HomeSort by relevance Sort by last modified time
    Searched full:permission (Results 226 - 250 of 36860) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /cts/hostsidetests/devicepolicy/app/DeviceOwner/
AndroidManifest.xml 22 <uses-permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" />
23 <uses-permission android:name="android.permission.WRITE_SETTINGS" />
24 <uses-permission android:name="android.permission.ACCESS_WIFI_STATE" />
25 <uses-permission android:name="android.permission.CHANGE_WIFI_STATE" />
26 <uses-permission android:name="android.permission.INTERACT_ACROSS_USERS" /
    [all...]
  /packages/apps/LegacyCamera/
AndroidManifest.xml 9 <uses-permission android:name="android.permission.CAMERA" />
13 <uses-permission android:name="android.permission.RECORD_AUDIO" />
14 <uses-permission android:name="android.permission.ACCESS_FINE_LOCATION"/>
15 <uses-permission android:name="android.permission.WAKE_LOCK" />
16 <uses-permission android:name="android.permission.SET_WALLPAPER" /
    [all...]
  /cts/hostsidetests/appsecurity/test-apps/UsePermissionDiffCert/
AndroidManifest.xml 20 <!-- We say we want to use the other app's permission, but it is signed with
22 <uses-permission android:name="com.android.cts.permissionWithSignature"/>
24 <!-- Request a normal permission, which should be granted. -->
25 <uses-permission android:name="com.android.cts.permissionNormal"/>
27 <!-- This is a permission we can have, which the other app can require for
29 <permission android:name="com.android.cts.permissionAllowedWithSignature"
31 <uses-permission android:name="com.android.cts.permissionAllowedWithSignature"/>
  /cts/tests/tests/permission/src/android/permission/cts/
NoKeyPermissionTest.java 17 package android.permission.cts;
40 * <p>Requires Permission:
41 * {@link android.Manifest.permission#DISABLE_KEYGUARD}.
56 * <p>Requires Permission:
57 * {@link android.Manifest.permission#DISABLE_KEYGUARD}.
72 * <p>Requires Permission:
73 * {@link android.Manifest.permission#DISABLE_KEYGUARD}.
NoAudioPermissionTest.java 17 package android.permission.cts;
40 * <p>Requires Permission:
41 * {@link android.Manifest.permission#MODIFY_AUDIO_SETTINGS}.
47 // If there is no permission of MODIFY_AUDIO_SETTINGS, setMicrophoneMute does nothing.
51 // If there is no permission of MODIFY_AUDIO_SETTINGS, setMode does nothing.
63 * <p>Requires Permission:
64 * {@link android.Manifest.permission#MODIFY_AUDIO_SETTINGS}.
70 // If there is no permission of MODIFY_AUDIO_SETTINGS, setSpeakerphoneOn does nothing.
75 // If there is no permission of MODIFY_AUDIO_SETTINGS, setBluetoothScoOn does nothing.
NoWakeLockPermissionTest.java 18 package android.permission.cts;
45 * <p>Requires Permission:
46 * {@link android.Manifest.permission#WAKE_LOCK}.
63 * <p>Requires Permission:
64 * {@link android.Manifest.permission#WAKE_LOCK}.
82 * <p>Requires Permission:
83 * {@link android.Manifest.permission#WAKE_LOCK}.
97 * <p>Requires Permission:
98 * {@link android.Manifest.permission#WAKE_LOCK}.
RebootPermissionTest.java 17 package android.permission.cts;
25 * Verify that rebooting requires Permission.
35 * Verify that rebooting by sending a broadcast Intent requires Permission.
36 * <p>Requires Permission:
37 * {@link android.Manifest.permission#REBOOT}.
  /frameworks/base/services/core/java/com/android/server/firewall/
SenderPermissionFilter.java 31 private SenderPermissionFilter(String permission) {
32 mPermission = permission;
45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") {
49 String permission = parser.getAttributeValue(null, ATTR_NAME);
50 if (permission == null) {
51 throw new XmlPullParserException("Permission name must be specified.",
54 return new SenderPermissionFilter(permission);
  /cts/tests/tests/permission2/res/raw/
android_manifest.xml 445 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" />
446 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" />
    [all...]
  /frameworks/base/core/res/
AndroidManifest.xml 445 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" />
446 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" />
    [all...]
  /packages/services/Car/service/res/values/
strings.xml 18 <!-- Permission text: can access your car's information [CHAR LIMIT=NONE] -->
20 <!-- Permission text: can access your car's information [CHAR LIMIT=NONE] -->
22 <!-- Permission text: apps can control car camera [CHAR LIMIT=NONE] -->
24 <!-- Permission text: apps can control car amera [CHAR LIMIT=NONE] -->
26 <!-- Permission text: can access your car's fuel level [CHAR LIMIT=NONE] -->
28 <!-- Permission text: can access your car's fuel level [CHAR LIMIT=NONE] -->
30 <!-- Permission text: apps can control car hvac [CHAR LIMIT=NONE] -->
32 <!-- Permission text: apps can control car hvac [CHAR LIMIT=NONE] -->
34 <!-- Permission text: can access your car's mileage information [CHAR LIMIT=NONE] -->
36 <!-- Permission text: can access your car's mileage information [CHAR LIMIT=NONE] --
    [all...]
  /packages/apps/Messaging/src/com/android/messaging/util/
OsUtil.java 188 * Check if the app has the specified permission. If it does not, the app needs to use
191 * any permission is revoked.
192 * @param permission A permission from {@link android.Manifest.permission}
194 public static boolean hasPermission(final String permission) {
197 // user revokes the permission setting. However, PERMISSION_DENIED should not be
198 // cached as the process does not get killed if the user enables the permission setting.
199 if (!sPermissions.containsKey(permission)
200 || sPermissions.get(permission) == PackageManager.PERMISSION_DENIED)
    [all...]
  /frameworks/base/docs/html/training/articles/
wear-permissions.jd 11 <li><a href="#scenarios">Permission Scenarios</a></li>
41 a user might grant a handset app permission to use location data, and subsequently
42 have to grant the same permission to the Wear version of the app.</p>
46 every permission an app may ever need. Instead, the app does not request permissions until it
57 <h2 id="scenarios">Permission Scenarios</h2>
72 <li>The wearable app uses a <em>different permission model</em> from its handset counterpart.
79 <h3 id="wear-app-wear-perm">Wear app requests permission for an app running on the wearable
82 <p>When the Wear app requests a permission for an app running on the wearable device, the system
83 displays a dialog to prompt the user for that permission. An app or service can only call the
87 a watch face, the service must open an activity before requesting the permission.</p
    [all...]
  /frameworks/base/docs/html/guide/topics/manifest/
permission-tree-element.jd 1 page.title=&lt;permission-tree&gt;
8 <dd><pre class="stx">&lt;permission-tree android:<a href="#icon">icon</a>="<i>drawable resource</i>"
28 Note that this element does not declare a permission itself, only a
30 <code><a href="{@docRoot}guide/topics/manifest/permission-element.html">&lt;permission&gt;</a></code>
48 <dd>The name that's at the base of the permission tree. It serves as
49 a prefix to all permission names in the tree. Java-style scoping should
61 <dd><code><a href="{@docRoot}guide/topics/manifest/permission-element.html">&lt;permission&gt;</a></code>
62 <br/><code><a href="{@docRoot}guide/topics/manifest/permission-group-element.html">&lt;permission-group&gt;</a></code
    [all...]
  /cts/apps/PermissionApp/src/com/android/cts/permission/permissionapp/
PermissionActivity.java 33 = "com.android.cts.permission.action.CHECK_HAS_PERMISSION";
35 = "com.android.cts.permission.action.REQUEST_PERMISSION";
37 = "com.android.cts.permission.action.PERMISSION_RESULT";
39 = "com.android.cts.permission.extra.PERMISSION";
41 = "com.android.cts.permission.extra.GRANT_STATE";
57 Log.d(TAG, "Requesting permission " + mPermission);
60 Log.d(TAG, "Checking permission " + mPermission);
77 Log.d(TAG, "Received valid permission result: " + grantResults[0]);
  /cts/tests/tests/permission2/src/android/permission2/cts/
NoCaptureAudioOutputPermissionTest.java 27 * Verify the capture system video output permission requirements.
32 * when the app does not have permission to capture audio output.
34 * record permission, just not the capture audio output permission.
35 * <p>Requires permission:
36 * {@link android.Manifest.permission#RECORD_AUDIO} and
37 * {@link android.Manifest.permission#CAPTURE_VIDEO_OUTPUT}.
56 // app does not have permission, but the object is not usable.
63 + "does not have permission to access the remote submix source",
  /cts/hostsidetests/appsecurity/test-apps/PermissionDeclareApp/
AndroidManifest.xml 20 An app that declares a permission that requires a matching signature to
23 <permission android:name="com.android.cts.permissionWithSignature"
25 <uses-permission android:name="com.android.cts.permissionWithSignature" />
27 <!-- A permission this app will not hold. -->
28 <permission android:name="com.android.cts.permissionNotUsedWithSignature"
31 <permission android:name="com.android.cts.permissionNormal" />
39 <!-- Need a way for another app to try to access the permission. So create a content
40 provider which is enforced by the permission -->
48 <!-- Need a way for another app to try to access the permission, but will
55 <grant-uri-permission android:pathPattern="/foo.*" /
    [all...]
  /cts/hostsidetests/devicepolicy/app/ContactDirectoryProvider/
AndroidManifest.xml 21 <uses-permission android:name="android.permission.READ_CONTACTS"/>
22 <uses-permission android:name="android.permission.WRITE_CONTACTS"/>
28 android:readPermission="android.permission.READ_CONTACTS"
  /cts/tests/tests/media/
AndroidManifest.xml 20 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE"/>
21 <uses-permission android:name="android.permission.ACCESS_WIFI_STATE"/>
22 <uses-permission android:name="android.permission.CAMERA" />
23 <uses-permission android:name="android.permission.DISABLE_KEYGUARD" />
24 <uses-permission android:name="android.permission.INTERNET" /
    [all...]
  /developers/build/prebuilts/gradle/WatchFace/Wearable/src/main/java/com/example/android/wearable/watchface/
CalendarWatchFacePermissionActivity.java 13 * Simple Activity for displaying Calendar Permission Rationale to user.
19 /* Id to identify permission request for calendar. */
32 // On 23+ (M+) devices, GPS permission not granted. Request permission.
35 new String[]{Manifest.permission.READ_CALENDAR},
  /developers/samples/android/wearable/wear/WatchFace/Wearable/src/main/java/com/example/android/wearable/watchface/
CalendarWatchFacePermissionActivity.java 13 * Simple Activity for displaying Calendar Permission Rationale to user.
19 /* Id to identify permission request for calendar. */
32 // On 23+ (M+) devices, GPS permission not granted. Request permission.
35 new String[]{Manifest.permission.READ_CALENDAR},
  /development/samples/browseable/WatchFace/Wearable/src/com.example.android.wearable.watchface/
CalendarWatchFacePermissionActivity.java 13 * Simple Activity for displaying Calendar Permission Rationale to user.
19 /* Id to identify permission request for calendar. */
32 // On 23+ (M+) devices, GPS permission not granted. Request permission.
35 new String[]{Manifest.permission.READ_CALENDAR},
  /frameworks/support/v4/tests/java/android/support/v4/content/
ContextCompatTest.java 138 assertEquals("Vibrate permission granted", PackageManager.PERMISSION_GRANTED,
140 android.Manifest.permission.VIBRATE));
141 assertEquals("Wake lock permission granted", PackageManager.PERMISSION_GRANTED,
143 android.Manifest.permission.WAKE_LOCK));
150 assertEquals("Read contacts permission granted", PackageManager.PERMISSION_DENIED,
152 android.Manifest.permission.READ_CONTACTS));
153 assertEquals("Write contacts permission granted", PackageManager.PERMISSION_DENIED,
155 android.Manifest.permission.WRITE_CONTACTS));
158 assertEquals("Read contacts permission denied", PackageManager.PERMISSION_GRANTED,
160 android.Manifest.permission.READ_CONTACTS))
    [all...]
  /libcore/ojluni/src/main/java/java/security/
PermissionCollection.java 36 public abstract void add(Permission permission);
38 public abstract boolean implies(Permission permission);
40 public abstract Enumeration<Permission> elements();
Permissions.java 39 public void add(Permission permission) { }
41 public boolean implies(Permission permission) { return true; }
43 public Enumeration<Permission> elements() { return null; }

Completed in 909 milliseconds

1 2 3 4 5 6 7 8 91011>>