/external/icu/icu4j/main/shared/data/ |
D | security.policy | 12 // permission java.lang.RuntimePermission "getProtectionDomain"; 14 permission java.lang.RuntimePermission "accessDeclaredMembers"; 17 permission java.util.PropertyPermission "user.language", "write"; 20 permission java.lang.RuntimePermission "charsetProvider", "read"; 24 permission java.lang.RuntimePermission "accessClassInPackage.sun.util.calendar"; 27 …permission java.util.PropertyPermission "com.ibm.icu.text.DecimalFormat.SkipExtendedSeparatorParsi… 30 permission java.util.PropertyPermission "user.timezone", "write"; 33 permission java.lang.RuntimePermission "createClassLoader"; 37 // file and give the called code permission to read the calling code's 48 permission java.io.FilePermission "${/}${user.dir}${/}icu4jtests.jar", "read"; [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/s3/ |
D | acl.py | 42 grants.append("%s (owner) = %s" % (g.display_name, g.permission)) 50 grants.append("%s = %s" % (u, g.permission)) 94 def add_email_grant(self, permission, email_address): argument 95 grant = Grant(permission=permission, type='AmazonCustomerByEmail', 99 def add_user_grant(self, permission, user_id, display_name=None): argument 100 … grant = Grant(permission=permission, type='CanonicalUser', id=user_id, display_name=display_name) 128 def __init__(self, permission=None, type=None, id=None, argument 130 self.permission = permission 154 self.permission = value 169 s += '<Permission>%s</Permission>' % self.permission
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/gs/ |
D | acl.py | 79 def add_email_grant(self, permission, email_address): argument 81 permission=permission) 86 def add_user_grant(self, permission, user_id): argument 87 entry = Entry(permission=permission, type=USER_BY_ID, id=user_id) 90 def add_group_email_grant(self, permission, email_address): argument 92 permission=permission) 95 def add_group_grant(self, permission, group_id): argument 96 entry = Entry(type=GROUP_BY_ID, id=group_id, permission=permission) 171 email_address=None, domain=None, permission=None): argument 175 self.permission = permission [all …]
|
D | bucket.py | 616 def add_email_grant(self, permission, email_address, argument 641 if permission not in GSPermissions: 643 'Unknown Permission: %s' % permission) 645 acl.add_email_grant(permission, email_address) 649 key.add_email_grant(permission, email_address, headers=headers) 653 def add_user_grant(self, permission, user_id, recursive=False, argument 678 if permission not in GSPermissions: 680 'Unknown Permission: %s' % permission) 682 acl.add_user_grant(permission, user_id) 686 key.add_user_grant(permission, user_id, headers=headers) [all …]
|
D | key.py | 320 def add_email_grant(self, permission, email_address): argument 338 acl.add_email_grant(permission, email_address) 341 def add_user_grant(self, permission, user_id): argument 359 acl.add_user_grant(permission, user_id) 362 def add_group_email_grant(self, permission, email_address, headers=None): argument 380 acl.add_group_email_grant(permission, email_address) 383 def add_group_grant(self, permission, group_id): argument 401 acl.add_group_grant(permission, group_id)
|
/external/libgdx/backends/gdx-backends-gwt/src/com/badlogic/gdx/backends/gwt/emu/java/security/ |
D | AccessControlException.java | 14 private final Permission permission; field in AccessControlException 20 public AccessControlException (String message, Permission permission) { in AccessControlException() argument 22 this.permission = permission; in AccessControlException() 26 return permission; in getPermission()
|
/external/ppp/pppd/plugins/radius/ |
D | COPYRIGHT | 8 copyright and permission notice appear on all copies and supporting 11 without specific prior permission, and notice be given in supporting 12 documentation that copying and distribution is by permission of 24 permission notice appear on all copies and supporting documentation, the 26 distribution of the program without specific prior permission, and notice be 28 permission of Lars Fenneberg. 40 and permission notice appear on all copies and supporting documentation, 43 prior permission, and notice be given in supporting documentation that 44 copying and distribution is by permission of Livingston Enterprises, Inc. 55 that the above copyright notice and this permission notice appear in all [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
D | ProviderConfigurationPermission.java | 107 Permission permission) in implies() argument 109 if (!(permission instanceof ProviderConfigurationPermission)) in implies() 114 if (!this.getName().equals(permission.getName())) in implies() 119 ProviderConfigurationPermission other = (ProviderConfigurationPermission)permission; in implies()
|
/external/autotest/frontend/afe/ |
D | management.py | 37 for permission in permissions: 38 if permission not in have_permissions: 41 admin_group.permissions.add(permission)
|
/external/libpcap/ |
D | README.macosx | 7 changed to give users other than root permission to read or write those 12 devices to give users other than root permission to read or write those 27 "admin" group owns them, and will change the permission of the BPF 61 If you want to give a particular user permission to access the BPF 62 devices, rather than giving all administrative users permission to 65 give a particular user permission to read and write the BPF devices and 66 give the administrative users permission to read but not write the BPF 72 to grant write permission to everybody who should be allowed to capture
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/about_files/ |
D | pixman-licenses.txt | 8 copyright notice and this permission notice appear in supporting 11 The above copyright notice and this permission notice shall be included in 33 both that copyright notice and this permission notice appear in 36 software without specific, written prior permission. 54 copyright notice and this permission notice appear in supporting 57 specific, written prior permission. Keith Packard makes no 77 both that copyright notice and this permission notice appear in 80 software without specific, written prior permission. Richard Henderson
|
/external/selinux/secilc/docs/ |
D | cil_class_and_permission_statements.md | 202 Declares a class permission set identifier in the current namespace that can be used by one or more… 234 Defines a class permission set identifier in the current namespace that associates a class and one … 263 <p>Note that there must be at least one <code>permission</code> identifier or <code>expr</code> dec… 279 These class permission set statements will resolve to the permission sets shown in the kernel polic… 416 These class mapping statements will resolve to the permission sets shown in the kernel policy langu… 461 Defines a named extended permission, which can be used in the [`allowx`](cil_access_vector_rules.md… 465 (permissionx permissionx_id (kind class_id (permission ... | expr ...))) 481 <td align="left"><p>A keyword specifying how to interpret the extended permission values. Must be o… 502 <td align="left"><p><code>permission</code></p></td> 508 <p><code> (range (permission ...) (permission ...))</code></p> [all …]
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
D | MyPermissionCollection.java | 35 public void add(Permission permission) { in add() argument 51 public boolean implies(Permission permission) {
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/ |
D | translation_helper.py | 730 permission = cls.JSON_TO_XML_ROLES[entry_json['role']] 732 return Entry(type=ALL_USERS, permission=permission) 734 return Entry(type=ALL_AUTHENTICATED_USERS, permission=permission) 744 permission=permission) 751 permission=permission) 756 permission=permission) 788 acl_entry_json['role'] = cls.XML_TO_JSON_ROLES[entry.permission]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/gs/ |
D | test_versioning.py | 146 public_read_entries1 = [e for e in entries2g1 if e.permission == "READ" 148 public_read_entries2 = [e for e in entries2g2 if e.permission == "READ" 191 public_read_entries1 = [e for e in entries2g1 if e.permission == "READ" 193 public_read_entries2 = [e for e in entries2g2 if e.permission == "READ" 228 public_read_entries1 = [e for e in entries2g1 if e.permission == "READ" 230 public_read_entries2 = [e for e in entries2g2 if e.permission == "READ"
|
/external/c-ares/ |
D | NOTICE | 6 notice and this permission notice appear in supporting documentation, and that 8 distribution of the software without specific, written prior permission.
|
/external/owasp/sanitizer/tools/findbugs/licenses/ |
D | LICENSE-dom4j.txt | 18 permission of MetaStuff, Ltd. For written permission, please 23 permission of MetaStuff, Ltd. DOM4J is a registered trademark of
|
/external/libchrome/base/test/ |
D | test_file_util_posix.cc | 27 bool DenyFilePermission(const FilePath& path, mode_t permission) { in DenyFilePermission() argument 31 stat_buf.st_mode &= ~permission; in DenyFilePermission()
|
/external/llvm/autoconf/ |
D | LICENSE.TXT | 16 copyright notice and this permission notice appear in supporting 19 written prior permission. M.I.T. makes no representations about the
|
/external/fonttools/ |
D | NOTICE | 9 that both that copyright notice and this permission notice appear 13 permission.
|
D | LICENSE.txt | 9 that both that copyright notice and this permission notice appear 13 permission.
|
/external/opencv3/3rdparty/libtiff/ |
D | COPYRIGHT | 6 that (i) the above copyright notices and this permission notice appear in 10 permission of Sam Leffler and Silicon Graphics.
|
/external/e2fsprogs/debian/ |
D | libss2.copyright | 19 this permission notice appear in supporting documentation, 22 of the software without specific, written prior permission.
|
D | libcomerr2.copyright | 18 this permission notice appear in supporting documentation, 21 of the software without specific, written prior permission.
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/bin/ |
D | lss3 | 40 if g.permission == "READ": 42 elif g.permission == "FULL_CONTROL":
|