/cts/tests/tests/content/BinderPermissionTestService/aidl/com/android/cts/ |
IBinderPermissionTestService.aidl | 19 // Methods that, when called, invoke one of the permission check methods 21 void doEnforceCallingPermission(String permission); 22 int doCheckCallingPermission(String permission); 23 void doEnforceCallingOrSelfPermission(String permission); 24 int doCheckCallingOrSelfPermission(String permission);
|
/cts/tests/tests/permission/src/android/permission/cts/ |
ServicePermissionTest.java | 17 package android.permission.cts; 29 * permission is only ever granted to the core system (typically 38 android.Manifest.permission.ACCOUNT_MANAGER, 39 android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE, 40 android.Manifest.permission.BIND_AUTOFILL_SERVICE, 41 android.Manifest.permission.BIND_CHOOSER_TARGET_SERVICE, 42 android.Manifest.permission.BIND_CONDITION_PROVIDER_SERVICE, 43 // android.Manifest.permission.BIND_DEVICE_ADMIN, 44 android.Manifest.permission.BIND_DREAM_SERVICE, 45 android.Manifest.permission.BIND_INPUT_METHOD [all...] |
SplitPermissionsSystemTest.java | 17 package android.permission.cts; 19 import static android.Manifest.permission.ACCESS_BACKGROUND_LOCATION; 20 import static android.Manifest.permission.ACCESS_COARSE_LOCATION; 21 import static android.Manifest.permission.ACCESS_FINE_LOCATION; 22 import static android.Manifest.permission.READ_CALL_LOG; 23 import static android.Manifest.permission.READ_CONTACTS; 24 import static android.Manifest.permission.READ_EXTERNAL_STORAGE; 25 import static android.Manifest.permission.WRITE_CALL_LOG; 26 import static android.Manifest.permission.WRITE_CONTACTS; 27 import static android.Manifest.permission.WRITE_EXTERNAL_STORAGE [all...] |
BackgroundPermissionsTest.java | 17 package android.permission.cts; 19 import static android.Manifest.permission.ACCESS_BACKGROUND_LOCATION; 20 import static android.Manifest.permission.ACCESS_COARSE_LOCATION; 21 import static android.Manifest.permission.ACCESS_FINE_LOCATION; 26 import static android.permission.cts.PermissionUtils.eventually; 27 import static android.permission.cts.PermissionUtils.getAppOp; 28 import static android.permission.cts.PermissionUtils.grantPermission; 29 import static android.permission.cts.PermissionUtils.install; 30 import static android.permission.cts.PermissionUtils.uninstallApp; 60 private static final String APP_PKG = "android.permission.cts.appthatrequestpermission" 87 PermissionInfo permission = pkg.permissions[i]; local 96 PermissionInfo permission = pkg.permissions[i]; local [all...] |
SharedUidPermissionsTest.java | 17 package android.permission.cts; 19 import static android.Manifest.permission.INTERNET; 20 import static android.Manifest.permission.READ_CONTACTS; 21 import static android.permission.cts.PermissionUtils.grantPermission; 22 import static android.permission.cts.PermissionUtils.install; 23 import static android.permission.cts.PermissionUtils.isPermissionGranted; 24 import static android.permission.cts.PermissionUtils.revokePermission; 25 import static android.permission.cts.PermissionUtils.uninstallApp; 44 "android.permission.cts.appthatrequestpermission"; 46 "android.permission.cts.appthatrequestnopermission" [all...] |
ShellPermissionTest.java | 17 package android.permission.cts; 49 "android.permission.MANAGE_USERS", 73 for (String permission : packageInfo.requestedPermissions) { 74 Log.d(LOG_TAG, "SHELL as " + pkg + " uses permission " + permission); 75 assertFalse("SHELL as " + pkg + " contains the illegal permission " + permission, 76 blacklist.contains(permission));
|
/cts/tests/tests/content/BinderPermissionTestService/src/com/android/cts/ |
BinderPermissionTestService.java | 36 public void doEnforceCallingPermission(String permission) { 37 enforceCallingPermission(permission, TEST_NOT_ALLOWED_MESSAGE); 41 public int doCheckCallingPermission(String permission) { 42 return checkCallingPermission(permission); 46 public void doEnforceCallingOrSelfPermission(String permission) { 47 enforceCallingOrSelfPermission(permission, TEST_NOT_ALLOWED_MESSAGE); 51 public int doCheckCallingOrSelfPermission(String permission) { 52 return checkCallingOrSelfPermission(permission);
|
/developers/build/prebuilts/gradle/Camera2Video/kotlinApp/Application/src/main/java/com/example/android/camera2video/ |
Constants.kt | 24 val VIDEO_PERMISSIONS = arrayOf(Manifest.permission.CAMERA, Manifest.permission.RECORD_AUDIO
|
/developers/samples/android/media/Camera2Video/kotlinApp/Application/src/main/java/com/example/android/camera2video/ |
Constants.kt | 24 val VIDEO_PERMISSIONS = arrayOf(Manifest.permission.CAMERA, Manifest.permission.RECORD_AUDIO
|
/developers/build/prebuilts/gradle/RuntimePermissions/kotlinApp/app/src/main/java/com/example/android/system/runtimepermissions/extensions/ |
AppCompatActivityExts.kt | 22 fun AppCompatActivity.isPermissionGranted(permission: String) = 23 ActivityCompat.checkSelfPermission(this, permission) == PackageManager.PERMISSION_GRANTED 25 fun AppCompatActivity.shouldShowPermissionRationale(permission: String) = 26 ActivityCompat.shouldShowRequestPermissionRationale(this, permission) 28 fun AppCompatActivity.requestPermission(permission: String, requestId: Int) = 29 ActivityCompat.requestPermissions(this, arrayOf(permission), requestId)
|
/developers/samples/android/system/RuntimePermissions/kotlinApp/app/src/main/java/com/example/android/system/runtimepermissions/extensions/ |
AppCompatActivityExts.kt | 22 fun AppCompatActivity.isPermissionGranted(permission: String) = 23 ActivityCompat.checkSelfPermission(this, permission) == PackageManager.PERMISSION_GRANTED 25 fun AppCompatActivity.shouldShowPermissionRationale(permission: String) = 26 ActivityCompat.shouldShowRequestPermissionRationale(this, permission) 28 fun AppCompatActivity.requestPermission(permission: String, requestId: Int) = 29 ActivityCompat.requestPermissions(this, arrayOf(permission), requestId)
|
/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp23/src/com/android/cts/usepermission/ |
UsePermissionTest23.java | 41 * Runtime permission behavior tests for apps targeting API 23 70 // New permission model is denied by default 76 grantPermission(Manifest.permission.READ_CALENDAR); 80 .checkSelfPermission(Manifest.permission.READ_CALENDAR)); 82 .checkSelfPermission(Manifest.permission.WRITE_CALENDAR)); 91 // Start out without permission 93 .checkSelfPermission(Manifest.permission.READ_CALENDAR)); 95 .checkSelfPermission(Manifest.permission.WRITE_CALENDAR)); 109 Manifest.permission.READ_CALENDAR, 110 Manifest.permission.WRITE_CALENDAR} [all...] |
BasePermissionsTest.java | 118 Manifest.permission.READ_CONTACTS, "@android:string/permgrouplab_contacts"); 120 Manifest.permission.WRITE_CONTACTS, "@android:string/permgrouplab_contacts"); 123 Manifest.permission.READ_CALENDAR, "@android:string/permgrouplab_calendar"); 125 Manifest.permission.WRITE_CALENDAR, "@android:string/permgrouplab_calendar"); 128 Manifest.permission.SEND_SMS, "@android:string/permgrouplab_sms"); 130 Manifest.permission.RECEIVE_SMS, "@android:string/permgrouplab_sms"); 132 Manifest.permission.READ_SMS, "@android:string/permgrouplab_sms"); 134 Manifest.permission.RECEIVE_WAP_PUSH, "@android:string/permgrouplab_sms"); 136 Manifest.permission.RECEIVE_MMS, "@android:string/permgrouplab_sms"); 138 "android.permission.READ_CELL_BROADCASTS", "@android:string/permgrouplab_sms") [all...] |
/external/robolectric-shadows/robolectric/src/test/java/org/robolectric/ |
Manifest.java | 11 public static final class permission { class in class:Manifest
|
/developers/build/prebuilts/gradle/RuntimePermissionsBasic/kotlinApp/Application/src/main/java/com/example/android/basicpermissions/util/ |
AppCompatActivityExt.kt | 22 fun AppCompatActivity.checkSelfPermissionCompat(permission: String) = 23 ActivityCompat.checkSelfPermission(this, permission) 25 fun AppCompatActivity.shouldShowRequestPermissionRationaleCompat(permission: String) = 26 ActivityCompat.shouldShowRequestPermissionRationale(this, permission)
|
/developers/samples/android/system/RuntimePermissionsBasic/kotlinApp/Application/src/main/java/com/example/android/basicpermissions/util/ |
AppCompatActivityExt.kt | 22 fun AppCompatActivity.checkSelfPermissionCompat(permission: String) = 23 ActivityCompat.checkSelfPermission(this, permission) 25 fun AppCompatActivity.shouldShowRequestPermissionRationaleCompat(permission: String) = 26 ActivityCompat.shouldShowRequestPermissionRationale(this, permission)
|
/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp22/src/com/android/cts/usepermission/ |
UsePermissionTest22.java | 36 * Runtime permission behavior tests for apps targeting API 22 45 // Legacy permission model appears granted 47 mContext.checkPermission(android.Manifest.permission.READ_CALENDAR, 50 mContext.checkPermission(android.Manifest.permission.WRITE_CALENDAR, 62 // Revoke the permission 63 revokePermissions(new String[] {Manifest.permission.WRITE_CALENDAR}, true); 68 // Legacy permission model appears granted 70 mContext.checkPermission(android.Manifest.permission.READ_CALENDAR, 73 mContext.checkPermission(android.Manifest.permission.WRITE_CALENDAR, 86 .checkSelfPermission(Manifest.permission.SEND_SMS)) [all...] |
/cts/tests/tests/permission/permissionTestUtilLib/src/android/permission/cts/ |
PermissionUtils.java | 17 package android.permission.cts; 19 import static android.Manifest.permission.ACCESS_BACKGROUND_LOCATION; 20 import static android.Manifest.permission.ACCESS_COARSE_LOCATION; 54 * Common utils for permission tests 76 * @param permission The permission the app-op belongs to 80 public static int getAppOp(@NonNull String packageName, @NonNull String permission) 84 permissionToOp(permission), 107 * Set a new state for an app-op (using the permission-name) 110 * @param permission The permission the app-op belongs t [all...] |
/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp26/src/com/android/cts/usepermission/ |
UsePermissionTest26.java | 27 * Runtime permission behavior tests for apps targeting API 26 34 // Start out without permission 36 .checkSelfPermission(Manifest.permission.RECEIVE_SMS)); 38 .checkSelfPermission(Manifest.permission.SEND_SMS)); 40 String[] permissions = new String[]{Manifest.permission.RECEIVE_SMS}; 42 // request only one permission from the 'SMS' permission group at runtime, 43 // but two from this group are <uses-permission> in the manifest 44 // request only one permission from the 'contacts' permission grou [all...] |
/cts/tests/tests/permission/AppThatRequestPermissionAandB/src/android/permission/cts/appthatrequestpermission/ |
RequestPermission.java | 17 package android.permission.cts.appthatrequestpermission; 27 requestPermissions(new String[] {"android.permission.cts.appthatrequestpermission.A", 28 "android.permission.cts.B"}, 0);
|
/cts/tests/tests/permission/AppThatRequestPermissionAandC/src/android/permission/cts/appthatrequestpermission/ |
RequestPermission.java | 17 package android.permission.cts.appthatrequestpermission; 27 requestPermissions(new String[] {"android.permission.cts.appthatrequestpermission.A", 28 "android.permission.cts.C"}, 0);
|
/cts/tests/tests/permission2/src/android/permission2/cts/ |
RestrictedPermissionsTest.java | 19 import static android.Manifest.permission.READ_SMS; 20 import static android.permission.cts.PermissionUtils.eventually; 21 import static android.permission.cts.PermissionUtils.isGranted; 22 import static android.permission.cts.PermissionUtils.isPermissionGranted; 31 import android.Manifest.permission; 45 import android.permission.cts.PermissionUtils.ThrowingRunnable; 70 * Tests for restricted permission behaviors. 145 // All restricted permission should be whitelisted. 148 // No restricted permission should be granted. 157 whitelistedPermissions.add(Manifest.permission.SEND_SMS) 1020 final String permission = packageInfo.requestedPermissions[i]; local 1043 final String permission = packageInfo.requestedPermissions[i]; local [all...] |
/cts/hostsidetests/appsecurity/test-apps/EscalateToRuntimePermissions/src/com/android/cts/escalatepermission/ |
PermissionEscalationTest.java | 27 import com.android.cts.escalate.permission.Manifest; 38 // Ensure normal permission cannot be made dangerous 40 .getPermissionInfo(Manifest.permission.STEAL_AUDIO1, 0); 41 assertSame("Shouldn't be able to change normal permission to dangerous", 45 // Ensure signature permission cannot be made dangerous 47 .getPermissionInfo(Manifest.permission.STEAL_AUDIO2, 0); 48 assertSame("Shouldn't be able to change signature permission to dangerous",
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/ |
CryptoServicesPermission.java | 3 import java.security.Permission; 11 extends Permission 14 * Enable the setting of global configuration properties. This permission implies THREAD_LOCAL_CONFIG 37 public boolean implies(Permission permission) 39 if (permission instanceof CryptoServicesPermission) 41 CryptoServicesPermission other = (CryptoServicesPermission)permission;
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/crypto/ |
CryptoServicesPermission.java | 4 import java.security.Permission; 13 extends Permission 16 * Enable the setting of global configuration properties. This permission implies THREAD_LOCAL_CONFIG 39 public boolean implies(Permission permission) 41 if (permission instanceof CryptoServicesPermission) 43 CryptoServicesPermission other = (CryptoServicesPermission)permission;
|