/external/nist-sip/java/gov/nist/javax/sip/header/ |
D | AllowList.java | 43 public class AllowList extends SIPHeaderList<Allow> { 62 super(Allow.class, AllowHeader.NAME); in AllowList() 82 for ( Iterator<Allow> it = this.hlist.iterator(); it.hasNext();) { in getMethods() 83 Allow a = (Allow)it.next(); in getMethods() 108 Allow allow = new Allow(); in setMethods()
|
D | Allow.java | 40 public final class Allow extends class 53 public Allow() { in Allow() method in Allow 60 public Allow(String m) { in Allow() method in Allow
|
D | NameMap.java | 87 putNameMap(Allow.NAME, Allow.class.getName()); // 5 in initializeNameMap()
|
/external/sepolicy/ |
D | te_macros | 3 # Allow a transition from olddomain to newdomain 29 # Allow the necessary permissions. 37 # Allow domain to create a file labeled file_type in a 44 # Allow the domain to add entries to the directory. 46 # Allow the domain to create the file. 57 # Allow the necessary permissions. 66 # Allow the specified domain to read directories, files 75 # Allow the specified domain to do anything. 104 # Allow a base set of permissions required for all apps. 120 # Allow permissions specific to platform apps. [all …]
|
D | app.te | 10 # Allow apps to connect to the keystore 84 # Allow all applications to read downloaded files 88 # Allow applications to communicate with netd via /dev/socket/dnsproxyd 92 # Allow applications to communicate with drmserver over binder 95 # Allow applications to communicate with mediaserver over binder 98 # Allow applications to make outbound tcp connections to any port 101 # Allow apps to see changes to the routing table. 115 # Allow apps to use rawip sockets. This is needed for apps which execute
|
D | netd.te | 43 # Allow netd to spawn hostapd in it's own domain 47 # Allow netd to spawn dnsmasq in it's own domain 51 # Allow netd to start clatd in its own domain
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
D | AllowParser.java | 73 Allow allow = new Allow(); in parse() 87 allow = new Allow(); in parse()
|
/external/llvm/utils/lit/ |
D | TODO | 13 - Allow import of 'lit' in test suite definitions. 18 - Allow 'lit' driver to cooperate with test suites to add options (or at least
|
/external/chromium_org/chrome/ |
D | DEPS | 30 # Allow inclusion of WebKit API files. 34 # Allow inclusion of third-party code:
|
/external/chromium_org/chrome/browser/policy/ |
D | url_blacklist_manager_unittest.cc | 389 blacklist.Allow(allowed.get()); in TEST_F() 416 blacklist.Allow(allowed.get()); in TEST_F() 424 blacklist.Allow(allowed.get()); in TEST_F() 435 blacklist.Allow(allowed.get()); in TEST_F() 447 blacklist.Allow(allowed.get()); in TEST_F() 461 blacklist.Allow(allowed.get()); in TEST_F() 476 blacklist.Allow(allowed.get()); in TEST_F()
|
/external/proguard/examples/ |
D | retrace.pro | 26 # Allow methods with the same signature, except for the return type, 35 # Allow classes and class members to be made public.
|
D | midlets.pro | 19 # Allow methods with the same signature, except for the return type, 28 # Allow classes and class members to be made public.
|
D | proguard.pro | 21 # Allow methods with the same signature, except for the return type, 30 # Allow classes and class members to be made public.
|
/external/chromium_org/ppapi/tests/ |
D | test_case.html.mock-http-headers | 3 Access-Control-Allow-Origin: *
|
/external/chromium_org/content/common/ |
D | common.sb | 19 ; Allow sending signals to self - http://crbug.com/20370 38 ; Allow direct access to /dev/urandom, similar to Linux/POSIX, to allow
|
/external/chromium_org/sync/test/accounts_client/ |
D | DEPS | 2 # Allow this directory to depend on net since it's test infrastructure and
|
/external/chromium_org/win8/metro_driver/ |
D | DEPS | 2 # Allow metro_driver to include from delegate_execute *temporarily*.
|
/external/chromium_org/components/autofill/content/ |
D | DEPS | 3 # Allow inclusion of WebKit API files.
|
/external/chromium_org/ui/app_list/ |
D | DEPS | 7 # Allow inclusion of third-party code:
|
/external/clang/test/SemaObjC/ |
D | stand-alone-implementation.m | 3 // Allow injection of ivars into implementation's implicit class.
|
/external/clang/test/CodeGenObjC/ |
D | stand-alone-implementation.m | 4 // Allow injection of ivars into implementation's implicit class.
|
/external/chromium/chrome/browser/ui/cocoa/ |
D | gradient_button_cell_unittest.mm | 102 // Allow for immediate state changes to keep test unflaky 107 // Allow for immediate state changes to keep test unflaky
|
/external/chromium_org/third_party/python_gflags/ |
D | ChangeLog | 48 * Allow key-flags to work with special flags (salcianu) 49 * Allow printing flags of a specific module (mikecurtis)
|
/external/chromium-trace/trace-viewer/third_party/python_gflags/ |
D | ChangeLog | 48 * Allow key-flags to work with special flags (salcianu) 49 * Allow printing flags of a specific module (mikecurtis)
|
/external/clang/test/Parser/ |
D | warn-semicolon-before-method-body.m | 4 // Allow optional semicolon in objc method definiton after method prototype,
|