| /third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
| H A D | tlsv1_client_read.c | 352 struct x509_certificate *chain = NULL, *last = NULL, *cert; in tls_process_certificate() local 445 x509_certificate_chain_free(chain); in tls_process_certificate() 459 x509_certificate_chain_free(chain); in tls_process_certificate() 474 x509_certificate_chain_free(chain); in tls_process_certificate() 485 x509_certificate_chain_free(chain); in tls_process_certificate() 492 chain = cert; in tls_process_certificate() 501 if (conn->cred && conn->cred->server_cert_only && chain) { in tls_process_certificate() 507 x509_name_string(&chain->subject, buf, sizeof(buf)); in tls_process_certificate() 509 if (sha256_vector(1, &chain->cert_start, &chain in tls_process_certificate() [all...] |
| H A D | tlsv1_server_read.c | 402 struct x509_certificate *chain = NULL, *last = NULL, *cert; in tls_process_certificate() local 495 x509_certificate_chain_free(chain); in tls_process_certificate() 508 x509_certificate_chain_free(chain); in tls_process_certificate() 522 x509_certificate_chain_free(chain); in tls_process_certificate() 532 x509_certificate_chain_free(chain); in tls_process_certificate() 537 chain = cert; in tls_process_certificate() 546 if (x509_certificate_chain_validate(conn->cred->trusted_certs, chain, in tls_process_certificate() 549 tlsv1_server_log(conn, "Server certificate chain validation failed (reason=%d)", in tls_process_certificate() 575 x509_certificate_chain_free(chain); in tls_process_certificate() 579 if (chain in tls_process_certificate() [all...] |
| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| H A D | tlsv1_client_read.c | 360 struct x509_certificate *chain = NULL, *last = NULL, *cert; in tls_process_certificate() local 453 x509_certificate_chain_free(chain); in tls_process_certificate() 467 x509_certificate_chain_free(chain); in tls_process_certificate() 482 x509_certificate_chain_free(chain); in tls_process_certificate() 493 x509_certificate_chain_free(chain); in tls_process_certificate() 500 chain = cert; in tls_process_certificate() 509 if (conn->cred && conn->cred->server_cert_only && chain) { in tls_process_certificate() 515 x509_name_string(&chain->subject, buf, sizeof(buf)); in tls_process_certificate() 517 if (sha256_vector(1, &chain->cert_start, &chain in tls_process_certificate() [all...] |
| /device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/mbedtls/include/mbedtls/ |
| H A D | x509_crl.h | 102 * \param chain points to the start of the chain 109 int mbedtls_x509_crl_parse_der( mbedtls_x509_crl *chain, 116 * \param chain points to the start of the chain 123 int mbedtls_x509_crl_parse( mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen ); 131 * \param chain points to the start of the chain 136 int mbedtls_x509_crl_parse_file( mbedtls_x509_crl *chain, const char *path ); 154 * \brief Initialize a CRL (chain) [all...] |
| /third_party/skia/third_party/externals/spirv-cross/ |
| H A D | spirv_hlsl.cpp | 3742 void CompilerHLSL::read_access_chain_array(const string &lhs, const SPIRAccessChain &chain) in read_access_chain_array() argument 3744 auto &type = get<SPIRType>(chain.basetype); in read_access_chain_array() 3746 // Need to use a reserved identifier here since it might shadow an identifier in the access chain input or other loops. in read_access_chain_array() 3753 auto subchain = chain; in read_access_chain_array() 3754 subchain.dynamic_index = join(ident, " * ", chain.array_stride, " + ", chain.dynamic_index); in read_access_chain_array() 3762 void CompilerHLSL::read_access_chain_struct(const string &lhs, const SPIRAccessChain &chain) in read_access_chain_struct() argument 3764 auto &type = get<SPIRType>(chain.basetype); in read_access_chain_struct() 3765 auto subchain = chain; in read_access_chain_struct() 3771 subchain.static_index = chain in read_access_chain_struct() 3792 read_access_chain(string *expr, const string &lhs, const SPIRAccessChain &chain) read_access_chain() argument 3981 auto *chain = maybe_get<SPIRAccessChain>(ops[2]); emit_load() local 4028 write_access_chain_array(const SPIRAccessChain &chain, uint32_t value, const SmallVector<uint32_t> &composite_chain) write_access_chain_array() argument 4065 write_access_chain_struct(const SPIRAccessChain &chain, uint32_t value, const SmallVector<uint32_t> &composite_chain) write_access_chain_struct() argument 4118 write_access_chain(const SPIRAccessChain &chain, uint32_t value, const SmallVector<uint32_t> &composite_chain) write_access_chain() argument 4299 auto *chain = maybe_get<SPIRAccessChain>(ops[0]); emit_store() local 4313 const auto *chain = maybe_get<SPIRAccessChain>(ops[2]); emit_access_chain() local 4477 auto *chain = maybe_get<SPIRAccessChain>(ops[0]); emit_atomic() local 4511 auto *chain = maybe_get<SPIRAccessChain>(ops[2]); emit_atomic() local [all...] |
| H A D | spirv_hlsl.hpp | 254 void read_access_chain(std::string *expr, const std::string &lhs, const SPIRAccessChain &chain); 255 void read_access_chain_struct(const std::string &lhs, const SPIRAccessChain &chain); 256 void read_access_chain_array(const std::string &lhs, const SPIRAccessChain &chain); 257 void write_access_chain(const SPIRAccessChain &chain, uint32_t value, const SmallVector<uint32_t> &composite_chain); 258 void write_access_chain_struct(const SPIRAccessChain &chain, uint32_t value, 260 void write_access_chain_array(const SPIRAccessChain &chain, uint32_t value,
|
| /third_party/node/deps/openssl/openssl/crypto/ts/ |
| H A D | ts_rsp_verify.c | 20 X509 *signer, STACK_OF(X509) **chain); 22 const STACK_OF(X509) *chain); 96 STACK_OF(X509) *chain = NULL; in TS_RESP_verify_signature() 136 if (!ts_verify_cert(store, untrusted, signer, &chain)) in TS_RESP_verify_signature() 138 if (!ts_check_signing_certs(si, chain)) in TS_RESP_verify_signature() 161 sk_X509_pop_free(chain, X509_free); in TS_RESP_verify_signature() 168 * The certificate chain is returned in chain. Caller is responsible for 172 X509 *signer, STACK_OF(X509) **chain) in ts_verify_cert() 178 *chain in ts_verify_cert() 171 ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) ts_verify_cert() argument 231 ts_check_signing_certs(const PKCS7_SIGNER_INFO *si, const STACK_OF(X509) *chain) ts_check_signing_certs() argument [all...] |
| /third_party/openssl/crypto/ts/ |
| H A D | ts_rsp_verify.c | 20 X509 *signer, STACK_OF(X509) **chain); 22 const STACK_OF(X509) *chain); 96 STACK_OF(X509) *chain = NULL; in TS_RESP_verify_signature() 136 if (!ts_verify_cert(store, untrusted, signer, &chain)) in TS_RESP_verify_signature() 138 if (!ts_check_signing_certs(si, chain)) in TS_RESP_verify_signature() 161 sk_X509_pop_free(chain, X509_free); in TS_RESP_verify_signature() 168 * The certificate chain is returned in chain. Caller is responsible for 172 X509 *signer, STACK_OF(X509) **chain) in ts_verify_cert() 178 *chain in ts_verify_cert() 171 ts_verify_cert(X509_STORE *store, STACK_OF(X509) *untrusted, X509 *signer, STACK_OF(X509) **chain) ts_verify_cert() argument 231 ts_check_signing_certs(const PKCS7_SIGNER_INFO *si, const STACK_OF(X509) *chain) ts_check_signing_certs() argument [all...] |
| /third_party/mbedtls/include/mbedtls/ |
| H A D | x509_crl.h | 114 * \param chain points to the start of the chain 121 int mbedtls_x509_crl_parse_der(mbedtls_x509_crl *chain, 132 * \param chain points to the start of the chain 139 int mbedtls_x509_crl_parse(mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen); 151 * \param chain points to the start of the chain 156 int mbedtls_x509_crl_parse_file(mbedtls_x509_crl *chain, const char *path); 176 * \brief Initialize a CRL (chain) [all...] |
| H A D | x509_crt.h | 87 /** Next certificate in the linked list that constitutes the CA chain. 129 * in the provided chain. */ 248 * Item in a verification chain: cert and flags for it 256 * Max size of verification chain: end-entity + intermediates + trusted root 261 * Verification chain as built by \c mbedtls_crt_verify_chain() 352 * \param chain The pointer to the start of the CRT chain to attach to. 353 * When parsing the first CRT in a chain, this should point 368 int mbedtls_x509_crt_parse_der(mbedtls_x509_crt *chain, 417 * \param chain Th [all...] |
| /third_party/typescript/tests/baselines/reference/ |
| H A D | parserRealSource6.js | 103 var chain: ScopeChain = new ScopeChain(container, context.scopeChain, builder); 104 chain.thisType = thisType; 105 chain.classType = classType; 106 chain.moduleDecl = moduleDecl; 107 context.scopeChain = chain; 313 var chain = new ScopeChain(container, context.scopeChain, builder);
314 chain.thisType = thisType;
315 chain.classType = classType;
316 chain.moduleDecl = moduleDecl;
317 context.scopeChain = chain;
[all...] |
| /foundation/communication/netmanager_base/services/netmanagernative/include/manager/ |
| H A D | bandwidth_manager.h | 105 std::string FetchChainName(NetManagerStandard::ChainType chain); 112 int32_t IptablesNewChain(NetManagerStandard::ChainType chain); 114 int32_t IptablesDeleteChain(NetManagerStandard::ChainType chain);
|
| /test/xts/device_attest_lite/services/core/include/network/ |
| H A D | attest_tls.h | 27 int32_t LoadCommonCert(mbedtls_x509_crt* chain); 29 int32_t LoadCommonOtherCert(mbedtls_x509_crt* chain, uint32_t cursor);
|
| /third_party/skia/third_party/externals/dawn/generator/templates/dawn_wire/ |
| H A D | WireCmd.cpp | 112 WGPUChainedStructTransfer chain; 136 static_assert(offsetof({{Return}}{{name}}Transfer, chain) == 0, ""); 145 //* Gather how much space will be needed for the extension chain. 227 ASSERT(transfer->chain.sType == {{as_cEnum(types["s type"].name, record.name)}}); 228 ASSERT(transfer->chain.hasNext == (record.chain.next != nullptr)); 319 //* Don't check |record->chain.next| matches because it is not set until the 321 ASSERT(record->chain.sType == {{as_cEnum(types["s type"].name, record.name)}}); 322 ASSERT(record->chain.next == nullptr); 504 chainedStruct = typedStruct.chain [all...] |
| /base/security/device_security_level/test/dslm_fuzz_test/dslm_fuzzer/ |
| H A D | dslm_fuzzer.cpp | 261 struct HksCertChain chain; in BufferToHksCertChainTest() local 262 memset_s(&chain, sizeof(struct HksCertChain), 0, sizeof(struct HksCertChain)); in BufferToHksCertChainTest() 265 (void)BufferToHksCertChain(buff, len, &chain); in BufferToHksCertChainTest() 266 (void)BufferToHksCertChain(nullptr, len, &chain); in BufferToHksCertChainTest() 269 (void)HksCertChainToBuffer(&chain, &data, &len); in BufferToHksCertChainTest() 275 struct HksCertChain *chain = (struct HksCertChain *)MALLOC(sizeof(struct HksCertChain)); in DestroyHksCertChainTest() local 279 chain->certs = blob; in DestroyHksCertChainTest() 280 chain->certsCount = 1; in DestroyHksCertChainTest() 282 DestroyHksCertChain(chain); in DestroyHksCertChainTest()
|
| /third_party/glslang/glslang/MachineIndependent/ |
| H A D | propagateNoContraction.cpp | 51 // Use a string to hold the access chain information, as in most cases the 52 // access chain is short and may contain only one element, which is the symbol 70 // Mapping from object nodes to their access chain info string. 206 ObjectAccessChain getFrontElement(const ObjectAccessChain& chain) in getFrontElement() argument 208 size_t pos_delimiter = chain.find(ObjectAccesschainDelimiter); in getFrontElement() 209 return pos_delimiter == std::string::npos ? chain : chain.substr(0, pos_delimiter); in getFrontElement() 212 // A helper function to get the access chain starting from the second element. 213 ObjectAccessChain subAccessChainFromSecondElement(const ObjectAccessChain& chain) in subAccessChainFromSecondElement() argument 215 size_t pos_delimiter = chain in subAccessChainFromSecondElement() 220 getSubAccessChainAfterPrefix(const ObjectAccessChain& chain, const ObjectAccessChain& prefix) getSubAccessChainAfterPrefix() argument [all...] |
| /foundation/communication/netmanager_base/test/netmanagernative/unittest/firewall_manager_test/ |
| H A D | firewall_manager_class_test.cpp | 69 ChainType chain = ChainType::CHAIN_OHFW_DOZABLE; in HWTEST_F() local 70 FirewallType fwType = g_firewallManager->FetchChainType(chain); in HWTEST_F() 73 chain = ChainType::CHAIN_OHFW_UNDOZABLE; in HWTEST_F() 74 fwType = g_firewallManager->FetchChainType(chain); in HWTEST_F() 77 chain = ChainType::CHAIN_NONE; in HWTEST_F() 78 fwType = g_firewallManager->FetchChainType(chain); in HWTEST_F()
|
| /third_party/python/Tools/c-analyzer/c_common/ |
| H A D | iterutil.py | 13 def chain(): function 16 return chain(), peeked
|
| /foundation/communication/netmanager_base/services/netmanagernative/src/manager/ |
| H A D | bandwidth_manager.cpp | 44 std::string BandwidthManager::FetchChainName(ChainType chain) in FetchChainName() argument 46 NETNATIVE_LOG_D("BandwidthManager FetchChainName: chain=%{public}d", chain); in FetchChainName() 48 switch (chain) { in FetchChainName() 205 int32_t BandwidthManager::IptablesNewChain(ChainType chain) in IptablesNewChain() argument 207 NETNATIVE_LOG_D("BandwidthManager NewChain: chain=%{public}d", chain); in IptablesNewChain() 208 std::string command = "-t filter -N " + FetchChainName(chain); in IptablesNewChain() 214 NETNATIVE_LOG_D("BandwidthManager NewChain: chain=%{public}s", chainName.c_str()); in IptablesNewChain() 219 int32_t BandwidthManager::IptablesDeleteChain(ChainType chain) in IptablesDeleteChain() argument [all...] |
| /third_party/mbedtls/library/ |
| H A D | x509_crl.c | 283 int mbedtls_x509_crl_parse_der(mbedtls_x509_crl *chain, in mbedtls_x509_crl_parse_der() argument 290 mbedtls_x509_crl *crl = chain; in mbedtls_x509_crl_parse_der() 304 * Add new CRL on the end of the chain if needed. in mbedtls_x509_crl_parse_der() 505 int mbedtls_x509_crl_parse(mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen) in mbedtls_x509_crl_parse() argument 513 if (chain == NULL || buf == NULL) { in mbedtls_x509_crl_parse() 540 if ((ret = mbedtls_x509_crl_parse_der(chain, in mbedtls_x509_crl_parse() 560 return mbedtls_x509_crl_parse_der(chain, buf, buflen); in mbedtls_x509_crl_parse() 567 int mbedtls_x509_crl_parse_file(mbedtls_x509_crl *chain, const char *path) in mbedtls_x509_crl_parse_file() argument 577 ret = mbedtls_x509_crl_parse(chain, buf, n); in mbedtls_x509_crl_parse_file() 667 * Initialize a CRL chain [all...] |
| /third_party/node/deps/openssl/openssl/crypto/x509/ |
| H A D | x509_cmp.c | 465 int X509_chain_check_suiteb(int *perror_depth, X509 *x, STACK_OF(X509) *chain, in X509_chain_check_suiteb() argument 475 /* If no EE certificate passed in must be first in chain */ in X509_chain_check_suiteb() 477 x = sk_X509_value(chain, 0); in X509_chain_check_suiteb() 486 * a chain all, just report trust success or failure, but must also report in X509_chain_check_suiteb() 487 * Suite-B errors if applicable. This is indicated via a NULL chain in X509_chain_check_suiteb() 490 if (chain == NULL) in X509_chain_check_suiteb() 507 for (; i < sk_X509_num(chain); i++) { in X509_chain_check_suiteb() 509 x = sk_X509_value(chain, i); in X509_chain_check_suiteb() 550 int X509_chain_check_suiteb(int *perror_depth, X509 *x, STACK_OF(X509) *chain, in X509_chain_check_suiteb() argument 568 STACK_OF(X509) *X509_chain_up_ref(STACK_OF(X509) *chain) in STACK_OF() [all...] |
| H A D | v3_asid.c | 751 STACK_OF(X509) *chain, in asid_validate_path_internal() 758 if (!ossl_assert(chain != NULL && sk_X509_num(chain) > 0) in asid_validate_path_internal() 770 * set up for walking up the chain. in asid_validate_path_internal() 777 x = sk_X509_value(chain, i); in asid_validate_path_internal() 805 * Now walk up the chain. Extensions must be in canonical form, no in asid_validate_path_internal() 808 for (i++; i < sk_X509_num(chain); i++) { in asid_validate_path_internal() 809 x = sk_X509_value(chain, i); in asid_validate_path_internal() 885 if (ctx->chain == NULL in X509v3_asid_validate_path() 886 || sk_X509_num(ctx->chain) in X509v3_asid_validate_path() 750 asid_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, ASIdentifiers *ext) asid_validate_path_internal() argument [all...] |
| /third_party/openssl/crypto/x509/ |
| H A D | x509_cmp.c | 462 int X509_chain_check_suiteb(int *perror_depth, X509 *x, STACK_OF(X509) *chain, in X509_chain_check_suiteb() argument 472 /* If no EE certificate passed in must be first in chain */ in X509_chain_check_suiteb() 474 x = sk_X509_value(chain, 0); in X509_chain_check_suiteb() 483 * a chain all, just report trust success or failure, but must also report in X509_chain_check_suiteb() 484 * Suite-B errors if applicable. This is indicated via a NULL chain in X509_chain_check_suiteb() 487 if (chain == NULL) in X509_chain_check_suiteb() 504 for (; i < sk_X509_num(chain); i++) { in X509_chain_check_suiteb() 506 x = sk_X509_value(chain, i); in X509_chain_check_suiteb() 547 int X509_chain_check_suiteb(int *perror_depth, X509 *x, STACK_OF(X509) *chain, in X509_chain_check_suiteb() argument 565 STACK_OF(X509) *X509_chain_up_ref(STACK_OF(X509) *chain) in STACK_OF() [all...] |
| H A D | v3_asid.c | 737 STACK_OF(X509) *chain, in asid_validate_path_internal() 744 if (!ossl_assert(chain != NULL && sk_X509_num(chain) > 0) in asid_validate_path_internal() 756 * set up for walking up the chain. in asid_validate_path_internal() 763 x = sk_X509_value(chain, i); in asid_validate_path_internal() 791 * Now walk up the chain. Extensions must be in canonical form, no in asid_validate_path_internal() 794 for (i++; i < sk_X509_num(chain); i++) { in asid_validate_path_internal() 795 x = sk_X509_value(chain, i); in asid_validate_path_internal() 871 if (ctx->chain == NULL in X509v3_asid_validate_path() 872 || sk_X509_num(ctx->chain) in X509v3_asid_validate_path() 736 asid_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, ASIdentifiers *ext) asid_validate_path_internal() argument [all...] |
| /third_party/rust/crates/rust-openssl/openssl/src/ |
| H A D | pkcs12.rs | 44 chain: parsed.ca, in parse() 115 pub chain: Option<Stack<X509>>, 311 let chain = parsed.ca.unwrap(); in parse() 312 assert_eq!(chain.len(), 1); in parse() 314 hex::encode(chain[0].digest(MessageDigest::sha1()).unwrap()), in parse() 324 let der = include_bytes!("../test/keystore-empty-chain.p12"); in parse_empty_chain() 382 let mut chain = Stack::new().unwrap(); in create_only_ca() variables 383 chain.push(ca).unwrap(); in create_only_ca() 385 let pkcs12 = Pkcs12::builder().ca(chain).build2("hunter2").unwrap(); in create_only_ca()
|