/external/skia/tests/sksl/errors/ |
D | LayoutInFunctions.glsl | 3 error: 20: layout qualifier 'origin_upper_left' is not permitted here 4 error: 20: layout qualifier 'override_coverage' is not permitted here 5 error: 20: layout qualifier 'push_constant' is not permitted here 6 error: 20: layout qualifier 'blend_support_all_equations' is not permitted here 7 error: 20: layout qualifier 'tracked' is not permitted here 8 error: 20: layout qualifier 'srgb_unpremul' is not permitted here 9 error: 20: layout qualifier 'key' is not permitted here 10 error: 20: layout qualifier 'location' is not permitted here 11 error: 20: layout qualifier 'offset' is not permitted here 12 error: 20: layout qualifier 'binding' is not permitted here [all …]
|
D | BadModifiers.glsl | 3 error: 1: 'const' is not permitted here 4 error: 1: 'in' is not permitted here 5 error: 1: 'out' is not permitted here 6 error: 1: 'uniform' is not permitted here 7 error: 1: 'flat' is not permitted here 8 error: 1: 'noperspective' is not permitted here 10 error: 4: 'uniform' is not permitted here 11 error: 4: 'flat' is not permitted here 12 error: 4: 'noperspective' is not permitted here 13 error: 4: 'sk_has_side_effects' is not permitted here [all …]
|
D | ModifiersInStruct.glsl | 3 error: 2: modifier 'const' is not permitted on a struct field 4 error: 3: modifier 'uniform' is not permitted on a struct field 5 error: 4: modifier 'flat' is not permitted on a struct field 6 error: 5: modifier 'noperspective' is not permitted on a struct field 7 error: 6: modifier 'inout' is not permitted on a struct field
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
D | NameConstraints.java | 16 private GeneralSubtree[] permitted, excluded; field in NameConstraints 41 permitted = createArray(ASN1Sequence.getInstance(o, false)); in NameConstraints() 64 GeneralSubtree[] permitted, in NameConstraints() argument 67 this.permitted = cloneSubtree(permitted); in NameConstraints() 85 return cloneSubtree(permitted); in getPermittedSubtrees() 101 if (permitted != null) in toASN1Primitive() 103 v.add(new DERTaggedObject(false, 0, new DERSequence(permitted))); in toASN1Primitive()
|
D | PKIXNameConstraintValidator.java | 124 public void intersectPermittedSubtree(GeneralSubtree permitted) in intersectPermittedSubtree() argument 126 intersectPermittedSubtree(new GeneralSubtree[]{permitted}); in intersectPermittedSubtree() 135 public void intersectPermittedSubtree(GeneralSubtree[] permitted) in intersectPermittedSubtree() argument 140 for (int i = 0; i != permitted.length; i++) in intersectPermittedSubtree() 142 GeneralSubtree subtree = permitted[i]; in intersectPermittedSubtree() 377 private void checkPermittedDN(Set permitted, ASN1Sequence dns) in checkPermittedDN() argument 380 if (permitted == null) in checkPermittedDN() 385 if (permitted.isEmpty() && dns.size() == 0) in checkPermittedDN() 389 Iterator it = permitted.iterator(); in checkPermittedDN() 427 private Set intersectDN(Set permitted, Set dns) in intersectDN() argument [all …]
|
D | NameConstraintValidator.java | 11 void intersectPermittedSubtree(GeneralSubtree permitted); in intersectPermittedSubtree() argument 13 void intersectPermittedSubtree(GeneralSubtree[] permitted); in intersectPermittedSubtree() argument
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/asn1/x509/ |
D | NameConstraints.java | 20 private GeneralSubtree[] permitted, excluded; field in NameConstraints 45 permitted = createArray(ASN1Sequence.getInstance(o, false)); in NameConstraints() 68 GeneralSubtree[] permitted, in NameConstraints() argument 71 this.permitted = cloneSubtree(permitted); in NameConstraints() 89 return cloneSubtree(permitted); in getPermittedSubtrees() 105 if (permitted != null) in toASN1Primitive() 107 v.add(new DERTaggedObject(false, 0, new DERSequence(permitted))); in toASN1Primitive()
|
D | PKIXNameConstraintValidator.java | 128 public void intersectPermittedSubtree(GeneralSubtree permitted) in intersectPermittedSubtree() argument 130 intersectPermittedSubtree(new GeneralSubtree[]{permitted}); in intersectPermittedSubtree() 139 public void intersectPermittedSubtree(GeneralSubtree[] permitted) in intersectPermittedSubtree() argument 144 for (int i = 0; i != permitted.length; i++) in intersectPermittedSubtree() 146 GeneralSubtree subtree = permitted[i]; in intersectPermittedSubtree() 381 private void checkPermittedDN(Set permitted, ASN1Sequence dns) in checkPermittedDN() argument 384 if (permitted == null) in checkPermittedDN() 389 if (permitted.isEmpty() && dns.size() == 0) in checkPermittedDN() 393 Iterator it = permitted.iterator(); in checkPermittedDN() 431 private Set intersectDN(Set permitted, Set dns) in intersectDN() argument [all …]
|
D | NameConstraintValidator.java | 15 void intersectPermittedSubtree(GeneralSubtree permitted); in intersectPermittedSubtree() argument 17 void intersectPermittedSubtree(GeneralSubtree[] permitted); in intersectPermittedSubtree() argument
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/asn1/x509/ |
D | NameConstraints.java | 20 private GeneralSubtree[] permitted, excluded; field in NameConstraints 45 permitted = createArray(ASN1Sequence.getInstance(o, false)); in NameConstraints() 68 GeneralSubtree[] permitted, in NameConstraints() argument 71 this.permitted = cloneSubtree(permitted); in NameConstraints() 89 return cloneSubtree(permitted); in getPermittedSubtrees() 105 if (permitted != null) in toASN1Primitive() 107 v.add(new DERTaggedObject(false, 0, new DERSequence(permitted))); in toASN1Primitive()
|
D | PKIXNameConstraintValidator.java | 128 public void intersectPermittedSubtree(GeneralSubtree permitted) in intersectPermittedSubtree() argument 130 intersectPermittedSubtree(new GeneralSubtree[]{permitted}); in intersectPermittedSubtree() 139 public void intersectPermittedSubtree(GeneralSubtree[] permitted) in intersectPermittedSubtree() argument 144 for (int i = 0; i != permitted.length; i++) in intersectPermittedSubtree() 146 GeneralSubtree subtree = permitted[i]; in intersectPermittedSubtree() 381 private void checkPermittedDN(Set permitted, ASN1Sequence dns) in checkPermittedDN() argument 384 if (permitted == null) in checkPermittedDN() 389 if (permitted.isEmpty() && dns.size() == 0) in checkPermittedDN() 393 Iterator it = permitted.iterator(); in checkPermittedDN() 431 private Set intersectDN(Set permitted, Set dns) in intersectDN() argument [all …]
|
D | NameConstraintValidator.java | 15 void intersectPermittedSubtree(GeneralSubtree permitted); in intersectPermittedSubtree() argument 17 void intersectPermittedSubtree(GeneralSubtree[] permitted); in intersectPermittedSubtree() argument
|
/external/libcap-ng/libcap-ng-0.7/src/ |
D | cap-ng.c | 199 m.data.v1.permitted = 0x7FFFFFFFU; in capng_fill() 203 m.data.v3[0].permitted = 0xFFFFFFFFU; in capng_fill() 206 m.data.v3[1].permitted = 0xFFFFFFFFU; in capng_fill() 306 m.data.v3[0].permitted = FIXUP(filedata->data[0].permitted); in load_data() 307 m.data.v3[1].permitted = FIXUP(filedata->data[1].permitted); in load_data() 312 m.data.v3[0].permitted | m.data.v3[0].inheritable; in load_data() 314 m.data.v3[1].permitted | m.data.v3[1].inheritable; in load_data() 369 m.data.v3[idx].permitted |= MASK(capability); in update_permitted() 371 m.data.v3[idx].permitted &= ~(MASK(capability)); in update_permitted() 408 v1_update(action, capability, &m.data.v1.permitted); in capng_update() [all …]
|
/external/tpm2-tss/script/ekca/ |
D | root-ca.cnf | 116 permitted;DNS.1 = example.net 117 permitted;DNS.2 = example.org 118 permitted;DNS.3 = lan 119 permitted;DNS.4 = onion 120 permitted;email.1 = example.net 121 permitted;email.2 = example.org
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
D | PKIXNameConstraintValidator.java | 99 public void intersectPermittedSubtree(GeneralSubtree permitted) in intersectPermittedSubtree() argument 101 validator.intersectPermittedSubtree(permitted); in intersectPermittedSubtree() 111 public void intersectPermittedSubtree(GeneralSubtree[] permitted) in intersectPermittedSubtree() argument 113 validator.intersectPermittedSubtree(permitted); in intersectPermittedSubtree()
|
/external/ltp/testcases/kernel/syscalls/capset/ |
D | capset02.c | 40 int permitted; member 62 data->permitted = tc->permitted; in verify_capset() 92 data->permitted = CAP1; in setup()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jce/provider/ |
D | PKIXNameConstraintValidator.java | 103 public void intersectPermittedSubtree(GeneralSubtree permitted) in intersectPermittedSubtree() argument 105 validator.intersectPermittedSubtree(permitted); in intersectPermittedSubtree() 115 public void intersectPermittedSubtree(GeneralSubtree[] permitted) in intersectPermittedSubtree() argument 117 validator.intersectPermittedSubtree(permitted); in intersectPermittedSubtree()
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/jce/provider/ |
D | PKIXNameConstraintValidator.java | 103 public void intersectPermittedSubtree(GeneralSubtree permitted) in intersectPermittedSubtree() argument 105 validator.intersectPermittedSubtree(permitted); in intersectPermittedSubtree() 115 public void intersectPermittedSubtree(GeneralSubtree[] permitted) in intersectPermittedSubtree() argument 117 validator.intersectPermittedSubtree(permitted); in intersectPermittedSubtree()
|
/external/conscrypt/apex/ |
D | ld.config.txt | 20 namespace.default.permitted.paths = /system/${LIB} 21 namespace.default.asan.permitted.paths = /system/${LIB} 42 # permitted paths because linker uses realpath(3) to check the accessibility 49 namespace.platform.permitted.paths = /apex/com.android.runtime/${LIB}/bionic 50 namespace.platform.asan.permitted.paths = /apex/com.android.runtime/${LIB}/bionic
|
/external/kernel-headers/original/uapi/linux/ |
D | capability.h | 46 __u32 permitted; member 75 __le32 permitted; /* Little endian */ member 86 __le32 permitted; /* Little endian */ member
|
/external/llvm/test/CodeGen/Mips/ |
D | no-odd-spreg-msa.ll | 19 ; The intention is that if odd single precision registers are permitted, the 23 ; On the other hand, if odd single precision registers are not permitted, it 53 ; The intention is that if odd single precision registers are permitted, the 57 ; On the other hand, if odd single precision registers are not permitted, it 85 ; The intention is that if odd single precision registers are permitted, the 88 ; On the other hand, if odd single precision registers are not permitted, it 113 ; The intention is that if odd single precision registers are permitted, the 116 ; On the other hand, if odd single precision registers are not permitted, it
|
/external/llvm-project/llvm/test/CodeGen/Mips/ |
D | no-odd-spreg-msa.ll | 19 ; The intention is that if odd single precision registers are permitted, the 23 ; On the other hand, if odd single precision registers are not permitted, it 53 ; The intention is that if odd single precision registers are permitted, the 57 ; On the other hand, if odd single precision registers are not permitted, it 85 ; The intention is that if odd single precision registers are permitted, the 88 ; On the other hand, if odd single precision registers are not permitted, it 113 ; The intention is that if odd single precision registers are permitted, the 116 ; On the other hand, if odd single precision registers are not permitted, it
|
/external/llvm-project/llvm/test/MC/Hexagon/ |
D | hvx-swapped-regpairs.s | 14 # CHECK-V65: error: register pair `WR0' is not permitted for this architecture 24 ## No error for v65, this is now permitted! 42 # CHECK-V65: error: register pair `WR0' is not permitted for this architecture
|
/external/ltp/lib/ |
D | tst_capability.c | 34 static void do_cap_req(uint32_t *permitted, uint32_t *effective, uint32_t mask, in do_cap_req() argument 37 if (!(*permitted & mask)) in do_cap_req() 56 uint32_t *pP = &new[CAP_TO_INDEX(cap->id)].permitted; in tst_cap_action()
|
/external/strace/ |
D | capability.c | 63 uint32_t permitted; member 133 print_cap_bits(data[0].permitted, len > 1 ? data[1].permitted : 0); in print_cap_data()
|