HomeSort by relevance Sort by last modified time
    Searched full:permission (Results 451 - 475 of 36860) sorted by null

<<11121314151617181920>>

  /frameworks/native/include/binder/
PermissionCache.h 31 * PermissionCache caches permission checks for a given uid.
33 * Currently the cache is not updated when there is a permission change,
51 // we pool all the permission names we see, as many permissions checks
57 // free the whole cache, but keep the permission name pool
61 const String16& permission, uid_t uid) const;
63 void cache(const String16& permission, uid_t uid, bool granted);
68 static bool checkCallingPermission(const String16& permission);
70 static bool checkCallingPermission(const String16& permission,
73 static bool checkPermission(const String16& permission,
  /frameworks/base/docs/html/sdk/api_diff/19/changes/
android.Manifest.permission.html 10 android.Manifest.permission
74 Class android.<A HREF="../../../../reference/android/Manifest.permission.html" target="_top"><font size="+2"><code>Manifest.permission</code></font></A>
87 <A NAME="android.Manifest.permission.BIND_NFC_SERVICE"></A>
88 <nobr><code>String</code>&nbsp;<A HREF="../../../../reference/android/Manifest.permission.html#BIND_NFC_SERVICE" target="_top"><code>BIND_NFC_SERVICE</code></A></nobr>
94 <A NAME="android.Manifest.permission.BIND_PRINT_SERVICE"></A>
95 <nobr><code>String</code>&nbsp;<A HREF="../../../../reference/android/Manifest.permission.html#BIND_PRINT_SERVICE" target="_top"><code>BIND_PRINT_SERVICE</code></A></nobr>
101 <A NAME="android.Manifest.permission.BLUETOOTH_PRIVILEGED"></A>
102 <nobr><code>String</code>&nbsp;<A HREF="../../../../reference/android/Manifest.permission.html#BLUETOOTH_PRIVILEGED" target="_top"><code>BLUETOOTH_PRIVILEGED</code></A></nobr>
108 <A NAME="android.Manifest.permission.CAPTURE_AUDIO_OUTPUT"></A
    [all...]
  /cts/tests/tests/permission2/src/android/permission2/cts/
PermissionPolicyTest.java 38 * Tests for permission policy on the platform.
47 private static final String TAG_PERMISSION = "permission";
74 assertNotNull("Permission " + expectedPermissionName
82 // OEMs cannot change permission protection
87 assertEquals("Permission " + expectedPermissionName + " invalid protection level",
90 // OEMs cannot change permission protection flags
95 assertEquals("Permission " + expectedPermissionName + " invalid enforced protection"
98 // OEMs cannot change permission grouping
100 assertEquals("Permission " + expectedPermissionName + " not in correct group",
102 assertTrue("Permission group " + expectedPermission.group + "must be defined"
    [all...]
  /frameworks/base/core/java/android/app/trust/
TrustManager.java 54 * Requires the {@link android.Manifest.permission#ACCESS_KEYGUARD_SECURE_STORAGE} permission.
59 @RequiresPermission(Manifest.permission.ACCESS_KEYGUARD_SECURE_STORAGE)
73 * Requires the {@link android.Manifest.permission#ACCESS_KEYGUARD_SECURE_STORAGE} permission.
86 * Requires the {@link android.Manifest.permission#ACCESS_KEYGUARD_SECURE_STORAGE} permission.
99 * Requires the {@link android.Manifest.permission#ACCESS_KEYGUARD_SECURE_STORAGE} permission.
112 * Requires the {@link android.Manifest.permission#TRUST_LISTENER} permission
    [all...]
  /frameworks/base/core/java/android/bluetooth/
BluetoothGattDescriptor.java 49 * Descriptor read permission
54 * Descriptor permission: Allow encrypted read operations
59 * Descriptor permission: Allow reading with man-in-the-middle protection
64 * Descriptor write permission
69 * Descriptor permission: Allow encrypted writes
74 * Descriptor permission: Allow encrypted writes with man-in-the-middle
80 * Descriptor permission: Allow signed write operations
85 * Descriptor permission: Allow signed write operations with
122 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission
    [all...]
  /packages/apps/TvSettings/Settings/
AndroidManifest.xml 11 <uses-permission android:name="android.permission.ACCESS_WIFI_STATE" />
12 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
13 <uses-permission android:name="android.permission.BACKUP" />
14 <uses-permission android:name="android.permission.BLUETOOTH" />
15 <uses-permission android:name="android.permission.BLUETOOTH_ADMIN" /
    [all...]
  /packages/apps/Email/
AndroidManifest.xml 28 <uses-permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"/>
29 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE"/>
30 <uses-permission android:name="android.permission.INTERNET"/>
31 <uses-permission android:name="android.permission.VIBRATE"/>
32 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" /
    [all...]
  /developers/build/prebuilts/androidtv/sample-inputs/app/src/main/
AndroidManifest.xml 21 <uses-permission android:name="android.permission.INTERNET"/>
23 <uses-permission android:name="android.permission.READ_SYNC_STATS"/>
25 <uses-permission android:name="android.permission.WRITE_SYNC_SETTINGS"/>
27 <uses-permission android:name="android.permission.AUTHENTICATE_ACCOUNTS"/>
29 <uses-permission android:name="com.android.providers.tv.permission.READ_EPG_DATA" /
    [all...]
  /frameworks/base/docs/html/guide/topics/manifest/
manifest-intro.jd 77 <a href="{@docRoot}guide/topics/manifest/uses-permission-element.html">&lt;uses-permission /&gt;</a>
78 <a href="{@docRoot}guide/topics/manifest/permission-element.html">&lt;permission /&gt;</a>
79 <a href="{@docRoot}guide/topics/manifest/permission-tree-element.html">&lt;permission-tree /&gt;</a>
80 <a href="{@docRoot}guide/topics/manifest/permission-group-element.html">&lt;permission-group /&gt;</a>
116 <a href="{@docRoot}guide/topics/manifest/grant-uri-permission-element.html">&lt;grant-uri-permission /&gt;</a
    [all...]
  /frameworks/base/docs/html/sdk/api_diff/23/changes/
android.Manifest.permission.html 10 android.Manifest.permission
74 Class android.<A HREF="../../../../reference/android/Manifest.permission.html" target="_top"><font size="+2"><code>Manifest.permission</code></font></A>
87 <A NAME="android.Manifest.permission.ACCESS_MOCK_LOCATION"></A>
94 <A NAME="android.Manifest.permission.ACCESS_SURFACE_FLINGER"></A>
101 <A NAME="android.Manifest.permission.AUTHENTICATE_ACCOUNTS"></A>
108 <A NAME="android.Manifest.permission.BRICK"></A>
115 <A NAME="android.Manifest.permission.CLEAR_APP_USER_DATA"></A>
122 <A NAME="android.Manifest.permission.DEVICE_POWER"></A>
129 <A NAME="android.Manifest.permission.FORCE_BACK"></A
    [all...]
  /platform_testing/tests/functional/permission/src/com/android/functional/permissiontests/
PermissionHelper.java 74 * Returns list of all dangerous permission of the system
94 } else if (line.startsWith(" permission:")) {
105 * Returns list of permission asked by package
106 * @param packageName : PackageName for which permission list to be returned
137 * Verify any dangerous permission not mentioned in manifest aren't granted
157 * Verify any dangerous permission mentioned in manifest that is not default for privileged app
158 * isn't granted. Example: Location permission for Camera app
177 * Verify any normal permission mentioned in manifest is auto granted
192 String.format("For package %s few normal permission have been denied", packageName),
197 * Verifies via UI that a permission is set/unset for an ap
    [all...]
  /cts/tests/tests/alarmclock/service/
AndroidManifest.xml 19 <uses-permission android:name="com.android.alarm.permission.SET_ALARM" />
25 android:permission="android.permission.BIND_VOICE_INTERACTION"
51 android:permission="android.permission.BIND_VOICE_INTERACTION"
  /cts/tests/tests/assist/
AndroidManifest.xml 21 <uses-permission android:name="android.permission.DISABLE_KEYGUARD" />
22 <uses-permission android:name="android.permission.BIND_VOICE_INTERACTION" />
23 <uses-permission android:name="android.permission.INTERNET" />
  /cts/tests/tests/permission/
AndroidManifest.xml 19 package="android.permission.cts">
21 <uses-permission android:name="android.permission.INJECT_EVENTS" />
24 <activity android:name="android.permission.cts.PermissionStubActivity"
44 android:targetPackage="android.permission.cts"
45 android:label="CTS tests of android.permission">
  /cts/tests/tests/permission/src/android/permission/cts/
CameraPermissionTest.java 17 package android.permission.cts;
28 * android.permission.CAMERA.
62 // of the upcoming WRITE_EXTERNAL_STORAGE permission).
73 * Attempt to take a picture. Requires Permission:
74 * {@link android.Manifest.permission#CAMERA}.
82 fail("Was able to take a picture with the camera with no permission");
  /cts/tests/tests/uiautomation/
AndroidManifest.xml 22 <uses-permission android:name="android.permission.DISABLE_KEYGUARD" />
23 <uses-permission android:name="android.permission.WRITE_SECURE_SETTINGS" />
41 android:permission="android.permission.BIND_ACCESSIBILITY_SERVICE" >
  /developers/build/prebuilts/gradle/DisplayingBitmaps/Application/src/main/
AndroidManifest.xml 25 <uses-permission android:name="android.permission.INTERNET" />
26 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" />
27 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
  /developers/build/prebuilts/gradle/RuntimePermissions/Application/src/main/
AndroidManifest.xml 24 <uses-permission android:name="android.permission.CAMERA"/>
28 <uses-permission-sdk-m android:name="android.permission.READ_CONTACTS" />
29 <uses-permission-sdk-m android:name="android.permission.WRITE_CONTACTS" />
  /developers/samples/android/system/RuntimePermissions/Application/src/main/
AndroidManifest.xml 24 <uses-permission android:name="android.permission.CAMERA"/>
28 <uses-permission-sdk-m android:name="android.permission.READ_CONTACTS" />
29 <uses-permission-sdk-m android:name="android.permission.WRITE_CONTACTS" />
  /developers/samples/android/ui/graphics/DisplayingBitmaps/Application/src/main/
AndroidManifest.xml 25 <uses-permission android:name="android.permission.INTERNET" />
26 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" />
27 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
  /development/samples/browseable/DisplayingBitmaps/
AndroidManifest.xml 25 <uses-permission android:name="android.permission.INTERNET" />
26 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" />
27 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
  /development/samples/browseable/RuntimePermissions/
AndroidManifest.xml 24 <uses-permission android:name="android.permission.CAMERA"/>
28 <uses-permission-sdk-m android:name="android.permission.READ_CONTACTS" />
29 <uses-permission-sdk-m android:name="android.permission.WRITE_CONTACTS" />
  /development/samples/training/threadsample/
AndroidManifest.xml 26 <!-- Requires this permission to download RSS data from Picasa -->
27 <uses-permission android:name="android.permission.INTERNET" />
29 <!-- Requires this permission to check the network state -->
30 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE"/>
  /external/selinux/libselinux/man/man3/
selinux_set_mapping.3 6 selinux_set_mapping \- establish dynamic object class and permission mapping
22 establishes a mapping from a user-provided ordering of object classes and permissions to the numbers actually used by the loaded system policy. Use of this function is highly preferred over the generated constants in the libselinux header files, as this method allows the policy's class and permission values to change over time.
24 After the mapping is established, all libselinux functions that operate on class and permission values take the user-provided numbers, which are determined as follows:
34 field should refer to an array of permission bit names terminated by a NULL string.
36 The object classes named in the mapping and the bit indexes of each set of permission bits named in the mapping are numbered in order starting from 1. These numbers are the values that should be passed to subsequent libselinux calls.
46 One of the class or permission names requested in the mapping is not present in the loaded policy.
  /frameworks/base/core/java/android/content/
UriPermission.java 24 * Description of a single Uri permission grant. This grants may have been
37 * Value returned when a permission has not been persisted.
56 * Return the Uri this permission pertains to.
63 * Returns if this permission offers read access.
70 * Returns if this permission offers write access.
77 * Return the time when this permission was first persisted, in milliseconds

Completed in 349 milliseconds

<<11121314151617181920>>