/external/nist-sip/java/gov/nist/javax/sip/header/ |
D | Allow.java | 54 super(ALLOW); in Allow() 61 super(ALLOW); in Allow()
|
D | SIPHeaderNames.java | 48 public static final String ALLOW = AllowHeader.NAME; //5 field
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
D | AllowParser.java | 71 headerName(TokenTypes.ALLOW); in parse() 74 allow.setHeaderName(SIPHeaderNames.ALLOW); in parse()
|
D | TokenTypes.java | 58 public static final int ALLOW = START + 21; field
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
D | __init__.py | 33 ALLOW = 'allow' variable 52 valid_types = [ALLOW, AUDITALLOW, NEVERALLOW, DONTAUDIT, TRANSITION, ROLE_ALLOW] 73 allows = search([ALLOW], {SOURCE: src, TARGET: dest, CLASS: tclass, PERMS: perm}) 76 allows = search([ALLOW], {SOURCE: src, CLASS: tclass, PERMS: perm}) 142 permlist = search([ALLOW], {'source': setype, 'permlist': ['open', 'write'], 'class': 'file'}) 361 permlist = search([ALLOW], {'source': setype}) 380 …ap(lambda x: x['target'], filter(lambda x: x['source'] == setype, search([ALLOW], {'source': setyp… 831 …for i in map(lambda x: x['boolean'], filter(lambda x: 'boolean' in x, search([ALLOW], {'source': s…
|
D | booleans.py | 37 …allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: p…
|
D | communicate.py | 45 …allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: p…
|
D | network.py | 29 …allows = search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: p…
|
D | transition.py | 30 trans = search([sepolicy.ALLOW], {sepolicy.SOURCE: src})
|
D | manpage.py | 898 …entrypoints = map(lambda x: x['target'], sepolicy.search([sepolicy.ALLOW], {'source': self.type, '… 929 …permlist = sepolicy.search([sepolicy.ALLOW], {'source': self.type, 'permlist': ['open', 'write'], … 1136 …permlist = sepolicy.search([sepolicy.ALLOW], {'source': self.type, 'target': 'user_home_type', 'cl…
|
/external/chromium-trace/catapult/third_party/Paste/tests/ |
D | test_httpheaders.py | 115 ACCEPT_CHARSET, AGE, ALLOW, CACHE_CONTROL, 117 EXPIRES, RANGE, UPGRADE, VARY, ALLOW]
|
/external/selinux/libselinux/src/ |
D | audit2why.c | 25 #define ALLOW 0 macro 381 RETURN(ALLOW) in analyze() 481 PyModule_AddIntConstant(m,"ALLOW", ALLOW);
|
/external/selinux/checkpolicy/ |
D | policy_scan.l | 137 ALLOW | 138 allow { return(ALLOW); }
|
D | policy_parse.y | 125 %token ALLOW 428 cond_allow_def : ALLOW names names ':' names names ';' 469 allow_def : ALLOW names names ':' names names ';' 512 role_allow_def : ALLOW names names ';'
|
/external/jetty/src/java/org/eclipse/jetty/http/ |
D | HttpHeaders.java | 48 public final static String ALLOW= "Allow", field in HttpHeaders 193 ALLOW_BUFFER=CACHE.add(ALLOW,ALLOW_ORDINAL),
|
/external/mdnsresponder/mDNSShared/ |
D | dnsextd_lexer.l | 70 allow return ALLOW;
|
D | dnsextd_parser.y | 118 %token ALLOW
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_tnc.c | 21 enum { ALLOW, ISOLATE, NO_ACCESS, NO_RECOMMENDATION } recommendation; enumerator 178 case ALLOW: in eap_tnc_build_recommendation() 370 data->recommendation = ALLOW; in tncs_process()
|
/external/guava/guava/src/com/google/common/net/ |
D | HttpHeaders.java | 138 public static final String ALLOW = "Allow"; field in HttpHeaders
|
/external/crcalc/ |
D | COPYRIGHT.txt | 29 LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE 69 LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE
|
/external/selinux/sepolgen/src/sepolgen/ |
D | policygen.py | 164 if av.type == audit2why.ALLOW: 190 …for i in [x[TCONTEXT] for x in sesearch([ALLOW], {SCONTEXT: av.src_type, CLASS: av.obj_class, PERM…
|
D | refpolicy.py | 447 ALLOW = 0 variable in AVRule 458 self.rule_type = self.ALLOW 463 if self.rule_type == self.ALLOW:
|
/external/selinux/sepolgen/tests/ |
D | test_refpolicy.py | 87 self.assertEqual(a.rule_type, a.ALLOW)
|
/external/selinux/policycoreutils/audit2allow/ |
D | audit2allow | 249 if rc == audit2why.ALLOW:
|
D | audit2why | 249 if rc == audit2why.ALLOW:
|