OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:deny
(Results
1 - 25
of
338
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/dbus/test/data/valid-config-files/
many-rules.conf
13
<
deny
send_interface="org.freedesktop.System" send_member="Reboot"/>
14
<
deny
receive_interface="org.freedesktop.System" receive_member="Reboot"/>
15
<
deny
send_path="/foo/bar/SystemObjectThing" send_member="Reboot"/>
16
<
deny
own="org.freedesktop.System"/>
17
<
deny
send_destination="org.freedesktop.System"/>
18
<
deny
receive_sender="org.freedesktop.System"/>
19
<
deny
user="root"/>
20
<
deny
group="root"/>
25
<
deny
send_destination="org.freedesktop.Bar" send_interface="org.freedesktop.Foo"/>
26
<
deny
send_destination="org.freedesktop.Bar" send_interface="org.freedesktop.Foo" send_type="method_call (…)
[
all
...]
/external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus-wpa_supplicant.conf
18
<
deny
own="fi.epitest.hostap.WPASupplicant"/>
19
<
deny
send_destination="fi.epitest.hostap.WPASupplicant"/>
20
<
deny
send_interface="fi.epitest.hostap.WPASupplicant"/>
22
<
deny
own="fi.w1.wpa_supplicant1"/>
23
<
deny
send_destination="fi.w1.wpa_supplicant1"/>
24
<
deny
send_interface="fi.w1.wpa_supplicant1"/>
25
<
deny
receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
/external/wpa_supplicant_6/wpa_supplicant/
dbus-wpa_supplicant.conf
12
<
deny
own="fi.epitest.hostap.WPASupplicant"/>
13
<
deny
send_destination="fi.epitest.hostap.WPASupplicant"/>
14
<
deny
send_interface="fi.epitest.hostap.WPASupplicant"/>
/external/dnsmasq/dbus/
dnsmasq.conf
10
<
deny
own="uk.org.thekelleys.dnsmasq"/>
11
<
deny
send_destination="uk.org.thekelleys.dnsmasq"/>
/external/dbus/doc/
busconfig.dtd
33
<!ELEMENT policy (allow|
deny
)*>
49
<!ELEMENT
deny
EMPTY>
50
<!ATTLIST
deny
/external/qemu/
acl.c
60
/*
Deny
by default, so there is no window of "open
83
return entry->
deny
? 0 : 1;
88
return entry->
deny
? 0 : 1;
100
/* Put back to
deny
by default, so there is no window
114
int
deny
,
121
entry->
deny
=
deny
;
131
int
deny
,
142
return qemu_acl_append(acl,
deny
, match);
147
entry->
deny
= deny
[
all
...]
acl.h
35
int
deny
;
member in struct:qemu_acl_entry
57
int
deny
,
60
int
deny
,
/external/openssh/regress/
addrmatch.sh
31
run_trial user 192.168.30.1 somehost no "
deny
, negative match"
32
run_trial user 19.0.0.1 somehost no "
deny
, no match"
34
run_trial user 192.168.30.1 192.168.0.1 no "
deny
, faked IP in hostname"
38
run_trial user ::2 somehost.exaple.com no "
deny
IPv6"
39
run_trial user ::3 somehost no "
deny
IP6 negated"
40
run_trial user ::4 somehost no "
deny
, IP6 no match"
42
run_trial user 2001::1 somehost no "
deny
, IP6 network"
/external/dbus/cmake/bus/
system.conf.cmake
36
<!--
Deny
everything then punch holes -->
37
<
deny
send_interface="*"/>
38
<
deny
receive_interface="*"/>
39
<
deny
own="*"/>
dbus-daemon.xml
448
<allow> and <
deny
> elements. Policies are normally used with the systemwide bus;
480
<term><emphasis remap='I'><
deny
></emphasis></term>
488
<para>A <
deny
> element appears below a <policy> element and prohibits some
489
action. The <allow> element makes an exception to previous <
deny
>
490
statements, and works just like <
deny
> but with the inverse meaning.</para>
522
<
deny
send_interface="org.freedesktop.System" send_member="Reboot"/>
523
<
deny
receive_interface="org.freedesktop.System" receive_member="Reboot"/>
524
<
deny
own="org.freedesktop.System"/>
525
<
deny
send_destination="org.freedesktop.System"/>
526
<
deny
receive_sender="org.freedesktop.System"/>
[
all
...]
/external/chromium/chrome/browser/custom_handlers/
register_protocol_handler_infobar_delegate.h
17
// An InfoBar delegate that enables the user to allow or
deny
storing credit
/external/chromium/chrome/browser/download/
download_request_infobar_delegate.h
15
// An infobar delegate that presents the user with a choice to allow or
deny
/external/dbus/test/data/valid-config-files/system.d/
test.conf
4
<!-- The following demonstrates how to punch holes in a default
deny
-all
/external/dnsmasq/contrib/lease-access/
README
3
For some specific application I needed to
deny
access to a MAC address
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/
nlm_prot.x
100
fsm_DN = 0, /*
deny
none */
101
fsm_DR = 1, /*
deny
read */
102
fsm_DW = 2, /*
deny
write */
103
fsm_DRW = 3 /*
deny
read/write */
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/
nlm_prot.x
100
fsm_DN = 0, /*
deny
none */
101
fsm_DR = 1, /*
deny
read */
102
fsm_DW = 2, /*
deny
write */
103
fsm_DRW = 3 /*
deny
read/write */
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/
nlm_prot.x
100
fsm_DN = 0, /*
deny
none */
101
fsm_DR = 1, /*
deny
read */
102
fsm_DW = 2, /*
deny
write */
103
fsm_DRW = 3 /*
deny
read/write */
/external/sepolicy/
mac_permissions.xml
11
deny
-permission : produces a blacklist of permissions to
deny
.
13
package : a complex tag which itself defines allow,
deny
, and wildcard sub elements for
25
** A blacklist is used if at least one
deny
-permission tag is found
154
<
deny
-permission name="android.permission.BRICK" />
155
<
deny
-permission name="android.permission.READ_LOGS" />
156
<
deny
-permission name="com.android.browser.permission.READ_HISTORY_BOOKMARKS" />
157
<
deny
-permission name="com.android.browser.permission.WRITE_HISTORY_BOOKMARKS" />
188
<
deny
-permission name="android.permission.ACCESS_COARSE_LOCATION" />
189
<
deny
-permission name="android.permission.ACCESS_FINE_LOCATION" /
[
all
...]
/external/dbus/bus/
system.conf.in
50
<
deny
own="*"/>
51
<
deny
send_type="method_call"/>
68
<
deny
send_destination="org.freedesktop.DBus"
dbus-daemon.1.in
424
<allow> and <
deny
> elements. Policies are normally used with the systemwide bus;
429
Currently, the system bus has a default-
deny
policy for sending method calls
469
.I "<
deny
>"
473
A <
deny
> element appears below a <policy> element and prohibits some
474
action. The <allow> element makes an exception to previous <
deny
>
475
statements, and works just like <
deny
> but with the inverse meaning.
507
<
deny
send_destination="org.freedesktop.Service" send_interface="org.freedesktop.System" send_member="Reboot"/>
508
<
deny
send_destination="org.freedesktop.System"/>
509
<
deny
receive_sender="org.freedesktop.System"/>
510
<
deny
user="john"/
[
all
...]
policy.c
59
*
deny
rules default to FALSE (only unrequested replies denied)
66
*
deny
rules default to FALSE (only unrequested replies denied)
781
* <
deny
send_interface="*"/>
783
* (for example) the
deny
will always override the allow. So we
784
* delete the allow. Ditto for
deny
followed by allow, etc. This is
788
* with a blanket
deny
, no point keeping the rules from the parent
925
/* for
deny
, requested_reply=false means the rule applies only
931
_dbus_verbose (" (policy) skipping
deny
rule since it only applies to unrequested replies\n");
951
* for
deny
rules, if the message has no interface we want to use the
952
* rule (and thus
deny
)
[
all
...]
/external/dbus/test/name-test/
tmp-session-like-system.conf
28
<
deny
own="*"/>
29
<
deny
send_type="method_call"/>
46
<
deny
send_destination="org.freedesktop.DBus"
/external/chromium/chrome/browser/chromeos/
plugin_selection_policy_unittest.cc
31
"
deny
bar.com\n";
36
"
deny
bar.com\n";
42
const char kGlobalPolicy[] = "# This is a test with global
deny
/allow\n"
44
"
deny
\n"
51
"
deny
bar.com # and this\n";
57
"
deny
bar.com\n"
59
"
deny
google.com\n"
63
"
deny
google.com\n"
/external/webkit/Source/WebKit/gtk/webkit/
webkitgeolocationpolicydecision.cpp
34
* uses it to tell the engine whether it wants to allow or
deny
geolocation for
86
* Will send the
deny
decision to the policy implementer.
/packages/apps/KeyChain/res/values/
strings.xml
40
<!-- Label of button to send the
deny
the application certificate request -->
41
<string name="deny_button">
Deny
</string>
Completed in 684 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>