/prebuilts/clang/host/linux-x86/clang-4579689/include/clang/StaticAnalyzer/Core/PathSensitive/ |
CallEvent.h | 448 static bool classof(const CallEvent *CA) { 449 return CA->getKind() >= CE_BEG_FUNCTION_CALLS && 450 CA->getKind() <= CE_END_FUNCTION_CALLS; 485 static bool classof(const CallEvent *CA) { 486 return CA->getKind() == CE_Function; 592 static bool classof(const CallEvent *CA) { 593 return CA->getKind() == CE_Block; 628 static bool classof(const CallEvent *CA) { 629 return CA->getKind() >= CE_BEG_CXX_INSTANCE_CALLS && 630 CA->getKind() <= CE_END_CXX_INSTANCE_CALLS [all...] |
/prebuilts/clang/host/linux-x86/clang-4630689/include/clang/StaticAnalyzer/Core/PathSensitive/ |
CallEvent.h | 448 static bool classof(const CallEvent *CA) { 449 return CA->getKind() >= CE_BEG_FUNCTION_CALLS && 450 CA->getKind() <= CE_END_FUNCTION_CALLS; 485 static bool classof(const CallEvent *CA) { 486 return CA->getKind() == CE_Function; 592 static bool classof(const CallEvent *CA) { 593 return CA->getKind() == CE_Block; 628 static bool classof(const CallEvent *CA) { 629 return CA->getKind() >= CE_BEG_CXX_INSTANCE_CALLS && 630 CA->getKind() <= CE_END_CXX_INSTANCE_CALLS [all...] |
/prebuilts/clang/host/linux-x86/clang-4639204/include/clang/StaticAnalyzer/Core/PathSensitive/ |
CallEvent.h | 448 static bool classof(const CallEvent *CA) { 449 return CA->getKind() >= CE_BEG_FUNCTION_CALLS && 450 CA->getKind() <= CE_END_FUNCTION_CALLS; 485 static bool classof(const CallEvent *CA) { 486 return CA->getKind() == CE_Function; 592 static bool classof(const CallEvent *CA) { 593 return CA->getKind() == CE_Block; 628 static bool classof(const CallEvent *CA) { 629 return CA->getKind() >= CE_BEG_CXX_INSTANCE_CALLS && 630 CA->getKind() <= CE_END_CXX_INSTANCE_CALLS [all...] |
/prebuilts/clang/host/linux-x86/clang-4691093/include/clang/StaticAnalyzer/Core/PathSensitive/ |
CallEvent.h | 448 static bool classof(const CallEvent *CA) { 449 return CA->getKind() >= CE_BEG_FUNCTION_CALLS && 450 CA->getKind() <= CE_END_FUNCTION_CALLS; 485 static bool classof(const CallEvent *CA) { 486 return CA->getKind() == CE_Function; 592 static bool classof(const CallEvent *CA) { 593 return CA->getKind() == CE_Block; 628 static bool classof(const CallEvent *CA) { 629 return CA->getKind() >= CE_BEG_CXX_INSTANCE_CALLS && 630 CA->getKind() <= CE_END_CXX_INSTANCE_CALLS [all...] |
/external/curl/tests/certs/scripts/ |
genserv.sh | 38 echo No CA prefix 41 if [ ! -f $CAPREFIX-ca.cacert ] ; then 42 echo No CA certificate file $CAPREFIX-ca.caert 45 if [ ! -f $CAPREFIX-ca.key ] ; then 84 echo "openssl x509 -set_serial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.key -in $PREFIX-sv.csr -req -text -nameopt multiline -sha1 > $PREFIX-sv.crt " 86 $OPENSSL x509 -set_serial $SERIAL -extfile $PREFIX-sv.prm -days $DURATION -CA $CAPREFIX-ca.cacert -CAkey $CAPREFIX-ca.key -in $PREFIX-sv.csr -req -text -nameopt multiline -sha1 > $PREFIX-sv (…) [all...] |
/external/chromium-trace/catapult/common/py_vulcanize/third_party/rcssmin/tests/yui/ |
dataurl-nonbase64-singlequotes.css | 6 background-image:url('data:image/png,%89PNG%0D%0A%1A%0A%00%00%00%0DIHDR%00%00%00%0C%00%00%00%0E%08%03%00%00%00%2Cc%0D%DE%00%00%00%A2PLTEQQQ%FA%FA%FA%FC%FC%FC%EE%EE%EE%A9%A9%A9%E9%E9%E9%0A%0A%0A%0D%0D%0D444PPP%CD%CD%CD%CC%CC%CC%F5%F5%F5UUU%D0%D0%D0\'\'\'%F9%F9%F9%A6%A6%A6%40%40%40FFF%A0%A0%A0%89%89%89%8D%8D%8D%20%20%20%14%14%14%DA%DA%DA%B6%B6%B6%02%02%02%87%87%87%81%81%81%AC%AC%AC%0E%0E%0E111%7D%7D%7D%92%92%92333%B9%B9%B9%BC%BC%BChhh)))%E1%E1%E1%03%03%03%CB%CB%CB%EB%EB%EB%FD%FD%FD%A3%A3%A3(((%04%04%04%CA%CA%CAttt%2C%2C%2C%F4%F4%F4%00%00%00%FF%FF%FF%D6%DE%02%C3%00%00%006tRNS%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%FF%00%A1%8FN1%00%00%00iIDAT%08%D7E%C7E%16%02Q%10%C5%D0j%C3%DD%BDqw%5E%F6%BF5%06%D4%3Fd%94kx%BDf%DE6%FFIA%AB%C8qYj%1F%E3Xk%93%E0%C8JZ%10%90%9E%3A1%60%BBY%85%A8%AE%14%C0%5E%1A6%8E%C5w%02%60%99%C9%FA%9A%03%60%8C%EFz%8C%CE%0EnSu%3F%01%AD%B2%06%04%F0%3CT%FF%B8nk%3F%7C%01%C5z%1B%F9%26%2F%3Az%00%00%00%00IEND%AEB%60%82');
|
/prebuilts/android-emulator/darwin-x86_64/lib/ |
ca-bundle.pem | 2 ## Bundle of CA Root Certificates 7 ## (CA). These were automatically extracted from Mozilla's root certificates 16 ## Conversion done with mk-ca-bundle.pl version 1.25. 21 Equifax Secure CA 41 GlobalSign Root CA 62 GlobalSign Root CA - R2 132 Entrust.net Premium 2048 Secure Server CA 320 GeoTrust Global CA 341 GeoTrust Global CA 2 362 GeoTrust Universal CA [all...] |
/prebuilts/android-emulator/linux-x86_64/lib/ |
ca-bundle.pem | 2 ## Bundle of CA Root Certificates 7 ## (CA). These were automatically extracted from Mozilla's root certificates 16 ## Conversion done with mk-ca-bundle.pl version 1.25. 21 Equifax Secure CA 41 GlobalSign Root CA 62 GlobalSign Root CA - R2 132 Entrust.net Premium 2048 Secure Server CA 320 GeoTrust Global CA 341 GeoTrust Global CA 2 362 GeoTrust Universal CA [all...] |
/external/swiftshader/third_party/LLVM/lib/Transforms/Utils/ |
BasicInliner.cpp | 67 InlineCostAnalyzer CA; 110 InlineCost IC = CA.getInlineCost(CS, NeverInline);
|
/external/clang/test/CXX/class/class.union/ |
p1.cpp | 31 CopyAssign& operator=(CopyAssign& CA) { abort(); }
|
/external/llvm/lib/Analysis/ |
InlineCost.cpp | [all...] |
/external/clang/test/CXX/drs/ |
dr4xx.cpp | 1019 typedef const A CA; 1020 void CA::f() { 1021 this->~CA(); 1022 this->CA::~A(); 1023 this->CA::A::~A(); 1025 CA::A() {} 1027 struct B : CA { 1028 B() : CA() {} 1029 void f() { return CA::f(); }
|
/libcore/luni/src/test/java/libcore/java/util/ |
EnumSetTest.java | 102 H, HE, LI, BE, B, C, N, O, F, NE, NA, MG, AL, SI, P, S, CL, AR, K, CA, SC, TI, V, CR, MN,
|
/system/ca-certificates/ |
Android.mk | 19 # Definitions for installing Certificate Authority (CA) certificates
|
/external/swiftshader/third_party/LLVM/lib/Transforms/IPO/ |
GlobalOpt.cpp | 281 } else if (ConstantArray *CA = dyn_cast<ConstantArray>(Agg)) { 282 if (IdxV < CA->getNumOperands()) return CA->getOperand(IdxV); [all...] |
/external/clang/test/CodeGenCXX/ |
catch-undef-behavior.cpp | 496 CustomAssign CA;
|
microsoft-abi-member-pointers.cpp | 750 class CA : public C { 758 // CHECK: store i8* bitcast (void (%class.CA*)* @"\01?OnHelp@CA@@QAEXXZ" to i8*), i8** 759 f func = (f)&CA::OnHelp;
|
/external/curl/tests/ |
stunnel.pem | 16 basicConstraints = CA:false 79 59:04:c2:1e:a0:3f:92:1a:f4:9a:d1:ca:c1:9b:bb: 98 CA:FALSE 109 7d:e7:e4:d3:3e:5f:ca:20:84:aa:ff:9a:c2:b6:a9:48:93:1f:
|
/external/swiftshader/third_party/LLVM/lib/VMCore/ |
ConstantsContext.h | 501 static ValType getValType(ConstantArray *CA) { 503 Elements.reserve(CA->getNumOperands()); 504 for (unsigned i = 0, e = CA->getNumOperands(); i != e; ++i) 505 Elements.push_back(cast<Constant>(CA->getOperand(i)));
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
verify.go | 24 // which isn't marked as a CA certificate. 43 // contain a Subject Alternative Name extension, but a CA certificate 46 // UnconstrainedName results when a CA certificate contains permitted 568 // ServerAuth in a CA permits ClientAuth in the leaf. 570 // Any CA may issue an OCSP responder certificate. 612 return errors.New("x509: internal error: empty chain when appending CA cert") 746 // Gutmann: A European government CA marked its signing certificates as 748 // European CA marked its signature keys as not being valid for 749 // signatures. A different CA marked its own trusted root certificate 750 // as being invalid for certificate signing. Another national CA [all...] |
verify_test.go | 174 {"Ryan Hurst", "GlobalSign PersonalSign 2 CA - G2"}, 187 {"mega.co.nz", "EssentialSSL CA", "COMODO Certification Authority"}, 202 "Virginia Tech Global Qualified Server CA", 203 "Trusted Root CA G2", 204 "GlobalSign Root CA", 225 "COMODO RSA Extended Validation Secure Server CA", 227 "AddTrust External CA Root", [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
verify.go | 24 // which isn't marked as a CA certificate. 43 // contain a Subject Alternative Name extension, but a CA certificate 46 // UnconstrainedName results when a CA certificate contains permitted 568 // ServerAuth in a CA permits ClientAuth in the leaf. 570 // Any CA may issue an OCSP responder certificate. 612 return errors.New("x509: internal error: empty chain when appending CA cert") 746 // Gutmann: A European government CA marked its signing certificates as 748 // European CA marked its signature keys as not being valid for 749 // signatures. A different CA marked its own trusted root certificate 750 // as being invalid for certificate signing. Another national CA [all...] |
verify_test.go | 174 {"Ryan Hurst", "GlobalSign PersonalSign 2 CA - G2"}, 187 {"mega.co.nz", "EssentialSSL CA", "COMODO Certification Authority"}, 202 "Virginia Tech Global Qualified Server CA", 203 "Trusted Root CA G2", 204 "GlobalSign Root CA", 225 "COMODO RSA Extended Validation Secure Server CA", 227 "AddTrust External CA Root", [all...] |
/external/swiftshader/third_party/LLVM/lib/CodeGen/AsmPrinter/ |
AsmPrinter.cpp | [all...] |
/external/cblas/testing/ |
c_cblat3.f | [all...] |