/external/ipsec-tools/src/racoon/ |
genlist.h | 48 TAILQ_ENTRY(genlist_entry) chain; member in struct:genlist_entry
|
schedule.h | 74 TAILQ_ENTRY(sched) chain; member in struct:sched
|
sainfo.h | 65 LIST_ENTRY(sainfo) chain; member in struct:sainfo
|
policy.h | 76 TAILQ_ENTRY(secpolicy) chain; member in struct:secpolicy 108 /* If NULL, it means the end of chain. */
|
/external/icu4c/layout/ |
MorphTables.cpp | 27 le_uint32 chain; local 29 for (chain = 0; chain < chainCount; chain += 1) {
|
/external/iptables/iptables/ |
ip6tables-save.c | 65 const char *chain = NULL; local 86 /* Dump out chain names first, 88 for (chain = ip6tc_first_chain(h); 89 chain; 90 chain = ip6tc_next_chain(h)) { 92 printf(":%s ", chain); 93 if (ip6tc_builtin(chain, h)) { 96 ip6tc_get_policy(chain, &count, h)); 104 for (chain = ip6tc_first_chain(h); 105 chain; [all...] |
iptables-save.c | 63 const char *chain = NULL; local 84 /* Dump out chain names first, 86 for (chain = iptc_first_chain(h); 87 chain; 88 chain = iptc_next_chain(h)) { 90 printf(":%s ", chain); 91 if (iptc_builtin(chain, h)) { 94 iptc_get_policy(chain, &count, h)); 102 for (chain = iptc_first_chain(h); 103 chain; [all...] |
ip6tables-restore.c | 243 /* New chain. */ 244 char *policy, *chain; local 246 chain = strtok(buffer+1, " \t\n"); 247 DEBUGP("line %u, chain '%s'\n", line, chain); 248 if (!chain) { 250 "%s: line %u chain name invalid\n", 256 if (strlen(chain) >= XT_EXTENSION_MAXNAMELEN) 258 "Invalid chain name `%s' " 260 chain, XT_EXTENSION_MAXNAMELEN - 1) [all...] |
iptables-restore.c | 250 /* New chain. */ 251 char *policy, *chain; local 253 chain = strtok(buffer+1, " \t\n"); 254 DEBUGP("line %u, chain '%s'\n", line, chain); 255 if (!chain) { 257 "%s: line %u chain name invalid\n", 262 if (strlen(chain) >= XT_EXTENSION_MAXNAMELEN) 264 "Invalid chain name `%s' " 266 chain, XT_EXTENSION_MAXNAMELEN - 1) [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStorePrivateKeyEntryTest.java | 71 // If all the certificate in the chain is X509Certificate, 75 Certificate[] chain = privateKeyEntry.getCertificateChain(); local 76 assertTrue(chain instanceof X509Certificate[]);
|
KSPrivateKeyEntryTest.java | 64 * Test for <code>PrivateKeyEntry(PrivateKey privateKey, Certificate[] chain)</code> 79 * Test for <code>PrivateKeyEntry(PrivateKey privateKey, Certificate[] chain)</code> 81 * Assertion: throws NullPointerException when chain is null 82 * and throws IllegalArgumentException when chain length is 0 85 Certificate[] chain = null; local 88 new KeyStore.PrivateKeyEntry(pk, chain); 89 fail("NullPointerException must be thrown when chain is null"); 93 chain = new Certificate[0]; 94 new KeyStore.PrivateKeyEntry(pk, chain); 95 fail("IllegalArgumentException must be thrown when chain length is 0") [all...] |
/external/webkit/Source/JavaScriptCore/bytecode/ |
Instruction.h | 67 WriteBarrierBase<StructureChain> chain; member in union:JSC::PolymorphicAccessStructureList::PolymorphicStubInfo::__anon13061 90 u.chain.set(globalData, owner, _chain); 119 if (info.u.chain && info.isChain) 120 markStack.append(&info.u.chain);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStorePrivateKeyEntryTest.java | 71 // If all the certificate in the chain is X509Certificate, 75 Certificate[] chain = privateKeyEntry.getCertificateChain(); local 76 assertTrue(chain instanceof X509Certificate[]);
|
KSPrivateKeyEntryTest.java | 58 * Test for <code>PrivateKeyEntry(PrivateKey privateKey, Certificate[] chain)</code> 73 * Test for <code>PrivateKeyEntry(PrivateKey privateKey, Certificate[] chain)</code> 75 * Assertion: throws NullPointerException when chain is null 76 * and throws IllegalArgumentException when chain length is 0 79 Certificate[] chain = null; local 82 new KeyStore.PrivateKeyEntry(pk, chain); 83 fail("NullPointerException must be thrown when chain is null"); 87 chain = new Certificate[0]; 88 new KeyStore.PrivateKeyEntry(pk, chain); 89 fail("IllegalArgumentException must be thrown when chain length is 0") [all...] |
/ndk/sources/host-tools/make-3.81/ |
ar.c | 206 struct nameseq *chain; 221 /* We have a match. Add it to the chain. */ 224 new->next = state->chain; 225 state->chain = new; 266 Return a malloc'd chain of matching elements (or nil if none). */ 280 ar_glob_match will accumulate them in STATE.chain. */ 288 state.chain = 0; 292 if (state.chain == 0) 298 for (n = state.chain; n != 0; n = n->next) 304 /* Put them back into the chain in the sorted order. * 203 struct nameseq *chain; member in struct:ar_glob_state [all...] |
/external/valgrind/main/coregrind/ |
m_hashtable.c | 47 UInt iterChain; // next chain to be traversed by the iterator 129 UWord chain = CHAIN_NO(node->key, table); local 130 node->next = chains[chain]; 131 chains[chain] = node; 141 the node to the appropriate chain. No duplicate key detection is done. */ 145 UWord chain = CHAIN_NO(node->key, table); local 146 node->next = table->chains[chain]; 147 table->chains[chain] = node; 174 UWord chain = CHAIN_NO(key, table); local 175 VgHashNode* curr = table->chains[chain]; [all...] |
/external/webkit/Source/WebCore/page/ |
FrameTree.cpp | 146 Vector<Frame*, 16> chain; local 151 chain.append(frame); 158 for (int i = chain.size() - 1; i >= 0; --i) { 159 frame = chain[i];
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_client_read.c | 219 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 312 x509_certificate_chain_free(chain); 326 x509_certificate_chain_free(chain); 341 x509_certificate_chain_free(chain); 352 x509_certificate_chain_free(chain); 357 chain = cert; 367 x509_certificate_chain_validate(conn->cred->trusted_certs, chain, 370 wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain " 396 x509_certificate_chain_free(chain); 400 x509_certificate_chain_free(chain); [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_read.c | 219 struct x509_certificate *chain = NULL, *last = NULL, *cert; local 312 x509_certificate_chain_free(chain); 326 x509_certificate_chain_free(chain); 341 x509_certificate_chain_free(chain); 352 x509_certificate_chain_free(chain); 357 chain = cert; 367 x509_certificate_chain_validate(conn->cred->trusted_certs, chain, 371 wpa_printf(MSG_DEBUG, "TLSv1: Server certificate chain " 397 x509_certificate_chain_free(chain); 401 x509_certificate_chain_free(chain); [all...] |
/libcore/luni/src/main/java/org/apache/harmony/security/utils/ |
JarUtils.java | 179 LinkedList chain = new LinkedList(); local 180 chain.add(0, signer); 184 return (X509Certificate[])chain.toArray(new X509Certificate[1]); 195 chain.add(issuerCert); 202 return (X509Certificate[])chain.toArray(new X509Certificate[count]);
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
KeyManagerImpl.java | 154 final Certificate[] chain = entry.getCertificateChain(); local 155 final Certificate cert = chain[0]; 192 // check that a certificate in the chain was issued by one of the specified issuers 193 loop: for (Certificate certFromChain : chain) {
|
/dalvik/vm/interp/ |
Jit.h | 99 * The width of the chain field in JitEntryInfo sets the upper 134 u2 chain; /* Index of next in chain */ member in struct:JitEntryInfo
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
KeyStore_Impl2Test.java | 254 Certificate[] chain = { mc }; local 261 keyS.setKeyEntry(alias, new byte[0], chain); 267 keyS.setKeyEntry(alias, sks, new char[0], chain);
|
/external/apache-xml/src/main/java/org/apache/xalan/xslt/ |
ObjectFactory.java | 403 ClassLoader chain = system; local 405 if (context == chain) { 407 // or any Context ClassLoader in chain of system classloader 416 chain = system; 418 if (current == chain) { 419 // Assert: Current ClassLoader in chain of 423 if (chain == null) { 426 chain = ss.getParentClassLoader(chain); 429 // Assert: Current ClassLoader not in chain o [all...] |
/external/apache-xml/src/main/java/org/apache/xml/dtm/ |
ObjectFactory.java | 403 ClassLoader chain = system; local 405 if (context == chain) { 407 // or any Context ClassLoader in chain of system classloader 416 chain = system; 418 if (current == chain) { 419 // Assert: Current ClassLoader in chain of 423 if (chain == null) { 426 chain = ss.getParentClassLoader(chain); 429 // Assert: Current ClassLoader not in chain o [all...] |