/cts/tests/tests/permission/src/android/permission/cts/ |
ProviderPermissionTest.java | 17 package android.permission.cts; 19 import static android.Manifest.permission.WRITE_EXTERNAL_STORAGE; 20 import static android.Manifest.permission.WRITE_MEDIA_STORAGE; 69 * <p>Tests Permission: 70 * {@link android.Manifest.permission#READ_CONTACTS} 76 android.Manifest.permission.READ_CONTACTS); 82 * <p>Tests Permission: 83 * {@link android.Manifest.permission#WRITE_CONTACTS} 87 android.Manifest.permission.WRITE_CONTACTS); 92 * <p>Tests Permission 174 final String permission = android.Manifest.permission.WRITE_SETTINGS; local [all...] |
RebootPermissionTest.java | 17 package android.permission.cts; 25 * Verify that rebooting requires Permission. 35 * Verify that rebooting by sending a broadcast Intent requires Permission. 36 * <p>Requires Permission: 37 * {@link android.Manifest.permission#REBOOT}.
|
MainlineNetworkStackPermissionTest.java | 17 package android.permission.cts; 41 * Test that a package defining android.permission.MAINLINE_NETWORK_STACK is installed, 52 assertNotNull("Network stack permission is not defined.", permissioninfo); 56 assertNotNull("Package defining the network stack permission is not a system package.", 59 for (PermissionInfo permission : packageInfo.permissions) { 60 if (PERMISSION_MAINLINE_NETWORK_STACK.equals(permission.name)) {
|
PermissionFlagsTest.java | 17 package android.permission.cts; 19 import static android.Manifest.permission.ACCESS_BACKGROUND_LOCATION; 20 import static android.Manifest.permission.ACCESS_COARSE_LOCATION; 21 import static android.Manifest.permission.READ_CALL_LOG; 22 import static android.Manifest.permission.READ_CONTACTS; 28 import static android.permission.cts.PermissionUtils.clearAppState; 29 import static android.permission.cts.PermissionUtils.eventually; 30 import static android.permission.cts.PermissionUtils.getPermissionFlags; 31 import static android.permission.cts.PermissionUtils.install; 32 import static android.permission.cts.PermissionUtils.isGranted [all...] |
SplitPermissionTest.java | 17 package android.permission.cts; 19 import static android.Manifest.permission.ACCESS_BACKGROUND_LOCATION; 20 import static android.Manifest.permission.ACCESS_COARSE_LOCATION; 21 import static android.Manifest.permission.READ_CALL_LOG; 22 import static android.Manifest.permission.READ_CONTACTS; 27 import static android.permission.cts.PermissionUtils.getAppOp; 28 import static android.permission.cts.PermissionUtils.getPermissionFlags; 29 import static android.permission.cts.PermissionUtils.getPermissions; 30 import static android.permission.cts.PermissionUtils.grantPermission; 31 import static android.permission.cts.PermissionUtils.isGranted [all...] |
AppWidgetManagerPermissionTest.java | 17 package android.permission.cts; 42 * <p>Tests Permission: 43 * {@link android.Manifest.permission#BIND_APP_WIDGET}.
|
ConnectivityManagerPermissionTest.java | 17 package android.permission.cts; 44 * <p>Tests Permission: 45 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
|
/cts/tests/tests/display/src/android/display/cts/ |
BrightnessTest.java | 85 revokePermission(Manifest.permission.CONFIGURE_DISPLAY_BRIGHTNESS); 86 revokePermission(Manifest.permission.BRIGHTNESS_SLIDER_USAGE); 91 if (numberOfSystemAppsWithPermission(Manifest.permission.BRIGHTNESS_SLIDER_USAGE) == 0) { 92 // Don't run as there is no app that has permission to access slider usage. 105 grantPermission(Manifest.permission.BRIGHTNESS_SLIDER_USAGE); 142 if (numberOfSystemAppsWithPermission(Manifest.permission.BRIGHTNESS_SLIDER_USAGE) == 0) { 143 // Don't run as there is no app that has permission to access slider usage. 155 grantPermission(Manifest.permission.BRIGHTNESS_SLIDER_USAGE); 175 revokePermission(Manifest.permission.BRIGHTNESS_SLIDER_USAGE); 188 revokePermission(Manifest.permission.CONFIGURE_DISPLAY_BRIGHTNESS) 414 .grantRuntimePermission(mContext.getPackageName(), permission); local 419 .revokeRuntimePermission(mContext.getPackageName(), permission); local [all...] |
/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp22/src/com/android/cts/usepermission/ |
PermissionCheckerService.java | 27 * A service that can check if a permission is currently granted 51 String permission = bundle.getString(getPackageName() + ".PERMISSION"); local 53 result.send(checkSelfPermission(permission), null);
|
/external/curl/docs/cmdline-opts/ |
delegation.d | 3 Help: GSS-API delegation permission
|
/developers/build/prebuilts/gradle/AutofillFramework/afservice/src/main/java/com/example/android/autofill/service/data/source/ |
DalService.java | 28 @Query("relation") String permission,
|
/developers/samples/android/input/autofill/AutofillFramework/afservice/src/main/java/com/example/android/autofill/service/data/source/ |
DalService.java | 28 @Query("relation") String permission,
|
/developers/build/prebuilts/gradle/WifiRttScan/Application/src/main/java/com/example/android/wifirttscan/ |
LocationPermissionRequestActivity.java | 19 import android.Manifest.permission; 30 * fine location permissions. If they choose to move forward, the permission screen is brought up. 39 /* Id to identify Location permission request. */ 47 if (ActivityCompat.checkSelfPermission(this, permission.ACCESS_FINE_LOCATION) 58 // On 23+ (M+) devices, fine location permission not granted. Request permission. 61 new String[] {Manifest.permission.ACCESS_FINE_LOCATION},
|
/developers/samples/android/connectivity/wifirtt/WifiRttScan/Application/src/main/java/com/example/android/wifirttscan/ |
LocationPermissionRequestActivity.java | 19 import android.Manifest.permission; 30 * fine location permissions. If they choose to move forward, the permission screen is brought up. 39 /* Id to identify Location permission request. */ 47 if (ActivityCompat.checkSelfPermission(this, permission.ACCESS_FINE_LOCATION) 58 // On 23+ (M+) devices, fine location permission not granted. Request permission. 61 new String[] {Manifest.permission.ACCESS_FINE_LOCATION},
|
/external/autotest/frontend/afe/ |
management.py | 25 PermissionModel = auth.models.Permission 35 print ' No permission ' + codename 37 for permission in permissions: 38 if permission not in have_permissions: 40 print ' Adding permission ' + codename 41 admin_group.permissions.add(permission)
|
/cts/tests/backup/src/android/backup/cts/ |
PermissionTest.java | 19 import static android.Manifest.permission.ACCESS_BACKGROUND_LOCATION; 20 import static android.Manifest.permission.ACCESS_FINE_LOCATION; 21 import static android.Manifest.permission.READ_CONTACTS; 22 import static android.Manifest.permission.WRITE_CONTACTS; 54 * @see com.android.packageinstaller.permission.service.BackupHelper 60 private static final String APP = "android.backup.permission"; 93 * Test backup and restore of regular runtime permission. 109 * Test backup and restore of pre-M regular runtime permission. 125 * Test backup and restore of foreground runtime permission. 151 * Test backup and restore of foreground runtime permission [all...] |
/developers/build/prebuilts/gradle/RuntimePermissions/kotlinApp/app/src/main/java/com/example/android/system/runtimepermissions/ |
MainActivity.kt | 42 * This Activity requests permissions to access the camera ([android.Manifest.permission.CAMERA]) 44 * Contacts permissions (([android.Manifest.permission.READ_CONTACTS] and ([ ][android.Manifest.permission.WRITE_CONTACTS])) are requested when the 'Show and Add Contacts' 71 * Now, if a permission has been disable by the system through the application settings, disabled 96 Log.i(TAG, "Show camera button pressed. Checking permission.") 97 // Check if the Camera permission is already available. 98 if (!isPermissionGranted(Manifest.permission.CAMERA)) { 99 // Camera permission has not been granted. 104 "CAMERA permission has already been granted. Displaying camera preview.") 110 * Requests the Camera permission [all...] |
/developers/samples/android/system/RuntimePermissions/kotlinApp/app/src/main/java/com/example/android/system/runtimepermissions/ |
MainActivity.kt | 42 * This Activity requests permissions to access the camera ([android.Manifest.permission.CAMERA]) 44 * Contacts permissions (([android.Manifest.permission.READ_CONTACTS] and ([ ][android.Manifest.permission.WRITE_CONTACTS])) are requested when the 'Show and Add Contacts' 71 * Now, if a permission has been disable by the system through the application settings, disabled 96 Log.i(TAG, "Show camera button pressed. Checking permission.") 97 // Check if the Camera permission is already available. 98 if (!isPermissionGranted(Manifest.permission.CAMERA)) { 99 // Camera permission has not been granted. 104 "CAMERA permission has already been granted. Displaying camera preview.") 110 * Requests the Camera permission [all...] |
/developers/build/prebuilts/gradle/RuntimePermissions/Application/src/main/java/com/example/android/system/runtimepermissions/ |
MainActivity.java | 40 * This Activity requests permissions to access the camera ({@link android.Manifest.permission#CAMERA}) 42 * Contacts permissions (({@link android.Manifest.permission#READ_CONTACTS} and ({@link 43 * android.Manifest.permission#WRITE_CONTACTS})) are requested when the 'Show and Add Contacts' 69 * Now, if a permission has been disable by the system through the application settings, disabled 82 * Id to identify a camera permission request. 87 * Id to identify a contacts permission request. 94 private static String[] PERMISSIONS_CONTACT = {Manifest.permission.READ_CONTACTS, 95 Manifest.permission.WRITE_CONTACTS}; 107 Log.i(TAG, "Show camera button pressed. Checking permission."); 109 // Check if the Camera permission is already available [all...] |
/developers/samples/android/system/RuntimePermissions/Application/src/main/java/com/example/android/system/runtimepermissions/ |
MainActivity.java | 40 * This Activity requests permissions to access the camera ({@link android.Manifest.permission#CAMERA}) 42 * Contacts permissions (({@link android.Manifest.permission#READ_CONTACTS} and ({@link 43 * android.Manifest.permission#WRITE_CONTACTS})) are requested when the 'Show and Add Contacts' 69 * Now, if a permission has been disable by the system through the application settings, disabled 82 * Id to identify a camera permission request. 87 * Id to identify a contacts permission request. 94 private static String[] PERMISSIONS_CONTACT = {Manifest.permission.READ_CONTACTS, 95 Manifest.permission.WRITE_CONTACTS}; 107 Log.i(TAG, "Show camera button pressed. Checking permission."); 109 // Check if the Camera permission is already available [all...] |
/development/samples/browseable/RuntimePermissions/src/com.example.android.system.runtimepermissions/ |
MainActivity.java | 47 * This Activity requests permissions to access the camera ({@link android.Manifest.permission#CAMERA}) 49 * Contacts permissions (({@link android.Manifest.permission#READ_CONTACTS} and ({@link 50 * android.Manifest.permission#WRITE_CONTACTS})) are requested when the 'Show and Add Contacts' 76 * Now, if a permission has been disable by the system through the application settings, disabled 89 * Id to identify a camera permission request. 94 * Id to identify a contacts permission request. 101 private static String[] PERMISSIONS_CONTACT = {Manifest.permission.READ_CONTACTS, 102 Manifest.permission.WRITE_CONTACTS}; 117 Log.i(TAG, "Show camera button pressed. Checking permission."); 119 // Check if the Camera permission is already available [all...] |
/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp29/src/com/android/cts/usepermission/ |
UsePermissionTest29.java | 19 import static android.Manifest.permission.ACCESS_BACKGROUND_LOCATION; 20 import static android.Manifest.permission.ACCESS_FINE_LOCATION; 30 * Runtime permission behavior tests for apps targeting {@link android.os.Build.VERSION_CODES#Q}. 39 private static void assertGranted(String permission) { 41 .checkSelfPermission(permission)); 44 private static void assertDenied(String permission) { 46 .checkSelfPermission(permission));
|
/external/robolectric-shadows/robolectric/src/test/java/org/robolectric/shadows/ |
LegacyManifestParserTest.java | 7 import android.content.pm.PackageParser.Permission; 69 private PermissionInfo getPermissionInfo(List<Permission> permissions, String name) { 71 for (Permission permission : permissions) { 72 if (name.equals(permission.info.name)) { 73 return permission.info;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/sensors/ |
StepSensorPermissionTestActivity.java | 100 // Verify that sensors cannot be registered when the permission is not granted 110 // Verify that the sensors can be registered when the permission is not granted 118 if (hasPermission(Manifest.permission.ACTIVITY_RECOGNITION) != permissionGranted) { 123 checkPermission(Manifest.permission.ACTIVITY_RECOGNITION, permissionGranted); 149 private boolean hasPermission(String permission) { 150 return getApplicationContext().checkSelfPermission(permission) == 154 private void checkPermission(String permission, boolean expected) { 155 if (expected && !hasPermission(permission)) { 156 throw new AssertionError(String.format("Should not have '%s' permission", permission)); [all...] |
/cts/tests/netlegacy22.permission/src/android/net/cts/legacy/api22/permission/ |
ConnectivityManagerPermissionTest.java | 17 package android.net.cts.legacy.api22.permission; 42 * <p>Tests Permission: 43 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE}.
|