/external/nist-sip/java/gov/nist/javax/sip/header/ |
H A D | Allow.java | 54 super(ALLOW); 61 super(ALLOW);
|
H A D | SIPHeaderNames.java | 48 public static final String ALLOW = AllowHeader.NAME; //5 field in interface:SIPHeaderNames
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
H A D | AllowParser.java | 71 headerName(TokenTypes.ALLOW); 74 allow.setHeaderName(SIPHeaderNames.ALLOW);
|
H A D | TokenTypes.java | 58 public static final int ALLOW = START + 21; field in interface:TokenTypes
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
H A D | booleans.py | 34 allows=search([sepolicy.ALLOW],{sepolicy.SOURCE:src,sepolicy.CLASS:tclass, sepolicy.PERMS:perm})
|
H A D | communicate.py | 41 allows=search([sepolicy.ALLOW],{sepolicy.SOURCE:src,sepolicy.CLASS:tclass, sepolicy.PERMS:perm})
|
H A D | network.py | 28 allows=search([sepolicy.ALLOW],{sepolicy.SOURCE:src,sepolicy.CLASS:tclass, sepolicy.PERMS:perm})
|
H A D | transition.py | 29 trans=search([sepolicy.ALLOW],{sepolicy.SOURCE:src})
|
H A D | __init__.py | 32 ALLOW = 'allow' variable 49 valid_types = [ALLOW, AUDITALLOW, NEVERALLOW, DONTAUDIT, TRANSITION, ROLE_ALLOW] 69 allows=search([ALLOW],{SOURCE:src,TARGET:dest,CLASS:tclass,PERMS:perm}) 72 allows=search([ALLOW],{SOURCE:src,CLASS:tclass,PERMS:perm}) 134 permlist = search([ALLOW],{'source':setype, 'permlist':['open', 'write'], 'class':'file'}) 333 permlist = search([ALLOW],{'source':setype }) 350 entrypoints = map(lambda x: x['target'],filter(lambda x: x['source'] == setype, search([ALLOW],{'source':setype, 'permlist':['entrypoint'], 'class':'file'}))) 761 for i in map(lambda x: x['boolean'], filter(lambda x: 'boolean' in x, search([ALLOW],{'source' : setype}))):
|
H A D | manpage.py | 880 entrypoints = map(lambda x: x['target'], sepolicy.search([sepolicy.ALLOW],{'source':self.type, 'permlist':['entrypoint'], 'class':'file'})) 911 permlist = sepolicy.search([sepolicy.ALLOW],{'source':self.type, 'permlist':['open', 'write'], 'class':'file'}) 1118 permlist = sepolicy.search([sepolicy.ALLOW],{'source':self.type,'target':'user_home_type', 'class':'file', 'permlist':['ioctl', 'read', 'getattr', 'execute', 'execute_no_trans', 'open']})
|
/external/chromium-trace/trace-viewer/third_party/Paste/tests/ |
H A D | test_httpheaders.py | 115 ACCEPT_CHARSET, AGE, ALLOW, CACHE_CONTROL, 117 EXPIRES, RANGE, UPGRADE, VARY, ALLOW]
|
/external/mdnsresponder/mDNSShared/ |
H A D | dnsextd_lexer.l | 70 allow return ALLOW;
|
H A D | dnsextd_parser.y | 118 %token ALLOW
|
/external/libvncserver/x11vnc/misc/ |
H A D | connect_switch | 450 if (open(ALLOW, "<$allow_file")) { 451 while (<ALLOW>) { 465 close(ALLOW);
|
/external/guava/guava/src/com/google/common/net/ |
H A D | HttpHeaders.java | 138 public static final String ALLOW = "Allow"; field in class:HttpHeaders
|
/external/selinux/checkpolicy/ |
H A D | policy_scan.l | 137 ALLOW | 138 allow { return(ALLOW); }
|
H A D | policy_parse.y | 125 %token ALLOW 424 cond_allow_def : ALLOW names names ':' names names ';' 464 allow_def : ALLOW names names ':' names names ';' 479 operation_allow_def : ALLOW names names ':' names operations ';' 504 role_allow_def : ALLOW names names ';'
|
/external/jetty/src/java/org/eclipse/jetty/http/ |
H A D | HttpHeaders.java | 48 public final static String ALLOW= "Allow", field in class:HttpHeaders 193 ALLOW_BUFFER=CACHE.add(ALLOW,ALLOW_ORDINAL),
|
/external/selinux/libselinux/src/ |
H A D | audit2why.c | 25 #define ALLOW 0 macro 381 RETURN(ALLOW) 481 PyModule_AddIntConstant(m,"ALLOW", ALLOW);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tnc.c | 21 enum { ALLOW, ISOLATE, NO_ACCESS, NO_RECOMMENDATION } recommendation; enumerator in enum:eap_tnc_data::__anon17287 178 case ALLOW: 370 data->recommendation = ALLOW;
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_tnc.c | 21 enum { ALLOW, ISOLATE, NO_ACCESS, NO_RECOMMENDATION } recommendation; enumerator in enum:eap_tnc_data::__anon17532 178 case ALLOW: 370 data->recommendation = ALLOW;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_tnc.c | 21 enum { ALLOW, ISOLATE, NO_ACCESS, NO_RECOMMENDATION } recommendation; enumerator in enum:eap_tnc_data::__anon17775 178 case ALLOW: 370 data->recommendation = ALLOW;
|
/external/selinux/sepolgen/src/sepolgen/ |
H A D | policygen.py | 163 if av.type == audit2why.ALLOW: 189 for i in map(lambda x: x[TCONTEXT], sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})):
|
H A D | refpolicy.py | 436 allow, dontaudit, and auditallow (indicated by the flags self.ALLOW, 448 ALLOW = 0 variable in class:AVRule 459 self.rule_type = self.ALLOW 464 if self.rule_type == self.ALLOW:
|
/external/selinux/sepolgen/tests/ |
H A D | test_refpolicy.py | 83 self.assertEquals(a.rule_type, a.ALLOW)
|