/aosp_15_r20/packages/services/Car/service/ |
D | AndroidManifest.xml | 29 <!-- Allows an application to read the driver monitoring settings information. 36 <!-- Allows an application to control the driver monitoring settings information. 43 <!-- Allows an application to read the driver monitoring states information. 56 <!-- Allows an application to read the vehicle energy information. 65 <!-- Allows an application to control the vehicle EV energy information. 74 <!-- Allows CarService to connect to OEM CarService. 82 <!-- Allows an application to adjust the vehicle's range remaining information. 90 <!-- Allows an application to read the VIN information. 98 <!-- Allows an application to control the vehicle HVAC. 106 <!-- Allows an application to control the vehicle doors. [all …]
|
/aosp_15_r20/out/soong/.intermediates/frameworks/base/core/res/framework-res/android_common/manifest_fixer/ |
D | AndroidManifest.xml | 836 <!-- Allows an application to read the user's contacts data. 842 <!-- Allows an application to write the user's contacts data. 847 <!-- Allows an app to update the verification status of E2EE contact keys owned by other apps. 856 <!-- Allows an application to set default account for new contacts. 864 <!-- Allows an application to set default account for new contacts. 881 <!-- Allows an application to read the user's calendar data. 886 <!-- Allows an application to write the user's calendar data. 896 <!-- Allows accessing the messages on ICC 903 <!-- Allows an application to send SMS messages. 912 <!-- Allows an application to receive SMS messages. [all …]
|
/aosp_15_r20/packages/modules/Permission/tests/cts/permissionpolicy/res/raw/ |
D | android_manifest.xml | 867 <!-- Allows an application to read the user's contacts data. 877 <!-- Allows an application to write the user's contacts data. 886 <!-- Allows an app to update the verification status of E2EE contact keys owned by other apps. 900 <!-- Allows an application to set default account for new contacts. 910 <!-- Allows an application to set default account for new contacts. 934 <!-- Allows an application to read the user's calendar data. 943 <!-- Allows an application to write the user's calendar data. 957 <!-- Allows accessing the messages on ICC 969 <!-- Allows an application to send SMS messages. 983 <!-- Allows an application to receive SMS messages. [all …]
|
/aosp_15_r20/frameworks/base/core/res/ |
H A D | AndroidManifest.xml | 883 <!-- Allows an application to read the user's contacts data. 893 <!-- Allows an application to write the user's contacts data. 902 <!-- Allows an app to update the verification status of E2EE contact keys owned by other apps. 916 <!-- Allows an application to set default account for new contacts. 926 <!-- Allows an application to set default account for new contacts. 950 <!-- Allows an application to read the user's calendar data. 959 <!-- Allows an application to write the user's calendar data. 973 <!-- Allows accessing the messages on ICC 985 <!-- Allows an application to send SMS messages. 999 <!-- Allows an application to receive SMS messages. [all …]
|
/aosp_15_r20/packages/modules/HealthFitness/framework/java/android/health/connect/ |
D | HealthPermissions.java | 93 * Allows an application to grant/revoke health-related permissions. 107 * Allows an application to modify health data. 118 * Allows an application to launch client onboarding activities responsible for connecting to 141 * Allows an application to read health data (of any type) in background. 150 * Allows an application to read the entire history of health data (of any type). 159 * Allows an application to read the user's active calories burned data. 167 * Allows an application to read the user's activity intensity data. 176 * Allows an application to read the user's distance data. 183 * Allows an application to read the user's elevation gained data. 191 * Allows an application to read the user's exercise data. [all …]
|
/aosp_15_r20/external/libcap/cap/ |
H A D | names.go | 24 // CHOWN allows a process to arbitrarily change the user and 28 // DAC_OVERRIDE allows a process to override of all Discretionary 35 // DAC_READ_SEARCH allows a process to override all DAC restrictions 41 // FOWNER allows a process to perform operations on files, even 51 // FSETID allows a process to set the S_ISUID and S_ISUID bits of 57 // KILL allows a process to send a kill(2) signal to any other 62 // SETGID allows a process to freely manipulate its own GIDs: 65 // - allows the forging of GID credentials passed over a 69 // SETUID allows a process to freely manipulate its own UIDs: 72 // - allows the forging of UID credentials passed over a [all …]
|
/aosp_15_r20/external/libcap/progs/ |
H A D | capshdoc.c | 9 "Allows a process to arbitrarily change the user and", 14 "Allows a process to override of all Discretionary", 22 "Allows a process to override all DAC restrictions", 29 "Allows a process to perform operations on files, even", 40 "Allows a process to set the S_ISUID and S_ISUID bits of", 47 "Allows a process to send a kill(2) signal to any other", 53 "Allows a process to freely manipulate its own GIDs:", 56 " - allows the forging of GID credentials passed over a", 61 "Allows a process to freely manipulate its own UIDs:", 64 " - allows the forging of UID credentials passed over a", [all …]
|
/aosp_15_r20/external/sandboxed-api/sandboxed_api/sandbox2/ |
H A D | policybuilder.h | 119 // This allows unrestricted network access by not creating a network 129 // Allows unrestricted access to the network by *not* creating a network 149 // Allows these syscalls: 156 // Allows these syscalls: 166 // Allows these syscalls: 172 // Allows these syscalls: 178 // Allows these syscalls: 184 // Allows these syscalls: 192 // Allows these files: 199 // Allows these syscalls: [all …]
|
/aosp_15_r20/external/aws-sdk-java-v2/services/marketplacecatalog/src/main/resources/codegen-resources/ |
H A D | service-2.json | 203 …"documentation":"<p>Allows you to request changes for your entities. Within a single <code>ChangeS… 265 "documentation":"<p>Object that allows filtering on entity id of an AMI product.</p>" 309 …"documentation":"<p>Object that allows filtering based on the last modified date of AMI products.<… 337 …"documentation":"<p>Objects that allows sorting on AMI products based on certain fields and sortin… 374 "documentation":"<p>Object that allows filtering on product title.</p>" 396 …"documentation":"<p>Object that allows filtering on the visibility of the product in the AWS Marke… 654 "documentation":"<p>Object that allows filtering on entity id of a container product.</p>" 698 …"documentation":"<p>Object that allows filtering based on the last modified date of container prod… 726 …"documentation":"<p>Objects that allows sorting on container products based on certain fields and … 763 "documentation":"<p>Object that allows filtering on product title.</p>" [all …]
|
/aosp_15_r20/external/libultrahdr/tests/ |
H A D | jpegr_test.cpp | 404 << "fail, API allows bad jpeg quality factor"; in TEST() 409 << "fail, API allows bad jpeg quality factor"; in TEST() 415 << "fail, API allows bad hdr transfer function"; in TEST() 421 << "fail, API allows bad hdr transfer function"; in TEST() 426 << "fail, API allows bad hdr transfer function"; in TEST() 439 << "fail, API allows nullptr dest"; in TEST() 445 << "fail, API allows nullptr dest"; in TEST() 453 << "fail, API allows nullptr p010 image"; in TEST() 461 << "fail, API allows nullptr p010 image"; in TEST() 472 << "fail, API allows bad p010 color gamut"; in TEST() [all …]
|
/aosp_15_r20/frameworks/base/core/res/res/values-en-rXC/ |
H A D | strings.xml | 271 …Use this under most circumstances. It allows you to track progr… 367 …Allows the app to disable… 369 …Allows the app to be the … 371 …Allows the app to expand … 373 …Allows the app to display… 375 …Allows an application to … 377 …Allows the application to… 379 …Allows the app to see the… 381 …Allows the app to answer … 383 …Allows the app to receive… [all …]
|
/aosp_15_r20/external/google-cloud-java/java-accesscontextmanager/proto-google-identity-accesscontextmanager-v1/src/main/java/com/google/identity/accesscontextmanager/v1/ |
H A D | DevicePolicy.java | 125 * Allowed encryptions statuses, an empty list allows all statuses. 145 * Allowed encryptions statuses, an empty list allows all statuses. 162 * Allowed encryptions statuses, an empty list allows all statuses. 181 * Allowed encryptions statuses, an empty list allows all statuses. 198 * Allowed encryptions statuses, an empty list allows all statuses. 223 * Allowed OS versions, an empty list allows all types and all versions. 237 * Allowed OS versions, an empty list allows all types and all versions. 251 * Allowed OS versions, an empty list allows all types and all versions. 264 * Allowed OS versions, an empty list allows all types and all versions. 277 * Allowed OS versions, an empty list allows all types and all versions. [all …]
|
H A D | DevicePolicyOrBuilder.java | 44 * Allowed encryptions statuses, an empty list allows all statuses. 59 * Allowed encryptions statuses, an empty list allows all statuses. 73 * Allowed encryptions statuses, an empty list allows all statuses. 89 * Allowed encryptions statuses, an empty list allows all statuses. 103 * Allowed encryptions statuses, an empty list allows all statuses. 119 * Allowed OS versions, an empty list allows all types and all versions. 129 * Allowed OS versions, an empty list allows all types and all versions. 139 * Allowed OS versions, an empty list allows all types and all versions. 149 * Allowed OS versions, an empty list allows all types and all versions. 160 * Allowed OS versions, an empty list allows all types and all versions. [all …]
|
/aosp_15_r20/frameworks/base/core/res/res/values-en-rIN/ |
H A D | strings.xml | 274 …mary" msgid="8493795476325339542">"Use this under most circumstances. It allows you to track progr… 370 …<string name="permdesc_statusBar" msgid="5809162768651019642">"Allows the app to disable the statu… 372 …<string name="permdesc_statusBarService" msgid="6652917399085712557">"Allows the app to be the sta… 374 …<string name="permdesc_expandStatusBar" msgid="7180756900448498536">"Allows the app to expand or c… 376 …<string name="permdesc_fullScreenIntent" msgid="1100721419406643997">"Allows the app to display no… 378 …<string name="permdesc_install_shortcut" msgid="4476328467240212503">"Allows an application to add… 380 …<string name="permdesc_uninstall_shortcut" msgid="1924735350988629188">"Allows the application to … 382 …<string name="permdesc_processOutgoingCalls" msgid="7833149750590606334">"Allows the app to see th… 384 …<string name="permdesc_answerPhoneCalls" msgid="894386681983116838">"Allows the app to answer an i… 386 …<string name="permdesc_receiveSms" msgid="1797345626687832285">"Allows the app to receive and proc… [all …]
|
/aosp_15_r20/frameworks/base/core/res/res/values-en-rCA/ |
H A D | strings.xml | 274 …mary" msgid="8493795476325339542">"Use this under most circumstances. It allows you to track progr… 370 …<string name="permdesc_statusBar" msgid="5809162768651019642">"Allows the app to disable the statu… 372 …<string name="permdesc_statusBarService" msgid="6652917399085712557">"Allows the app to be the sta… 374 …<string name="permdesc_expandStatusBar" msgid="7180756900448498536">"Allows the app to expand or c… 376 …<string name="permdesc_fullScreenIntent" msgid="1100721419406643997">"Allows the app to display no… 378 …<string name="permdesc_install_shortcut" msgid="4476328467240212503">"Allows an application to add… 380 …<string name="permdesc_uninstall_shortcut" msgid="1924735350988629188">"Allows the application to … 382 …<string name="permdesc_processOutgoingCalls" msgid="7833149750590606334">"Allows the app to see th… 384 …<string name="permdesc_answerPhoneCalls" msgid="894386681983116838">"Allows the app to answer an i… 386 …<string name="permdesc_receiveSms" msgid="1797345626687832285">"Allows the app to receive and proc… [all …]
|
/aosp_15_r20/frameworks/base/core/res/res/values-en-rAU/ |
H A D | strings.xml | 274 …mary" msgid="8493795476325339542">"Use this under most circumstances. It allows you to track progr… 370 …<string name="permdesc_statusBar" msgid="5809162768651019642">"Allows the app to disable the statu… 372 …<string name="permdesc_statusBarService" msgid="6652917399085712557">"Allows the app to be the sta… 374 …<string name="permdesc_expandStatusBar" msgid="7180756900448498536">"Allows the app to expand or c… 376 …<string name="permdesc_fullScreenIntent" msgid="1100721419406643997">"Allows the app to display no… 378 …<string name="permdesc_install_shortcut" msgid="4476328467240212503">"Allows an application to add… 380 …<string name="permdesc_uninstall_shortcut" msgid="1924735350988629188">"Allows the application to … 382 …<string name="permdesc_processOutgoingCalls" msgid="7833149750590606334">"Allows the app to see th… 384 …<string name="permdesc_answerPhoneCalls" msgid="894386681983116838">"Allows the app to answer an i… 386 …<string name="permdesc_receiveSms" msgid="1797345626687832285">"Allows the app to receive and proc… [all …]
|
/aosp_15_r20/frameworks/base/core/res/res/values-en-rGB/ |
H A D | strings.xml | 274 …mary" msgid="8493795476325339542">"Use this under most circumstances. It allows you to track progr… 370 …<string name="permdesc_statusBar" msgid="5809162768651019642">"Allows the app to disable the statu… 372 …<string name="permdesc_statusBarService" msgid="6652917399085712557">"Allows the app to be the sta… 374 …<string name="permdesc_expandStatusBar" msgid="7180756900448498536">"Allows the app to expand or c… 376 …<string name="permdesc_fullScreenIntent" msgid="1100721419406643997">"Allows the app to display no… 378 …<string name="permdesc_install_shortcut" msgid="4476328467240212503">"Allows an application to add… 380 …<string name="permdesc_uninstall_shortcut" msgid="1924735350988629188">"Allows the application to … 382 …<string name="permdesc_processOutgoingCalls" msgid="7833149750590606334">"Allows the app to see th… 384 …<string name="permdesc_answerPhoneCalls" msgid="894386681983116838">"Allows the app to answer an i… 386 …<string name="permdesc_receiveSms" msgid="1797345626687832285">"Allows the app to receive and proc… [all …]
|
/aosp_15_r20/packages/modules/Permission/tests/utils/safetycenter/java/com/android/safetycenter/testing/ |
D | SafetyCenterFlags.kt | 330 /** A property that allows getting and setting the [isEnabledFlag]. */ in <lambda>() 333 /** A property that allows getting and setting the [notificationsFlag]. */ in <lambda>() 336 /** A property that allows getting and setting the [notificationsAllowedSourcesFlag]. */ in <lambda>() 339 /** A property that allows getting and setting the [notificationsMinDelayFlag]. */ in <lambda>() 342 /** A property that allows getting and setting the [immediateNotificationBehaviorIssuesFlag]. */ in <lambda>() 345 /** A property that allows getting and setting the [notificationResurfaceIntervalFlag]. */ in <lambda>() 348 /** A property that allows getting and setting the [replaceLockScreenIconActionFlag]. */ in <lambda>() 351 /** A property that allows getting and setting the [refreshSourceTimeoutsFlag]. */ in <lambda>() 354 /** A property that allows getting and setting the [resolveActionTimeoutFlag]. */ in <lambda>() 357 /** A property that allows getting and setting the [tempHiddenIssueResurfaceDelayFlag]. */ in <lambda>() [all …]
|
/aosp_15_r20/prebuilts/runtime/mainline/platform/sdk/include_gen/external/perfetto/perfetto_protos_perfetto_ipc_cpp_gen_headers/gen/external/perfetto/protos/perfetto/ipc/ |
H A D | consumer_port.gen.h | 156 // Allows to preserve unknown protobuf fields for compatibility 203 // Allows to preserve unknown protobuf fields for compatibility 244 // Allows to preserve unknown protobuf fields for compatibility 273 // Allows to preserve unknown protobuf fields for compatibility 308 // Allows to preserve unknown protobuf fields for compatibility 337 // Allows to preserve unknown protobuf fields for compatibility 372 // Allows to preserve unknown protobuf fields for compatibility 407 // Allows to preserve unknown protobuf fields for compatibility 442 // Allows to preserve unknown protobuf fields for compatibility 480 // Allows to preserve unknown protobuf fields for compatibility [all …]
|
H A D | producer_port.gen.h | 97 // Allows to preserve unknown protobuf fields for compatibility 126 // Allows to preserve unknown protobuf fields for compatibility 197 // Allows to preserve unknown protobuf fields for compatibility 235 // Allows to preserve unknown protobuf fields for compatibility 285 // Allows to preserve unknown protobuf fields for compatibility 320 // Allows to preserve unknown protobuf fields for compatibility 361 // Allows to preserve unknown protobuf fields for compatibility 402 // Allows to preserve unknown protobuf fields for compatibility 443 // Allows to preserve unknown protobuf fields for compatibility 472 // Allows to preserve unknown protobuf fields for compatibility [all …]
|
/aosp_15_r20/out/soong/.intermediates/external/perfetto/perfetto_protos_perfetto_ipc_cpp_gen_headers/gen/external/perfetto/protos/perfetto/ipc/ |
D | consumer_port.gen.h | 156 // Allows to preserve unknown protobuf fields for compatibility 233 // Allows to preserve unknown protobuf fields for compatibility 274 // Allows to preserve unknown protobuf fields for compatibility 303 // Allows to preserve unknown protobuf fields for compatibility 338 // Allows to preserve unknown protobuf fields for compatibility 367 // Allows to preserve unknown protobuf fields for compatibility 402 // Allows to preserve unknown protobuf fields for compatibility 437 // Allows to preserve unknown protobuf fields for compatibility 472 // Allows to preserve unknown protobuf fields for compatibility 510 // Allows to preserve unknown protobuf fields for compatibility [all …]
|
D | producer_port.gen.h | 97 // Allows to preserve unknown protobuf fields for compatibility 126 // Allows to preserve unknown protobuf fields for compatibility 197 // Allows to preserve unknown protobuf fields for compatibility 235 // Allows to preserve unknown protobuf fields for compatibility 285 // Allows to preserve unknown protobuf fields for compatibility 320 // Allows to preserve unknown protobuf fields for compatibility 361 // Allows to preserve unknown protobuf fields for compatibility 402 // Allows to preserve unknown protobuf fields for compatibility 443 // Allows to preserve unknown protobuf fields for compatibility 472 // Allows to preserve unknown protobuf fields for compatibility [all …]
|
/aosp_15_r20/external/google-cloud-java/java-monitoring/proto-google-cloud-monitoring-v3/src/main/java/com/google/monitoring/v3/ |
H A D | UptimeCheckRegion.java | 46 * Allows checks to run from locations within the United States of America. 56 * Allows checks to run from locations within the continent of Europe. 66 * Allows checks to run from locations within the continent of South 77 * Allows checks to run from locations within the Asia Pacific area (ex: 88 * Allows checks to run from locations within the western United States of 99 * Allows checks to run from locations within the central United States of 110 * Allows checks to run from locations within the eastern United States of 135 * Allows checks to run from locations within the United States of America. 145 * Allows checks to run from locations within the continent of Europe. 155 * Allows checks to run from locations within the continent of South [all …]
|
/aosp_15_r20/frameworks/base/core/java/android/hardware/input/ |
H A D | InputSettings.java | 680 * that allows the user to configure the device to ignore rapid, repeated keypresses of the 695 * that allows the user to configure the device to ignore rapid, repeated keypresses of the 710 * that allows the user to configure the device to ignore rapid, repeated keypresses of the 734 * that allows the user to configure the device to ignore rapid, repeated keypresses of the 764 * allows the user to specify the duration for which one must press-and-hold a key before the 779 * allows the user to specify the duration for which one must press-and-hold a key before the 794 * allows the user to specify the duration for which one must press-and-hold a key before the 818 * allows the user to specify the duration for which one must press-and-hold a key before the 914 * that allows the user to use the keys on the keyboard to control the mouse pointer and 929 * that allows the user to use the keys on the keyboard to control the mouse pointer and [all …]
|
/aosp_15_r20/external/libxml2/test/schemas/ |
H A D | nvdcve_0.xml | 5 …e="cve">The Settings Manager in Adobe Flash Player 9.0.124.0 and earlier allows remote attackers t… 58 …ed buffer overflow in Mplayer.exe in Herosoft Inc. Hero DVD Player 3.0.8 allows user-assisted remo… 105 …cified vulnerability in IBM Lotus Quickr 8.1 before Fix pack 1 (8.1.0.1) allows a place manager to… 131 …cified vulnerability in IBM Lotus Quickr 8.1 before Fix pack 1 (8.1.0.1) allows editors to delete … 156 … function in Tonec Internet Download Manager, possibly 5.14 and earlier, allows remote attackers t… 177 … processFiles.php in FOSS Gallery Admin and FOSS Gallery Public 1.0 beta allows remote attackers t… 205 …="cve">Microsoft Windows Vista Home and Ultimate Edition SP1 and earlier allows local users to cau… 234 …s db/news.mdb under the web root with insufficient access control, which allows remote attackers t… 253 …b/shoutdb.mdb under the web root with insufficient access control, which allows remote attackers t… 267 …-site scripting (XSS) vulnerability in BBcode API module in Phorum 5.2.8 allows remote attackers t… [all …]
|