Home
last modified time | relevance | path

Searched refs:allow (Results 1 – 25 of 3509) sorted by relevance

12345678910>>...141

/third_party/selinux/secilc/test/
Dbounds.cil13 (allow TYPE self (CLASS (PERM)))
50 (allow b_t1 self (CLASS (PERM)))
51 (allow b_t1_c self (CLASS (PERM)))
52 (allow b_t1 b_ta (CLASS (PERM)))
53 (allow b_t1_c b_ta (CLASS (PERM)))
54 (allow b_ta b_t1 (CLASS (PERM)))
55 (allow b_ta b_t1_c (CLASS (PERM)))
59 (allow b_t1 b_tb (CLASS (PERM)))
60 (allow b_t1_c b_tb (CLASS (PERM)))
61 (allow b_tb b_t1 (CLASS (PERM)))
[all …]
Din_test.cil14 (allow TYPE self (CLASS (PERM)))
28 (allow t1b self (CLASS (PERM1)))
33 (allow t1a self (CLASS (PERM1)))
37 (allow t1a self (CLASS (PERM2)))
38 (allow b1.t1a self (CLASS (PERM3)))
39 (allow .b1.t1a self (CLASS (PERM4)))
41 (allow t1b self (CLASS (PERM2)))
42 (allow b1.t1b self (CLASS (PERM3)))
43 (allow .b1.t1b self (CLASS (PERM4)))
50 (allow t2b self (CLASS (PERM1)))
[all …]
Dname_resolution_test.cil14 (allow TYPE self (CLASS (PERM)))
27 (allow t0 self (CLASS (PERM1)))
28 (allow .t0 self (CLASS (PERM2)))
34 (allow t1a self (CLASS (PERM)))
35 (allow b1b.t1b self (CLASS (PERM)))
38 (allow t1a self (CLASS (PERM1)))
39 (allow t1b self (CLASS (PERM1)))
40 (allow .b1a.t1a self (CLASS (PERM2)))
41 (allow .b1a.b1b.t1b self (CLASS (PERM2)))
44 (allow b1a.t1a self (CLASS (PERM3)))
[all …]
Dneverallow.cil13 (allow TYPE self (CLASS (PERM)))
57 (allow t1 t2 (c1 (p1a)))
60 (allow t3 t4 (c1 (p1a)))
63 (allow t5 t6 (c1 (p1b)))
64 (allow t5 t6 (c2 (p2a)))
67 (allow t1 t1 (CLASS (PERM)))
68 (allow t2 self (CLASS (PERM)))
69 (allow a3 self (CLASS (PERM)))
70 (allow a2 a4 (CLASS (PERM)))
73 (allow t5 t7 (CLASS (PERM)))
[all …]
Dblock_test.cil14 (allow TYPE self (CLASS (PERM)))
56 (allow t3a t (CLASS (PERM)))
79 ;; Since block is abstract, allow rule will not be in policy
83 (allow t4 self (CLASS (PERM)))
87 ;; Inheriting the abstract block causes the allow rule to be in the policy
91 (allow t5 self (CLASS (PERM)))
100 (allow t6 self (CLASS (PERM1)))
103 (allow t6 self (CLASS (PERM)))
120 ;; allow b3a.t3a b3a.b.t : CLASS { PERM };
121 ;; allow b3a.t3a b3c.t : CLASS { PERM };
[all …]
Doptional_test.cil14 (allow TYPE self (CLASS (PERM)))
28 (allow t1 self (CLASS (PERM))) ;; Should not appear in policy
29 (allow UNKNOWN self (CLASS (PERM)))
36 (allow t2 self (CLASS (PERM1)))
42 (allow t2 DNE (CLASS (PERM)))
50 (allow t2 self (CLASS (PERM)))
60 ;; (allow t3 DNE (CLASS (PERM)))
63 ;; (allow t3 self (CLASS (PERM1)))
75 ;; allow b2a.t2 b2a.t2 : CLASS { PERM1 };
76 ;; allow b2b.t2 b2b.t2 : CLASS { PERM1 };
[all …]
Dopt-input.cil25 (allow at02 tpr1 (cl01 (p11a p01a p01b)))
26 (allow at02 tpr3 (cl01 (p11a p01a p01b)))
27 (allow tp01 at01 (cl01 (p11b)))
28 (allow tp01 self (cl01 (p11a p01a)))
29 (allow tp01 tp01 (cl01 (p01b)))
30 (allow tp01 tpr1 (cl01 (p11a p11b p01a p01b)))
31 (allow tp02 tpr1 (cl01 (p11a p01a)))
38 (allow tp01 tpr3 (cl01 (p11a p11b p01a p01b)))
39 (allow tp01 tpr5 (cl01 (p11a p11b p01a p01b)))
40 (allow tp02 tpr3 (cl01 (p11a p01a)))
[all …]
Dopt-expected.cil25 (allow at02 tpr1 (cl01 (p01a p01b p11a)))
26 (allow at02 tpr3 (cl01 (p01a p01b p11a)))
27 (allow tp01 at01 (cl01 (p11b)))
28 (allow tp01 self (cl01 (p01a p01b p11a)))
29 (allow tp01 tpr1 (cl01 (p11b)))
35 (allow tp01 tpr3 (cl01 (p11b)))
36 (allow tp01 tpr5 (cl01 (p01a p01b p11a p11b)))
37 (allow tp02 tpr5 (cl01 (p01a p11a)))
41 (allow at02 tpr5 (cl01 (p01a p01b p11a)))
Dintegration.cil57 (allow console_t console_device_t file_rw)
58 (allow console_t console_device_t (files (read)))
86 (allow foo_type self (file (execute)))
87 (allow bin_t device_t (file (execute)))
98 (allow getty_t console_device_t (file (getattr open read write append)))
108 (allow bin_t exec_t (file (execute)))
119 (allow bin_t exec_t (file (execute)))
124 (allow user_t exec_t (bins (execute)))
204 (allow x bin_t (file (execute)))
215 (allow a_t b_t (file (write))))
[all …]
/third_party/selinux/libsepol/tests/policies/test-cond/
Drefpolicy-base.conf977 allow bin_t fs_t:filesystem associate;
978 allow bin_t noxattrfs:filesystem associate;
980 allow sbin_t fs_t:filesystem associate;
981 allow sbin_t noxattrfs:filesystem associate;
983 allow ls_exec_t fs_t:filesystem associate;
984 allow ls_exec_t noxattrfs:filesystem associate;
987 allow shell_exec_t fs_t:filesystem associate;
988 allow shell_exec_t noxattrfs:filesystem associate;
990 allow chroot_exec_t fs_t:filesystem associate;
991 allow chroot_exec_t noxattrfs:filesystem associate;
[all …]
/third_party/openssl/test/ssl-tests/
D03-custom_verify.conf7 test-2 = 2-verify-custom-allow
10 test-5 = 5-noverify-accept-custom-allow
67 [2-verify-custom-allow]
68 ssl_conf = 2-verify-custom-allow-ssl
70 [2-verify-custom-allow-ssl]
71 server = 2-verify-custom-allow-server
72 client = 2-verify-custom-allow-client
74 [2-verify-custom-allow-server]
79 [2-verify-custom-allow-client]
86 client = 2-verify-custom-allow-client-extra
[all …]
/third_party/boost/boost/vmd/detail/
Dmods.hpp575 #define BOOST_VMD_DETAIL_MODS_LOOP(allow,tuple) \ argument
588 allow \
594 #define BOOST_VMD_DETAIL_MODS_LOOP_D(d,allow,tuple) \ argument
607 allow \
613 #define BOOST_VMD_DETAIL_NEW_MODS_VAR(allow,tuple) \ argument
616 allow, \
621 #define BOOST_VMD_DETAIL_NEW_MODS_VAR_D(d,allow,tuple) \ argument
625 allow, \
630 #define BOOST_VMD_DETAIL_NEW_MODS_IR(allow,tuple) \ argument
639 (allow,tuple) \
[all …]
/third_party/icu/icu4j/main/classes/core/src/com/ibm/icu/impl/
DSortedSetRelation.java72 …ds Object & Comparable<? super T>> boolean hasRelation(SortedSet<T> a, int allow, SortedSet<T> b) { in hasRelation() argument
73 if (allow < NONE || allow > ANY) { in hasRelation()
74 throw new IllegalArgumentException("Relation " + allow + " out of range"); in hasRelation()
80 boolean anb = (allow & A_NOT_B) != 0; in hasRelation()
81 boolean ab = (allow & A_AND_B) != 0; in hasRelation()
82 boolean bna = (allow & B_NOT_A) != 0; in hasRelation()
85 switch(allow) { in hasRelation()
/third_party/icu/ohos_icu4j/src/main/java/ohos/global/icu/impl/
DSortedSetRelation.java74 …ds Object & Comparable<? super T>> boolean hasRelation(SortedSet<T> a, int allow, SortedSet<T> b) { in hasRelation() argument
75 if (allow < NONE || allow > ANY) { in hasRelation()
76 throw new IllegalArgumentException("Relation " + allow + " out of range"); in hasRelation()
82 boolean anb = (allow & A_NOT_B) != 0; in hasRelation()
83 boolean ab = (allow & A_AND_B) != 0; in hasRelation()
84 boolean bna = (allow & B_NOT_A) != 0; in hasRelation()
87 switch(allow) { in hasRelation()
/third_party/typescript_eslint/packages/eslint-plugin/docs/rules/
Dno-empty-function.md36 allow?: Array<AllowOptionEntries>;
40 allow: [],
44 ### allow: `private-constructors`
46 Examples of correct code for the `{ "allow": ["private-constructors"] }` option:
54 ### allow: `protected-constructors`
56 Examples of correct code for the `{ "allow": ["protected-constructors"] }` option:
64 ### allow: `decoratedFunctions`
66 Examples of correct code for the `{ "allow": ["decoratedFunctions"] }` option:
Dban-ts-comment.md17 This rule lets you set which directive comments you want to allow in your codebase.
24 'ts-expect-error'?: boolean | 'allow-with-description';
25 'ts-ignore'?: boolean | 'allow-with-description';
26 'ts-nocheck'?: boolean | 'allow-with-description';
27 'ts-check'?: boolean | 'allow-with-description';
32 'ts-expect-error': 'allow-with-description',
68 ### `allow-with-description`
70 A value of `'allow-with-description'` for a particular directive means that this rule will report i…
72 For example, with `{ 'ts-expect-error': 'allow-with-description' }` the following patterns are cons…
102 Use `minimumDescriptionLength` to set a minimum length for descriptions when using the `allow-with-…
[all …]
/third_party/boost/tools/build/src/tools/features/
Dallow-feature.jam10 [[bbv2.builtin.features.allow]]`allow`::
11 This feature is used to allow specific generators to run. For example, Qt tools
12 can only be invoked when Qt library is used. In that case, `<allow>qt` will be
17 feature.feature allow
/third_party/typescript_eslint/packages/eslint-plugin/tests/rules/
Dno-empty-function.test.ts33 options: [{ allow: ['constructors'] }],
41 options: [{ allow: ['methods'] }],
49 options: [{ allow: ['private-constructors'] }],
57 options: [{ allow: ['protected-constructors'] }],
73 options: [{ allow: ['decoratedFunctions'] }],
/third_party/typescript_eslint/packages/eslint-plugin/src/rules/
Dno-empty-function.ts17 allow: {
55 allow: [],
58 create(context, [{ allow = [] }]) {
61 const isAllowedProtectedConstructors = allow.includes(
64 const isAllowedPrivateConstructors = allow.includes('private-constructors');
65 const isAllowedDecoratedFunctions = allow.includes('decoratedFunctions');
/third_party/selinux/libsepol/src/
Dassertion.c88 …atic int check_extended_permissions(av_extended_perms_t *neverallow, avtab_extended_perms_t *allow) in check_extended_permissions() argument
92 && (allow->specified == AVTAB_XPERMS_IOCTLFUNCTION)) { in check_extended_permissions()
93 if (neverallow->driver == allow->driver) in check_extended_permissions()
94 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions()
96 && (allow->specified == AVTAB_XPERMS_IOCTLDRIVER)) { in check_extended_permissions()
97 rc = xperm_test(neverallow->driver, allow->perms); in check_extended_permissions()
99 && (allow->specified == AVTAB_XPERMS_IOCTLFUNCTION)) { in check_extended_permissions()
100 rc = xperm_test(allow->driver, neverallow->perms); in check_extended_permissions()
102 && (allow->specified == AVTAB_XPERMS_IOCTLDRIVER)) { in check_extended_permissions()
103 rc = extended_permissions_and(neverallow->perms, allow->perms); in check_extended_permissions()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/dbus/
Ddbus-wpa_supplicant.conf6 <allow own="fi.w1.wpa_supplicant1"/>
8 <allow send_destination="fi.w1.wpa_supplicant1"/>
9 <allow send_interface="fi.w1.wpa_supplicant1"/>
10 <allow receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/dbus/
Ddbus-wpa_supplicant.conf6 <allow own="fi.w1.wpa_supplicant1"/>
8 <allow send_destination="fi.w1.wpa_supplicant1"/>
9 <allow send_interface="fi.w1.wpa_supplicant1"/>
10 <allow receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
/third_party/skia/buildtools/checkdeps/
Drules.py24 def __init__(self, allow, directory, dependent_directory, source): argument
25 self.allow = allow
31 return '"%s%s" from %s.' % (self.allow, self._dir, self._source)
38 return self.allow, self._dependent_dir or '.', self._dir or '.'
127 (allow, dependent, dependee) = rule.AsDependencyTuple()
128 tup = (allow, dependent + extra_dependent_suffix, dependee)
Dgraphdeps.py146 for (allow, src, dst) in deps:
147 if allow == Rule.TEMP_ALLOW and self.ignore_temp_rules:
153 deps_graph[src].append((dst, allow))
173 for (dst, allow) in deps_graph[parent_src]:
179 deps_graph[src].append((dst, allow))
191 for (dst, allow) in deps_graph[src]:
192 if allow == Rule.DISALLOW and self.hide_disallowed_deps:
195 if allow == Rule.ALLOW and src == dst:
222 if allow == Rule.ALLOW:
225 elif allow == Rule.TEMP_ALLOW:
/third_party/selinux/secilc/docs/
Dcil_reference_guide.md8 …t build a policy unless it also has as a minimum: one [`allow`](cil_access_vector_rules.md#allow) …
14 …ning source/target [`allow`](cil_access_vector_rules.md#allow) rules instead of multiple [`allow`]…
89 - `(allow domain process (file (read write))))` - Adds an [`allow`](cil_access_vector_rules.md#al…
119 …onship a dot '`.`' is used, for example the following [`allow`](cil_access_vector_rules.md#allow) …
127 (allow process object (file (open read getattr)))
134 allow example_ns.process example_ns.object : example_ns.file { open read getattr };
159 (allow tmpfs tmpfs (file (open)))
161 ; allow file.tmpfs file.tmpfs : file.file open;
164 (allow tmpfs .tmpfs (file (read)))
166 ; allow file.tmpfs tmpfs : file.file read;
[all …]

12345678910>>...141