Searched defs:chain (Results 1 - 25 of 99) sorted by relevance

1234

/external/skia/src/gpu/
H A DGrAddPathRenderers_default.cpp15 GrPathRendererChain* chain) {
19 chain->addPathRenderer(pr)->unref();
21 chain->addPathRenderer(new GrAAConvexPathRenderer())->unref();
13 AddPathRenderers(GrContext* ctx, GrPathRendererChain::UsageFlags flags, GrPathRendererChain* chain) argument
H A DGrAddPathRenderers_tesselated.cpp15 GrPathRendererChain* chain) {
16 chain->addPathRenderer(new GrTesselatedPathRenderer())->unref();
13 AddPathRenderers(GrContext*, GrPathRendererChain::UsageFlags flags, GrPathRendererChain* chain) argument
/external/ipsec-tools/src/racoon/
H A Dgenlist.h48 TAILQ_ENTRY(genlist_entry) chain; member in struct:genlist_entry
H A Dsainfo.h61 LIST_ENTRY(sainfo) chain; member in struct:sainfo
H A Dschedule.h56 TAILQ_ENTRY(sched) chain; member in struct:sched
H A Dpolicy.h76 TAILQ_ENTRY(secpolicy) chain; member in struct:secpolicy
102 /* If NULL, it means the end of chain. */
/external/icu4c/layout/
H A DMorphTables.cpp27 le_uint32 chain; local
29 for (chain = 0; chain < chainCount; chain += 1) {
/external/iptables/iptables/
H A Dip6tables-save.c65 const char *chain = NULL; local
86 /* Dump out chain names first,
88 for (chain = ip6tc_first_chain(h);
89 chain;
90 chain = ip6tc_next_chain(h)) {
92 printf(":%s ", chain);
93 if (ip6tc_builtin(chain, h)) {
96 ip6tc_get_policy(chain, &count, h));
104 for (chain = ip6tc_first_chain(h);
105 chain;
[all...]
H A Diptables-save.c63 const char *chain = NULL; local
84 /* Dump out chain names first,
86 for (chain = iptc_first_chain(h);
87 chain;
88 chain = iptc_next_chain(h)) {
90 printf(":%s ", chain);
91 if (iptc_builtin(chain, h)) {
94 iptc_get_policy(chain, &count, h));
102 for (chain = iptc_first_chain(h);
103 chain;
[all...]
H A Dip6tables-restore.c243 /* New chain. */
244 char *policy, *chain; local
246 chain = strtok(buffer+1, " \t\n");
247 DEBUGP("line %u, chain '%s'\n", line, chain);
248 if (!chain) {
250 "%s: line %u chain name invalid\n",
256 if (strlen(chain) >= XT_EXTENSION_MAXNAMELEN)
258 "Invalid chain name `%s' "
260 chain, XT_EXTENSION_MAXNAMELE
[all...]
H A Diptables-restore.c250 /* New chain. */
251 char *policy, *chain; local
253 chain = strtok(buffer+1, " \t\n");
254 DEBUGP("line %u, chain '%s'\n", line, chain);
255 if (!chain) {
257 "%s: line %u chain name invalid\n",
262 if (strlen(chain) >= XT_EXTENSION_MAXNAMELEN)
264 "Invalid chain name `%s' "
266 chain, XT_EXTENSION_MAXNAMELE
[all...]
/external/webkit/Source/WebCore/bindings/js/
H A DJSMainThreadExecState.h51 static JSC::Completion evaluate(JSC::ExecState* exec, JSC::ScopeChainNode* chain, const JSC::SourceCode& source, JSC::JSValue thisValue) argument
54 return JSC::evaluate(exec, chain, source, thisValue);
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/
H A DMyKeyStoreSpi.java63 Certificate[] chain) throws KeyStoreException {
68 public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain) argument
62 engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument
H A DMyKeyStore.java92 Certificate[] chain) throws KeyStoreException {
97 if (chain != null) {
98 Chain.put(alias, chain);
103 public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain) argument
117 if (chain != null) {
118 Chain.put(alias, chain);
91 engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument
/external/openssl/crypto/ocsp/
H A Docsp_vfy.c66 static int ocsp_check_issuer(OCSP_BASICRESP *bs, STACK_OF(X509) *chain, unsigned long flags);
79 STACK_OF(X509) *chain = NULL;
117 chain = X509_STORE_CTX_get1_chain(&ctx);
132 /* At this point we have a valid certificate chain
135 ret = ocsp_check_issuer(bs, chain, flags);
145 x = sk_X509_value(chain, sk_X509_num(chain) - 1);
157 if(chain) sk_X509_pop_free(chain, X509_free);
212 static int ocsp_check_issuer(OCSP_BASICRESP *bs, STACK_OF(X509) *chain, unsigne argument
[all...]
/external/openssl/crypto/x509v3/
H A Dv3_addr.c1215 STACK_OF(X509) *chain,
1222 OPENSSL_assert(chain != NULL && sk_X509_num(chain) > 0);
1229 * set up for walking up the chain.
1236 x = sk_X509_value(chain, i);
1251 * Now walk up the chain. No cert may list resources that its
1254 for (i++; i < sk_X509_num(chain); i++) {
1255 x = sk_X509_value(chain, i);
1318 return v3_addr_validate_path_internal(ctx, ctx->chain, NULL);
1323 * Test whether chain cover
1214 v3_addr_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, IPAddrBlocks *ext) argument
[all...]
H A Dv3_asid.c751 STACK_OF(X509) *chain,
758 OPENSSL_assert(chain != NULL && sk_X509_num(chain) > 0);
765 * set up for walking up the chain.
772 x = sk_X509_value(chain, i);
801 * Now walk up the chain. Extensions must be in canonical form, no
804 for (i++; i < sk_X509_num(chain); i++) {
805 x = sk_X509_value(chain, i);
870 return v3_asid_validate_path_internal(ctx, ctx->chain, NULL);
875 * Test whether chain cover
750 v3_asid_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, ASIdentifiers *ext) argument
[all...]
/external/valgrind/main/coregrind/
H A Dm_hashtable.c47 UInt iterChain; // next chain to be traversed by the iterator
129 UWord chain = CHAIN_NO(node->key, table); local
130 node->next = chains[chain];
131 chains[chain] = node;
141 the node to the appropriate chain. No duplicate key detection is done. */
145 UWord chain = CHAIN_NO(node->key, table); local
146 node->next = table->chains[chain];
147 table->chains[chain] = node;
174 UWord chain = CHAIN_NO(key, table); local
175 VgHashNode* curr = table->chains[chain];
[all...]
/external/webkit/Source/JavaScriptCore/bytecode/
H A DInstruction.h67 WriteBarrierBase<StructureChain> chain; member in union:JSC::PolymorphicAccessStructureList::PolymorphicStubInfo::__anon14336
90 u.chain.set(globalData, owner, _chain);
119 if (info.u.chain && info.isChain)
120 markStack.append(&info.u.chain);
/external/webkit/Source/WebCore/page/
H A DFrameTree.cpp146 Vector<Frame*, 16> chain; local
151 chain.append(frame);
158 for (int i = chain.size() - 1; i >= 0; --i) {
159 frame = chain[i];
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
H A Dtlsv1_client_read.c219 struct x509_certificate *chain = NULL, *last = NULL, *cert; local
312 x509_certificate_chain_free(chain);
326 x509_certificate_chain_free(chain);
341 x509_certificate_chain_free(chain);
352 x509_certificate_chain_free(chain);
357 chain = cert;
367 x509_certificate_chain_validate(conn->cred->trusted_certs, chain,
370 wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain "
396 x509_certificate_chain_free(chain);
400 x509_certificate_chain_free(chain);
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_read.c220 struct x509_certificate *chain = NULL, *last = NULL, *cert; local
313 x509_certificate_chain_free(chain);
327 x509_certificate_chain_free(chain);
342 x509_certificate_chain_free(chain);
353 x509_certificate_chain_free(chain);
358 chain = cert;
368 x509_certificate_chain_validate(conn->cred->trusted_certs, chain,
372 wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain "
398 x509_certificate_chain_free(chain);
402 x509_certificate_chain_free(chain);
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client_read.c220 struct x509_certificate *chain = NULL, *last = NULL, *cert; local
313 x509_certificate_chain_free(chain);
327 x509_certificate_chain_free(chain);
342 x509_certificate_chain_free(chain);
353 x509_certificate_chain_free(chain);
358 chain = cert;
368 x509_certificate_chain_validate(conn->cred->trusted_certs, chain,
372 wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain "
398 x509_certificate_chain_free(chain);
402 x509_certificate_chain_free(chain);
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client_read.c220 struct x509_certificate *chain = NULL, *last = NULL, *cert; local
313 x509_certificate_chain_free(chain);
327 x509_certificate_chain_free(chain);
342 x509_certificate_chain_free(chain);
353 x509_certificate_chain_free(chain);
358 chain = cert;
368 x509_certificate_chain_validate(conn->cred->trusted_certs, chain,
372 wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain "
398 x509_certificate_chain_free(chain);
402 x509_certificate_chain_free(chain);
[all...]
/external/guava/guava/src/com/google/common/util/concurrent/
H A DFutures.java175 * chain(rowKeyFuture, queryFunction);
178 * <p>Note: This overload of {@code chain} is designed for cases in which the
183 * done at the time {@code chain} is called. In particular, if called late,
184 * {@code chain} will run the derivation in the thread that called {@code
185 * chain}. Second, derivations may run in an internal thread of the system
188 * chain} function, all other registered but unexecuted listeners are
194 * chain function. That is, if the returned {@code Future} is cancelled, it
199 * @param input The future to chain
200 * @param function A function to chain the results of the provided future
203 * @return A future that holds result of the chain
209 public static <I, O> ListenableFuture<O> chain( method in class:Futures
265 public static <I, O> ListenableFuture<O> chain(ListenableFuture<I> input, method in class:Futures
[all...]

Completed in 756 milliseconds

1234