HomeSort by relevance Sort by last modified time
    Searched refs:own (Results 1 - 25 of 487) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus-wpa_supplicant.conf 6 <allow own="fi.epitest.hostap.WPASupplicant"/>
11 <allow own="fi.w1.wpa_supplicant1"/>
18 <deny own="fi.epitest.hostap.WPASupplicant"/>
21 <deny own="fi.w1.wpa_supplicant1"/>
  /external/dnsmasq/dbus/
dnsmasq.conf 6 <allow own="uk.org.thekelleys.dnsmasq"/>
10 <deny own="uk.org.thekelleys.dnsmasq"/>
  /external/ltrace/
zero.h 31 * by the built node if OWN. Returns NULL if something failed. */
32 struct expr_node *build_zero_w_arg(struct expr_node *expr, int own);
zero.c 81 build_zero_w_arg(struct expr_node *expr, int own)
88 expr_self(), 0, expr, own, NULL);
  /system/connectivity/apmanager/dbus_permissions/
org.chromium.apmanager.conf 5 <allow own="org.chromium.apmanager"/>
10 <allow own="org.chromium.apmanager"/>
  /system/tpm/trunks/
com.android.Trunks.conf 6 <allow own="com.android.Trunks" />
org.chromium.Trunks.conf 6 <allow own="org.chromium.Trunks" />
  /system/webservd/webservd/etc/dbus-1/
org.chromium.WebServer.conf 14 <allow own="org.chromium.WebServer" />
  /external/dhcpcd-6.8.2/dbus/
dhcpcd-dbus.conf 4 <!-- Both root and dhcp can own the dhcpcd service -->
6 <allow own="org.chromium.dhcpcd"/>
11 <allow own="org.chromium.dhcpcd"/>
  /external/toybox/toys/posix/
chgrp.c 77 char **s, *own; local
85 own = xstrdup(*toys.optargs);
86 if ((grp = strchr(own, ':')) || (grp = strchr(own, '.'))) {
90 if (*own) TT.owner = xgetpwnamid(TT.owner_name = own)->pw_uid;
100 if (CFG_TOYBOX_FREE && ischown) free(own);
  /system/firewalld/dbus/
org.chromium.Firewalld.conf 6 <allow own="org.chromium.Firewalld"/>
  /system/tpm/attestation/server/
org.chromium.Attestation.conf 6 <allow own="org.chromium.Attestation" />
  /system/tpm/tpm_manager/server/
org.chromium.TpmManager.conf 6 <allow own="org.chromium.TpmManager" />
  /external/dbus/test/data/valid-config-files/
basic.conf 26 <associate own="org.freedesktop.FrobationaryMeasures"
28 <associate own="org.freedesktop.BlahBlahBlah"
check-own-rules.conf 10 <deny own="*"/>
many-rules.conf 16 <deny own="org.freedesktop.System"/>
35 <deny own="org.freedesktop.System"/>
  /external/selinux/policycoreutils/sepolicy/
org.selinux.conf 8 <!-- Only root can own the service -->
10 <allow own="org.selinux"/>
  /external/tlsdate/dbus/
org.torproject.tlsdate.conf 6 <!-- Only certain user can own the tlsdated service -->
8 <allow own="org.torproject.tlsdate"/>
  /external/dbus/test/data/valid-config-files/system.d/
test.conf 5 policy so that a particular user can own a service, and other
8 <!-- Only root can own the FooService service, and
11 <allow own="org.foo.FooService"/>
  /toolchain/binutils/binutils-2.25/gas/testsuite/gas/elf/
symtab.d 1 # The Alpha has its own version of .set.
  /external/webrtc/webrtc/modules/desktop_capture/win/
desktop.h 51 Desktop(HDESK desktop, bool own);
  /external/libgdx/extensions/gdx-bullet/jni/swig/collision/
btCollisionObjectWrapper.i 15 public static btCollisionObjectWrapper internalTemp(long cPtr, boolean own) {
16 temp.reset(cPtr, own);
btDbvt.i 14 public static btDbvtNode internalTemp(long cPtr, boolean own) {
15 temp.reset(cPtr, own);
36 public static btDbvtAabbMm internalTemp(long cPtr, boolean own) {
37 temp.reset(cPtr, own);
  /prebuilts/misc/common/swig/include/2.0.11/ruby/
director.swg 87 GCItem_Object(ruby_owntype own) : _own(own)
355 void swig_acquire_ownership_obj(void *vptr, ruby_owntype own) const
357 if (vptr && own) {
359 swig_owner[vptr] = new GCItem_Object(own);
365 ruby_owntype own = 0;
370 own = iter->second->get_own();
374 return own;
  /prebuilts/misc/common/swig/include/2.0.11/python/
director.swg 145 GCItem_Object(int own) : _own(own)
441 void swig_acquire_ownership_obj(void *vptr, int own) const
443 if (vptr && own) {
445 swig_owner[vptr] = new GCItem_Object(own);
451 int own = 0;
456 own = iter->second->get_own();
460 return own;
467 sobj->own = 0;

Completed in 1048 milliseconds

1 2 3 4 5 6 7 8 91011>>