Searched refs:allow (Results 1 - 25 of 209) sorted by relevance

123456789

/external/wpa_supplicant_8/wpa_supplicant/dbus/
H A Ddbus-wpa_supplicant.conf6 <allow own="fi.epitest.hostap.WPASupplicant"/>
8 <allow send_destination="fi.epitest.hostap.WPASupplicant"/>
9 <allow send_interface="fi.epitest.hostap.WPASupplicant"/>
11 <allow own="fi.w1.wpa_supplicant1"/>
13 <allow send_destination="fi.w1.wpa_supplicant1"/>
14 <allow send_interface="fi.w1.wpa_supplicant1"/>
15 <allow receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
/external/dhcpcd-6.8.2/dbus/
H A Ddhcpcd-dbus.conf6 <allow own="org.chromium.dhcpcd"/>
7 <allow send_interface="org.chromium.dhcpcd" />
8 <allow send_destination="org.chromium.dhcpcd" />
11 <allow own="org.chromium.dhcpcd"/>
12 <allow send_interface="org.chromium.dhcpcd" />
13 <allow send_destination="org.chromium.dhcpcd" />
17 <allow send_interface="org.chromium.dhcpcd" />
18 <allow send_interface="org.freedesktop.DBus.Introspectable" />
19 <allow send_destination="org.chromium.dhcpcd" />
/external/selinux/libsepol/tests/policies/test-deps/
H A Dmodreq-role-global.conf12 allow role_req_r user_r;
H A Dmodreq-bool-global.conf14 allow a_t b_t : file { read write };
H A Dmodreq-obj-global.conf12 allow mod_foo_t mod_bar_t : sem { create destroy };
H A Dmodreq-perm-global.conf10 allow a_t b_t: msg { send receive };
H A Dmodreq-role-opt.conf16 allow role_req_r user_r;
H A Dmodreq-type-global.conf12 allow test_t type_req_t : file { read write };
H A Dmodreq-type-opt.conf15 allow type_req_t file_t : file { read write };
H A Dmodule.conf15 allow system_t file_t : file { read write };
19 allow sysadm_t file_t : file { read write };
H A Dmodreq-bool-opt.conf20 allow a_t b_t : file { read write };
H A Dmodreq-obj-opt.conf19 allow mod_foo_t mod_bar_t : sem { create destroy };
H A Dmodreq-perm-opt.conf17 allow a_mod_t b_mod_t: msg { send receive };
/external/dnsmasq/dbus/
H A Ddnsmasq.conf6 <allow own="uk.org.thekelleys.dnsmasq"/>
7 <allow send_destination="uk.org.thekelleys.dnsmasq"/>
/external/nist-sip/java/gov/nist/javax/sip/parser/
H A DAllowParser.java45 * @param allow the header to parse
47 public AllowParser(String allow) { argument
48 super(allow);
73 Allow allow = new Allow();
74 allow.setHeaderName(SIPHeaderNames.ALLOW);
79 allow.setMethod(token.getTokenValue());
81 list.add(allow);
87 allow = new Allow();
90 allow.setMethod(token.getTokenValue());
92 list.add(allow);
[all...]
/external/selinux/libsepol/tests/policies/test-cond/
H A Drefpolicy-base.conf977 allow bin_t fs_t:filesystem associate;
978 allow bin_t noxattrfs:filesystem associate;
980 allow sbin_t fs_t:filesystem associate;
981 allow sbin_t noxattrfs:filesystem associate;
983 allow ls_exec_t fs_t:filesystem associate;
984 allow ls_exec_t noxattrfs:filesystem associate;
987 allow shell_exec_t fs_t:filesystem associate;
988 allow shell_exec_t noxattrfs:filesystem associate;
990 allow chroot_exec_t fs_t:filesystem associate;
991 allow chroot_exec_
[all...]
/external/selinux/libsepol/tests/policies/test-hooks/
H A Dmodule_add_role_allow_trans.conf13 allow role_a_1 role_a_2;
/external/selinux/dbus/
H A Dorg.selinux.conf10 <allow own="org.selinux"/>
16 <allow send_destination="org.selinux"/>
19 <allow send_destination="org.selinux"
/external/selinux/libsepol/cil/test/integration_testing/
H A Dnonmls.conf56 allow typea_t typeb_t : testing write;
57 allow typea_t typeb_t : testing {open close};
65 allow rolea_r roleb_r;
69 #allow system {guest local_user};
70 #allow local_user guest;
/external/ltp/testcases/commands/at/
H A Dat_allow0121 # FILE: /etc/at.allow
23 # PURPOSE: Test that /etc/at.allow , only allows those in the file to
34 allow="/etc/at.allow"
53 mv "${allow}" "${allow}.old" >/dev/null 2>&1
100 rm "${allow}"
101 mv "${allow}.old" "${allow}" >/dev/null 2>&1
114 echo "TEST: $allow shoul
[all...]
/external/nist-sip/java/gov/nist/javax/sip/header/
H A DAllowList.java108 Allow allow = new Allow();
109 allow.setMethod((String) it.next());
110 this.add(allow);
/external/robolectric/v1/src/main/java/android/webkit/
H A DTestWebSettings.java43 public void setAllowFileAccessFromFileURLs(boolean allow) { argument
44 allowFileAccessFromFile = allow;
48 public void setAllowUniversalAccessFromFileURLs(boolean allow) { argument
49 allowUniversalAccessFromFile = allow;
58 public void setAllowFileAccess(boolean allow) { argument
59 allowFileAccess = allow;
/external/v8/src/
H A Dassert-scope.h53 template <PerIsolateAssertType type, bool allow>
71 template <PerThreadAssertType type, bool allow>
74 PerThreadAssertScope<type, allow> {
83 template <PerIsolateAssertType type, bool allow>
86 PerIsolateAssertScope<type, allow> {
89 : PerIsolateAssertScope<type, allow>(isolate) { }
/external/icu/android_icu4j/src/main/java/android/icu/impl/duration/
H A DPeriodBuilderFactory.java61 PeriodBuilderFactory setAllowZero(boolean allow); argument
72 * when milliseconds are an available field. The default is to allow
78 * @param allow whether milliseconds should be allowed.
81 PeriodBuilderFactory setAllowMilliseconds(boolean allow); argument
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/impl/duration/
H A DPeriodBuilderFactory.java59 PeriodBuilderFactory setAllowZero(boolean allow); argument
70 * when milliseconds are an available field. The default is to allow
76 * @param allow whether milliseconds should be allowed.
79 PeriodBuilderFactory setAllowMilliseconds(boolean allow); argument

Completed in 448 milliseconds

123456789