/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | NameConstraints.java | 17 private ASN1Sequence permitted, excluded; field in class:NameConstraints 42 permitted = ASN1Sequence.getInstance(o, false); 55 * permitted and excluded are Vectors of GeneralSubtree objects. 57 * @param permitted 63 Vector permitted, 66 if (permitted != null) 68 this.permitted = createSequence(permitted); 90 return permitted; 106 if (permitted ! 62 NameConstraints( Vector permitted, Vector excluded) argument [all...] |
/external/valgrind/main/memcheck/tests/linux/ |
H A D | capget.c | 27 "permitted %#x\n" 30 d.permitted,
|
H A D | capget.stderr.exp | 4 permitted 0
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | PKIXNameConstraintValidator.java | 83 private void checkPermittedDN(Set permitted, ASN1Sequence dns) argument 86 if (permitted == null) 91 if (permitted.isEmpty() && dns.size() == 0) 95 Iterator it = permitted.iterator(); 108 "Subject distinguished name is not from a permitted subtree"); 133 private Set intersectDN(Set permitted, Set dns) argument 140 if (permitted == null) 149 Iterator _iter = permitted.iterator(); 208 private Set intersectEmail(Set permitted, Set emails) argument 216 if (permitted 274 intersectIP(Set permitted, Set ips) argument 479 checkPermittedEmail(Set permitted, String email) argument 540 checkPermittedIP(Set permitted, byte[] ip) argument 694 checkPermittedDNS(Set permitted, String dns) argument 1030 intersectDNS(Set permitted, Set dnss) argument 1229 intersectURI(Set permitted, Set uris) argument 1377 checkPermittedURI(Set permitted, String uri) argument 1528 intersectPermittedSubtree(ASN1Sequence permitted) argument [all...] |
/external/kernel-headers/original/linux/ |
H A D | capability.h | 47 __u32 permitted; member in struct:__user_cap_data_struct 72 __le32 permitted; /* Little endian */ member in struct:vfs_cap_data::__anon6827 101 kernel_cap_t permitted; member in struct:cpu_vfs_cap_data 171 * Transfer any capability in your permitted set to any pid, 172 * remove any capability in your permitted set from any pid 521 const kernel_cap_t permitted) 525 cap_intersect(permitted, __cap_fs_set)); 535 const kernel_cap_t permitted) 539 cap_intersect(permitted, __cap_nfsd_set)); 520 cap_raise_fs_set(const kernel_cap_t a, const kernel_cap_t permitted) argument 534 cap_raise_nfsd_set(const kernel_cap_t a, const kernel_cap_t permitted) argument
|
/external/libcap-ng/libcap-ng-0.7/src/ |
H A D | cap-ng.c | 201 m.data.v1.permitted = 0x7FFFFFFFU; 205 m.data.v3[0].permitted = 0xFFFFFFFFU; 208 m.data.v3[1].permitted = 0xFFFFFFFFU; 310 m.data.v3[0].permitted = FIXUP(filedata->data[0].permitted); 311 m.data.v3[1].permitted = FIXUP(filedata->data[1].permitted); 316 m.data.v3[0].permitted | m.data.v3[0].inheritable; 318 m.data.v3[1].permitted | m.data.v3[1].inheritable; 373 m.data.v3[idx].permitted | [all...] |
/external/openssh/openbsd-compat/ |
H A D | port-aix.c | 7 * modification, are permitted provided that the following conditions 233 * Check if specified account is permitted to log in. 240 int result, permitted = 0; local 255 permitted = 1; 262 permitted = 1; 270 if (!permitted) 273 return permitted;
|
/external/valgrind/main/helgrind/tests/ |
H A D | tc10_rec_lock.stderr.exp | 27 with error code 1 (EPERM: Operation not permitted)
|
/external/chromium/android/ |
H A D | generateAndroidForwardingHeader.pl | 6 # modification, are permitted provided that the following conditions 35 * modification, are permitted provided that the following conditions
|
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/ |
H A D | constants.rb | 11 modification, are permitted provided that the following conditions
|
H A D | dot.rb | 11 modification, are permitted provided that the following conditions
|
/external/flac/libFLAC/ia32/ |
H A D | nasm.h | 5 ; modification, are permitted provided that the following conditions
|
/external/tremolo/Tremolo/ |
H A D | floor1LARM.s | 8 @ modification, are permitted provided that the following conditions
|
H A D | floor1ARM.s | 8 @ modification, are permitted provided that the following conditions
|
/external/webkit/Source/WebKit/scripts/ |
H A D | generate-webkitversion.pl | 11 # modification, are permitted provided that the following conditions 91 * modification, are permitted provided that the following conditions
|
/external/ant-glob/ |
H A D | NOTICE | 223 included (hypertext is preferred, text is permitted) within the body
|
/external/v8/tools/gcmole/ |
H A D | gccause.lua | 3 -- modification, are permitted provided that the following conditions are
|
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/tree/ |
H A D | visitor.rb | 11 modification, are permitted provided that the following conditions
|
/external/openssh/ |
H A D | uidswap.c | 325 cap.effective = cap.permitted = (1 << CAP_SYS_BOOT);
|
/external/openssl/crypto/bn/ |
H A D | bn_prime.pl | 56 * modification, are permitted provided that the following conditions
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
H A D | os_unix.c | 235 cap.effective = cap.permitted =
|
/external/openssl/crypto/conf/ |
H A D | keysets.pl | 78 * modification, are permitted provided that the following conditions
|
/external/protobuf/editors/ |
H A D | proto.vim | 6 " modification, are permitted provided that the following conditions are
|
/external/quake/ |
H A D | NOTICE | 22 Everyone is permitted to copy and distribute verbatim copies 253 those countries, so that distribution is permitted only in or among 367 Everyone is permitted to copy and distribute verbatim copies 598 those countries, so that distribution is permitted only in or among
|
/external/bluetooth/bluedroid/test/bluedroidtest/ |
H A D | bluedroidtest.c | 133 cap.effective = cap.permitted = cap.inheritable =
|