| /third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
| H A D | tlsv1_server_read.c | 402 struct x509_certificate *chain = NULL, *last = NULL, *cert; in tls_process_certificate() local 495 x509_certificate_chain_free(chain); in tls_process_certificate() 508 x509_certificate_chain_free(chain); in tls_process_certificate() 522 x509_certificate_chain_free(chain); in tls_process_certificate() 532 x509_certificate_chain_free(chain); in tls_process_certificate() 537 chain = cert; in tls_process_certificate() 546 if (x509_certificate_chain_validate(conn->cred->trusted_certs, chain, in tls_process_certificate() 549 tlsv1_server_log(conn, "Server certificate chain validation failed (reason=%d)", in tls_process_certificate() 575 x509_certificate_chain_free(chain); in tls_process_certificate() 579 if (chain in tls_process_certificate() [all...] |
| /third_party/elfutils/libdw/ |
| H A D | dwarf_attr_integrate.c | 41 int chain = 16; /* Largest DIE ref chain we will follow. */ in dwarf_attr_integrate() local 56 while (die != NULL && chain-- != 0); in dwarf_attr_integrate()
|
| H A D | dwarf_hasattr_integrate.c | 40 int chain = 16; /* Largest DIE ref chain we will follow. */ in dwarf_hasattr_integrate() local 56 while (die != NULL && chain-- != 0); in dwarf_hasattr_integrate()
|
| /third_party/node/deps/openssl/openssl/crypto/cmp/ |
| H A D | cmp_client.c | 489 STACK_OF(X509) *chain = NULL; in OSSL_CMP_certConf_cb() 496 ossl_cmp_debug(ctx, "trying to build chain for newly enrolled cert"); in OSSL_CMP_certConf_cb() 497 chain = X509_build_chain(cert, ctx->untrusted, out_trusted, in OSSL_CMP_certConf_cb() 516 if (!ossl_x509_add_certs_new(&chain, X509_STORE_CTX_get0_chain(csc), in OSSL_CMP_certConf_cb() 519 sk_X509_free(chain); in OSSL_CMP_certConf_cb() 520 chain = NULL; in OSSL_CMP_certConf_cb() 526 if (sk_X509_num(chain) > 0) in OSSL_CMP_certConf_cb() 527 X509_free(sk_X509_shift(chain)); /* remove leaf (EE) cert */ in OSSL_CMP_certConf_cb() 529 if (chain == NULL) { in OSSL_CMP_certConf_cb() 536 } else if (chain in OSSL_CMP_certConf_cb() [all...] |
| H A D | cmp_protect.c | 132 /* ctx is not const just because ctx->chain may get adapted */ 138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts() 144 /* if not yet done try to build chain using available untrusted certs */ in ossl_cmp_msg_add_extraCerts() 145 if (ctx->chain == NULL) { in ossl_cmp_msg_add_extraCerts() 147 "trying to build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 148 ctx->chain = X509_build_chain(ctx->cert, ctx->untrusted, NULL, 0, in ossl_cmp_msg_add_extraCerts() 150 if (ctx->chain != NULL) { in ossl_cmp_msg_add_extraCerts() 152 "success building chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 157 "could not build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 160 if (ctx->chain ! in ossl_cmp_msg_add_extraCerts() [all...] |
| /third_party/node/deps/openssl/openssl/ssl/ |
| H A D | ssl_rsa.c | 504 * the chain (while we must free the main certificate, since its in use_certificate_chain_file() 924 STACK_OF(X509) *chain, int override) in ssl_set_cert_and_key() 940 for (j = 0; j < sk_X509_num(chain); j++) { in ssl_set_cert_and_key() 941 rv = ssl_security_cert(ssl, ctx, sk_X509_value(chain, j), 0, 0); in ssl_set_cert_and_key() 988 || c->pkeys[i].chain != NULL)) { in ssl_set_cert_and_key() 994 if (chain != NULL) { in ssl_set_cert_and_key() 995 dup_chain = X509_chain_up_ref(chain); in ssl_set_cert_and_key() 1002 sk_X509_pop_free(c->pkeys[i].chain, X509_free); in ssl_set_cert_and_key() 1003 c->pkeys[i].chain = dup_chain; in ssl_set_cert_and_key() 1022 STACK_OF(X509) *chain, in in SSL_use_cert_and_key() 923 ssl_set_cert_and_key(SSL *ssl, SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, STACK_OF(X509) *chain, int override) ssl_set_cert_and_key() argument 1021 SSL_use_cert_and_key(SSL *ssl, X509 *x509, EVP_PKEY *privatekey, STACK_OF(X509) *chain, int override) SSL_use_cert_and_key() argument 1027 SSL_CTX_use_cert_and_key(SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, STACK_OF(X509) *chain, int override) SSL_CTX_use_cert_and_key() argument [all...] |
| /third_party/openssl/crypto/cmp/ |
| H A D | cmp_client.c | 492 STACK_OF(X509) *chain = NULL; in OSSL_CMP_certConf_cb() 499 ossl_cmp_debug(ctx, "trying to build chain for newly enrolled cert"); in OSSL_CMP_certConf_cb() 500 chain = X509_build_chain(cert, ctx->untrusted, out_trusted, in OSSL_CMP_certConf_cb() 519 if (!ossl_x509_add_certs_new(&chain, X509_STORE_CTX_get0_chain(csc), in OSSL_CMP_certConf_cb() 522 sk_X509_free(chain); in OSSL_CMP_certConf_cb() 523 chain = NULL; in OSSL_CMP_certConf_cb() 529 if (sk_X509_num(chain) > 0) in OSSL_CMP_certConf_cb() 530 X509_free(sk_X509_shift(chain)); /* remove leaf (EE) cert */ in OSSL_CMP_certConf_cb() 532 if (chain == NULL) { in OSSL_CMP_certConf_cb() 539 } else if (chain in OSSL_CMP_certConf_cb() [all...] |
| H A D | cmp_protect.c | 132 /* ctx is not const just because ctx->chain may get adapted */ 138 /* Add first ctx->cert and its chain if using signature-based protection */ in ossl_cmp_msg_add_extraCerts() 144 /* if not yet done try to build chain using available untrusted certs */ in ossl_cmp_msg_add_extraCerts() 145 if (ctx->chain == NULL) { in ossl_cmp_msg_add_extraCerts() 147 "trying to build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 148 ctx->chain = X509_build_chain(ctx->cert, ctx->untrusted, NULL, 0, in ossl_cmp_msg_add_extraCerts() 150 if (ctx->chain != NULL) { in ossl_cmp_msg_add_extraCerts() 152 "success building chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 157 "could not build chain for own CMP signer cert"); in ossl_cmp_msg_add_extraCerts() 160 if (ctx->chain ! in ossl_cmp_msg_add_extraCerts() [all...] |
| /third_party/openssl/ssl/ |
| H A D | ssl_rsa.c | 504 * the chain (while we must free the main certificate, since its in use_certificate_chain_file() 924 STACK_OF(X509) *chain, int override) in ssl_set_cert_and_key() 940 for (j = 0; j < sk_X509_num(chain); j++) { in ssl_set_cert_and_key() 941 rv = ssl_security_cert(ssl, ctx, sk_X509_value(chain, j), 0, 0); in ssl_set_cert_and_key() 988 || c->pkeys[i].chain != NULL)) { in ssl_set_cert_and_key() 994 if (chain != NULL) { in ssl_set_cert_and_key() 995 dup_chain = X509_chain_up_ref(chain); in ssl_set_cert_and_key() 1002 sk_X509_pop_free(c->pkeys[i].chain, X509_free); in ssl_set_cert_and_key() 1003 c->pkeys[i].chain = dup_chain; in ssl_set_cert_and_key() 1022 STACK_OF(X509) *chain, in in SSL_use_cert_and_key() 923 ssl_set_cert_and_key(SSL *ssl, SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, STACK_OF(X509) *chain, int override) ssl_set_cert_and_key() argument 1021 SSL_use_cert_and_key(SSL *ssl, X509 *x509, EVP_PKEY *privatekey, STACK_OF(X509) *chain, int override) SSL_use_cert_and_key() argument 1027 SSL_CTX_use_cert_and_key(SSL_CTX *ctx, X509 *x509, EVP_PKEY *privatekey, STACK_OF(X509) *chain, int override) SSL_CTX_use_cert_and_key() argument [all...] |
| /third_party/skia/third_party/externals/spirv-tools/source/opt/ |
| H A D | scalar_replacement_pass.cpp | 337 Instruction* chain, const std::vector<Instruction*>& replacements) { in ReplaceAccessChain() 338 // Replaces the access chain with either another access chain (with one fewer in ReplaceAccessChain() 340 uint32_t indexId = chain->GetSingleWordInOperand(1u); in ReplaceAccessChain() 353 if (chain->NumInOperands() > 2) { in ReplaceAccessChain() 354 // Replace input access chain with another access chain. in ReplaceAccessChain() 355 BasicBlock::iterator chainIter(chain); in ReplaceAccessChain() 361 context(), chain->opcode(), chain in ReplaceAccessChain() 336 ReplaceAccessChain( Instruction* chain, const std::vector<Instruction*>& replacements) ReplaceAccessChain() argument [all...] |
| /third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/opt/ |
| H A D | scalar_replacement_pass.cpp | 337 Instruction* chain, const std::vector<Instruction*>& replacements) { in ReplaceAccessChain() 338 // Replaces the access chain with either another access chain (with one fewer in ReplaceAccessChain() 340 uint32_t indexId = chain->GetSingleWordInOperand(1u); in ReplaceAccessChain() 353 if (chain->NumInOperands() > 2) { in ReplaceAccessChain() 354 // Replace input access chain with another access chain. in ReplaceAccessChain() 355 BasicBlock::iterator chainIter(chain); in ReplaceAccessChain() 361 context(), chain->opcode(), chain in ReplaceAccessChain() 336 ReplaceAccessChain( Instruction* chain, const std::vector<Instruction*>& replacements) ReplaceAccessChain() argument [all...] |
| /device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/mbedtls/include/mbedtls/ |
| H A D | x509_crt.h | 93 struct mbedtls_x509_crt *next; /**< Next certificate in the CA-chain. */ 147 * Item in a verification chain: cert and flags for it 155 * Max size of verification chain: end-entity + intermediates + trusted root 160 * Verification chain as built by \c mbedtls_crt_verify_chain() 225 * \param chain points to the start of the chain 231 int mbedtls_x509_crt_parse_der( mbedtls_x509_crt *chain, const unsigned char *buf, 250 * \param chain The chain to which to add the parsed certificates. 264 int mbedtls_x509_crt_parse( mbedtls_x509_crt *chain, cons [all...] |
| /third_party/mesa3d/.gitlab-ci/tests/ |
| H A D | test_lava_job_submitter.py | 11 from itertools import chain, repeat namespace 330 chain = itertools.chain(data) 333 data_chunk = [next(chain) for _ in range(random.randint(0, 50))]
|
| /third_party/skia/experimental/sktext/include/ |
| H A D | Types.h | 181 // Returns the number of faces in the chain. Always >= 1 192 , chain(fontChain) { } in FontBlock() 197 this->chain = block.chain; in FontBlock() 204 sk_sp<FontChain> chain; member
|
| /third_party/skia/third_party/externals/angle2/src/compiler/translator/TranslatorMetalDirect/ |
| H A D | SeparateCompoundExpressions.cpp | 71 std::vector<TIntermTyped *> chain; in ViewBinaryChain() local 72 ViewBinaryChain(node.getOp(), node, chain); in ViewBinaryChain() 73 ASSERT(chain.size() >= 2); in ViewBinaryChain() 74 return chain; in ViewBinaryChain() 91 std::vector<TIntermTyped *> chain = ViewBinaryChain(node); in reassociateRight() local 93 TIntermTyped *result = chain.back(); in reassociateRight() 94 chain.pop_back(); in reassociateRight() 97 const auto begin = chain.rbegin(); in reassociateRight() 98 const auto end = chain.rend(); in reassociateRight()
|
| /third_party/mesa3d/src/compiler/spirv/ |
| H A D | vtn_variables.c | 48 * boundary in our access chain in which case alignment is meaningless. in vtn_align_pointer() 167 struct vtn_access_chain *chain; in vtn_access_chain_create() local 170 size_t size = sizeof(*chain) + in vtn_access_chain_create() 171 (MAX2(length, 1) - 1) * sizeof(chain->link[0]); in vtn_access_chain_create() 172 chain = rzalloc_size(b, size); in vtn_access_chain_create() 173 chain->length = length; in vtn_access_chain_create() 175 return chain; in vtn_access_chain_create() 391 * a pointer which just has a block index and a later access chain in vtn_pointer_dereference() 402 /* If we got here, there's more access chain to handle and we have the in vtn_pointer_dereference() 404 * start the deref chain in vtn_pointer_dereference() 481 struct vtn_access_chain chain = { vtn_pointer_to_deref() local 585 struct vtn_access_chain chain = { vtn_pointer_to_descriptor() local 674 struct vtn_access_chain chain = { _vtn_variable_load_store() local 743 struct vtn_access_chain chain = { _vtn_variable_copy() local 1715 struct vtn_access_chain chain = { vtn_pointer_to_ssa() local 2443 struct vtn_access_chain *chain = vtn_access_chain_create(b, count - 4); vtn_handle_variables() local 2619 struct vtn_access_chain chain = { vtn_handle_variables() local 2638 struct vtn_access_chain chain = { vtn_handle_variables() local [all...] |
| /third_party/node/deps/openssl/openssl/apps/ |
| H A D | verify.c | 50 OPT_SECTION("Certificate chain"), 67 "Display information about the certificate chain"}, 105 BIO_printf(bio_err, "\nRecognized certificate chain purposes:\n"); in verify_main() 253 STACK_OF(X509) *chain = NULL; in check() 298 chain = X509_STORE_CTX_get1_chain(csc); in check() 301 for (j = 0; j < sk_X509_num(chain); j++) { in check() 302 X509 *cert = sk_X509_value(chain, j); in check() 311 sk_X509_pop_free(chain, X509_free); in check() 348 * processing of the certificate chain. Setting ok = 1 does this. in cb()
|
| /third_party/openssl/apps/ |
| H A D | verify.c | 50 OPT_SECTION("Certificate chain"), 67 "Display information about the certificate chain"}, 105 BIO_printf(bio_err, "\nRecognized certificate chain purposes:\n"); in verify_main() 253 STACK_OF(X509) *chain = NULL; in check() 298 chain = X509_STORE_CTX_get1_chain(csc); in check() 301 for (j = 0; j < sk_X509_num(chain); j++) { in check() 302 X509 *cert = sk_X509_value(chain, j); in check() 311 sk_X509_pop_free(chain, X509_free); in check() 348 * processing of the certificate chain. Setting ok = 1 does this. in cb()
|
| /third_party/vk-gl-cts/scripts/opengl/ |
| H A D | gen_wrapper.py | 25 from itertools import chain namespace 48 src = indentLines(chain(defines, prototypes))
|
| /third_party/node/lib/internal/modules/esm/ |
| H A D | hooks.js | 125 * The output of the `resolve` chain of hooks is passed into the `load` chain of hooks. 268 const chain = this.#chains.resolve; 300 const nextResolve = nextHookFactory(chain[chain.length - 1], meta, { validateArgs, validateOutput }); 399 const chain = this.#chains.load; 445 const nextLoad = nextHookFactory(chain[chain.length - 1], meta, { validateArgs, validateOutput }); 803 * A utility function to iterate through a hook chain, track advancement in the 804 * chain, an [all...] |
| /foundation/multimedia/audio_framework/frameworks/native/audioeffect/src/ |
| H A D | audio_enhance_chain_manager.cpp | 143 // Construct enhanceChainToEnhancesMap_ that stores all effect names of each effect chain in ConstructEnhanceChainMgrMaps() 211 for (auto &[scode, chain] : sceneTypeToEnhanceChainMap_) { in InitEnhanceBuffer() 212 if (chain) { in InitEnhanceBuffer() 213 len = std::max(len, chain->GetAlgoBufferSize()); in InitEnhanceBuffer() 214 lenEc = std::max(lenEc, chain->GetAlgoBufferSizeEc()); in InitEnhanceBuffer() 215 lenMicRef = std::max(lenMicRef, chain->GetAlgoBufferSizeMicRef()); in InitEnhanceBuffer() 303 // means map to default chain in CreateAudioEnhanceChainDynamic() 373 // default enhance chain not exsist in CreateEnhanceChainInner() 384 AUDIO_INFO_LOG("captureId %{public}u defaultScene chain not exsist, create it", captureId); in CreateEnhanceChainInner() 394 AUDIO_INFO_LOG("captureId %{public}u create normalScene %{public}s chain", captureI in CreateEnhanceChainInner() [all...] |
| /third_party/mbedtls/library/ |
| H A D | ctr_drbg.c | 168 unsigned char chain[MBEDTLS_CTR_DRBG_BLOCKSIZE]; in block_cipher_df() local 232 memset(chain, 0, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df() 236 mbedtls_xor(chain, chain, p, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df() 243 chain, chain)) != 0) { in block_cipher_df() 247 status = psa_cipher_update(&psa_ctx.operation, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE, in block_cipher_df() 248 chain, MBEDTLS_CTR_DRBG_BLOCKSIZE, &tmp_len); in block_cipher_df() 256 memcpy(tmp + j, chain, MBEDTLS_CTR_DRBG_BLOCKSIZE); in block_cipher_df() 313 mbedtls_platform_zeroize(chain, sizeo in block_cipher_df() [all...] |
| /third_party/python/Modules/ |
| H A D | faulthandler.c | 110 int chain; member 813 faulthandler_register(int signum, int chain, _Py_sighandler_t *previous_p) in faulthandler_register() argument 823 if (chain) { in faulthandler_register() 865 if (user->chain) { in faulthandler_user() 873 (void)faulthandler_register(signum, user->chain, NULL); in faulthandler_user() 877 if (user->chain && user->previous != NULL) { in faulthandler_user() 908 static char *kwlist[] = {"signum", "file", "all_threads", "chain", NULL}; in faulthandler_register_py() 912 int chain = 0; in faulthandler_register_py() local 921 &signum, &file, &all_threads, &chain)) in faulthandler_register_py() 949 err = faulthandler_register(signum, chain, in faulthandler_register_py() [all...] |
| /third_party/musl/src/misc/ |
| H A D | nftw.c | 15 struct history *chain; member 66 new.chain = h; in do_nftw() 94 for (; h; h = h->chain) in do_nftw()
|
| /third_party/musl/porting/liteos_a/user/src/misc/ |
| H A D | nftw.c | 12 struct history *chain; member 50 new.chain = h; in do_nftw() 69 for (; h; h = h->chain) in do_nftw()
|