/external/nist-sip/java/gov/nist/javax/sip/header/ |
H A D | AllowList.java | 36 * List of ALLOW headers. The sip message can have multiple Allow headers 43 public class AllowList extends SIPHeaderList<Allow> { 62 super(Allow.class, AllowHeader.NAME); 68 * Iterator if no methods are defined in this Allow Header. 82 for ( Iterator<Allow> it = this.hlist.iterator(); it.hasNext();) { 83 Allow a = (Allow)it.next(); 108 Allow allow = new Allow();
|
H A D | Allow.java | 32 * Allow SIPHeader. 40 public final class Allow extends class in inherits:SIPHeader,javax.sip.header.AllowHeader 53 public Allow() { method in class:Allow 60 public Allow(String m) { method in class:Allow 80 + ", Allow, setMethod(), the method parameter is null.");
|
H A D | NameMap.java | 87 putNameMap(Allow.NAME, Allow.class.getName()); // 5
|
/external/chromium_org/content/common/sandbox_linux/ |
H A D | bpf_ppapi_policy_linux.cc | 17 using sandbox::bpf_dsl::Allow; 39 return Allow();
|
H A D | bpf_utility_policy_linux.cc | 17 using sandbox::bpf_dsl::Allow; 38 // Allow the system calls below. 52 return Allow();
|
H A D | bpf_cros_arm_gpu_policy_linux.cc | 29 using sandbox::bpf_dsl::Allow; 118 return Allow(); 134 return Allow(); 146 return Allow(); 147 // Allow only AF_UNIX for |domain|. 151 return If(domain == AF_UNIX, Allow()).Else(Error(EPERM)); 156 return Allow();
|
H A D | bpf_renderer_policy_linux.cc | 17 using sandbox::bpf_dsl::Allow; 28 // The baseline policy allows __NR_clock_gettime. Allow 34 // Allow the system calls below. 55 return Allow();
|
H A D | bpf_gpu_policy_linux.cc | 36 using sandbox::bpf_dsl::Allow; 104 // Allow using openat() as open(). 140 return Allow(); 192 return Allow(); 200 return Allow();
|
H A D | sandbox_seccomp_bpf_linux.cc | 40 using sandbox::bpf_dsl::Allow; 91 return Allow(); 105 // Allow all syscalls. 109 return Allow();
|
/external/chromium_org/content/common/sandbox_linux/android/ |
H A D | sandbox_bpf_base_policy_android.cc | 10 using sandbox::bpf_dsl::Allow; 55 return Allow();
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
H A D | syscall_parameters_restrictions.cc | 89 using sandbox::bpf_dsl::Allow; 98 // Allow Glibc's and Android pthread creation flags, crash on any other 119 return If(IsAndroid() ? android_test : glibc_test, Allow()) 130 Allow()) 136 return Switch(request).CASES((TCGETS, FIONREAD), Allow()).Default( 150 return If((flags & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); 160 return If((prot & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); 187 Allow()) 189 If((long_arg & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS())) 209 Allow()) [all...] |
H A D | baseline_policy.cc | 26 using sandbox::bpf_dsl::Allow; 108 return Allow(); 114 return Allow(); 120 return Allow(); 126 return Allow(); 165 return If(advice == MADV_DONTNEED, Allow()).Else(Error(EPERM)); 191 return If(domain == AF_UNIX, Allow()).Else(CrashSIGSYS());
|
H A D | syscall_parameters_restrictions_unittests.cc | 38 using sandbox::bpf_dsl::Allow; 53 return Allow(); 156 return Allow();
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
H A D | AllowParser.java | 33 * Parser for Allow header. 60 * parse the Allow String header 73 Allow allow = new Allow(); 87 allow = new Allow();
|
/external/chromium_org/components/nacl/loader/nonsfi/ |
H A D | nonsfi_sandbox.cc | 39 using sandbox::bpf_dsl::Allow; 67 Allow()).Else(CrashSIGSYS()); 76 Allow()).Else(CrashSIGSYSClone()); 80 // TODO(hamaji): Allow only FUTEX_PRIVATE_FLAG futexes. 91 Allow()) 108 Allow()).Else(CrashSIGSYS()); 117 return If((prot & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); 129 Allow()).Else(CrashSIGSYS()); 137 return If(domain == AF_UNIX, Allow()).Else(CrashSIGSYS()); 237 return Allow(); [all...] |
/external/chromium_org/components/nacl/loader/sandbox_linux/ |
H A D | nacl_bpf_sandbox_linux.cc | 32 using sandbox::bpf_dsl::Allow; 101 return Allow();
|
/external/chromium_org/sandbox/linux/bpf_dsl/ |
H A D | bpf_dsl_unittest.cc | 76 return Allow(); 105 return Allow(); 142 return Allow(); 175 return If(addr == kDeadBeefAddr, Error(EPERM)).Else(Allow()); 177 return Allow(); 199 return Allow(); 238 return Allow(); 274 return Allow(); 304 .Case(F_SETFD, If(long_arg == O_CLOEXEC, Allow()).Else(Error(EINVAL))) 308 return Allow(); [all...] |
H A D | bpf_dsl_more_unittest.cc | 121 return Allow(); 160 return Allow(); 191 return Allow(); 231 return Allow(); 298 return Allow(); 354 return If(arg == 0, Allow()).Else(Error(EPERM)); 357 return Allow(); 375 return If(arg == 0, Error(EINVAL)).Else(Allow()); 378 return Allow(); 433 return Allow(); [all...] |
/external/chromium_org/android_webview/browser/ |
H A D | aw_ssl_host_state_delegate.cc | 42 void CertPolicy::Allow(const net::X509Certificate& cert, function in class:android_webview::internal::CertPolicy 72 cert_policy_for_host_[host].Allow(cert, error);
|
H A D | aw_ssl_host_state_delegate.h | 31 void Allow(const net::X509Certificate& cert, net::CertStatus error);
|
/external/chromium_org/chrome/browser/policy/ |
H A D | url_blacklist_manager_unittest.cc | 400 blacklist.Allow(allowed.get()); 427 blacklist.Allow(allowed.get()); 435 blacklist.Allow(allowed.get()); 446 blacklist.Allow(allowed.get()); 458 blacklist.Allow(allowed.get()); 472 blacklist.Allow(allowed.get()); 485 blacklist.Allow(allowed.get()); 501 blacklist.Allow(allowed.get()); 520 blacklist.Allow(allowed.get()); 575 blacklist.Allow(allowe [all...] |
/external/chromium_org/ppapi/native_client/tests/nacl_browser/browser_dynamic_library/ |
H A D | nacl.scons | 20 # Allow resolving a URL to the toolchain/ directory (instead of staging).
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ims/ |
H A D | PAssociatedURIParser.java | 40 import gov.nist.javax.sip.header.Allow;
|
/external/chromium_org/components/policy/core/browser/ |
H A D | url_blacklist_manager.h | 60 // Blocked and Allowed, Allow takes precedence. 61 void Allow(const base::ListValue* filters);
|
/external/nist-sip/java/gov/nist/javax/sip/message/ |
H A D | ListMap.java | 97 headerListTable.put(Allow.class, AllowList.class);
|