Home
last modified time | relevance | path

Searched full:permission (Results 1 – 25 of 10266) sorted by relevance

12345678910>>...411

/external/arm-trusted-firmware/plat/mediatek/mt8183/drivers/devapc/
Ddevapc.h78 #define PERMISSION(DEV_NAME, ATTR1, ATTR2, ATTR3) \ macro
85 PERMISSION("INFRA_AO_TOPCKGEN", NO_SEC, NO_SEC, NO_SEC),
86 PERMISSION("INFRA_AO_INFRASYS_CONFIG_REGS", NO_SEC, FORBID, NO_SEC),
87 PERMISSION("IO_CFG", NO_SEC, FORBID, NO_SEC),
88 PERMISSION("INFRA_AO_PERICFG", NO_SEC, FORBID, NO_SEC),
89 PERMISSION("INFRA_AO_EFUSE_AO_DEBUG", NO_SEC, FORBID, NO_SEC),
90 PERMISSION("INFRA_AO_GPIO", NO_SEC, FORBID, NO_SEC),
91 PERMISSION("INFRA_AO_SLEEP_CONTROLLER", NO_SEC, FORBID, NO_SEC),
92 PERMISSION("INFRA_AO_TOPRGU", NO_SEC, FORBID, NO_SEC),
93 PERMISSION("INFRA_AO_APXGPT", NO_SEC, FORBID, NO_SEC),
[all …]
/external/sl4a/ScriptingLayerForAndroid/
DAndroidManifest.xml24 <permission android:name="com.googlecode.android_scripting.ACTION_FOUND_PERMISSION" />
29 <uses-permission android:name="android.permission.ACCESS_BLUETOOTH_SHARE" />
30 <uses-permission android:name="android.permission.ACCESS_CHECKIN_PROPERTIES" />
31 <uses-permission android:name="android.permission.ACCESS_COARSE_LOCATION" />
32 <uses-permission android:name="android.permission.ACCESS_DOWNLOAD_MANAGER" />
33 <uses-permission android:name="android.permission.ACCESS_FINE_LOCATION" />
34 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
35 <uses-permission android:name="android.permission.ACCESS_NOTIFICATIONS" />
36 <uses-permission android:name="android.permission.ACCESS_RCS_USER_CAPABILITY_EXCHANGE" />
37 <uses-permission android:name="android.permission.ACCESS_WIFI_STATE" />
[all …]
/external/mobly-bundled-snippets/src/main/
DAndroidManifest.xml8 <uses-permission android:name="android.permission.ACCESS_COARSE_LOCATION" />
9 <uses-permission android:name="android.permission.ACCESS_FINE_LOCATION" />
10 <uses-permission android:name="android.permission.ACCESS_WIFI_STATE" />
11 <uses-permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" />
12 <uses-permission android:name="android.permission.BLUETOOTH" />
13 <uses-permission android:name="android.permission.BLUETOOTH_ADMIN" />
14 <uses-permission android:name="android.permission.BLUETOOTH_PRIVILEGED" />
15 <uses-permission android:name="android.permission.CHANGE_NETWORK_STATE" />
16 <uses-permission android:name="android.permission.CHANGE_WIFI_STATE" />
17 <uses-permission android:name="android.permission.GET_ACCOUNTS" />
[all …]
/external/nist-sip/
DAndroidManifest.xml3 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" />
4 <uses-permission android:name="android.permission.INTERNET"></uses-permission>
5 <uses-permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"></uses-permission>
6 <uses-permission android:name="android.permission.RECORD_AUDIO"></uses-permission>
7 <uses-permission android:name="android.permission.PROCESS_OUTGOING_CALLS"></uses-permission>
8 <uses-permission android:name="android.permission.WRITE_SETTINGS"></uses-permission>
9 <uses-permission android:name="android.permission.READ_PHONE_STATE"></uses-permission>
10 <uses-permission android:name="android.permission.ACCESS_WIFI_STATE"></uses-permission>
11 <uses-permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"></uses-permission>
12 <uses-permission android:name="android.permission.READ_CONTACTS"></uses-permission>
[all …]
/external/ims/rcs/presencepolling/
DAndroidManifest.xml15 * derived from this software without specific prior written permission.
38 <permission android:name="com.android.rcs.eab.permission.READ_WRITE_EAB"
47 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE"/>
48 <uses-permission android:name="android.permission.BROADCAST_STICKY"/>
49 <uses-permission android:name="android.permission.INTERACT_ACROSS_USERS"/>
50 <uses-permission android:name="android.permission.READ_CONTACTS"/>
51 <uses-permission android:name="android.permission.WRITE_CONTACTS"/>
52 <uses-permission android:name="android.permission.READ_PHONE_STATE"/>
53 <uses-permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
54 <uses-permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"/>
[all …]
/external/python/google-api-python-client/docs/dyn/
Ddrive_v2.permissions.html82 <p class="firstline">Deletes a permission from a file or shared drive.</p>
85 <p class="firstline">Gets a permission by ID.</p>
88 <p class="firstline">Returns the permission ID for an email address.</p>
91 <p class="firstline">Inserts a permission for a file or shared drive.</p>
100 <p class="firstline">Updates a permission using patch semantics.</p>
103 <p class="firstline">Updates a permission.</p>
112 <pre>Deletes a permission from a file or shared drive.
116 permissionId: string, The ID for the permission. (required)
125 <pre>Gets a permission by ID.
129 permissionId: string, The ID for the permission. (required)
[all …]
Ddrive_v3.permissions.html82 <p class="firstline">Creates a permission for a file or shared drive.</p>
85 <p class="firstline">Deletes a permission.</p>
88 <p class="firstline">Gets a permission by ID.</p>
97 <p class="firstline">Updates a permission with patch semantics.</p>
106 <pre>Creates a permission for a file or shared drive.
113 { # A permission for a file. A permission grants a user, group, domain or the world access to a fil…
114 …&quot;allowFileDiscovery&quot;: True or False, # Whether the permission allows the file to be disc…
115 …&quot;deleted&quot;: True or False, # Whether the account associated with this permission has been…
116 …;pretty&quot; name of the value of the permission. The following is a list of examples for each ty…
121 &quot;domain&quot;: &quot;A String&quot;, # The domain to which this permission refers.
[all …]
Ddfareporting_v3_5.accountPermissions.html82 <p class="firstline">Gets one account permission by ID.</p>
94 <pre>Gets one account permission by ID.
98 id: string, Account permission ID. (required)
107 …information about a particular account permission. Some features of Campaign Manager require an ac…
108 …&quot;accountProfiles&quot;: [ # Account profiles associated with this account permission. Possibl…
111 &quot;id&quot;: &quot;A String&quot;, # ID of this account permission.
113 …vel&quot;: &quot;A String&quot;, # Administrative level required to enable this account permission.
114 &quot;name&quot;: &quot;A String&quot;, # Name of this account permission.
115 …&quot;permissionGroupId&quot;: &quot;A String&quot;, # Permission group of this account permission.
133 { # Account Permission List Response
[all …]
Ddfareporting_v3_3.accountPermissions.html82 <p class="firstline">Gets one account permission by ID.</p>
94 <pre>Gets one account permission by ID.
98 id: string, Account permission ID. (required)
107 …information about a particular account permission. Some features of Campaign Manager require an ac…
108 …&quot;accountProfiles&quot;: [ # Account profiles associated with this account permission. Possibl…
111 &quot;id&quot;: &quot;A String&quot;, # ID of this account permission.
113 …vel&quot;: &quot;A String&quot;, # Administrative level required to enable this account permission.
114 &quot;name&quot;: &quot;A String&quot;, # Name of this account permission.
115 …&quot;permissionGroupId&quot;: &quot;A String&quot;, # Permission group of this account permission.
133 { # Account Permission List Response
[all …]
Ddfareporting_v3_4.accountPermissions.html82 <p class="firstline">Gets one account permission by ID.</p>
94 <pre>Gets one account permission by ID.
98 id: string, Account permission ID. (required)
107 …information about a particular account permission. Some features of Campaign Manager require an ac…
108 …&quot;accountProfiles&quot;: [ # Account profiles associated with this account permission. Possibl…
111 &quot;id&quot;: &quot;A String&quot;, # ID of this account permission.
113 …vel&quot;: &quot;A String&quot;, # Administrative level required to enable this account permission.
114 &quot;name&quot;: &quot;A String&quot;, # Name of this account permission.
115 …&quot;permissionGroupId&quot;: &quot;A String&quot;, # Permission group of this account permission.
133 { # Account Permission List Response
[all …]
/external/angle/src/tests/test_utils/runner/android/java/
DAndroidManifest.xml.jinja213 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE"/>
14 <uses-permission android:name="android.permission.BLUETOOTH"/>
15 <uses-permission android:name="android.permission.BLUETOOTH_ADMIN"/>
16 <uses-permission android:name="android.permission.CHANGE_CONFIGURATION"/>
17 <uses-permission android:name="android.permission.CAMERA" />
18 <uses-permission android:name="android.permission.INTERNET"/>
19 <uses-permission android:name="android.permission.MANAGE_EXTERNAL_STORAGE"/>
20 <uses-permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"/>
21 <uses-permission android:name="android.permission.RECORD_AUDIO"/>
22 <uses-permission android:name="android.permission.SET_TIME_ZONE"/>
[all …]
/external/ims/rcs/rcsservice/
DAndroidManifest.xml15 * derived from this software without specific prior written permission.
40 <permission android:name="com.android.ims.rcs.permission.STATUS_CHANGED"
43 <permission android:name="com.android.ims.permission.PRESENCE_ACCESS"
48 <uses-permission android:name="android.permission.READ_PHONE_STATE"/>
49 <uses-permission android:name="android.permission.BROADCAST_STICKY"/>
50 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE"/>
51 <uses-permission android:name="com.android.ims.rcs.permission.STATUS_CHANGED"/>
52 <uses-permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
53 <uses-permission android:name="android.permission.ACCESS_UCE_PRESENCE_SERVICE"/>
54 <uses-permission android:name="com.android.ims.permission.PRESENCE_ACCESS"/>
[all …]
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/
DShadowPermissionChecker.java37 /** Set the result of permission check for a specific permission. */
38 public static void setResult(String packageName, String permission, int result) { in setResult() argument
42 RESULTS.get(packageName).put(permission, result); in setResult()
45 /** Check the permission of calling package. */
49 String permission, in checkCallingPermissionForDataDelivery() argument
53 return RESULTS.containsKey(packageName) && RESULTS.get(packageName).containsKey(permission) in checkCallingPermissionForDataDelivery()
54 ? RESULTS.get(packageName).get(permission) in checkCallingPermissionForDataDelivery()
56 context, permission, packageName, attributionTag, message); in checkCallingPermissionForDataDelivery()
59 /** Check general permission. */
63 String permission, in checkPermissionForDataDelivery() argument
[all …]
/external/rust/crates/grpcio-sys/grpc/test/core/security/
Dauthorization_matchers_test.cc49 std::vector<std::unique_ptr<Rbac::Permission>> rules; in TEST_F()
50 rules.push_back(absl::make_unique<Rbac::Permission>( in TEST_F()
51 Rbac::Permission::RuleType::kHeader, in TEST_F()
55 rules.push_back(absl::make_unique<Rbac::Permission>( in TEST_F()
56 Rbac::Permission::RuleType::kDestPort, /*port=*/123)); in TEST_F()
65 std::vector<std::unique_ptr<Rbac::Permission>> rules; in TEST_F()
66 rules.push_back(absl::make_unique<Rbac::Permission>( in TEST_F()
67 Rbac::Permission::RuleType::kHeader, in TEST_F()
71 rules.push_back(absl::make_unique<Rbac::Permission>( in TEST_F()
72 Rbac::Permission::RuleType::kDestPort, /*port=*/123)); in TEST_F()
[all …]
/external/webrtc/test/android/
DAndroidManifest.xml18 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE"/>
19 <uses-permission android:name="android.permission.BLUETOOTH"/>
20 <uses-permission android:name="android.permission.BLUETOOTH_ADMIN"/>
21 <uses-permission android:name="android.permission.CAMERA" />
22 <uses-permission android:name="android.permission.INTERNET"/>
23 <uses-permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"/>
24 <uses-permission android:name="android.permission.RECORD_AUDIO"/>
25 <uses-permission android:name="android.permission.WAKE_LOCK"/>
26 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"/>
/external/cpuinfo/test/dmesg/
Dxiaomi-mi-5c.log1198 [ 10.218945] e2fsck: /system/bin/e2fsck: Permission denied while trying to open /dev/block/platfo…
1252 [ 10.494891] init: SELinux: Could not set context for /cust: Permission denied
1254 [ 10.497577] init: SELinux: Could not set context for /cust/app: Permission denied
1256 [ 10.498990] init: SELinux: Could not set context for /cust/app/customized: Permission denied
1257 …nit: SELinux: Could not set context for /cust/app/customized/ota-miui-BBS_MSITE: Permission denied
1258 … set context for /cust/app/customized/ota-miui-BBS_MSITE/ota-miui-BBS_MSITE.apk: Permission denied
1259 …: SELinux: Could not set context for /cust/app/customized/ota-miui-GlobalMiShop: Permission denied
1264 …ontext for /cust/app/customized/ota-miui-GlobalMiShop/ota-miui-GlobalMiShop.apk: Permission denied
1265 …ld not set context for /cust/app/customized/ota-miui-MiGalleryLockscreen_global: Permission denied
1268 …zed/ota-miui-MiGalleryLockscreen_global/ota-miui-MiGalleryLockscreen_global.apk: Permission denied
[all …]
/external/rust/crates/grpcio-sys/grpc/src/core/lib/security/authorization/
Drbac_policy.h47 // TODO(ashithasantosh): Add metadata field to Permission and Principal.
48 struct Permission { struct
60 Permission() = default;
62 Permission(Permission::RuleType type,
63 std::vector<std::unique_ptr<Permission>> permissions,
66 explicit Permission(Permission::RuleType type, bool not_rule = false);
68 Permission(Permission::RuleType type, HeaderMatcher header_matcher,
71 Permission(Permission::RuleType type, StringMatcher string_matcher,
74 Permission(Permission::RuleType type, CidrRange ip, bool not_rule = false);
76 Permission(Permission::RuleType type, int port, bool not_rule = false);
[all …]
Dmatchers.cc46 Rbac::Permission permission) { in Create() argument
47 switch (permission.type) { in Create()
48 case Rbac::Permission::RuleType::kAnd: in Create()
50 std::move(permission.permissions), permission.not_rule); in Create()
51 case Rbac::Permission::RuleType::kOr: in Create()
53 std::move(permission.permissions), permission.not_rule); in Create()
54 case Rbac::Permission::RuleType::kAny: in Create()
55 return absl::make_unique<AlwaysAuthorizationMatcher>(permission.not_rule); in Create()
56 case Rbac::Permission::RuleType::kHeader: in Create()
58 std::move(permission.header_matcher), permission.not_rule); in Create()
[all …]
Drbac_policy.cc75 // Permission
78 Rbac::Permission::Permission( in Permission() function in grpc_core::Rbac::Permission
79 Permission::RuleType type, in Permission()
80 std::vector<std::unique_ptr<Permission>> permissions, bool not_rule) in Permission()
82 Rbac::Permission::Permission(Permission::RuleType type, bool not_rule) in Permission() function in grpc_core::Rbac::Permission
84 Rbac::Permission::Permission(Permission::RuleType type, in Permission() function in grpc_core::Rbac::Permission
89 Rbac::Permission::Permission(Permission::RuleType type, in Permission() function in grpc_core::Rbac::Permission
94 Rbac::Permission::Permission(Permission::RuleType type, CidrRange ip, in Permission() function in grpc_core::Rbac::Permission
97 Rbac::Permission::Permission(Permission::RuleType type, int port, bool not_rule) in Permission() function in grpc_core::Rbac::Permission
100 Rbac::Permission::Permission(Rbac::Permission&& other) noexcept in Permission() function in grpc_core::Rbac::Permission
[all …]
/external/crosvm/devices/src/virtio/iommu/
Dmemory_mapper.rs23 pub enum Permission { enum
33 pub perm: Permission,
73 pub perm: Permission,
78 fn new(iova: u64, gpa: GuestAddress, size: u64, perm: Permission) -> Result<Self> { in new()
203 /// Regions of contiguous iovas and gpas, and identical permission are merged
271 MappingInfo::new(u64::MAX - 1, GuestAddress(1), 2, Permission::Read).unwrap_err(); in test_mapping_info()
272 MappingInfo::new(1, GuestAddress(u64::MAX - 1), 2, Permission::Read).unwrap_err(); in test_mapping_info()
273 MappingInfo::new(u64::MAX, GuestAddress(1), 2, Permission::Read).unwrap_err(); in test_mapping_info()
274 MappingInfo::new(1, GuestAddress(u64::MAX), 2, Permission::Read).unwrap_err(); in test_mapping_info()
275 MappingInfo::new(5, GuestAddress(5), u64::MAX, Permission::Read).unwrap_err(); in test_mapping_info()
[all …]
/external/libtextclassifier/java/
DAndroidManifest.xml32 <uses-permission android:name="android.permission.QUERY_ALL_PACKAGES" />
33 <uses-permission android:name="android.permission.ACCESS_COARSE_LOCATION" />
35 <uses-permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" />
36 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE"/>
37 <!-- The INTERNET permission is restricted to the modelDownloaderServiceProcess -->
38 <uses-permission android:name="android.permission.INTERNET"/>
42 <deny-permission android:name="android.permission.INTERNET" />
45 <allow-permission android:name="android.permission.INTERNET" />
59 android:permission="android.permission.BIND_TEXTCLASSIFIER_SERVICE">
/external/webrtc/sdk/android/instrumentationtests/
DAndroidManifest.xml21 <uses-permission android:name="android.permission.CAMERA" />
22 <uses-permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" />
23 <uses-permission android:name="android.permission.RECORD_AUDIO" />
24 <uses-permission android:name="android.permission.INTERNET" />
25 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"/>
26 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
27 <uses-permission android:name="android.permission.CHANGE_NETWORK_STATE" />
28 <uses-permission android:name="android.permission.RUN_INSTRUMENTATION" />
/external/deqp/android/package/
DAndroidManifest-integration.xml39 <uses-permission android:name="android.permission.READ_EXTERNAL_STORAGE" />
40 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" />
41 <uses-permission android:name="android.permission.MANAGE_EXTERNAL_STORAGE" />
42 <uses-permission android:name="android.permission.GET_TASKS" />
43 <uses-permission android:name="android.permission.INTERNET" />
44 <uses-permission android:name="android.permission.RUN_INSTRUMENTATION" />
45 <uses-permission android:name="android.permission.SYSTEM_ALERT_WINDOW" />
46 <uses-permission android:name="android.permission.FOREGROUND_SERVICE" />
DAndroidManifest.xml38 <uses-permission android:name="android.permission.READ_EXTERNAL_STORAGE" />
39 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" />
40 <uses-permission android:name="android.permission.GET_TASKS" />
41 <uses-permission android:name="android.permission.INTERNET" />
42 <uses-permission android:name="android.permission.RUN_INSTRUMENTATION" />
43 <uses-permission android:name="android.permission.SYSTEM_ALERT_WINDOW" />
44 <uses-permission android:name="android.permission.FOREGROUND_SERVICE" />
/external/webrtc/examples/androidapp/
DAndroidManifest.xml13 <uses-permission android:name="android.permission.CAMERA" />
14 <uses-permission android:name="android.permission.CHANGE_NETWORK_STATE" />
15 <uses-permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" />
16 <uses-permission android:name="android.permission.RECORD_AUDIO" />
17 <uses-permission android:name="android.permission.BLUETOOTH" />
18 <uses-permission android:name="android.permission.INTERNET" />
19 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"/>
20 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />

12345678910>>...411