/frameworks/base/data/etc/ |
android.hardware.telephony.gsm.xml | 13 See the License for the specific language governing permissions and 18 <permissions> 21 </permissions>
|
android.hardware.touchscreen.multitouch.xml | 13 See the License for the specific language governing permissions and 20 <permissions> 23 </permissions>
|
android.hardware.touchscreen.xml | 13 See the License for the specific language governing permissions and 19 <permissions> 21 </permissions>
|
android.hardware.wifi.xml | 13 See the License for the specific language governing permissions and 18 <permissions> 20 </permissions>
|
android.software.sip.voip.xml | 13 See the License for the specific language governing permissions and 18 <permissions> 21 </permissions>
|
android.software.sip.xml | 13 See the License for the specific language governing permissions and 18 <permissions> 20 </permissions>
|
/frameworks/base/location/lib/ |
com.android.location.provider.xml | 13 See the License for the specific language governing permissions and 17 <permissions> 20 </permissions>
|
/libcore/luni/src/main/java/java/io/ |
FilePermissionCollection.java | 14 * See the License for the specific language governing permissions and 34 Vector<Permission> permissions = new Vector<Permission>(); field in class:FilePermissionCollection 61 permissions.addElement(permission); 68 * Returns an enumeration for the collection of permissions. 75 return permissions.elements(); 79 * Indicates whether this permissions collection implies a specific 92 while (i < permissions.size() 95 matchedMask |= ((FilePermission) permissions.elementAt(i))
|
/cts/tests/tests/permission/src/android/permission/cts/ |
ProviderPermissionTest.java | 13 * See the License for the specific language governing permissions and 26 * Tests Permissions related to reading from and writing to providers 32 * Verify that read and write to contact requires permissions. 42 * Verify that write to contact requires permissions. 52 * Verify that read and write to contact requires permissions. 62 * Verify that write to contact requires permissions. 72 * Verify that write to settings requires permissions. 82 * Verify that read and write to browser bookmarks requires permissions. 92 * Verify that read and write to browser bookmarks requires permissions. 102 * Verify that read and write to browser history requires permissions [all...] |
ConnectivityManagerPermissionTest.java | 13 * See the License for the specific language governing permissions and 26 * permissions 43 * requires permissions. 59 * requires permissions. 75 * requires permissions. 91 * requires permissions. 107 * requires permissions.
|
NoNetworkStatePermissionTest.java | 13 * See the License for the specific language governing permissions and 25 * Verify ConnectivityManager related methods without specific network state permissions. 42 * Verify that ConnectivityManager#getNetworkPreference() requires permissions. 58 * Verify that ConnectivityManager#getActiveNetworkInfo() requires permissions. 74 * Verify that ConnectivityManager#getNetworkInfo() requires permissions. 90 * Verify that ConnectivityManager#getAllNetworkInfo() requires permissions. 106 * Verify that ConnectivityManager#setNetworkPreference() requires permissions. 122 * Verify that ConnectivityManager#startUsingNetworkFeature() requires permissions. 138 * Verify that ConnectivityManager#stopUsingNetworkFeature() requires permissions. 154 * Verify that ConnectivityManager#requestRouteToHost() requires permissions [all...] |
NoKeyPermissionTest.java | 13 * See the License for the specific language governing permissions and 25 * Verify the key input related operations require specific permissions. 39 * Verify that KeyguardManager.KeyguardLock.disableKeyguard requires permissions. 55 * Verify that KeyguardManager.KeyguardLock.reenableKeyguard requires permissions. 71 * Verify that KeyguardManager.exitKeyguardSecurely requires permissions.
|
AppWidgetManagerPermissionTest.java | 13 * See the License for the specific language governing permissions and 25 * Test that protected AppWidgetManager APIs cannot be called without permissions 41 * requires permissions.
|
/libcore/luni/src/main/java/java/security/ |
UnresolvedPermissionCollection.java | 14 * See the License for the specific language governing permissions and 46 new ObjectStreamField("permissions", Hashtable.class), }; 100 * Returns true if this collection contains unresolved permissions 108 * Resolves all permissions of the same class as the specified target 110 * collection is {@code null} and some unresolved permissions were resolved, 112 * permissions are removed from this unresolved collection, and collection 116 * a kind of permissions to be resolved. 118 * an existing collection for storing resolved permissions. 119 * @return a collection containing resolved permissions (if any found) 154 Hashtable permissions = new Hashtable() local 171 Map permissions = (Map)fields.get("permissions", null); local [all...] |
PolicySpi.java | 14 * See the License for the specific language governing permissions and 68 * Answers a PermissionCollection object containing the set of permissions 73 * if the policy implementation can return a set of permissions granted to a 79 * @return a set of permissions granted to the specified CodeSource. If this 80 * operation is supported, the returned set of permissions must be a 90 * Answers a PermissionCollection object containing the set of permissions 95 * if the policy implementation can return a set of permissions granted to a 101 * @return a set of permissions granted to the specified ProtectionDomain. 102 * If this operation is supported, the returned set of permissions
|
PermissionsHash.java | 14 * See the License for the specific language governing permissions and 29 * permissions which do not require special collection. 49 * Returns an enumeration of the permissions in the receiver. 51 * @return Enumeration the permissions in the receiver. 58 * Indicates whether the argument permission is implied by the permissions 62 * by the permissions in the receiver, and <code>false</code> if
|
/libcore/luni/src/test/java/org/apache/harmony/luni/tests/java/lang/ |
MutableSecurityManager.java | 13 * See the License for the specific language governing permissions and 22 import java.security.Permissions; 38 this.enabled = new Permissions(); 41 public MutableSecurityManager(Permission... permissions) { 43 for (int i = 0; i < permissions.length; i++) { 44 this.enabled.add(permissions[i]); 53 enabled = new Permissions();
|
/device/htc/passion-common/ |
passion.mk | 13 # See the License for the specific language governing permissions and 23 frameworks/base/data/etc/handheld_core_hardware.xml:system/etc/permissions/handheld_core_hardware.xml \ 24 frameworks/base/data/etc/android.hardware.camera.flash-autofocus.xml:system/etc/permissions/android.hardware.camera.flash-autofocus.xml \ 25 frameworks/base/data/etc/android.hardware.telephony.gsm.xml:system/etc/permissions/android.hardware.telephony.gsm.xml \ 26 frameworks/base/data/etc/android.hardware.location.gps.xml:system/etc/permissions/android.hardware.location.gps.xml \ 27 frameworks/base/data/etc/android.hardware.wifi.xml:system/etc/permissions/android.hardware.wifi.xml \ 28 frameworks/base/data/etc/android.hardware.sensor.proximity.xml:system/etc/permissions/android.hardware.sensor.proximity.xml \ 29 frameworks/base/data/etc/android.hardware.sensor.light.xml:system/etc/permissions/android.hardware.sensor.light.xml \ 30 frameworks/base/data/etc/android.software.sip.voip.xml:system/etc/permissions/android.software.sip.voip.xml \ 31 frameworks/base/data/etc/android.hardware.touchscreen.multitouch.xml:system/etc/permissions/android.hardware.touchscreen.multitouch.xm [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/os/ |
FileUtils.java | 13 * See the License for the specific language governing permissions and 109 StringBuilder permissions = new StringBuilder("-rwxrwxrwx"); local 115 permissions.setCharAt(0, typeSymbols[i]); 124 permissions.setCharAt(1 + i, '-'); 130 permissions.setCharAt(3, hasModeFlag(mode, S_IXUSR) ? 's' : 'S'); 134 permissions.setCharAt(6, hasModeFlag(mode, S_IXGRP) ? 's' : 'S'); 138 permissions.setCharAt(9, hasModeFlag(mode, S_IXOTH) ? 't' : 'T'); 141 return permissions.toString();
|
/cts/tests/tests/permission/ |
README | 12 See the License for the specific language governing permissions and 15 In the permissions test cases, we just test the negative cases. These tests are to test the behavior of accessing the APIs without the required permission.
|
/cts/tests/tests/permission2/ |
AndroidManifest.xml | 14 * See the License for the specific language governing permissions and 26 This app contains tests to verify specialized permissions, that require the app to have 27 some permissions. 44 android:label="More CTS tests for permissions"/>
|
/frameworks/base/docs/html/guide/topics/security/ |
security.jd | 1 page.title=Security and Permissions 12 <li><a href="#permissions">Using Permissions</a></li> 13 <li><a href="#declaring">Declaring and Enforcing Permissions</a> 19 <li><a href="#uri">URI Permissions</a></li> 31 that a particular process can perform, and per-URI permissions for granting 46 <em>permissions</em> they need for additional capabilities not provided by 47 the basic sandbox. Applications statically declare the permissions they 49 application is installed. Android has no mechanism for granting permissions 71 permissions</a> and to grant or deny an application's < [all...] |
/packages/providers/DownloadProvider/tests/permission/ |
AndroidManifest.xml | 14 * See the License for the specific language governing permissions and 27 cannot be accessed without the necessary permissions. Thus this manifest should not 28 include any uses-permissions tags 37 android:label="Tests for Download provider permissions"/>
|
/cts/tests/tests/permission2/src/android/permission2/cts/ |
NoWriteSecureSettingsPermissionTest.java | 13 * See the License for the specific language governing permissions and 22 * Verify secure settings cannot be written to without required permissions. 27 * Verify that write to secure settings requires permissions.
|
/external/kernel-headers/original/linux/ |
coda_fs_i.h | 24 unsigned int c_cached_epoch; /* epoch for cached permissions */ 25 vuid_t c_uid; /* fsuid for cached permissions */ 26 unsigned int c_cached_perm; /* cached access permissions */
|