/external/llvm-project/llvm/test/Transforms/HardwareLoops/ |
D | unconditional-latch.ll | 1 …twidth=32 -hardware-loops -S %s -o - | FileCheck %s --check-prefix=CHECK --check-prefix=CHECK-ALLOW 2 …-hardware-loop-guard=true -S %s -o - | FileCheck %s --check-prefix=CHECK --check-prefix=CHECK-ALLOW 9 ; CHECK-ALLOW: bb: 10 ; CHECK-ALLOW: [[COUNT:%[^ ]+]] = add i32 %arg, 1 11 ; CHECK-ALLOW: br label %bb3 12 ; CHECK-ALLOW: bb5: 13 ; CHECK-ALLOW: call void @llvm.set.loop.iterations.i32(i32 [[COUNT]]) 14 ; CHECK-ALLOW: br label %bb7 16 ; CHECK-ALLOW: [[CMP:%[^ ]+]] = call i1 @llvm.loop.decrement.i32(i32 1) 17 ; CHECK-ALLOW: br i1 [[CMP]], label %bb10, label %bb16
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
D | Allow.java | 54 super(ALLOW); in Allow() 61 super(ALLOW); in Allow()
|
D | SIPHeaderNames.java | 48 public static final String ALLOW = AllowHeader.NAME; //5 field
|
/external/jimfs/jimfs/src/test/java/com/google/common/jimfs/ |
D | AclAttributeProviderTest.java | 24 import static java.nio.file.attribute.AclEntryType.ALLOW; 56 .setType(ALLOW) 63 .setType(ALLOW)
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
D | AllowParser.java | 71 headerName(TokenTypes.ALLOW); in parse() 74 allow.setHeaderName(SIPHeaderNames.ALLOW); in parse()
|
D | TokenTypes.java | 58 public static final int ALLOW = START + 21; field
|
/external/dagger2/java/dagger/internal/codegen/binding/ |
D | ComponentRequirement.java | 110 ALLOW, enumConstant 135 : NullPolicy.ALLOW; in nullPolicy() 231 nullable ? Optional.of(NullPolicy.ALLOW) : Optional.empty(), in forBoundInstance()
|
/external/selinux/python/sepolgen/tests/ |
D | test_policygen.py | 105 self.assertEqual(av_rule1.rule_type, av_rule1.ALLOW) 121 self.assertEqual(av_rule2.rule_type, av_rule2.ALLOW)
|
/external/selinux/python/sepolicy/sepolicy/ |
D | __init__.py | 42 ALLOW = 'allow' variable 342 valid_types = set([ALLOW, AUDITALLOW, NEVERALLOW, DONTAUDIT, TRANSITION, ROLE_ALLOW]) 362 if ALLOW in types: 363 tertypes.append(ALLOW) 491 permlist = search([ALLOW], {'source': setype, 'permlist': ['open', 'write'], 'class': 'file'}) 703 permlist = search([ALLOW], {'source': setype}) 721 ruletype=[ALLOW], 837 q = setools.RBACRuleQuery(_pol, ruletype=[ALLOW]) 1113 all_allow_rules = search([ALLOW])
|
D | booleans.py | 33 …allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy…
|
D | communicate.py | 42 …allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy…
|
D | network.py | 26 …allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy…
|
D | transition.py | 27 trans = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src})
|
/external/cldr/tools/java/org/unicode/cldr/test/ |
D | CheckCLDR.java | 91 ALLOW, enumConstant 187 return StatusAction.ALLOW; in getShowRowAction() 205 ? StatusAction.ALLOW in getShowRowAction() 215 ? StatusAction.ALLOW in getShowRowAction() 255 return StatusAction.ALLOW; in getAcceptNewItemAction() 260 return StatusAction.ALLOW; in getAcceptNewItemAction() 271 return StatusAction.ALLOW; in getAcceptNewItemAction() 278 return StatusAction.ALLOW; in getAcceptNewItemAction() 285 return StatusAction.ALLOW; in getAcceptNewItemAction()
|
/external/selinux/libselinux/src/ |
D | audit2why.c | 25 #define ALLOW 0 macro 382 RETURN(ALLOW) in analyze() 482 PyModule_AddIntConstant(m,"ALLOW", ALLOW);
|
/external/mdnsresponder/mDNSShared/ |
D | dnsextd_lexer.l | 70 allow return ALLOW;
|
/external/selinux/checkpolicy/ |
D | policy_scan.l | 140 ALLOW | 141 allow { return(ALLOW); }
|
D | policy_parse.y | 127 %token ALLOW 438 cond_allow_def : ALLOW names names ':' names names ';' 479 allow_def : ALLOW names names ':' names names ';' 522 role_allow_def : ALLOW names names ';'
|
/external/minijail/tools/ |
D | generate_seccomp_policy.py | 53 ALLOW = '1' variable 351 arg_filter = ALLOW
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_tnc.c | 21 enum { ALLOW, ISOLATE, NO_ACCESS, NO_RECOMMENDATION } recommendation; enumerator 178 case ALLOW: in eap_tnc_build_recommendation() 370 data->recommendation = ALLOW; in tncs_process()
|
/external/dagger2/java/dagger/internal/codegen/componentgenerator/ |
D | ComponentCreatorImplementationFactory.java | 240 requirement.nullPolicy(elements, types, metadataUtil).equals(NullPolicy.ALLOW) in normalSetterMethod() 330 case ALLOW: in addNullHandlingForField() 337 if (!requirement.nullPolicy(elements, types, metadataUtil).equals(NullPolicy.ALLOW)) { in addNullHandlingForParameter()
|
/external/selinux/python/sepolgen/src/sepolgen/ |
D | policygen.py | 175 if av.type == audit2why.ALLOW: 205 …for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERM…
|
D | refpolicy.py | 517 ALLOW = 0 variable in AVRule 528 self.rule_type = self.ALLOW 533 if self.rule_type == self.ALLOW:
|
/external/guava/android/guava/src/com/google/common/net/ |
D | HttpHeaders.java | 206 public static final String ALLOW = "Allow"; field in HttpHeaders
|
/external/guava/guava/src/com/google/common/net/ |
D | HttpHeaders.java | 206 public static final String ALLOW = "Allow"; field in HttpHeaders
|