/frameworks/base/apex/jobscheduler/service/java/com/android/server/job/ |
D | GrantedUriPermissions.java | 71 GrantedUriPermissions perms = null; in createFromIntent() local 75 perms = grantUri(data, sourceUid, targetPackage, targetUserId, grantFlags, tag, in createFromIntent() 76 perms); in createFromIntent() 81 perms = grantClip(clip, sourceUid, targetPackage, targetUserId, grantFlags, tag, in createFromIntent() 82 perms); in createFromIntent() 85 return perms; in createFromIntent() 93 GrantedUriPermissions perms = null; in createFromClip() local 95 perms = grantClip(clip, sourceUid, targetPackage, targetUserId, grantFlags, in createFromClip() 96 tag, perms); in createFromClip() 98 return perms; in createFromClip()
|
/frameworks/base/core/java/android/content/pm/parsing/component/ |
D | ParsedProcessUtils.java | 46 private static ParseResult<Set<String>> parseDenyPermission(Set<String> perms, in parseDenyPermission() argument 54 perms = CollectionUtils.add(perms, perm); in parseDenyPermission() 60 return input.success(perms); in parseDenyPermission() 64 private static ParseResult<Set<String>> parseAllowPermission(Set<String> perms, Resources res, in parseAllowPermission() argument 72 perms = CollectionUtils.remove(perms, perm); in parseAllowPermission() 78 return input.success(perms); in parseAllowPermission() 82 …private static ParseResult<ParsedProcess> parseProcess(Set<String> perms, String[] separateProcess… in parseProcess() argument 88 if (perms != null) { in parseProcess() 89 proc.deniedPermissions = new ArraySet<>(perms); in parseProcess()
|
/frameworks/base/services/core/java/com/android/server/uri/ |
D | UriGrantsManagerService.java | 272 final ArrayMap<GrantUri, UriPermission> perms = mGrantedUriPermissions.get( in getUriPermissions() local 274 if (perms == null) { in getUriPermissions() 277 for (int j = 0; j < perms.size(); j++) { in getUriPermissions() 278 final UriPermission perm = perms.valueAt(j); in getUriPermissions() 288 final ArrayMap<GrantUri, UriPermission> perms = in getUriPermissions() local 290 for (int j = 0; j < perms.size(); j++) { in getUriPermissions() 291 final UriPermission perm = perms.valueAt(j); in getUriPermissions() 313 final ArrayMap<GrantUri, UriPermission> perms = mGrantedUriPermissions.valueAt(i); in getGrantedUriPermissions() local 314 for (int j = 0; j < perms.size(); j++) { in getGrantedUriPermissions() 315 final UriPermission perm = perms.valueAt(j); in getGrantedUriPermissions() [all …]
|
/frameworks/ml/nn/runtime/test/specs/V1_2/ |
D | transpose_v1_2.mod.py | 20 perms = Input("perms", "TENSOR_INT32", "{0}") variable 23 model = model.Operation("TRANSPOSE", i1, perms).To(output) 35 perms: [],
|
D | transpose_float16.mod.py | 3 perms = Parameter("perms", "TENSOR_INT32", "{4}", [0, 2, 1, 3]) variable 6 model = model.Operation("TRANSPOSE", i1, perms).To(output)
|
/frameworks/ml/nn/runtime/test/specs/V1_1/ |
D | transpose_quant8_1.mod.py | 3 perms = Parameter("perms", "TENSOR_INT32", "{4}", [2, 0, 1, 3]) variable 6 model = model.Operation("TRANSPOSE", i1, perms).To(output)
|
D | transpose.mod.py | 3 perms = Parameter("perms", "TENSOR_INT32", "{4}", [0, 2, 1, 3]) variable 6 model = model.Operation("TRANSPOSE", i1, perms).To(output)
|
D | transpose_float_1.mod.py | 3 perms = Parameter("perms", "TENSOR_INT32", "{4}", [2, 0, 1, 3]) variable 6 model = model.Operation("TRANSPOSE", i1, perms).To(output)
|
D | transpose_relaxed.mod.py | 19 perms = Parameter("perms", "TENSOR_INT32", "{4}", [0, 2, 1, 3]) variable 22 model = model.Operation("TRANSPOSE", i1, perms).To(output)
|
D | transpose_float_1_relaxed.mod.py | 19 perms = Parameter("perms", "TENSOR_INT32", "{4}", [2, 0, 1, 3]) variable 22 model = model.Operation("TRANSPOSE", i1, perms).To(output)
|
/frameworks/ml/nn/runtime/test/specs/V1_3/ |
D | transpose_quant8_signed.mod.py | 324 perms = Parameter("perms", "TENSOR_INT32", "{4}", [2, 0, 1, 3]) variable 327 model = model.Operation("TRANSPOSE", i1, perms).To(output) 358 perms = Input("perms", "TENSOR_INT32", "{0}") variable 361 model = model.Operation("TRANSPOSE", i1, perms).To(output) 373 perms: [],
|
/frameworks/base/core/java/android/database/sqlite/ |
D | SQLiteOpenHelper.java | 444 int perms = FileUtils.S_IRUSR | FileUtils.S_IWUSR | FileUtils.S_IRGRP | FileUtils.S_IWGRP; in setFilePermissionsForDb() local 445 FileUtils.setPermissions(dbPath, perms, -1, -1); in setFilePermissionsForDb()
|
/frameworks/base/services/core/java/com/android/server/connectivity/ |
D | PermissionMonitor.java | 204 ArraySet<String> perms = systemPermission.valueAt(i); in startMonitoring() local 208 if (perms != null) { in startMonitoring() 209 netdPermission |= perms.contains(UPDATE_DEVICE_STATS) in startMonitoring() 211 netdPermission |= perms.contains(INTERNET) in startMonitoring()
|
/frameworks/base/core/java/android/permission/ |
D | PermissionControllerService.java | 310 CollectionUtils.forEach(revoked, (pkg, perms) -> { in onBind() 312 Preconditions.checkCollectionElementsNotNull(perms, "permissions"); in onBind()
|
/frameworks/native/cmds/installd/ |
D | utils.cpp | 539 int create_dir_if_needed(const std::string& pathname, mode_t perms) { in create_dir_if_needed() argument 545 return mkdir(pathname.c_str(), perms); in create_dir_if_needed() 555 if (actual_perms != perms) { in create_dir_if_needed() 556 LOG(WARNING) << pathname << " permissions " << actual_perms << " expected " << perms; in create_dir_if_needed()
|
/frameworks/base/core/java/com/android/server/ |
D | SystemConfig.java | 704 ArraySet<String> perms = mSystemPermissions.get(uid); in readPermissionsFromXml() local 705 if (perms == null) { in readPermissionsFromXml() 706 perms = new ArraySet<String>(); in readPermissionsFromXml() 707 mSystemPermissions.put(uid, perms); in readPermissionsFromXml() 709 perms.add(perm); in readPermissionsFromXml()
|
/frameworks/base/services/core/java/com/android/server/am/ |
D | BroadcastQueue.java | 918 final boolean isSignaturePerm(String[] perms) { in isSignaturePerm() argument 919 if (perms == null) { in isSignaturePerm() 923 for (int i = perms.length-1; i >= 0; i--) { in isSignaturePerm() 925 PermissionInfo pi = pm.getPermissionInfo(perms[i], "android", 0); in isSignaturePerm()
|
/frameworks/base/core/java/android/app/ |
D | ContextImpl.java | 2838 int perms = FileUtils.S_IRUSR|FileUtils.S_IWUSR in setFilePermissionsFromMode() local 2842 perms |= FileUtils.S_IROTH; in setFilePermissionsFromMode() 2845 perms |= FileUtils.S_IWOTH; in setFilePermissionsFromMode() 2849 + ", perms=0x" + Integer.toHexString(perms)); in setFilePermissionsFromMode() 2851 FileUtils.setPermissions(name, perms, -1, -1); in setFilePermissionsFromMode()
|
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
D | PackageManagerTests.java | 498 private void assertDirOwnerGroupPermsIfExists(String reason, int uid, int gid, int perms, in assertDirOwnerGroupPermsIfExists() argument 534 if ((stat.st_mode & ~S_IFMT) != perms) { in assertDirOwnerGroupPermsIfExists() 536 sb.append(Integer.toOctalString(perms)); in assertDirOwnerGroupPermsIfExists()
|
/frameworks/base/core/proto/android/os/ |
D | incident.proto | 198 // 1. incidentd can't execute `procrank` because it don't have DAC perms
|
/frameworks/base/services/core/java/com/android/server/pm/ |
D | Settings.java | 4830 final List<ParsedPermission> perms = pkg.getPermissions(); in dumpPackageLPr() local 4832 for (int i=0; i<perms.size(); i++) { in dumpPackageLPr() 4833 ParsedPermission perm = perms.get(i); in dumpPackageLPr() 4857 final List<String> perms = pkg.getRequestedPermissions(); in dumpPackageLPr() local 4859 for (int i=0; i<perms.size(); i++) { in dumpPackageLPr() 4860 String perm = perms.get(i); in dumpPackageLPr()
|
/frameworks/base/services/tests/uiservicestests/src/com/android/server/notification/ |
D | NotificationManagerServiceTest.java | 5647 TestablePermissions perms = mContext.getTestablePermissions(); in enableInteractAcrossUsers() local 5648 perms.setPermission(android.Manifest.permission.INTERACT_ACROSS_USERS, PERMISSION_GRANTED); in enableInteractAcrossUsers()
|
/frameworks/base/tools/aapt2/integration-tests/CommandTests/ |
D | android-28.jar | META-INF/
META-INF/MANIFEST.MF
javax/
javax/net/
javax/ ... |