/external/nist-sip/java/gov/nist/javax/sip/header/ |
D | Allow.java | 54 super(ALLOW); in Allow() 61 super(ALLOW); in Allow()
|
D | SIPHeaderNames.java | 48 public static final String ALLOW = AllowHeader.NAME; //5 field
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
D | AllowParser.java | 71 headerName(TokenTypes.ALLOW); in parse() 74 allow.setHeaderName(SIPHeaderNames.ALLOW); in parse()
|
D | TokenTypes.java | 58 public static final int ALLOW = START + 21; field
|
D | Lexer.java | 152 addKeyword(AllowHeader.NAME.toUpperCase(), TokenTypes.ALLOW); in selectLexer()
|
/external/minijail/tools/ |
D | generate_seccomp_policy.py | 38 ALLOW = "%s: 1" variable 161 print ALLOW % syscall
|
/external/selinux/python/sepolicy/sepolicy/ |
D | __init__.py | 43 ALLOW = 'allow' variable 295 valid_types = set([ALLOW, AUDITALLOW, NEVERALLOW, DONTAUDIT, TRANSITION, ROLE_ALLOW]) 315 if ALLOW in types: 316 tertypes.append(ALLOW) 366 allows = search([ALLOW], {SOURCE: src, TARGET: dest, CLASS: tclass, PERMS: perm}) 369 allows = search([ALLOW], {SOURCE: src, CLASS: tclass, PERMS: perm}) 419 permlist = search([ALLOW], {'source': setype, 'permlist': ['open', 'write'], 'class': 'file'}) 622 permlist = search([ALLOW], {'source': setype}) 640 ruletype=[ALLOW], 751 q = setools.RBACRuleQuery(_pol, ruletype=[ALLOW]) [all …]
|
D | booleans.py | 34 …allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy…
|
D | communicate.py | 43 …allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy…
|
D | network.py | 27 …allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy…
|
D | transition.py | 28 trans = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src})
|
D | manpage.py | 941 …entrypoints = [x['target'] for x in sepolicy.search([sepolicy.ALLOW], {'source': self.type, 'perml… 983 …permlist = sepolicy.search([sepolicy.ALLOW], {'source': self.type, 'permlist': ['open', 'write'], … 1190 …permlist = sepolicy.search([sepolicy.ALLOW], {'source': self.type, 'target': 'user_home_type', 'cl…
|
/external/selinux/libselinux/src/ |
D | audit2why.c | 25 #define ALLOW 0 macro 382 RETURN(ALLOW) in analyze() 482 PyModule_AddIntConstant(m,"ALLOW", ALLOW);
|
/external/selinux/checkpolicy/ |
D | policy_scan.l | 139 ALLOW | 140 allow { return(ALLOW); }
|
D | policy_parse.y | 126 %token ALLOW 433 cond_allow_def : ALLOW names names ':' names names ';' 474 allow_def : ALLOW names names ':' names names ';' 517 role_allow_def : ALLOW names names ';'
|
/external/mdnsresponder/mDNSShared/ |
D | dnsextd_lexer.l | 70 allow return ALLOW;
|
D | dnsextd_parser.y | 118 %token ALLOW
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_tnc.c | 21 enum { ALLOW, ISOLATE, NO_ACCESS, NO_RECOMMENDATION } recommendation; enumerator 178 case ALLOW: in eap_tnc_build_recommendation() 370 data->recommendation = ALLOW; in tncs_process()
|
/external/guava/guava/src/com/google/common/net/ |
D | HttpHeaders.java | 138 public static final String ALLOW = "Allow"; field in HttpHeaders
|
/external/crcalc/ |
D | COPYRIGHT.txt | 29 LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE 69 LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE
|
/external/selinux/python/sepolgen/src/sepolgen/ |
D | policygen.py | 164 if av.type == audit2why.ALLOW: 190 …for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERM…
|
D | refpolicy.py | 450 ALLOW = 0 variable in AVRule 461 self.rule_type = self.ALLOW 466 if self.rule_type == self.ALLOW:
|
/external/selinux/python/sepolgen/tests/ |
D | test_refpolicy.py | 87 self.assertEqual(a.rule_type, a.ALLOW)
|
/external/selinux/python/audit2allow/ |
D | audit2allow | 249 if rc == audit2why.ALLOW:
|
D | audit2why | 249 if rc == audit2why.ALLOW:
|