/device/google/muskie/ |
aosp_walleye.mk | 13 # See the License for the specific language governing permissions and 34 frameworks/native/data/etc/aosp_excluded_hardware.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/aosp_excluded_hardware.xml
|
/device/google/taimen/ |
aosp_taimen.mk | 13 # See the License for the specific language governing permissions and 34 frameworks/native/data/etc/aosp_excluded_hardware.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/aosp_excluded_hardware.xml
|
/external/selinux/libsepol/include/sepol/policydb/ |
constraint.h | 7 * order for one or more permissions to be granted. 68 sepol_access_vector_t permissions; /* constrained permissions */ member in struct:constraint_node 69 constraint_expr_t *expr; /* constraint on permissions */
|
/cts/tests/tests/telephony/TestSmsApp/src/android/telephony/cts/sms/ |
MainActivity.java | 13 * See the License for the specific language governing permissions and 44 public void onRequestPermissionsResult(int requestCode, String[] permissions, 74 super.onRequestPermissionsResult(requestCode, permissions, grantResults);
|
/external/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.is_empty/ |
is_empty.pass.cpp | 71 permissions(dir, perms::none); 85 permissions(dir, perms::none);
|
/external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/filesystem/ |
UnixDirectoryListingFormatter.java | 13 * See the License for the specific language governing permissions and
58 Permissions permissions = fileSystemEntry.getPermissions() != null ? fileSystemEntry.getPermissions() : Permissions.DEFAULT;
local 59 String permissionsStr = StringUtil.padRight(permissions.asRwxString(), 9);
|
/device/google/bonito/self-extractors/qcom/staging/ |
device-partial.mk | 12 # See the License for the specific language governing permissions and 22 vendor/qcom/bonito/proprietary/cneapiclient.xml:system/etc/permissions/cneapiclient.xml:qcom \ 23 vendor/qcom/bonito/proprietary/com.quicinc.cne.xml:system/etc/permissions/com.quicinc.cne.xml:qcom \ 24 vendor/qcom/bonito/proprietary/embms.xml:system/etc/permissions/embms.xml:qcom \ 25 vendor/qcom/bonito/proprietary/LteDirectDiscovery.xml:system/etc/permissions/LteDirectDiscovery.xml:qcom \ 26 vendor/qcom/bonito/proprietary/qcrilhook.xml:system/etc/permissions/qcrilhook.xml:qcom \ 27 vendor/qcom/bonito/proprietary/radioconfiginterface.xml:system/etc/permissions/radioconfiginterface.xml:qcom \ 28 vendor/qcom/bonito/proprietary/radioconfig.xml:system/etc/permissions/radioconfig.xml:qcom \ 29 vendor/qcom/bonito/proprietary/telephonyservice.xml:system/etc/permissions/telephonyservice.xml:qcom \ 30 vendor/qcom/bonito/proprietary/uimremoteclient.xml:system/etc/permissions/uimremoteclient.xml:qcom [all...] |
/device/google/bonito/self-extractors_sargo/qcom/staging/ |
device-partial.mk | 12 # See the License for the specific language governing permissions and 22 vendor/qcom/sargo/proprietary/cneapiclient.xml:system/etc/permissions/cneapiclient.xml:qcom \ 23 vendor/qcom/sargo/proprietary/com.quicinc.cne.xml:system/etc/permissions/com.quicinc.cne.xml:qcom \ 24 vendor/qcom/sargo/proprietary/embms.xml:system/etc/permissions/embms.xml:qcom \ 25 vendor/qcom/sargo/proprietary/LteDirectDiscovery.xml:system/etc/permissions/LteDirectDiscovery.xml:qcom \ 26 vendor/qcom/sargo/proprietary/qcrilhook.xml:system/etc/permissions/qcrilhook.xml:qcom \ 27 vendor/qcom/sargo/proprietary/radioconfiginterface.xml:system/etc/permissions/radioconfiginterface.xml:qcom \ 28 vendor/qcom/sargo/proprietary/radioconfig.xml:system/etc/permissions/radioconfig.xml:qcom \ 29 vendor/qcom/sargo/proprietary/telephonyservice.xml:system/etc/permissions/telephonyservice.xml:qcom \ 30 vendor/qcom/sargo/proprietary/uimremoteclient.xml:system/etc/permissions/uimremoteclient.xml:qcom [all...] |
/device/linaro/poplar/ |
device.mk | 20 frameworks/native/data/etc/android.software.app_widgets.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.app_widgets.xml \ 21 frameworks/native/data/etc/android.hardware.screen.landscape.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.screen.landscape.xml \ 22 frameworks/native/data/etc/android.hardware.usb.host.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.usb.host.xml \ 23 frameworks/native/data/etc/android.software.print.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.print.xml \ 24 frameworks/native/data/etc/android.software.webview.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.webview.xml \ 25 frameworks/native/data/etc/android.hardware.ethernet.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.ethernet.xml 43 frameworks/native/data/etc/android.hardware.audio.output.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.audio.output.xml \ 44 frameworks/native/data/etc/android.hardware.audio.low_latency.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.audio.low_latency.xml 132 frameworks/native/data/etc/android.hardware.bluetooth.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.bluetooth.xml \ 133 frameworks/native/data/etc/android.hardware.bluetooth_le.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.bluetooth_le.xm [all...] |
/external/autotest/client/site_tests/documentscan_AppTestWithFakeLorgnette/document_scan_test_app/ |
scan.js | 26 var permissionObj = {permissions: ['documentScan']}; property in class:permissionObj 30 chrome.permissions.request( permissionObj, function(result) { 65 chrome.permissions.contains(permissionObj, function(result) {
|
/external/libcxx/test/std/input.output/filesystems/class.directory_entry/directory_entry.mods/ |
replace_filename.pass.cpp | 138 const perms old_perms = status(dir).permissions(); 142 permissions(dir, perms::none); 147 permissions(dir, old_perms); 150 permissions(dir, perms::none); 155 permissions(dir, old_perms); 158 permissions(dir, perms::none);
|
/external/libcxx/test/std/input.output/filesystems/fs.op.funcs/fs.op.copy_file/ |
copy_file.pass.cpp | 109 permissions(file, new_perms); 114 TEST_CHECK(new_st.permissions() == new_perms); 145 permissions(dest, perms::all); 146 permissions(file, 155 TEST_CHECK(status(dest).permissions() == status(file).permissions());
|
/external/vboot_reference/utility/ |
chromeos-tpm-recovery | 147 # define_space <index> <size> <permissions> 152 local permissions=$3 178 $tpmc definespace $index $size $permissions 183 local permissions=$2 213 # If space exists but permissions are bad, delete the space. 214 if [ $space_exists -eq 1 -a $observed_permissions != $permissions ]; then 215 log "space $index has unexpected permissions $permissions" 223 if ! define_space $index $size $permissions; then
|
/cts/tests/framework/base/windowmanager/dndtargetapp/src/android/server/wm/dndtargetapp/ |
DropTarget.java | 13 * See the License for the specific language governing permissions and 125 // Try accessing the Uri without the permissions grant. 131 // Try accessing the Uri after the permissions have been released. 174 DragAndDropPermissions permissions = null; local 176 permissions = requestDragAndDropPermissions(event); 177 if (permissions == null) { 185 if (permissions != null) { 186 permissions.release();
|
/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp23/src/com/android/cts/usepermission/ |
BasePermissionsTest.java | 13 * See the License for the specific language governing permissions and 86 int requestCode, String[] permissions, boolean[] granted) { 88 for (int i = 0; i < permissions.length; i++) { 89 assertEquals(permissions[i], result.permissions[i]); 272 String[] permissions, int requestCode, Class<?> clazz, Runnable postRequestAction) 280 // Request the permissions 281 activity.requestPermissions(permissions, requestCode); 346 protected void grantPermissions(String[] permissions) throws Exception { 347 setPermissionGrantState(permissions, true, false) [all...] |
/device/google/crosshatch/ |
device-common.mk | 13 # See the License for the specific language governing permissions and 58 frameworks/native/data/etc/android.software.midi.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.software.midi.xml 62 frameworks/native/data/etc/android.hardware.audio.low_latency.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.audio.low_latency.xml 66 frameworks/native/data/etc/android.hardware.audio.pro.xml:$(TARGET_COPY_OUT_VENDOR)/etc/permissions/android.hardware.audio.pro.xml
|
/art/test/071-dexfile-map-clean/src/ |
Main.java | 13 * See the License for the specific language governing permissions and 49 String permissions = split[1]; local 51 if (!permissions.startsWith("r--p")) {
|
/build/blueprint/gotestmain/ |
testmain_test.go | 12 // See the License for the specific language governing permissions and
|
/build/blueprint/ |
mangle.go | 12 // See the License for the specific language governing permissions and
|
/build/blueprint/microfactory/main/ |
main.go | 12 // See the License for the specific language governing permissions and
|
/build/kati/ |
doc.go | 12 // See the License for the specific language governing permissions and
|
flags.go | 12 // See the License for the specific language governing permissions and
|
version.go | 12 // See the License for the specific language governing permissions and
|
/build/make/target/product/ |
media_system.mk | 13 # See the License for the specific language governing permissions and 45 frameworks/native/data/etc/android.software.webview.xml:system/etc/permissions/android.software.webview.xml 49 frameworks/native/data/etc/android.software.preview_sdk.xml:system/etc/permissions/android.software.preview_sdk.xml
|
/build/make/tools/droiddoc/templates-pdk/ |
trailer.cs | 17 See the License for the specific language governing permissions and
|