OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:allow
(Results
1 - 25
of
4259
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
capability.h
137
/*
Allow
modification of S_IMMUTABLE and S_APPEND file attributes */
146
/*
Allow
broadcasting, listen to multicast */
150
/*
Allow
interface configuration */
151
/*
Allow
administration of IP firewall, masquerading and accounting */
152
/*
Allow
setting debug option on sockets */
153
/*
Allow
modification of routing tables */
154
/*
Allow
setting arbitrary process / process group ownership on
156
/*
Allow
binding to any address for transparent proxying */
157
/*
Allow
setting TOS (type of service) */
158
/*
Allow
setting promiscuous mode *
[
all
...]
/system/core/rootdir/etc/
dbus.conf
8
<!-- Only
allow
socket-credentials-based authentication -->
17
<!--
Allow
everything, D-Bus socket is protected by unix filesystem
20
<
allow
send_interface="*"/>
21
<
allow
receive_interface="*"/>
22
<
allow
own="*"/>
23
<
allow
user="*"/>
24
<
allow
send_requested_reply="true"/>
25
<
allow
receive_requested_reply="true"/>
/external/bluetooth/bluez/src/
bluetooth.conf
11
<
allow
own="org.bluez"/>
12
<
allow
send_destination="org.bluez"/>
13
<
allow
send_interface="org.bluez.Agent"/>
14
<
allow
send_interface="org.bluez.HandsfreeAgent"/>
18
<
allow
send_destination="org.bluez"/>
21
<!--
allow
users of lp group (printing subsystem) to
24
<
allow
send_destination="org.bluez"/>
hcid.conf
19
# multi -
Allow
pairing with already paired devices
52
# rswitch -
allow
role switch
53
# hold -
allow
hold mode
54
# sniff -
allow
sniff mode
55
# park -
allow
park mode
/external/kernel-headers/original/linux/
capability.h
136
/*
Allow
modification of S_IMMUTABLE and S_APPEND file attributes */
145
/*
Allow
broadcasting, listen to multicast */
149
/*
Allow
interface configuration */
150
/*
Allow
administration of IP firewall, masquerading and accounting */
151
/*
Allow
setting debug option on sockets */
152
/*
Allow
modification of routing tables */
153
/*
Allow
setting arbitrary process / process group ownership on
155
/*
Allow
binding to any address for transparent proxying */
156
/*
Allow
setting TOS (type of service) */
157
/*
Allow
setting promiscuous mode *
[
all
...]
/external/dbus/test/data/valid-config-files/
debug-allow-all-sha1.conf
11
<
allow
send_interface="*"/>
12
<
allow
receive_interface="*"/>
13
<
allow
own="*"/>
14
<
allow
user="*"/>
debug-allow-all-sha1.conf.in
11
<
allow
send_interface="*"/>
12
<
allow
receive_interface="*"/>
13
<
allow
own="*"/>
14
<
allow
user="*"/>
debug-allow-all.conf
10
<
allow
send_interface="*"/>
11
<
allow
receive_interface="*"/>
12
<
allow
own="*"/>
13
<
allow
user="*"/>
debug-allow-all.conf.in
10
<
allow
send_interface="*"/>
11
<
allow
receive_interface="*"/>
12
<
allow
own="*"/>
13
<
allow
user="*"/>
session.conf
16
<!--
Allow
everything to be sent -->
17
<
allow
send_destination="*"/>
18
<!--
Allow
everything to be received -->
19
<
allow
eavesdrop="true"/>
20
<!--
Allow
anyone to own anything -->
21
<
allow
own="*"/>
many-rules.conf
12
<
allow
user="*"/>
21
<
allow
send_type="error"/>
22
<
allow
send_type="method_call"/>
23
<
allow
send_type="method_return"/>
24
<
allow
send_type="signal"/>
30
<
allow
user="*"/>
39
<
allow
send_type="error"/>
40
<
allow
send_type="method_call"/>
41
<
allow
send_type="method_return"/>
42
<
allow
send_type="signal"/
[
all
...]
system.conf
26
<!-- Only
allow
socket-credentials-based authentication -->
40
<!-- But
allow
all users to connect -->
41
<
allow
user="*"/>
42
<!--
Allow
anyone to talk to the message bus -->
43
<!-- FIXME I think currently these
allow
rules are always implicit
45
<
allow
send_destination="org.freedesktop.DBus"/>
46
<
allow
receive_sender="org.freedesktop.DBus"/>
48
<
allow
send_requested_reply="true"/>
49
<
allow
receive_requested_reply="true"/>
/external/nist-sip/java/gov/nist/javax/sip/header/
AllowList.java
36
* List of
ALLOW
headers. The sip message can have multiple
Allow
headers
43
public class AllowList extends SIPHeaderList<
Allow
> {
62
super(
Allow
.class, AllowHeader.NAME);
68
* Iterator if no methods are defined in this
Allow
Header.
82
for ( Iterator<
Allow
> it = this.hlist.iterator(); it.hasNext();) {
83
Allow
a = (
Allow
)it.next();
108
Allow
allow
= new Allow()
local
[
all
...]
/external/wpa_supplicant/
dbus-wpa_supplicant.conf
6
<
allow
own="fi.epitest.hostap.WPASupplicant"/>
8
<
allow
send_destination="fi.epitest.hostap.WPASupplicant"/>
9
<
allow
send_interface="fi.epitest.hostap.WPASupplicant"/>
/external/wpa_supplicant_6/wpa_supplicant/
dbus-wpa_supplicant.conf
6
<
allow
own="fi.epitest.hostap.WPASupplicant"/>
8
<
allow
send_destination="fi.epitest.hostap.WPASupplicant"/>
9
<
allow
send_interface="fi.epitest.hostap.WPASupplicant"/>
/dalvik/tests/076-boolean-put/
info.txt
3
verifier had to be "loosened" to
allow
this case.
/external/dbus/test/data/valid-config-files/system.d/
test.conf
11
<
allow
own="org.foo.FooService"/>
12
<
allow
send_interface="org.foo.FooBroadcastInterface"/>
15
<!--
Allow
any connection to receive the message, but
18
<
allow
receive_interface="org.foo.FooBroadcastInterface" receive_sender="org.foo.FooService"/>
/external/nist-sip/java/javax/sip/header/
AllowEventsHeader.java
6
String NAME = "
Allow
-Events";
AllowHeader.java
6
String NAME = "
Allow
";
/external/dnsmasq/dbus/
dnsmasq.conf
6
<
allow
own="uk.org.thekelleys.dnsmasq"/>
7
<
allow
send_destination="uk.org.thekelleys.dnsmasq"/>
/external/dbus/bus/
session.conf.in
16
<!--
Allow
everything to be sent -->
17
<
allow
send_destination="*"/>
18
<!--
Allow
everything to be received -->
19
<
allow
eavesdrop="true"/>
20
<!--
Allow
anyone to own anything -->
21
<
allow
own="*"/>
system.conf.in
26
<!-- Only
allow
socket-credentials-based authentication -->
40
<!-- But
allow
all users to connect -->
41
<
allow
user="*"/>
42
<!--
Allow
anyone to talk to the message bus -->
43
<!-- FIXME I think currently these
allow
rules are always implicit
45
<
allow
send_destination="org.freedesktop.DBus"/>
46
<
allow
receive_sender="org.freedesktop.DBus"/>
48
<
allow
send_requested_reply="true"/>
49
<
allow
receive_requested_reply="true"/>
/external/dbus/test/name-test/
run-with-tmp-session-bus.conf
16
<!--
Allow
everything to be sent -->
17
<
allow
send_destination="*"/>
18
<!--
Allow
everything to be received -->
19
<
allow
eavesdrop="true"/>
20
<!--
Allow
anyone to own anything -->
21
<
allow
own="*"/>
/external/dbus/doc/
busconfig.dtd
29
<!ELEMENT policy (
allow
|deny)*>
36
<!ELEMENT
allow
EMPTY>
37
<!ATTLIST
allow
/external/bouncycastle/src/main/java/org/bouncycastle/jce/interfaces/
PKCS12BagAttributeCarrier.java
9
*
allow
us to set attributes on objects that can go into a PKCS12 store.
Completed in 304 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>