/external/nist-sip/java/gov/nist/javax/sip/header/ |
D | Allow.java | 54 super(ALLOW); in Allow() 61 super(ALLOW); in Allow()
|
D | SIPHeaderNames.java | 48 public static final String ALLOW = AllowHeader.NAME; //5 field
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
D | AllowParser.java | 71 headerName(TokenTypes.ALLOW); in parse() 74 allow.setHeaderName(SIPHeaderNames.ALLOW); in parse()
|
D | TokenTypes.java | 58 public static final int ALLOW = START + 21; field
|
D | Lexer.java | 152 addKeyword(AllowHeader.NAME.toUpperCase(), TokenTypes.ALLOW); in selectLexer()
|
/external/minijail/tools/ |
D | generate_seccomp_policy.py | 46 ALLOW = '1' variable 155 arg_filter = ALLOW
|
/external/cldr/tools/java/org/unicode/cldr/test/ |
D | CheckCLDR.java | 87 ALLOW, enumConstant 130 public static final StatusAction SHOW_VOTING_AND_ADD = ALLOW; 198 return StatusAction.ALLOW; in getShowRowAction() 212 ? StatusAction.ALLOW in getShowRowAction() 226 ? StatusAction.ALLOW in getShowRowAction() 266 return StatusAction.ALLOW; in getAcceptNewItemAction() 271 return StatusAction.ALLOW; in getAcceptNewItemAction() 282 return StatusAction.ALLOW; in getAcceptNewItemAction() 289 return StatusAction.ALLOW; in getAcceptNewItemAction() 296 return StatusAction.ALLOW; in getAcceptNewItemAction()
|
/external/selinux/python/sepolicy/sepolicy/ |
D | __init__.py | 42 ALLOW = 'allow' variable 342 valid_types = set([ALLOW, AUDITALLOW, NEVERALLOW, DONTAUDIT, TRANSITION, ROLE_ALLOW]) 362 if ALLOW in types: 363 tertypes.append(ALLOW) 491 permlist = search([ALLOW], {'source': setype, 'permlist': ['open', 'write'], 'class': 'file'}) 704 permlist = search([ALLOW], {'source': setype}) 722 ruletype=[ALLOW], 838 q = setools.RBACRuleQuery(_pol, ruletype=[ALLOW]) 1114 all_allow_rules = search([ALLOW])
|
D | booleans.py | 33 …allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy…
|
D | communicate.py | 42 …allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy…
|
D | network.py | 26 …allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy…
|
D | transition.py | 27 trans = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src})
|
/external/selinux/python/sepolgen/tests/ |
D | test_policygen.py | 105 self.assertEqual(av_rule1.rule_type, av_rule1.ALLOW) 121 self.assertEqual(av_rule2.rule_type, av_rule2.ALLOW)
|
/external/selinux/libselinux/src/ |
D | audit2why.c | 25 #define ALLOW 0 macro 382 RETURN(ALLOW) in analyze() 482 PyModule_AddIntConstant(m,"ALLOW", ALLOW);
|
/external/selinux/checkpolicy/ |
D | policy_scan.l | 140 ALLOW | 141 allow { return(ALLOW); }
|
D | policy_parse.y | 127 %token ALLOW 436 cond_allow_def : ALLOW names names ':' names names ';' 477 allow_def : ALLOW names names ':' names names ';' 520 role_allow_def : ALLOW names names ';'
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_tnc.c | 21 enum { ALLOW, ISOLATE, NO_ACCESS, NO_RECOMMENDATION } recommendation; enumerator 178 case ALLOW: in eap_tnc_build_recommendation() 370 data->recommendation = ALLOW; in tncs_process()
|
/external/mdnsresponder/mDNSShared/ |
D | dnsextd_lexer.l | 70 allow return ALLOW;
|
D | dnsextd_parser.y | 118 %token ALLOW
|
/external/guava/guava/src/com/google/common/net/ |
D | HttpHeaders.java | 138 public static final String ALLOW = "Allow"; field in HttpHeaders
|
/external/selinux/python/sepolgen/src/sepolgen/ |
D | policygen.py | 175 if av.type == audit2why.ALLOW: 205 …for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERM…
|
D | refpolicy.py | 517 ALLOW = 0 variable in AVRule 528 self.rule_type = self.ALLOW 533 if self.rule_type == self.ALLOW:
|
/external/python/apitools/samples/iam_sample/iam_v1/ |
D | iam_v1_messages.py | 691 ALLOW = 1 variable in Rule.ActionValueValuesEnum
|
/external/selinux/python/audit2allow/ |
D | audit2why | 254 if rc == audit2why.ALLOW:
|
D | audit2allow | 254 if rc == audit2why.ALLOW:
|