/external/skia/src/gpu/ |
H A D | GrAddPathRenderers_default.cpp | 15 GrPathRendererChain* chain) { 19 chain->addPathRenderer(pr)->unref(); 21 chain->addPathRenderer(new GrAAConvexPathRenderer())->unref(); 13 AddPathRenderers(GrContext* ctx, GrPathRendererChain::UsageFlags flags, GrPathRendererChain* chain) argument
|
H A D | GrAddPathRenderers_tesselated.cpp | 15 GrPathRendererChain* chain) { 16 chain->addPathRenderer(new GrTesselatedPathRenderer())->unref(); 13 AddPathRenderers(GrContext*, GrPathRendererChain::UsageFlags flags, GrPathRendererChain* chain) argument
|
/external/ipsec-tools/src/racoon/ |
H A D | genlist.h | 48 TAILQ_ENTRY(genlist_entry) chain; member in struct:genlist_entry
|
H A D | sainfo.h | 61 LIST_ENTRY(sainfo) chain; member in struct:sainfo
|
H A D | schedule.h | 56 TAILQ_ENTRY(sched) chain; member in struct:sched
|
H A D | policy.h | 76 TAILQ_ENTRY(secpolicy) chain; member in struct:secpolicy 102 /* If NULL, it means the end of chain. */
|
/external/icu4c/layout/ |
H A D | MorphTables.cpp | 27 le_uint32 chain; local 29 for (chain = 0; chain < chainCount; chain += 1) {
|
/external/iptables/iptables/ |
H A D | ip6tables-save.c | 65 const char *chain = NULL; local 86 /* Dump out chain names first, 88 for (chain = ip6tc_first_chain(h); 89 chain; 90 chain = ip6tc_next_chain(h)) { 92 printf(":%s ", chain); 93 if (ip6tc_builtin(chain, h)) { 96 ip6tc_get_policy(chain, &count, h)); 104 for (chain = ip6tc_first_chain(h); 105 chain; [all...] |
H A D | iptables-save.c | 63 const char *chain = NULL; local 84 /* Dump out chain names first, 86 for (chain = iptc_first_chain(h); 87 chain; 88 chain = iptc_next_chain(h)) { 90 printf(":%s ", chain); 91 if (iptc_builtin(chain, h)) { 94 iptc_get_policy(chain, &count, h)); 102 for (chain = iptc_first_chain(h); 103 chain; [all...] |
H A D | ip6tables-restore.c | 243 /* New chain. */ 244 char *policy, *chain; local 246 chain = strtok(buffer+1, " \t\n"); 247 DEBUGP("line %u, chain '%s'\n", line, chain); 248 if (!chain) { 250 "%s: line %u chain name invalid\n", 256 if (strlen(chain) >= XT_EXTENSION_MAXNAMELEN) 258 "Invalid chain name `%s' " 260 chain, XT_EXTENSION_MAXNAMELE [all...] |
H A D | iptables-restore.c | 250 /* New chain. */ 251 char *policy, *chain; local 253 chain = strtok(buffer+1, " \t\n"); 254 DEBUGP("line %u, chain '%s'\n", line, chain); 255 if (!chain) { 257 "%s: line %u chain name invalid\n", 262 if (strlen(chain) >= XT_EXTENSION_MAXNAMELEN) 264 "Invalid chain name `%s' " 266 chain, XT_EXTENSION_MAXNAMELE [all...] |
/external/webkit/Source/WebCore/bindings/js/ |
H A D | JSMainThreadExecState.h | 51 static JSC::Completion evaluate(JSC::ExecState* exec, JSC::ScopeChainNode* chain, const JSC::SourceCode& source, JSC::JSValue thisValue) argument 54 return JSC::evaluate(exec, chain, source, thisValue);
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
H A D | MyKeyStoreSpi.java | 63 Certificate[] chain) throws KeyStoreException { 68 public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain) argument 62 engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument
|
H A D | MyKeyStore.java | 92 Certificate[] chain) throws KeyStoreException { 97 if (chain != null) { 98 Chain.put(alias, chain); 103 public void engineSetKeyEntry(String alias, byte[] key, Certificate[] chain) argument 117 if (chain != null) { 118 Chain.put(alias, chain); 91 engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) argument
|
/external/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 66 static int ocsp_check_issuer(OCSP_BASICRESP *bs, STACK_OF(X509) *chain, unsigned long flags); 79 STACK_OF(X509) *chain = NULL; 117 chain = X509_STORE_CTX_get1_chain(&ctx); 132 /* At this point we have a valid certificate chain 135 ret = ocsp_check_issuer(bs, chain, flags); 145 x = sk_X509_value(chain, sk_X509_num(chain) - 1); 157 if(chain) sk_X509_pop_free(chain, X509_free); 212 static int ocsp_check_issuer(OCSP_BASICRESP *bs, STACK_OF(X509) *chain, unsigne argument [all...] |
/external/openssl/crypto/x509v3/ |
H A D | v3_addr.c | 1215 STACK_OF(X509) *chain, 1222 OPENSSL_assert(chain != NULL && sk_X509_num(chain) > 0); 1229 * set up for walking up the chain. 1236 x = sk_X509_value(chain, i); 1251 * Now walk up the chain. No cert may list resources that its 1254 for (i++; i < sk_X509_num(chain); i++) { 1255 x = sk_X509_value(chain, i); 1318 return v3_addr_validate_path_internal(ctx, ctx->chain, NULL); 1323 * Test whether chain cover 1214 v3_addr_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, IPAddrBlocks *ext) argument [all...] |
H A D | v3_asid.c | 751 STACK_OF(X509) *chain, 758 OPENSSL_assert(chain != NULL && sk_X509_num(chain) > 0); 765 * set up for walking up the chain. 772 x = sk_X509_value(chain, i); 801 * Now walk up the chain. Extensions must be in canonical form, no 804 for (i++; i < sk_X509_num(chain); i++) { 805 x = sk_X509_value(chain, i); 870 return v3_asid_validate_path_internal(ctx, ctx->chain, NULL); 875 * Test whether chain cover 750 v3_asid_validate_path_internal(X509_STORE_CTX *ctx, STACK_OF(X509) *chain, ASIdentifiers *ext) argument [all...] |
/external/valgrind/main/coregrind/ |
H A D | m_hashtable.c | 47 UInt iterChain; // next chain to be traversed by the iterator 129 UWord chain = CHAIN_NO(node->key, table); local 130 node->next = chains[chain]; 131 chains[chain] = node; 141 the node to the appropriate chain. No duplicate key detection is done. */ 145 UWord chain = CHAIN_NO(node->key, table); local 146 node->next = table->chains[chain]; 147 table->chains[chain] = node; 174 UWord chain = CHAIN_NO(key, table); local 175 VgHashNode* curr = table->chains[chain]; [all...] |
/external/webkit/Source/JavaScriptCore/bytecode/ |
H A D | Instruction.h | 67 WriteBarrierBase<StructureChain> chain; member in union:JSC::PolymorphicAccessStructureList::PolymorphicStubInfo::__anon14336 90 u.chain.set(globalData, owner, _chain); 119 if (info.u.chain && info.isChain) 120 markStack.append(&info.u.chain);
|
/external/webkit/Source/WebCore/page/ |
H A D | FrameTree.cpp | 146 Vector<Frame*, 16> chain; local 151 chain.append(frame); 158 for (int i = chain.size() - 1; i >= 0; --i) { 159 frame = chain[i];
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 219 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 312 x509_certificate_chain_free(chain); 326 x509_certificate_chain_free(chain); 341 x509_certificate_chain_free(chain); 352 x509_certificate_chain_free(chain); 357 chain = cert; 367 x509_certificate_chain_validate(conn->cred->trusted_certs, chain, 370 wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain " 396 x509_certificate_chain_free(chain); 400 x509_certificate_chain_free(chain); [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_read.c | 220 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 313 x509_certificate_chain_free(chain); 327 x509_certificate_chain_free(chain); 342 x509_certificate_chain_free(chain); 353 x509_certificate_chain_free(chain); 358 chain = cert; 368 x509_certificate_chain_validate(conn->cred->trusted_certs, chain, 372 wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain " 398 x509_certificate_chain_free(chain); 402 x509_certificate_chain_free(chain); [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_read.c | 220 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 313 x509_certificate_chain_free(chain); 327 x509_certificate_chain_free(chain); 342 x509_certificate_chain_free(chain); 353 x509_certificate_chain_free(chain); 358 chain = cert; 368 x509_certificate_chain_validate(conn->cred->trusted_certs, chain, 372 wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain " 398 x509_certificate_chain_free(chain); 402 x509_certificate_chain_free(chain); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 220 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 313 x509_certificate_chain_free(chain); 327 x509_certificate_chain_free(chain); 342 x509_certificate_chain_free(chain); 353 x509_certificate_chain_free(chain); 358 chain = cert; 368 x509_certificate_chain_validate(conn->cred->trusted_certs, chain, 372 wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain " 398 x509_certificate_chain_free(chain); 402 x509_certificate_chain_free(chain); [all...] |
/external/guava/guava/src/com/google/common/util/concurrent/ |
H A D | Futures.java | 175 * chain(rowKeyFuture, queryFunction); 178 * <p>Note: This overload of {@code chain} is designed for cases in which the 183 * done at the time {@code chain} is called. In particular, if called late, 184 * {@code chain} will run the derivation in the thread that called {@code 185 * chain}. Second, derivations may run in an internal thread of the system 188 * chain} function, all other registered but unexecuted listeners are 194 * chain function. That is, if the returned {@code Future} is cancelled, it 199 * @param input The future to chain 200 * @param function A function to chain the results of the provided future 203 * @return A future that holds result of the chain 209 public static <I, O> ListenableFuture<O> chain( method in class:Futures 265 public static <I, O> ListenableFuture<O> chain(ListenableFuture<I> input, method in class:Futures [all...] |