/packages/apps/Bluetooth/ |
AndroidManifest_test.xml | 6 <permission android:name="android.permission.ACCESS_BLUETOOTH_SHARE" 10 <uses-permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" /> 11 <uses-permission android:name="android.permission.ACCESS_BLUETOOTH_SHARE" /> 12 <uses-permission android:name="android.permission.INTERNET" /> 13 <uses-permission android:name="android.permission.BLUETOOTH" / [all...] |
/packages/screensavers/PhotoTable/ |
AndroidManifest.xml | 5 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" /> 6 <uses-permission android:name="android.permission.READ_EXTERNAL_STORAGE" /> 7 <uses-permission android:name="android.permission.WAKE_LOCK" /> 8 <uses-permission android:name="com.google.android.gallery3d.permission.PICASA_STORE" /> 18 android:permission="android.permission.BIND_DREAM_SERVICE [all...] |
/cts/tests/tests/os/ |
AndroidManifest.xml | 21 <permission android:name="android.os.cts.permission.TEST_GRANTED" 31 </permission> 33 <uses-permission android:name="android.permission.DISABLE_KEYGUARD" /> 34 <uses-permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" /> 35 <uses-permission android:name="android.permission.INTERNET" /> 36 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" / [all...] |
/packages/apps/Dialer/ |
AndroidManifest.xml | 27 <uses-permission android:name="android.permission.CALL_PHONE" /> 28 <uses-permission android:name="android.permission.READ_CONTACTS" /> 29 <uses-permission android:name="android.permission.WRITE_CONTACTS" /> 30 <uses-permission android:name="android.permission.READ_CALL_LOG" /> 31 <uses-permission android:name="android.permission.WRITE_CALL_LOG" / [all...] |
/system/netd/server/ |
PhysicalNetwork.cpp | 27 Permission permission, PhysicalNetwork::Delegate* delegate) { 28 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) { 32 if (int ret = delegate->addFallthrough(interface, permission)) { 39 Permission permission, 42 permission)) { 46 if (int ret = delegate->removeFallthrough(interface, permission)) { 64 Permission PhysicalNetwork::getPermission() const { 68 int PhysicalNetwork::setPermission(Permission permission) [all...] |
/cts/hostsidetests/devicepolicy/app/ManagedProfile/ |
AndroidManifest.xml | 21 <uses-permission android:name="android.permission.ACCESS_WIFI_STATE" /> 22 <uses-permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" /> 23 <uses-permission android:name="android.permission.BLUETOOTH" /> 24 <uses-permission android:name="android.permission.BLUETOOTH_ADMIN" /> 25 <uses-permission android:name="android.permission.READ_CONTACTS" / [all...] |
/frameworks/base/core/java/android/test/ |
AndroidTestCase.java | 88 * Asserts that launching a given activity is protected by a particular permission by 90 * is thrown that mentions the permission in its error message. 97 * @param permission The name of the permission. 100 String packageName, String className, String permission) { 107 fail("expected security exception for " + permission); 110 assertTrue("error message should contain " + permission + ".", 111 expected.getMessage().contains(permission)); 117 * Asserts that reading from the content uri requires a particular permission by querying the 118 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission [all...] |
/frameworks/base/tools/aapt2/java/ |
ManifestClassGenerator_test.cpp | 46 <permission android:name="android.permission.ACCESS_INTERNET" /> 47 <permission android:name="android.DO_DANGEROUS_THINGS" /> 48 <permission android:name="com.test.sample.permission.HUH" /> 49 <permission-group android:name="foo.bar.PERMISSION" /> 55 const size_t permissionClassPos = actual.find("public static final class permission {"); 62 // Make sure these permissions are in the permission class. 66 "\"android.permission.ACCESS_INTERNET\";") [all...] |
/libcore/ojluni/src/main/java/java/security/acl/ |
AclEntry.java | 83 * principal (e.g., a user or a group) will be denied the permission set 102 * Adds the specified permission to this ACL entry. Note: An entry can 105 * @param permission the permission to be associated with 108 * @return true if the permission was added, false if the 109 * permission was already part of this entry's permission set. 111 public boolean addPermission(Permission permission); 114 * Removes the specified permission from this ACL entry [all...] |
/packages/apps/CellBroadcastReceiver/ |
AndroidManifest.xml | 24 <uses-permission android:name="android.permission.RECEIVE_SMS" /> 25 <uses-permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" /> 26 <uses-permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" /> 27 <uses-permission android:name="android.permission.MODIFY_PHONE_STATE" /> 28 <uses-permission android:name="android.permission.WAKE_LOCK" / [all...] |
/packages/apps/Launcher3/ |
AndroidManifest.xml | 25 <permission 26 android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 27 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 31 <permission 32 android:name="com.android.launcher3.permission.READ_SETTINGS" 33 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 37 <permission 38 android:name="com.android.launcher3.permission.WRITE_SETTINGS" 39 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 43 <permission [all...] |
/cts/tools/cts-holo-generation/ |
AndroidManifest.xml | 6 <uses-permission android:name="android.permission.DISABLE_KEYGUARD" /> 7 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" />
|
/device/sample/apps/LeanbackCustomizer/ |
AndroidManifest.xml | 9 <uses-permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" /> 10 <uses-permission android:name="android.permission.INTERNET" />
|
/device/sample/apps/SetupCustomizer/ |
AndroidManifest.xml | 5 <uses-permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" /> 6 <uses-permission android:name="android.permission.INTERNET" />
|
/external/glide/library/src/main/java/com/bumptech/glide/manager/ |
ConnectivityMonitorFactory.java | 8 * has the {@code android.permission.ACCESS_NETWORK_STATE} permission and a no-op non functional 9 * {@link com.bumptech.glide.manager.ConnectivityMonitor} if the app does not have the required permission. 13 final int res = context.checkCallingOrSelfPermission("android.permission.ACCESS_NETWORK_STATE");
|
/external/valgrind/none/tests/darwin/ |
access_extended.stderr.exp | 3 access_extended.c(X_OK) = 13 (Permission denied)
|
/frameworks/base/core/java/android/hardware/location/ |
GeofenceHardwareService.java | 80 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 81 "Location Hardware permission not granted to access hardware geofence"); 88 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 89 "Location Hardware permission not granted to access hardware geofence"); 99 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 100 "Location Hardware permission not granted to access hardware geofence"); 107 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 108 "Location Hardware permission not granted to access hardware geofence"); 116 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 117 "Location Hardware permission not granted to access hardware geofence") [all...] |
/frameworks/base/docs/html/training/permissions/ |
declaring.jd | 38 the appropriate <i>permission.</i> You declare that your app needs a 39 permission by listing the permission in the <a href= 44 Depending on how sensitive the permission is, the system might grant the 45 permission automatically, or the device user might have to grant 46 the request. For example, if your app requests permission to turn on the 47 device's flashlight, the system grants that permission automatically. But 49 to approve that permission. Depending on the platform version, the user 50 grants the permission either when they install the app (on Android 5.1 and 58 that require a permission. Typically, an app is going to need permission [all...] |
/frameworks/base/packages/DocumentsUI/tests/ |
AndroidManifest.xml | 5 <uses-permission android:name="android.permission.INTERNET" /> 14 android:permission="android.permission.MANAGE_DOCUMENTS"
|
/frameworks/base/tests/SoundTriggerTestApp/ |
AndroidManifest.xml | 4 <uses-permission android:name="android.permission.MANAGE_SOUND_TRIGGER" /> 5 <uses-permission android:name="android.permission.WAKE_LOCK" />
|
/frameworks/base/tests/VoiceEnrollment/ |
AndroidManifest.xml | 4 <uses-permission android:name="android.permission.MANAGE_VOICE_KEYPHRASES" /> 6 android:permission="android.permission.MANAGE_VOICE_KEYPHRASES">
|
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
PmPermissionsTests.java | 17 package com.android.framework.permission.tests; 29 private String mPkgName = "com.android.framework.permission.tests"; 38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission 39 * android.permission.GET_PACKAGE_SIZE 53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission 54 * android.permission.DELETE_CACHE_FILES 68 * This test verifies that PackageManger.installPackage enforces permission 69 * android.permission.INSTALL_PACKAGES 88 * enforces permission android.permission.CLEAR_APP_CACH [all...] |
/packages/apps/SpeechRecorder/ |
AndroidManifest.xml | 5 <uses-permission android:name="android.permission.RECORD_AUDIO"/> 6 <uses-permission android:name="android.permission.MODIFY_AUDIO_SETTINGS"/>
|
/packages/experimental/PermissionApp/ |
Android.mk | 9 LOCAL_PACKAGE_NAME := Permission
|
/packages/experimental/PermissionApp2/ |
AndroidManifest.xml | 8 <uses-permission android:name="android.permission.READ_CONTACTS" /> 9 <uses-permission android:name="android.permission.READ_CALENDAR" />
|