/external/ipsec-tools/src/racoon/ |
genlist.h | 48 TAILQ_ENTRY(genlist_entry) chain; member in struct:genlist_entry
|
sainfo.h | 61 LIST_ENTRY(sainfo) chain; member in struct:sainfo
|
schedule.h | 56 TAILQ_ENTRY(sched) chain; member in struct:sched
|
policy.h | 76 TAILQ_ENTRY(secpolicy) chain; member in struct:secpolicy 102 /* If NULL, it means the end of chain. */
|
remoteconf.h | 130 TAILQ_ENTRY(remoteconf) chain; /* next remote conf */ member in struct:remoteconf
|
/external/icu4c/layout/ |
MorphTables.cpp | 27 le_uint32 chain; local 29 for (chain = 0; chain < chainCount; chain += 1) {
|
/external/webkit/JavaScriptCore/bytecode/ |
Instruction.h | 63 StructureChain* chain; member in union:JSC::PolymorphicAccessStructureList::PolymorphicStubInfo::__anon8048 86 u.chain = _chain; 116 info.u.chain->deref();
|
StructureStubInfo.h | 80 void initGetByIdChain(Structure* baseObjectStructure, StructureChain* chain) 87 u.getByIdChain.chain = chain; 88 chain->ref(); 109 void initPutByIdTransition(Structure* previousStructure, Structure* structure, StructureChain* chain) 119 u.putByIdTransition.chain = chain; 120 chain->ref(); 156 StructureChain* chain; member in struct:JSC::StructureStubInfo::__anon8051::__anon8054 169 StructureChain* chain; member in struct:JSC::StructureStubInfo::__anon8051::__anon8057 [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStorePrivateKeyEntryTest.java | 71 // If all the certificate in the chain is X509Certificate, 75 Certificate[] chain = privateKeyEntry.getCertificateChain(); local 76 assertTrue(chain instanceof X509Certificate[]);
|
KSPrivateKeyEntryTest.java | 65 * Test for <code>PrivateKeyEntry(PrivateKey privateKey, Certificate[] chain)</code> 86 * Test for <code>PrivateKeyEntry(PrivateKey privateKey, Certificate[] chain)</code> 88 * Assertion: throws NullPointerException when chain is null 89 * and throws IllegalArgumentException when chain length is 0 98 Certificate[] chain = null; local 101 new KeyStore.PrivateKeyEntry(pk, chain); 102 fail("NullPointerException must be thrown when chain is null"); 106 chain = new Certificate[0]; 107 new KeyStore.PrivateKeyEntry(pk, chain); 108 fail("IllegalArgumentException must be thrown when chain length is 0") [all...] |
/external/iptables/ |
ip6tables-restore.c | 223 /* New chain. */ 224 char *policy, *chain; local 226 chain = strtok(buffer+1, " \t\n"); 227 DEBUGP("line %u, chain '%s'\n", line, chain); 228 if (!chain) { 230 "%s: line %u chain name invalid\n", 235 if (ip6tc_builtin(chain, handle) <= 0) { 236 if (noflush && ip6tc_is_chain(chain, handle)) { 237 DEBUGP("Flushing existing user defined chain '%s'\n", chain) [all...] |
ip6tables-save.c | 145 ip6tc_handle_t *h, const char *chain, int counters) 154 /* print chain name */ 155 printf("-A %s ", chain); 252 const char *chain = NULL; local 269 /* Dump out chain names first, 271 for (chain = ip6tc_first_chain(&h); 272 chain; 273 chain = ip6tc_next_chain(&h)) { 275 printf(":%s ", chain); 276 if (ip6tc_builtin(chain, h)) [all...] |
iptables-restore.c | 226 /* New chain. */ 227 char *policy, *chain; local 229 chain = strtok(buffer+1, " \t\n"); 230 DEBUGP("line %u, chain '%s'\n", line, chain); 231 if (!chain) { 233 "%s: line %u chain name invalid\n", 238 if (iptc_builtin(chain, handle) <= 0) { 239 if (noflush && iptc_is_chain(chain, handle)) { 240 DEBUGP("Flushing existing user defined chain '%s'\n", chain) [all...] |
iptables-save.c | 161 iptc_handle_t *h, const char *chain, int counters) 170 /* print chain name */ 171 printf("-A %s ", chain); 263 const char *chain = NULL; local 280 /* Dump out chain names first, 282 for (chain = iptc_first_chain(&h); 283 chain; 284 chain = iptc_next_chain(&h)) { 286 printf(":%s ", chain); 287 if (iptc_builtin(chain, h)) [all...] |
/external/webkit/WebCore/page/ |
FrameTree.cpp | 120 Vector<Frame*, 16> chain; local 125 chain.append(frame); 132 for (int i = chain.size() - 1; i >= 0; --i) { 133 frame = chain[i];
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client_read.c | 219 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 312 x509_certificate_chain_free(chain); 326 x509_certificate_chain_free(chain); 341 x509_certificate_chain_free(chain); 352 x509_certificate_chain_free(chain); 357 chain = cert; 367 x509_certificate_chain_validate(conn->cred->trusted_certs, chain, 370 wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain " 396 x509_certificate_chain_free(chain); 400 x509_certificate_chain_free(chain); [all...] |
tlsv1_server_read.c | 273 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 372 x509_certificate_chain_free(chain); 386 x509_certificate_chain_free(chain); 401 x509_certificate_chain_free(chain); 412 x509_certificate_chain_free(chain); 417 chain = cert; 426 if (x509_certificate_chain_validate(conn->cred->trusted_certs, chain, 429 wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain " 455 x509_certificate_chain_free(chain); 459 x509_certificate_chain_free(chain); [all...] |
/libcore/luni/src/main/java/org/apache/harmony/security/utils/ |
JarUtils.java | 189 LinkedList chain = new LinkedList(); local 190 chain.add(0, signer); 194 return (X509Certificate[])chain.toArray(new X509Certificate[1]); 205 chain.add(issuerCert); 212 return (X509Certificate[])chain.toArray(new X509Certificate[count]);
|
/dalvik/vm/interp/ |
Jit.h | 98 u2 chain; /* Index of next in chain */ member in struct:JitEntryInfo
|
/libcore/luni/src/main/java/org/apache/xalan/xslt/ |
ObjectFactory.java | 403 ClassLoader chain = system; local 405 if (context == chain) { 407 // or any Context ClassLoader in chain of system classloader 416 chain = system; 418 if (current == chain) { 419 // Assert: Current ClassLoader in chain of 423 if (chain == null) { 426 chain = ss.getParentClassLoader(chain); 429 // Assert: Current ClassLoader not in chain o [all...] |
/libcore/luni/src/main/java/org/apache/xml/dtm/ |
ObjectFactory.java | 403 ClassLoader chain = system; local 405 if (context == chain) { 407 // or any Context ClassLoader in chain of system classloader 416 chain = system; 418 if (current == chain) { 419 // Assert: Current ClassLoader in chain of 423 if (chain == null) { 426 chain = ss.getParentClassLoader(chain); 429 // Assert: Current ClassLoader not in chain o [all...] |
/libcore/luni/src/main/java/org/apache/xml/serializer/ |
ObjectFactory.java | 402 ClassLoader chain = system; local 404 if (context == chain) { 406 // or any Context ClassLoader in chain of system classloader 415 chain = system; 417 if (current == chain) { 418 // Assert: Current ClassLoader in chain of 422 if (chain == null) { 425 chain = ss.getParentClassLoader(chain); 428 // Assert: Current ClassLoader not in chain o [all...] |
/libcore/luni/src/main/java/org/apache/xml/utils/ |
ObjectFactory.java | 403 ClassLoader chain = system; local 405 if (context == chain) { 407 // or any Context ClassLoader in chain of system classloader 416 chain = system; 418 if (current == chain) { 419 // Assert: Current ClassLoader in chain of 423 if (chain == null) { 426 chain = ss.getParentClassLoader(chain); 429 // Assert: Current ClassLoader not in chain o [all...] |
/libcore/luni/src/main/java/org/apache/xpath/functions/ |
ObjectFactory.java | 403 ClassLoader chain = system; local 405 if (context == chain) { 407 // or any Context ClassLoader in chain of system classloader 416 chain = system; 418 if (current == chain) { 419 // Assert: Current ClassLoader in chain of 423 if (chain == null) { 426 chain = ss.getParentClassLoader(chain); 429 // Assert: Current ClassLoader not in chain o [all...] |
/libcore/support/src/test/java/libcore/javax/net/ssl/ |
TestSSLContext.java | 187 * certificate chain from the given KeyStore and a TrustManager 240 X509Certificate[] chain = (X509Certificate[]) serverChain; local 241 trustManager.checkServerTrusted(chain, chain[0].getPublicKey().getAlgorithm()); 247 X509Certificate[] chain = (X509Certificate[]) clientChain; local 248 trustManager.checkClientTrusted(chain, chain[0].getPublicKey().getAlgorithm());
|