/external/dbus/test/data/valid-config-files/ |
many-rules.conf | 13 <deny send_interface="org.freedesktop.System" send_member="Reboot"/> 14 <deny receive_interface="org.freedesktop.System" receive_member="Reboot"/> 15 <deny send_path="/foo/bar/SystemObjectThing" send_member="Reboot"/> 16 <deny own="org.freedesktop.System"/> 17 <deny send_destination="org.freedesktop.System"/> 18 <deny receive_sender="org.freedesktop.System"/> 19 <deny user="root"/> 20 <deny group="root"/> 25 <deny send_destination="org.freedesktop.Bar" send_interface="org.freedesktop.Foo"/> 26 <deny send_destination="org.freedesktop.Bar" send_interface="org.freedesktop.Foo" send_type="method_call (…) [all...] |
system.conf | 36 <!-- Deny everything then punch holes --> 37 <deny send_interface="*"/> 38 <deny receive_interface="*"/> 39 <deny own="*"/>
|
/external/wpa_supplicant/ |
dbus-wpa_supplicant.conf | 12 <deny own="fi.epitest.hostap.WPASupplicant"/> 13 <deny send_destination="fi.epitest.hostap.WPASupplicant"/> 14 <deny send_interface="fi.epitest.hostap.WPASupplicant"/>
|
/external/wpa_supplicant_6/wpa_supplicant/ |
dbus-wpa_supplicant.conf | 12 <deny own="fi.epitest.hostap.WPASupplicant"/> 13 <deny send_destination="fi.epitest.hostap.WPASupplicant"/> 14 <deny send_interface="fi.epitest.hostap.WPASupplicant"/>
|
/external/dnsmasq/dbus/ |
dnsmasq.conf | 10 <deny own="uk.org.thekelleys.dnsmasq"/> 11 <deny send_destination="uk.org.thekelleys.dnsmasq"/>
|
/external/dbus/doc/ |
busconfig.dtd | 29 <!ELEMENT policy (allow|deny)*> 45 <!ELEMENT deny EMPTY> 46 <!ATTLIST deny
|
/external/qemu/ |
acl.c | 61 /* Deny by default, so there is no window of "open 84 return entry->deny ? 0 : 1; 89 return entry->deny ? 0 : 1; 101 /* Put back to deny by default, so there is no window 115 int deny, 122 entry->deny = deny; 132 int deny, 143 return qemu_acl_append(acl, deny, match); 148 entry->deny = deny [all...] |
acl.h | 35 int deny; member in struct:qemu_acl_entry 57 int deny, 60 int deny,
|
/external/dbus/bus/ |
system.conf.in | 36 <!-- Deny everything then punch holes --> 37 <deny send_interface="*"/> 38 <deny receive_interface="*"/> 39 <deny own="*"/>
|
dbus-daemon.1 | 333 <allow> and <deny> elements. Policies are normally used with the systemwide bus; 364 .I "<deny>" 368 A <deny> element appears below a <policy> element and prohibits some 369 action. The <allow> element makes an exception to previous <deny> 370 statements, and works just like <deny> but with the inverse meaning. 402 <deny send_interface="org.freedesktop.System" send_member="Reboot"/> 403 <deny receive_interface="org.freedesktop.System" receive_member="Reboot"/> 404 <deny own="org.freedesktop.System"/> 405 <deny send_destination="org.freedesktop.System"/> 406 <deny receive_sender="org.freedesktop.System"/ [all...] |
dbus-daemon.1.in | 333 <allow> and <deny> elements. Policies are normally used with the systemwide bus; 364 .I "<deny>" 368 A <deny> element appears below a <policy> element and prohibits some 369 action. The <allow> element makes an exception to previous <deny> 370 statements, and works just like <deny> but with the inverse meaning. 402 <deny send_interface="org.freedesktop.System" send_member="Reboot"/> 403 <deny receive_interface="org.freedesktop.System" receive_member="Reboot"/> 404 <deny own="org.freedesktop.System"/> 405 <deny send_destination="org.freedesktop.System"/> 406 <deny receive_sender="org.freedesktop.System"/ [all...] |
policy.c | 58 * deny rules default to FALSE (only unrequested replies denied) 65 * deny rules default to FALSE (only unrequested replies denied) 769 * <deny send_interface="*"/> 771 * (for example) the deny will always override the allow. So we 772 * delete the allow. Ditto for deny followed by allow, etc. This is 776 * with a blanket deny, no point keeping the rules from the parent 910 /* for deny, requested_reply=false means the rule applies only 916 _dbus_verbose (" (policy) skipping deny rule since it only applies to unrequested replies\n"); 1074 /* for deny, eavesdrop=true means the rule applies only when 1075 * eavesdropping; eavesdrop=false means always deny [all...] |
/external/bluetooth/bluez/src/ |
hcid.conf | 20 # once - Pair once and deny successive attempts 47 # deny role switch on outgoing connections
|
bluetooth.conf | 28 <deny send_destination="org.bluez"/>
|
/libcore/luni/src/test/java/libcore/java/lang/ |
ReflectionSecurityTest.java | 28 /** whether to deny the next request */ 29 private boolean deny; field in class:ReflectionSecurityTest.Enforcer 34 deny = false; 38 * Deny the next request. 41 deny = true; 45 * Throw an exception if the instance had been asked to deny a request. 48 if (deny) { 49 deny = false;
|
/external/dbus/test/data/valid-config-files/system.d/ |
test.conf | 4 <!-- The following demonstrates how to punch holes in a default deny-all
|
/external/dnsmasq/contrib/lease-access/ |
README | 3 For some specific application I needed to deny access to a MAC address
|
/frameworks/base/core/java/com/android/internal/app/ |
NetInitiatedActivity.java | 32 * This activity is shown to the user for him/her to accept or deny network-initiated 47 public static final String BUTTON_TEXT_DENY = "Deny"; 114 // Respond to NI Handler under GpsLocationProvider, 1 = accept, 2 = deny
|
/external/webkit/LayoutTests/fast/dom/Geolocation/resources/ |
permission-denied-stops-watches.js | 4 // to be requested, then deny it.
|
/external/webkit/WebKit/win/Interfaces/ |
IWebGeolocationPolicyListener.idl | 39 HRESULT deny();
|
/external/chromium/net/base/ |
static_cookie_policy.h | 16 // three modes: allow all, deny all, or block third-party cookies.
|
/external/webkit/LayoutTests/http/conf/ |
fedora-httpd.conf | 330 Order allow,deny 344 # Order allow,deny 348 # Order deny,allow 349 # Deny from all 375 Order allow,deny 376 Deny from all 385 Order allow,deny 386 Deny from all 391 Order allow,deny 392 Deny from al [all...] |
apache2-debian-httpd.conf | 285 Order allow,deny 307 Order allow,deny 308 Deny from all 317 Order allow,deny 318 Deny from all 323 Order allow,deny 324 Deny from all 627 # Order deny,allow 628 # Deny from all
|
/external/webkit/WebKit/win/ |
WebGeolocationPolicyListener.h | 51 virtual HRESULT STDMETHODCALLTYPE deny();
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
GuardedObjectTest.java | 67 /** Test real guard can both allow and deny access. */
|