/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp29/src/com/android/cts/usepermission/ |
UsePermissionTest29.java | 13 * See the License for the specific language governing permissions and 49 private BasePermissionActivity.Result requestPermissions(String[] permissions, 51 return super.requestPermissions(permissions, 67 String[] permissions, boolean... granted) { 69 permissions, granted); 80 String[] permissions = {ACCESS_FINE_LOCATION}; 82 BasePermissionActivity.Result result = requestPermissions(permissions, 84 assertPermissionRequestResult(result, permissions, true); 92 String[] permissions = {ACCESS_BACKGROUND_LOCATION}; 94 BasePermissionActivity.Result result = requestPermissions(permissions); [all...] |
/external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/filesystem/ |
PermissionsTest.groovy | 13 * See the License for the specific language governing permissions and
21 * Tests for the Permissions class
55 assert new Permissions('rwxrwxrwx').hashCode() == Permissions.DEFAULT.hashCode()
56 assert new Permissions('---------').hashCode() == Permissions.NONE.hashCode()
60 assert new Permissions('rwxrwxrwx').equals(Permissions.DEFAULT)
61 assert new Permissions('---------').equals(Permissions.NONE) [all...] |
DirectoryEntryTest.groovy | 13 * See the License for the specific language governing permissions and
33 entry.permissions = PERMISSIONS
41 assert clone.permissions == PERMISSIONS
|
/external/robolectric-shadows/robolectric/src/main/java/org/robolectric/android/internal/ |
LocalPermissionGranter.java | 14 private String[] permissions; field in class:LocalPermissionGranter 17 public void addPermissions(String... permissions) { 18 this.permissions = permissions; 23 checkNotNull(permissions); 27 shadowApplication.grantPermissions(permissions);
|
/external/libchrome/base/debug/ |
proc_maps_linux.cc | 116 char permissions[5] = {'\0'}; // Ensure NUL-terminated string. local 131 ®ion.start, ®ion.end, permissions, ®ion.offset, 137 region.permissions = 0; 139 if (permissions[0] == 'r') 140 region.permissions |= MappedMemoryRegion::READ; 141 else if (permissions[0] != '-') 144 if (permissions[1] == 'w') 145 region.permissions |= MappedMemoryRegion::WRITE; 146 else if (permissions[1] != '-') 149 if (permissions[2] == 'x' [all...] |
/external/libcxx/test/std/input.output/filesystems/class.file_status/ |
file_status.mods.pass.cpp | 17 // void permissions(perms) noexcept; 39 // permissions test 41 static_assert(noexcept(st.permissions(perms::owner_read)), 43 static_assert(std::is_same<decltype(st.permissions(perms::owner_read)), void>::value, 45 assert(st.permissions() != perms::owner_read); 46 st.permissions(perms::owner_read); 47 assert(st.permissions() == perms::owner_read);
|
file_status.obs.pass.cpp | 17 // perms permissions(p) const noexcept; 37 // permissions test 39 static_assert(noexcept(st.permissions()), 41 static_assert(std::is_same<decltype(st.permissions()), perms>::value, 43 assert(st.permissions() == perms::owner_read);
|
file_status.cons.pass.cpp | 36 assert(f.permissions() == perms::unknown); 48 assert(f.permissions() == perms::unknown); 58 assert(f.permissions() == perms::owner_read);
|
/external/pdfium/fxjs/xfa/ |
cjx_mdp.h | 19 JS_PROP(permissions);
|
/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp23/src/com/android/cts/usepermission/ |
BasePermissionActivity.java | 13 * See the License for the specific language governing permissions and 35 public final String[] permissions; field in class:BasePermissionActivity.Result 38 public Result(int requestCode, String[] permissions, int[] grantResults) { 40 this.permissions = permissions; 57 public void onRequestPermissionsResult(int requestCode, String[] permissions, 60 mResult.offer(new Result(requestCode, permissions, grantResults), 5, TimeUnit.SECONDS);
|
UsePermissionTest23.java | 13 * See the License for the specific language governing permissions and 123 assertEquals(Manifest.permission.READ_CALENDAR, result.permissions[0]); 124 assertEquals(Manifest.permission.WRITE_CALENDAR, result.permissions[1]); 147 String[] permissions = new String[] {Manifest.permission.WRITE_CONTACTS}; local 150 BasePermissionActivity.Result result = requestPermissions(permissions, 164 permissions, new boolean[] {true}); 166 // Make sure no undeclared as used permissions are granted 179 String[] permissions = new String[] {Manifest.permission.RECEIVE_SMS}; local 184 BasePermissionActivity.Result result = requestPermissions(permissions, 198 permissions, new boolean[] {true}) 211 String[] permissions = new String[] {Manifest.permission.WRITE_CONTACTS}; local 237 String[] permissions = new String[] {Manifest.permission.WRITE_CONTACTS}; local 271 String[] permissions = new String[] {Manifest.permission.WRITE_CONTACTS}; local 347 String[] permissions = new String[] {Manifest.permission.READ_CALENDAR}; local 417 String[] permissions = new String[] {Manifest.permission.BIND_PRINT_SERVICE}; local 434 String[] permissions = new String[] {"permission.does.not.exist"}; local 453 String[] permissions = new String[] { local 570 String[] permissions = new String[] {null}; local 590 String[] permissions = new String[] { local 623 String[] permissions = new String[] { local [all...] |
/external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/filesystem/ |
AbstractFileSystemEntry.java | 13 * See the License for the specific language governing permissions and
61 public Permissions getPermissions() {
62 return permissions;
65 public void setPermissions(Permissions permissions) {
66 this.permissions = permissions;
69 private Permissions permissions;
field in class:AbstractFileSystemEntry 119 this.permissions = new Permissions(permissionsString); [all...] |
/external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/ |
UserAccount.java | 13 * See the License for the specific language governing permissions and
20 import org.mockftpserver.fake.filesystem.Permissions;
26 * directory, list of groups to which this user belongs, and default permissions applied to
37 * The default value for <code>defaultPermissionsForNewFile</code> is read and write permissions for
39 * write and execute permissions for all (user/group/world).
60 public static final Permissions DEFAULT_PERMISSIONS_FOR_NEW_FILE = new Permissions("rw-rw-rw-");
61 public static final Permissions DEFAULT_PERMISSIONS_FOR_NEW_DIRECTORY = Permissions.ALL;
70 private Permissions defaultPermissionsForNewFile = DEFAULT_PERMISSIONS_FOR_NEW_FILE; 214 Permissions permissions = entry.getPermissions(); local 235 Permissions permissions = entry.getPermissions(); local 256 Permissions permissions = entry.getPermissions(); local [all...] |
/device/google/cuttlefish/shared/gsi/ |
device.mk | 13 # See the License for the specific language governing permissions and 46 frameworks/native/data/etc/android.hardware.telephony.gsm.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.telephony.gsm.xml 57 device/generic/goldfish/data/etc/permissions/privapp-permissions-goldfish.xml:$(TARGET_COPY_OUT_SYSTEM)/etc/permissions/privapp-permissions-goldfish.xml
|
/external/autotest/frontend/afe/ |
management.py | 19 Create a basic admin group with permissions for managing basic autotest 24 admin_group.save() # must save before adding permissions 26 have_permissions = list(admin_group.permissions.all()) 31 permissions = list(PermissionModel.objects.filter( 33 if len(permissions) == 0: 37 for permission in permissions: 41 admin_group.permissions.add(permission)
|
/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp26/src/com/android/cts/usepermission/ |
UsePermissionTest26.java | 13 * See the License for the specific language governing permissions and 40 String[] permissions = new String[]{Manifest.permission.RECEIVE_SMS}; local 45 BasePermissionActivity.Result result = requestPermissions(permissions, 59 permissions, new boolean[]{true});
|
/external/robolectric-shadows/robolectric/src/test/java/org/robolectric/shadows/ |
LegacyManifestParserTest.java | 35 getPermissionInfo(parsedPackage.permissions, "signature_or_privileged_permission") 45 getPermissionInfo(parsedPackage.permissions, "permission_with_minimal_fields") 54 getPermissionInfo(parsedPackage.permissions, "vendor_privileged_or_oem_permission") 65 getPermissionInfo(parsedPackage.permissions, "dangerous_permission").protectionLevel; 69 private PermissionInfo getPermissionInfo(List<Permission> permissions, String name) { 71 for (Permission permission : permissions) {
|
/device/generic/car/common/ |
car.mk | 13 # See the License for the specific language governing permissions and 36 device/generic/car/common/android.hardware.dummy.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/handheld_core_hardware.xml \ 37 device/generic/car/common/car_core_hardware.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/car_core_hardware.xml 41 frameworks/native/data/etc/android.hardware.screen.landscape.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.screen.landscape.xml 45 frameworks/native/data/etc/android.software.activities_on_secondary_displays.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.activities_on_secondary_displays.xml 49 frameworks/native/data/etc/android.hardware.wifi.passpoint.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.wifi.passpoint.xml 51 # Additional permissions 53 frameworks/native/data/etc/android.hardware.bluetooth_le.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.bluetooth_le.xml \ 54 frameworks/native/data/etc/android.hardware.bluetooth.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.bluetooth.xml \ 55 frameworks/native/data/etc/android.hardware.broadcastradio.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.broadcastradio.xml [all...] |
/external/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.permissions/ |
permissions.pass.cpp | 14 // void permissions(const path& p, perms prms, 16 // void permissions(const path& p, perms prms, std::error_code& ec) noexcept; 17 // void permissions(const path& p, perms prms, perm_options opts, std::error_code); 39 ASSERT_NOT_NOEXCEPT(fs::permissions(p, pr)); 40 ASSERT_NOT_NOEXCEPT(fs::permissions(p, pr, opts)); 41 ASSERT_NOEXCEPT(fs::permissions(p, pr, ec)); 42 ASSERT_NOT_NOEXCEPT(fs::permissions(p, pr, opts, ec)); 52 fs::permissions(f, opts); 70 fs::permissions(dne, fs::perms{}, ec); 77 fs::permissions(dne_sym, fs::perms{}, ec) [all...] |
/developers/build/prebuilts/gradle/RuntimePermissions/kotlinApp/app/src/main/java/com/example/android/system/runtimepermissions/extensions/ |
AppCompatActivityExts.kt | 13 * See the License for the specific language governing permissions and 31 fun AppCompatActivity.batchRequestPermissions(permissions: Array<String>, requestId: Int) = 32 ActivityCompat.requestPermissions(this, permissions, requestId
|
/developers/samples/android/system/RuntimePermissions/kotlinApp/app/src/main/java/com/example/android/system/runtimepermissions/extensions/ |
AppCompatActivityExts.kt | 13 * See the License for the specific language governing permissions and 31 fun AppCompatActivity.batchRequestPermissions(permissions: Array<String>, requestId: Int) = 32 ActivityCompat.requestPermissions(this, permissions, requestId
|
/device/google/atv/products/ |
treble_atv_common.mk | 13 # See the License for the specific language governing permissions and 76 # privapp-permissions whitelisting 78 device/google/atv/permissions/privapp-permissions-atv-gsi.xml:system/etc/permissions/privapp-permissions-atv-gsi.xml
|
/external/libcxx/test/std/input.output/filesystems/class.directory_entry/directory_entry.obs/ |
status.pass.cpp | 46 TEST_CHECK(ps.permissions() == es.permissions()); 54 TEST_CHECK(ps.permissions() == es.permissions());
|
symlink_status.pass.cpp | 46 TEST_CHECK(ps.permissions() == es.permissions()); 54 TEST_CHECK(ps.permissions() == es.permissions());
|
/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
ShadowContextWrapper.java | 88 /** Grant the given permissions for the current process and user. */ 93 /** Grant the given permissions for the given process and user. */ 94 public void grantPermissions(int pid, int uid, String... permissions) { 95 getShadowInstrumentation().grantPermissions(pid, uid, permissions); 99 * Revoke the given permissions for the current process and user. 101 * Has no effect if permissions were not previously granted. 107 /** Revoke the given permissions for the given process and user. */ 108 public void denyPermissions(int pid, int uid, String... permissions) { 109 getShadowInstrumentation().denyPermissions(pid, uid, permissions);
|