/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus-wpa_supplicant.conf | 6 <allow own="fi.epitest.hostap.WPASupplicant"/> 11 <allow own="fi.w1.wpa_supplicant1"/> 18 <deny own="fi.epitest.hostap.WPASupplicant"/> 21 <deny own="fi.w1.wpa_supplicant1"/>
|
/external/dnsmasq/dbus/ |
dnsmasq.conf | 6 <allow own="uk.org.thekelleys.dnsmasq"/> 10 <deny own="uk.org.thekelleys.dnsmasq"/>
|
/external/ltrace/ |
zero.h | 31 * by the built node if OWN. Returns NULL if something failed. */ 32 struct expr_node *build_zero_w_arg(struct expr_node *expr, int own);
|
zero.c | 81 build_zero_w_arg(struct expr_node *expr, int own) 88 expr_self(), 0, expr, own, NULL);
|
/system/connectivity/apmanager/dbus_permissions/ |
org.chromium.apmanager.conf | 5 <allow own="org.chromium.apmanager"/> 10 <allow own="org.chromium.apmanager"/>
|
/system/tpm/trunks/ |
com.android.Trunks.conf | 6 <allow own="com.android.Trunks" />
|
org.chromium.Trunks.conf | 6 <allow own="org.chromium.Trunks" />
|
/system/webservd/webservd/etc/dbus-1/ |
org.chromium.WebServer.conf | 14 <allow own="org.chromium.WebServer" />
|
/external/dhcpcd-6.8.2/dbus/ |
dhcpcd-dbus.conf | 4 <!-- Both root and dhcp can own the dhcpcd service --> 6 <allow own="org.chromium.dhcpcd"/> 11 <allow own="org.chromium.dhcpcd"/>
|
/external/toybox/toys/posix/ |
chgrp.c | 77 char **s, *own; local 85 own = xstrdup(*toys.optargs); 86 if ((grp = strchr(own, ':')) || (grp = strchr(own, '.'))) { 90 if (*own) TT.owner = xgetpwnamid(TT.owner_name = own)->pw_uid; 100 if (CFG_TOYBOX_FREE && ischown) free(own);
|
/system/firewalld/dbus/ |
org.chromium.Firewalld.conf | 6 <allow own="org.chromium.Firewalld"/>
|
/system/tpm/attestation/server/ |
org.chromium.Attestation.conf | 6 <allow own="org.chromium.Attestation" />
|
/system/tpm/tpm_manager/server/ |
org.chromium.TpmManager.conf | 6 <allow own="org.chromium.TpmManager" />
|
/external/dbus/test/data/valid-config-files/ |
basic.conf | 26 <associate own="org.freedesktop.FrobationaryMeasures" 28 <associate own="org.freedesktop.BlahBlahBlah"
|
check-own-rules.conf | 10 <deny own="*"/>
|
many-rules.conf | 16 <deny own="org.freedesktop.System"/> 35 <deny own="org.freedesktop.System"/>
|
/external/selinux/policycoreutils/sepolicy/ |
org.selinux.conf | 8 <!-- Only root can own the service --> 10 <allow own="org.selinux"/>
|
/external/tlsdate/dbus/ |
org.torproject.tlsdate.conf | 6 <!-- Only certain user can own the tlsdated service --> 8 <allow own="org.torproject.tlsdate"/>
|
/external/dbus/test/data/valid-config-files/system.d/ |
test.conf | 5 policy so that a particular user can own a service, and other 8 <!-- Only root can own the FooService service, and 11 <allow own="org.foo.FooService"/>
|
/toolchain/binutils/binutils-2.25/gas/testsuite/gas/elf/ |
symtab.d | 1 # The Alpha has its own version of .set.
|
/external/webrtc/webrtc/modules/desktop_capture/win/ |
desktop.h | 51 Desktop(HDESK desktop, bool own);
|
/external/libgdx/extensions/gdx-bullet/jni/swig/collision/ |
btCollisionObjectWrapper.i | 15 public static btCollisionObjectWrapper internalTemp(long cPtr, boolean own) { 16 temp.reset(cPtr, own);
|
btDbvt.i | 14 public static btDbvtNode internalTemp(long cPtr, boolean own) { 15 temp.reset(cPtr, own); 36 public static btDbvtAabbMm internalTemp(long cPtr, boolean own) { 37 temp.reset(cPtr, own);
|
/prebuilts/misc/common/swig/include/2.0.11/ruby/ |
director.swg | 87 GCItem_Object(ruby_owntype own) : _own(own) 355 void swig_acquire_ownership_obj(void *vptr, ruby_owntype own) const 357 if (vptr && own) { 359 swig_owner[vptr] = new GCItem_Object(own); 365 ruby_owntype own = 0; 370 own = iter->second->get_own(); 374 return own;
|
/prebuilts/misc/common/swig/include/2.0.11/python/ |
director.swg | 145 GCItem_Object(int own) : _own(own) 441 void swig_acquire_ownership_obj(void *vptr, int own) const 443 if (vptr && own) { 445 swig_owner[vptr] = new GCItem_Object(own); 451 int own = 0; 456 own = iter->second->get_own(); 460 return own; 467 sobj->own = 0;
|