/external/clang/test/Preprocessor/ |
H A D | warning_tests.c | 38 #error Alias expansion not allowed
|
H A D | feature_tests.c | 45 #error Alias expansion not allowed
|
/external/selinux/libsepol/include/sepol/policydb/ |
H A D | flask_types.h | 57 sepol_access_vector_t allowed; member in struct:sepol_av_decision
|
/external/llvm/test/MC/ARM/ |
H A D | arm-qualifier-diagnostics.s | 9 @ CHECK: error: instruction with .n (narrow) qualifier not allowed in arm mode
|
H A D | directive-arch_extension-sec.s | 13 @ CHECK-V6: error: architectural extension 'sec' is not allowed for the current base architecture 23 @ CHECK-V6: error: architectural extension 'sec' is not allowed for the current base architecture
|
H A D | directive-arch_extension-idiv.s | 17 @ CHECK-V6: error: architectural extension 'idiv' is not allowed for the current base architecture 20 @ CHECK-V7M: error: architectural extension 'idiv' is not allowed for the current base architecture 34 @ CHECK-V6: error: architectural extension 'idiv' is not allowed for the current base architecture 37 @ CHECK-V7M: error: architectural extension 'idiv' is not allowed for the current base architecture
|
H A D | directive-arch_extension-crc.s | 11 @ CHECK-V7: error: architectural extension 'crc' is not allowed for the current base architecture 32 @ CHECK-V7: error: architectural extension 'crc' is not allowed for the current base architecture
|
H A D | directive-arch_extension-mp.s | 17 @ CHECK-V6: error: architectural extension 'mp' is not allowed for the current base architecture 28 @ CHECK-V6: error: architectural extension 'mp' is not allowed for the current base architecture
|
/external/openssh/ |
H A D | auth-rsa.c | 175 int allowed = 0, bits; local 261 /* break out, this key is allowed */ 262 allowed = 1; 269 /* return key if allowed */ 270 if (allowed && rkey != NULL) 275 return allowed; 280 * return key if login is allowed, NULL otherwise 287 u_int i, allowed = 0; local 291 for (i = 0; !allowed && i < options.num_authkeys_files; i++) { 296 allowed [all...] |
H A D | readpass.c | 174 int allowed = 0; local 188 allowed = 1; 192 return (allowed);
|
H A D | auth-options.c | 434 char *command, *allowed; local 495 if ((r = sshbuf_get_cstring(data, &allowed, 504 free(allowed); 509 allowed); 510 free(allowed);
|
/external/selinux/libselinux/src/ |
H A D | compute_av.c | 54 &avd->allowed, &avd->decided, 89 avd->allowed = lavd.allowed; 143 avd->allowed = lavd.allowed;
|
H A D | checkAccess.c | 84 if ((retval == 0) && ((requested & avd.allowed) == requested)) {
|
H A D | mapping.c | 191 if (avd->allowed & current_mapping[tclass].perms[i]) 193 avd->allowed = result;
|
/external/selinux/libselinux/utils/ |
H A D | compute_av.c | 32 printf("allowed="); 33 print_access_vector(tclass, avd.allowed);
|
/external/valgrind/drd/tests/ |
H A D | trylock.stderr.exp | 8 Attempt to lock for writing recursively (not allowed). 9 Recursive writer locking not allowed: rwlock 0x.........
|
/external/apache-harmony/crypto/src/test/impl/java/org/apache/harmony/crypto/tests/javax/crypto/ |
H A D | EncryptedPrivateKeyInfo_ImplTest.java | 64 } catch (NoSuchAlgorithmException allowed) {
|
/external/libselinux/src/ |
H A D | compute_av.c | 54 &avd->allowed, &avd->decided,
|
H A D | mapping.c | 191 if (avd->allowed & current_mapping[tclass].perms[i]) 193 avd->allowed = result;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | acs.c | 370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local 374 for (i = 0; i < ARRAY_SIZE(allowed); i++) 375 if (chan->chan == allowed[i]) 384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local 387 for (i = 0; i < ARRAY_SIZE(allowed); i++) 388 if (chan->chan == allowed[i]) 623 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 632 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
|
/external/wpa_supplicant_8/src/ap/ |
H A D | acs.c | 370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local 374 for (i = 0; i < ARRAY_SIZE(allowed); i++) 375 if (chan->chan == allowed[i]) 384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local 387 for (i = 0; i < ARRAY_SIZE(allowed); i++) 388 if (chan->chan == allowed[i]) 623 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 632 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | acs.c | 370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local 374 for (i = 0; i < ARRAY_SIZE(allowed); i++) 375 if (chan->chan == allowed[i]) 384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local 387 for (i = 0; i < ARRAY_SIZE(allowed); i++) 388 if (chan->chan == allowed[i]) 623 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 632 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
|
/external/v8/test/cctest/ |
H A D | test-utils-arm64.h | 196 // Populate the w, x and r arrays with registers from the 'allowed' mask. The 207 int reg_size, int reg_count, RegList allowed); 211 int reg_size, int reg_count, RegList allowed);
|
/external/vixl/test/ |
H A D | test-utils-a64.h | 218 // Populate the w, x and r arrays with registers from the 'allowed' mask. The 229 int reg_size, int reg_count, RegList allowed); 233 int reg_size, int reg_count, RegList allowed);
|
/external/bison/src/ |
H A D | reader.c | 292 is allowed to shoot herself in the foot. 434 complain_at (loc, _("only one %s allowed per rule"), "%prec"); 448 complain_at (loc, _("only one %s allowed per rule"), "%dprec"); 461 complain_at (loc, _("only one %s allowed per rule"), "%merge");
|