OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:permission
(Results
451 - 475
of
36860
) sorted by null
<<
11
12
13
14
15
16
17
18
19
20
>>
/frameworks/native/include/binder/
PermissionCache.h
31
* PermissionCache caches
permission
checks for a given uid.
33
* Currently the cache is not updated when there is a
permission
change,
51
// we pool all the
permission
names we see, as many permissions checks
57
// free the whole cache, but keep the
permission
name pool
61
const String16&
permission
, uid_t uid) const;
63
void cache(const String16&
permission
, uid_t uid, bool granted);
68
static bool checkCallingPermission(const String16&
permission
);
70
static bool checkCallingPermission(const String16&
permission
,
73
static bool checkPermission(const String16&
permission
,
/frameworks/base/docs/html/sdk/api_diff/19/changes/
android.Manifest.permission.html
10
android.Manifest.
permission
74
Class android.<A HREF="../../../../reference/android/Manifest.
permission
.html" target="_top"><font size="+2"><code>Manifest.
permission
</code></font></A>
87
<A NAME="android.Manifest.
permission
.BIND_NFC_SERVICE"></A>
88
<nobr><code>String</code> <A HREF="../../../../reference/android/Manifest.
permission
.html#BIND_NFC_SERVICE" target="_top"><code>BIND_NFC_SERVICE</code></A></nobr>
94
<A NAME="android.Manifest.
permission
.BIND_PRINT_SERVICE"></A>
95
<nobr><code>String</code> <A HREF="../../../../reference/android/Manifest.
permission
.html#BIND_PRINT_SERVICE" target="_top"><code>BIND_PRINT_SERVICE</code></A></nobr>
101
<A NAME="android.Manifest.
permission
.BLUETOOTH_PRIVILEGED"></A>
102
<nobr><code>String</code> <A HREF="../../../../reference/android/Manifest.
permission
.html#BLUETOOTH_PRIVILEGED" target="_top"><code>BLUETOOTH_PRIVILEGED</code></A></nobr>
108
<A NAME="android.Manifest.
permission
.CAPTURE_AUDIO_OUTPUT"></A
[
all
...]
/cts/tests/tests/permission2/src/android/permission2/cts/
PermissionPolicyTest.java
38
* Tests for
permission
policy on the platform.
47
private static final String TAG_PERMISSION = "
permission
";
74
assertNotNull("
Permission
" + expectedPermissionName
82
// OEMs cannot change
permission
protection
87
assertEquals("
Permission
" + expectedPermissionName + " invalid protection level",
90
// OEMs cannot change
permission
protection flags
95
assertEquals("
Permission
" + expectedPermissionName + " invalid enforced protection"
98
// OEMs cannot change
permission
grouping
100
assertEquals("
Permission
" + expectedPermissionName + " not in correct group",
102
assertTrue("
Permission
group " + expectedPermission.group + "must be defined"
[
all
...]
/frameworks/base/core/java/android/app/trust/
TrustManager.java
54
* Requires the {@link android.Manifest.
permission
#ACCESS_KEYGUARD_SECURE_STORAGE}
permission
.
59
@RequiresPermission(Manifest.
permission
.ACCESS_KEYGUARD_SECURE_STORAGE)
73
* Requires the {@link android.Manifest.
permission
#ACCESS_KEYGUARD_SECURE_STORAGE}
permission
.
86
* Requires the {@link android.Manifest.
permission
#ACCESS_KEYGUARD_SECURE_STORAGE}
permission
.
99
* Requires the {@link android.Manifest.
permission
#ACCESS_KEYGUARD_SECURE_STORAGE}
permission
.
112
* Requires the {@link android.Manifest.
permission
#TRUST_LISTENER} permission
[
all
...]
/frameworks/base/core/java/android/bluetooth/
BluetoothGattDescriptor.java
49
* Descriptor read
permission
54
* Descriptor
permission
: Allow encrypted read operations
59
* Descriptor
permission
: Allow reading with man-in-the-middle protection
64
* Descriptor write
permission
69
* Descriptor
permission
: Allow encrypted writes
74
* Descriptor
permission
: Allow encrypted writes with man-in-the-middle
80
* Descriptor
permission
: Allow signed write operations
85
* Descriptor
permission
: Allow signed write operations with
122
* <p>Requires {@link android.Manifest.
permission
#BLUETOOTH}
permission
[
all
...]
/packages/apps/TvSettings/Settings/
AndroidManifest.xml
11
<uses-
permission
android:name="android.
permission
.ACCESS_WIFI_STATE" />
12
<uses-
permission
android:name="android.
permission
.ACCESS_NETWORK_STATE" />
13
<uses-
permission
android:name="android.
permission
.BACKUP" />
14
<uses-
permission
android:name="android.
permission
.BLUETOOTH" />
15
<uses-
permission
android:name="android.
permission
.BLUETOOTH_ADMIN" /
[
all
...]
/packages/apps/Email/
AndroidManifest.xml
28
<uses-
permission
android:name="android.
permission
.RECEIVE_BOOT_COMPLETED"/>
29
<uses-
permission
android:name="android.
permission
.ACCESS_NETWORK_STATE"/>
30
<uses-
permission
android:name="android.
permission
.INTERNET"/>
31
<uses-
permission
android:name="android.
permission
.VIBRATE"/>
32
<uses-
permission
android:name="android.
permission
.WRITE_EXTERNAL_STORAGE" /
[
all
...]
/developers/build/prebuilts/androidtv/sample-inputs/app/src/main/
AndroidManifest.xml
21
<uses-
permission
android:name="android.
permission
.INTERNET"/>
23
<uses-
permission
android:name="android.
permission
.READ_SYNC_STATS"/>
25
<uses-
permission
android:name="android.
permission
.WRITE_SYNC_SETTINGS"/>
27
<uses-
permission
android:name="android.
permission
.AUTHENTICATE_ACCOUNTS"/>
29
<uses-
permission
android:name="com.android.providers.tv.
permission
.READ_EPG_DATA" /
[
all
...]
/frameworks/base/docs/html/guide/topics/manifest/
manifest-intro.jd
77
<a href="{@docRoot}guide/topics/manifest/uses-
permission
-element.html"><uses-
permission
/></a>
78
<a href="{@docRoot}guide/topics/manifest/
permission
-element.html"><
permission
/></a>
79
<a href="{@docRoot}guide/topics/manifest/
permission
-tree-element.html"><
permission
-tree /></a>
80
<a href="{@docRoot}guide/topics/manifest/
permission
-group-element.html"><
permission
-group /></a>
116
<a href="{@docRoot}guide/topics/manifest/grant-uri-
permission
-element.html"><grant-uri-
permission
/></a
[
all
...]
/frameworks/base/docs/html/sdk/api_diff/23/changes/
android.Manifest.permission.html
10
android.Manifest.
permission
74
Class android.<A HREF="../../../../reference/android/Manifest.
permission
.html" target="_top"><font size="+2"><code>Manifest.
permission
</code></font></A>
87
<A NAME="android.Manifest.
permission
.ACCESS_MOCK_LOCATION"></A>
94
<A NAME="android.Manifest.
permission
.ACCESS_SURFACE_FLINGER"></A>
101
<A NAME="android.Manifest.
permission
.AUTHENTICATE_ACCOUNTS"></A>
108
<A NAME="android.Manifest.
permission
.BRICK"></A>
115
<A NAME="android.Manifest.
permission
.CLEAR_APP_USER_DATA"></A>
122
<A NAME="android.Manifest.
permission
.DEVICE_POWER"></A>
129
<A NAME="android.Manifest.
permission
.FORCE_BACK"></A
[
all
...]
/platform_testing/tests/functional/permission/src/com/android/functional/permissiontests/
PermissionHelper.java
74
* Returns list of all dangerous
permission
of the system
94
} else if (line.startsWith("
permission
:")) {
105
* Returns list of
permission
asked by package
106
* @param packageName : PackageName for which
permission
list to be returned
137
* Verify any dangerous
permission
not mentioned in manifest aren't granted
157
* Verify any dangerous
permission
mentioned in manifest that is not default for privileged app
158
* isn't granted. Example: Location
permission
for Camera app
177
* Verify any normal
permission
mentioned in manifest is auto granted
192
String.format("For package %s few normal
permission
have been denied", packageName),
197
* Verifies via UI that a
permission
is set/unset for an ap
[
all
...]
/cts/tests/tests/alarmclock/service/
AndroidManifest.xml
19
<uses-
permission
android:name="com.android.alarm.
permission
.SET_ALARM" />
25
android:
permission
="android.
permission
.BIND_VOICE_INTERACTION"
51
android:
permission
="android.
permission
.BIND_VOICE_INTERACTION"
/cts/tests/tests/assist/
AndroidManifest.xml
21
<uses-
permission
android:name="android.
permission
.DISABLE_KEYGUARD" />
22
<uses-
permission
android:name="android.
permission
.BIND_VOICE_INTERACTION" />
23
<uses-
permission
android:name="android.
permission
.INTERNET" />
/cts/tests/tests/permission/
AndroidManifest.xml
19
package="android.
permission
.cts">
21
<uses-
permission
android:name="android.
permission
.INJECT_EVENTS" />
24
<activity android:name="android.
permission
.cts.PermissionStubActivity"
44
android:targetPackage="android.
permission
.cts"
45
android:label="CTS tests of android.
permission
">
/cts/tests/tests/permission/src/android/permission/cts/
CameraPermissionTest.java
17
package android.
permission
.cts;
28
* android.
permission
.CAMERA.
62
// of the upcoming WRITE_EXTERNAL_STORAGE
permission
).
73
* Attempt to take a picture. Requires
Permission
:
74
* {@link android.Manifest.
permission
#CAMERA}.
82
fail("Was able to take a picture with the camera with no
permission
");
/cts/tests/tests/uiautomation/
AndroidManifest.xml
22
<uses-
permission
android:name="android.
permission
.DISABLE_KEYGUARD" />
23
<uses-
permission
android:name="android.
permission
.WRITE_SECURE_SETTINGS" />
41
android:
permission
="android.
permission
.BIND_ACCESSIBILITY_SERVICE" >
/developers/build/prebuilts/gradle/DisplayingBitmaps/Application/src/main/
AndroidManifest.xml
25
<uses-
permission
android:name="android.
permission
.INTERNET" />
26
<uses-
permission
android:name="android.
permission
.WRITE_EXTERNAL_STORAGE" />
27
<uses-
permission
android:name="android.
permission
.ACCESS_NETWORK_STATE" />
/developers/build/prebuilts/gradle/RuntimePermissions/Application/src/main/
AndroidManifest.xml
24
<uses-
permission
android:name="android.
permission
.CAMERA"/>
28
<uses-
permission
-sdk-m android:name="android.
permission
.READ_CONTACTS" />
29
<uses-
permission
-sdk-m android:name="android.
permission
.WRITE_CONTACTS" />
/developers/samples/android/system/RuntimePermissions/Application/src/main/
AndroidManifest.xml
24
<uses-
permission
android:name="android.
permission
.CAMERA"/>
28
<uses-
permission
-sdk-m android:name="android.
permission
.READ_CONTACTS" />
29
<uses-
permission
-sdk-m android:name="android.
permission
.WRITE_CONTACTS" />
/developers/samples/android/ui/graphics/DisplayingBitmaps/Application/src/main/
AndroidManifest.xml
25
<uses-
permission
android:name="android.
permission
.INTERNET" />
26
<uses-
permission
android:name="android.
permission
.WRITE_EXTERNAL_STORAGE" />
27
<uses-
permission
android:name="android.
permission
.ACCESS_NETWORK_STATE" />
/development/samples/browseable/DisplayingBitmaps/
AndroidManifest.xml
25
<uses-
permission
android:name="android.
permission
.INTERNET" />
26
<uses-
permission
android:name="android.
permission
.WRITE_EXTERNAL_STORAGE" />
27
<uses-
permission
android:name="android.
permission
.ACCESS_NETWORK_STATE" />
/development/samples/browseable/RuntimePermissions/
AndroidManifest.xml
24
<uses-
permission
android:name="android.
permission
.CAMERA"/>
28
<uses-
permission
-sdk-m android:name="android.
permission
.READ_CONTACTS" />
29
<uses-
permission
-sdk-m android:name="android.
permission
.WRITE_CONTACTS" />
/development/samples/training/threadsample/
AndroidManifest.xml
26
<!-- Requires this
permission
to download RSS data from Picasa -->
27
<uses-
permission
android:name="android.
permission
.INTERNET" />
29
<!-- Requires this
permission
to check the network state -->
30
<uses-
permission
android:name="android.
permission
.ACCESS_NETWORK_STATE"/>
/external/selinux/libselinux/man/man3/
selinux_set_mapping.3
6
selinux_set_mapping \- establish dynamic object class and
permission
mapping
22
establishes a mapping from a user-provided ordering of object classes and permissions to the numbers actually used by the loaded system policy. Use of this function is highly preferred over the generated constants in the libselinux header files, as this method allows the policy's class and
permission
values to change over time.
24
After the mapping is established, all libselinux functions that operate on class and
permission
values take the user-provided numbers, which are determined as follows:
34
field should refer to an array of
permission
bit names terminated by a NULL string.
36
The object classes named in the mapping and the bit indexes of each set of
permission
bits named in the mapping are numbered in order starting from 1. These numbers are the values that should be passed to subsequent libselinux calls.
46
One of the class or
permission
names requested in the mapping is not present in the loaded policy.
/frameworks/base/core/java/android/content/
UriPermission.java
24
* Description of a single Uri
permission
grant. This grants may have been
37
* Value returned when a
permission
has not been persisted.
56
* Return the Uri this
permission
pertains to.
63
* Returns if this
permission
offers read access.
70
* Returns if this
permission
offers write access.
77
* Return the time when this
permission
was first persisted, in milliseconds
Completed in 349 milliseconds
<<
11
12
13
14
15
16
17
18
19
20
>>