/cts/tests/tests/permission/src/android/permission/cts/ |
RebootPermissionTest.java | 17 package android.permission.cts; 25 * Verify that rebooting requires Permission. 35 * Verify that rebooting by sending a broadcast Intent requires Permission. 36 * <p>Requires Permission: 37 * {@link android.Manifest.permission#REBOOT}.
|
DevicePowerPermissionTest.java | 17 package android.permission.cts; 25 * Verify that various PowerManagement functionality requires Permission. 37 * Verify that going to sleep requires Permission. 38 * <p>Requires Permission: 39 * {@link android.Manifest.permission#DEVICE_POWER}. 45 fail("Was able to call PowerManager.goToSleep without DEVICE_POWER Permission.");
|
AppWidgetManagerPermissionTest.java | 17 package android.permission.cts; 43 * <p>Tests Permission: 44 * {@link android.Manifest.permission#BIND_APP_WIDGET}.
|
ConnectivityManagerPermissionTest.java | 17 package android.permission.cts; 44 * <p>Tests Permission: 45 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}. 60 * <p>Tests Permission: 61 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE}.
|
NoSdCardWritePermissionTest.java | 17 package android.permission.cts; 33 * android.permission.WRITE_EXTERNAL_STORAGE}.
|
PermissionStubActivity.java | 17 package android.permission.cts;
|
/external/chromium_org/ppapi/thunk/ |
ppb_talk_private_api.h | 23 PP_TalkPermission permission,
|
/external/chromium_org/extensions/common/permissions/ |
permissions_info.cc | 87 void PermissionsInfo::RegisterPermission(APIPermissionInfo* permission) { 88 DCHECK(!ContainsKey(id_map_, permission->id())); 89 DCHECK(!ContainsKey(name_map_, permission->name())); 91 id_map_[permission->id()] = permission; 92 name_map_[permission->name()] = permission;
|
manifest_permission_set.cc | 30 scoped_ptr<ManifestPermission> permission( 33 if (!permission) { 37 LOG(WARNING) << "Unknown permission[" << permission_name << "]."; 41 if (!permission->FromValue(permission_value)) { 47 LOG(WARNING) << "Parse permission failed."; 50 manifest_permissions->insert(permission.release()); 70 // permission should be a string or a single key dict. 77 LOG(WARNING) << "Permission is not a string or single key dict.";
|
permission_set.h | 33 // Creates an empty permission set (e.g. default permissions). 36 // Creates a new permission set based on the specified data: the API 38 // hosts. The effective hosts of the newly created permission set will be 45 // Creates a new permission set equal to |set1| - |set2|, passing ownership of 50 // Creates a new permission set equal to the intersection of |set1| and 55 // Creates a new permission set equal to the union of |set1| and |set2|. 62 // Returns true if every API or host permission available to |set| is also 70 // Returns true if this is an empty set (e.g., the default permission set). 73 // Returns true if the set has the specified API permission. 74 bool HasAPIPermission(APIPermission::ID permission) const [all...] |
usb_device_permission_unittest.cc | 52 UsbDevicePermission permission( 54 ASSERT_TRUE(permission.FromValue(permission_list.get(), NULL, NULL)); 56 PermissionMessages messages = permission.GetMessages();
|
/external/chromium_org/remoting/webapp/ |
third_party_host_permissions.js | 12 * "host" permission needed to access that URL. If the webapp hasn't already 13 * been granted that permission, it shows a dialog explaining why it is being 14 * requested, then uses the Chrome API ask the user for the new permission. 26 * @param {string} url The URL to request permission for. 36 * @param {function(): void} onOk Called if the permission is granted. 37 * @param {function(): void} onError Called if the permission is denied. 44 /** @param {boolean} allowed Whether this extension has this permission. */ 53 // asking for the additional permission. 62 * @param {function(): void} onOk Called if the permission is granted. 63 * @param {function(): void} onError Called if the permission is denied [all...] |
/external/chromium_org/extensions/common/api/sockets/ |
sockets_manifest_permission_unittest.cc | 33 static void AssertEmptyPermission(const SocketsManifestPermission* permission) { 34 EXPECT_TRUE(permission); 35 EXPECT_EQ(std::string(extensions::manifest_keys::kSockets), permission->id()); 36 EXPECT_EQ(permission->id(), permission->name()); 37 EXPECT_FALSE(permission->HasMessages()); 38 EXPECT_EQ(0u, permission->entries().size()); 50 scoped_ptr<SocketsManifestPermission> permission( 52 EXPECT_TRUE(permission) << "Error parsing Value into permission: " << error16 [all...] |
/external/chromium_org/chrome/browser/ui/views/website_settings/ |
permission_selector_view.cc | 124 const WebsiteSettingsUI::PermissionInfo& permission) 151 // Create the permission icon. 153 const gfx::Image& image = WebsiteSettingsUI::GetPermissionIcon(permission); 160 // Create the label that displays the permission type. 163 WebsiteSettingsUI::PermissionTypeToUIString(permission.type))); 172 permission, 175 // Create the permission menu button. 177 permission.source == content_settings::SETTING_SOURCE_USER; 180 permission.setting, permission.default_setting, permission.source) [all...] |
/external/chromium_org/chrome/common/extensions/permissions/ |
media_galleries_permission_unittest.cc | 21 void CheckFromValue(APIPermission* permission, base::ListValue* value, 25 EXPECT_EQ(success_expected, permission->FromValue(value, &error, &unhandled)); 34 scoped_ptr<APIPermission> permission( 41 CheckFromValue(permission.get(), value.get(), true); 48 CheckFromValue(permission.get(), value.get(), true); 53 CheckFromValue(permission.get(), value.get(), true); 58 CheckFromValue(permission.get(), value.get(), true); 63 CheckFromValue(permission.get(), value.get(), true); 69 CheckFromValue(permission.get(), value.get(), true); 75 CheckFromValue(permission.get(), value.get(), true) [all...] |
/external/chromium_org/chrome/common/extensions/docs/examples/api/permissions/extension-questions/ |
options.js | 23 alert('You already have SO host permission!'); 27 console.log('SO host permission granted!' + 39 console.log('Revoked SO host permission.'); 42 alert('No SO host permission found.');
|
/external/chromium_org/extensions/common/api/bluetooth/ |
bluetooth_manifest_data.h | 25 scoped_ptr<BluetoothManifestPermission> permission); 43 const BluetoothManifestPermission* permission() const { function in class:extensions::BluetoothManifestData 51 // Used for checking bluetooth permission.
|
/external/chromium_org/third_party/WebKit/Source/web/ |
NotificationPermissionClientImpl.cpp | 28 virtual void permissionRequestComplete(WebNotificationPermission permission) OVERRIDE 31 m_callback->handleEvent(Notification::permissionString(static_cast<NotificationClient::Permission>(permission)));
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
MyPermission.java | 20 import java.security.Permission; 22 public final class MyPermission extends Permission { 49 public boolean implies(Permission permission) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
ProviderConfigurationPermission.java | 4 import java.security.Permission; 10 * A permission class to define what can be done with the ConfigurableProvider interface. 24 * Note: permission checks are only enforced if a security manager is present. 107 Permission permission) 109 if (!(permission instanceof ProviderConfigurationPermission)) 114 if (!this.getName().equals(permission.getName())) 119 ProviderConfigurationPermission other = (ProviderConfigurationPermission)permission;
|
/external/chromium_org/content/shell/browser/ |
shell_notification_manager.h | 24 // Checks whether |origin| has permission to display notifications in tests. 28 // Requests permission for |origin| to display notifications in layout tests. 33 // Sets the permission to display notifications for |origin| to |permission|. 35 blink::WebNotificationPermission permission);
|
/external/chromium_org/ppapi/c/private/ |
ppp_flash_browser_operations.h | 60 PP_Flash_BrowserOperations_Permission permission; member in struct:PP_Flash_BrowserOperations_SiteSetting 125 * Gets permission settings. <code>callback</code> will be called exactly once 141 * Sets default permission. It applies to all sites except those with 147 * @param[in] permission The default permission. 156 PP_Flash_BrowserOperations_Permission permission, 159 * Sets site-specific permission. If a site has already got site-specific 160 * permission and it is not in <code>sites</code>, it won't be affected. 167 * <code>PP_FLASH_BROWSEROPERATIONS_PERMISSION_DEFAULT</code> permission, it 221 PP_Flash_BrowserOperations_Permission permission, [all...] |
/external/chromium_org/chrome/renderer/resources/extensions/ |
app_view_deny.js | 8 // permission. 9 var errorMessage = "You do not have permission to use the appview element." + 10 " Be sure to declare the 'appview' permission in your manifest file and use" +
|
/external/chromium_org/extensions/renderer/resources/ |
web_view_deny.js | 8 // permission. 9 var errorMessage = "You do not have permission to use the webview element." + 10 " Be sure to declare the 'webview' permission in your manifest file.";
|
/cts/tests/tests/permission2/src/android/permission2/cts/ |
PermissionMaxSdkVersionTest.java | 17 package android.permission.cts; 25 * Verify permission behaviors with android:maxSdkVersion 28 // These two permission names must match the corresponding <uses-permission> 30 static final String UNGRANTABLE_PERMISSION = "android.permission.VIBRATE"; 31 static final String GRANTABLE_PERMISSION = "android.permission.FLASHLIGHT"; 35 * the permission is not being granted. 48 * the permission is being granted.
|