Home
last modified time | relevance | path

Searched refs:permission (Results 1 – 25 of 3101) sorted by relevance

12345678910>>...125

/external/icu/icu4j/main/shared/data/
Dsecurity.policy14 // permission java.lang.RuntimePermission "getProtectionDomain";
16 permission java.lang.RuntimePermission "accessDeclaredMembers";
19 permission java.util.PropertyPermission "user.language", "write";
22 permission java.lang.RuntimePermission "charsetProvider", "read";
26 permission java.lang.RuntimePermission "accessClassInPackage.sun.util.calendar";
29permission java.util.PropertyPermission "com.ibm.icu.text.DecimalFormat.SkipExtendedSeparatorParsi…
32 permission java.util.PropertyPermission "user.timezone", "write";
35 permission java.lang.RuntimePermission "createClassLoader";
39 // file and give the called code permission to read the calling code's
50 permission java.io.FilePermission "${/}${user.dir}${/}icu4jtests.jar", "read";
[all …]
/external/ppp/pppd/plugins/radius/
DCOPYRIGHT8 copyright and permission notice appear on all copies and supporting
11 without specific prior permission, and notice be given in supporting
12 documentation that copying and distribution is by permission of
24 permission notice appear on all copies and supporting documentation, the
26 distribution of the program without specific prior permission, and notice be
28 permission of Lars Fenneberg.
40 and permission notice appear on all copies and supporting documentation,
43 prior permission, and notice be given in supporting documentation that
44 copying and distribution is by permission of Livingston Enterprises, Inc.
55 that the above copyright notice and this permission notice appear in all
[all …]
/external/libpcap/doc/
DREADME.macos7 changed to give users other than root permission to read or write those
12 devices to give users other than root permission to read or write those
27 "admin" group owns them, and will change the permission of the BPF
61 If you want to give a particular user permission to access the BPF
62 devices, rather than giving all administrative users permission to
65 give a particular user permission to read and write the BPF devices and
66 give the administrative users permission to read but not write the BPF
72 to grant write permission to everybody who should be allowed to capture
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/
DProviderConfigurationPermission.java120 Permission permission) in implies() argument
122 if (!(permission instanceof ProviderConfigurationPermission)) in implies()
127 if (!this.getName().equals(permission.getName())) in implies()
132 ProviderConfigurationPermission other = (ProviderConfigurationPermission)permission; in implies()
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/jcajce/provider/config/
DProviderConfigurationPermission.java122 Permission permission) in implies() argument
124 if (!(permission instanceof ProviderConfigurationPermission)) in implies()
129 if (!this.getName().equals(permission.getName())) in implies()
134 ProviderConfigurationPermission other = (ProviderConfigurationPermission)permission; in implies()
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/
DCryptoServicesPermission.java37 public boolean implies(Permission permission) in implies() argument
39 if (permission instanceof CryptoServicesPermission) in implies()
41 CryptoServicesPermission other = (CryptoServicesPermission)permission; in implies()
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/crypto/
DCryptoServicesPermission.java39 public boolean implies(Permission permission) in implies() argument
41 if (permission instanceof CryptoServicesPermission) in implies()
43 CryptoServicesPermission other = (CryptoServicesPermission)permission; in implies()
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/
DShadowDevicePolicyManager.java106 public PackageAndPermission(String packageName, String permission) { in PackageAndPermission() argument
108 this.permission = permission; in PackageAndPermission()
112 private String permission; field in ShadowDevicePolicyManager.PackageAndPermission
120 return packageName.equals(other.packageName) && permission.equals(other.permission); in equals()
126 result = 31 * result + permission.hashCode(); in hashCode()
589 ComponentName admin, String packageName, String permission) { in getPermissionGrantState() argument
592 appPermissionGrantStateMap.get(new PackageAndPermission(packageName, permission)); in getPermissionGrantState()
596 public boolean isPermissionGranted(String packageName, String permission) { in isPermissionGranted() argument
598 appPermissionGrantedMap.get(new PackageAndPermission(packageName, permission)); in isPermissionGranted()
604 ComponentName admin, String packageName, String permission, int grantState) { in setPermissionGrantState() argument
[all …]
DShadowCrossProfileApps.java28 import android.Manifest.permission;
76 Manifest.permission.INTERACT_ACROSS_PROFILES);
148 @RequiresPermission(permission.INTERACT_ACROSS_PROFILES)
242 if (context.checkSelfPermission(permission.INTERACT_ACROSS_PROFILES) in verifyHasInteractAcrossProfilesPermission()
246 + permission.INTERACT_ACROSS_PROFILES in verifyHasInteractAcrossProfilesPermission()
292 allOf={android.Manifest.permission.MANAGE_APP_OPS_MODES,
293 android.Manifest.permission.INTERACT_ACROSS_USERS})
363 Manifest.permission.INTERACT_ACROSS_PROFILES); in canUserAttemptToConfigureInteractAcrossProfiles()
DShadowContextImpl.java104 protected int checkCallingPermission(String permission) { in checkCallingPermission() argument
105 return checkPermission(permission, android.os.Process.myPid(), android.os.Process.myUid()); in checkCallingPermission()
109 protected int checkCallingOrSelfPermission(String permission) { in checkCallingOrSelfPermission() argument
110 return checkCallingPermission(permission); in checkCallingOrSelfPermission()
235 protected int checkPermission(String permission, int pid, int uid) { in checkPermission() argument
236 return getShadowInstrumentation().checkPermission(permission, pid, uid); in checkPermission()
/external/autotest/frontend/afe/
Dmanagement.py37 for permission in permissions:
38 if permission not in have_permissions:
41 admin_group.permissions.add(permission)
/external/selinux/secilc/docs/
Dcil_class_and_permission_statements.md202 Declares a class permission set identifier in the current namespace that can be used by one or more…
234 Defines a class permission set identifier in the current namespace that associates a class and one …
263 <p>Note that there must be at least one <code>permission</code> identifier or <code>expr</code> dec…
279 These class permission set statements will resolve to the permission sets shown in the kernel polic…
416 These class mapping statements will resolve to the permission sets shown in the kernel policy langu…
461 Defines a named extended permission, which can be used in the [`allowx`](cil_access_vector_rules.md…
465 (permissionx permissionx_id (kind class_id (permission ... | expr ...)))
481 <td align="left"><p>A keyword specifying how to interpret the extended permission values. Must be o…
502 <td align="left"><p><code>permission</code></p></td>
508 <p><code> (range (permission ...) (permission ...))</code></p>
[all …]
/external/python/cpython2/Doc/library/
Dstat.rst62 ---that is, the file's permission bits, plus the sticky bit, set-group-id, and
231 Owner has read permission.
235 Owner has write permission.
239 Owner has execute permission.
247 Group has read permission.
251 Group has write permission.
255 Group has execute permission.
263 Others have read permission.
267 Others have write permission.
271 Others have execute permission.
/external/robolectric-shadows/robolectric/src/test/java/org/robolectric/shadows/
DLegacyManifestParserTest.java71 for (Permission permission : permissions) { in getPermissionInfo()
72 if (name.equals(permission.info.name)) { in getPermissionInfo()
73 return permission.info; in getPermissionInfo()
DShadowPackageManagerTest.java357 assertThat(receiverInfos.get(0).activityInfo.permission) in testQueryBroadcastReceiverSucceeds()
392 assertThat(receiverInfos.receivers[0].permission).isEqualTo("com.ignored.PERM"); in testGetPackageInfo_ForReceiversSucceeds()
428 PermissionInfo permission = in getPermissionInfo_withMinimalFields() local
430 assertThat(permission.labelRes).isEqualTo(0); in getPermissionInfo_withMinimalFields()
431 assertThat(permission.descriptionRes).isEqualTo(0); in getPermissionInfo_withMinimalFields()
432 assertThat(permission.protectionLevel).isEqualTo(PermissionInfo.PROTECTION_NORMAL); in getPermissionInfo_withMinimalFields()
440 PermissionInfo permission = packageManager.getPermissionInfo("manually_added_permission", 0); in getPermissionInfo_addedPermissions() local
441 assertThat(permission.name).isEqualTo("manually_added_permission"); in getPermissionInfo_addedPermissions()
1351 assertThat(activityInfoWithFilters.permission).isEqualTo("com.foo.MY_PERMISSION"); in getPackageInfo_shouldReturnActivityInfos()
1808 assertThat(serviceInfo.permission).isEqualTo("com.foo.MY_PERMISSION"); in getServiceInfo_shouldReturnServiceInfoIfExists()
[all …]
/external/boringssl/src/crypto/fipsmodule/
Dbcm.c139 static void BORINGSSL_maybe_set_module_text_permissions(int permission) { in BORINGSSL_maybe_set_module_text_permissions() argument
151 permission) != 0) { in BORINGSSL_maybe_set_module_text_permissions()
156 static void BORINGSSL_maybe_set_module_text_permissions(int permission) {} in BORINGSSL_maybe_set_module_text_permissions() argument
/external/libxkbcommon/
DLICENSE36 The above copyright notice and this permission notice (including the next
61 The above copyright notice and this permission notice shall be included in
86 notice and this permission notice appear in supporting
89 of the software without specific prior written permission.
114 both that copyright notice and this permission notice appear in
117 software without specific, written prior permission.
140 The above copyright notice and this permission notice shall be included in
175 copyright notice and this permission notice appear in supporting
178 specific, written prior permission. The copyright holder(s) makes no
199 that both that copyright notice and this permission notice appear
[all …]
DNOTICE36 The above copyright notice and this permission notice (including the next
61 The above copyright notice and this permission notice shall be included in
86 notice and this permission notice appear in supporting
89 of the software without specific prior written permission.
114 both that copyright notice and this permission notice appear in
117 software without specific, written prior permission.
140 The above copyright notice and this permission notice shall be included in
175 copyright notice and this permission notice appear in supporting
178 specific, written prior permission. The copyright holder(s) makes no
199 that both that copyright notice and this permission notice appear
[all …]
/external/libxkbcommon/xkbcommon/
DCOPYING36 The above copyright notice and this permission notice (including the next
61 The above copyright notice and this permission notice shall be included in
86 notice and this permission notice appear in supporting
89 of the software without specific prior written permission.
114 both that copyright notice and this permission notice appear in
117 software without specific, written prior permission.
140 The above copyright notice and this permission notice shall be included in
175 copyright notice and this permission notice appear in supporting
178 specific, written prior permission. The copyright holder(s) makes no
199 that both that copyright notice and this permission notice appear
[all …]
/external/python/cpython3/Doc/library/
Dstat.rst85 :func:`os.chmod`\ ---that is, the file's permission bits, plus the sticky
291 Owner has read permission.
295 Owner has write permission.
299 Owner has execute permission.
307 Group has read permission.
311 Group has write permission.
315 Group has execute permission.
323 Others have read permission.
327 Others have write permission.
331 Others have execute permission.
/external/grpc-grpc-java/cronet/
DREADME.md25 To use Cronet, you must have the `ACCESS_NETWORK_STATE` permission set in
29 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
/external/walt/android/WALT/app/src/main/java/org/chromium/latency/walt/
DMainActivity.java423 Manifest.permission.WRITE_EXTERNAL_STORAGE); in attemptSaveAndShareLog()
429 new String[]{Manifest.permission.WRITE_EXTERNAL_STORAGE}, in attemptSaveAndShareLog()
436 Manifest.permission.WRITE_EXTERNAL_STORAGE); in attemptSaveLog()
441 new String[]{Manifest.permission.WRITE_EXTERNAL_STORAGE}, in attemptSaveLog()
448 Manifest.permission.WRITE_EXTERNAL_STORAGE); in attemptClearLog()
453 new String[]{Manifest.permission.WRITE_EXTERNAL_STORAGE}, in attemptClearLog()
608 Manifest.permission.WRITE_EXTERNAL_STORAGE); in requestSystraceWritePermission()
611 new String[]{Manifest.permission.WRITE_EXTERNAL_STORAGE}, in requestSystraceWritePermission()
/external/autotest/client/cros/multimedia/
Darc_resource.py125 for permission in self._MICROPHONE_PERMISSIONS:
128 pipes.quote(permission)))
227 for permission in self._PLAYMUSIC_PERMISSIONS:
230 pipes.quote(permission)))
/external/robolectric-shadows/resources/src/main/java/org/robolectric/manifest/
DServiceData.java37 public void setPermission(final String permission) { in setPermission() argument
38 attributes.put(PERMISSION, permission); in setPermission()
DBroadcastReceiverData.java42 public void setPermission(final String permission) { in setPermission() argument
43 attributes.put(PERMISSION, permission); in setPermission()

12345678910>>...125