HomeSort by relevance Sort by last modified time
    Searched full:permissions (Results 26 - 50 of 30119) sorted by null

12 3 4 5 6 7 8 91011>>

  /frameworks/base/data/etc/
android.hardware.telephony.gsm.xml 13 See the License for the specific language governing permissions and
18 <permissions>
21 </permissions>
android.hardware.touchscreen.multitouch.xml 13 See the License for the specific language governing permissions and
20 <permissions>
23 </permissions>
android.hardware.touchscreen.xml 13 See the License for the specific language governing permissions and
19 <permissions>
21 </permissions>
android.hardware.wifi.xml 13 See the License for the specific language governing permissions and
18 <permissions>
20 </permissions>
android.software.sip.voip.xml 13 See the License for the specific language governing permissions and
18 <permissions>
21 </permissions>
android.software.sip.xml 13 See the License for the specific language governing permissions and
18 <permissions>
20 </permissions>
  /frameworks/base/location/lib/
com.android.location.provider.xml 13 See the License for the specific language governing permissions and
17 <permissions>
20 </permissions>
  /libcore/luni/src/main/java/java/io/
FilePermissionCollection.java 14 * See the License for the specific language governing permissions and
34 Vector<Permission> permissions = new Vector<Permission>(); field in class:FilePermissionCollection
61 permissions.addElement(permission);
68 * Returns an enumeration for the collection of permissions.
75 return permissions.elements();
79 * Indicates whether this permissions collection implies a specific
92 while (i < permissions.size()
95 matchedMask |= ((FilePermission) permissions.elementAt(i))
  /cts/tests/tests/permission/src/android/permission/cts/
ProviderPermissionTest.java 13 * See the License for the specific language governing permissions and
26 * Tests Permissions related to reading from and writing to providers
32 * Verify that read and write to contact requires permissions.
42 * Verify that write to contact requires permissions.
52 * Verify that read and write to contact requires permissions.
62 * Verify that write to contact requires permissions.
72 * Verify that write to settings requires permissions.
82 * Verify that read and write to browser bookmarks requires permissions.
92 * Verify that read and write to browser bookmarks requires permissions.
102 * Verify that read and write to browser history requires permissions
    [all...]
ConnectivityManagerPermissionTest.java 13 * See the License for the specific language governing permissions and
26 * permissions
43 * requires permissions.
59 * requires permissions.
75 * requires permissions.
91 * requires permissions.
107 * requires permissions.
NoNetworkStatePermissionTest.java 13 * See the License for the specific language governing permissions and
25 * Verify ConnectivityManager related methods without specific network state permissions.
42 * Verify that ConnectivityManager#getNetworkPreference() requires permissions.
58 * Verify that ConnectivityManager#getActiveNetworkInfo() requires permissions.
74 * Verify that ConnectivityManager#getNetworkInfo() requires permissions.
90 * Verify that ConnectivityManager#getAllNetworkInfo() requires permissions.
106 * Verify that ConnectivityManager#setNetworkPreference() requires permissions.
122 * Verify that ConnectivityManager#startUsingNetworkFeature() requires permissions.
138 * Verify that ConnectivityManager#stopUsingNetworkFeature() requires permissions.
154 * Verify that ConnectivityManager#requestRouteToHost() requires permissions
    [all...]
NoKeyPermissionTest.java 13 * See the License for the specific language governing permissions and
25 * Verify the key input related operations require specific permissions.
39 * Verify that KeyguardManager.KeyguardLock.disableKeyguard requires permissions.
55 * Verify that KeyguardManager.KeyguardLock.reenableKeyguard requires permissions.
71 * Verify that KeyguardManager.exitKeyguardSecurely requires permissions.
AppWidgetManagerPermissionTest.java 13 * See the License for the specific language governing permissions and
25 * Test that protected AppWidgetManager APIs cannot be called without permissions
41 * requires permissions.
  /libcore/luni/src/main/java/java/security/
UnresolvedPermissionCollection.java 14 * See the License for the specific language governing permissions and
46 new ObjectStreamField("permissions", Hashtable.class), };
100 * Returns true if this collection contains unresolved permissions
108 * Resolves all permissions of the same class as the specified target
110 * collection is {@code null} and some unresolved permissions were resolved,
112 * permissions are removed from this unresolved collection, and collection
116 * a kind of permissions to be resolved.
118 * an existing collection for storing resolved permissions.
119 * @return a collection containing resolved permissions (if any found)
154 Hashtable permissions = new Hashtable() local
171 Map permissions = (Map)fields.get("permissions", null); local
    [all...]
PolicySpi.java 14 * See the License for the specific language governing permissions and
68 * Answers a PermissionCollection object containing the set of permissions
73 * if the policy implementation can return a set of permissions granted to a
79 * @return a set of permissions granted to the specified CodeSource. If this
80 * operation is supported, the returned set of permissions must be a
90 * Answers a PermissionCollection object containing the set of permissions
95 * if the policy implementation can return a set of permissions granted to a
101 * @return a set of permissions granted to the specified ProtectionDomain.
102 * If this operation is supported, the returned set of permissions
PermissionsHash.java 14 * See the License for the specific language governing permissions and
29 * permissions which do not require special collection.
49 * Returns an enumeration of the permissions in the receiver.
51 * @return Enumeration the permissions in the receiver.
58 * Indicates whether the argument permission is implied by the permissions
62 * by the permissions in the receiver, and <code>false</code> if
  /libcore/luni/src/test/java/org/apache/harmony/luni/tests/java/lang/
MutableSecurityManager.java 13 * See the License for the specific language governing permissions and
22 import java.security.Permissions;
38 this.enabled = new Permissions();
41 public MutableSecurityManager(Permission... permissions) {
43 for (int i = 0; i < permissions.length; i++) {
44 this.enabled.add(permissions[i]);
53 enabled = new Permissions();
  /device/htc/passion-common/
passion.mk 13 # See the License for the specific language governing permissions and
23 frameworks/base/data/etc/handheld_core_hardware.xml:system/etc/permissions/handheld_core_hardware.xml \
24 frameworks/base/data/etc/android.hardware.camera.flash-autofocus.xml:system/etc/permissions/android.hardware.camera.flash-autofocus.xml \
25 frameworks/base/data/etc/android.hardware.telephony.gsm.xml:system/etc/permissions/android.hardware.telephony.gsm.xml \
26 frameworks/base/data/etc/android.hardware.location.gps.xml:system/etc/permissions/android.hardware.location.gps.xml \
27 frameworks/base/data/etc/android.hardware.wifi.xml:system/etc/permissions/android.hardware.wifi.xml \
28 frameworks/base/data/etc/android.hardware.sensor.proximity.xml:system/etc/permissions/android.hardware.sensor.proximity.xml \
29 frameworks/base/data/etc/android.hardware.sensor.light.xml:system/etc/permissions/android.hardware.sensor.light.xml \
30 frameworks/base/data/etc/android.software.sip.voip.xml:system/etc/permissions/android.software.sip.voip.xml \
31 frameworks/base/data/etc/android.hardware.touchscreen.multitouch.xml:system/etc/permissions/android.hardware.touchscreen.multitouch.xm
    [all...]
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/os/
FileUtils.java 13 * See the License for the specific language governing permissions and
109 StringBuilder permissions = new StringBuilder("-rwxrwxrwx"); local
115 permissions.setCharAt(0, typeSymbols[i]);
124 permissions.setCharAt(1 + i, '-');
130 permissions.setCharAt(3, hasModeFlag(mode, S_IXUSR) ? 's' : 'S');
134 permissions.setCharAt(6, hasModeFlag(mode, S_IXGRP) ? 's' : 'S');
138 permissions.setCharAt(9, hasModeFlag(mode, S_IXOTH) ? 't' : 'T');
141 return permissions.toString();
  /cts/tests/tests/permission/
README 12 See the License for the specific language governing permissions and
15 In the permissions test cases, we just test the negative cases. These tests are to test the behavior of accessing the APIs without the required permission.
  /cts/tests/tests/permission2/
AndroidManifest.xml 14 * See the License for the specific language governing permissions and
26 This app contains tests to verify specialized permissions, that require the app to have
27 some permissions.
44 android:label="More CTS tests for permissions"/>
  /frameworks/base/docs/html/guide/topics/security/
security.jd 1 page.title=Security and Permissions
12 <li><a href="#permissions">Using Permissions</a></li>
13 <li><a href="#declaring">Declaring and Enforcing Permissions</a>
19 <li><a href="#uri">URI Permissions</a></li>
31 that a particular process can perform, and per-URI permissions for granting
46 <em>permissions</em> they need for additional capabilities not provided by
47 the basic sandbox. Applications statically declare the permissions they
49 application is installed. Android has no mechanism for granting permissions
71 permissions</a> and to grant or deny an application's <
    [all...]
  /packages/providers/DownloadProvider/tests/permission/
AndroidManifest.xml 14 * See the License for the specific language governing permissions and
27 cannot be accessed without the necessary permissions. Thus this manifest should not
28 include any uses-permissions tags
37 android:label="Tests for Download provider permissions"/>
  /cts/tests/tests/permission2/src/android/permission2/cts/
NoWriteSecureSettingsPermissionTest.java 13 * See the License for the specific language governing permissions and
22 * Verify secure settings cannot be written to without required permissions.
27 * Verify that write to secure settings requires permissions.
  /external/kernel-headers/original/linux/
coda_fs_i.h 24 unsigned int c_cached_epoch; /* epoch for cached permissions */
25 vuid_t c_uid; /* fsuid for cached permissions */
26 unsigned int c_cached_perm; /* cached access permissions */

Completed in 3025 milliseconds

12 3 4 5 6 7 8 91011>>