Searched refs:allowed (Results 1 - 25 of 115) sorted by relevance

12345

/external/clang/test/Preprocessor/
H A Dwarning_tests.c38 #error Alias expansion not allowed
H A Dfeature_tests.c45 #error Alias expansion not allowed
/external/selinux/libsepol/include/sepol/policydb/
H A Dflask_types.h57 sepol_access_vector_t allowed; member in struct:sepol_av_decision
/external/llvm/test/MC/ARM/
H A Darm-qualifier-diagnostics.s9 @ CHECK: error: instruction with .n (narrow) qualifier not allowed in arm mode
H A Ddirective-arch_extension-sec.s13 @ CHECK-V6: error: architectural extension 'sec' is not allowed for the current base architecture
23 @ CHECK-V6: error: architectural extension 'sec' is not allowed for the current base architecture
H A Ddirective-arch_extension-idiv.s17 @ CHECK-V6: error: architectural extension 'idiv' is not allowed for the current base architecture
20 @ CHECK-V7M: error: architectural extension 'idiv' is not allowed for the current base architecture
34 @ CHECK-V6: error: architectural extension 'idiv' is not allowed for the current base architecture
37 @ CHECK-V7M: error: architectural extension 'idiv' is not allowed for the current base architecture
H A Ddirective-arch_extension-crc.s11 @ CHECK-V7: error: architectural extension 'crc' is not allowed for the current base architecture
32 @ CHECK-V7: error: architectural extension 'crc' is not allowed for the current base architecture
H A Ddirective-arch_extension-mp.s17 @ CHECK-V6: error: architectural extension 'mp' is not allowed for the current base architecture
28 @ CHECK-V6: error: architectural extension 'mp' is not allowed for the current base architecture
/external/openssh/
H A Dauth-rsa.c175 int allowed = 0, bits; local
261 /* break out, this key is allowed */
262 allowed = 1;
269 /* return key if allowed */
270 if (allowed && rkey != NULL)
275 return allowed;
280 * return key if login is allowed, NULL otherwise
287 u_int i, allowed = 0; local
291 for (i = 0; !allowed && i < options.num_authkeys_files; i++) {
296 allowed
[all...]
H A Dreadpass.c174 int allowed = 0; local
188 allowed = 1;
192 return (allowed);
H A Dauth-options.c434 char *command, *allowed; local
495 if ((r = sshbuf_get_cstring(data, &allowed,
504 free(allowed);
509 allowed);
510 free(allowed);
/external/selinux/libselinux/src/
H A Dcompute_av.c54 &avd->allowed, &avd->decided,
89 avd->allowed = lavd.allowed;
143 avd->allowed = lavd.allowed;
H A DcheckAccess.c84 if ((retval == 0) && ((requested & avd.allowed) == requested)) {
H A Dmapping.c191 if (avd->allowed & current_mapping[tclass].perms[i])
193 avd->allowed = result;
/external/selinux/libselinux/utils/
H A Dcompute_av.c32 printf("allowed=");
33 print_access_vector(tclass, avd.allowed);
/external/valgrind/drd/tests/
H A Dtrylock.stderr.exp8 Attempt to lock for writing recursively (not allowed).
9 Recursive writer locking not allowed: rwlock 0x.........
/external/apache-harmony/crypto/src/test/impl/java/org/apache/harmony/crypto/tests/javax/crypto/
H A DEncryptedPrivateKeyInfo_ImplTest.java64 } catch (NoSuchAlgorithmException allowed) {
/external/libselinux/src/
H A Dcompute_av.c54 &avd->allowed, &avd->decided,
H A Dmapping.c191 if (avd->allowed & current_mapping[tclass].perms[i])
193 avd->allowed = result;
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dacs.c370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local
374 for (i = 0; i < ARRAY_SIZE(allowed); i++)
375 if (chan->chan == allowed[i])
384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local
387 for (i = 0; i < ARRAY_SIZE(allowed); i++)
388 if (chan->chan == allowed[i])
623 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40",
632 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
/external/wpa_supplicant_8/src/ap/
H A Dacs.c370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local
374 for (i = 0; i < ARRAY_SIZE(allowed); i++)
375 if (chan->chan == allowed[i])
384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local
387 for (i = 0; i < ARRAY_SIZE(allowed); i++)
388 if (chan->chan == allowed[i])
623 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40",
632 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dacs.c370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local
374 for (i = 0; i < ARRAY_SIZE(allowed); i++)
375 if (chan->chan == allowed[i])
384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local
387 for (i = 0; i < ARRAY_SIZE(allowed); i++)
388 if (chan->chan == allowed[i])
623 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40",
632 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
/external/v8/test/cctest/
H A Dtest-utils-arm64.h196 // Populate the w, x and r arrays with registers from the 'allowed' mask. The
207 int reg_size, int reg_count, RegList allowed);
211 int reg_size, int reg_count, RegList allowed);
/external/vixl/test/
H A Dtest-utils-a64.h218 // Populate the w, x and r arrays with registers from the 'allowed' mask. The
229 int reg_size, int reg_count, RegList allowed);
233 int reg_size, int reg_count, RegList allowed);
/external/bison/src/
H A Dreader.c292 is allowed to shoot herself in the foot.
434 complain_at (loc, _("only one %s allowed per rule"), "%prec");
448 complain_at (loc, _("only one %s allowed per rule"), "%dprec");
461 complain_at (loc, _("only one %s allowed per rule"), "%merge");

Completed in 562 milliseconds

12345