/aosp_15_r20/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
H A D | EnforcingAdmin.java | 68 private static final String ATTR_AUTHORITIES = "authorities"; 169 String packageName, @Nullable ComponentName componentName, Set<String> authorities, in EnforcingAdmin() argument 172 Objects.requireNonNull(authorities); in EnforcingAdmin() 174 // Role/System authorities should not be using this constructor in EnforcingAdmin() 180 mAuthorities = new HashSet<>(authorities); in EnforcingAdmin() 188 // Only role authorities use this constructor. in EnforcingAdmin() 195 // authorities will be loaded when needed in EnforcingAdmin() 200 /** Constructor for System authorities. */ 204 // Only system authorities use this constructor. in EnforcingAdmin() 217 String packageName, @Nullable ComponentName componentName, Set<String> authorities, in EnforcingAdmin() argument [all …]
|
/aosp_15_r20/external/cronet/third_party/boringssl/src/pki/testdata/nist-pkits/ |
H A D | generate_tests.py | 237 # * authorities-constrained-policy-set 322 # Expected Result: The authorities-constrained-policy-set and the 337 # Expected Result: The authorities-constrained-policy-set and the 367 # Expected Result: The authorities-constrained-policy-set and the 382 # Expected Result: The authorities-constrained-policy-set and the 397 # Expected Result: The authorities-constrained-policy-set and the 437 # Expected Result: The authorities-constrained-policy-set and the 481 # Expected Result: The authorities-constrained-policy-set will be 499 # Expected Result: The authorities-constrained-policy-set will be 519 # Expected Result: The authorities-constrained-policy-set will be [all …]
|
/aosp_15_r20/external/sdk-platform-java/java-common-protos/proto-google-common-protos/src/main/java/com/google/cloud/audit/ |
H A D | AuthenticationInfo.java | 314 * the request. It contains information on the real authorities that try to 316 * authorities present, they are guaranteed to be sorted based on the original 334 * the request. It contains information on the real authorities that try to 336 * authorities present, they are guaranteed to be sorted based on the original 354 * the request. It contains information on the real authorities that try to 356 * authorities present, they are guaranteed to be sorted based on the original 373 * the request. It contains information on the real authorities that try to 375 * authorities present, they are guaranteed to be sorted based on the original 393 * the request. It contains information on the real authorities that try to 395 * authorities present, they are guaranteed to be sorted based on the original [all …]
|
H A D | AuthenticationInfoOrBuilder.java | 168 * the request. It contains information on the real authorities that try to 170 * authorities present, they are guaranteed to be sorted based on the original 185 * the request. It contains information on the real authorities that try to 187 * authorities present, they are guaranteed to be sorted based on the original 201 * the request. It contains information on the real authorities that try to 203 * authorities present, they are guaranteed to be sorted based on the original 217 * the request. It contains information on the real authorities that try to 219 * authorities present, they are guaranteed to be sorted based on the original 234 * the request. It contains information on the real authorities that try to 236 * authorities present, they are guaranteed to be sorted based on the original
|
/aosp_15_r20/frameworks/base/services/tests/uiservicestests/src/com/android/server/slice/ |
H A D | SliceClientPermissionsTest.java | 78 ArrayList<SliceAuthority> authorities = new ArrayList<>(client.getAuthorities()); in testRemoveBasic() local 79 assertEquals(0, authorities.get(0).getPaths().size()); in testRemoveBasic() 109 ArrayList<SliceAuthority> authorities = new ArrayList<>(client.getAuthorities()); in testRemoveSubtrees() local 110 assertEquals(0, authorities.get(0).getPaths().size()); in testRemoveSubtrees() 136 ArrayList<SliceAuthority> authorities = new ArrayList<>(client.getAuthorities()); in testAddConsolidate_addFirst() local 137 assertEquals(1, authorities.get(0).getPaths().size()); in testAddConsolidate_addFirst() 163 ArrayList<SliceAuthority> authorities = new ArrayList<>(client.getAuthorities()); in testAddConsolidate_addSecond() local 164 assertEquals(1, authorities.get(0).getPaths().size()); in testAddConsolidate_addSecond() 197 ArrayList<SliceAuthority> authorities = new ArrayList<>(client.getAuthorities()); in testCreation() local 198 authorities.sort(Comparator.comparing(SliceAuthority::getAuthority)); in testCreation() [all …]
|
H A D | SliceProviderPermissionsTest.java | 79 ArrayList<SliceAuthority> authorities = new ArrayList<>(provider.getAuthorities()); in testCreation() local 80 authorities.sort(Comparator.comparing(SliceAuthority::getAuthority)); in testCreation() 82 assertEquals(2, authorities.size()); in testCreation() 83 assertEquals("com.android.pkg", authorities.get(0).getAuthority()); in testCreation() 84 assertEquals("com.android.pkg.slices", authorities.get(1).getAuthority()); in testCreation() 86 assertEquals(1, authorities.get(0).getPkgs().size()); in testCreation() 87 assertEquals(2, authorities.get(1).getPkgs().size()); in testCreation()
|
/aosp_15_r20/external/google-cloud-java/java-securitycenter/proto-google-cloud-securitycenter-v1/src/main/java/com/google/cloud/securitycenter/v1/ |
H A D | Access.java | 532 * information about the real authorities that try to access Google Cloud 533 * resources by delegating on a service account. When multiple authorities are 553 * information about the real authorities that try to access Google Cloud 554 * resources by delegating on a service account. When multiple authorities are 575 * information about the real authorities that try to access Google Cloud 576 * resources by delegating on a service account. When multiple authorities are 595 * information about the real authorities that try to access Google Cloud 596 * resources by delegating on a service account. When multiple authorities are 616 * information about the real authorities that try to access Google Cloud 617 * resources by delegating on a service account. When multiple authorities are [all …]
|
H A D | AccessOrBuilder.java | 278 * information about the real authorities that try to access Google Cloud 279 * resources by delegating on a service account. When multiple authorities are 296 * information about the real authorities that try to access Google Cloud 297 * resources by delegating on a service account. When multiple authorities are 314 * information about the real authorities that try to access Google Cloud 315 * resources by delegating on a service account. When multiple authorities are 331 * information about the real authorities that try to access Google Cloud 332 * resources by delegating on a service account. When multiple authorities are 349 * information about the real authorities that try to access Google Cloud 350 * resources by delegating on a service account. When multiple authorities are
|
/aosp_15_r20/out/soong/.intermediates/packages/providers/TelephonyProvider/TelephonyProvider/android_common/manifest_fixer/ |
D | AndroidManifest.xml | 45 …<provider android:name="TelephonyProvider" android:authorities="telephony" android:exported="true"… 50 …<provider android:name="SmsProvider" android:authorities="sms" android:multiprocess="false" androi… 52 …<provider android:name="SmsChangesProvider" android:authorities="sms-changes" android:multiprocess… 60 …<provider android:name="MmsProvider" android:authorities="mms" android:multiprocess="false" androi… 68 …<provider android:name="MmsSmsProvider" android:authorities="mms-sms" android:multiprocess="false"… 70 …<provider android:name="CarrierProvider" android:authorities="carrier_information" android:exporte… 72 …<provider android:name="HbpcdLookupProvider" android:authorities="hbpcd_lookup" android:exported="… 74 …<provider android:name="CarrierIdProvider" android:authorities="carrier_id" android:exported="true… 76 …<provider android:name="SatelliteProvider" android:authorities="satellite" android:exported="false…
|
/aosp_15_r20/packages/providers/TelephonyProvider/ |
D | AndroidManifest.xml | 61 android:authorities="telephony" 70 android:authorities="sms" 77 android:authorities="sms-changes" 90 android:authorities="mms" 103 android:authorities="mms-sms" 110 android:authorities="carrier_information" 117 android:authorities="hbpcd_lookup" 124 android:authorities="carrier_id" 130 android:authorities="satellite"
|
/aosp_15_r20/packages/apps/TvSystemUI/tests/ |
D | AndroidManifest.xml | 35 android:authorities="${applicationId}.people.disabled" 39 tools:replace="android:authorities" /> 42 android:authorities="${applicationId}.fileprovider.disabled" 45 tools:replace="android:authorities" /> 48 android:authorities="${applicationId}.keyguard.disabled" 51 tools:replace="android:authorities" /> 54 android:authorities="${applicationId}.keyguard.quickaffordance.disabled" 57 tools:replace="android:authorities" />
|
/aosp_15_r20/frameworks/base/core/java/com/android/server/backup/ |
H A D | AccountSyncSettingsBackupHelper.java | 78 private static final String KEY_ACCOUNT_AUTHORITIES = "authorities"; 135 // Create a map of Account types to authorities. Later this will make it easier for us to in serializeAccountSyncSettingsToJSON() 158 List<String> authorities = accountTypeToAuthorities.get(account.type); in serializeAccountSyncSettingsToJSON() local 160 // We ignore Accounts that don't have any authorities because there would be no sync in serializeAccountSyncSettingsToJSON() 162 if (authorities == null || authorities.isEmpty()) { in serializeAccountSyncSettingsToJSON() 170 // Add authorities for this Account type and check whether or not sync is enabled. in serializeAccountSyncSettingsToJSON() 172 for (String authority : authorities) { in serializeAccountSyncSettingsToJSON() 406 // Restore authorities. in restoreExistingAccountSyncSettingsFromJSON() 407 JSONArray authorities = accountJSON.getJSONArray(KEY_ACCOUNT_AUTHORITIES); in restoreExistingAccountSyncSettingsFromJSON() local 412 for (int i = 0; i < authorities.length(); i++) { in restoreExistingAccountSyncSettingsFromJSON() [all …]
|
/aosp_15_r20/packages/apps/Settings/src/com/android/settings/accounts/ |
D | ChooseAccountPreferenceController.java | 82 public void initialize(String[] authorities, String[] accountTypesFilter, UserHandle userHandle, in initialize() argument 85 mAuthorities = authorities; in initialize() 141 // Skip preferences for authorities not specified. If no authorities specified, in onAuthDescriptionsUpdated() 199 Log.v(TAG, "No providers found for authorities: " + auths); in onAuthDescriptionsUpdated() 219 List<String> authorities = mAccountTypeToAuthorities.get(sa.accountType); in getAuthoritiesForAccountType() local 220 if (authorities == null) { in getAuthoritiesForAccountType() 221 authorities = new ArrayList<>(); in getAuthoritiesForAccountType() 222 mAccountTypeToAuthorities.put(sa.accountType, authorities); in getAuthoritiesForAccountType() 228 authorities.add(sa.authority); in getAuthoritiesForAccountType()
|
D | AccountRestrictionHelper.java | 112 * Checks if the account should be shown based on the required authorities for the account type 113 * @param authorities given authority that is passed as activity extra 114 * @param auths list of authorities for particular account type 117 public static boolean showAccount(String[] authorities, ArrayList<String> auths) { in showAccount() argument 119 if (authorities != null && auths != null) { in showAccount() 121 for (String requestedAuthority : authorities) { in showAccount()
|
/aosp_15_r20/packages/apps/DocumentsUI/ |
D | perfetto_config.pbtx | 49 # authorities="com.android.documentsui.archives" - DocsUI 53 # authorities="com.android.externalstorage.documents" - ExternalStorageProvider 56 # authorities="com.android.mtp.documents" - Mtp 59 # authorities="com.android.pixellogger.documents" - PixelLogger 62 # authorities="com.android.providers.downloads" - DownloadSProvider 65 # authorities="com.android.providers.media.documents" - MediaProvider 69 # authorities="com.android.shell.documents" - Shell (BugreportStorageProvider) 72 # authorities="com.google.android.apps.docs.storage" - Google Docs
|
/aosp_15_r20/cts/hostsidetests/appsecurity/test-apps/PermissionDeclareApp/ |
H A D | AndroidManifest.xml | 45 android:authorities="com.android.cts.permissiondeclareapp" 51 android:authorities="ctspermissionwithsignature" 60 android:authorities="ctspermissionwithsignaturegranting" 70 android:authorities="ctsprivateprovider" 76 android:authorities="ctsprivateprovidergranting" 85 android:authorities="ctsambiguousprovider"> 91 android:authorities="ctspermissionwithsignaturepath" 110 android:authorities="ctspermissionwithsignaturepathrestricting"
|
/aosp_15_r20/external/grpc-grpc-java/xds/src/main/java/io/grpc/xds/ |
H A D | Bootstrapper.java | 116 * <p>If the same server is listed in multiple authorities, the entries will be de-duped (i.e., 117 * resources for both authorities will be fetched on the same ADS stream). 152 * "authorities" map. The token "%s", if present in this string, will be replaced with 166 * authority of the URI will be used to select the relevant configuration in the "authorities" 199 abstract ImmutableMap<String, AuthorityInfo> authorities(); in authorities() method in Bootstrapper.BootstrapInfo 205 .authorities(ImmutableMap.<String, AuthorityInfo>of()); in builder() 224 abstract Builder authorities(Map<String, AuthorityInfo> authorities); in authorities() method in Bootstrapper.BootstrapInfo.Builder
|
/aosp_15_r20/packages/apps/TvSettings/TwoPanelSettingsLib/src/com/android/tv/twopanelsettings/slices/compat/ |
D | SliceProvider.java | 87 * android:authorities="com.android.mypkg" />} 99 * android:authorities="com.android.mypkg"> 204 * Change the authorities of the ContentProvider. This is normally set for you from its manifest 207 * @param authorities the semi-colon separated authorities of the ContentProvider. 209 private void setAuthoritiesInternal(String authorities) { in setAuthoritiesInternal() argument 210 if (authorities != null) { in setAuthoritiesInternal() 211 if (authorities.indexOf(';') == -1) { in setAuthoritiesInternal() 212 mAuthority = authorities; in setAuthoritiesInternal() 216 mAuthorities = authorities.split(";"); in setAuthoritiesInternal()
|
/aosp_15_r20/packages/apps/DocumentsUI/tests/ |
D | AndroidManifest.xml | 46 android:authorities="com.android.documentsui.stubprovider" 60 android:authorities="com.android.documentsui.demoprovider" 73 android:authorities="com.android.documentsui.archives.resourcesprovider" 86 android:authorities="com.android.documentsui.inspectorprovider" 99 android:authorities="com.android.documentsui.pagingprovider" 112 android:authorities="com.android.documentsui.broken" 124 android:authorities="com.android.documentsui.brokensettingsenabled"
|
/aosp_15_r20/frameworks/base/packages/SystemUI/tests/ |
H A D | AndroidManifest.xml | 151 tools:replace="android:authorities" 152 android:authorities="${applicationId}.startup-tests" 157 android:authorities="com.android.systemui.test.keyguard.disabled" 159 tools:replace="android:authorities" 163 android:authorities="com.android.systemui.test.keyguard.quickaffordance.disabled" 165 tools:replace="android:authorities" 170 android:authorities="com.android.systemui.test.fileprovider" 173 tools:replace="android:authorities"
|
/aosp_15_r20/packages/providers/MediaProvider/tests/ |
D | AndroidManifest.xml | 88 android:authorities="com.android.providers.media.photopicker.tests.local" 92 android:authorities="com.android.providers.media.photopicker.tests.cloud_flaky" 101 … android:authorities="com.android.providers.media.photopicker.tests.cloud_search_provider" 107 android:authorities="com.android.providers.media.photopicker.tests.cloud_primary" 116 … android:authorities="com.android.providers.media.photopicker.tests.cloud_secondary" 125 … android:authorities="com.android.providers.media.photopicker.tests.cloud_no_permission" 134 … android:authorities="com.android.providers.media.photopicker.tests.cloud_no_intent_filter" 140 …android:authorities="com.android.providers.media.photopicker.tests.cloud_provider_for_search_clien…
|
/aosp_15_r20/cts/tests/PhotoPicker/ |
H A D | AndroidManifest.xml | 50 android:authorities="com.android.provider.cts.cloudproviders.cloud_default" 58 android:authorities="com.android.provider.cts.cloudproviders.search" 66 android:authorities="android.photopicker.cts.cloudproviders.cloud_primary" 75 android:authorities="android.photopicker.cts.cloudproviders.cloud_secondary" 84 android:authorities="android.photopicker.cts.cloudproviders.cloud_no_permission" 92 android:authorities="android.photopicker.cts.cloudproviders.cloud_no_intent_filter"
|
/aosp_15_r20/packages/providers/ContactsProvider/ |
D | AndroidManifest.xml | 51 android:authorities="contacts;com.android.contacts" 72 android:authorities="call_log" 83 android:authorities="call_composer_locations" 91 android:authorities="call_log_shadow" 103 android:authorities="com.android.voicemail" 150 android:authorities="com.android.contacts.dumpfile"
|
/aosp_15_r20/packages/modules/AdServices/sdksandbox/tests/testutils/device-side/android/app/sdksandbox/testutils/ |
D | ProtoUtil.java | 37 /** Encode authorities for ContentProvider Allowlist */ 39 ArrayMap<Integer, List<String>> authorities) { in encodeContentProviderAllowlist() argument 43 authorities.entrySet().stream() in encodeContentProviderAllowlist() 60 /** Encode authorities for ContentProvider Allowlist */ 61 public static String encodeContentProviderAllowlist(ArraySet<String> authorities) { in encodeContentProviderAllowlist() argument 63 AllowedContentProviders.newBuilder().addAllAuthorities(authorities).build(); in encodeContentProviderAllowlist()
|
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/third_party/xds/proposals/ |
D | TP1-xds-transport-next.md | 102 multiple authorities. Other features of federation include delegation of 131 message). This conflation makes it challenging to use multiple authorities today 460 authorities for which the `ConfigSource` may be used: 470 repeated Authority authorities = N; 484 // List of authorities and config. 490 expected that relevant authorities are configured in the bootstrap for referenceable servers. 547 authorities: 585 authorities: 663 authorities: 714 authorities: [all …]
|