/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | NameConstraints.java | 16 private GeneralSubtree[] permitted, excluded; field in class:NameConstraints 41 permitted = createArray(ASN1Sequence.getInstance(o, false)); 54 * permitted and excluded are arrays of GeneralSubtree objects. 56 * @param permitted 62 GeneralSubtree[] permitted, 65 if (permitted != null) 67 this.permitted = permitted; 90 return permitted; 106 if (permitted ! 61 NameConstraints( GeneralSubtree[] permitted, GeneralSubtree[] excluded) argument [all...] |
/external/chromium_org/chrome/browser/extensions/api/browsing_data/ |
H A D | browsing_data_api.cc | 62 "permitted to be removed."; 151 scoped_ptr<base::DictionaryValue> permitted(new base::DictionaryValue); 156 SetDetails(selected.get(), permitted.get(), 159 SetDetails(selected.get(), permitted.get(), 162 SetDetails(selected.get(), permitted.get(), 165 SetDetails(selected.get(), permitted.get(), 168 SetDetails(selected.get(), permitted.get(), 171 SetDetails(selected.get(), permitted.get(), 174 SetDetails(selected.get(), permitted.get(), 178 SetDetails(selected.get(), permitted [all...] |
/external/valgrind/main/memcheck/tests/linux/ |
H A D | capget.c | 27 "permitted %#x\n" 30 d.permitted,
|
H A D | capget.stderr.exp | 4 permitted 0
|
/external/chromium_org/chrome/browser/ui/cocoa/extensions/ |
H A D | media_galleries_dialog_cocoa.h | 43 bool permitted) OVERRIDE; 58 bool permitted,
|
/external/chromium_org/chrome/browser/ui/gtk/extensions/ |
H A D | media_galleries_dialog_gtk.h | 33 bool permitted) OVERRIDE; 54 bool permitted,
|
H A D | media_galleries_dialog_gtk.cc | 166 bool permitted) { 172 bool permitted, 191 gtk_toggle_button_set_active(GTK_TOGGLE_BUTTON(widget), permitted); local 164 UpdateGallery( const MediaGalleryPrefInfo& gallery, bool permitted) argument 170 UpdateGalleryInContainer( const MediaGalleryPrefInfo& gallery, bool permitted, GtkWidget* checkbox_container) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | PKIXNameConstraintValidator.java | 83 private void checkPermittedDN(Set permitted, ASN1Sequence dns) argument 86 if (permitted == null) 91 if (permitted.isEmpty() && dns.size() == 0) 95 Iterator it = permitted.iterator(); 108 "Subject distinguished name is not from a permitted subtree"); 133 private Set intersectDN(Set permitted, Set dns) argument 140 if (permitted == null) 149 Iterator _iter = permitted.iterator(); 208 private Set intersectEmail(Set permitted, Set emails) argument 216 if (permitted 274 intersectIP(Set permitted, Set ips) argument 479 checkPermittedEmail(Set permitted, String email) argument 540 checkPermittedIP(Set permitted, byte[] ip) argument 694 checkPermittedDNS(Set permitted, String dns) argument 1030 intersectDNS(Set permitted, Set dnss) argument 1229 intersectURI(Set permitted, Set uris) argument 1377 checkPermittedURI(Set permitted, String uri) argument 1521 intersectPermittedSubtree(GeneralSubtree permitted) argument 1533 intersectPermittedSubtree(GeneralSubtree[] permitted) argument [all...] |
/external/kernel-headers/original/linux/ |
H A D | capability.h | 47 __u32 permitted; member in struct:__user_cap_data_struct 72 __le32 permitted; /* Little endian */ member in struct:vfs_cap_data::__anon19298 101 kernel_cap_t permitted; member in struct:cpu_vfs_cap_data 171 * Transfer any capability in your permitted set to any pid, 172 * remove any capability in your permitted set from any pid 521 const kernel_cap_t permitted) 525 cap_intersect(permitted, __cap_fs_set)); 535 const kernel_cap_t permitted) 539 cap_intersect(permitted, __cap_nfsd_set)); 520 cap_raise_fs_set(const kernel_cap_t a, const kernel_cap_t permitted) argument 534 cap_raise_nfsd_set(const kernel_cap_t a, const kernel_cap_t permitted) argument
|
/external/libcap-ng/libcap-ng-0.7/src/ |
H A D | cap-ng.c | 201 m.data.v1.permitted = 0x7FFFFFFFU; 205 m.data.v3[0].permitted = 0xFFFFFFFFU; 208 m.data.v3[1].permitted = 0xFFFFFFFFU; 310 m.data.v3[0].permitted = FIXUP(filedata->data[0].permitted); 311 m.data.v3[1].permitted = FIXUP(filedata->data[1].permitted); 316 m.data.v3[0].permitted | m.data.v3[0].inheritable; 318 m.data.v3[1].permitted | m.data.v3[1].inheritable; 373 m.data.v3[idx].permitted | [all...] |
/external/chromium_org/chrome/browser/ui/views/extensions/ |
H A D | media_galleries_dialog_views.h | 35 bool permitted) OVERRIDE; 66 bool permitted,
|
H A D | media_galleries_dialog_views.cc | 202 bool permitted) { 214 bool permitted, 224 checkbox->SetChecked(permitted); 264 checkbox->SetChecked(permitted); 200 UpdateGallery( const MediaGalleryPrefInfo& gallery, bool permitted) argument 212 AddOrUpdateGallery( const MediaGalleryPrefInfo& gallery, bool permitted, views::View* container, int trailing_vertical_space) argument
|
/external/openssh/openbsd-compat/ |
H A D | port-aix.c | 7 * modification, are permitted provided that the following conditions 233 * Check if specified account is permitted to log in. 240 int result, permitted = 0; local 255 permitted = 1; 262 permitted = 1; 270 if (!permitted) 273 return permitted;
|
/external/valgrind/main/helgrind/tests/ |
H A D | tc10_rec_lock.stderr.exp | 27 with error code 1 (EPERM: Operation not permitted)
|
/external/chromium_org/chrome/browser/media_galleries/ |
H A D | media_galleries_dialog_controller.h | 37 // |permitted|. |gallery| is owned by the controller and is guaranteed to 41 bool permitted) = 0;
|
H A D | media_galleries_dialog_controller.cc | 251 // just sets the gallery to permitted. 305 MediaGalleryPrefIdSet permitted = local 308 for (MediaGalleryPrefIdSet::iterator iter = permitted.begin(); 309 iter != permitted.end(); ++iter) {
|
/external/bison/build-aux/ |
H A D | vc-list-files | 54 There is NO WARRANTY, to the extent permitted by law.
|
H A D | gnu-web-doc-update | 58 There is NO WARRANTY, to the extent permitted by law.
|
/external/chromium/android/ |
H A D | generateAndroidForwardingHeader.pl | 6 # modification, are permitted provided that the following conditions 35 * modification, are permitted provided that the following conditions
|
/external/smali/deodexerant/ |
H A D | Android.mk | 5 # modification, are permitted provided that the following conditions are
|
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/ |
H A D | constants.rb | 11 modification, are permitted provided that the following conditions
|
/external/chromium_org/third_party/WebKit/Source/core/scripts/ |
H A D | InFilesCompiler.pm | 6 # modification, are permitted provided that the following conditions 129 * modification, are permitted provided that the following conditions
|
/external/flac/libFLAC/ia32/ |
H A D | nasm.h | 5 ; modification, are permitted provided that the following conditions
|
/external/tremolo/Tremolo/ |
H A D | floor1LARM.s | 8 @ modification, are permitted provided that the following conditions
|
/external/ant-glob/ |
H A D | NOTICE | 223 included (hypertext is preferred, text is permitted) within the body
|