/libcore/ojluni/src/main/java/java/nio/file/attribute/ |
AclEntryType.java | 38 ALLOW,
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
Allow.java | 32 * Allow SIPHeader. 40 public final class Allow extends 53 public Allow() { 54 super(ALLOW); 60 public Allow(String m) { 61 super(ALLOW); 80 + ", Allow, setMethod(), the method parameter is null.");
|
SIPHeaderNames.java | 48 public static final String ALLOW = AllowHeader.NAME; //5
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
AllowParser.java | 33 * Parser for Allow header. 45 * @param allow the header to parse 47 public AllowParser(String allow) { 48 super(allow); 60 * parse the Allow String header 71 headerName(TokenTypes.ALLOW); 73 Allow allow = new Allow(); local 74 allow.setHeaderName(SIPHeaderNames.ALLOW) [all...] |
TokenTypes.java | 58 public static final int ALLOW = START + 21;
|
/libcore/luni/src/test/java/libcore/java/nio/file/attribute/ |
AclEntryTest.java | 41 .setType(AclEntryType.ALLOW) 46 assertEquals(AclEntryType.ALLOW, aclEntry.type());
|
/external/selinux/python/sepolicy/sepolicy/ |
booleans.py | 34 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
|
communicate.py | 43 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
|
network.py | 27 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
|
transition.py | 28 trans = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src})
|
__init__.py | 43 ALLOW = 'allow' 295 valid_types = set([ALLOW, AUDITALLOW, NEVERALLOW, DONTAUDIT, TRANSITION, ROLE_ALLOW]) 315 if ALLOW in types: 316 tertypes.append(ALLOW) 348 ratypes = ['allow'] 366 allows = search([ALLOW], {SOURCE: src, TARGET: dest, CLASS: tclass, PERMS: perm}) 369 allows = search([ALLOW], {SOURCE: src, CLASS: tclass, PERMS: perm}) 419 permlist = search([ALLOW], {'source': setype, 'permlist': ['open', 'write'], 'class': 'file'}) 622 permlist = search([ALLOW], {'source': setype} [all...] |
/packages/apps/Gallery/src/com/android/camera/ |
BitmapManager.java | 40 private static enum State {CANCEL, ALLOW} 42 public State mState = State.ALLOW; 50 } else if (mState == State.ALLOW) { 51 s = "Allow"; 101 // allow decoding by default 110 getOrCreateThreadStatus(t).mState = State.ALLOW;
|
/system/netd/server/ |
FirewallControllerTest.cpp | 110 mFw.setUidRule(STANDBY, 12345, ALLOW); 124 mFw.setUidRule(DOZABLE, 54321, ALLOW); 150 mFw.setUidRule(NONE, 54321, ALLOW); 262 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); 265 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW));
|
FirewallController.h | 28 enum FirewallRule { DENY, ALLOW }; 42 * defined ALLOW rules.
|
FirewallController.cpp | 160 if (rule == ALLOW && mIfaceRules.find(iface) == mIfaceRules.end()) { 201 op = (rule == ALLOW)? "-I" : "-D"; 244 // Allow ICMPv6 packets necessary to make IPv6 connectivity work. http://b/23158230 . 271 // Always allow networking on loopback. 275 // Allow TCP RSTs so we can cleanly close TCP connections of apps that no longer have network
|
/external/mdnsresponder/mDNSShared/ |
dnsextd_lexer.l | 64 allow-update return ALLOWUPDATE; 65 allow-query return ALLOWQUERY; 70 allow return ALLOW;
|
/external/minijail/tools/ |
generate_seccomp_policy.py | 38 ALLOW = "%s: 1" 161 print ALLOW % syscall
|
/external/guava/guava/src/com/google/common/net/ |
HttpHeaders.java | 123 /** The HTTP {@code Access-Control-Allow-Headers} header field name. */ 124 public static final String ACCESS_CONTROL_ALLOW_HEADERS = "Access-Control-Allow-Headers"; 125 /** The HTTP {@code Access-Control-Allow-Methods} header field name. */ 126 public static final String ACCESS_CONTROL_ALLOW_METHODS = "Access-Control-Allow-Methods"; 127 /** The HTTP {@code Access-Control-Allow-Origin} header field name. */ 128 public static final String ACCESS_CONTROL_ALLOW_ORIGIN = "Access-Control-Allow-Origin"; 129 /** The HTTP {@code Access-Control-Allow-Credentials} header field name. */ 130 public static final String ACCESS_CONTROL_ALLOW_CREDENTIALS = "Access-Control-Allow-Credentials"; 137 /** The HTTP {@code Allow} header field name. */ 138 public static final String ALLOW = "Allow" [all...] |
/external/selinux/checkpolicy/ |
policy_scan.l | 139 ALLOW | 140 allow { return(ALLOW); }
|
policy_parse.y | 126 %token ALLOW 433 cond_allow_def : ALLOW names names ':' names names ';' 474 allow_def : ALLOW names names ':' names names ';' 517 role_allow_def : ALLOW names names ';' [all...] |
/packages/apps/Email/provider_src/com/android/email/ |
AttachmentInfo.java | 60 public static final int ALLOW = 0x00; 118 int denyFlags = ALLOW;
|
/external/selinux/libselinux/src/ |
audit2why.c | 25 #define ALLOW 0 382 RETURN(ALLOW) 482 PyModule_AddIntConstant(m,"ALLOW", ALLOW);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tnc.c | 21 enum { ALLOW, ISOLATE, NO_ACCESS, NO_RECOMMENDATION } recommendation; 178 case ALLOW: 370 data->recommendation = ALLOW;
|
/external/selinux/python/sepolgen/src/sepolgen/ |
policygen.py | 52 It generates allow rules and optionally module require 54 only allow rules are generated. The methods .set_gen_refpol 164 if av.type == audit2why.ALLOW: 176 rule.comment += "\n#!!!! This avc is a constraint violation. You would need to modify the attributes of either the source or target types to allow this access." 190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]: 207 # into raw allow rules and interfaces. After this 209 # used as raw allow rules and the interfaces will 217 # Generate the raw allow rules from the filtered list
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/ |
policygen.py | 52 It generates allow rules and optionally module require 54 only allow rules are generated. The methods .set_gen_refpol 164 if av.type == audit2why.ALLOW: 176 rule.comment += "\n#!!!! This avc is a constraint violation. You would need to modify the attributes of either the source or target types to allow this access." 190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]: 207 # into raw allow rules and interfaces. After this 209 # used as raw allow rules and the interfaces will 217 # Generate the raw allow rules from the filtered list
|