HomeSort by relevance Sort by last modified time
    Searched refs:Allow (Results 1 - 25 of 86) sorted by null

1 2 3 4

  /external/nist-sip/java/gov/nist/javax/sip/header/
AllowList.java 36 * List of ALLOW headers. The sip message can have multiple Allow headers
43 public class AllowList extends SIPHeaderList<Allow> {
62 super(Allow.class, AllowHeader.NAME);
68 * Iterator if no methods are defined in this Allow Header.
82 for ( Iterator<Allow> it = this.hlist.iterator(); it.hasNext();) {
83 Allow a = (Allow)it.next();
108 Allow allow = new Allow() local
    [all...]
Allow.java 32 * Allow SIPHeader.
40 public final class Allow extends
53 public Allow() {
54 super(ALLOW);
60 public Allow(String m) {
61 super(ALLOW);
80 + ", Allow, setMethod(), the method parameter is null.");
NameMap.java 87 putNameMap(Allow.NAME, Allow.class.getName()); // 5
  /external/chromium_org/content/common/sandbox_linux/
bpf_ppapi_policy_linux.cc 17 using sandbox::bpf_dsl::Allow;
39 return Allow();
bpf_utility_policy_linux.cc 17 using sandbox::bpf_dsl::Allow;
38 // Allow the system calls below.
52 return Allow();
bpf_cros_arm_gpu_policy_linux.cc 29 using sandbox::bpf_dsl::Allow;
81 // so we need to allow access to |.Xauthority|.
118 return Allow();
134 return Allow();
139 // ARM GPU sandbox is started earlier so we need to allow networking
146 return Allow();
147 // Allow only AF_UNIX for |domain|.
151 return If(domain == AF_UNIX, Allow()).Else(Error(EPERM));
156 return Allow();
bpf_renderer_policy_linux.cc 17 using sandbox::bpf_dsl::Allow;
28 // The baseline policy allows __NR_clock_gettime. Allow
34 // Allow the system calls below.
55 return Allow();
bpf_gpu_policy_linux.cc 36 using sandbox::bpf_dsl::Allow;
104 // Allow using openat() as open().
140 return Allow();
192 return Allow();
200 return Allow();
sandbox_seccomp_bpf_linux.cc 40 using sandbox::bpf_dsl::Allow;
91 return Allow();
105 // Allow all syscalls.
109 return Allow();
133 // We should never allow the creation of netlink sockets.
144 // Starting the sandbox is a one-way operation. The kernel doesn't allow
146 // in order to make the use of the "Sandbox" object easier, we allow for
  /external/chromium_org/content/common/sandbox_linux/android/
sandbox_bpf_base_policy_android.cc 10 using sandbox::bpf_dsl::Allow;
55 return Allow();
  /external/chromium_org/sandbox/linux/seccomp-bpf-helpers/
syscall_parameters_restrictions.cc 89 using sandbox::bpf_dsl::Allow;
98 // Allow Glibc's and Android pthread creation flags, crash on any other
119 return If(IsAndroid() ? android_test : glibc_test, Allow())
130 Allow())
136 return Switch(request).CASES((TCGETS, FIONREAD), Allow()).Default(
150 return If((flags & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS());
160 return If((prot & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS());
187 Allow())
189 If((long_arg & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()))
209 Allow())
    [all...]
baseline_policy.cc 26 using sandbox::bpf_dsl::Allow;
108 return Allow();
114 return Allow();
120 return Allow();
126 return Allow();
163 // Only allow MADV_DONTNEED (aka MADV_FREE).
165 return If(advice == MADV_DONTNEED, Allow()).Else(Error(EPERM));
188 // Only allow AF_UNIX, PF_UNIX. Crash if anything else is seen.
191 return If(domain == AF_UNIX, Allow()).Else(CrashSIGSYS());
235 // Unfortunately C++03 doesn't allow delegated constructors
    [all...]
syscall_parameters_restrictions_unittests.cc 38 using sandbox::bpf_dsl::Allow;
53 return Allow();
156 return Allow();
  /external/nist-sip/java/gov/nist/javax/sip/parser/
AllowParser.java 33 * Parser for Allow header.
45 * @param allow the header to parse
47 public AllowParser(String allow) {
48 super(allow);
60 * parse the Allow String header
71 headerName(TokenTypes.ALLOW);
73 Allow allow = new Allow(); local
74 allow.setHeaderName(SIPHeaderNames.ALLOW)
    [all...]
  /external/chromium_org/components/nacl/loader/nonsfi/
nonsfi_sandbox.cc 39 using sandbox::bpf_dsl::Allow;
54 // We allow following cases:
62 // the return value of F_GETFL, so we need to allow O_ACCMODE in
67 Allow()).Else(CrashSIGSYS());
71 // We allow clone only for new thread creation.
76 Allow()).Else(CrashSIGSYSClone());
80 // TODO(hamaji): Allow only FUTEX_PRIVATE_FLAG futexes.
91 Allow())
104 // We only allow socketpair, sendmsg, and recvmsg.
108 Allow()).Else(CrashSIGSYS())
    [all...]
  /external/chromium_org/components/nacl/loader/sandbox_linux/
nacl_bpf_sandbox_linux.cc 32 using sandbox::bpf_dsl::Allow;
101 return Allow();
  /external/chromium_org/sandbox/linux/bpf_dsl/
bpf_dsl_unittest.cc 76 return Allow();
105 return Allow();
142 return Allow();
175 return If(addr == kDeadBeefAddr, Error(EPERM)).Else(Allow());
177 return Allow();
199 return Allow();
238 return Allow();
274 return Allow();
304 .Case(F_SETFD, If(long_arg == O_CLOEXEC, Allow()).Else(Error(EINVAL)))
308 return Allow();
    [all...]
bpf_dsl_more_unittest.cc 64 // Set the global environment to allow the use of UnsafeTrap() policies.
121 return Allow();
160 return Allow();
191 return Allow();
231 return Allow();
298 return Allow();
354 return If(arg == 0, Allow()).Else(Error(EPERM));
357 return Allow();
375 return If(arg == 0, Error(EINVAL)).Else(Allow());
378 return Allow();
    [all...]
  /external/chromium_org/android_webview/browser/
aw_ssl_host_state_delegate.cc 42 void CertPolicy::Allow(const net::X509Certificate& cert,
72 cert_policy_for_host_[host].Allow(cert, error);
aw_ssl_host_state_delegate.h 29 // Causes the policy to allow this certificate for a given |error|. And
31 void Allow(const net::X509Certificate& cert, net::CertStatus error);
  /external/chromium_org/chrome/browser/policy/
url_blacklist_manager_unittest.cc 64 scoped_ptr<base::ListValue> allow(new base::ListValue);
65 URLBlacklistManager::UpdateOnIO(block.Pass(), allow.Pass());
400 blacklist.Allow(allowed.get());
427 blacklist.Allow(allowed.get());
435 blacklist.Allow(allowed.get());
446 blacklist.Allow(allowed.get());
458 blacklist.Allow(allowed.get());
472 blacklist.Allow(allowed.get());
485 blacklist.Allow(allowed.get());
501 blacklist.Allow(allowed.get())
    [all...]
  /external/chromium_org/ppapi/native_client/tests/nacl_browser/browser_dynamic_library/
nacl.scons 20 # Allow resolving a URL to the toolchain/ directory (instead of staging).
  /external/chromium_org/v8/test/mjsunit/
date-parse.js 84 // Allow missing space between month and day.
87 // Allow year/month/day format.
89 // Allow month/day/year format.
91 // Allow month/day year format.
93 // Allow comma instead of space after day, month and year.
102 // Allow AM/PM after the time.
198 // Allow missing time.
210 // Allow timezone ommision.
newline-in-string.js 38 // Allow CR+LF in multiline string literals.
42 // Allow LF+CR in multiline string literals.
  /external/nist-sip/java/gov/nist/javax/sip/parser/ims/
PAssociatedURIParser.java 40 import gov.nist.javax.sip.header.Allow;

Completed in 1189 milliseconds

1 2 3 4