/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
H A D | NameConstraintValidator.java | 11 void intersectPermittedSubtree(GeneralSubtree permitted); argument 13 void intersectPermittedSubtree(GeneralSubtree[] permitted); argument
|
H A D | NameConstraints.java | 16 private GeneralSubtree[] permitted, excluded; field in class:NameConstraints 41 permitted = createArray(ASN1Sequence.getInstance(o, false)); 56 * permitted and excluded are arrays of GeneralSubtree objects. 58 * @param permitted 64 GeneralSubtree[] permitted, 67 this.permitted = cloneSubtree(permitted); 85 return cloneSubtree(permitted); 101 if (permitted != null) 103 v.add(new DERTaggedObject(false, 0, new DERSequence(permitted))); 63 NameConstraints( GeneralSubtree[] permitted, GeneralSubtree[] excluded) argument [all...] |
H A D | PKIXNameConstraintValidator.java | 47 * Checks if the given GeneralName is in the permitted set. 112 public void intersectPermittedSubtree(GeneralSubtree permitted) argument 114 intersectPermittedSubtree(new GeneralSubtree[]{permitted}); 118 * Updates the permitted set of these name constraints with the intersection 121 * @param permitted The permitted subtrees 123 public void intersectPermittedSubtree(GeneralSubtree[] permitted) argument 128 for (int i = 0; i != permitted.length; i++) 130 GeneralSubtree subtree = permitted[i]; 260 temp += "permitted 352 checkPermittedDN(Set permitted, ASN1Sequence dns) argument 402 intersectDN(Set permitted, Set dns) argument 477 intersectEmail(Set permitted, Set emails) argument 543 intersectIP(Set permitted, Set ips) argument 748 checkPermittedEmail(Set permitted, String email) argument 808 checkPermittedIP(Set permitted, byte[] ip) argument 961 checkPermittedDNS(Set permitted, String dns) argument 1297 intersectDNS(Set permitted, Set dnss) argument 1496 intersectURI(Set permitted, Set uris) argument 1644 checkPermittedURI(Set permitted, String uri) argument [all...] |
/external/libchrome/sandbox/linux/system_headers/ |
H A D | capability.h | 38 uint32_t permitted; member in struct:cap_data
|
/external/valgrind/memcheck/tests/linux/ |
H A D | capget.c | 27 "permitted %#x\n" 30 d.permitted,
|
H A D | capget.stderr.exp | 4 permitted 0
|
/external/kernel-headers/original/uapi/linux/ |
H A D | capability.h | 45 __u32 permitted; member in struct:__user_cap_data_struct 70 __le32 permitted; /* Little endian */ member in struct:vfs_cap_data::__anon8487 148 * Transfer any capability in your permitted set to any pid, 149 * remove any capability in your permitted set from any pid
|
/external/libcap/libcap/include/uapi/linux/ |
H A D | capability.h | 47 __u32 permitted; member in struct:__user_cap_data_struct 72 __le32 permitted; /* Little endian */ member in struct:vfs_cap_data::__anon9812 150 * Transfer any capability in your permitted set to any pid, 151 * remove any capability in your permitted set from any pid
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | PKIXNameConstraintValidator.java | 83 private void checkPermittedDN(Set permitted, ASN1Sequence dns) argument 86 if (permitted == null) 91 if (permitted.isEmpty() && dns.size() == 0) 95 Iterator it = permitted.iterator(); 108 "Subject distinguished name is not from a permitted subtree"); 133 private Set intersectDN(Set permitted, Set dns) argument 140 if (permitted == null) 149 Iterator _iter = permitted.iterator(); 208 private Set intersectEmail(Set permitted, Set emails) argument 216 if (permitted 274 intersectIP(Set permitted, Set ips) argument 479 checkPermittedEmail(Set permitted, String email) argument 540 checkPermittedIP(Set permitted, byte[] ip) argument 698 checkPermittedDNS(Set permitted, String dns) argument 1034 intersectDNS(Set permitted, Set dnss) argument 1233 intersectURI(Set permitted, Set uris) argument 1381 checkPermittedURI(Set permitted, String uri) argument 1525 intersectPermittedSubtree(GeneralSubtree permitted) argument 1537 intersectPermittedSubtree(GeneralSubtree[] permitted) argument [all...] |
/external/strace/ |
H A D | capability.c | 8 * modification, are permitted provided that the following conditions 62 uint32_t permitted; member in struct:user_cap_data_struct 131 tprints(", permitted="); 132 print_cap_bits(data[0].permitted, len > 1 ? data[1].permitted : 0);
|
/external/libcap-ng/libcap-ng-0.7/src/ |
H A D | cap-ng.c | 199 m.data.v1.permitted = 0x7FFFFFFFU; 203 m.data.v3[0].permitted = 0xFFFFFFFFU; 206 m.data.v3[1].permitted = 0xFFFFFFFFU; 306 m.data.v3[0].permitted = FIXUP(filedata->data[0].permitted); 307 m.data.v3[1].permitted = FIXUP(filedata->data[1].permitted); 312 m.data.v3[0].permitted | m.data.v3[0].inheritable; 314 m.data.v3[1].permitted | m.data.v3[1].inheritable; 369 m.data.v3[idx].permitted | [all...] |
/external/openssh/openbsd-compat/ |
H A D | port-aix.c | 7 * modification, are permitted provided that the following conditions 231 * Check if specified account is permitted to log in. 238 int result, permitted = 0; local 253 permitted = 1; 260 permitted = 1; 268 if (!permitted) 271 return permitted;
|
/external/llvm/test/MC/ARM/ |
H A D | eh-directive-movsp-diagnostics.s | 42 @ CHECK: error: sp and pc are not permitted in .movsp directive 56 @ CHECK: error: sp and pc are not permitted in .movsp directive
|
/external/squashfs-tools/squashfs-tools/ |
H A D | android.c | 112 cap_data.data[0].permitted = (uint32_t) capabilities; 114 cap_data.data[1].permitted = (uint32_t) (capabilities >> 32);
|
/external/valgrind/helgrind/tests/ |
H A D | tc10_rec_lock.stderr.exp | 31 with error code 1 (EPERM: Operation not permitted)
|
/external/libchrome/sandbox/linux/services/ |
H A D | credentials.cc | 184 // permitted flags only for the requested capabilities. 190 data[index].permitted |= mask; 218 if (data[i].effective || data[i].permitted || data[i].inheritable) { 237 return (data[index].effective | data[index].permitted |
|
/external/bison/build-aux/ |
H A D | vc-list-files | 54 There is NO WARRANTY, to the extent permitted by law.
|
H A D | gnu-web-doc-update | 58 There is NO WARRANTY, to the extent permitted by law.
|
/external/google-breakpad/android/sample_app/jni/ |
H A D | Application.mk | 5 # modification, are permitted provided that the following conditions are
|
/external/ims/rcs/presencepolling/ |
H A D | Android.mk | 5 # modification, are permitted provided that the following conditions are met:
|
/external/libcap/libcap/ |
H A D | cap_file.c | 81 = FIXUP_32BITS(rawvfscap->data[i].permitted); 158 rawvfscap->data[i].permitted
|
H A D | libcap.h | 82 * effective,inheritable and permitted. This is the type that the 95 __le32 permitted; member in struct:_cap_vfs_cap_data::__anon9813 110 #define NUMBER_OF_CAP_SETS 3 /* effective, inheritable, permitted */
|
/external/libcxx/src/support/solaris/ |
H A D | mbsnrtowcs.inc | 10 * modification, are permitted provided that the following conditions
|
/external/smali/deodexerant/ |
H A D | Android.mk | 5 # modification, are permitted provided that the following conditions are
|
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/ |
H A D | constants.rb | 11 modification, are permitted provided that the following conditions
|