/external/mesa3d/src/glsl/ |
H A D | ir_reader.cpp | 9 * Software is furnished to do so, subject to the following conditions: 963 ir_rvalue *subject = read_rvalue(st, subj_expr); local 964 if (subject == NULL) { 965 ir_read_error(st, NULL, "when reading the subject of an array_ref"); 971 return new(ctx) ir_dereference_array(subject, idx); 984 ir_rvalue *subject = read_rvalue(st, subj_expr); local 985 if (subject == NULL) { 986 ir_read_error(st, NULL, "when reading the subject of a record_ref"); 995 return new(ctx) ir_dereference_record(subject, field->value());
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
H A D | HeaderFactoryImpl.java | 7 * employees are not subject to copyright protection in the United States 922 * Creates a new SubjectHeader based on the newly supplied subject value. 924 * @param subject - the new string value of the subject. 926 * unexpectedly while parsing the subject value. 929 public SubjectHeader createSubjectHeader(String subject) argument 931 if (subject == null) 932 throw new NullPointerException("null subject arg"); 934 s.setSubject(subject);
|
/external/openssl/apps/ |
H A D | req.c | 174 int nodes=0,kludge=0,newhdr=0,subject=0,pubkey=0; local 348 else if (strcmp(*argv,"-subject") == 0) 349 subject=1; 420 BIO_printf(bio_err," -subject output the request's subject\n"); 435 BIO_printf(bio_err," -subj arg set or modify request subject\n"); 907 BIO_printf(bio_err, "Cannot modifiy certificate subject\n"); 916 print_name(bio_err, "old subject=", X509_REQ_get_subject_name(req), nmflag); 921 BIO_printf(bio_err, "ERROR: cannot modify subject\n"); 930 print_name(bio_err, "new subject 1184 build_subject(X509_REQ *req, char *subject, unsigned long chtype, int multirdn) argument [all...] |
H A D | x509.c | 101 " -subject_hash - print subject hash value\n", 103 " -subject_hash_old - print old-style (MD5) subject hash value\n", 110 " -subject - print subject DN\n", 122 " -ocspid - print OCSP hash values for the subject name and public key\n", 187 int text=0,serial=0,subject=0,issuer=0,startdate=0,enddate=0; local 430 else if (strcmp(*argv,"-subject") == 0) 431 subject= ++num; 634 print_name(bio_err, "subject=", X509_REQ_get_subject_name(req), nmflag); 651 if (!X509_set_issuer_name(x,req->req_info->subject)) got [all...] |
H A D | ca.c | 174 " -noemailDN - Don't add the EMAIL field into certificate' subject\n", 178 " -subj arg - Use arg instead of request's subject\n", 1708 X509_NAME *name=NULL,*CAname=NULL,*subject=NULL, *dn_subject=NULL; local 1776 /* If no EMAIL is wanted in the subject */ 1805 if ((subject=X509_NAME_new()) == NULL) 1815 CAname=X509_NAME_dup(x509->cert_info->subject); 1904 if (!X509_NAME_add_entry(subject,push, -1, 0)) 1918 X509_NAME_free(subject); 1919 /* subject=X509_NAME_dup(X509_REQ_get_subject_name(req)); */ 1920 subject [all...] |
H A D | apps.c | 464 BIO_puts(out,"subject="); 2117 * subject is expected to be in the format /type0=value0/type1=value1/type2=... 2120 X509_NAME *parse_name(char *subject, long chtype, int multirdn) argument 2122 size_t buflen = strlen(subject)+1; /* to copy the types and values into. due to escaping, the copy can only become shorter */ 2129 char *sp = subject, *bp = buf; 2141 if (*subject != '/') 2178 BIO_printf(bio_err, "end of string encountered while processing type of subject name element #%d\n", ne_num);
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new.h | 216 int depth, const char *subject, 475 const char *subject, 473 wpas_dbus_signal_certification(struct wpa_supplicant *wpa_s, int depth, const char *subject, const char *cert_hash, const struct wpabuf *cert) argument
|
H A D | dbus_new.c | 790 int depth, const char *subject, 815 !wpa_dbus_dict_append_string(&dict_iter, "subject", subject)) 789 wpas_dbus_signal_certification(struct wpa_supplicant *wpa_s, int depth, const char *subject, const char *cert_hash, const struct wpabuf *cert) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | eapol_test.c | 385 static void eapol_test_write_cert(FILE *f, const char *subject, argument 394 "-----END CERTIFICATE-----\n\n", subject, encoded); 399 static void eapol_test_cert_cb(void *ctx, int depth, const char *subject, argument 406 "depth=%d subject='%s'%s%s", 407 depth, subject, 420 "depth=%d subject='%s' cert=%s", 421 depth, subject, cert_hex); 427 subject, cert);
|
H A D | wpas_glue.c | 715 static void wpa_supplicant_cert_cb(void *ctx, int depth, const char *subject, argument 721 wpas_notify_certification(wpa_s, depth, subject, cert_hash, cert);
|
/external/guava/guava-tests/lib/ |
H A D | libtruth.jar | ... org.junit.contrib.truth.subjects.Subject that (java.lang.Object) Object target
}
org/junit ... |
H A D | libtruth-gwt.jar | ... org.junit.contrib.truth.subjects.Subject that (java.lang.Object) Object target
}
org/junit ... |
/external/chromium/net/base/ |
H A D | x509_certificate_mac.cc | 639 const std::string& subject, 643 DCHECK(!subject.empty()); 657 // NSS is used to parse the subject string into a set of 664 CERT_AsciiToName(const_cast<char*>(subject.c_str()))); 666 DLOG(ERROR) << "Unable to generate CSSMOIDMap from " << subject; 682 DLOG(ERROR) << "cssm_subject_names.size() == 0. Input: " << subject; 637 CreateSelfSigned( crypto::RSAPrivateKey* key, const std::string& subject, uint32 serial_number, base::TimeDelta valid_duration) argument
|
/external/v8/src/ |
H A D | runtime.cc | 1659 // as a property on the subject of a with, or as a property of the global 1732 CONVERT_ARG_HANDLE_CHECKED(String, subject, 1); 1739 RUNTIME_ASSERT(index <= subject->length()); 1742 subject, 2254 CONVERT_ARG_CHECKED(String, subject, 0); 2273 { MaybeObject* maybe_flat = subject->TryFlatten(); 2276 subject = String::cast(flat); 2278 if (i >= static_cast<uint32_t>(subject->length())) { 2282 return Smi::FromInt(subject->Get(i)); 2401 Handle<String> subject, 2400 ReplacementStringBuilder(Heap* heap, Handle<String> subject, int estimated_part_count) argument [all...] |
H A D | jsregexp.cc | 169 Handle<String> subject, 174 return AtomExec(regexp, subject, index, last_match_info); 177 IrregexpExec(regexp, subject, index, last_match_info); 205 String* subject, 210 RegExpImpl::SetLastSubject(array, subject); 211 RegExpImpl::SetLastInput(array, subject); 218 Handle<String> subject, 224 ASSERT(index <= subject->length()); 226 if (!subject->IsFlat()) FlattenString(subject); 168 Exec(Handle<JSRegExp> regexp, Handle<String> subject, int index, Handle<JSArray> last_match_info) argument 204 SetAtomLastCapture(FixedArray* array, String* subject, int from, int to) argument 217 AtomExec(Handle<JSRegExp> re, Handle<String> subject, int index, Handle<JSArray> last_match_info) argument 432 IrregexpPrepare(Handle<JSRegExp> regexp, Handle<String> subject) argument 451 IrregexpExecOnce( Handle<JSRegExp> regexp, Handle<String> subject, int index, Vector<int> output) argument 527 IrregexpExec(Handle<JSRegExp> jsregexp, Handle<String> subject, int previous_index, Handle<JSArray> last_match_info) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 467 "system certificate store: subject='%s'", buf); 1134 const char *subject, const char *err_str, 1148 ev.cert_fail.subject = subject; 1158 const char *subject) 1187 ev.peer_cert.subject = subject; 1743 "subject='%s'", buf); 1771 " from PKCS12: subject='%s'", buf); 1132 openssl_tls_fail_event(struct tls_connection *conn, X509 *err_cert, int err, int depth, const char *subject, const char *err_str, enum tls_fail_reason reason) argument 1156 openssl_tls_cert_event(struct tls_connection *conn, X509 *err_cert, int depth, const char *subject) argument
|
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1807 static void eapol_sm_notify_cert(void *ctx, int depth, const char *subject, argument 1813 sm->ctx->cert_cb(sm->ctx->ctx, depth, subject,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 467 "system certificate store: subject='%s'", buf); 1134 const char *subject, const char *err_str, 1148 ev.cert_fail.subject = subject; 1158 const char *subject) 1187 ev.peer_cert.subject = subject; 1743 "subject='%s'", buf); 1771 " from PKCS12: subject='%s'", buf); 1132 openssl_tls_fail_event(struct tls_connection *conn, X509 *err_cert, int err, int depth, const char *subject, const char *err_str, enum tls_fail_reason reason) argument 1156 openssl_tls_cert_event(struct tls_connection *conn, X509 *err_cert, int depth, const char *subject) argument
|
/external/wpa_supplicant_8/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1807 static void eapol_sm_notify_cert(void *ctx, int depth, const char *subject, argument 1813 sm->ctx->cert_cb(sm->ctx->ctx, depth, subject,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 467 "system certificate store: subject='%s'", buf); 1134 const char *subject, const char *err_str, 1148 ev.cert_fail.subject = subject; 1158 const char *subject) 1187 ev.peer_cert.subject = subject; 1743 "subject='%s'", buf); 1771 " from PKCS12: subject='%s'", buf); 1132 openssl_tls_fail_event(struct tls_connection *conn, X509 *err_cert, int err, int depth, const char *subject, const char *err_str, enum tls_fail_reason reason) argument 1156 openssl_tls_cert_event(struct tls_connection *conn, X509 *err_cert, int depth, const char *subject) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1807 static void eapol_sm_notify_cert(void *ctx, int depth, const char *subject, argument 1813 sm->ctx->cert_cb(sm->ctx->ctx, depth, subject,
|
/external/openssl/crypto/x509/ |
H A D | x509.h | 235 X509_NAME *subject; member in struct:X509_req_info_st 256 X509_NAME *subject; member in struct:x509_cinf_st 616 #define X509_REQ_get_subject_name(x) ((x)->req_info->subject)
|
/external/openssl/include/openssl/ |
H A D | x509.h | 235 X509_NAME *subject; member in struct:X509_req_info_st 256 X509_NAME *subject; member in struct:x509_cinf_st 616 #define X509_REQ_get_subject_name(x) ((x)->req_info->subject)
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.equinox.security_1.0.200.v20100503.jar | ... login.LoginContext context
javax.security.auth.Subject subject
javax.security.auth.login.LoginException ... |
/external/zxing/core/ |
H A D | core.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/zxing/ com/google/zxing/aztec/ ... |