/external/nist-sip/java/gov/nist/javax/sip/header/ |
AllowList.java | 36 * List of ALLOW headers. The sip message can have multiple Allow headers 43 public class AllowList extends SIPHeaderList<Allow> { 62 super(Allow.class, AllowHeader.NAME); 68 * Iterator if no methods are defined in this Allow Header. 82 for ( Iterator<Allow> it = this.hlist.iterator(); it.hasNext();) { 83 Allow a = (Allow)it.next(); 108 Allow allow = new Allow() local [all...] |
Allow.java | 32 * Allow SIPHeader. 40 public final class Allow extends 53 public Allow() { 54 super(ALLOW); 60 public Allow(String m) { 61 super(ALLOW); 80 + ", Allow, setMethod(), the method parameter is null.");
|
NameMap.java | 87 putNameMap(Allow.NAME, Allow.class.getName()); // 5
|
/external/chromium_org/content/common/sandbox_linux/ |
bpf_ppapi_policy_linux.cc | 17 using sandbox::bpf_dsl::Allow; 39 return Allow();
|
bpf_utility_policy_linux.cc | 17 using sandbox::bpf_dsl::Allow; 38 // Allow the system calls below. 52 return Allow();
|
bpf_cros_arm_gpu_policy_linux.cc | 29 using sandbox::bpf_dsl::Allow; 81 // so we need to allow access to |.Xauthority|. 118 return Allow(); 134 return Allow(); 139 // ARM GPU sandbox is started earlier so we need to allow networking 146 return Allow(); 147 // Allow only AF_UNIX for |domain|. 151 return If(domain == AF_UNIX, Allow()).Else(Error(EPERM)); 156 return Allow();
|
bpf_renderer_policy_linux.cc | 17 using sandbox::bpf_dsl::Allow; 28 // The baseline policy allows __NR_clock_gettime. Allow 34 // Allow the system calls below. 55 return Allow();
|
bpf_gpu_policy_linux.cc | 36 using sandbox::bpf_dsl::Allow; 104 // Allow using openat() as open(). 140 return Allow(); 192 return Allow(); 200 return Allow();
|
sandbox_seccomp_bpf_linux.cc | 40 using sandbox::bpf_dsl::Allow; 91 return Allow(); 105 // Allow all syscalls. 109 return Allow(); 133 // We should never allow the creation of netlink sockets. 144 // Starting the sandbox is a one-way operation. The kernel doesn't allow 146 // in order to make the use of the "Sandbox" object easier, we allow for
|
/external/chromium_org/content/common/sandbox_linux/android/ |
sandbox_bpf_base_policy_android.cc | 10 using sandbox::bpf_dsl::Allow; 55 return Allow();
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
syscall_parameters_restrictions.cc | 89 using sandbox::bpf_dsl::Allow; 98 // Allow Glibc's and Android pthread creation flags, crash on any other 119 return If(IsAndroid() ? android_test : glibc_test, Allow()) 130 Allow()) 136 return Switch(request).CASES((TCGETS, FIONREAD), Allow()).Default( 150 return If((flags & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); 160 return If((prot & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); 187 Allow()) 189 If((long_arg & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS())) 209 Allow()) [all...] |
baseline_policy.cc | 26 using sandbox::bpf_dsl::Allow; 108 return Allow(); 114 return Allow(); 120 return Allow(); 126 return Allow(); 163 // Only allow MADV_DONTNEED (aka MADV_FREE). 165 return If(advice == MADV_DONTNEED, Allow()).Else(Error(EPERM)); 188 // Only allow AF_UNIX, PF_UNIX. Crash if anything else is seen. 191 return If(domain == AF_UNIX, Allow()).Else(CrashSIGSYS()); 235 // Unfortunately C++03 doesn't allow delegated constructors [all...] |
syscall_parameters_restrictions_unittests.cc | 38 using sandbox::bpf_dsl::Allow; 53 return Allow(); 156 return Allow();
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
AllowParser.java | 33 * Parser for Allow header. 45 * @param allow the header to parse 47 public AllowParser(String allow) { 48 super(allow); 60 * parse the Allow String header 71 headerName(TokenTypes.ALLOW); 73 Allow allow = new Allow(); local 74 allow.setHeaderName(SIPHeaderNames.ALLOW) [all...] |
/external/chromium_org/components/nacl/loader/nonsfi/ |
nonsfi_sandbox.cc | 39 using sandbox::bpf_dsl::Allow; 54 // We allow following cases: 62 // the return value of F_GETFL, so we need to allow O_ACCMODE in 67 Allow()).Else(CrashSIGSYS()); 71 // We allow clone only for new thread creation. 76 Allow()).Else(CrashSIGSYSClone()); 80 // TODO(hamaji): Allow only FUTEX_PRIVATE_FLAG futexes. 91 Allow()) 104 // We only allow socketpair, sendmsg, and recvmsg. 108 Allow()).Else(CrashSIGSYS()) [all...] |
/external/chromium_org/components/nacl/loader/sandbox_linux/ |
nacl_bpf_sandbox_linux.cc | 32 using sandbox::bpf_dsl::Allow; 101 return Allow();
|
/external/chromium_org/sandbox/linux/bpf_dsl/ |
bpf_dsl_unittest.cc | 76 return Allow(); 105 return Allow(); 142 return Allow(); 175 return If(addr == kDeadBeefAddr, Error(EPERM)).Else(Allow()); 177 return Allow(); 199 return Allow(); 238 return Allow(); 274 return Allow(); 304 .Case(F_SETFD, If(long_arg == O_CLOEXEC, Allow()).Else(Error(EINVAL))) 308 return Allow(); [all...] |
bpf_dsl_more_unittest.cc | 64 // Set the global environment to allow the use of UnsafeTrap() policies. 121 return Allow(); 160 return Allow(); 191 return Allow(); 231 return Allow(); 298 return Allow(); 354 return If(arg == 0, Allow()).Else(Error(EPERM)); 357 return Allow(); 375 return If(arg == 0, Error(EINVAL)).Else(Allow()); 378 return Allow(); [all...] |
/external/chromium_org/android_webview/browser/ |
aw_ssl_host_state_delegate.cc | 42 void CertPolicy::Allow(const net::X509Certificate& cert, 72 cert_policy_for_host_[host].Allow(cert, error);
|
aw_ssl_host_state_delegate.h | 29 // Causes the policy to allow this certificate for a given |error|. And 31 void Allow(const net::X509Certificate& cert, net::CertStatus error);
|
/external/chromium_org/chrome/browser/policy/ |
url_blacklist_manager_unittest.cc | 64 scoped_ptr<base::ListValue> allow(new base::ListValue); 65 URLBlacklistManager::UpdateOnIO(block.Pass(), allow.Pass()); 400 blacklist.Allow(allowed.get()); 427 blacklist.Allow(allowed.get()); 435 blacklist.Allow(allowed.get()); 446 blacklist.Allow(allowed.get()); 458 blacklist.Allow(allowed.get()); 472 blacklist.Allow(allowed.get()); 485 blacklist.Allow(allowed.get()); 501 blacklist.Allow(allowed.get()) [all...] |
/external/chromium_org/ppapi/native_client/tests/nacl_browser/browser_dynamic_library/ |
nacl.scons | 20 # Allow resolving a URL to the toolchain/ directory (instead of staging).
|
/external/chromium_org/v8/test/mjsunit/ |
date-parse.js | 84 // Allow missing space between month and day. 87 // Allow year/month/day format. 89 // Allow month/day/year format. 91 // Allow month/day year format. 93 // Allow comma instead of space after day, month and year. 102 // Allow AM/PM after the time. 198 // Allow missing time. 210 // Allow timezone ommision.
|
newline-in-string.js | 38 // Allow CR+LF in multiline string literals. 42 // Allow LF+CR in multiline string literals.
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ims/ |
PAssociatedURIParser.java | 40 import gov.nist.javax.sip.header.Allow;
|