/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
D | dbus-wpa_supplicant.conf | 18 <deny own="fi.epitest.hostap.WPASupplicant"/> 19 <deny send_destination="fi.epitest.hostap.WPASupplicant"/> 20 <deny send_interface="fi.epitest.hostap.WPASupplicant"/> 22 <deny own="fi.w1.wpa_supplicant1"/> 23 <deny send_destination="fi.w1.wpa_supplicant1"/> 24 <deny send_interface="fi.w1.wpa_supplicant1"/> 25 <deny receive_sender="fi.w1.wpa_supplicant1" receive_type="signal"/>
|
/external/qemu/ |
D | acl.c | 83 return entry->deny ? 0 : 1; in qemu_acl_party_is_allowed() 88 return entry->deny ? 0 : 1; in qemu_acl_party_is_allowed() 114 int deny, in qemu_acl_append() argument 121 entry->deny = deny; in qemu_acl_append() 131 int deny, in qemu_acl_insert() argument 142 return qemu_acl_append(acl, deny, match); in qemu_acl_insert() 147 entry->deny = deny; in qemu_acl_insert()
|
D | acl.h | 35 int deny; member 57 int deny, 60 int deny,
|
D | qemu-monitor.hx | 578 "acl policy vnc.username deny\n" 580 "acl deny vnc.username bob\n" 594 @item acl policy <aclname> @code{allow|deny} 597 always @code{deny} 605 @item acl deny <aclname> <match> [<index>] 616 policy back to @code{deny}.
|
D | monitor.c | 1606 entry->deny ? "deny" : "allow", in do_acl() 1629 int deny = strcmp(command, "deny") == 0 ? 1 : 0; in do_acl() local 1638 ret = qemu_acl_insert(acl, deny, match, index); in do_acl() 1640 ret = qemu_acl_append(acl, deny, match); in do_acl()
|
/external/dnsmasq/dbus/ |
D | dnsmasq.conf | 10 <deny own="uk.org.thekelleys.dnsmasq"/> 11 <deny send_destination="uk.org.thekelleys.dnsmasq"/>
|
/external/chromium_org/tools/python/google/httpd_config/ |
D | httpd.conf | 348 Order allow,deny 370 Order allow,deny 380 Order allow,deny 386 Order allow,deny
|
D | httpd2_mac.conf | 50 Order allow,deny 59 Order allow,deny 64 Order allow,deny
|
D | httpd2.conf | 101 Order allow,deny 110 Order allow,deny 115 Order allow,deny
|
D | httpd2_linux.conf | 80 Order allow,deny
|
/external/chromium_org/content/common/ |
D | common.sb | 14 (deny default @DISABLE_SANDBOX_DENIAL_LOGGING@) 17 ;ENABLE_LOGGING (debug deny)
|
D | sandbox_mac_diraccess_unittest.mm | 192 "(deny default)" \ 258 // Test that we deny access to a sibling of the sandboxed directory whose
|
/external/chromium_org/chrome/browser/ui/cocoa/ |
D | fullscreen_exit_bubble_controller.h | 50 - (void)deny:(id)sender;
|
D | fullscreen_exit_bubble_controller_unittest.mm | 106 [bubble deny:nil];
|
D | fullscreen_exit_bubble_controller.mm | 101 - (void)deny:(id)sender {
|
/external/dnsmasq/contrib/lease-access/ |
D | README | 3 For some specific application I needed to deny access to a MAC address
|
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/ |
D | AwGeolocationPermissions.java | 44 public void deny(String origin) { in deny() method in AwGeolocationPermissions
|
D | AwContents.java | 1815 mBrowserContext.getGeolocationPermissions().deny(origin);
|
/external/libppp/src/ |
D | README.changes | 109 is not required, you must ``deny chap05 chap80''. 138 this, you must explicitly deny it.
|
/external/openssh/ |
D | sshd_config.0 | 49 groups. The allow/deny directives are processed in the following 68 logins to particular users from particular hosts. The allow/deny 198 allow/deny directives are processed in the following order: 210 particular users from particular hosts. The allow/deny
|
D | INSTALL | 177 --with-tcp-wrappers will enable TCP Wrappers (/etc/hosts.allow|deny)
|
/external/chromium_org/chrome/renderer/resources/extensions/ |
D | web_view.js | 825 deny: function() { method
|
/external/checkpolicy/ |
D | ChangeLog | 127 Adds new command line options -U {allow, reject, deny} for selecting
|
/external/chromium_org/net/data/proxy_resolver_perftest/ |
D | no-ads.pac | 122 // and tell your browser to use a proxy that will deny loading of that resource 1280 // deny this request
|
/external/chromium/net/data/proxy_resolver_perftest/ |
D | no-ads.pac | 122 // and tell your browser to use a proxy that will deny loading of that resource 1280 // deny this request
|