Home
last modified time | relevance | path

Searched refs:allow (Results 1 – 25 of 113) sorted by relevance

12345

/qemu/tests/
H A Ddbus-vmstate-daemon.sh39 <allow send_type="signal"/>
44 <allow receive_type="method_call"/>
45 <allow receive_type="method_return"/>
46 <allow receive_type="error"/>
47 <allow receive_type="signal"/>
50 <allow send_destination="org.freedesktop.DBus"
52 <allow send_destination="org.freedesktop.DBus"
54 <allow send_destination="org.freedesktop.DBus"
65 <allow own="org.qemu.VMState1"/>
66 <allow send_destination="org.qemu.VMState1"/>
[all …]
/qemu/tests/qapi-schema/
H A Dallow-preconfig-test.err1 allow-preconfig-test.json: In command 'allow-preconfig-test':
2 allow-preconfig-test.json:2: flag 'allow-preconfig' may only use true value
H A Dallow-preconfig-test.json1 # Check against allow-preconfig illegal value
2 { 'command': 'allow-preconfig-test', 'allow-preconfig': 'some-string' }
H A Doob-coroutine.json1 # Check that incompatible flags allow-oob and coroutine are rejected
2 { 'command': 'oob-command-1', 'allow-oob': true, 'coroutine': true }
H A Ddoc-duplicated-arg.json1 # Do not allow duplicated argument
H A Ddoc-duplicated-return.json1 # Do not allow duplicated Returns section
H A Ddoc-duplicated-since.json1 # Do not allow duplicated Since section
H A Dargs-any.json1 # we do not allow an 'any' argument
H A Doob-test.json2 { 'command': 'oob-command-1', 'allow-oob': 'some-string' }
H A Doob-coroutine.err2 oob-coroutine.json:2: flags 'allow-oob' and 'coroutine' are incompatible
H A Dargs-alternate.json1 # we do not allow alternate arguments
H A Dalternate-any.json1 # we do not allow the 'any' type as an alternate branch
H A Doob-test.err2 oob-test.json:2: flag 'allow-oob' may only use true value
H A Dunion-bad-base.json1 # we allow anonymous base, but enforce no duplicate keys
H A Dreserved-member-u.json2 # We reject use of 'u' as a member name, to allow it for internal use in
H A Dunion-base-union.json2 # TODO: It would be possible to allow a union as a base, as long as all
/qemu/tests/qemu-iotests/tests/
H A Dfuse-allow-other.out1 QA output created by fuse-allow-other
6 --- allow-other=off ---
15 'allow-other': 'off'
35 --- allow-other=on ---
44 'allow-other': 'on'
62 --- allow-other=auto ---
71 'allow-other': 'auto'
/qemu/qapi/
H A Dblock-export.json28 # @max-connections: The maximum number of connections to allow at the
63 # @max-connections: The maximum number of connections to allow at the
78 'allow-preconfig': true }
172 # @allow-other: If this is off, only qemu's user is allowed access to
187 '*allow-other': 'FuseExportAllowOther' },
259 'allow-preconfig': true }
309 'allow-preconfig': true }
320 'allow-preconfig': true }
405 'allow-preconfig': true }
428 'allow-preconfig': true }
[all …]
H A Dauthz.json15 # @allow: allow access
21 'data': ['deny', 'allow']}
H A Dcontrol.json38 'allow-preconfig': true }
116 'allow-preconfig': true }
156 'allow-preconfig': true }
174 'allow-preconfig': true }
H A Dyank.json98 'allow-oob': true }
119 'allow-oob': true }
/qemu/docs/system/
H A Dauthz.rst112 { "match": "fred", "policy": "allow", "format": "exact" },
113 { "match": "bob", "policy": "allow", "format": "exact" },
115 { "match": "dan*", "policy": "allow", "format": "glob" }
158 { "match": "fred", "policy": "allow", "format": "exact" },
159 { "match": "bob", "policy": "allow", "format": "exact" },
161 { "match": "dan*", "policy": "allow", "format": "glob" }
179 mechanisms that are implemented outside of QEMU. In order to allow maximum
205 account requisite pam_listfile.so item=user sense=allow \
206 file=/etc/qemu/vnc.allow
/qemu/docs/interop/
H A Ddbus.rst75 For example, to allow only ``qemu`` user to talk to ``qemu-helper``
81 <allow send_destination="org.qemu.Helper1"/>
82 <allow receive_sender="org.qemu.Helper1"/>
86 <allow own="org.qemu.Helper1"/>
/qemu/ui/
H A Dvnc-auth-sasl.c173 bool allow; in vnc_auth_sasl_check_access() local
194 allow = qauthz_is_allowed_by_id(vs->vd->sasl.authzid, in vnc_auth_sasl_check_access()
203 trace_vnc_auth_sasl_acl(vs, allow); in vnc_auth_sasl_check_access()
204 return allow ? 0 : -1; in vnc_auth_sasl_check_access()
/qemu/crypto/
H A Dtlssession.c355 bool allow; in qcrypto_tls_session_check_certificate() local
357 allow = qauthz_is_allowed_by_id(session->authzid, in qcrypto_tls_session_check_certificate()
363 if (!allow) { in qcrypto_tls_session_check_certificate()

12345