HomeSort by relevance Sort by last modified time
    Searched refs:ALLOWED (Results 1 - 25 of 32) sorted by null

1 2

  /external/clang/test/Sema/
format-strings-gnu.c 19 #ifndef ALLOWED
38 #ifdef ALLOWED
format-strings-darwin.c 24 #ifdef ALLOWED
41 #ifdef ALLOWED
  /cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/userrestrictions/
PrimaryProfileOwnerUserRestrictionsTest.java 22 return DeviceOwnerUserRestrictionsTest.ALLOWED;
SecondaryProfileOwnerUserRestrictionsTest.java 24 public static final String[] ALLOWED = new String[] {
69 return ALLOWED;
99 expected.addAll(Arrays.asList(ALLOWED));
110 assertRestrictions(new HashSet<>(Arrays.asList(ALLOWED)));
DeviceOwnerUserRestrictionsTest.java 21 public static final String[] ALLOWED = new String[] {
73 return ALLOWED;
  /external/ltp/testcases/kernel/controllers/cpuctl/
cpuctl_latency_check_task.c 75 int fail = 0, ALLOWED;
90 ALLOWED = atoi(argv[3]);
91 if ((test_num < 0) || (script_pid < 0) || (ALLOWED < 0)) {
131 if (delta > ALLOWED)
  /build/make/core/
link_type.mk 19 $(link_type).ALLOWED := $(my_allowed_types)
main.mk 736 # - ALLOWED: the link types to allow in this module's dependencies
739 # All of the dependency link types not listed in ALLOWED or WARN will become
816 $(if $(filter-out $($(1).ALLOWED),$(t)),\
866 --type "$($(1).TYPE)" $(addprefix --allowed ,$($(1).ALLOWED)) \
    [all...]
  /packages/apps/SecureElement/src/com/android/se/security/ara/
AraController.java 98 araChannelAccess.setAccess(ChannelAccess.ACCESS.ALLOWED, mTag);
99 araChannelAccess.setApduAccess(ChannelAccess.ACCESS.ALLOWED);
  /packages/apps/SecureElement/src/com/android/se/security/arf/
SecureElement.java 142 arfChannelAccess.setAccess(ChannelAccess.ACCESS.ALLOWED, "");
143 arfChannelAccess.setApduAccess(ChannelAccess.ACCESS.ALLOWED);
  /external/wpa_supplicant_8/wpa_supplicant/
op_classes.c 39 return ALLOWED;
96 return ALLOWED;
158 return ALLOWED;
206 return ALLOWED;
235 /* Check if either 160 MHz channels is allowed */
wpa_supplicant_i.h     [all...]
p2p_supplicant.c     [all...]
  /packages/apps/SecureElement/src/com/android/se/security/arf/PKCS15/
EFACConditions.java 131 // if a hash value was found then access is allowed
138 channelAccess.setAccess(ChannelAccess.ACCESS.ALLOWED, "");
139 channelAccess.setApduAccess(ChannelAccess.ACCESS.ALLOWED);
187 ? ChannelAccess.ACCESS.ALLOWED
233 ? ChannelAccess.ACCESS.ALLOWED
  /packages/apps/SecureElement/src/com/android/se/security/
AccessControlEnforcer.java 146 mInitialChannelAccess.setApduAccess(ChannelAccess.ACCESS.ALLOWED);
147 mInitialChannelAccess.setNFCEventAccess(ChannelAccess.ACCESS.ALLOWED);
148 mInitialChannelAccess.setAccess(ChannelAccess.ACCESS.ALLOWED, "");
153 // When SE is not the UICC then it's allowed to grant full access if no
258 reason = "Command not allowed!";
260 if (ca.getAccess() != ACCESS.ALLOWED) {
277 if (ca.getApduAccess() == ChannelAccess.ACCESS.ALLOWED) {
280 throw new AccessControlException(mTag + "APDU access NOT allowed");
298 if (channelAccess == null || (channelAccess.getApduAccess() != ChannelAccess.ACCESS.ALLOWED
305 throw new AccessControlException(mTag + "no APDU access allowed!");
    [all...]
AccessRuleCache.java 85 channelAccess.setAccess(ChannelAccess.ACCESS.ALLOWED, "");
103 channelAccess.setApduAccess(ChannelAccess.ACCESS.ALLOWED);
106 // apdu access is not allowed at all.
117 ? ChannelAccess.ACCESS.ALLOWED
160 ca.setAccess(ChannelAccess.ACCESS.ALLOWED, ca.getReason());
167 // ALLOWED !DENIED ALLOWED
168 // ALLOWED DENIED DENIED
182 ca.setNFCEventAccess(ChannelAccess.ACCESS.ALLOWED);
188 // ALLOWED !DENIED ALLOWE
    [all...]
ChannelAccess.java 168 ALLOWED,
  /external/wpa_supplicant_8/src/pae/
ieee802_1x_cp.c 149 SM_STATE(CP, ALLOWED)
151 SM_ENTRY(CP, ALLOWED);
351 SM_ENTER(CP, ALLOWED);
  /prebuilts/tools/common/m2/repository/xhtmlrenderer/xhtmlrenderer/R8rc1/
xhtmlrenderer-R8rc1.jar 
  /toolchain/binutils/binutils-2.27/gas/testsuite/gas/arm/
sp-pc-validations-bad-t.s 49 @ldrb r0, [pc,#4] @ ALLOWED!
129 @ldrh r0, [pc] @ ALLOWED!
  /hardware/interfaces/radio/1.0/
types.hal 62 OP_NOT_ALLOWED_DURING_VOICE_CALL = 8, // data ops are not allowed during voice
64 OP_NOT_ALLOWED_BEFORE_REG_TO_NW = 9, // data ops are not allowed before device
107 OPERATION_NOT_ALLOWED = 54, // Not allowed the request now
318 ALLOWED,
    [all...]
  /frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/
SettingsProtoDumpUtil.java     [all...]
  /prebuilts/devtools/tools/lib/
bcpkix-jdk15on-1.48.jar 
  /prebuilts/tools/common/m2/repository/org/bouncycastle/bcpkix-jdk15on/1.48/
bcpkix-jdk15on-1.48.jar 
  /prebuilts/tools/common/offline-m2/org/bouncycastle/bcpkix-jdk15on/1.48/
bcpkix-jdk15on-1.48.jar 

Completed in 535 milliseconds

1 2