/external/testng/src/test/java/test/ |
H A D | ReturnValueTest.java | 41 private void runTest(boolean allowed) { argument 48 if (allowed) {
|
/external/libchrome/base/threading/ |
H A D | thread_restrictions.cc | 29 bool ThreadRestrictions::SetIOAllowed(bool allowed) { argument 31 g_io_disallowed.Get().Set(!allowed); 40 "disallows IO! If this thread really should be allowed to " 48 bool ThreadRestrictions::SetSingletonAllowed(bool allowed) { argument 50 g_singleton_disallowed.Get().Set(!allowed); 57 LOG(FATAL) << "LazyInstance/Singleton is not allowed to be used on this " 72 LOG(FATAL) << "Waiting is not allowed to be used on this thread to prevent " 77 bool ThreadRestrictions::SetWaitAllowed(bool allowed) { argument 79 g_wait_disallowed.Get().Set(!allowed);
|
/external/selinux/libsepol/include/sepol/policydb/ |
H A D | flask_types.h | 57 sepol_access_vector_t allowed; member in struct:sepol_av_decision
|
/external/libchrome/sandbox/linux/syscall_broker/ |
H A D | broker_file_permission.cc | 95 bool allowed = false; local 99 allowed = true; 103 allowed = true; 107 allowed = true; 111 allowed = true; 117 if (allowed && file_to_access) { 123 return allowed; 148 // Check if read is allowed 153 // Check if write is allowed 158 // Check if file creation is allowed [all...] |
/external/openssh/ |
H A D | readpass.c | 174 int allowed = 0; local 188 allowed = 1; 192 return (allowed);
|
H A D | auth-rsa.c | 175 int allowed = 0, bits; local 261 /* break out, this key is allowed */ 262 allowed = 1; 269 /* return key if allowed */ 270 if (allowed && rkey != NULL) 275 return allowed; 280 * return key if login is allowed, NULL otherwise 287 u_int i, allowed = 0; local 291 for (i = 0; !allowed && i < options.num_authkeys_files; i++) { 296 allowed [all...] |
H A D | auth-options.c | 439 char *command, *allowed; local 500 if ((r = sshbuf_get_cstring(data, &allowed, 509 free(allowed); 514 allowed); 515 free(allowed);
|
/external/libselinux/include/selinux/ |
H A D | selinux.h | 110 access_vector_t allowed; member in struct:av_decision
|
/external/selinux/libselinux/include/selinux/ |
H A D | selinux.h | 129 access_vector_t allowed; member in struct:av_decision
|
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/ |
H A D | SSLEngineImplTest.java | 95 // with the server not allowed to session creation 887 * of the peers is not allowed to create the session. 889 private void doNoRenegotiationTest(SSLEngine allowed, argument 900 allowed.getSession().getPacketBufferSize(); 912 allowed.beginHandshake(); 920 while (allowed.getHandshakeStatus().equals( 922 print(result = allowed.wrap(app_data_plain, buffer)); 929 System.out.println("\nNot allowed unwraps the message"); 1006 print(result = allowed.unwrap(buffer, app_data_plain)); 1009 assertEquals("Responce from the peer not allowed t [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | acs.c | 370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local 374 for (i = 0; i < ARRAY_SIZE(allowed); i++) 375 if (chan->chan == allowed[i]) 384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local 387 for (i = 0; i < ARRAY_SIZE(allowed); i++) 388 if (chan->chan == allowed[i]) 622 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 631 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
|
H A D | dfs.c | 95 int *allowed = allowed_40; local 100 allowed = allowed_40; 104 allowed = allowed_80; 108 allowed = allowed_160; 117 if (chan->chan == allowed[i])
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | hw_features_common.c | 91 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 140, local 102 /* Verify that HT40 secondary channel is an allowed 20 MHz 114 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 120 * Verify that HT40 primary,secondary channel pair is allowed per 123 * the list of allowed channels (already checked above). 131 for (k = 0; k < ARRAY_SIZE(allowed); k++) { 132 if (first == allowed[k]) { 138 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_das.c | 39 u8 allowed[] = { local 65 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | acs.c | 370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local 374 for (i = 0; i < ARRAY_SIZE(allowed); i++) 375 if (chan->chan == allowed[i]) 384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local 387 for (i = 0; i < ARRAY_SIZE(allowed); i++) 388 if (chan->chan == allowed[i]) 622 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 631 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
|
H A D | dfs.c | 95 int *allowed = allowed_40; local 100 allowed = allowed_40; 104 allowed = allowed_80; 108 allowed = allowed_160; 117 if (chan->chan == allowed[i])
|
/external/wpa_supplicant_8/src/common/ |
H A D | hw_features_common.c | 91 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 140, local 102 /* Verify that HT40 secondary channel is an allowed 20 MHz 114 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 120 * Verify that HT40 primary,secondary channel pair is allowed per 123 * the list of allowed channels (already checked above). 131 for (k = 0; k < ARRAY_SIZE(allowed); k++) { 132 if (first == allowed[k]) { 138 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_das.c | 39 u8 allowed[] = { local 65 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | acs.c | 370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local 374 for (i = 0; i < ARRAY_SIZE(allowed); i++) 375 if (chan->chan == allowed[i]) 384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local 387 for (i = 0; i < ARRAY_SIZE(allowed); i++) 388 if (chan->chan == allowed[i]) 622 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40", 631 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
|
H A D | dfs.c | 95 int *allowed = allowed_40; local 100 allowed = allowed_40; 104 allowed = allowed_80; 108 allowed = allowed_160; 117 if (chan->chan == allowed[i])
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | hw_features_common.c | 91 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 140, local 102 /* Verify that HT40 secondary channel is an allowed 20 MHz 114 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 120 * Verify that HT40 primary,secondary channel pair is allowed per 123 * the list of allowed channels (already checked above). 131 for (k = 0; k < ARRAY_SIZE(allowed); k++) { 132 if (first == allowed[k]) { 138 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_das.c | 39 u8 allowed[] = { local 65 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
/external/tlsdate/src/ |
H A D | dbus.c | 316 dbus_bool_t allowed) 337 if (!dbus_message_iter_append_basic (&args, DBUS_TYPE_BOOLEAN, &allowed)) 314 send_can_reply(DBusConnection *connection, DBusMessage *message, dbus_bool_t allowed) argument
|
/external/v8/test/cctest/ |
H A D | test-utils-arm64.cc | 214 int reg_size, int reg_count, RegList allowed) { 218 if (((1UL << n) & allowed) != 0) { 219 // Only assign allowed registers. 241 int reg_size, int reg_count, RegList allowed) { 245 if (((1UL << n) & allowed) != 0) { 246 // Only assigned allowed registers. 213 PopulateRegisterArray(Register* w, Register* x, Register* r, int reg_size, int reg_count, RegList allowed) argument 240 PopulateFPRegisterArray(FPRegister* s, FPRegister* d, FPRegister* v, int reg_size, int reg_count, RegList allowed) argument
|
/external/vixl/test/ |
H A D | test-utils-a64.cc | 246 int reg_size, int reg_count, RegList allowed) { 250 if (((UINT64_C(1) << n) & allowed) != 0) { 251 // Only assign allowed registers. 273 int reg_size, int reg_count, RegList allowed) { 277 if (((UINT64_C(1) << n) & allowed) != 0) { 278 // Only assigned allowed registers. 245 PopulateRegisterArray(Register* w, Register* x, Register* r, int reg_size, int reg_count, RegList allowed) argument 272 PopulateFPRegisterArray(FPRegister* s, FPRegister* d, FPRegister* v, int reg_size, int reg_count, RegList allowed) argument
|