/vbox/src/VBox/Devices/PC/ipxe/src/include/ipxe/ |
H A D | validator.h | 15 extern int create_validator ( struct interface *job, struct x509_chain *chain );
|
H A D | x509.h | 84 * maximum number of remaining certificates in a chain. 160 /** Maximum number of subsequent certificates in chain */ 207 /** A link in an X.509 certificate chain */ 215 /** An X.509 certificate chain */ 224 * Get reference to X.509 certificate chain 226 * @v chain X.509 certificate chain 227 * @ret chain X.509 certificate chain 230 x509_chain_get ( struct x509_chain *chain ) { [all...] |
H A D | cms.h | 24 /** Certificate chain */ 25 struct x509_chain *chain; member in struct:cms_signer_info
|
H A D | tls.h | 238 /** Server certificate chain */ 239 struct x509_chain *chain; member in struct:tls_session
|
/vbox/src/VBox/Devices/PC/ipxe/src/net/ |
H A D | validator.c | 65 /** X.509 certificate chain */ 66 struct x509_chain *chain; member in struct:validator 81 x509_chain_put ( validator->chain ); 201 * Append cross-signing certificates to certificate chain 237 /* Add certificate to chain */ 254 /* Append certificates to chain */ 255 last = x509_last ( validator->chain ); 256 if ( ( rc = x509_auto_append ( validator->chain, certs ) ) != 0 ) { 263 if ( last == x509_last ( validator->chain ) ) { 373 struct x509_certificate *last = x509_last ( validator->chain ); [all...] |
H A D | tls.c | 194 x509_chain_put ( tls->chain ); 1293 * Parse certificate chain 1296 * @v data Certificate chain 1297 * @v len Length of certificate chain 1312 /* Free any existing certificate chain */ 1313 x509_chain_put ( tls->chain ); 1314 tls->chain = NULL; 1316 /* Create certificate chain */ 1317 tls->chain = x509_alloc_chain(); 1318 if ( ! tls->chain ) { [all...] |
/vbox/src/VBox/Devices/PC/ipxe/src/crypto/ |
H A D | x509.c | 100 __einfo_uniqify ( EINFO_EACCES, 0x08, "Empty certificate chain" ) 1361 * Free X.509 certificate chain 1366 struct x509_chain *chain = local 1371 DBGC2 ( chain, "X509 chain %p freed\n", chain ); 1373 /* Free each link in the chain */ 1374 list_for_each_entry_safe ( link, tmp, &chain->links, list ) { 1380 /* Free chain */ 1381 free ( chain ); 1390 struct x509_chain *chain; local 1412 x509_append( struct x509_chain *chain, struct x509_certificate *cert ) argument 1437 x509_append_raw( struct x509_chain *chain, const void *data, size_t len ) argument 1496 x509_auto_append( struct x509_chain *chain, struct x509_chain *certs ) argument 1535 x509_validate_chain( struct x509_chain *chain, time_t time, struct x509_root *root ) argument [all...] |
H A D | cms.c | 122 /* Add certificate to chain */ 221 /* Append certificate to chain */ 222 if ( ( rc = x509_append ( info->chain, cert ) ) != 0 ) { 228 /* Append remaining certificates to chain */ 229 if ( ( rc = x509_auto_append ( info->chain, 440 /* Allocate certificate chain */ 441 info->chain = x509_alloc_chain(); 442 if ( ! info->chain ) 468 x509_chain_put ( info->chain ); 629 /* Validate certificate chain */ [all...] |
/vbox/src/VBox/Devices/PC/ipxe/src/arch/i386/drivers/net/ |
H A D | undiisr.S | 35 je chain 62 chain: /* Chain to next handler */ label
|
/vbox/src/VBox/NetworkServices/NAT/ |
H A D | pxdns.c | 413 struct request **chain; local 416 chain = &pxdns->request_hash[HASH(req->id)]; 417 if ((req->next_hash = *chain) != NULL) { 418 (*chain)->pprev_hash = &req->next_hash; 421 *chain = req; 422 req->pprev_hash = chain; 429 struct request **chain; local 435 chain = &pxdns->timeout_list[req->timeout_slot]; 436 if ((req->next_timeout = *chain) != NULL) { 437 (*chain) 552 struct request **chain, *req; local [all...] |
H A D | pxping.c | 858 struct ping_pcb **chain; local 862 chain = &pxping->timeout_list[pcb->timeout_slot]; 863 if ((pcb->next_timeout = *chain) != NULL) { 864 (*chain)->pprev_timeout = &pcb->next_timeout; 866 *chain = pcb; 867 pcb->pprev_timeout = chain; 1032 struct ping_pcb **chain, *pcb; local 1044 chain = &pxping->timeout_list[pxping->timeout_slot]; 1045 pcb = *chain;
|
/vbox/src/libs/xpcom18a4/python/src/ |
H A D | TypeObject.cpp | 231 chain.methods = methodList; 232 chain.link = pBase ? &pBase->chain : NULL;
|
H A D | PyISupports.cpp | 220 return Py_FindMethodInChain(&this_type->chain, this, (char *)name);
|
H A D | PyXPCOM.h | 258 PyMethodChain chain; member in class:PyXPCOM_TypeObject 538 PyG_Base *m_pBaseObject; // A chain to implement identity rules.
|
/vbox/src/VBox/Devices/EFI/Firmware/StdLib/Include/Ipf/machine/ |
H A D | pte.h | 93 uint64_t chain; /* pa of collision chain */ member in struct:ia64_lpte
|
/vbox/src/VBox/Main/src-server/ |
H A D | MachineImplCloneVM.cpp | 47 RTCList<MEDIUMTASK> chain; member in struct:__anon16518 180 * the biggest parent in the previous chain. So even if the new 182 * it. Adding the biggest size in the chain should balance this a 186 for (size_t e = mtc.chain.size(); e > 0; --e) 188 MEDIUMTASK &mt = mtc.chain.at(e - 1); 276 /* Create the medium task chain. In this case it will always 303 mtc.chain.append(mt); 389 /* Build a histogram of used medias and the parent chain. */ 404 mtc.chain.append(mt); 417 /* Build up the index list of the image chain [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/BaseTools/Source/C/VfrCompile/Pccts/antlr/ |
H A D | mrhoist.c | 2521 Tree *MR_merge_tree_contexts_client(Tree *t,int chain[]) argument 2523 Tree *MR_merge_tree_contexts_client(t,chain) 2525 int chain[]; 2529 if (chain[0] == 0) { 2533 return MR_merge_tree_contexts_client(u,&chain[0]); 2535 if (chain[0] == t->token) { 2536 t->down=MR_merge_tree_contexts_client(t->down,&chain[1]); 2538 t->right=MR_merge_tree_contexts_client(t->right,&chain[0]); 2543 void MR_iterateOverTreeContexts(Tree *t,int chain[]) argument 2545 void MR_iterateOverTreeContexts(t,chain) 2752 MR_iterateOverTreeSuppressK(Tree *t,int chain[]) argument [all...] |
H A D | fset2.c | 358 /* tree duplicate (assume tree is a chain downwards) */ 1019 /* see if e exists in s as a possible input permutation (e is always a chain) */ 1047 /* see if e exists in s as a possible input permutation (e is always a chain); 1380 /* now add the chain of tokens at depth k */ 1813 void MR_iterateOverTree(Tree *t,int chain[]) argument 1815 void MR_iterateOverTree(t,chain) 1817 int chain[]; 1821 chain[0]=t->token; 1823 MR_iterateOverTree(t->down,&chain[1]); 1827 MR_iterateOverTree(t->right,&chain[ [all...] |
/vbox/src/VBox/Devices/PC/ipxe/src/drivers/net/ath/ath9k/ |
H A D | ath9k_ar9003_eeprom.c | 145 * if the register is per chain 148 .ob = {1, 1, 1},/* 3 chain */ 149 .db_stage2 = {1, 1, 1}, /* 3 chain */ 348 /* noiseFloorThreshCh Check if the register is per chain */ 350 .ob = {3, 3, 3}, /* 3 chain */ 351 .db_stage2 = {3, 3, 3}, /* 3 chain */ 722 * if the register is per chain 725 .ob = {1, 1, 1},/* 3 chain */ 726 .db_stage2 = {1, 1, 1}, /* 3 chain */ 925 /* noiseFloorThreshCh Check if the register is per chain */ 3484 ar9003_hw_ant_ctrl_chain_get(struct ath_hw *ah, int chain, int is2ghz) argument 3503 int chain; local 3617 ar9003_hw_atten_chain_get(struct ath_hw *ah, int chain, struct ath9k_channel *chan) argument 3645 ar9003_hw_atten_chain_get_margin(struct ath_hw *ah, int chain, struct ath9k_channel *chan) argument [all...] |
H A D | ath9k_eeprom_9287.c | 274 int32_t txPower, u16 chain) 279 /* Enable OLPC for chain 0 */ 286 /* Enable OLPC for chain 1 */ 293 /* Write the OLPC ref power for chain 0 */ 295 if (chain == 0) { 303 /* Write the OLPC ref power for chain 1 */ 305 if (chain == 1) { 527 * to get the per chain tx power level. 273 ar9287_eeprom_olpc_set_pdadcs(struct ath_hw *ah, int32_t txPower, u16 chain) argument
|
/vbox/src/VBox/Devices/EFI/Firmware/CryptoPkg/Library/BaseCryptLib/Pk/ |
H A D | CryptPkcs7.c | 74 // If any certificate in the chain is enrolled as trusted certificate, 78 Count = (INTN) sk_X509_num (Context->chain); 80 Obj->data.x509 = sk_X509_value (Context->chain, (int) Index); 119 CAs in the chain). 595 is used for certificate chain verification.
|
/vbox/src/VBox/Devices/PC/ipxe/src/tests/ |
H A D | x509_test.c | 54 /** An X.509 test certificate chain */ 61 /** Parsed certificate chain */ 62 struct x509_chain *chain; member in struct:x509_test_chain 81 /** Define a test certificate chain */ 636 /** Valid certificate chain up to boot.test.ipxe.org */ 639 /** Broken certificate chain up to boot.test.ipxe.org */ 642 /** Incomplete certificate chain up to boot.test.ipxe.org */ 645 /** Non-functional certificate chain up to not_ca.test.ipxe.org */ 649 /** Valid certificate chain up to iPXE self-test useless CA */ 652 /** Non-functional certificate chain u [all...] |
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/DebugSupportDxe/Ia32/ |
H A D | AsmFuncs.S | 383 ## Restore eflags so when we chain, the flags will be exactly as if we were never here.
|
H A D | AsmFuncs.asm | 477 ;; Restore eflags so when we chain, the flags will be exactly as if we were never here.
|
/vbox/src/VBox/Devices/EFI/Firmware/MdeModulePkg/Universal/DebugSupportDxe/X64/ |
H A D | AsmFuncs.asm | 520 ;; Restore rflags so when we chain, the flags will be exactly as if we were never here.
|