to.
353 * When parsing the first CRT in a chain, this should point
368 int mbedtls_x509_crt_parse_der(mbedtls_x509_crt *chain,
417 * \param chain Th
[all...]
/third_party/typescript/tests/baselines/reference/
H A DparserRealSource6.js103 var chain: ScopeChain = new ScopeChain(container, context.scopeChain, builder);
104 chain.thisType = thisType;
105 chain.classType = classType;
106 chain.moduleDecl = moduleDecl;
107 context.scopeChain = chain;
313 var chain = new ScopeChain(container, context.scopeChain, builder);
314 chain.thisType = thisType;
315 chain.classType = classType;
316 chain.moduleDecl = moduleDecl;
317 context.scopeChain = chain;
[all...]
/foundation/communication/netmanager_base/services/netmanagernative/include/manager/
H A Dbandwidth_manager.h105 std::string FetchChainName(NetManagerStandard::ChainType chain);
112 int32_t IptablesNewChain(NetManagerStandard::ChainType chain);
114 int32_t IptablesDeleteChain(NetManagerStandard::ChainType chain);
/test/xts/device_attest_lite/services/core/include/network/
H A Dattest_tls.h27 int32_t LoadCommonCert(mbedtls_x509_crt* chain);
29 int32_t LoadCommonOtherCert(mbedtls_x509_crt* chain, uint32_t cursor);
/third_party/skia/third_party/externals/dawn/generator/templates/dawn_wire/
H A DWireCmd.cpp112 WGPUChainedStructTransfer chain;
136 static_assert(offsetof({{Return}}{{name}}Transfer, chain) == 0, "");
145 //* Gather how much space will be needed for the extension chain.
227 ASSERT(transfer->chain.sType == {{as_cEnum(types["s type"].name, record.name)}});
228 ASSERT(transfer->chain.hasNext == (record.chain.next != nullptr));
319 //* Don't check |record->chain.next| matches because it is not set until the
321 ASSERT(record->chain.sType == {{as_cEnum(types["s type"].name, record.name)}});
322 ASSERT(record->chain.next == nullptr);
504 chainedStruct = typedStruct.chain
[all...]
/base/security/device_security_level/test/dslm_fuzz_test/dslm_fuzzer/
H A Ddslm_fuzzer.cpp261 struct HksCertChain chain; in BufferToHksCertChainTest() local
262 memset_s(&chain, sizeof(struct HksCertChain), 0, sizeof(struct HksCertChain)); in BufferToHksCertChainTest()
265 (void)BufferToHksCertChain(buff, len, &chain); in BufferToHksCertChainTest()
266 (void)BufferToHksCertChain(nullptr, len, &chain); in BufferToHksCertChainTest()
269 (void)HksCertChainToBuffer(&chain, &data, &len); in BufferToHksCertChainTest()
275 struct HksCertChain *chain = (struct HksCertChain *)MALLOC(sizeof(struct HksCertChain)); in DestroyHksCertChainTest() local
279 chain->certs = blob; in DestroyHksCertChainTest()
280 chain->certsCount = 1; in DestroyHksCertChainTest()
282 DestroyHksCertChain(chain); in DestroyHksCertChainTest()
/third_party/glslang/glslang/MachineIndependent/
H A DpropagateNoContraction.cpp51 // Use a string to hold the access chain information, as in most cases the
52 // access chain is short and may contain only one element, which is the symbol
70 // Mapping from object nodes to their access chain info string.
206 ObjectAccessChain getFrontElement(const ObjectAccessChain& chain) in getFrontElement() argument
208 size_t pos_delimiter = chain.find(ObjectAccesschainDelimiter); in getFrontElement()
209 return pos_delimiter == std::string::npos ? chain : chain.substr(0, pos_delimiter); in getFrontElement()
212 // A helper function to get the access chain starting from the second element.
213 ObjectAccessChain subAccessChainFromSecondElement(const ObjectAccessChain& chain) in subAccessChainFromSecondElement() argument
215 size_t pos_delimiter = chain in subAccessChainFromSecondElement()
220 getSubAccessChainAfterPrefix(const ObjectAccessChain& chain, const ObjectAccessChain& prefix) getSubAccessChainAfterPrefix() argument
[all...]
/foundation/communication/netmanager_base/test/netmanagernative/unittest/firewall_manager_test/
H A Dfirewall_manager_class_test.cpp69 ChainType chain = ChainType::CHAIN_OHFW_DOZABLE; in HWTEST_F() local
70 FirewallType fwType = g_firewallManager->FetchChainType(chain); in HWTEST_F()
73 chain = ChainType::CHAIN_OHFW_UNDOZABLE; in HWTEST_F()
74 fwType = g_firewallManager->FetchChainType(chain); in HWTEST_F()
77 chain = ChainType::CHAIN_NONE; in HWTEST_F()
78 fwType = g_firewallManager->FetchChainType(chain); in HWTEST_F()
/third_party/python/Tools/c-analyzer/c_common/
H A Diterutil.py13 def chain(): function
16 return chain(), peeked
/foundation/communication/netmanager_base/services/netmanagernative/src/manager/
H A Dbandwidth_manager.cpp44 std::string BandwidthManager::FetchChainName(ChainType chain) in FetchChainName() argument
46 NETNATIVE_LOG_D("BandwidthManager FetchChainName: chain=%{public}d", chain); in FetchChainName()
48 switch (chain) { in FetchChainName()
205 int32_t BandwidthManager::IptablesNewChain(ChainType chain) in IptablesNewChain() argument
207 NETNATIVE_LOG_D("BandwidthManager NewChain: chain=%{public}d", chain); in IptablesNewChain()
208 std::string command = "-t filter -N " + FetchChainName(chain); in IptablesNewChain()
214 NETNATIVE_LOG_D("BandwidthManager NewChain: chain=%{public}s", chainName.c_str()); in IptablesNewChain()
219 int32_t BandwidthManager::IptablesDeleteChain(ChainType chain) in IptablesDeleteChain() argument
[all...]
/third_party/mbedtls/library/
H A Dx509_crl.c283 int mbedtls_x509_crl_parse_der(mbedtls_x509_crl *chain, in mbedtls_x509_crl_parse_der() argument
290 mbedtls_x509_crl *crl = chain; in mbedtls_x509_crl_parse_der()
304 * Add new CRL on the end of the chain if needed. in mbedtls_x509_crl_parse_der()
505 int mbedtls_x509_crl_parse(mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen) in mbedtls_x509_crl_parse() argument
513 if (chain == NULL || buf == NULL) { in mbedtls_x509_crl_parse()
540 if ((ret = mbedtls_x509_crl_parse_der(chain, in mbedtls_x509_crl_parse()
560 return mbedtls_x509_crl_parse_der(chain, buf, buflen); in mbedtls_x509_crl_parse()
567 int mbedtls_x509_crl_parse_file(mbedtls_x509_crl *chain, const char *path) in mbedtls_x509_crl_parse_file() argument
577 ret = mbedtls_x509_crl_parse(chain, buf, n); in mbedtls_x509_crl_parse_file()
667 * Initialize a CRL chain
[all...]
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dx509_cmp.c465 int X509_chain_check_suiteb(int *perror_depth, X509 *x, STACK_OF(X509) *chain, in X509_chain_check_suiteb() argument
475 /* If no EE certificate passed in must be first in chain */ in X509_chain_check_suiteb()
477 x = sk_X509_value(chain, 0); in X509_chain_check_suiteb()
486 * a chain all, just report trust success or failure, but must also report in X509_chain_check_suiteb()
487 * Suite-B errors if applicable. This is indicated via a NULL chain in X509_chain_check_suiteb()
490 if (chain == NULL) in X509_chain_check_suiteb()
507 for (; i < sk_X509_num(chain); i++) { in X509_chain_check_suiteb()
509 x = sk_X509_value(chain, i); in X509_chain_check_suiteb()
550 int X509_chain_check_suiteb(int *perror_depth, X509 *x, STACK_OF(X509) *chain, in X509_chain_check_suiteb() argument
568 STACK_OF(X509) *X509_chain_up_ref(STACK_OF(X509) *chain) in STACK_OF()
[all...]
H A Dv3_asid.c751 STACK_OF(X509) *chain, in asid_validate_path_internal()
758 if (!ossl_assert(chain != NULL && sk_X509_num(chain) > 0) in asid_validate_path_internal()
770 * set up for walking up the chain. in asid_validate_path_internal()
777 x = sk_X509_value(chain, i); in asid_validate_path_internal()
805 * Now walk up the chain. Extensions must be in canonical form, no in asid_validate_path_internal()
808 for (i++; i < sk_X509_num(chain); i++) { in asid_validate_path_internal()
809 x = sk_X509_value(chain, i); in asid_validate_path_internal()
885 if (ctx->chain == NULL in X509v3_asid_validate_path()
886 || sk_X509_num(ctx->chain) in X509v3_asid_validate_path()
750 asid_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, ASIdentifiers *ext) asid_validate_path_internal() argument
[all...]
/third_party/openssl/crypto/x509/
H A Dx509_cmp.c462 int X509_chain_check_suiteb(int *perror_depth, X509 *x, STACK_OF(X509) *chain, in X509_chain_check_suiteb() argument
472 /* If no EE certificate passed in must be first in chain */ in X509_chain_check_suiteb()
474 x = sk_X509_value(chain, 0); in X509_chain_check_suiteb()
483 * a chain all, just report trust success or failure, but must also report in X509_chain_check_suiteb()
484 * Suite-B errors if applicable. This is indicated via a NULL chain in X509_chain_check_suiteb()
487 if (chain == NULL) in X509_chain_check_suiteb()
504 for (; i < sk_X509_num(chain); i++) { in X509_chain_check_suiteb()
506 x = sk_X509_value(chain, i); in X509_chain_check_suiteb()
547 int X509_chain_check_suiteb(int *perror_depth, X509 *x, STACK_OF(X509) *chain, in X509_chain_check_suiteb() argument
565 STACK_OF(X509) *X509_chain_up_ref(STACK_OF(X509) *chain) in STACK_OF()
[all...]
H A Dv3_asid.c737 STACK_OF(X509) *chain, in asid_validate_path_internal()
744 if (!ossl_assert(chain != NULL && sk_X509_num(chain) > 0) in asid_validate_path_internal()
756 * set up for walking up the chain. in asid_validate_path_internal()
763 x = sk_X509_value(chain, i); in asid_validate_path_internal()
791 * Now walk up the chain. Extensions must be in canonical form, no in asid_validate_path_internal()
794 for (i++; i < sk_X509_num(chain); i++) { in asid_validate_path_internal()
795 x = sk_X509_value(chain, i); in asid_validate_path_internal()
871 if (ctx->chain == NULL in X509v3_asid_validate_path()
872 || sk_X509_num(ctx->chain) in X509v3_asid_validate_path()
736 asid_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, ASIdentifiers *ext) asid_validate_path_internal() argument
[all...]
/third_party/rust/crates/rust-openssl/openssl/src/
H A Dpkcs12.rs44 chain: parsed.ca, in parse()
115 pub chain: Option<Stack<X509>>,
311 let chain = parsed.ca.unwrap(); in parse()
312 assert_eq!(chain.len(), 1); in parse()
314 hex::encode(chain[0].digest(MessageDigest::sha1()).unwrap()), in parse()
324 let der = include_bytes!("../test/keystore-empty-chain.p12"); in parse_empty_chain()
382 let mut chain = Stack::new().unwrap(); in create_only_ca() variables
383 chain.push(ca).unwrap(); in create_only_ca()
385 let pkcs12 = Pkcs12::builder().ca(chain).build2("hunter2").unwrap(); in create_only_ca()

Completed in 22 milliseconds

12345678910>>...30