HomeSort by relevance Sort by last modified time
    Searched refs:ALLOW (Results 1 - 25 of 93) sorted by null

1 2 3 4

  /libcore/ojluni/src/main/java/java/nio/file/attribute/
AclEntryType.java 38 ALLOW,
  /external/nist-sip/java/gov/nist/javax/sip/header/
Allow.java 32 * Allow SIPHeader.
40 public final class Allow extends
53 public Allow() {
54 super(ALLOW);
60 public Allow(String m) {
61 super(ALLOW);
80 + ", Allow, setMethod(), the method parameter is null.");
SIPHeaderNames.java 48 public static final String ALLOW = AllowHeader.NAME; //5
  /external/nist-sip/java/gov/nist/javax/sip/parser/
AllowParser.java 33 * Parser for Allow header.
45 * @param allow the header to parse
47 public AllowParser(String allow) {
48 super(allow);
60 * parse the Allow String header
71 headerName(TokenTypes.ALLOW);
73 Allow allow = new Allow(); local
74 allow.setHeaderName(SIPHeaderNames.ALLOW)
    [all...]
TokenTypes.java 58 public static final int ALLOW = START + 21;
  /libcore/luni/src/test/java/libcore/java/nio/file/attribute/
AclEntryTest.java 41 .setType(AclEntryType.ALLOW)
46 assertEquals(AclEntryType.ALLOW, aclEntry.type());
  /external/selinux/python/sepolicy/sepolicy/
booleans.py 34 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
communicate.py 43 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
network.py 27 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
transition.py 28 trans = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src})
__init__.py 43 ALLOW = 'allow'
295 valid_types = set([ALLOW, AUDITALLOW, NEVERALLOW, DONTAUDIT, TRANSITION, ROLE_ALLOW])
315 if ALLOW in types:
316 tertypes.append(ALLOW)
348 ratypes = ['allow']
366 allows = search([ALLOW], {SOURCE: src, TARGET: dest, CLASS: tclass, PERMS: perm})
369 allows = search([ALLOW], {SOURCE: src, CLASS: tclass, PERMS: perm})
419 permlist = search([ALLOW], {'source': setype, 'permlist': ['open', 'write'], 'class': 'file'})
622 permlist = search([ALLOW], {'source': setype}
    [all...]
  /packages/apps/Gallery/src/com/android/camera/
BitmapManager.java 40 private static enum State {CANCEL, ALLOW}
42 public State mState = State.ALLOW;
50 } else if (mState == State.ALLOW) {
51 s = "Allow";
101 // allow decoding by default
110 getOrCreateThreadStatus(t).mState = State.ALLOW;
  /system/netd/server/
FirewallControllerTest.cpp 110 mFw.setUidRule(STANDBY, 12345, ALLOW);
124 mFw.setUidRule(DOZABLE, 54321, ALLOW);
150 mFw.setUidRule(NONE, 54321, ALLOW);
262 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW));
265 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW));
FirewallController.h 28 enum FirewallRule { DENY, ALLOW };
42 * defined ALLOW rules.
FirewallController.cpp 160 if (rule == ALLOW && mIfaceRules.find(iface) == mIfaceRules.end()) {
201 op = (rule == ALLOW)? "-I" : "-D";
244 // Allow ICMPv6 packets necessary to make IPv6 connectivity work. http://b/23158230 .
271 // Always allow networking on loopback.
275 // Allow TCP RSTs so we can cleanly close TCP connections of apps that no longer have network
  /external/mdnsresponder/mDNSShared/
dnsextd_lexer.l 64 allow-update return ALLOWUPDATE;
65 allow-query return ALLOWQUERY;
70 allow return ALLOW;
  /external/minijail/tools/
generate_seccomp_policy.py 38 ALLOW = "%s: 1"
161 print ALLOW % syscall
  /external/guava/guava/src/com/google/common/net/
HttpHeaders.java 123 /** The HTTP {@code Access-Control-Allow-Headers} header field name. */
124 public static final String ACCESS_CONTROL_ALLOW_HEADERS = "Access-Control-Allow-Headers";
125 /** The HTTP {@code Access-Control-Allow-Methods} header field name. */
126 public static final String ACCESS_CONTROL_ALLOW_METHODS = "Access-Control-Allow-Methods";
127 /** The HTTP {@code Access-Control-Allow-Origin} header field name. */
128 public static final String ACCESS_CONTROL_ALLOW_ORIGIN = "Access-Control-Allow-Origin";
129 /** The HTTP {@code Access-Control-Allow-Credentials} header field name. */
130 public static final String ACCESS_CONTROL_ALLOW_CREDENTIALS = "Access-Control-Allow-Credentials";
137 /** The HTTP {@code Allow} header field name. */
138 public static final String ALLOW = "Allow"
    [all...]
  /external/selinux/checkpolicy/
policy_scan.l 139 ALLOW |
140 allow { return(ALLOW); }
policy_parse.y 126 %token ALLOW
433 cond_allow_def : ALLOW names names ':' names names ';'
474 allow_def : ALLOW names names ':' names names ';'
517 role_allow_def : ALLOW names names ';'
    [all...]
  /packages/apps/Email/provider_src/com/android/email/
AttachmentInfo.java 60 public static final int ALLOW = 0x00;
118 int denyFlags = ALLOW;
  /external/selinux/libselinux/src/
audit2why.c 25 #define ALLOW 0
382 RETURN(ALLOW)
482 PyModule_AddIntConstant(m,"ALLOW", ALLOW);
  /external/wpa_supplicant_8/src/eap_server/
eap_server_tnc.c 21 enum { ALLOW, ISOLATE, NO_ACCESS, NO_RECOMMENDATION } recommendation;
178 case ALLOW:
370 data->recommendation = ALLOW;
  /external/selinux/python/sepolgen/src/sepolgen/
policygen.py 52 It generates allow rules and optionally module require
54 only allow rules are generated. The methods .set_gen_refpol
164 if av.type == audit2why.ALLOW:
176 rule.comment += "\n#!!!! This avc is a constraint violation. You would need to modify the attributes of either the source or target types to allow this access."
190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]:
207 # into raw allow rules and interfaces. After this
209 # used as raw allow rules and the interfaces will
217 # Generate the raw allow rules from the filtered list
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/site-packages/sepolgen/
policygen.py 52 It generates allow rules and optionally module require
54 only allow rules are generated. The methods .set_gen_refpol
164 if av.type == audit2why.ALLOW:
176 rule.comment += "\n#!!!! This avc is a constraint violation. You would need to modify the attributes of either the source or target types to allow this access."
190 for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERMS: av.perms})]:
207 # into raw allow rules and interfaces. After this
209 # used as raw allow rules and the interfaces will
217 # Generate the raw allow rules from the filtered list

Completed in 882 milliseconds

1 2 3 4