/cts/hostsidetests/devicepolicy/app/DeviceOwner/ |
AndroidManifest.xml | 22 <uses-permission android:name="android.permission.MODIFY_AUDIO_SETTINGS" /> 23 <uses-permission android:name="android.permission.WRITE_SETTINGS" /> 24 <uses-permission android:name="android.permission.ACCESS_WIFI_STATE" /> 25 <uses-permission android:name="android.permission.CHANGE_WIFI_STATE" /> 26 <uses-permission android:name="android.permission.INTERACT_ACROSS_USERS" / [all...] |
/packages/apps/LegacyCamera/ |
AndroidManifest.xml | 9 <uses-permission android:name="android.permission.CAMERA" /> 13 <uses-permission android:name="android.permission.RECORD_AUDIO" /> 14 <uses-permission android:name="android.permission.ACCESS_FINE_LOCATION"/> 15 <uses-permission android:name="android.permission.WAKE_LOCK" /> 16 <uses-permission android:name="android.permission.SET_WALLPAPER" / [all...] |
/cts/hostsidetests/appsecurity/test-apps/UsePermissionDiffCert/ |
AndroidManifest.xml | 20 <!-- We say we want to use the other app's permission, but it is signed with 22 <uses-permission android:name="com.android.cts.permissionWithSignature"/> 24 <!-- Request a normal permission, which should be granted. --> 25 <uses-permission android:name="com.android.cts.permissionNormal"/> 27 <!-- This is a permission we can have, which the other app can require for 29 <permission android:name="com.android.cts.permissionAllowedWithSignature" 31 <uses-permission android:name="com.android.cts.permissionAllowedWithSignature"/>
|
/cts/tests/tests/permission/src/android/permission/cts/ |
NoKeyPermissionTest.java | 17 package android.permission.cts; 40 * <p>Requires Permission: 41 * {@link android.Manifest.permission#DISABLE_KEYGUARD}. 56 * <p>Requires Permission: 57 * {@link android.Manifest.permission#DISABLE_KEYGUARD}. 72 * <p>Requires Permission: 73 * {@link android.Manifest.permission#DISABLE_KEYGUARD}.
|
NoAudioPermissionTest.java | 17 package android.permission.cts; 40 * <p>Requires Permission: 41 * {@link android.Manifest.permission#MODIFY_AUDIO_SETTINGS}. 47 // If there is no permission of MODIFY_AUDIO_SETTINGS, setMicrophoneMute does nothing. 51 // If there is no permission of MODIFY_AUDIO_SETTINGS, setMode does nothing. 63 * <p>Requires Permission: 64 * {@link android.Manifest.permission#MODIFY_AUDIO_SETTINGS}. 70 // If there is no permission of MODIFY_AUDIO_SETTINGS, setSpeakerphoneOn does nothing. 75 // If there is no permission of MODIFY_AUDIO_SETTINGS, setBluetoothScoOn does nothing.
|
NoWakeLockPermissionTest.java | 18 package android.permission.cts; 45 * <p>Requires Permission: 46 * {@link android.Manifest.permission#WAKE_LOCK}. 63 * <p>Requires Permission: 64 * {@link android.Manifest.permission#WAKE_LOCK}. 82 * <p>Requires Permission: 83 * {@link android.Manifest.permission#WAKE_LOCK}. 97 * <p>Requires Permission: 98 * {@link android.Manifest.permission#WAKE_LOCK}.
|
RebootPermissionTest.java | 17 package android.permission.cts; 25 * Verify that rebooting requires Permission. 35 * Verify that rebooting by sending a broadcast Intent requires Permission. 36 * <p>Requires Permission: 37 * {@link android.Manifest.permission#REBOOT}.
|
/frameworks/base/services/core/java/com/android/server/firewall/ |
SenderPermissionFilter.java | 31 private SenderPermissionFilter(String permission) { 32 mPermission = permission; 45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") { 49 String permission = parser.getAttributeValue(null, ATTR_NAME); 50 if (permission == null) { 51 throw new XmlPullParserException("Permission name must be specified.", 54 return new SenderPermissionFilter(permission);
|
/cts/tests/tests/permission2/res/raw/ |
android_manifest.xml | 445 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" /> 446 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" /> [all...] |
/frameworks/base/core/res/ |
AndroidManifest.xml | 445 <protected-broadcast android:name="android.permission.GET_APP_GRANTED_URI_PERMISSIONS" /> 446 <protected-broadcast android:name="android.permission.CLEAR_APP_GRANTED_URI_PERMISSIONS" /> [all...] |
/packages/services/Car/service/res/values/ |
strings.xml | 18 <!-- Permission text: can access your car's information [CHAR LIMIT=NONE] --> 20 <!-- Permission text: can access your car's information [CHAR LIMIT=NONE] --> 22 <!-- Permission text: apps can control car camera [CHAR LIMIT=NONE] --> 24 <!-- Permission text: apps can control car amera [CHAR LIMIT=NONE] --> 26 <!-- Permission text: can access your car's fuel level [CHAR LIMIT=NONE] --> 28 <!-- Permission text: can access your car's fuel level [CHAR LIMIT=NONE] --> 30 <!-- Permission text: apps can control car hvac [CHAR LIMIT=NONE] --> 32 <!-- Permission text: apps can control car hvac [CHAR LIMIT=NONE] --> 34 <!-- Permission text: can access your car's mileage information [CHAR LIMIT=NONE] --> 36 <!-- Permission text: can access your car's mileage information [CHAR LIMIT=NONE] -- [all...] |
/packages/apps/Messaging/src/com/android/messaging/util/ |
OsUtil.java | 188 * Check if the app has the specified permission. If it does not, the app needs to use 191 * any permission is revoked. 192 * @param permission A permission from {@link android.Manifest.permission} 194 public static boolean hasPermission(final String permission) { 197 // user revokes the permission setting. However, PERMISSION_DENIED should not be 198 // cached as the process does not get killed if the user enables the permission setting. 199 if (!sPermissions.containsKey(permission) 200 || sPermissions.get(permission) == PackageManager.PERMISSION_DENIED) [all...] |
/frameworks/base/docs/html/training/articles/ |
wear-permissions.jd | 11 <li><a href="#scenarios">Permission Scenarios</a></li> 41 a user might grant a handset app permission to use location data, and subsequently 42 have to grant the same permission to the Wear version of the app.</p> 46 every permission an app may ever need. Instead, the app does not request permissions until it 57 <h2 id="scenarios">Permission Scenarios</h2> 72 <li>The wearable app uses a <em>different permission model</em> from its handset counterpart. 79 <h3 id="wear-app-wear-perm">Wear app requests permission for an app running on the wearable 82 <p>When the Wear app requests a permission for an app running on the wearable device, the system 83 displays a dialog to prompt the user for that permission. An app or service can only call the 87 a watch face, the service must open an activity before requesting the permission.</p [all...] |
/frameworks/base/docs/html/guide/topics/manifest/ |
permission-tree-element.jd | 1 page.title=<permission-tree> 8 <dd><pre class="stx"><permission-tree android:<a href="#icon">icon</a>="<i>drawable resource</i>" 28 Note that this element does not declare a permission itself, only a 30 <code><a href="{@docRoot}guide/topics/manifest/permission-element.html"><permission></a></code> 48 <dd>The name that's at the base of the permission tree. It serves as 49 a prefix to all permission names in the tree. Java-style scoping should 61 <dd><code><a href="{@docRoot}guide/topics/manifest/permission-element.html"><permission></a></code> 62 <br/><code><a href="{@docRoot}guide/topics/manifest/permission-group-element.html"><permission-group></a></code [all...] |
/cts/apps/PermissionApp/src/com/android/cts/permission/permissionapp/ |
PermissionActivity.java | 33 = "com.android.cts.permission.action.CHECK_HAS_PERMISSION"; 35 = "com.android.cts.permission.action.REQUEST_PERMISSION"; 37 = "com.android.cts.permission.action.PERMISSION_RESULT"; 39 = "com.android.cts.permission.extra.PERMISSION"; 41 = "com.android.cts.permission.extra.GRANT_STATE"; 57 Log.d(TAG, "Requesting permission " + mPermission); 60 Log.d(TAG, "Checking permission " + mPermission); 77 Log.d(TAG, "Received valid permission result: " + grantResults[0]);
|
/cts/tests/tests/permission2/src/android/permission2/cts/ |
NoCaptureAudioOutputPermissionTest.java | 27 * Verify the capture system video output permission requirements. 32 * when the app does not have permission to capture audio output. 34 * record permission, just not the capture audio output permission. 35 * <p>Requires permission: 36 * {@link android.Manifest.permission#RECORD_AUDIO} and 37 * {@link android.Manifest.permission#CAPTURE_VIDEO_OUTPUT}. 56 // app does not have permission, but the object is not usable. 63 + "does not have permission to access the remote submix source",
|
/cts/hostsidetests/appsecurity/test-apps/PermissionDeclareApp/ |
AndroidManifest.xml | 20 An app that declares a permission that requires a matching signature to 23 <permission android:name="com.android.cts.permissionWithSignature" 25 <uses-permission android:name="com.android.cts.permissionWithSignature" /> 27 <!-- A permission this app will not hold. --> 28 <permission android:name="com.android.cts.permissionNotUsedWithSignature" 31 <permission android:name="com.android.cts.permissionNormal" /> 39 <!-- Need a way for another app to try to access the permission. So create a content 40 provider which is enforced by the permission --> 48 <!-- Need a way for another app to try to access the permission, but will 55 <grant-uri-permission android:pathPattern="/foo.*" / [all...] |
/cts/hostsidetests/devicepolicy/app/ContactDirectoryProvider/ |
AndroidManifest.xml | 21 <uses-permission android:name="android.permission.READ_CONTACTS"/> 22 <uses-permission android:name="android.permission.WRITE_CONTACTS"/> 28 android:readPermission="android.permission.READ_CONTACTS"
|
/cts/tests/tests/media/ |
AndroidManifest.xml | 20 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE"/> 21 <uses-permission android:name="android.permission.ACCESS_WIFI_STATE"/> 22 <uses-permission android:name="android.permission.CAMERA" /> 23 <uses-permission android:name="android.permission.DISABLE_KEYGUARD" /> 24 <uses-permission android:name="android.permission.INTERNET" / [all...] |
/developers/build/prebuilts/gradle/WatchFace/Wearable/src/main/java/com/example/android/wearable/watchface/ |
CalendarWatchFacePermissionActivity.java | 13 * Simple Activity for displaying Calendar Permission Rationale to user. 19 /* Id to identify permission request for calendar. */ 32 // On 23+ (M+) devices, GPS permission not granted. Request permission. 35 new String[]{Manifest.permission.READ_CALENDAR},
|
/developers/samples/android/wearable/wear/WatchFace/Wearable/src/main/java/com/example/android/wearable/watchface/ |
CalendarWatchFacePermissionActivity.java | 13 * Simple Activity for displaying Calendar Permission Rationale to user. 19 /* Id to identify permission request for calendar. */ 32 // On 23+ (M+) devices, GPS permission not granted. Request permission. 35 new String[]{Manifest.permission.READ_CALENDAR},
|
/development/samples/browseable/WatchFace/Wearable/src/com.example.android.wearable.watchface/ |
CalendarWatchFacePermissionActivity.java | 13 * Simple Activity for displaying Calendar Permission Rationale to user. 19 /* Id to identify permission request for calendar. */ 32 // On 23+ (M+) devices, GPS permission not granted. Request permission. 35 new String[]{Manifest.permission.READ_CALENDAR},
|
/frameworks/support/v4/tests/java/android/support/v4/content/ |
ContextCompatTest.java | 138 assertEquals("Vibrate permission granted", PackageManager.PERMISSION_GRANTED, 140 android.Manifest.permission.VIBRATE)); 141 assertEquals("Wake lock permission granted", PackageManager.PERMISSION_GRANTED, 143 android.Manifest.permission.WAKE_LOCK)); 150 assertEquals("Read contacts permission granted", PackageManager.PERMISSION_DENIED, 152 android.Manifest.permission.READ_CONTACTS)); 153 assertEquals("Write contacts permission granted", PackageManager.PERMISSION_DENIED, 155 android.Manifest.permission.WRITE_CONTACTS)); 158 assertEquals("Read contacts permission denied", PackageManager.PERMISSION_GRANTED, 160 android.Manifest.permission.READ_CONTACTS)) [all...] |
/libcore/ojluni/src/main/java/java/security/ |
PermissionCollection.java | 36 public abstract void add(Permission permission); 38 public abstract boolean implies(Permission permission); 40 public abstract Enumeration<Permission> elements();
|
Permissions.java | 39 public void add(Permission permission) { } 41 public boolean implies(Permission permission) { return true; } 43 public Enumeration<Permission> elements() { return null; }
|