/system/core/init/ |
devices_test.cpp | 13 * See the License for the specific language governing permissions and 224 Permissions permissions("/dev/null", 0666, 0, 0); 225 EXPECT_TRUE(permissions.Match("/dev/null")); 226 EXPECT_FALSE(permissions.Match("/dev/nullsuffix")); 227 EXPECT_FALSE(permissions.Match("/dev/nul")); 228 EXPECT_EQ(0666U, permissions.perm()); 229 EXPECT_EQ(0U, permissions.uid()); 230 EXPECT_EQ(0U, permissions.gid()); 236 Permissions permissions("/dev/dri/*", 0666, 0, 1000) [all...] |
/external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/filesystem/ |
PermissionsTest.groovy | 13 * See the License for the specific language governing permissions and
21 * Tests for the Permissions class
55 assert new Permissions('rwxrwxrwx').hashCode() == Permissions.DEFAULT.hashCode()
56 assert new Permissions('---------').hashCode() == Permissions.NONE.hashCode()
60 assert new Permissions('rwxrwxrwx').equals(Permissions.DEFAULT)
61 assert new Permissions('---------').equals(Permissions.NONE) [all...] |
/frameworks/base/tests/privapp-permissions/ |
Android.mk | 8 LOCAL_REQUIRED_MODULES := privapp-permissions-test.xml 12 LOCAL_MODULE := privapp-permissions-test.xml 14 LOCAL_MODULE_PATH := $(TARGET_OUT_ETC)/permissions 15 LOCAL_SRC_FILES:= system/privapp-permissions-test.xml 24 LOCAL_REQUIRED_MODULES := vendorprivapp-permissions-test.xml 28 LOCAL_MODULE := vendorprivapp-permissions-test.xml 30 LOCAL_MODULE_PATH := $(TARGET_OUT_VENDOR_ETC)/permissions 31 LOCAL_SRC_FILES:= vendor/privapp-permissions-test.xml 40 LOCAL_REQUIRED_MODULES := productprivapp-permissions-test.xml 44 LOCAL_MODULE := productprivapp-permissions-test.xm [all...] |
/packages/apps/Contacts/src/com/android/contacts/activities/ |
RequestPermissionsActivity.java | 13 * See the License for the specific language governing permissions and 33 * Activity that requests permissions needed for activities exported from Contacts. 47 * Method to check if the required permissions are given. 61 final List<String> permissions = new ArrayList<>(); local 63 permissions.add(permission.GET_ACCOUNTS); 64 permissions.add(permission.READ_CONTACTS); 65 permissions.add(permission.WRITE_CONTACTS); 72 permissions.add(permission.CALL_PHONE); 73 permissions.add(permission.READ_CALL_LOG); 74 permissions.add(permission.READ_PHONE_STATE) [all...] |
/compatibility/cdd/9_security-model/ |
9_3_filesystem-permissions.md | 1 ## 9.3\. Filesystem Permissions 6 permissions model as defined in the [Security and Permissions reference]( 7 http://developer.android.com/guide/topics/security/permissions.html).
|
9_1_permissions.md | 1 ## 9.1\. Permissions 5 * [C-0-1] MUST support the [Android permissions model]( 6 http://developer.android.com/guide/topics/security/permissions.html) 9 permissions may be omitted, altered, or ignored. 11 * MAY add additional permissions, provided the new permission ID strings 14 * [C-0-2] Permissions with a `protectionLevel` of 18 image and within the subset of the explicitly whitelisted permissions for each 20 the whitelisted permissions for each app from the files in the 21 `etc/permissions/` path and using the `system/priv-app` path as the 24 Permissions with a protection level of dangerous are runtime permissions [all...] |
/external/libmojo/base/debug/ |
proc_maps_linux.cc | 116 char permissions[5] = {'\0'}; // Ensure NUL-terminated string. local 131 ®ion.start, ®ion.end, permissions, ®ion.offset, 137 region.permissions = 0; 139 if (permissions[0] == 'r') 140 region.permissions |= MappedMemoryRegion::READ; 141 else if (permissions[0] != '-') 144 if (permissions[1] == 'w') 145 region.permissions |= MappedMemoryRegion::WRITE; 146 else if (permissions[1] != '-') 149 if (permissions[2] == 'x' [all...] |
/libcore/ojluni/src/main/java/java/security/ |
ProtectionDomain.java | 38 PermissionCollection permissions) { } 41 PermissionCollection permissions,
|
/packages/apps/Settings/tests/robotests/src/com/android/settings/applications/ |
AppPermissionsPreferenceControllerTest.java | 13 * See the License for the specific language governing permissions and 115 // create permissions 134 final List<PermissionInfo> permissions = new ArrayList<>(); local 135 permissions.add(mPermLocation); 136 permissions.add(mPermMic); 137 permissions.add(mPermCamera); 138 permissions.add(mPermSms); 139 permissions.add(mPermContacts); 140 permissions.add(mPermPhone); 142 .thenReturn(permissions); 172 PermissionInfo[] permissions = new PermissionInfo[4]; local [all...] |
/external/libcxx/test/std/experimental/filesystem/class.file_status/ |
file_status.mods.pass.cpp | 17 // void permissions(perms) noexcept; 40 // permissions test 42 static_assert(noexcept(st.permissions(perms::owner_read)), 44 static_assert(std::is_same<decltype(st.permissions(perms::owner_read)), void>::value, 46 assert(st.permissions() != perms::owner_read); 47 st.permissions(perms::owner_read); 48 assert(st.permissions() == perms::owner_read);
|
file_status.obs.pass.cpp | 17 // perms permissions(p) const noexcept; 38 // permissions test 40 static_assert(noexcept(st.permissions()), 42 static_assert(std::is_same<decltype(st.permissions()), perms>::value, 44 assert(st.permissions() == perms::owner_read);
|
/prebuilts/ndk/r16/sources/cxx-stl/llvm-libc++/test/std/experimental/filesystem/class.file_status/ |
file_status.mods.pass.cpp | 17 // void permissions(perms) noexcept; 40 // permissions test 42 static_assert(noexcept(st.permissions(perms::owner_read)), 44 static_assert(std::is_same<decltype(st.permissions(perms::owner_read)), void>::value, 46 assert(st.permissions() != perms::owner_read); 47 st.permissions(perms::owner_read); 48 assert(st.permissions() == perms::owner_read);
|
file_status.obs.pass.cpp | 17 // perms permissions(p) const noexcept; 38 // permissions test 40 static_assert(noexcept(st.permissions()), 42 static_assert(std::is_same<decltype(st.permissions()), perms>::value, 44 assert(st.permissions() == perms::owner_read);
|
/frameworks/base/services/tests/uiservicestests/src/com/android/server/slice/ |
SlicePermissionManagerTest.java | 12 * permissions and limitations under the License. 53 SlicePermissionManager permissions = new SlicePermissionManager(mContext, local 59 permissions.grantSliceAccess("my.pkg", 0, "provider.pkg", 0, uri); 61 assertTrue(permissions.hasPermission("my.pkg", 0, uri)); 70 SlicePermissionManager permissions = new SlicePermissionManager(mContext, local 73 permissions.grantFullAccess("com.android.mypkg", 10); 74 permissions.grantSliceAccess("com.android.otherpkg", 0, "com.android.lastpkg", 1, uri); 82 permissions.writeBackup(serializer); 89 permissions = new SlicePermissionManager(mContext, 91 permissions.readRestore(parser) [all...] |
/packages/apps/Bluetooth/src/com/android/bluetooth/gatt/ |
GattDbElement.java | 13 * See the License for the specific language governing permissions and 53 public int permissions; field in class:GattDbElement 69 public static GattDbElement createCharacteristic(UUID uuid, int properties, int permissions) { 74 el.permissions = permissions; 78 public static GattDbElement createDescriptor(UUID uuid, int permissions) { 82 el.permissions = permissions;
|
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/latin/permissions/ |
PermissionsUtil.java | 13 * See the License for the specific language governing permissions and 17 package com.android.inputmethod.latin.permissions; 31 * Utility class for permissions. 36 * Returns the list of permissions not granted from the given list of permissions. 38 * @param permissions list of permissions to check. 39 * @return the list of permissions that do not have permission to use. 42 String... permissions) { 44 for (String permission : permissions) { [all...] |
/system/bt/service/common/bluetooth/ |
descriptor.h | 13 // See the License for the specific language governing permissions and 27 Descriptor(uint16_t handle, const Uuid& uuid, uint16_t permissions) 28 : handle_(handle), uuid_(uuid), permissions_(permissions){}; 37 uint16_t permissions() const { return permissions_; } function in class:bluetooth::Descriptor
|
/external/pdfium/fxjs/xfa/ |
cjx_mdp.h | 19 JS_PROP(permissions);
|
/libcore/ojluni/src/main/java/java/nio/file/attribute/ |
PosixFileAttributes.java | 64 * Returns the permissions of the file. The file permissions are returned 66 * copy of the file permissions and is modifiable. This allows the result 68 * setPermissions} method to update the file's permissions. 70 * @return the file permissions 74 Set<PosixFilePermission> permissions(); method in interface:PosixFileAttributes
|
/device/google/atv/products/ |
treble_atv_common.mk | 13 # See the License for the specific language governing permissions and 78 # privapp-permissions whitelisting 80 vendor/google/data/etc/permissions/privapp-permissions-google.xml:system/etc/permissions/privapp-permissions-google.xml \ 81 vendor/google/data/etc/permissions/privapp-permissions-atv.xml:system/etc/permissions/privapp-permissions-atv.xm [all...] |
/frameworks/support/leanback/src/main/java/androidx/leanback/app/ |
PermissionHelper.java | 11 * or implied. See the License for the specific language governing permissions and limitations under 28 public static void requestPermissions(android.app.Fragment fragment, String[] permissions, 31 fragment.requestPermissions(permissions, requestCode);
|
/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp23/src/com/android/cts/usepermission/ |
BasePermissionActivity.java | 13 * See the License for the specific language governing permissions and 35 public final String[] permissions; field in class:BasePermissionActivity.Result 38 public Result(int requestCode, String[] permissions, int[] grantResults) { 40 this.permissions = permissions; 57 public void onRequestPermissionsResult(int requestCode, String[] permissions, 60 mResult.offer(new Result(requestCode, permissions, grantResults), 5, TimeUnit.SECONDS);
|
/external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/filesystem/ |
AbstractFileSystemEntry.java | 13 * See the License for the specific language governing permissions and
61 public Permissions getPermissions() {
62 return permissions;
65 public void setPermissions(Permissions permissions) {
66 this.permissions = permissions;
69 private Permissions permissions;
field in class:AbstractFileSystemEntry 119 this.permissions = new Permissions(permissionsString); [all...] |
/external/mockftpserver/MockFtpServer/src/main/java/org/mockftpserver/fake/ |
UserAccount.java | 13 * See the License for the specific language governing permissions and
20 import org.mockftpserver.fake.filesystem.Permissions;
26 * directory, list of groups to which this user belongs, and default permissions applied to
37 * The default value for <code>defaultPermissionsForNewFile</code> is read and write permissions for
39 * write and execute permissions for all (user/group/world).
60 public static final Permissions DEFAULT_PERMISSIONS_FOR_NEW_FILE = new Permissions("rw-rw-rw-");
61 public static final Permissions DEFAULT_PERMISSIONS_FOR_NEW_DIRECTORY = Permissions.ALL;
70 private Permissions defaultPermissionsForNewFile = DEFAULT_PERMISSIONS_FOR_NEW_FILE; 214 Permissions permissions = entry.getPermissions(); local 235 Permissions permissions = entry.getPermissions(); local 256 Permissions permissions = entry.getPermissions(); local [all...] |
/libcore/ojluni/src/main/java/sun/net/ftp/ |
FtpDirEntry.java | 63 private boolean[][] permissions = null; field in class:FtpDirEntry 218 if (permissions != null) { 219 return permissions[p.value][0]; 231 if (permissions != null) { 232 return permissions[p.value][1]; 244 if (permissions != null) { 245 return permissions[p.value][2]; 251 * Sets the permissions for that file. Intended mostly to be used 253 * The permissions array is a 3x3 {@code boolean} array, the first index being 256 * <p>E.G.: {@code permissions[1][2]} is the group/execute permission.</p [all...] |