/device/lge/bullhead/ |
device.mk | 13 # See the License for the specific language governing permissions and 95 frameworks/native/data/etc/handheld_core_hardware.xml:system/etc/permissions/handheld_core_hardware.xml \ 96 frameworks/native/data/etc/android.hardware.bluetooth_le.xml:system/etc/permissions/android.hardware.bluetooth_le.xml \ 97 frameworks/native/data/etc/android.hardware.camera.flash-autofocus.xml:system/etc/permissions/android.hardware.camera.flash-autofocus.xml \ 98 frameworks/native/data/etc/android.hardware.camera.front.xml:system/etc/permissions/android.hardware.camera.front.xml \ 99 frameworks/native/data/etc/android.hardware.camera.full.xml:system/etc/permissions/android.hardware.camera.full.xml \ 100 frameworks/native/data/etc/android.hardware.camera.raw.xml:system/etc/permissions/android.hardware.camera.raw.xml \ 101 frameworks/native/data/etc/android.hardware.fingerprint.xml:system/etc/permissions/android.hardware.fingerprint.xml \ 102 frameworks/native/data/etc/android.hardware.location.gps.xml:system/etc/permissions/android.hardware.location.gps.xml \ 103 frameworks/native/data/etc/android.hardware.wifi.xml:system/etc/permissions/android.hardware.wifi.xml [all...] |
/external/libchrome/sandbox/linux/syscall_broker/ |
broker_process_unittest.cc | 58 std::vector<BrokerFilePermission> permissions; local 59 permissions.push_back(BrokerFilePermission::ReadOnly("/proc/cpuinfo")); 62 new BrokerProcess(EPERM, permissions)); 92 std::vector<BrokerFilePermission> permissions; local 93 permissions.push_back(BrokerFilePermission::ReadOnly(kR_WhiteListed)); 94 permissions.push_back( 96 permissions.push_back(BrokerFilePermission::WriteOnly(kW_WhiteListed)); 97 permissions.push_back(BrokerFilePermission::ReadWrite(kRW_WhiteListed)); 99 BrokerProcess open_broker(denied_errno, permissions, fast_check_in_client); 252 std::vector<BrokerFilePermission> permissions; local 308 std::vector<BrokerFilePermission> permissions; local 389 std::vector<BrokerFilePermission> permissions; local 423 std::vector<BrokerFilePermission> permissions; local 448 std::vector<BrokerFilePermission> permissions; local 537 std::vector<BrokerFilePermission> permissions; local 581 std::vector<BrokerFilePermission> permissions; local 623 std::vector<BrokerFilePermission> permissions; local [all...] |
/compatibility/cdd/3_software/ |
3_15_instant-apps.md | 5 * [C-0-1] Instant Apps MUST only be granted permissions that have the
|
/compatibility/cdd/9_security-model/ |
9_2_uid-and-process-isolation.md | 10 and constructed, as defined in the [Security and Permissions reference](http://developer.android.com/guide/topics/security/permissions.html).
|
/developers/build/prebuilts/gradle/RuntimePermissionsWear/Application/src/main/java/com/example/android/wearable/runtimepermissions/ |
PhonePermissionRequestActivity.java | 13 * See the License for the specific language governing permissions and 31 * phone permissions for storage. If they choose to move forward, the permission screen 55 // If permissions granted, we start the main activity (shut this activity down). 80 * Callback received when a permissions request has been completed. 84 int requestCode, @NonNull String[] permissions, @NonNull int[] grantResults) { 86 String permissionResult = "Request code: " + requestCode + ", Permissions: " + permissions 101 * If service started this Activity (b/c wear requested data where permissions were not
|
/developers/samples/android/wearable/wear/RuntimePermissionsWear/Application/src/main/java/com/example/android/wearable/runtimepermissions/ |
PhonePermissionRequestActivity.java | 13 * See the License for the specific language governing permissions and 31 * phone permissions for storage. If they choose to move forward, the permission screen 55 // If permissions granted, we start the main activity (shut this activity down). 80 * Callback received when a permissions request has been completed. 84 int requestCode, @NonNull String[] permissions, @NonNull int[] grantResults) { 86 String permissionResult = "Request code: " + requestCode + ", Permissions: " + permissions 101 * If service started this Activity (b/c wear requested data where permissions were not
|
/development/samples/browseable/RuntimePermissionsWear/Application/src/com.example.android.wearable.runtimepermissions/ |
PhonePermissionRequestActivity.java | 13 * See the License for the specific language governing permissions and 31 * phone permissions for storage. If they choose to move forward, the permission screen 55 // If permissions granted, we start the main activity (shut this activity down). 80 * Callback received when a permissions request has been completed. 84 int requestCode, @NonNull String[] permissions, @NonNull int[] grantResults) { 86 String permissionResult = "Request code: " + requestCode + ", Permissions: " + permissions 101 * If service started this Activity (b/c wear requested data where permissions were not
|
/external/drrickorang/LoopbackApp/ |
PrivacyPolicy.md | 3 This file is required in order to comply with Google Play requirements for apps using sensitive permissions:
|
/external/libcxx/test/std/experimental/filesystem/class.directory_entry/directory_entry.obs/ |
status.pass.cpp | 42 assert(ps.permissions() == es.permissions());
|
symlink_status.pass.cpp | 41 assert(ps.permissions() == es.permissions());
|
/external/libcxx/test/std/experimental/filesystem/fs.op.funcs/fs.op.status/ |
status.pass.cpp | 49 TEST_CHECK(st.permissions() == perms::unknown); 54 TEST_CHECK(st.permissions() == perms::unknown); 64 permissions(dir, perms::none); 88 TEST_CHECK(st.permissions() == perms::unknown); 128 TEST_CHECK(st.permissions() != perms::unknown); 132 TEST_CHECK(st.permissions() != perms::unknown); 159 TEST_CHECK(st.permissions() != perms::unknown); 163 TEST_CHECK(st.permissions() != perms::unknown);
|
/external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/command/ |
MkdCommandHandlerTest.groovy | 13 * See the License for the specific language governing permissions and 25 import org.mockftpserver.fake.filesystem.Permissions 39 static final PERMISSIONS = new Permissions('rwx------') 42 userAccount.defaultPermissionsForNewDirectory = PERMISSIONS 47 assert dirEntry.permissions == PERMISSIONS 56 assert dirEntry.permissions == UserAccount.DEFAULT_PERMISSIONS_FOR_NEW_DIRECTORY 76 fileSystem.getEntry(PARENT).permissions = new Permissions('r-xr-xr-x' [all...] |
/packages/apps/Settings/src/com/android/settings/applications/ |
ApplicationFeatureProviderImpl.java | 13 * See the License for the specific language governing permissions and 80 public void calculateNumberOfAppsWithAdminGrantedPermissions(String[] permissions, 84 permissions, mPm, mPms, mDpm, callback); 93 public void listAppsWithAdminGrantedPermissions(String[] permissions, 96 new CurrentUserAppWithAdminGrantedPermissionsLister(permissions, mPm, mPms, mDpm, 158 String[] permissions, PackageManagerWrapper packageManager, 161 super(context, permissions, packageManager, packageManagerService, devicePolicyManager); 190 CurrentUserAppWithAdminGrantedPermissionsLister(String[] permissions, 194 super(permissions, packageManager, packageManagerService, devicePolicyManager,
|
IPackageManagerWrapperImpl.java | 13 * See the License for the specific language governing permissions and 63 String[] permissions, int flags, int userId) throws RemoteException { 64 return mPms.getPackagesHoldingPermissions(permissions, flags, userId);
|
/packages/apps/Settings/src/com/android/settings/enterprise/ |
AdminGrantedPermissionsPreferenceControllerBase.java | 13 * permissions and limitations under the License. 37 boolean async, String[] permissions, String permissionGroup) { 39 mPermissions = permissions; 69 // apps that the admin has granted a given permissions takes a bit of time, we always 77 // We block and return synchronously whether the admin has granted the given permissions to
|
/packages/experimental/PermissionApp/src/foo/bar/permission/ |
PermissionActivity.java | 13 * See the License for the specific language governing permissions and 48 * Simple sample of how to use the runtime permissions APIs. 188 public void onRequestPermissionsResult(int requestCode, String permissions[], 204 for (int i = 0; i < permissions.length; i++) { 206 switch (permissions[i]) { 270 List<String> permissions = new ArrayList<>(); local 273 permissions.add(Manifest.permission.READ_CALENDAR); 277 permissions.add(Manifest.permission.READ_CONTACTS); 279 if (!permissions.isEmpty()) { 280 requestPermissions(permissions.toArray(new String[0]) [all...] |
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/latin/permissions/ |
PermissionsManager.java | 13 * See the License for the specific language governing permissions and 17 package com.android.inputmethod.latin.permissions; 70 // otherwise request the permissions. 84 int requestCode, String[] permissions, int[] grantResults) {
|
/system/bt/service/ |
gatt_server_old.h | 13 // See the License for the specific language governing permissions and 89 bool AddCharacteristic(const UUID& id, int properties, int permissions); 94 int permissions);
|
/system/core/libkeyutils/ |
keyutils.cpp | 65 long keyctl_setperm(key_serial_t id, int permissions) { 66 return keyctl(KEYCTL_SETPERM, id, permissions);
|
/device/generic/armv7-a-neon/ |
mini_common.mk | 12 # See the License for the specific language governing permissions and 67 frameworks/native/data/etc/android.hardware.location.gps.xml:system/etc/permissions/android.hardware.location.gps.xml \ 68 frameworks/native/data/etc/android.hardware.sensor.barometer.xml:system/etc/permissions/android.hardware.sensor.barometer.xml \ 69 frameworks/native/data/etc/android.hardware.sensor.gyroscope.xml:system/etc/permissions/android.hardware.sensor.gyroscope.xml \ 70 frameworks/native/data/etc/android.hardware.sensor.light.xml:system/etc/permissions/android.hardware.sensor.light.xml \ 71 frameworks/native/data/etc/android.hardware.usb.accessory.xml:system/etc/permissions/android.hardware.usb.accessory.xml \ 72 frameworks/native/data/etc/handheld_core_hardware.xml:system/etc/permissions/handheld_core_hardware.xml \
|
/cts/common/host-side/manifest-generator/src/com/android/compatibility/common/generator/ |
ManifestGenerator.java | 13 * See the License for the specific language governing permissions and 45 List<String> permissions = new ArrayList<>(); local 59 permissions.add(args[++i]); 80 generate(out, pkgName, instrumentName, minSdk, targetSdk, permissions, activities); 95 String minSdk, String targetSdk, List<String> permissions, List<String> activities) 111 for (String permission : permissions) {
|
/system/core/libunwindstack/ |
Maps.cpp | 13 * See the License for the specific language governing permissions and 59 char permissions[5]; local 64 &map_info->end, permissions, &map_info->offset, &name_pos) != 4) { 68 if (permissions[0] == 'r') { 71 if (permissions[1] == 'w') { 74 if (permissions[2] == 'x') {
|
/external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/filesystem/ |
AbstractFakeFileSystemTestCase.groovy | 13 * See the License for the specific language governing permissions and 123 def permissions = new Permissions('-wxrwx---') 125 group: 'group', permissions: permissions) 134 assert entry.permissions == permissions
|
/external/curl/lib/ |
ftplistparser.c | 204 int permissions = 0; local 207 permissions |= 1 << 8; 209 permissions |= FTP_LP_MALFORMATED_PERM; 211 permissions |= 1 << 7; 213 permissions |= FTP_LP_MALFORMATED_PERM; 216 permissions |= 1 << 6; 218 permissions |= 1 << 6; 219 permissions |= 1 << 11; 222 permissions |= 1 << 11; 224 permissions |= FTP_LP_MALFORMATED_PERM [all...] |
/frameworks/support/compat/java/android/support/v4/app/ |
ActivityCompat.java | 13 * See the License for the specific language governing permissions and 54 * Callback for the result from requesting permissions. This method 58 * <strong>Note:</strong> It is possible that the permissions request interaction 59 * with the user is interrupted. In this case you will receive empty permissions 65 * @param permissions The requested permissions. Never null. 66 * @param grantResults The grant results for the corresponding permissions 72 void onRequestPermissionsResult(int requestCode, @NonNull String[] permissions, 321 * Requests permissions to be granted to this application. These permissions [all...] |