/external/icu/icu4j/main/shared/data/ |
D | security.policy | 14 // permission java.lang.RuntimePermission "getProtectionDomain"; 16 permission java.lang.RuntimePermission "accessDeclaredMembers"; 19 permission java.util.PropertyPermission "user.language", "write"; 22 permission java.lang.RuntimePermission "charsetProvider", "read"; 26 permission java.lang.RuntimePermission "accessClassInPackage.sun.util.calendar"; 29 …permission java.util.PropertyPermission "com.ibm.icu.text.DecimalFormat.SkipExtendedSeparatorParsi… 32 permission java.util.PropertyPermission "user.timezone", "write"; 35 permission java.lang.RuntimePermission "createClassLoader"; 39 // file and give the called code permission to read the calling code's 50 permission java.io.FilePermission "${/}${user.dir}${/}icu4jtests.jar", "read"; [all …]
|
/external/ppp/pppd/plugins/radius/ |
D | COPYRIGHT | 8 copyright and permission notice appear on all copies and supporting 11 without specific prior permission, and notice be given in supporting 12 documentation that copying and distribution is by permission of 24 permission notice appear on all copies and supporting documentation, the 26 distribution of the program without specific prior permission, and notice be 28 permission of Lars Fenneberg. 40 and permission notice appear on all copies and supporting documentation, 43 prior permission, and notice be given in supporting documentation that 44 copying and distribution is by permission of Livingston Enterprises, Inc. 55 that the above copyright notice and this permission notice appear in all [all …]
|
/external/libpcap/doc/ |
D | README.macos | 7 changed to give users other than root permission to read or write those 12 devices to give users other than root permission to read or write those 27 "admin" group owns them, and will change the permission of the BPF 61 If you want to give a particular user permission to access the BPF 62 devices, rather than giving all administrative users permission to 65 give a particular user permission to read and write the BPF devices and 66 give the administrative users permission to read but not write the BPF 72 to grant write permission to everybody who should be allowed to capture
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
D | ProviderConfigurationPermission.java | 120 Permission permission) in implies() argument 122 if (!(permission instanceof ProviderConfigurationPermission)) in implies() 127 if (!this.getName().equals(permission.getName())) in implies() 132 ProviderConfigurationPermission other = (ProviderConfigurationPermission)permission; in implies()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/config/ |
D | ProviderConfigurationPermission.java | 122 Permission permission) in implies() argument 124 if (!(permission instanceof ProviderConfigurationPermission)) in implies() 129 if (!this.getName().equals(permission.getName())) in implies() 134 ProviderConfigurationPermission other = (ProviderConfigurationPermission)permission; in implies()
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
D | CryptoServicesPermission.java | 37 public boolean implies(Permission permission) in implies() argument 39 if (permission instanceof CryptoServicesPermission) in implies() 41 CryptoServicesPermission other = (CryptoServicesPermission)permission; in implies()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/crypto/ |
D | CryptoServicesPermission.java | 39 public boolean implies(Permission permission) in implies() argument 41 if (permission instanceof CryptoServicesPermission) in implies() 43 CryptoServicesPermission other = (CryptoServicesPermission)permission; in implies()
|
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
D | ShadowDevicePolicyManager.java | 106 public PackageAndPermission(String packageName, String permission) { in PackageAndPermission() argument 108 this.permission = permission; in PackageAndPermission() 112 private String permission; field in ShadowDevicePolicyManager.PackageAndPermission 120 return packageName.equals(other.packageName) && permission.equals(other.permission); in equals() 126 result = 31 * result + permission.hashCode(); in hashCode() 589 ComponentName admin, String packageName, String permission) { in getPermissionGrantState() argument 592 appPermissionGrantStateMap.get(new PackageAndPermission(packageName, permission)); in getPermissionGrantState() 596 public boolean isPermissionGranted(String packageName, String permission) { in isPermissionGranted() argument 598 appPermissionGrantedMap.get(new PackageAndPermission(packageName, permission)); in isPermissionGranted() 604 ComponentName admin, String packageName, String permission, int grantState) { in setPermissionGrantState() argument [all …]
|
D | ShadowCrossProfileApps.java | 28 import android.Manifest.permission; 76 Manifest.permission.INTERACT_ACROSS_PROFILES); 148 @RequiresPermission(permission.INTERACT_ACROSS_PROFILES) 242 if (context.checkSelfPermission(permission.INTERACT_ACROSS_PROFILES) in verifyHasInteractAcrossProfilesPermission() 246 + permission.INTERACT_ACROSS_PROFILES in verifyHasInteractAcrossProfilesPermission() 292 allOf={android.Manifest.permission.MANAGE_APP_OPS_MODES, 293 android.Manifest.permission.INTERACT_ACROSS_USERS}) 363 Manifest.permission.INTERACT_ACROSS_PROFILES); in canUserAttemptToConfigureInteractAcrossProfiles()
|
D | ShadowContextImpl.java | 104 protected int checkCallingPermission(String permission) { in checkCallingPermission() argument 105 return checkPermission(permission, android.os.Process.myPid(), android.os.Process.myUid()); in checkCallingPermission() 109 protected int checkCallingOrSelfPermission(String permission) { in checkCallingOrSelfPermission() argument 110 return checkCallingPermission(permission); in checkCallingOrSelfPermission() 235 protected int checkPermission(String permission, int pid, int uid) { in checkPermission() argument 236 return getShadowInstrumentation().checkPermission(permission, pid, uid); in checkPermission()
|
/external/autotest/frontend/afe/ |
D | management.py | 37 for permission in permissions: 38 if permission not in have_permissions: 41 admin_group.permissions.add(permission)
|
/external/selinux/secilc/docs/ |
D | cil_class_and_permission_statements.md | 202 Declares a class permission set identifier in the current namespace that can be used by one or more… 234 Defines a class permission set identifier in the current namespace that associates a class and one … 263 <p>Note that there must be at least one <code>permission</code> identifier or <code>expr</code> dec… 279 These class permission set statements will resolve to the permission sets shown in the kernel polic… 416 These class mapping statements will resolve to the permission sets shown in the kernel policy langu… 461 Defines a named extended permission, which can be used in the [`allowx`](cil_access_vector_rules.md… 465 (permissionx permissionx_id (kind class_id (permission ... | expr ...))) 481 <td align="left"><p>A keyword specifying how to interpret the extended permission values. Must be o… 502 <td align="left"><p><code>permission</code></p></td> 508 <p><code> (range (permission ...) (permission ...))</code></p> [all …]
|
/external/python/cpython2/Doc/library/ |
D | stat.rst | 62 ---that is, the file's permission bits, plus the sticky bit, set-group-id, and 231 Owner has read permission. 235 Owner has write permission. 239 Owner has execute permission. 247 Group has read permission. 251 Group has write permission. 255 Group has execute permission. 263 Others have read permission. 267 Others have write permission. 271 Others have execute permission.
|
/external/robolectric-shadows/robolectric/src/test/java/org/robolectric/shadows/ |
D | LegacyManifestParserTest.java | 71 for (Permission permission : permissions) { in getPermissionInfo() 72 if (name.equals(permission.info.name)) { in getPermissionInfo() 73 return permission.info; in getPermissionInfo()
|
D | ShadowPackageManagerTest.java | 357 assertThat(receiverInfos.get(0).activityInfo.permission) in testQueryBroadcastReceiverSucceeds() 392 assertThat(receiverInfos.receivers[0].permission).isEqualTo("com.ignored.PERM"); in testGetPackageInfo_ForReceiversSucceeds() 428 PermissionInfo permission = in getPermissionInfo_withMinimalFields() local 430 assertThat(permission.labelRes).isEqualTo(0); in getPermissionInfo_withMinimalFields() 431 assertThat(permission.descriptionRes).isEqualTo(0); in getPermissionInfo_withMinimalFields() 432 assertThat(permission.protectionLevel).isEqualTo(PermissionInfo.PROTECTION_NORMAL); in getPermissionInfo_withMinimalFields() 440 PermissionInfo permission = packageManager.getPermissionInfo("manually_added_permission", 0); in getPermissionInfo_addedPermissions() local 441 assertThat(permission.name).isEqualTo("manually_added_permission"); in getPermissionInfo_addedPermissions() 1351 assertThat(activityInfoWithFilters.permission).isEqualTo("com.foo.MY_PERMISSION"); in getPackageInfo_shouldReturnActivityInfos() 1808 assertThat(serviceInfo.permission).isEqualTo("com.foo.MY_PERMISSION"); in getServiceInfo_shouldReturnServiceInfoIfExists() [all …]
|
/external/boringssl/src/crypto/fipsmodule/ |
D | bcm.c | 139 static void BORINGSSL_maybe_set_module_text_permissions(int permission) { in BORINGSSL_maybe_set_module_text_permissions() argument 151 permission) != 0) { in BORINGSSL_maybe_set_module_text_permissions() 156 static void BORINGSSL_maybe_set_module_text_permissions(int permission) {} in BORINGSSL_maybe_set_module_text_permissions() argument
|
/external/libxkbcommon/ |
D | LICENSE | 36 The above copyright notice and this permission notice (including the next 61 The above copyright notice and this permission notice shall be included in 86 notice and this permission notice appear in supporting 89 of the software without specific prior written permission. 114 both that copyright notice and this permission notice appear in 117 software without specific, written prior permission. 140 The above copyright notice and this permission notice shall be included in 175 copyright notice and this permission notice appear in supporting 178 specific, written prior permission. The copyright holder(s) makes no 199 that both that copyright notice and this permission notice appear [all …]
|
D | NOTICE | 36 The above copyright notice and this permission notice (including the next 61 The above copyright notice and this permission notice shall be included in 86 notice and this permission notice appear in supporting 89 of the software without specific prior written permission. 114 both that copyright notice and this permission notice appear in 117 software without specific, written prior permission. 140 The above copyright notice and this permission notice shall be included in 175 copyright notice and this permission notice appear in supporting 178 specific, written prior permission. The copyright holder(s) makes no 199 that both that copyright notice and this permission notice appear [all …]
|
/external/libxkbcommon/xkbcommon/ |
D | COPYING | 36 The above copyright notice and this permission notice (including the next 61 The above copyright notice and this permission notice shall be included in 86 notice and this permission notice appear in supporting 89 of the software without specific prior written permission. 114 both that copyright notice and this permission notice appear in 117 software without specific, written prior permission. 140 The above copyright notice and this permission notice shall be included in 175 copyright notice and this permission notice appear in supporting 178 specific, written prior permission. The copyright holder(s) makes no 199 that both that copyright notice and this permission notice appear [all …]
|
/external/python/cpython3/Doc/library/ |
D | stat.rst | 85 :func:`os.chmod`\ ---that is, the file's permission bits, plus the sticky 291 Owner has read permission. 295 Owner has write permission. 299 Owner has execute permission. 307 Group has read permission. 311 Group has write permission. 315 Group has execute permission. 323 Others have read permission. 327 Others have write permission. 331 Others have execute permission.
|
/external/grpc-grpc-java/cronet/ |
D | README.md | 25 To use Cronet, you must have the `ACCESS_NETWORK_STATE` permission set in 29 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
|
/external/walt/android/WALT/app/src/main/java/org/chromium/latency/walt/ |
D | MainActivity.java | 423 Manifest.permission.WRITE_EXTERNAL_STORAGE); in attemptSaveAndShareLog() 429 new String[]{Manifest.permission.WRITE_EXTERNAL_STORAGE}, in attemptSaveAndShareLog() 436 Manifest.permission.WRITE_EXTERNAL_STORAGE); in attemptSaveLog() 441 new String[]{Manifest.permission.WRITE_EXTERNAL_STORAGE}, in attemptSaveLog() 448 Manifest.permission.WRITE_EXTERNAL_STORAGE); in attemptClearLog() 453 new String[]{Manifest.permission.WRITE_EXTERNAL_STORAGE}, in attemptClearLog() 608 Manifest.permission.WRITE_EXTERNAL_STORAGE); in requestSystraceWritePermission() 611 new String[]{Manifest.permission.WRITE_EXTERNAL_STORAGE}, in requestSystraceWritePermission()
|
/external/autotest/client/cros/multimedia/ |
D | arc_resource.py | 125 for permission in self._MICROPHONE_PERMISSIONS: 128 pipes.quote(permission))) 227 for permission in self._PLAYMUSIC_PERMISSIONS: 230 pipes.quote(permission)))
|
/external/robolectric-shadows/resources/src/main/java/org/robolectric/manifest/ |
D | ServiceData.java | 37 public void setPermission(final String permission) { in setPermission() argument 38 attributes.put(PERMISSION, permission); in setPermission()
|
D | BroadcastReceiverData.java | 42 public void setPermission(final String permission) { in setPermission() argument 43 attributes.put(PERMISSION, permission); in setPermission()
|