/external/icu/icu4j/main/shared/data/ |
D | security.policy | 14 // permission java.lang.RuntimePermission "getProtectionDomain"; 16 permission java.lang.RuntimePermission "accessDeclaredMembers"; 19 permission java.util.PropertyPermission "user.language", "write"; 22 permission java.lang.RuntimePermission "charsetProvider", "read"; 26 permission java.lang.RuntimePermission "accessClassInPackage.sun.util.calendar"; 29 …permission java.util.PropertyPermission "com.ibm.icu.text.DecimalFormat.SkipExtendedSeparatorParsi… 32 permission java.util.PropertyPermission "user.timezone", "write"; 35 permission java.lang.RuntimePermission "createClassLoader"; 39 // file and give the called code permission to read the calling code's 50 permission java.io.FilePermission "${/}${user.dir}${/}icu4jtests.jar", "read"; [all …]
|
/external/ppp/pppd/plugins/radius/ |
D | COPYRIGHT | 8 copyright and permission notice appear on all copies and supporting 11 without specific prior permission, and notice be given in supporting 12 documentation that copying and distribution is by permission of 24 permission notice appear on all copies and supporting documentation, the 26 distribution of the program without specific prior permission, and notice be 28 permission of Lars Fenneberg. 40 and permission notice appear on all copies and supporting documentation, 43 prior permission, and notice be given in supporting documentation that 44 copying and distribution is by permission of Livingston Enterprises, Inc. 55 that the above copyright notice and this permission notice appear in all [all …]
|
/external/libpcap/doc/ |
D | README.macos | 7 changed to give users other than root permission to read or write those 12 devices to give users other than root permission to read or write those 27 "admin" group owns them, and will change the permission of the BPF 61 If you want to give a particular user permission to access the BPF 62 devices, rather than giving all administrative users permission to 65 give a particular user permission to read and write the BPF devices and 66 give the administrative users permission to read but not write the BPF 72 to grant write permission to everybody who should be allowed to capture
|
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
D | ShadowDevicePolicyManager.java | 103 public PackageAndPermission(String packageName, String permission) { in PackageAndPermission() argument 105 this.permission = permission; in PackageAndPermission() 109 private String permission; field in ShadowDevicePolicyManager.PackageAndPermission 117 return packageName.equals(other.packageName) && permission.equals(other.permission); in equals() 123 result = 31 * result + permission.hashCode(); in hashCode() 586 ComponentName admin, String packageName, String permission) { in getPermissionGrantState() argument 589 appPermissionGrantStateMap.get(new PackageAndPermission(packageName, permission)); in getPermissionGrantState() 593 public boolean isPermissionGranted(String packageName, String permission) { in isPermissionGranted() argument 595 appPermissionGrantedMap.get(new PackageAndPermission(packageName, permission)); in isPermissionGranted() 601 ComponentName admin, String packageName, String permission, int grantState) { in setPermissionGrantState() argument [all …]
|
D | ShadowContextImpl.java | 103 protected int checkCallingPermission(String permission) { in checkCallingPermission() argument 104 return checkPermission(permission, android.os.Process.myPid(), android.os.Process.myUid()); in checkCallingPermission() 108 protected int checkCallingOrSelfPermission(String permission) { in checkCallingOrSelfPermission() argument 109 return checkCallingPermission(permission); in checkCallingOrSelfPermission() 188 protected int checkPermission(String permission, int pid, int uid) { in checkPermission() argument 189 return getShadowInstrumentation().checkPermission(permission, pid, uid); in checkPermission()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
D | ProviderConfigurationPermission.java | 120 Permission permission) in implies() argument 122 if (!(permission instanceof ProviderConfigurationPermission)) in implies() 127 if (!this.getName().equals(permission.getName())) in implies() 132 ProviderConfigurationPermission other = (ProviderConfigurationPermission)permission; in implies()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/config/ |
D | ProviderConfigurationPermission.java | 122 Permission permission) in implies() argument 124 if (!(permission instanceof ProviderConfigurationPermission)) in implies() 129 if (!this.getName().equals(permission.getName())) in implies() 134 ProviderConfigurationPermission other = (ProviderConfigurationPermission)permission; in implies()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/crypto/ |
D | CryptoServicesPermission.java | 39 public boolean implies(Permission permission) in implies() argument 41 if (permission instanceof CryptoServicesPermission) in implies() 43 CryptoServicesPermission other = (CryptoServicesPermission)permission; in implies()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
D | CryptoServicesPermission.java | 37 public boolean implies(Permission permission) in implies() argument 39 if (permission instanceof CryptoServicesPermission) in implies() 41 CryptoServicesPermission other = (CryptoServicesPermission)permission; in implies()
|
/external/autotest/frontend/afe/ |
D | management.py | 37 for permission in permissions: 38 if permission not in have_permissions: 41 admin_group.permissions.add(permission)
|
/external/selinux/secilc/docs/ |
D | cil_class_and_permission_statements.md | 202 Declares a class permission set identifier in the current namespace that can be used by one or more… 234 Defines a class permission set identifier in the current namespace that associates a class and one … 263 <p>Note that there must be at least one <code>permission</code> identifier or <code>expr</code> dec… 279 These class permission set statements will resolve to the permission sets shown in the kernel polic… 416 These class mapping statements will resolve to the permission sets shown in the kernel policy langu… 461 Defines a named extended permission, which can be used in the [`allowx`](cil_access_vector_rules.md… 465 (permissionx permissionx_id (kind class_id (permission ... | expr ...))) 481 <td align="left"><p>A keyword specifying how to interpret the extended permission values. Must be o… 502 <td align="left"><p><code>permission</code></p></td> 508 <p><code> (range (permission ...) (permission ...))</code></p> [all …]
|
/external/python/cpython2/Doc/library/ |
D | stat.rst | 62 ---that is, the file's permission bits, plus the sticky bit, set-group-id, and 231 Owner has read permission. 235 Owner has write permission. 239 Owner has execute permission. 247 Group has read permission. 251 Group has write permission. 255 Group has execute permission. 263 Others have read permission. 267 Others have write permission. 271 Others have execute permission.
|
/external/robolectric-shadows/robolectric/src/test/java/org/robolectric/shadows/ |
D | ShadowPackageManagerTest.java | 354 assertThat(receiverInfos.get(0).activityInfo.permission) in testQueryBroadcastReceiverSucceeds() 389 assertThat(receiverInfos.receivers[0].permission).isEqualTo("com.ignored.PERM"); in testGetPackageInfo_ForReceiversSucceeds() 425 PermissionInfo permission = in getPermissionInfo_withMinimalFields() local 427 assertThat(permission.labelRes).isEqualTo(0); in getPermissionInfo_withMinimalFields() 428 assertThat(permission.descriptionRes).isEqualTo(0); in getPermissionInfo_withMinimalFields() 429 assertThat(permission.protectionLevel).isEqualTo(PermissionInfo.PROTECTION_NORMAL); in getPermissionInfo_withMinimalFields() 437 PermissionInfo permission = packageManager.getPermissionInfo("manually_added_permission", 0); in getPermissionInfo_addedPermissions() local 438 assertThat(permission.name).isEqualTo("manually_added_permission"); in getPermissionInfo_addedPermissions() 1311 assertThat(activityInfoWithFilters.permission).isEqualTo("com.foo.MY_PERMISSION"); in getPackageInfo_shouldReturnActivityInfos() 1768 assertThat(serviceInfo.permission).isEqualTo("com.foo.MY_PERMISSION"); in getServiceInfo_shouldReturnServiceInfoIfExists() [all …]
|
D | LegacyManifestParserTest.java | 71 for (Permission permission : permissions) { in getPermissionInfo() 72 if (name.equals(permission.info.name)) { in getPermissionInfo() 73 return permission.info; in getPermissionInfo()
|
/external/libxkbcommon/ |
D | LICENSE | 36 The above copyright notice and this permission notice (including the next 61 The above copyright notice and this permission notice shall be included in 86 notice and this permission notice appear in supporting 89 of the software without specific prior written permission. 114 both that copyright notice and this permission notice appear in 117 software without specific, written prior permission. 140 The above copyright notice and this permission notice shall be included in 175 copyright notice and this permission notice appear in supporting 178 specific, written prior permission. The copyright holder(s) makes no 199 that both that copyright notice and this permission notice appear [all …]
|
D | NOTICE | 36 The above copyright notice and this permission notice (including the next 61 The above copyright notice and this permission notice shall be included in 86 notice and this permission notice appear in supporting 89 of the software without specific prior written permission. 114 both that copyright notice and this permission notice appear in 117 software without specific, written prior permission. 140 The above copyright notice and this permission notice shall be included in 175 copyright notice and this permission notice appear in supporting 178 specific, written prior permission. The copyright holder(s) makes no 199 that both that copyright notice and this permission notice appear [all …]
|
/external/libxkbcommon/xkbcommon/ |
D | COPYING | 36 The above copyright notice and this permission notice (including the next 61 The above copyright notice and this permission notice shall be included in 86 notice and this permission notice appear in supporting 89 of the software without specific prior written permission. 114 both that copyright notice and this permission notice appear in 117 software without specific, written prior permission. 140 The above copyright notice and this permission notice shall be included in 175 copyright notice and this permission notice appear in supporting 178 specific, written prior permission. The copyright holder(s) makes no 199 that both that copyright notice and this permission notice appear [all …]
|
/external/autotest/server/cros/ |
D | camerabox_utils.py | 130 def _write_file(self, filepath, content, permission=None, owner=None): argument 138 if permission is not None: 139 os.chmod(tmp_path, permission) 172 permission=0755)
|
/external/python/cpython3/Doc/library/ |
D | stat.rst | 85 :func:`os.chmod`\ ---that is, the file's permission bits, plus the sticky 291 Owner has read permission. 295 Owner has write permission. 299 Owner has execute permission. 307 Group has read permission. 311 Group has write permission. 315 Group has execute permission. 323 Others have read permission. 327 Others have write permission. 331 Others have execute permission.
|
/external/walt/android/WALT/app/src/main/java/org/chromium/latency/walt/ |
D | MainActivity.java | 422 Manifest.permission.WRITE_EXTERNAL_STORAGE); in attemptSaveAndShareLog() 428 new String[]{Manifest.permission.WRITE_EXTERNAL_STORAGE}, in attemptSaveAndShareLog() 435 Manifest.permission.WRITE_EXTERNAL_STORAGE); in attemptSaveLog() 440 new String[]{Manifest.permission.WRITE_EXTERNAL_STORAGE}, in attemptSaveLog() 447 Manifest.permission.WRITE_EXTERNAL_STORAGE); in attemptClearLog() 452 new String[]{Manifest.permission.WRITE_EXTERNAL_STORAGE}, in attemptClearLog() 606 Manifest.permission.WRITE_EXTERNAL_STORAGE); in requestSystraceWritePermission() 609 new String[]{Manifest.permission.WRITE_EXTERNAL_STORAGE}, in requestSystraceWritePermission()
|
/external/grpc-grpc-java/cronet/ |
D | README.md | 25 To use Cronet, you must have the `ACCESS_NETWORK_STATE` permission set in 29 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
|
/external/autotest/client/cros/multimedia/ |
D | arc_resource.py | 125 for permission in self._MICROPHONE_PERMISSIONS: 128 pipes.quote(permission))) 227 for permission in self._PLAYMUSIC_PERMISSIONS: 230 pipes.quote(permission)))
|
/external/owasp/sanitizer/tools/findbugs/licenses/ |
D | LICENSE-dom4j.txt | 18 permission of MetaStuff, Ltd. For written permission, please 23 permission of MetaStuff, Ltd. DOM4J is a registered trademark of
|
/external/python/cpython2/Mac/Modules/res/ |
D | _Resmodule.c | 1165 SignedByte permission; in Res_OpenRFPerm() local 1172 &permission)) in Res_OpenRFPerm() 1176 permission); in Res_OpenRFPerm() 1193 SignedByte permission; in Res_HOpenResFile() local 1201 &permission)) in Res_HOpenResFile() 1206 permission); in Res_HOpenResFile() 1247 SignedByte permission; in Res_FSpOpenResFile() local 1253 &permission)) in Res_FSpOpenResFile() 1256 permission); in Res_FSpOpenResFile() 1368 SignedByte permission; in Res_FSpOpenOrphanResFile() local [all …]
|
/external/robolectric-shadows/resources/src/main/java/org/robolectric/manifest/ |
D | ServiceData.java | 37 public void setPermission(final String permission) { in setPermission() argument 38 attributes.put(PERMISSION, permission); in setPermission()
|