/external/iptables/ |
iptables-xml.c | 98 typedef struct chain struct 100 char *chain; member in struct:chain 104 } chain; typedef in typeref:struct:chain 107 static chain chains[maxChains]; 239 printf(" </chain>\n"); 245 openChain(char *chain, char *policy, struct ipt_counters *ctr, char close) 249 strncpy(curChain, chain, IPT_CHAIN_MAXNAMELEN); 252 printf(" <chain "); 266 existsChain(char *chain) 268 /* open a saved chain */ 693 char *policy, *chain; local 728 char *chain = NULL; local [all...] |
ip6tables.c | 115 { "new-chain", 1, 0, 'N' }, 116 { "delete-chain", 2, 0, 'X' }, 117 { "rename-chain", 1, 0, 'E' }, 330 "Usage: %s -[AD] chain rule-specification [options]\n" 331 " %s -[RI] chain rulenum rule-specification [options]\n" 332 " %s -D chain rulenum [options]\n" 333 " %s -[LFZ] [chain] [options]\n" 334 " %s -[NX] chain\n" 335 " %s -E old-chain-name new-chain-name\n 1601 const char *chain; local 1863 const char *chain = NULL; local [all...] |
iptables.c | 115 { "new-chain", 1, 0, 'N' }, 116 { "delete-chain", 2, 0, 'X' }, 117 { "rename-chain", 1, 0, 'E' }, 417 "Usage: %s -[AD] chain rule-specification [options]\n" 418 " %s -[RI] chain rulenum rule-specification [options]\n" 419 " %s -D chain rulenum [options]\n" 420 " %s -[LFZ] [chain] [options]\n" 421 " %s -[NX] chain\n" 422 " %s -E old-chain-name new-chain-name\n 1670 const char *chain; local 1947 const char *chain = NULL; local [all...] |
/external/openssl/apps/ |
pkcs12.c | 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain); 109 int chain = 0; local 152 else if (!strcmp (*args, "-chain")) chain = 1; 281 BIO_printf (bio_err, "-chain add certificate chain\n"); 436 chain = 0; 514 CRYPTO_push_info("building chain"); 517 /* If chaining get chain from user cert */ 518 if (chain) { [all...] |
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
OpenSSLSessionImpl.java | 228 javax.security.cert.X509Certificate[] chain local 233 chain[i] = javax.security.cert.X509Certificate.getInstance(encoded); 235 return chain;
|
/prebuilt/linux-x86/toolchain/arm-eabi-4.4.0/lib/gcc/arm-eabi/4.4.0/plugin/include/cp/ |
name-lookup.h | 36 binding_entry chain; local 69 /* Link to chain together various bindings for this name. */ 183 /* A chain of _DECL nodes for all variables, constants, functions, 189 /* Count of elements in names chain. */ 192 /* A chain of NAMESPACE_DECL nodes. */ 222 a chain of BLOCK nodes for all the levels
|
/prebuilt/linux-x86/toolchain/arm-eabi-4.4.3/lib/gcc/arm-eabi/4.4.3/plugin/include/cp/ |
name-lookup.h | 36 binding_entry chain; local 69 /* Link to chain together various bindings for this name. */ 183 /* A chain of _DECL nodes for all variables, constants, functions, 189 /* Count of elements in names chain. */ 192 /* A chain of NAMESPACE_DECL nodes. */ 222 a chain of BLOCK nodes for all the levels
|
/bionic/linker/ |
linker.h | 115 unsigned *chain; member in struct:soinfo
|
/dalvik/vm/interp/ |
Jit.c | 471 if (gDvmJit.pJitEntryTable[i].u.info.chain != gDvmJit.jitTableSize) 556 /* Walk the bucket chain to find an exact match for our PC */ 557 while ((gDvmJit.pJitEntryTable[idx].u.info.chain != chainEndMarker) && 559 idx = gDvmJit.pJitEntryTable[idx].u.info.chain; 565 * slot in the chain. Possibly continue the chain walk in case 575 * to have to find a free slot and chain it. 580 while (gDvmJit.pJitEntryTable[idx].u.info.chain != chainEndMarker) { 587 idx = gDvmJit.pJitEntryTable[idx].u.info.chain; 590 * active chain whose last member contains a valid dPC * 1283 u2 chain; local [all...] |
/frameworks/base/voip/jni/rtp/ |
AudioGroup.cpp | 90 void encode(int tick, AudioStream *chain); 249 void AudioStream::encode(int tick, AudioStream *chain) 296 while (chain) { 297 if (chain != this && 298 chain->mix(buffer, tick - mInterval, tick, mSampleRate)) { 301 chain = chain->mNext; 690 AudioStream *chain = mGroup->mChain; local 695 for (AudioStream *stream = chain; stream; stream = stream->mNext) { 697 stream->encode(tick, chain); [all...] |
/libcore/luni/src/main/java/java/security/ |
KeyStore.java | 268 * Returns the certificate chain for the entry with the given alias. 272 * @return the certificate chain for the entry with the given alias, or 327 * Associates the given alias with the key, password and certificate chain. 337 * @param chain 338 * the certificate chain. 342 * if {@code key} is a {@code PrivateKey} and {@code chain} does 348 Certificate[] chain) throws KeyStoreException { 355 // Certificate chain is required for PrivateKey 356 if (null != key && key instanceof PrivateKey && (chain == null || chain.length == 0)) 1252 private Certificate[] chain; field in class:KeyStore.PrivateKeyEntry [all...] |
/libcore/luni/src/test/java/libcore/java/net/ |
OldURLClassLoaderTest.java | 175 Certificate[] chain = TestCertUtils.getCertChain(); local 176 CodeSource cs = new CodeSource(url, chain); 183 CodeSource cs1 = new CodeSource(url1, chain);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
CodeSourceTest.java | 50 private java.security.cert.Certificate[] chain = null; field in class:CodeSourceTest 122 chain = TestCertUtils.getCertChain(); 142 assertTrue(new CodeSource(urlSite, chain).hashCode() == urlSite 158 new CodeSource(null, chain); 159 new CodeSource(urlSite, chain); 210 * The signer certificate chain must contain the same set of certificates, but 261 java.security.cert.Certificate[] got = new CodeSource(null, chain) 264 assertNotSame(got, chain); 266 assertTrue(checkEqual(got, chain)); 431 assertTrue(new CodeSource(urlSite, chain).getLocation() == urlSite) [all...] |
KeyStore2Test.java | 282 // testing for a certificate chain 358 assertNull("the certificate chain returned from getCertificateChain is NOT null", 665 Certificate[] chain = { new MyCertificate("DSA", testEncoding), local 668 privateKey, chain); 713 Certificate[] chain = { new MyCertificate(type, testEncoding), local 722 chain); 724 privateKey1, chain); 857 Certificate[] chain = { new MyCertificate(type, testEncoding), local 971 Certificate[] chain = { new MyCertificate(type, testEncoding), local 1059 Certificate[] chain = { new MyCertificate("DSA", testEncoding), local [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestCertUtils.java | 70 * real chain of certificates, it's just an array of 3 certs. The method 77 Certificate[] chain = { new TestCertificate(), new TestCertificate(), local 79 return chain;
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JDKKeyStore.java | 531 Certificate[] chain = entry.getCertificateChain(); local 533 if (chain != null) 535 return chain[0]; 562 Certificate[] chain = entry.getCertificateChain(); local 564 if (chain != null && chain[0].equals(cert)) 658 Certificate[] chain) 661 table.put(alias, new StoreEntry(alias, key, chain)); 668 Certificate[] chain) 671 if ((key instanceof PrivateKey) && (chain == null) 703 Certificate[] chain = null; local 756 Certificate[] chain = entry.getCertificateChain(); local [all...] |
JDKPKCS12KeyStore.java | 229 * this is not quite complete - we should follow up on the chain, a bit 230 * tricky if a certificate appears in more than one chain... 414 if (nextC != c) // self signed - end of the chain 492 Certificate[] chain) 502 Certificate[] chain) 510 if ((key instanceof PrivateKey) && (chain == null)) 512 throw new KeyStoreException("no certificate chain for private key"); 522 if (chain != null) { 524 certs.put(alias, chain[0]); 526 for (int i = 0; i != chain.length; i++ 695 Vector chain = new Vector(); local [all...] |
/external/elfutils/src/ |
strip.c | 1390 Elf32_Word *chain = bucket + nbucket; local 1453 Elf64_Xword *chain = bucket + nbucket; local [all...] |
/external/ipsec-tools/src/racoon/ |
handler.h | 210 LIST_ENTRY(ph1handle) chain; member in struct:ph1handle 321 LIST_ENTRY(ph2handle) chain; member in struct:ph2handle 322 LIST_ENTRY(ph2handle) ph1bind; /* chain to ph1handle */ 330 LIST_ENTRY(contacted) chain; member in struct:contacted 347 LIST_ENTRY(recvdpkt) chain; member in struct:recvdpkt
|
/external/iptables/libiptc/ |
libiptc.c | 6 * Each user chain starts with an ERROR node. 7 * Every chain ends with an unconditional jump: a RETURN for user chains, 16 * - Reimplementation of chain cache to use offsets instead of entries 19 * don't rebuild the chain cache after every operation, instead fix it 87 IPTCC_R_JUMP, /* jump to other chain */ 93 struct chain_head *chain; member in struct:rule_head 114 STRUCT_COUNTERS counters; /* per-chain counters */ 139 /* allocate a new chain head for the cache */ 162 r->chain = c; 270 /* Is the given chain builtin (1) or user-defined (0) * [all...] |
/external/quake/quake/src/QW/progs/ |
progdefs.h | 100 int chain;
member in struct:__anon6883
|
/external/quake/quake/src/QW/server/ |
progdefs.h | 119 int chain; member in struct:__anon6931
|
/libcore/luni/src/test/java/tests/api/javax/net/ssl/ |
HandshakeCompletedEventTest.java | 686 * chain it sees, so it can later be queried. 690 private X509Certificate[] chain; field in class:HandshakeCompletedEventTest.TestTrustManager 694 public void checkClientTrusted(X509Certificate[] chain, String authType) { 695 this.chain = chain; 699 public void checkServerTrusted(X509Certificate[] chain, String authType) { 700 this.chain = chain; 709 return chain; 717 java.security.cert.X509Certificate[] chain, String authType [all...] |
/external/elfcopy/ |
elfcopy.c | 1227 Elf32_Word *chain; local [all...] |
/external/openssl/crypto/x509/ |
x509_vfy.h | 114 certificate chain. 181 * validation. Once we have a certificate chain, the 'verify' 182 * function is then called to actually check the cert chain. */ 199 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ 228 * gathering of the cert chain can take some time (and have to be 237 STACK_OF(X509) *untrusted; /* chain of X509s - untrusted - passed in */ 248 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ 258 int valid; /* if 0, rebuild chain */ 260 STACK_OF(X509) *chain; /* chain of X509s - built up and trusted * member in struct:x509_store_ctx_st [all...] |