/external/selinux/libsepol/include/sepol/policydb/ |
H A D | flask_types.h | 57 sepol_access_vector_t allowed; member in struct:sepol_av_decision
|
/external/openssh/ |
H A D | readpass.c | 174 int allowed = 0; local 188 allowed = 1; 192 return (allowed);
|
H A D | auth-rsa.c | 175 int allowed = 0, bits; local 261 /* break out, this key is allowed */ 262 allowed = 1; 269 /* return key if allowed */ 270 if (allowed && rkey != NULL) 275 return allowed; 280 * return key if login is allowed, NULL otherwise 287 u_int i, allowed = 0; local 291 for (i = 0; !allowed && i < options.num_authkeys_files; i++) { 296 allowed [all...] |
H A D | auth-options.c | 434 char *command, *allowed; local 495 if ((r = sshbuf_get_cstring(data, &allowed, 504 free(allowed); 509 allowed); 510 free(allowed);
|
H A D | monitor_wrap.c | 406 int allowed = 0, have_forced = 0; local 426 allowed = buffer_get_int(&m); 435 return (allowed); 440 * privileged parent makes the decision if the key is allowed 884 int allowed = 0, have_forced = 0; local 894 allowed = buffer_get_int(&m); 901 if (allowed && rkey != NULL) { 910 return (allowed);
|
/external/libselinux/include/selinux/ |
H A D | selinux.h | 110 access_vector_t allowed; member in struct:av_decision
|
/external/selinux/libselinux/include/selinux/ |
H A D | selinux.h | 129 access_vector_t allowed; member in struct:av_decision
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
H A D | SSLEngineImplTest.java | 95 // with the server not allowed to session creation 887 * of the peers is not allowed to create the session. 889 private void doNoRenegotiationTest(SSLEngine allowed, argument 900 allowed.getSession().getPacketBufferSize(); 912 allowed.beginHandshake(); 920 while (allowed.getHandshakeStatus().equals( 922 print(result = allowed.wrap(app_data_plain, buffer)); 929 System.out.println("\nNot allowed unwraps the message"); 1006 print(result = allowed.unwrap(buffer, app_data_plain)); 1009 assertEquals("Responce from the peer not allowed t [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | acs.c | 370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local 374 for (i = 0; i < ARRAY_SIZE(allowed); i++) 375 if (chan->chan == allowed[i]) 384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local 387 for (i = 0; i < ARRAY_SIZE(allowed); i++) 388 if (chan->chan == allowed[i]) 623 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 632 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
|
H A D | dfs.c | 95 int *allowed = allowed_40; local 100 allowed = allowed_40; 104 allowed = allowed_80; 108 allowed = allowed_160; 117 if (chan->chan == allowed[i])
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | hw_features_common.c | 91 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 140, local 102 /* Verify that HT40 secondary channel is an allowed 20 MHz 114 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 120 * Verify that HT40 primary,secondary channel pair is allowed per 123 * the list of allowed channels (already checked above). 131 for (k = 0; k < ARRAY_SIZE(allowed); k++) { 132 if (first == allowed[k]) { 138 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_das.c | 39 u8 allowed[] = { local 65 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | acs.c | 370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local 374 for (i = 0; i < ARRAY_SIZE(allowed); i++) 375 if (chan->chan == allowed[i]) 384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local 387 for (i = 0; i < ARRAY_SIZE(allowed); i++) 388 if (chan->chan == allowed[i]) 623 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 632 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
|
H A D | dfs.c | 95 int *allowed = allowed_40; local 100 allowed = allowed_40; 104 allowed = allowed_80; 108 allowed = allowed_160; 117 if (chan->chan == allowed[i])
|
/external/wpa_supplicant_8/src/common/ |
H A D | hw_features_common.c | 91 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 140, local 102 /* Verify that HT40 secondary channel is an allowed 20 MHz 114 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 120 * Verify that HT40 primary,secondary channel pair is allowed per 123 * the list of allowed channels (already checked above). 131 for (k = 0; k < ARRAY_SIZE(allowed); k++) { 132 if (first == allowed[k]) { 138 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_das.c | 39 u8 allowed[] = { local 65 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | acs.c | 370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local 374 for (i = 0; i < ARRAY_SIZE(allowed); i++) 375 if (chan->chan == allowed[i]) 384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local 387 for (i = 0; i < ARRAY_SIZE(allowed); i++) 388 if (chan->chan == allowed[i]) 623 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 632 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
|
H A D | dfs.c | 95 int *allowed = allowed_40; local 100 allowed = allowed_40; 104 allowed = allowed_80; 108 allowed = allowed_160; 117 if (chan->chan == allowed[i])
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | hw_features_common.c | 91 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 140, local 102 /* Verify that HT40 secondary channel is an allowed 20 MHz 114 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 120 * Verify that HT40 primary,secondary channel pair is allowed per 123 * the list of allowed channels (already checked above). 131 for (k = 0; k < ARRAY_SIZE(allowed); k++) { 132 if (first == allowed[k]) { 138 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_das.c | 39 u8 allowed[] = { local 65 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
/external/v8/test/cctest/ |
H A D | test-utils-arm64.cc | 214 int reg_size, int reg_count, RegList allowed) { 218 if (((1UL << n) & allowed) != 0) { 219 // Only assign allowed registers. 241 int reg_size, int reg_count, RegList allowed) { 245 if (((1UL << n) & allowed) != 0) { 246 // Only assigned allowed registers. 213 PopulateRegisterArray(Register* w, Register* x, Register* r, int reg_size, int reg_count, RegList allowed) argument 240 PopulateFPRegisterArray(FPRegister* s, FPRegister* d, FPRegister* v, int reg_size, int reg_count, RegList allowed) argument
|
/external/vixl/test/ |
H A D | test-utils-a64.cc | 246 int reg_size, int reg_count, RegList allowed) { 250 if (((UINT64_C(1) << n) & allowed) != 0) { 251 // Only assign allowed registers. 273 int reg_size, int reg_count, RegList allowed) { 277 if (((UINT64_C(1) << n) & allowed) != 0) { 278 // Only assigned allowed registers. 245 PopulateRegisterArray(Register* w, Register* x, Register* r, int reg_size, int reg_count, RegList allowed) argument 272 PopulateFPRegisterArray(FPRegister* s, FPRegister* d, FPRegister* v, int reg_size, int reg_count, RegList allowed) argument
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
H A D | networkconfig.cpp | 167 QStringList allowed; local 168 allowed << "MSCHAPV2" << "MD5" << "GTC" << "TLS" << "OTP" << "SIM" 171 if (allowed.contains(eapSelect->itemText(i))) {
|
/external/libpng/ |
H A D | pngset.c | 1556 png_set_benign_errors(png_structrp png_ptr, int allowed) argument 1560 /* If allowed is 1, png_benign_error() is treated as a warning. 1562 * If allowed is 0, png_benign_error() is treated as an error (which 1566 if (allowed) 1586 png_set_check_for_invalid_index(png_structrp png_ptr, int allowed) argument 1590 if (allowed > 0)
|
/external/pdfium/samples/fx_lpng/lpng_v163/ |
H A D | fx_pngset.c | 1555 png_set_benign_errors(png_structrp png_ptr, int allowed)
argument 1559 /* If allowed is 1, png_benign_error() is treated as a warning.
1561 * If allowed is 0, png_benign_error() is treated as an error (which
1565 if (allowed)
1585 png_set_check_for_invalid_index(png_structrp png_ptr, int allowed)
argument 1589 if (allowed > 0)
|