/frameworks/opt/chips/src/com/android/ex/chips/ |
ChipsUtil.java | 29 * Listener that gets notified when we check whether we have permission. 32 void onPermissionCheck(String permission, boolean granted); 39 new String[] { Manifest.permission.READ_CONTACTS }; 51 * <p>This is interesting for us because new permission model is introduced in M and we need to 59 * Returns {@link PackageManager#PERMISSION_GRANTED} if given permission is granted, or 62 public static int checkPermission(Context context, String permission) { 64 // TODO: Use "context.checkSelfPermission(permission)" once it's safe to move to M sdk 65 return context.checkPermission(permission, Process.myPid(), Process.myUid()); 67 // Assume that we have permission before M. 80 for (String permission : REQUIRED_PERMISSIONS) [all...] |
/frameworks/support/core-utils/tests/ |
AndroidManifest.xml | 26 <uses-permission android:name="android.permission.VIBRATE"/> 27 <uses-permission android:name="android.permission.WAKE_LOCK"/> 28 <uses-permission android:name="android.permission.READ_CONTACTS"/> 29 <uses-permission android:name="android.permission.WRITE_CONTACTS"/> 31 <uses-permission android:name="android.permission.READ_EXTERNAL_STORAGE" / [all...] |
/packages/screensavers/PhotoTable/ |
AndroidManifest.xml | 5 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" /> 6 <uses-permission android:name="android.permission.READ_EXTERNAL_STORAGE" /> 7 <uses-permission android:name="android.permission.WAKE_LOCK" /> 8 <uses-permission android:name="com.google.android.gallery3d.permission.PICASA_STORE" /> 18 android:permission="android.permission.BIND_DREAM_SERVICE [all...] |
/developers/build/prebuilts/gradle/RuntimePermissionsBasic/Application/src/main/java/com/example/android/basicpermissions/ |
MainActivity.java | 36 * ({@link android.Manifest.permission#CAMERA}) 38 * the permission has been granted. 40 * First, the status of the Camera permission is checked using {@link 48 * CameraPreviewActivity} if the permission has been granted. 83 // Request for camera permission. 85 // Permission has been granted. Start camera preview Activity. 86 Snackbar.make(mLayout, "Camera permission was granted. Starting preview.", 91 // Permission request was denied. 92 Snackbar.make(mLayout, "Camera permission request was denied.", 102 // Check if the Camera permission has been grante [all...] |
/developers/samples/android/system/RuntimePermissionsBasic/Application/src/main/java/com/example/android/basicpermissions/ |
MainActivity.java | 36 * ({@link android.Manifest.permission#CAMERA}) 38 * the permission has been granted. 40 * First, the status of the Camera permission is checked using {@link 48 * CameraPreviewActivity} if the permission has been granted. 83 // Request for camera permission. 85 // Permission has been granted. Start camera preview Activity. 86 Snackbar.make(mLayout, "Camera permission was granted. Starting preview.", 91 // Permission request was denied. 92 Snackbar.make(mLayout, "Camera permission request was denied.", 102 // Check if the Camera permission has been grante [all...] |
/development/samples/browseable/RuntimePermissionsBasic/src/com.example.android.basicpermissions/ |
MainActivity.java | 36 * ({@link android.Manifest.permission#CAMERA}) 38 * the permission has been granted. 40 * First, the status of the Camera permission is checked using {@link 48 * CameraPreviewActivity} if the permission has been granted. 83 // Request for camera permission. 85 // Permission has been granted. Start camera preview Activity. 86 Snackbar.make(mLayout, "Camera permission was granted. Starting preview.", 91 // Permission request was denied. 92 Snackbar.make(mLayout, "Camera permission request was denied.", 102 // Check if the Camera permission has been grante [all...] |
/packages/apps/Bluetooth/ |
AndroidManifest_test.xml | 6 <permission android:name="android.permission.ACCESS_BLUETOOTH_SHARE" 10 <uses-permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" /> 11 <uses-permission android:name="android.permission.ACCESS_BLUETOOTH_SHARE" /> 12 <uses-permission android:name="android.permission.INTERNET" /> 13 <uses-permission android:name="android.permission.BLUETOOTH" / [all...] |
/cts/tests/tests/os/ |
AndroidManifest.xml | 21 <permission android:name="android.os.cts.permission.TEST_GRANTED" 31 </permission> 33 <uses-permission android:name="android.permission.DISABLE_KEYGUARD" /> 34 <uses-permission android:name="android.permission.KILL_BACKGROUND_PROCESSES" /> 35 <uses-permission android:name="android.permission.INTERNET" /> 36 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" / [all...] |
/packages/apps/Dialer/ |
AndroidManifest.xml | 27 <uses-permission android:name="android.permission.CALL_PHONE" /> 28 <uses-permission android:name="android.permission.READ_CONTACTS" /> 29 <uses-permission android:name="android.permission.WRITE_CONTACTS" /> 30 <uses-permission android:name="android.permission.READ_CALL_LOG" /> 31 <uses-permission android:name="android.permission.WRITE_CALL_LOG" / [all...] |
/system/netd/server/ |
PhysicalNetwork.cpp | 27 Permission permission, PhysicalNetwork::Delegate* delegate) { 28 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) { 32 if (int ret = delegate->addFallthrough(interface, permission)) { 39 Permission permission, 42 permission)) { 46 if (int ret = delegate->removeFallthrough(interface, permission)) { 64 Permission PhysicalNetwork::getPermission() const { 68 int PhysicalNetwork::setPermission(Permission permission) [all...] |
/cts/hostsidetests/devicepolicy/app/ManagedProfile/ |
AndroidManifest.xml | 21 <uses-permission android:name="android.permission.ACCESS_WIFI_STATE" /> 22 <uses-permission android:name="android.permission.AUTHENTICATE_ACCOUNTS" /> 23 <uses-permission android:name="android.permission.BLUETOOTH" /> 24 <uses-permission android:name="android.permission.BLUETOOTH_ADMIN" /> 25 <uses-permission android:name="android.permission.READ_CONTACTS" / [all...] |
/frameworks/base/core/java/android/test/ |
AndroidTestCase.java | 88 * Asserts that launching a given activity is protected by a particular permission by 90 * is thrown that mentions the permission in its error message. 97 * @param permission The name of the permission. 100 String packageName, String className, String permission) { 107 fail("expected security exception for " + permission); 110 assertTrue("error message should contain " + permission + ".", 111 expected.getMessage().contains(permission)); 117 * Asserts that reading from the content uri requires a particular permission by querying the 118 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission [all...] |
/frameworks/base/tools/aapt2/java/ |
ManifestClassGenerator_test.cpp | 46 <permission android:name="android.permission.ACCESS_INTERNET" /> 47 <permission android:name="android.DO_DANGEROUS_THINGS" /> 48 <permission android:name="com.test.sample.permission.HUH" /> 49 <permission-group android:name="foo.bar.PERMISSION" /> 55 const size_t permissionClassPos = actual.find("public static final class permission {"); 62 // Make sure these permissions are in the permission class. 66 "\"android.permission.ACCESS_INTERNET\";") [all...] |
/libcore/ojluni/src/main/java/java/security/acl/ |
AclEntry.java | 83 * principal (e.g., a user or a group) will be denied the permission set 102 * Adds the specified permission to this ACL entry. Note: An entry can 105 * @param permission the permission to be associated with 108 * @return true if the permission was added, false if the 109 * permission was already part of this entry's permission set. 111 public boolean addPermission(Permission permission); 114 * Removes the specified permission from this ACL entry [all...] |
/packages/apps/CellBroadcastReceiver/ |
AndroidManifest.xml | 24 <uses-permission android:name="android.permission.RECEIVE_SMS" /> 25 <uses-permission android:name="android.permission.RECEIVE_EMERGENCY_BROADCAST" /> 26 <uses-permission android:name="android.permission.READ_PRIVILEGED_PHONE_STATE" /> 27 <uses-permission android:name="android.permission.MODIFY_PHONE_STATE" /> 28 <uses-permission android:name="android.permission.WAKE_LOCK" / [all...] |
/packages/apps/Launcher3/ |
AndroidManifest.xml | 25 <permission 26 android:name="com.android.launcher.permission.INSTALL_SHORTCUT" 27 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 31 <permission 32 android:name="com.android.launcher3.permission.READ_SETTINGS" 33 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 37 <permission 38 android:name="com.android.launcher3.permission.WRITE_SETTINGS" 39 android:permissionGroup="android.permission-group.SYSTEM_TOOLS" 43 <permission [all...] |
/cts/tools/cts-holo-generation/ |
AndroidManifest.xml | 6 <uses-permission android:name="android.permission.DISABLE_KEYGUARD" /> 7 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" />
|
/device/sample/apps/LeanbackCustomizer/ |
AndroidManifest.xml | 9 <uses-permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" /> 10 <uses-permission android:name="android.permission.INTERNET" />
|
/device/sample/apps/SetupCustomizer/ |
AndroidManifest.xml | 5 <uses-permission android:name="android.permission.RECEIVE_BOOT_COMPLETED" /> 6 <uses-permission android:name="android.permission.INTERNET" />
|
/external/glide/library/src/main/java/com/bumptech/glide/manager/ |
ConnectivityMonitorFactory.java | 8 * has the {@code android.permission.ACCESS_NETWORK_STATE} permission and a no-op non functional 9 * {@link com.bumptech.glide.manager.ConnectivityMonitor} if the app does not have the required permission. 13 final int res = context.checkCallingOrSelfPermission("android.permission.ACCESS_NETWORK_STATE");
|
/external/ims/rcs/rcsservice/ |
AndroidManifest.xml | 15 * derived from this software without specific prior written permission. 50 <permission 51 android:name="com.android.ims.rcs.permission.STATUS_CHANGED" 54 <permission android:name="com.android.ims.permission.PRESENCE_ACCESS" 59 <uses-permission android:name="android.permission.READ_PHONE_STATE"/> 60 <uses-permission android:name="android.permission.BROADCAST_STICKY"/> 61 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE"/ [all...] |
/external/valgrind/none/tests/darwin/ |
access_extended.stderr.exp | 3 access_extended.c(X_OK) = 13 (Permission denied)
|
/frameworks/base/core/java/android/hardware/location/ |
GeofenceHardwareService.java | 80 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 81 "Location Hardware permission not granted to access hardware geofence"); 88 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 89 "Location Hardware permission not granted to access hardware geofence"); 99 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 100 "Location Hardware permission not granted to access hardware geofence"); 107 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 108 "Location Hardware permission not granted to access hardware geofence"); 116 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 117 "Location Hardware permission not granted to access hardware geofence") [all...] |
/frameworks/base/docs/html/training/permissions/ |
declaring.jd | 38 the appropriate <i>permission.</i> You declare that your app needs a 39 permission by listing the permission in the <a href= 44 Depending on how sensitive the permission is, the system might grant the 45 permission automatically, or the device user might have to grant 46 the request. For example, if your app requests permission to turn on the 47 device's flashlight, the system grants that permission automatically. But 49 to approve that permission. Depending on the platform version, the user 50 grants the permission either when they install the app (on Android 5.1 and 58 that require a permission. Typically, an app is going to need permission [all...] |
/frameworks/base/packages/DocumentsUI/tests/ |
AndroidManifest.xml | 5 <uses-permission android:name="android.permission.INTERNET" /> 14 android:permission="android.permission.MANAGE_DOCUMENTS"
|