/external/jarjar/src/main/com/tonicsystems/jarjar/util/ |
JarTransformerChain.java | 23 private final RemappingClassTransformer[] chain; field in class:JarTransformerChain 25 public JarTransformerChain(RemappingClassTransformer[] chain) { 26 this.chain = chain.clone(); 27 for (int i = chain.length - 1; i > 0; i--) { 28 chain[i - 1].setTarget(chain[i]); 33 chain[chain.length - 1].setTarget(v); 34 return chain[0] [all...] |
JarProcessorChain.java | 23 private final JarProcessor[] chain; field in class:JarProcessorChain 25 public JarProcessorChain(JarProcessor[] chain) 27 this.chain = chain.clone(); 32 * @return <code>true</code> if the entry has run the complete chain 38 for (JarProcessor aChain : chain)
|
/external/mockito/cglib-and-asm/src/org/mockito/cglib/transform/ |
ClassTransformerChain.java | 21 private ClassTransformer[] chain; field in class:ClassTransformerChain 23 public ClassTransformerChain(ClassTransformer[] chain) { 24 this.chain = (ClassTransformer[])chain.clone(); 28 super.setTarget(chain[0]); 30 for (int i = chain.length - 1; i >= 0; i--) { 31 chain[i].setTarget(next); 32 next = chain[i]; 47 for (int i = 0; i < chain.length; i++) { 51 sb.append(chain[i].toString()) [all...] |
/external/chromium_org/third_party/skia/src/gpu/ |
GrAddPathRenderers_default.cpp | 20 void GrPathRenderer::AddPathRenderers(GrContext* ctx, GrPathRendererChain* chain) { 22 chain->addPathRenderer(SkNEW(GrStrokePathRenderer))->unref(); 25 chain->addPathRenderer(SkNEW(GrAndroidPathRenderer))->unref(); 28 chain->addPathRenderer(pr)->unref(); 31 chain->addPathRenderer(pr)->unref(); 33 chain->addPathRenderer(SkNEW(GrAAConvexPathRenderer))->unref();
|
/external/chromium_org/net/quic/crypto/ |
cert_compressor_test.cc | 20 vector<string> chain; local 22 CertCompressor::CompressChain(chain, StringPiece(), StringPiece(), NULL); 28 EXPECT_EQ(chain.size(), chain2.size()); 32 vector<string> chain; local 33 chain.push_back("testcert"); 35 CertCompressor::CompressChain(chain, StringPiece(), StringPiece(), NULL); 42 EXPECT_EQ(chain.size(), chain2.size()); 43 EXPECT_EQ(chain[0], chain2[0]); 47 vector<string> chain; local 48 chain.push_back("testcert") 71 vector<string> chain; local 92 vector<string> cached_certs, chain; local [all...] |
/external/iptables/include/libiptc/ |
libip6tc.h | 23 /* Does this chain exist? */ 24 int ip6tc_is_chain(const char *chain, struct xtc_handle *const handle); 36 /* Get first rule in the given chain: NULL for empty chain. */ 37 const struct ip6t_entry *ip6tc_first_rule(const char *chain, 48 /* Is this a built-in chain? */ 49 int ip6tc_builtin(const char *chain, struct xtc_handle *const handle); 51 /* Get the policy of a given built-in chain */ 52 const char *ip6tc_get_policy(const char *chain, 60 /* Insert the entry `fw' in chain `chain' into position `rulenum'. * [all...] |
libiptc.h | 27 /* Does this chain exist? */ 28 int iptc_is_chain(const char *chain, struct xtc_handle *const handle); 40 /* Get first rule in the given chain: NULL for empty chain. */ 41 const struct ipt_entry *iptc_first_rule(const char *chain, 52 /* Is this a built-in chain? */ 53 int iptc_builtin(const char *chain, struct xtc_handle *const handle); 55 /* Get the policy of a given built-in chain */ 56 const char *iptc_get_policy(const char *chain, 64 /* Insert the entry `e' in chain `chain' into position `rulenum'. * [all...] |
/external/iproute2/include/libiptc/ |
libip6tc.h | 23 /* Does this chain exist? */ 24 int ip6tc_is_chain(const char *chain, const ip6tc_handle_t handle); 36 /* Get first rule in the given chain: NULL for empty chain. */ 37 const struct ip6t_entry *ip6tc_first_rule(const char *chain, 48 /* Is this a built-in chain? */ 49 int ip6tc_builtin(const char *chain, const ip6tc_handle_t handle); 51 /* Get the policy of a given built-in chain */ 52 const char *ip6tc_get_policy(const char *chain, 60 /* Insert the entry `fw' in chain `chain' into position `rulenum'. * [all...] |
libiptc.h | 31 /* Does this chain exist? */ 32 int iptc_is_chain(const char *chain, const iptc_handle_t handle); 44 /* Get first rule in the given chain: NULL for empty chain. */ 45 const struct ipt_entry *iptc_first_rule(const char *chain, 56 /* Is this a built-in chain? */ 57 int iptc_builtin(const char *chain, const iptc_handle_t handle); 59 /* Get the policy of a given built-in chain */ 60 const char *iptc_get_policy(const char *chain, 68 /* Insert the entry `e' in chain `chain' into position `rulenum'. * [all...] |
/external/eigen/bench/btl/generic_bench/utils/ |
utilities.h | 22 # define INFOS(chain) {HEREWEARE ; cerr << chain << endl ;} 23 # define PYSCRIPT(chain) {cout<<flush ; cerr << "---PYSCRIPT--- " << chain << endl ;} 59 # define MESSAGE(chain) {HERE ; cerr << chain << endl ;} 67 #define BEGIN_OF(chain) {REPERE ; HERE ; cerr << "Begin of: " << chain << endl ; REPERE ; } 68 #define END_OF(chain) {REPERE ; HERE ; cerr << "Normal end of: " << chain << endl ; REPERE ; [all...] |
/external/chromium_org/third_party/tlslite/tlslite/ |
checker.py | 13 party's certificate chain. 16 judges the other party's certificate chain to be missing or 20 Currently, the Checker can check an X.509 chain. 56 party's certificate chain is missing or bad. 63 chain = connection.session.serverCertChain 65 chain = connection.session.clientCertChain 68 if isinstance(chain, X509CertChain): 70 if chain.getFingerprint() != self.x509Fingerprint: 73 (chain.getFingerprint(), self.x509Fingerprint)) 74 elif chain [all...] |
/external/google-tv-pairing-protocol/java/src/com/google/polo/ssl/ |
DummyTrustManager.java | 30 public void checkClientTrusted(X509Certificate[] chain, String authType) { 35 public void checkServerTrusted(X509Certificate[] chain, String authType) {
|
/external/chromium_org/tools/gn/ |
header_checker_unittest.cc | 59 // Some headers that are automatically set up with a public dependency chain. 76 // chain so that A -> P -> C. A will depend on C via two different paths. 90 HeaderChecker::Chain chain; local 91 EXPECT_FALSE(checker->IsDependencyOf(&a_, &a_, &chain, &is_permitted)); 94 chain.clear(); 96 EXPECT_TRUE(checker->IsDependencyOf(&b_, &a_, &chain, &is_permitted)); 97 ASSERT_EQ(2u, chain.size()); 98 EXPECT_EQ(HeaderChecker::ChainLink(&b_, true), chain[0]); local 99 EXPECT_EQ(HeaderChecker::ChainLink(&a_, true), chain[1]) local 108 EXPECT_EQ(HeaderChecker::ChainLink(&c_, true), chain[0]); local 109 EXPECT_EQ(HeaderChecker::ChainLink(&b_, true), chain[1]); local 110 EXPECT_EQ(HeaderChecker::ChainLink(&a_, true), chain[2]); local 127 EXPECT_EQ(HeaderChecker::ChainLink(&c_, false), chain[0]); local 128 EXPECT_EQ(HeaderChecker::ChainLink(&p, true), chain[1]); local 129 EXPECT_EQ(HeaderChecker::ChainLink(&a_, true), chain[2]); local 138 EXPECT_EQ(HeaderChecker::ChainLink(&c_, false), chain[0]); local 139 EXPECT_EQ(HeaderChecker::ChainLink(&p, true), chain[1]); local 211 HeaderChecker::Chain chain; local 218 EXPECT_EQ(HeaderChecker::ChainLink(&d_, false), chain[0]); local 219 EXPECT_EQ(HeaderChecker::ChainLink(&z, false), chain[1]); local 220 EXPECT_EQ(HeaderChecker::ChainLink(&a_, true), chain[2]); local 232 EXPECT_EQ(HeaderChecker::ChainLink(&d_, true), chain[0]); local 233 EXPECT_EQ(HeaderChecker::ChainLink(&c_, true), chain[1]); local 234 EXPECT_EQ(HeaderChecker::ChainLink(&b_, true), chain[2]); local 235 EXPECT_EQ(HeaderChecker::ChainLink(&a_, true), chain[3]); local [all...] |
header_checker.cc | 73 // Given a reverse dependency chain where the target chain[0]'s includes are 74 // being used by chain[end] and not all deps are public, returns the string 77 const HeaderChecker::Chain& chain) { 79 chain[chain.size() - 1].target->label().GetUserVisibleName(false) + 81 chain[0].target->label().GetUserVisibleName(false) + 84 // Invalid chains should always be 0 (no chain) or more than two 87 DCHECK(chain.size() != 1 && chain.size() != 2) 334 Chain chain; \/\/ Prevent reallocating in the loop. local [all...] |
/external/iptables/include/ |
ip6tables.h | 14 extern int flush_entries6(const xt_chainlabel chain, int verbose, struct xtc_handle *handle); 15 extern int delete_chain6(const xt_chainlabel chain, int verbose, struct xtc_handle *handle); 16 void print_rule6(const struct ip6t_entry *e, struct xtc_handle *h, const char *chain, int counters);
|
iptables.h | 12 extern int delete_chain4(const xt_chainlabel chain, int verbose, 14 extern int flush_entries4(const xt_chainlabel chain, int verbose, 19 struct xtc_handle *handle, const char *chain, int counters);
|
/external/iptables/iptables/ |
ip6tables-save.c | 64 const char *chain = NULL; local 84 /* Dump out chain names first, 86 for (chain = ip6tc_first_chain(h); 87 chain; 88 chain = ip6tc_next_chain(h)) { 90 printf(":%s ", chain); 91 if (ip6tc_builtin(chain, h)) { 94 ip6tc_get_policy(chain, &count, h)); 101 for (chain = ip6tc_first_chain(h); 102 chain; [all...] |
iptables-save.c | 62 const char *chain = NULL; local 82 /* Dump out chain names first, 84 for (chain = iptc_first_chain(h); 85 chain; 86 chain = iptc_next_chain(h)) { 88 printf(":%s ", chain); 89 if (iptc_builtin(chain, h)) { 92 iptc_get_policy(chain, &count, h)); 99 for (chain = iptc_first_chain(h); 100 chain; [all...] |
ip6tables-restore.c | 310 /* New chain. */ 311 char *policy, *chain; local 313 chain = strtok(buffer+1, " \t\n"); 314 DEBUGP("line %u, chain '%s'\n", line, chain); 315 if (!chain) { 317 "%s: line %u chain name invalid\n", 322 if (strlen(chain) >= XT_EXTENSION_MAXNAMELEN) 324 "Invalid chain name `%s' " 326 chain, XT_EXTENSION_MAXNAMELEN - 1) [all...] |
/external/conscrypt/src/platform/java/org/conscrypt/ |
PinListEntry.java | 39 * Determines whether a failed match here will prevent the chain from being accepted. If true, 40 * an unpinned chain will log and cause a match failure. If false, it will merely log. 88 * Checks the given chain against the pin list corresponding to this entry. 90 * <p>If enforcing is on and the given {@code chain} does not include the 92 * the chain is not valid unless the {@code chain} chains up to an user-installed 93 * CA cert. Otherwise this will return {@code true} indicating the {@code chain} 96 public boolean isChainValid(List<X509Certificate> chain) { 97 boolean containsUserCert = chainContainsUserCert(chain); 99 for (X509Certificate cert : chain) { [all...] |
PinFailureLogger.java | 33 List<X509Certificate> chain) { 39 writeToLog(cn, chainContainsUserCert, pinIsEnforcing, chain); 46 List<X509Certificate> chain) { 54 for (X509Certificate cert : chain) {
|
TrustManagerImpl.java | 67 * The CertPinManager, which validates the chain against a host-to-pin mapping 201 public void checkClientTrusted(X509Certificate[] chain, String authType) 203 checkTrusted(chain, authType, null, true); 207 public void checkServerTrusted(X509Certificate[] chain, String authType) 209 checkTrusted(chain, authType, null, false); 214 * chain is pinned appropriately for that host. If null, it does not check for pinned certs. 217 public List<X509Certificate> checkServerTrusted(X509Certificate[] chain, String authType, 219 return checkTrusted(chain, authType, host, false); 232 * it also checks if chain is pinned appropriately for that peer host. If 236 public List<X509Certificate> checkServerTrusted(X509Certificate[] chain, String authType [all...] |
/external/flac/libFLAC/ |
metadata_iterators.c | 920 FLAC__Metadata_Chain *chain; member in struct:FLAC__Metadata_Iterator 1260 FLAC__Metadata_Chain *chain = (FLAC__Metadata_Chain*)client_data; local 1281 FLAC__Metadata_Chain *chain = (FLAC__Metadata_Chain*)client_data; local 1304 FLAC__Metadata_Chain *chain = (FLAC__Metadata_Chain*)client_data; local 1501 FLAC__Metadata_Chain *chain = (FLAC__Metadata_Chain*)calloc(1, sizeof(FLAC__Metadata_Chain)); local [all...] |
/external/chromium_org/v8/test/mjsunit/es6/ |
promises.js | 113 (new Promise(function() { throw 5 })).chain( 122 Promise.accept(5).chain(undefined, assertUnreachable).chain( 123 function(x) { assertAsync(x === 5, "resolved/chain-nohandler") }, 130 Promise.reject(5).chain(assertUnreachable, undefined).chain( 132 function(r) { assertAsync(r === 5, "rejected/chain-nohandler") } 138 Promise.accept(5).then(undefined, assertUnreachable).chain( 143 Promise.accept(6).then(null, assertUnreachable).chain( 151 Promise.reject(5).then(assertUnreachable, undefined).chain( [all...] |
/external/chromium_org/net/cert/ |
multi_log_ct_verifier_unittest.cc | 130 bool VerifySinglePrecertificateChain(scoped_refptr<X509Certificate> chain, 133 return verifier_->Verify(chain.get(), 140 bool VerifySinglePrecertificateChain(scoped_refptr<X509Certificate> chain) { 146 return verifier_->Verify(chain.get(), 153 bool CheckPrecertificateVerification(scoped_refptr<X509Certificate> chain) { 158 return (VerifySinglePrecertificateChain(chain, bound_net_log, &result) && 202 scoped_refptr<X509Certificate> chain( 204 "ct-test-embedded-with-preca-chain.pem", 206 ASSERT_TRUE(chain.get()); 207 ASSERT_TRUE(CheckPrecertificateVerification(chain)); [all...] |