Searched refs:allow (Results 1 - 25 of 197) sorted by relevance

12345678

/external/sepolicy/
H A Dsystem.te15 allow system_app system_data_file:dir create_dir_perms;
16 allow system_app system_data_file:file create_file_perms;
19 allow system_app wallpaper_file:file r_file_perms;
22 allow system_app dalvikcache_data_file:file { write setattr };
39 allow system_app kernel:system syslog_read;
48 allow system_app system_prop:property_service set;
51 allow system_app system_file:file x_file_perms;
52 allow system_app log_device:chr_file read;
62 allow system zygote:fd use;
63 allow syste
[all...]
H A Dapp.te17 allow platform_app log_device:chr_file read;
19 allow platform_app cache_file:dir rw_dir_perms;
20 allow platform_app cache_file:file create_file_perms;
22 allow platform_app shell_data_file:dir search;
23 allow platform_app shell_data_file:file { open getattr read };
24 allow platform_app shell_data_file:lnk_file read;
26 allow platform_app apk_tmp_file:file rw_file_perms;
28 allow platform_app qtaguid_proc:file { open };
29 allow platform_app qtaguid_device:chr_file r_file_perms;
38 allow media_ap
[all...]
H A Dcts.te2 # Rules to allow the Android CTS to run.
10 allow appdomain domain:dir r_dir_perms;
11 allow appdomain domain:{ file lnk_file } r_file_perms;
19 allow appdomain file_type:dir r_dir_perms;
20 allow appdomain fs_type:dir r_dir_perms;
21 allow appdomain dev_type:dir r_dir_perms;
22 allow appdomain file_type:dir_file_class_set getattr;
23 allow appdomain dev_type:dir_file_class_set getattr;
24 allow appdomain fs_type:dir_file_class_set getattr;
27 allow appdomai
[all...]
H A Dtee.te10 allow tee self:capability { dac_override };
11 allow tee tee_device:chr_file rw_file_perms;
12 allow tee tee_data_file:dir { getattr write add_name };
13 allow tee tee_data_file:file create_file_perms;
/external/wpa_supplicant_8/wpa_supplicant/dbus/
H A Ddbus-wpa_supplicant.conf6 <allow own="fi.epitest.hostap.WPASupplicant"/>
8 <allow send_destination="fi.epitest.hostap.WPASupplicant"/>
9 <allow send_interface="fi.epitest.hostap.WPASupplicant"/>
11 <allow own="fi.w1.wpa_supplicant1"/>
13 <allow send_destination="fi.w1.wpa_supplicant1"/>
14 <allow send_interface="fi.w1.wpa_supplicant1"/>
15 <allow receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
/external/wpa_supplicant_6/wpa_supplicant/
H A Ddbus-wpa_supplicant.conf6 <allow own="fi.epitest.hostap.WPASupplicant"/>
8 <allow send_destination="fi.epitest.hostap.WPASupplicant"/>
9 <allow send_interface="fi.epitest.hostap.WPASupplicant"/>
/external/libsepol/tests/policies/test-deps/
H A Dmodreq-role-global.conf12 allow role_req_r user_r;
H A Dmodreq-bool-global.conf14 allow a_t b_t : file { read write };
H A Dmodreq-obj-global.conf12 allow mod_foo_t mod_bar_t : sem { create destroy };
H A Dmodreq-perm-global.conf10 allow a_t b_t: msg { send receive };
H A Dmodreq-role-opt.conf16 allow role_req_r user_r;
H A Dmodreq-type-global.conf12 allow test_t type_req_t : file { read write };
H A Dmodreq-type-opt.conf15 allow type_req_t file_t : file { read write };
H A Dmodule.conf15 allow system_t file_t : file { read write };
19 allow sysadm_t file_t : file { read write };
H A Dmodreq-bool-opt.conf20 allow a_t b_t : file { read write };
H A Dmodreq-obj-opt.conf19 allow mod_foo_t mod_bar_t : sem { create destroy };
H A Dmodreq-perm-opt.conf17 allow a_mod_t b_mod_t: msg { send receive };
/external/dnsmasq/dbus/
H A Ddnsmasq.conf6 <allow own="uk.org.thekelleys.dnsmasq"/>
7 <allow send_destination="uk.org.thekelleys.dnsmasq"/>
/external/nist-sip/java/gov/nist/javax/sip/parser/
H A DAllowParser.java45 * @param allow the header to parse
47 public AllowParser(String allow) { argument
48 super(allow);
73 Allow allow = new Allow();
74 allow.setHeaderName(SIPHeaderNames.ALLOW);
79 allow.setMethod(token.getTokenValue());
81 list.add(allow);
87 allow = new Allow();
90 allow.setMethod(token.getTokenValue());
92 list.add(allow);
[all...]
/external/dbus/test/data/valid-config-files/
H A Dmany-rules.conf12 <allow user="*"/>
21 <allow send_type="error"/>
22 <allow send_type="method_call"/>
23 <allow send_type="method_return"/>
24 <allow send_type="signal"/>
30 <allow user="*"/>
39 <allow send_type="error"/>
40 <allow send_type="method_call"/>
41 <allow send_type="method_return"/>
42 <allow send_typ
[all...]
/external/dbus/test/name-test/
H A Dtmp-session-like-system.conf24 <allow user="*"/>
33 <allow send_type="signal"/>
34 <allow send_requested_reply="true" send_type="method_return"/>
35 <allow send_requested_reply="true" send_type="error"/>
38 <allow receive_type="method_call"/>
39 <allow receive_type="method_return"/>
40 <allow receive_type="error"/>
41 <allow receive_type="signal"/>
44 <allow send_destination="org.freedesktop.DBus"/>
51 <allow ow
[all...]
/external/libsepol/tests/policies/test-cond/
H A Drefpolicy-base.conf977 allow bin_t fs_t:filesystem associate;
978 allow bin_t noxattrfs:filesystem associate;
980 allow sbin_t fs_t:filesystem associate;
981 allow sbin_t noxattrfs:filesystem associate;
983 allow ls_exec_t fs_t:filesystem associate;
984 allow ls_exec_t noxattrfs:filesystem associate;
987 allow shell_exec_t fs_t:filesystem associate;
988 allow shell_exec_t noxattrfs:filesystem associate;
990 allow chroot_exec_t fs_t:filesystem associate;
991 allow chroot_exec_
[all...]
/external/webkit/Source/WebKit2/UIProcess/API/C/
H A DWKGeolocationPermissionRequest.cpp41 return toImpl(geolocationPermissionRequestRef)->allow();
/external/libsepol/tests/policies/test-hooks/
H A Dmodule_add_role_allow_trans.conf13 allow role_a_1 role_a_2;
/external/webkit/Source/WebKit/win/Interfaces/
H A DIWebGeolocationPolicyListener.idl38 HRESULT allow();

Completed in 1781 milliseconds

12345678