/macosx-10.10/JavaScriptCore-7600.1.17/bytecode/ |
H A D | StructureStubInfo.h | 110 void initGetByIdChain(VM& vm, JSCell* owner, Structure* baseObjectStructure, StructureChain* chain, unsigned count, bool isDirect) argument 115 u.getByIdChain.chain.set(vm, owner, chain); 128 void initPutByIdTransition(VM& vm, JSCell* owner, Structure* previousStructure, Structure* structure, StructureChain* chain, bool isDirect) argument 137 u.putByIdTransition.chain.set(vm, owner, chain); 237 WriteBarrierBase<StructureChain> chain; member in struct:JSC::StructureStubInfo::__anon2548::__anon2552 247 WriteBarrierBase<StructureChain> chain; member in struct:JSC::StructureStubInfo::__anon2548::__anon2554
|
H A D | GetByIdStatus.cpp | 91 RefPtr<IntendedStructureChain> chain = passedChain; local 93 // Validate the chain. If the chain is invalid, then currently the best thing 95 // worth exploring reifying the structure chain from the structure we've got 97 // if the structure chain has changed. But that may be harder, because we may 100 // have now is that if the structure chain has changed between when it was 103 if (!chain->isStillValid()) 106 if (chain->head()->takesSlowPathInDFGForImpureProperty()) 108 size_t chainSize = chain->size(); 110 if (chain 241 RefPtr<IntendedStructureChain> chain = adoptRef(new IntendedStructureChain( local [all...] |
H A D | PolymorphicAccessStructureList.h | 52 WriteBarrier<StructureChain> chain; member in struct:JSC::PolymorphicAccessStructureList::PolymorphicStubInfo 70 chain.set(vm, owner, _chain); 99 if (info.chain && !Heap::isMarked(info.chain.get()))
|
H A D | PutByIdStatus.cpp | 89 StructureChain* chain = instruction[7].u.structureChain.get(); local 91 ASSERT(chain); 99 chain ? adoptRef(new IntendedStructureChain(profiledBlock, structure, chain)) : 0, 162 stubInfo->u.putByIdTransition.chain ? adoptRef(new IntendedStructureChain( 164 stubInfo->u.putByIdTransition.chain.get())) : 0, 197 access.chain() ? adoptRef(new IntendedStructureChain( 198 profiledBlock, access.oldStructure(), access.chain())) : 0, 295 RefPtr<IntendedStructureChain> chain; 297 chain [all...] |
H A D | PolymorphicPutByIdList.h | 64 StructureChain* chain, 71 result.m_chain.set(vm, owner, chain); 97 StructureChain* chain, 105 if (chain) 106 result.m_chain.set(vm, owner, chain); 145 StructureChain* chain() const function in class:JSC::PutByIdAccess 59 transition( VM& vm, JSCell* owner, Structure* oldStructure, Structure* newStructure, StructureChain* chain, PassRefPtr<JITStubRoutine> stubRoutine) argument 92 setter( VM& vm, JSCell* owner, AccessType accessType, Structure* structure, StructureChain* chain, PutPropertySlot::PutValueFunc customSetter, PassRefPtr<JITStubRoutine> stubRoutine) argument
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/tests/data/regressions/its4336/ |
H A D | slapd.conf | 32 overlay chain
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/v6synth/ |
H A D | tests.sh | 31 for name in aaaa a6 chain alias2 aaaa.dname loop loop2 48 chain.example. 0 IN AAAA 12:34:56::ff:ff 51 alias.example. 0 IN CNAME chain.example. 52 chain.example. 0 IN AAAA 12:34:56::ff:ff
|
/macosx-10.10/ruby-106/ruby/lib/rake/ |
H A D | invocation_chain.rb | 4 # InvocationChain tracks the chain of task invocations to detect 27 def self.append(value, chain) 28 chain.append(value)
|
/macosx-10.10/ICU-531.30/icuSources/layout/ |
H A D | MorphTables.cpp | 28 le_uint32 chain; local 30 for (chain = 0; LE_SUCCESS(success) && (chain < chainCount); chain += 1) {
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | localconf.h | 77 LIST_ENTRY(vpnctl_socket_elem) chain; member in struct:vpnctl_socket_elem 84 LIST_ENTRY(bound_addr) chain; member in struct:bound_addr 92 LIST_ENTRY(redirect) chain; member in struct:redirect 99 TAILQ_ENTRY(saved_msg_elem) chain; member in struct:saved_msg_elem
|
H A D | genlist.c | 52 TAILQ_INSERT_HEAD(head, entry, chain); 61 TAILQ_INSERT_TAIL(head, entry, chain); 70 TAILQ_FOREACH(p, head, chain) { 87 p = (buf && *buf) ? TAILQ_NEXT(*buf, chain) : NULL; 99 TAILQ_REMOVE(head, p, chain);
|
H A D | genlist.h | 46 TAILQ_ENTRY(genlist_entry) chain; member in struct:genlist_entry
|
H A D | schedule.h | 50 TAILQ_ENTRY(sched) chain; member in struct:sched
|
/macosx-10.10/xnu-2782.1.97/bsd/netkey/ |
H A D | keydb.h | 55 LIST_ENTRY(secashead) chain; member in struct:secashead 68 /* SA chain */ 79 LIST_ENTRY(secasvar) chain; member in struct:secasvar 136 LIST_ENTRY(secreg) chain; member in struct:secreg 144 LIST_ENTRY(secacq) chain; member in struct:secacq
|
/macosx-10.10/JavaScriptCore-7600.1.17/runtime/ |
H A D | IntendedStructureChain.h | 44 IntendedStructureChain(CodeBlock* codeBlock, Structure* head, StructureChain* chain); 45 IntendedStructureChain(CodeBlock* codeBlock, Structure* head, StructureChain* chain, unsigned count); 50 StructureChain* chain(VM&) const;
|
H A D | StructureChain.h | 51 StructureChain* chain = new (NotNull, allocateCell<StructureChain>(vm.heap)) StructureChain(vm, vm.structureChainStructure.get()); local 52 chain->finishCreation(vm, head); 53 return chain;
|
/macosx-10.10/Security-57031.1.35/Security/sec/securityd/ |
H A D | SecTrustServer.h | 51 #define kSecTrustChainKey "chain" 59 SecCertificatePathRef chain, CFArrayRef details, CFDictionaryRef info, 85 void SecTrustServerEvaluateBlock(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, void (^evaluated)(SecTrustResultType tr, CFArrayRef details, CFDictionaryRef info, SecCertificatePathRef chain, CFErrorRef error)); 88 SecTrustResultType SecTrustServerEvaluate(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, CFArrayRef *details, CFDictionaryRef *info, SecCertificatePathRef *chain, CFErrorRef *error);
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/include/dns/ |
H A D | rbt.h | 148 * A chain is used to keep track of the sequence of nodes to reach any given 159 * chain to remain valid, the tree has to be locked down against writes for the 160 * duration of the useful life of the chain, because additions or removals can 161 * change the path from the root to the node the chain has targeted. 171 * either 'name' or 'origin' between calls to the chain functions. 183 * functions but additionally can provide the node to which the chain points. 201 * The terminal node of the chain. It is not in levels[]. 203 * used tell that the chain points nowhere without needing to 217 * level_count indicates how deep the chain points into the 220 * A chain tha [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/ocsp/ |
H A D | ocsp_vfy.c | 66 static int ocsp_check_issuer(OCSP_BASICRESP *bs, STACK_OF(X509) *chain, unsigned long flags); 79 STACK_OF(X509) *chain = NULL; 121 chain = X509_STORE_CTX_get1_chain(&ctx); 136 /* At this point we have a valid certificate chain 139 ret = ocsp_check_issuer(bs, chain, flags); 149 x = sk_X509_value(chain, sk_X509_num(chain) - 1); 161 if(chain) sk_X509_pop_free(chain, X509_free); 216 static int ocsp_check_issuer(OCSP_BASICRESP *bs, STACK_OF(X509) *chain, unsigne argument [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/x509/ |
H A D | x509_vfy.c | 121 /* first we make sure the chain we are going to build is 123 if (ctx->chain == NULL) 125 if ( ((ctx->chain=sk_X509_new_null()) == NULL) || 126 (!sk_X509_push(ctx->chain,ctx->cert))) 143 num=sk_X509_num(ctx->chain); 144 x=sk_X509_value(ctx->chain,num-1); 160 /* If we were passed a cert chain, use it first */ 166 if (!sk_X509_push(ctx->chain,xtmp)) 176 /* reparse the full chain for 184 /* at this point, chain shoul 1147 X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) argument 1349 X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, STACK_OF(X509) *chain) argument [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/libldap/ |
H A D | sort.c | 90 LDAPMessage **chain, 104 for ( e = *chain; e; e=e->lm_chain ) { 121 *chain = ehead; 123 *chain = ohead; 153 ep = chain; 161 (*chain)->lm_chain_tail = otail ? otail : etail; 88 ldap_sort_entries( LDAP *ld, LDAPMessage **chain, LDAP_CONST char *attr, int (*cmp) (LDAP_CONST char *, LDAP_CONST char *) ) argument
|
/macosx-10.10/ruby-106/ruby/test/openssl/ |
H A D | test_pkcs12.rb | 82 chain = [@inter_cacert, @cacert] 89 chain 91 assert_equal chain, pkcs12.ca_certs 95 chain = [@cacert, @inter_cacert] 104 chain 108 assert_equal chain.size, decoded.ca_certs.size
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/ |
H A D | rbt_test.c | 114 dns_rbtnodechain_t chain; local 118 dns_rbtnodechain_init(&chain, mctx); 130 printf("checking chain information for "); 134 result = dns_rbt_findnode(rbt, name, foundname, &node1, &chain, 164 result = dns_rbtnodechain_current(&chain, foundname, origin, &node2); 189 chain.level_matches, chain.level_count); 195 dns_rbtnodechain_t chain; local 198 isc_result_t (*move)(dns_rbtnodechain_t *chain, dns_name_t *name, 201 dns_rbtnodechain_init(&chain, mct [all...] |
/macosx-10.10/postfix-255/postfix/src/tls/ |
H A D | tls_dane.sh | 121 local chain=$1; shift 134 "$TEST" "$usage" "$selector" "$digest" "$tlsa.pem" "$ca" "$chain.pem" \ 167 cat eecert.pem cacert2.pem cacert1.pem rootcert.pem > chain.pem 174 checkpass "in-chain root TA" 2 "$s" 1 rootcert "" chain "$HOST" 178 checkpass "valid TA" 2 "$s" "$m" rootcert "" chain "$HOST" 180 checkpass "valid TA" 2 "$s" "$m" "$ca" "" chain "$HOST" 202 checkfail "non-TA" 2 "$s" "$m" eecert rootcert chain "$HOST" 205 checkpass "valid EE" 3 "$s" "$m" eecert "" chain whatever 207 checkfail "wrong EE" 3 "$s" "$m" cacert2 "" chain whateve [all...] |
/macosx-10.10/xnu-2782.1.97/bsd/netinet/ |
H A D | ip_encap.h | 64 LIST_ENTRY(encaptab) chain; member in struct:encaptab
|