Searched defs:allowed (Results 1 - 25 of 63) sorted by relevance

123

/external/testng/src/test/java/test/
H A DReturnValueTest.java41 private void runTest(boolean allowed) { argument
48 if (allowed) {
/external/libchrome/base/threading/
H A Dthread_restrictions.cc29 bool ThreadRestrictions::SetIOAllowed(bool allowed) { argument
31 g_io_disallowed.Get().Set(!allowed);
40 "disallows IO! If this thread really should be allowed to "
48 bool ThreadRestrictions::SetSingletonAllowed(bool allowed) { argument
50 g_singleton_disallowed.Get().Set(!allowed);
57 LOG(FATAL) << "LazyInstance/Singleton is not allowed to be used on this "
72 LOG(FATAL) << "Waiting is not allowed to be used on this thread to prevent "
77 bool ThreadRestrictions::SetWaitAllowed(bool allowed) { argument
79 g_wait_disallowed.Get().Set(!allowed);
/external/selinux/libsepol/include/sepol/policydb/
H A Dflask_types.h57 sepol_access_vector_t allowed; member in struct:sepol_av_decision
/external/libchrome/sandbox/linux/syscall_broker/
H A Dbroker_file_permission.cc95 bool allowed = false; local
99 allowed = true;
103 allowed = true;
107 allowed = true;
111 allowed = true;
117 if (allowed && file_to_access) {
123 return allowed;
148 // Check if read is allowed
153 // Check if write is allowed
158 // Check if file creation is allowed
[all...]
/external/openssh/
H A Dreadpass.c174 int allowed = 0; local
188 allowed = 1;
192 return (allowed);
H A Dauth-rsa.c175 int allowed = 0, bits; local
261 /* break out, this key is allowed */
262 allowed = 1;
269 /* return key if allowed */
270 if (allowed && rkey != NULL)
275 return allowed;
280 * return key if login is allowed, NULL otherwise
287 u_int i, allowed = 0; local
291 for (i = 0; !allowed && i < options.num_authkeys_files; i++) {
296 allowed
[all...]
H A Dauth-options.c439 char *command, *allowed; local
500 if ((r = sshbuf_get_cstring(data, &allowed,
509 free(allowed);
514 allowed);
515 free(allowed);
/external/libselinux/include/selinux/
H A Dselinux.h110 access_vector_t allowed; member in struct:av_decision
/external/selinux/libselinux/include/selinux/
H A Dselinux.h129 access_vector_t allowed; member in struct:av_decision
/external/apache-harmony/x-net/src/test/impl/java.injected/org/apache/harmony/xnet/provider/jsse/
H A DSSLEngineImplTest.java95 // with the server not allowed to session creation
887 * of the peers is not allowed to create the session.
889 private void doNoRenegotiationTest(SSLEngine allowed, argument
900 allowed.getSession().getPacketBufferSize();
912 allowed.beginHandshake();
920 while (allowed.getHandshakeStatus().equals(
922 print(result = allowed.wrap(app_data_plain, buffer));
929 System.out.println("\nNot allowed unwraps the message");
1006 print(result = allowed.unwrap(buffer, app_data_plain));
1009 assertEquals("Responce from the peer not allowed t
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dacs.c370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local
374 for (i = 0; i < ARRAY_SIZE(allowed); i++)
375 if (chan->chan == allowed[i])
384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local
387 for (i = 0; i < ARRAY_SIZE(allowed); i++)
388 if (chan->chan == allowed[i])
622 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40",
631 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
H A Ddfs.c95 int *allowed = allowed_40; local
100 allowed = allowed_40;
104 allowed = allowed_80;
108 allowed = allowed_160;
117 if (chan->chan == allowed[i])
/external/wpa_supplicant_8/hostapd/src/common/
H A Dhw_features_common.c91 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 140, local
102 /* Verify that HT40 secondary channel is an allowed 20 MHz
114 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed",
120 * Verify that HT40 primary,secondary channel pair is allowed per
123 * the list of allowed channels (already checked above).
131 for (k = 0; k < ARRAY_SIZE(allowed); k++) {
132 if (first == allowed[k]) {
138 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_das.c39 u8 allowed[] = { local
65 attr = radius_msg_find_unlisted_attr(msg, allowed);
/external/wpa_supplicant_8/src/ap/
H A Dacs.c370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local
374 for (i = 0; i < ARRAY_SIZE(allowed); i++)
375 if (chan->chan == allowed[i])
384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local
387 for (i = 0; i < ARRAY_SIZE(allowed); i++)
388 if (chan->chan == allowed[i])
622 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40",
631 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
H A Ddfs.c95 int *allowed = allowed_40; local
100 allowed = allowed_40;
104 allowed = allowed_80;
108 allowed = allowed_160;
117 if (chan->chan == allowed[i])
/external/wpa_supplicant_8/src/common/
H A Dhw_features_common.c91 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 140, local
102 /* Verify that HT40 secondary channel is an allowed 20 MHz
114 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed",
120 * Verify that HT40 primary,secondary channel pair is allowed per
123 * the list of allowed channels (already checked above).
131 for (k = 0; k < ARRAY_SIZE(allowed); k++) {
132 if (first == allowed[k]) {
138 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
/external/wpa_supplicant_8/src/radius/
H A Dradius_das.c39 u8 allowed[] = { local
65 attr = radius_msg_find_unlisted_attr(msg, allowed);
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dacs.c370 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local
374 for (i = 0; i < ARRAY_SIZE(allowed); i++)
375 if (chan->chan == allowed[i])
384 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local
387 for (i = 0; i < ARRAY_SIZE(allowed); i++)
388 if (chan->chan == allowed[i])
622 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40",
631 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
H A Ddfs.c95 int *allowed = allowed_40; local
100 allowed = allowed_40;
104 allowed = allowed_80;
108 allowed = allowed_160;
117 if (chan->chan == allowed[i])
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dhw_features_common.c91 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 140, local
102 /* Verify that HT40 secondary channel is an allowed 20 MHz
114 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed",
120 * Verify that HT40 primary,secondary channel pair is allowed per
123 * the list of allowed channels (already checked above).
131 for (k = 0; k < ARRAY_SIZE(allowed); k++) {
132 if (first == allowed[k]) {
138 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_das.c39 u8 allowed[] = { local
65 attr = radius_msg_find_unlisted_attr(msg, allowed);
/external/tlsdate/src/
H A Ddbus.c316 dbus_bool_t allowed)
337 if (!dbus_message_iter_append_basic (&args, DBUS_TYPE_BOOLEAN, &allowed))
314 send_can_reply(DBusConnection *connection, DBusMessage *message, dbus_bool_t allowed) argument
/external/v8/test/cctest/
H A Dtest-utils-arm64.cc214 int reg_size, int reg_count, RegList allowed) {
218 if (((1UL << n) & allowed) != 0) {
219 // Only assign allowed registers.
241 int reg_size, int reg_count, RegList allowed) {
245 if (((1UL << n) & allowed) != 0) {
246 // Only assigned allowed registers.
213 PopulateRegisterArray(Register* w, Register* x, Register* r, int reg_size, int reg_count, RegList allowed) argument
240 PopulateFPRegisterArray(FPRegister* s, FPRegister* d, FPRegister* v, int reg_size, int reg_count, RegList allowed) argument
/external/vixl/test/
H A Dtest-utils-a64.cc246 int reg_size, int reg_count, RegList allowed) {
250 if (((UINT64_C(1) << n) & allowed) != 0) {
251 // Only assign allowed registers.
273 int reg_size, int reg_count, RegList allowed) {
277 if (((UINT64_C(1) << n) & allowed) != 0) {
278 // Only assigned allowed registers.
245 PopulateRegisterArray(Register* w, Register* x, Register* r, int reg_size, int reg_count, RegList allowed) argument
272 PopulateFPRegisterArray(FPRegister* s, FPRegister* d, FPRegister* v, int reg_size, int reg_count, RegList allowed) argument

Completed in 3459 milliseconds

123