OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:permission
(Results
26 - 50
of
36860
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/development/samples/WiFiDirectServiceDiscovery/
AndroidManifest.xml
8
<uses-
permission
android:name="android.
permission
.ACCESS_WIFI_STATE" />
9
<uses-
permission
android:name="android.
permission
.CHANGE_WIFI_STATE" />
10
<uses-
permission
android:name="android.
permission
.CHANGE_NETWORK_STATE" />
11
<uses-
permission
android:name="android.
permission
.INTERNET" />
12
<uses-
permission
android:name="android.
permission
.ACCESS_NETWORK_STATE" /
[
all
...]
/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp23/src/com/android/cts/usepermission/
UsePermissionTest23.java
34
* Runtime
permission
behavior tests for apps targeting API 23
52
// New
permission
model is denied by default
64
grantPermission(Manifest.
permission
.READ_EXTERNAL_STORAGE);
66
.checkSelfPermission(Manifest.
permission
.READ_EXTERNAL_STORAGE));
68
.checkSelfPermission(Manifest.
permission
.WRITE_EXTERNAL_STORAGE));
79
// Start out without
permission
81
.checkSelfPermission(Manifest.
permission
.READ_EXTERNAL_STORAGE));
83
.checkSelfPermission(Manifest.
permission
.WRITE_EXTERNAL_STORAGE));
91
Manifest.
permission
.READ_EXTERNAL_STORAGE,
92
Manifest.
permission
.WRITE_EXTERNAL_STORAGE}
[
all
...]
/frameworks/base/core/tests/bluetoothtests/
AndroidManifest.xml
20
<uses-
permission
android:name="android.
permission
.BLUETOOTH" />
21
<uses-
permission
android:name="android.
permission
.BLUETOOTH_ADMIN" />
22
<uses-
permission
android:name="android.
permission
.BROADCAST_STICKY" />
23
<uses-
permission
android:name="android.
permission
.CHANGE_NETWORK_STATE" />
24
<uses-
permission
android:name="android.
permission
.LOCAL_MAC_ADDRESS" /
[
all
...]
/frameworks/base/graphics/tests/graphicstests/
AndroidManifest.xml
19
<uses-
permission
android:name="android.
permission
.RECEIVE_SMS"/>
20
<uses-
permission
android:name="android.
permission
.INTERNET" />
21
<uses-
permission
android:name="android.
permission
.READ_CONTACTS" />
22
<uses-
permission
android:name="android.
permission
.WRITE_CONTACTS" />
23
<uses-
permission
android:name="android.
permission
.WAKE_LOCK" /
[
all
...]
/packages/apps/Nfc/
AndroidManifest.xml
21
<uses-
permission
android:name="android.
permission
.BLUETOOTH" />
22
<uses-
permission
android:name="android.
permission
.BLUETOOTH_ADMIN" />
23
<uses-
permission
android:name="android.
permission
.BLUETOOTH_PRIVILEGED" />
24
<uses-
permission
android:name="android.
permission
.NFC" />
25
<uses-
permission
android:name="android.
permission
.NFC_UNLOCK" /
[
all
...]
/frameworks/base/data/etc/
platform.xml
18
user and group IDs and the higher-level
permission
names managed
31
permission
names. By specifying such a mapping, you are saying
32
that any application process granted the given
permission
will
37
<
permission
name="android.
permission
.BLUETOOTH_ADMIN" >
39
</
permission
>
41
<
permission
name="android.
permission
.BLUETOOTH" >
43
</
permission
>
45
<
permission
name="android.permission.BLUETOOTH_STACK"
[
all
...]
/frameworks/base/packages/SystemUI/
AndroidManifest.xml
25
<uses-
permission
android:name="android.
permission
.RECEIVE_BOOT_COMPLETED" />
26
<uses-
permission
android:name="android.
permission
.READ_EXTERNAL_STORAGE" />
27
<uses-
permission
android:name="android.
permission
.WRITE_EXTERNAL_STORAGE" />
29
<uses-
permission
android:name="android.
permission
.WRITE_MEDIA_STORAGE" />
30
<uses-
permission
android:name="android.
permission
.WAKE_LOCK" /
[
all
...]
/external/nist-sip/
AndroidManifest.xml
3
<uses-
permission
android:name="android.
permission
.WRITE_EXTERNAL_STORAGE" />
4
<uses-
permission
android:name="android.
permission
.INTERNET"></uses-
permission
>
5
<uses-
permission
android:name="android.
permission
.MODIFY_AUDIO_SETTINGS"></uses-
permission
>
6
<uses-
permission
android:name="android.
permission
.RECORD_AUDIO"></uses-permission
[
all
...]
/cts/tests/tests/location2/
README.txt
1
Location CTS tests that require "android.
permission
.ACCESS_COARSE_LOCATION", but not
2
"android.
permission
.ACCESS_FINE_LOCATION". Note you must enable "Allow mock locations"
/cts/tests/tests/net/
AndroidManifest.xml
21
<uses-
permission
android:name="android.
permission
.ACCESS_NETWORK_STATE" />
22
<uses-
permission
android:name="android.
permission
.ACCESS_WIFI_STATE" />
23
<uses-
permission
android:name="android.
permission
.ACCESS_COARSE_LOCATION" />
24
<uses-
permission
android:name="android.
permission
.CHANGE_NETWORK_STATE" />
25
<uses-
permission
android:name="android.
permission
.CHANGE_WIFI_STATE" /
[
all
...]
/external/apache-harmony/security/src/test/resources/
PolicyTest.txt
2
permission
java.security.SecurityPermission "codeBaseForPolicyTest";
/external/autotest/
ssp_deploy_config.json
6
"
permission
": 400
12
"
permission
": 400
18
"
permission
": 644
24
"
permission
": 644
/external/jetty/
AndroidManifest.xml
11
<uses-
permission
android:name="android.
permission
.INTERNET" />
12
<uses-
permission
android:name="android.
permission
.ACCESS_NETWORK_STATE" />
/frameworks/base/packages/SystemUI/tests/
AndroidManifest.xml
20
<uses-
permission
android:name="android.
permission
.INJECT_EVENTS" />
21
<uses-
permission
android:name="android.
permission
.READ_PHONE_STATE" />
22
<uses-
permission
android:name="android.
permission
.INTERACT_ACROSS_USERS" />
23
<uses-
permission
android:name="android.
permission
.INTERACT_ACROSS_USERS_FULL" />
24
<uses-
permission
android:name="android.
permission
.WRITE_SECURE_SETTINGS" /
[
all
...]
/frameworks/base/sax/tests/saxtests/
AndroidManifest.xml
19
<uses-
permission
android:name="android.
permission
.RECEIVE_SMS"/>
20
<uses-
permission
android:name="android.
permission
.INTERNET" />
21
<uses-
permission
android:name="android.
permission
.READ_CONTACTS" />
22
<uses-
permission
android:name="android.
permission
.WRITE_CONTACTS" />
23
<uses-
permission
android:name="android.
permission
.WAKE_LOCK" /
[
all
...]
/external/webrtc/talk/app/webrtc/androidtests/
AndroidManifest.xml
12
<uses-
permission
android:name="android.
permission
.CAMERA" />
13
<uses-
permission
android:name="android.
permission
.MODIFY_AUDIO_SETTINGS" />
14
<uses-
permission
android:name="android.
permission
.RECORD_AUDIO" />
15
<uses-
permission
android:name="android.
permission
.INTERNET" />
16
<uses-
permission
android:name="android.
permission
.WRITE_EXTERNAL_STORAGE"/
[
all
...]
/frameworks/base/tests/LocationTracker/
AndroidManifest.xml
5
<uses-
permission
android:name="android.
permission
.ACCESS_FINE_LOCATION" />
6
<uses-
permission
android:name="android.
permission
.ACCESS_COARSE_LOCATION" />
8
<!--
Permission
for wifi -->
9
<uses-
permission
android:name="android.
permission
.ACCESS_WIFI_STATE" />
12
<uses-
permission
android:name="android.
permission
.WAKE_LOCK" />
14
<!--
Permission
for SD card --
[
all
...]
/packages/apps/Dialer/tests/
AndroidManifest.xml
25
<uses-
permission
android:name="android.
permission
.READ_CONTACTS" />
26
<uses-
permission
android:name="android.
permission
.WRITE_CONTACTS" />
27
<uses-
permission
android:name="android.
permission
.READ_CALL_LOG" />
28
<uses-
permission
android:name="android.
permission
.WRITE_CALL_LOG" />
29
<uses-
permission
android:name="android.
permission
.GET_ACCOUNTS" /
[
all
...]
/packages/apps/ManagedProvisioning/
AndroidManifest.xml
21
<uses-
permission
android:name="android.
permission
.ACCESS_NETWORK_STATE" />
22
<uses-
permission
android:name="android.
permission
.ACCESS_WIFI_STATE" />
23
<uses-
permission
android:name="android.
permission
.MANAGE_USERS" />
24
<uses-
permission
android:name="android.
permission
.MANAGE_PROFILE_AND_DEVICE_OWNERS" />
25
<uses-
permission
android:name="android.
permission
.MANAGE_ACCOUNTS" /
[
all
...]
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/model/
AppPermissionGroup.java
17
package com.android.packageinstaller.
permission
.model;
33
import com.android.packageinstaller.
permission
.utils.ArrayUtils;
34
import com.android.packageinstaller.
permission
.utils.LocationUtils;
42
private static final String KILL_REASON_APP_OP_CHANGE = "
Permission
related app op changed";
55
private final ArrayMap<String,
Permission
> mPermissions = new ArrayMap<>();
140
// Don't allow toggling non-platform
permission
groups for legacy apps via app ops.
160
Permission
permission
= new
Permission
(requestedPermission, granted,
local
162
group.addPermission(
permission
);
219
Permission
permission
= mPermissions.valueAt(i);
local
230
Permission
permission
= mPermissions.valueAt(i);
local
244
Permission
permission
= mPermissions.valueAt(i);
local
298
Permission
permission
= mPermissions.valueAt(i);
local
513
Permission
permission
= mPermissions.valueAt(i);
local
531
Permission
permission
= mPermissions.valueAt(i);
local
540
Permission
permission
= mPermissions.valueAt(i);
local
551
Permission
permission
= mPermissions.valueAt(i);
local
562
Permission
permission
= mPermissions.valueAt(i);
local
573
Permission
permission
= mPermissions.valueAt(i);
local
638
mPermissions.put(
permission
.getName(),
permission
);
local
[
all
...]
/cts/tests/tests/permission/src/android/permission/cts/
ProviderPermissionTest.java
17
package android.
permission
.cts;
34
* <p>Tests
Permission
:
35
* {@link android.Manifest.
permission
#READ_CONTACTS}
39
android.Manifest.
permission
.READ_CONTACTS);
44
* <p>Tests
Permission
:
45
* {@link android.Manifest.
permission
#WRITE_CONTACTS}
49
android.Manifest.
permission
.WRITE_CONTACTS);
54
* <p>Tests
Permission
:
55
* {@link android.Manifest.
permission
#READ_CALL_LOG}
59
android.Manifest.
permission
.READ_CALL_LOG)
78
final String
permission
= android.Manifest.
permission
.WRITE_SETTINGS;
local
[
all
...]
/frameworks/support/v4/java/android/support/v4/content/
PermissionChecker.java
31
* This class provides
permission
check APIs that verify both the
32
*
permission
and the associated app op for this
permission
if
35
* In the new
permission
model permissions with protection level
40
*
permission
revocations and would crash. Therefore, when the
41
* user disables a
permission
for a legacy app in the UI the
42
* platform disables the APIs guarded by this
permission
making
50
*
permission
model for which the user had disabled the "
permission
"
55
/**
Permission
result: The permission is granted. *
[
all
...]
/packages/services/Car/service/
AndroidManifest.xml
25
<
permission
-group
26
android:name="android.car.
permission
.CAR_INFORMATION"
30
<
permission
31
android:name="android.car.
permission
.CAR_CAMERA"
35
<
permission
36
android:name="android.car.
permission
.CAR_FUEL"
37
android:permissionGroup="android.car.
permission
.CAR_INFORMATION"
41
<
permission
42
android:name="android.car.
permission
.CAR_HVAC"
46
<
permission
[
all
...]
/packages/providers/ContactsProvider/
AndroidManifest.xml
6
<uses-
permission
android:name="android.
permission
.BIND_DIRECTORY_SEARCH" />
7
<uses-
permission
android:name="android.
permission
.GET_ACCOUNTS" />
8
<uses-
permission
android:name="android.
permission
.GET_ACCOUNTS_PRIVILEGED" />
9
<uses-
permission
android:name="android.
permission
.INTERACT_ACROSS_USERS" />
10
<uses-
permission
android:name="android.
permission
.MANAGE_USERS" /
[
all
...]
/development/samples/WiFiDirectDemo/
AndroidManifest.xml
6
<uses-
permission
android:name="android.
permission
.ACCESS_WIFI_STATE" />
7
<uses-
permission
android:name="android.
permission
.CHANGE_WIFI_STATE" />
8
<uses-
permission
android:name="android.
permission
.CHANGE_NETWORK_STATE" />
9
<uses-
permission
android:name="android.
permission
.INTERNET" />
10
<uses-
permission
android:name="android.
permission
.ACCESS_NETWORK_STATE" /
[
all
...]
Completed in 852 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>