| /OK3568_Linux_fs/kernel/drivers/input/ |
| H A D | evdev.c | 50 bool revoked; member 253 if (client->revoked) in evdev_pass_values() 443 if (evdev->exist && !client->revoked) in evdev_release() 517 if (!evdev->exist || client->revoked) { in evdev_write() 571 if (!evdev->exist || client->revoked) in evdev_read() 600 !evdev->exist || client->revoked); in evdev_read() 618 if (evdev->exist && !client->revoked) in evdev_poll() 946 client->revoked = true; in evdev_revoke() 1267 if (!evdev->exist || client->revoked) { in evdev_ioctl_handler()
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/ |
| H A D | 0001-Forward-port-to-OpenSSL-1.1.x.patch | 34 - if (crl->crl->revoked) 36 - int idx = sk_X509_REVOKED_find(crl->crl->revoked, 41 - debug("Certificate is revoked.\n"); 46 - debug("Certificate is not revoked.\n"); 53 - debug("CRL does not have revoked list.\n"); 62 + debug("Certificate is revoked.\n"); 67 + debug("Certificate is not revoked.\n");
|
| /OK3568_Linux_fs/buildroot/package/keyutils/ |
| H A D | 0002-cifs.patch | 10 create user debug:* revoked /bin/keyctl reject %k 30 %c %S
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-security/keyutils/files/ |
| H A D | keyutils-fix-error-report-by-adding-default-message.patch | 25 my_err="Key has been revoked"
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/ |
| H A D | x509.h | 1310 const X509_REVOKED *revoked); 1314 OPENSSL_EXPORT int X509_REVOKED_set_serialNumber(X509_REVOKED *revoked, 1320 const X509_REVOKED *revoked); 1324 OPENSSL_EXPORT int X509_REVOKED_set_revocationDate(X509_REVOKED *revoked, 1646 OPENSSL_EXPORT void *X509_REVOKED_get_ext_d2i(const X509_REVOKED *revoked,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/ |
| H A D | x509.h | 1310 const X509_REVOKED *revoked); 1314 OPENSSL_EXPORT int X509_REVOKED_set_serialNumber(X509_REVOKED *revoked, 1320 const X509_REVOKED *revoked); 1324 OPENSSL_EXPORT int X509_REVOKED_set_revocationDate(X509_REVOKED *revoked, 1646 OPENSSL_EXPORT void *X509_REVOKED_get_ext_d2i(const X509_REVOKED *revoked,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/ |
| H A D | x509.h | 1310 const X509_REVOKED *revoked); 1314 OPENSSL_EXPORT int X509_REVOKED_set_serialNumber(X509_REVOKED *revoked, 1320 const X509_REVOKED *revoked); 1324 OPENSSL_EXPORT int X509_REVOKED_set_revocationDate(X509_REVOKED *revoked, 1646 OPENSSL_EXPORT void *X509_REVOKED_get_ext_d2i(const X509_REVOKED *revoked,
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/ |
| H A D | x509.h | 1310 const X509_REVOKED *revoked); 1314 OPENSSL_EXPORT int X509_REVOKED_set_serialNumber(X509_REVOKED *revoked, 1320 const X509_REVOKED *revoked); 1324 OPENSSL_EXPORT int X509_REVOKED_set_revocationDate(X509_REVOKED *revoked, 1646 OPENSSL_EXPORT void *X509_REVOKED_get_ext_d2i(const X509_REVOKED *revoked,
|
| /OK3568_Linux_fs/kernel/drivers/visorbus/ |
| H A D | controlvmchannel.h | 57 u16 revoked:1; member
|
| /OK3568_Linux_fs/kernel/include/linux/ |
| H A D | jbd2.h | 333 BUFFER_FNS(Revoked, revoked) in BUFFER_FNS() 334 TAS_BUFFER_FNS(Revoked, revoked) in BUFFER_FNS()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/ |
| H A D | ocsp.h | 233 OCSP_REVOKEDINFO *revoked; member
|
| H A D | x509.h | 447 STACK_OF(X509_REVOKED) *revoked; 606 # define X509_CRL_get_REVOKED(x) ((x)->crl->revoked)
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/gnutls/gnutls/ |
| H A D | CVE-2022-2509.patch | 52 tls13-without-timeout-func buffer status-request-revoked \
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/ |
| H A D | x509.h | 410 STACK_OF(X509_REVOKED) *revoked; 537 #define X509_CRL_get_REVOKED(x) ((x)->crl->revoked)
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/ |
| H A D | x509.h | 410 STACK_OF(X509_REVOKED) *revoked; 537 #define X509_CRL_get_REVOKED(x) ((x)->crl->revoked)
|
| /OK3568_Linux_fs/kernel/Documentation/security/keys/ |
| H A D | request-key.rst | 115 9) Upon instantiating key U, auth key V is automatically revoked so that it
|
| H A D | core.rst | 753 timeout. Timeouts may not be set with this function on negative, revoked 771 likewise if the authority has been revoked because the target key is 1076 being cleared, a key being revoked, a key being invalidated or a key 1299 revoked. Should the key be invalid, error EKEYEXPIRED or EKEYREVOKED will 1580 data upon a key being revoked. The caller will have the key semaphore 1651 will be revoked. If an error is indicated, the key under construction 1846 Similarly, revoked and expired keys will be garbage collected, but only after a
|
| /OK3568_Linux_fs/yocto/poky/meta/files/common-licenses/ |
| H A D | NLOD-2.0 | 40 …his will entail that the licensee’s right to use the information will be revoked immediately witho…
|
| H A D | NLOD-1.0 | 39 …his will entail that the licensee's right to use the information will be revoked immediately witho…
|
| H A D | CDLA-Permissive-1.0 | 65 …ll terminate, and Your right to Receive, Use or Publish the Data will be revoked or modified if Yo…
|
| H A D | LPL-1.02 | 45 …ntended to be a Contribution. Once a Contribution is contributed, it may not thereafter be revoked.
|
| H A D | LPL-1.0 | 55 …tify the originator of the Contribution. Once consent is granted, it may not thereafter be revoked.
|
| H A D | CDLA-Sharing-1.0 | 69 …ll terminate, and Your right to Receive, Use or Publish the Data will be revoked or modified if Yo…
|
| /OK3568_Linux_fs/kernel/security/integrity/ima/ |
| H A D | Kconfig | 287 revoked IMA keys. It is consulted before any other keyring. If
|
| /OK3568_Linux_fs/kernel/Documentation/isdn/ |
| H A D | interface_capi.rst | 34 driver. The registration can be revoked by calling the function
|