HomeSort by relevance Sort by last modified time
    Searched full:deny (Results 1 - 25 of 338) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/dbus/test/data/valid-config-files/
many-rules.conf 13 <deny send_interface="org.freedesktop.System" send_member="Reboot"/>
14 <deny receive_interface="org.freedesktop.System" receive_member="Reboot"/>
15 <deny send_path="/foo/bar/SystemObjectThing" send_member="Reboot"/>
16 <deny own="org.freedesktop.System"/>
17 <deny send_destination="org.freedesktop.System"/>
18 <deny receive_sender="org.freedesktop.System"/>
19 <deny user="root"/>
20 <deny group="root"/>
25 <deny send_destination="org.freedesktop.Bar" send_interface="org.freedesktop.Foo"/>
26 <deny send_destination="org.freedesktop.Bar" send_interface="org.freedesktop.Foo" send_type="method_call (…)
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus-wpa_supplicant.conf 18 <deny own="fi.epitest.hostap.WPASupplicant"/>
19 <deny send_destination="fi.epitest.hostap.WPASupplicant"/>
20 <deny send_interface="fi.epitest.hostap.WPASupplicant"/>
22 <deny own="fi.w1.wpa_supplicant1"/>
23 <deny send_destination="fi.w1.wpa_supplicant1"/>
24 <deny send_interface="fi.w1.wpa_supplicant1"/>
25 <deny receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
  /external/wpa_supplicant_6/wpa_supplicant/
dbus-wpa_supplicant.conf 12 <deny own="fi.epitest.hostap.WPASupplicant"/>
13 <deny send_destination="fi.epitest.hostap.WPASupplicant"/>
14 <deny send_interface="fi.epitest.hostap.WPASupplicant"/>
  /external/dnsmasq/dbus/
dnsmasq.conf 10 <deny own="uk.org.thekelleys.dnsmasq"/>
11 <deny send_destination="uk.org.thekelleys.dnsmasq"/>
  /external/dbus/doc/
busconfig.dtd 33 <!ELEMENT policy (allow|deny)*>
49 <!ELEMENT deny EMPTY>
50 <!ATTLIST deny
  /external/qemu/
acl.c 60 /* Deny by default, so there is no window of "open
83 return entry->deny ? 0 : 1;
88 return entry->deny ? 0 : 1;
100 /* Put back to deny by default, so there is no window
114 int deny,
121 entry->deny = deny;
131 int deny,
142 return qemu_acl_append(acl, deny, match);
147 entry->deny = deny
    [all...]
acl.h 35 int deny; member in struct:qemu_acl_entry
57 int deny,
60 int deny,
  /external/openssh/regress/
addrmatch.sh 31 run_trial user 192.168.30.1 somehost no "deny, negative match"
32 run_trial user 19.0.0.1 somehost no "deny, no match"
34 run_trial user 192.168.30.1 192.168.0.1 no "deny, faked IP in hostname"
38 run_trial user ::2 somehost.exaple.com no "deny IPv6"
39 run_trial user ::3 somehost no "deny IP6 negated"
40 run_trial user ::4 somehost no "deny, IP6 no match"
42 run_trial user 2001::1 somehost no "deny, IP6 network"
  /external/dbus/cmake/bus/
system.conf.cmake 36 <!-- Deny everything then punch holes -->
37 <deny send_interface="*"/>
38 <deny receive_interface="*"/>
39 <deny own="*"/>
dbus-daemon.xml 448 &lt;allow&gt; and &lt;deny&gt; elements. Policies are normally used with the systemwide bus;
480 <term><emphasis remap='I'>&lt;deny&gt;</emphasis></term>
488 <para>A &lt;deny&gt; element appears below a &lt;policy&gt; element and prohibits some
489 action. The &lt;allow&gt; element makes an exception to previous &lt;deny&gt;
490 statements, and works just like &lt;deny&gt; but with the inverse meaning.</para>
522 &lt;deny send_interface="org.freedesktop.System" send_member="Reboot"/&gt;
523 &lt;deny receive_interface="org.freedesktop.System" receive_member="Reboot"/&gt;
524 &lt;deny own="org.freedesktop.System"/&gt;
525 &lt;deny send_destination="org.freedesktop.System"/&gt;
526 &lt;deny receive_sender="org.freedesktop.System"/&gt
    [all...]
  /external/chromium/chrome/browser/custom_handlers/
register_protocol_handler_infobar_delegate.h 17 // An InfoBar delegate that enables the user to allow or deny storing credit
  /external/chromium/chrome/browser/download/
download_request_infobar_delegate.h 15 // An infobar delegate that presents the user with a choice to allow or deny
  /external/dbus/test/data/valid-config-files/system.d/
test.conf 4 <!-- The following demonstrates how to punch holes in a default deny-all
  /external/dnsmasq/contrib/lease-access/
README 3 For some specific application I needed to deny access to a MAC address
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/
nlm_prot.x 100 fsm_DN = 0, /* deny none */
101 fsm_DR = 1, /* deny read */
102 fsm_DW = 2, /* deny write */
103 fsm_DRW = 3 /* deny read/write */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/
nlm_prot.x 100 fsm_DN = 0, /* deny none */
101 fsm_DR = 1, /* deny read */
102 fsm_DW = 2, /* deny write */
103 fsm_DRW = 3 /* deny read/write */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/
nlm_prot.x 100 fsm_DN = 0, /* deny none */
101 fsm_DR = 1, /* deny read */
102 fsm_DW = 2, /* deny write */
103 fsm_DRW = 3 /* deny read/write */
  /external/sepolicy/
mac_permissions.xml 11 deny-permission : produces a blacklist of permissions to deny.
13 package : a complex tag which itself defines allow, deny, and wildcard sub elements for
25 ** A blacklist is used if at least one deny-permission tag is found
154 <deny-permission name="android.permission.BRICK" />
155 <deny-permission name="android.permission.READ_LOGS" />
156 <deny-permission name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" />
157 <deny-permission name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" />
188 <deny-permission name="android.permission.ACCESS_COARSE_LOCATION" />
189 <deny-permission name="android.permission.ACCESS_FINE_LOCATION" /
    [all...]
  /external/dbus/bus/
system.conf.in 50 <deny own="*"/>
51 <deny send_type="method_call"/>
68 <deny send_destination="org.freedesktop.DBus"
dbus-daemon.1.in 424 <allow> and <deny> elements. Policies are normally used with the systemwide bus;
429 Currently, the system bus has a default-deny policy for sending method calls
469 .I "<deny>"
473 A <deny> element appears below a <policy> element and prohibits some
474 action. The <allow> element makes an exception to previous <deny>
475 statements, and works just like <deny> but with the inverse meaning.
507 <deny send_destination="org.freedesktop.Service" send_interface="org.freedesktop.System" send_member="Reboot"/>
508 <deny send_destination="org.freedesktop.System"/>
509 <deny receive_sender="org.freedesktop.System"/>
510 <deny user="john"/
    [all...]
policy.c 59 * deny rules default to FALSE (only unrequested replies denied)
66 * deny rules default to FALSE (only unrequested replies denied)
781 * <deny send_interface="*"/>
783 * (for example) the deny will always override the allow. So we
784 * delete the allow. Ditto for deny followed by allow, etc. This is
788 * with a blanket deny, no point keeping the rules from the parent
925 /* for deny, requested_reply=false means the rule applies only
931 _dbus_verbose (" (policy) skipping deny rule since it only applies to unrequested replies\n");
951 * for deny rules, if the message has no interface we want to use the
952 * rule (and thus deny)
    [all...]
  /external/dbus/test/name-test/
tmp-session-like-system.conf 28 <deny own="*"/>
29 <deny send_type="method_call"/>
46 <deny send_destination="org.freedesktop.DBus"
  /external/chromium/chrome/browser/chromeos/
plugin_selection_policy_unittest.cc 31 "deny bar.com\n";
36 "deny bar.com\n";
42 const char kGlobalPolicy[] = "# This is a test with global deny/allow\n"
44 "deny\n"
51 "deny bar.com # and this\n";
57 "deny bar.com\n"
59 "deny google.com\n"
63 "deny google.com\n"
  /external/webkit/Source/WebKit/gtk/webkit/
webkitgeolocationpolicydecision.cpp 34 * uses it to tell the engine whether it wants to allow or deny geolocation for
86 * Will send the deny decision to the policy implementer.
  /packages/apps/KeyChain/res/values/
strings.xml 40 <!-- Label of button to send the deny the application certificate request -->
41 <string name="deny_button">Deny</string>

Completed in 684 milliseconds

1 2 3 4 5 6 7 8 91011>>