/external/boringssl/src/crypto/x509v3/ |
D | v3_cpols.c | 75 static int i2r_certpol(X509V3_EXT_METHOD *method, STACK_OF(POLICYINFO) *pol, BIO *out, int indent); 141 POLICYINFO *pol; variable 178 pol = policy_section(ctx, polsect, ia5org); 180 if(!pol) goto err; 187 pol = POLICYINFO_new(); 188 pol->policyid = pobj; 190 if (!sk_POLICYINFO_push(pols, pol)){ 191 POLICYINFO_free(pol); 209 POLICYINFO *pol; in policy_section() local 211 if(!(pol = POLICYINFO_new())) goto merr; in policy_section() [all …]
|
/external/mesa3d/src/gallium/drivers/nv50/codegen/ |
D | nv50_ir.cpp | 258 LValue::clone(ClonePolicy<Function>& pol) const in clone() 260 LValue *that = new_LValue(pol.context(), reg.file); in clone() 262 pol.set<Value>(this, that); in clone() 293 Symbol::clone(ClonePolicy<Function>& pol) const in clone() 295 Program *prog = pol.context()->getProgram(); in clone() 299 pol.set<Value>(this, that); in clone() 367 ImmediateValue::clone(ClonePolicy<Function>& pol) const in clone() 369 Program *prog = pol.context()->getProgram(); in clone() 372 pol.set<Value>(this, that); in clone() 714 Instruction::clone(ClonePolicy<Function>& pol, Instruction *i) const in clone() argument [all …]
|
D | nv50_ir_bb.cpp | 91 BasicBlock::clone(ClonePolicy<Function>& pol) const in clone() 93 BasicBlock *bb = new BasicBlock(pol.context()); in clone() 95 pol.set(this, bb); in clone() 98 bb->insertTail(i->clone(pol)); in clone() 100 pol.context()->cfg.insert(&bb->cfg); in clone() 104 bb->cfg.attach(&pol.get(obb)->cfg, it.getType()); in clone()
|
D | nv50_ir_inlines.h | 296 DeepClonePolicy<Function> pol(ctx); in cloneForward() 299 pol.set(obj->getSrc(i), obj->getSrc(i)); in cloneForward() 301 return obj->clone(pol); in cloneForward()
|
D | nv50_ir_util.h | 731 ShallowClonePolicy<C> pol(c); in cloneShallow() 732 return obj->clone(pol); in cloneShallow()
|
/external/valgrind/VEX/priv/ |
D | guest_generic_x87.c | 630 UInt pol, UInt idx, in compute_PCMPxSTRx_gen_output() argument 633 vassert((pol >> 2) == 0); in compute_PCMPxSTRx_gen_output() 637 switch (pol) { in compute_PCMPxSTRx_gen_output() 698 UInt pol, UInt idx, in compute_PCMPxSTRx_gen_output_wide() argument 701 vassert((pol >> 2) == 0); in compute_PCMPxSTRx_gen_output_wide() 705 switch (pol) { in compute_PCMPxSTRx_gen_output_wide() 809 UInt pol = (imm8 >> 4) & 3; // imm8[5:4] polarity in compute_PCMPxSTRx() local 840 intRes1, zmaskL, zmaskR, validL, pol, idx, isxSTRM in compute_PCMPxSTRx() 878 intRes1, zmaskL, zmaskR, validL, pol, idx, isxSTRM in compute_PCMPxSTRx() 918 intRes1, zmaskL, zmaskR, validL, pol, idx, isxSTRM in compute_PCMPxSTRx() [all …]
|
/external/selinux/policycoreutils/gui/ |
D | selinux-polgengui.desktop | 4 Name[ca]=Eina de generació de polítiques del SELinux 23 Name[pt_BR]=Ferramenta de criação de políticas do SELinux 33 Comment[ca]=Genera els mòduls de les polítiques de SELinux 36 Comment[es]=Generar módulos de política de SELinux 51 Comment[pt]=Gerar módulos de políticas SELinux 52 Comment[pt_BR]=Gerar módulos de política do SELinux
|
/external/selinux/policycoreutils/sepolicy/ |
D | sepolicy.py | 597 pol = parser.add_parser("generate", usage=generate_usage, 599 pol.add_argument("-d", "--domain", dest="domain", default=[], 602 pol.add_argument("-u", "--user", dest="user", default=[], 605 pol.add_argument("-r", "--role", dest="role", default=[], 608 pol.add_argument("-a", "--admin", dest="admin_domain", default=[], 611 pol.add_argument("-n", "--name", dest="name", 614 pol.add_argument("-T", "--test", dest="test", default=False, action="store_true", 616 pol.add_argument("-t", "--type", dest="types", default=[], nargs="*", 619 pol.add_argument("-p", "--path", dest="path", default=os.getcwd(), 621 pol.add_argument("-w", "--writepath", dest="writepaths", nargs="*", default=[], [all …]
|
/external/iptables/extensions/ |
D | libxt_policy.c | 97 struct xt_policy_elem *e = &info->pol[info->len]; in policy_parse() 208 e = &info->pol[i]; in policy_check() 334 print_entry("", &info->pol[i], numeric, NFPROTO_IPV4); in policy4_print() 349 print_entry("", &info->pol[i], numeric, NFPROTO_IPV6); in policy6_print() 360 print_entry("--", &info->pol[i], false, NFPROTO_IPV4); in policy4_save() 373 print_entry("--", &info->pol[i], false, NFPROTO_IPV6); in policy6_save()
|
D | libxt_policy.man | 15 \fB\-\-pol\fP {\fBnone\fP|\fBipsec\fP} 16 Matches if the packet is subject to IPsec processing. \fB\-\-pol none\fP
|
/external/icu/icu4c/source/data/unit/ |
D | pt.txt | 1017 one{"{0} pol²"} 1018 other{"{0} pol²"} 1019 per{"{0} por pol²"} 1285 dnam{"pol."} 1286 one{"{0} pol."} 1287 other{"{0} pol."} 1288 per{"{0}/pol."} 1455 dnam{"pol Hg"} 1456 one{"{0} pol Hg"} 1457 other{"{0} pol Hg"} [all …]
|
/external/valgrind/none/tests/amd64/ |
D | pcmpstr64w.c | 132 UInt pol, UInt idx ) in PCMPxSTRx_WRK_gen_output_fmt_I_wide() argument 134 assert((pol >> 2) == 0); in PCMPxSTRx_WRK_gen_output_fmt_I_wide() 138 switch (pol) { in PCMPxSTRx_WRK_gen_output_fmt_I_wide() 222 UInt pol = (imm8 >> 4) & 3; // imm8[5:4] polarity in pcmpXstrX_WRK_wide() local 253 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK_wide() 291 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK_wide() 331 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK_wide() 371 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK_wide()
|
D | pcmpstr64.c | 131 UInt pol, UInt idx ) in pcmpXstrX_WRK_gen_output_fmt_I() argument 133 assert((pol >> 2) == 0); in pcmpXstrX_WRK_gen_output_fmt_I() 137 switch (pol) { in pcmpXstrX_WRK_gen_output_fmt_I() 217 UInt pol = (imm8 >> 4) & 3; // imm8[5:4] polarity in pcmpXstrX_WRK() local 249 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK() 288 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK() 329 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK() 370 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK() 411 intRes1, zmaskL, zmaskR, validL, pol, idx in pcmpXstrX_WRK()
|
/external/iptables/include/linux/netfilter/ |
D | xt_policy.h | 53 struct xt_policy_elem pol[XT_POLICY_MAX_ELEM]; member
|
/external/strace/ |
D | mem.c | 404 int pol; in SYS_FUNC() local 405 if (!umove_or_printaddr(tcp, tcp->u_arg[0], &pol)) in SYS_FUNC() 406 printxval(policies, pol, "MPOL_???"); in SYS_FUNC()
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
D | xt_policy.h | 64 struct xt_policy_elem pol[XT_POLICY_MAX_ELEM]; member
|
/external/selinux/libsepol/src/ |
D | link.c | 1995 policydb_t *pol = state->base; in is_decl_requires_met() local 2012 id = pol->sym_val_to_name[i][j]; in is_decl_requires_met() 2037 id = pol->p_class_val_to_name[i]; in is_decl_requires_met() 2038 cladatum = pol->class_val_to_struct[i]; in is_decl_requires_met() 2194 static int enable_avrules(link_state_t * state, policydb_t * pol) in enable_avrules() argument 2207 for (block = pol->global; block != NULL; block = block->next) { in enable_avrules() 2218 for (block = pol->global; block != NULL; block = block->next) { in enable_avrules() 2256 for (block = pol->global->next; block != NULL; block = block->next) { in enable_avrules() 2267 debug_requirements(state, pol); in enable_avrules() 2497 static int populate_roleattributes(link_state_t *state, policydb_t *pol) in populate_roleattributes() argument [all …]
|
D | policydb.c | 1488 int symtab_insert(policydb_t * pol, uint32_t sym, in symtab_insert() argument 1502 rc = hashtab_insert(pol->symtab[sym].table, key, datum); in symtab_insert() 1507 *value = ++pol->symtab[sym].nprim; in symtab_insert() 1517 (scope_datum_t *) hashtab_search(pol->scope[sym].table, key); in symtab_insert() 1530 hashtab_insert(pol->scope[sym].table, key2, in symtab_insert() 1549 hashtab_search(pol->symtab[sym].table, in symtab_insert()
|
/external/selinux/policycoreutils/po/ |
D | es.po | 99 msgstr "Para hacer este paquete de políticas activo, ejecute:" 108 "La política SELinux no es administrada o no se puede acceder al " 113 msgstr "No se puede leer el almacenamiento de políticas." 292 "La asignación de ingreso para %s se definió en la política, no se puede " 401 msgstr "El usuario SELinux %s está definido en política, no puede ser borrado" 559 msgstr "El puerto %s/%s está definido en la política, no se puede borrar" 681 msgstr "La dirección %s está definido en la política, no se puede borrar" 764 msgstr "La interfase %s está definida en la política, no se puede borrar" 909 "El contexto de archivo para %s está definido en la política, no se puede " 988 msgstr "El booleano %s está definido en la política, no se puede borrar" [all …]
|
D | pt_BR.po | 99 msgstr "Para tornar este pacote de políticas ativo, execute:" 108 "A política SELinux não é gerenciada ou não foi possível acessar os dados." 112 msgstr "Não foi possível ler os dados da política." 288 "O mapeamento de início de sessão para %s está definido na política, e não " 398 "O usuário SELinux %s está definido na política, e não pode ser excluído" 556 msgstr "A porta %s/%s está definida na política, e não pode ser excluída" 677 msgstr "O endereço %s está definido na política, e não pode ser excluído" 761 msgstr "A interface %s está definida na política, e não pode ser excluída" 906 "O contexto de arquivo para %s está definido na política, e não pode ser " 985 msgstr "O booleano %s está definido na política, e não pode ser excluído" [all …]
|
/external/icu/icu4c/source/data/brkitr/ |
D | pt.txt | 117 "pol.",
|
/external/iproute2/include/linux/ |
D | xfrm.h | 444 struct xfrm_userpolicy_info pol; member
|
/external/kernel-headers/original/uapi/linux/ |
D | xfrm.h | 444 struct xfrm_userpolicy_info pol; member
|
/external/iptables/tests/ |
D | options-most.rules | 12 …ysdev --physdev-in eth0 -m pkttype --pkt-type unicast -m policy --dir in --pol ipsec --strict --re… 35 -A INPUT -p tcp -m policy --dir in --pol ipsec --strict --reqid 1 --spi 0x1 --proto esp --mode tunn…
|
/external/icu/icu4c/source/data/region/ |
D | ksf.txt | 171 PL{"polɔ́n"}
|