/external/chromium_org/chrome/browser/chromeos/fileapi/ |
file_access_permissions_unittest.cc | 20 FileAccessPermissions permissions; local 22 EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_dir)); 23 EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_file)); 24 EXPECT_FALSE(permissions.HasAccessPermission(extension1, bad_file)); 25 EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_dir)); 26 EXPECT_FALSE(permissions.HasAccessPermission(extension2, good_file)); 27 EXPECT_FALSE(permissions.HasAccessPermission(extension2, bad_file)); 31 permissions.GrantAccessPermission(extension1, good_file); 32 EXPECT_FALSE(permissions.HasAccessPermission(extension1, good_dir)); 33 EXPECT_TRUE(permissions.HasAccessPermission(extension1, good_file)) [all...] |
/external/chromium_org/chrome/browser/extensions/api/permissions/ |
permissions_api_helpers.h | 21 namespace permissions { namespace in namespace:extensions::api 22 struct Permissions; 28 // Converts the permission |set| to a permissions object. 29 scoped_ptr<api::permissions::Permissions> PackPermissionSet( 32 // Creates a permission set from |permissions|. Returns NULL if the permissions 35 const api::permissions::Permissions& permissions, [all...] |
permissions_api_helpers.cc | 5 #include "chrome/browser/extensions/api/permissions/permissions_api_helpers.h" 10 #include "chrome/common/extensions/api/permissions.h" 13 #include "extensions/common/permissions/permission_set.h" 14 #include "extensions/common/permissions/permissions_info.h" 15 #include "extensions/common/permissions/usb_device_permission.h" 24 using api::permissions::Permissions; 42 scoped_ptr<Permissions> PackPermissionSet(const PermissionSet* set) { 43 Permissions* permissions(new Permissions()) [all...] |
/external/chromium_org/base/debug/ |
proc_maps_linux.cc | 114 char permissions[5] = {'\0'}; // Ensure NUL-terminated string. local 129 ®ion.start, ®ion.end, permissions, ®ion.offset, 135 region.permissions = 0; 137 if (permissions[0] == 'r') 138 region.permissions |= MappedMemoryRegion::READ; 139 else if (permissions[0] != '-') 142 if (permissions[1] == 'w') 143 region.permissions |= MappedMemoryRegion::WRITE; 144 else if (permissions[1] != '-') 147 if (permissions[2] == 'x' [all...] |
/packages/apps/OMA-DM/engine/dmlib/api/native/ |
dmtAcl.hpp | 13 * See the License for the specific language governing permissions and 55 * SyncML DM basic permissions for the servers to access DMT. The "COPY" permission is not supported. 118 * \return permissions as an integer 131 * \param permissions [in] - permissions Bit-wised for each individual permission. 135 void SetPermission( const DmtPrincipal& principal, SYNCML_DM_ACL_PERMISSIONS_T permissions); 144 * \param permissions [in] - individual or group of permissions. 148 void AddPermission( const DmtPrincipal& principal, SYNCML_DM_ACL_PERMISSIONS_T permissions); 157 * \param permissions [in] - individual or group of permissions. [all...] |
/external/chromium_org/content/ppapi_plugin/ |
plugin_process_dispatcher.cc | 21 const ppapi::PpapiPermissions& permissions, 24 permissions,
|
plugin_process_dispatcher.h | 20 const ppapi::PpapiPermissions& permissions,
|
/external/chromium_org/extensions/test/ |
test_permissions_provider.cc | 17 std::vector<APIPermissionInfo*> permissions; local 18 return permissions;
|
test_permission_message_provider.cc | 16 const PermissionSet* permissions, 22 const PermissionSet* permissions, 29 const PermissionSet* permissions,
|
test_permission_message_provider.h | 9 #include "extensions/common/permissions/permission_message_provider.h" 20 const PermissionSet* permissions, 23 const PermissionSet* permissions, 26 const PermissionSet* permissions,
|
/external/chromium_org/remoting/host/win/ |
com_security.h | 10 // Concatenates ACE type, permissions and sid given as SDDL strings into an ACE 12 #define SDDL_ACE(type, permissions, sid) \ 13 L"(" type L";;" permissions L";;;" sid L")"
|
/libcore/luni/src/main/java/java/security/ |
ProtectionDomain.java | 14 * See the License for the specific language governing permissions and 24 public ProtectionDomain(CodeSource cs, PermissionCollection permissions) { } 26 public ProtectionDomain(CodeSource cs, PermissionCollection permissions, ClassLoader cl, Principal[] principals) { }
|
/external/chromium_org/chrome/common/extensions/docs/examples/api/permissions/extension-questions/ |
options.js | 5 var PERMISSIONS = {origins: ['http://api.stackoverflow.com/']}; 10 chrome.permissions.onAdded.addListener(function(permissions) { 13 chrome.permissions.onRemoved.addListener(function(permissions) { 16 chrome.permissions.contains(PERMISSIONS, function(contains) { 21 chrome.permissions.contains(PERMISSIONS, function(allowed) { 25 chrome.permissions.request(PERMISSIONS, function(result) [all...] |
/external/chromium_org/extensions/common/permissions/ |
permission_message_provider.h | 11 #include "extensions/common/permissions/permission_message.h" 17 // The PermissionMessageProvider interprets permissions, translating them 19 // a new set of permissions entails showing new warning messages. 31 const PermissionSet* permissions, 37 const PermissionSet* permissions, 44 const PermissionSet* permissions, 49 // Whether certain permissions are considered varies by extension type.
|
permissions_info.cc | 5 #include "extensions/common/permissions/permissions_info.h" 23 std::vector<APIPermissionInfo*> permissions = provider.GetAllPermissions(); local 27 for (size_t i = 0; i < permissions.size(); ++i) 28 RegisterPermission(permissions[i]); 46 APIPermissionSet permissions; local 48 permissions.insert(i->second->id()); 49 return permissions; 54 APIPermissionSet permissions; local 59 permissions.insert(permission_info->id()); 61 return permissions; [all...] |
/external/lldb/include/lldb/Core/ |
State.h | 74 GetPermissionsAsCString (uint32_t permissions);
|
/frameworks/base/data/etc/ |
Android.mk | 13 # See the License for the specific language governing permissions and 26 # This will install the file in /system/etc/permissions 28 LOCAL_MODULE_PATH := $(TARGET_OUT_ETC)/permissions 41 # This will install the file in /system/etc/permissions 43 #LOCAL_MODULE_PATH := $(TARGET_OUT_ETC)/permissions
|
/packages/apps/Bluetooth/src/com/android/bluetooth/gatt/ |
ServiceDeclaration.java | 13 * See the License for the specific language governing permissions and 38 int permissions = 0; field in class:ServiceDeclaration.Entry 59 Entry(UUID uuid, int properties, int permissions, int instance) { 63 this.permissions = permissions; 67 Entry(UUID uuid, int permissions) { 70 this.permissions = permissions; 98 void addCharacteristic(UUID uuid, int properties, int permissions) { 99 mEntries.add(new Entry(uuid, properties, permissions, 0 /*instance*/)) [all...] |
/external/chromium_org/chrome/common/extensions/permissions/ |
chrome_permission_message_provider.h | 13 #include "extensions/common/permissions/permission_message_provider.h" 24 const PermissionSet* permissions, 27 const PermissionSet* permissions, 30 const PermissionSet* permissions, 38 // Gets the permission messages for the API permissions. 40 const PermissionSet* permissions) const; 42 // Gets the permission messages for the Manifest permissions. 44 const PermissionSet* permissions) const; 46 // Gets the permission messages for the host permissions. 48 const PermissionSet* permissions, [all...] |
/frameworks/base/core/java/android/bluetooth/ |
BluetoothGattDescriptor.java | 13 * See the License for the specific language governing permissions and 100 * Permissions for this descriptor 122 * @param permissions Permissions for this descriptor 124 public BluetoothGattDescriptor(UUID uuid, int permissions) { 125 initDescriptor(null, uuid, 0, permissions); 134 * @param permissions Permissions for this descriptor 137 int instance, int permissions) { 138 initDescriptor(characteristic, uuid, instance, permissions); [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/os/ |
FileUtils.java | 13 * See the License for the specific language governing permissions and 114 StringBuilder permissions = new StringBuilder("-rwxrwxrwx"); local 120 permissions.setCharAt(0, typeSymbols[i]); 129 permissions.setCharAt(1 + i, '-'); 135 permissions.setCharAt(3, hasModeFlag(mode, S_IXUSR) ? 's' : 'S'); 139 permissions.setCharAt(6, hasModeFlag(mode, S_IXGRP) ? 's' : 'S'); 143 permissions.setCharAt(9, hasModeFlag(mode, S_IXOTH) ? 't' : 'T'); 146 return permissions.toString();
|
/system/core/libbacktrace/ |
map_info.c | 13 * See the License for the specific language governing permissions and 38 char permissions[4]; local 41 &start, &end, permissions, &name_pos) != 3) { 52 mi->is_readable = permissions[0] == 'r'; 53 mi->is_writable = permissions[1] == 'w'; 54 mi->is_executable = permissions[2] == 'x'; 99 char permissions[5]; local 102 permissions, &name_pos) != 3) { 119 mi->is_readable = strlen(permissions) == 4 && permissions[0] == 'r' [all...] |
/external/chromium_org/extensions/renderer/resources/ |
permissions_custom_bindings.js | 5 // Custom binding for the Permissions API. 7 var binding = require('binding').Binding.create('permissions'); 20 var permissions = api.compiledApi; 36 var args = arguments[0].permissions; 47 arguments[0].permissions[i] = keys[0] + '|' + 55 // Convert complex permissions to strings so they validate against the schema 63 // Convert complex permissions back to objects 66 for (var i = 0; i < response.permissions.length; i += 1) { 67 response.permissions[i] = 68 maybeConvertToObject(response.permissions[i]) [all...] |
/external/chromium_org/chrome/common/extensions/manifest_tests/ |
extension_manifests_storage_unittest.cc | 17 base::ListValue* permissions = new base::ListValue(); local 18 permissions->Append(new base::StringValue("storage")); 19 base_manifest.Set(keys::kPermissions, permissions);
|
extension_manifests_validapp_unittest.cc | 30 base::ListValue* permissions = NULL; local 31 ASSERT_TRUE(manifest->GetList("permissions", &permissions)); 32 permissions->Append(new base::StringValue("not-a-valid-permission"));
|