/cts/tests/tests/permission/AppThatRequestPermissionAandB/src/android/permission/cts/appthatrequestpermission/ |
RequestPermission.java | 17 package android.permission.cts.appthatrequestpermission; 27 requestPermissions(new String[] {"android.permission.cts.appthatrequestpermission.A", 28 "android.permission.cts.B"}, 0);
|
/cts/tests/tests/permission/AppThatRequestPermissionAandC/src/android/permission/cts/appthatrequestpermission/ |
RequestPermission.java | 17 package android.permission.cts.appthatrequestpermission; 27 requestPermissions(new String[] {"android.permission.cts.appthatrequestpermission.A", 28 "android.permission.cts.C"}, 0);
|
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/ui/ |
OverlayTouchActivity.java | 16 package com.android.packageinstaller.permission.ui;
|
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/utils/ |
SafetyNetLogger.java | 17 package com.android.packageinstaller.permission.utils; 22 import com.android.packageinstaller.permission.model.AppPermissionGroup; 23 import com.android.packageinstaller.permission.model.Permission; 67 Permission permission = group.getPermissions().get(permissionNum); local 73 builder.append(permission.getName()).append('|'); 76 builder.append(permission.isGranted()).append('|'); 78 builder.append(permission.isGranted() && (permission.getAppOp() == nul [all...] |
IoUtils.java | 17 package com.android.packageinstaller.permission.utils;
|
/cts/tests/tests/permission/src/android/permission/cts/ |
AppIdleStatePermissionTest.java | 16 package android.permission.cts; 41 * Verify that the {@link android.Manifest.permission#CHANGE_APP_IDLE_STATE} 42 * permission is only held by at most one package. 48 android.Manifest.permission.CHANGE_APP_IDLE_STATE 61 fail("Only one app may hold the CHANGE_APP_IDLE_STATE permission; found packages: \n"
|
AppWidgetManagerPermissionTest.java | 17 package android.permission.cts; 42 * <p>Tests Permission: 43 * {@link android.Manifest.permission#BIND_APP_WIDGET}.
|
ConnectivityManagerPermissionTest.java | 17 package android.permission.cts; 44 * <p>Tests Permission: 45 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
|
DebuggableTest.java | 17 package android.permission.cts;
|
DevicePowerPermissionTest.java | 17 package android.permission.cts; 25 * Verify that various PowerManagement functionality requires Permission. 37 * Verify that going to sleep requires Permission. 38 * <p>Requires Permission: 39 * {@link android.Manifest.permission#DEVICE_POWER}. 45 fail("Was able to call PowerManager.goToSleep without DEVICE_POWER Permission.");
|
PermissionStubActivity.java | 17 package android.permission.cts;
|
ServicePermissionTest.java | 17 package android.permission.cts; 29 * permission is only ever granted to the core system (typically 38 android.Manifest.permission.ACCOUNT_MANAGER, 39 android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE, 40 android.Manifest.permission.BIND_AUTOFILL_SERVICE, 41 android.Manifest.permission.BIND_CHOOSER_TARGET_SERVICE, 42 android.Manifest.permission.BIND_CONDITION_PROVIDER_SERVICE, 43 // android.Manifest.permission.BIND_DEVICE_ADMIN, 44 android.Manifest.permission.BIND_DREAM_SERVICE, 45 android.Manifest.permission.BIND_INPUT_METHOD [all...] |
ProviderPermissionTest.java | 17 package android.permission.cts; 42 * <p>Tests Permission: 43 * {@link android.Manifest.permission#READ_CONTACTS} 47 android.Manifest.permission.READ_CONTACTS); 52 * <p>Tests Permission: 53 * {@link android.Manifest.permission#WRITE_CONTACTS} 57 android.Manifest.permission.WRITE_CONTACTS); 60 public void assertWritingContentUriRequiresPermission(Uri uri, String permission, 64 fail("expected SecurityException requiring " + permission); 67 fail("expected SecurityException requiring " + permission + " got " + e) 104 final String permission = android.Manifest.permission.WRITE_SETTINGS; local [all...] |
ContactsProviderTest.java | 17 package android.permission.cts; 31 * Permission. 33 * Requires Permission: {@link android.Manifest.permission#READ_CONTACTS}. 49 * Permission. 51 * Requires Permission: {@link android.Manifest.permission#WRITE_CONTACTS}. 67 * Permission. 69 * Requires Permission: {@link android.Manifest.permission#READ_CONTACTS} [all...] |
NoActivityRelatedPermissionTest.java | 17 package android.permission.cts; 42 super("android.permission.cts", PermissionStubActivity.class); 53 * <p>Requires Permission: 54 * {@link android.Manifest.permission#GET_TASKS}
|
NoAudioPermissionTest.java | 17 package android.permission.cts; 40 * <p>Requires Permission: 41 * {@link android.Manifest.permission#MODIFY_AUDIO_SETTINGS}. 47 // If there is no permission of MODIFY_AUDIO_SETTINGS, setMicrophoneMute does nothing. 51 // If there is no permission of MODIFY_AUDIO_SETTINGS, setMode does nothing. 63 * <p>Requires Permission: 64 * {@link android.Manifest.permission#MODIFY_AUDIO_SETTINGS}. 70 // If there is no permission of MODIFY_AUDIO_SETTINGS, setSpeakerphoneOn does nothing. 75 // If there is no permission of MODIFY_AUDIO_SETTINGS, setBluetoothScoOn does nothing.
|
NoBroadcastPackageRemovedPermissionTest.java | 17 package android.permission.cts; 34 * <p>Requires Permission: 35 * {@link android.Manifest.permission#BROADCAST_STICKY }. 61 * <p>Requires Permission: 62 * {@link android.Manifest.permission#BROADCAST_PACKAGE_REMOVED}.
|
NoSdCardWritePermissionTest.java | 17 package android.permission.cts; 33 * android.permission.WRITE_EXTERNAL_STORAGE}.
|
/cts/tests/tests/permission2/src/android/permission2/cts/ |
PermissionMaxSdkVersionTest.java | 17 package android.permission.cts; 25 * Verify permission behaviors with android:maxSdkVersion 28 // These two permission names must match the corresponding <uses-permission> 30 static final String UNGRANTABLE_PERMISSION = "android.permission.INTERNET"; 31 static final String GRANTABLE_PERMISSION = "android.permission.ACCESS_NETWORK_STATE"; 35 * the permission is not being granted. 48 * the permission is being granted.
|
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/ui/auto/ |
GrantPermissionsAutoViewHandler.java | 17 package com.android.packageinstaller.permission.ui.auto; 22 import com.android.packageinstaller.permission.ui.handheld.GrantPermissionsViewHandlerImpl; 25 * A {@link com.android.packageinstaller.permission.ui.GrantPermissionsViewHandler} that is
|
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/service/ |
RuntimePermissionPresenterServiceImpl.java | 17 package com.android.packageinstaller.permission.service; 21 import android.content.pm.permission.RuntimePermissionPresentationInfo; 25 import com.android.packageinstaller.permission.model.AppPermissionGroup; 26 import com.android.packageinstaller.permission.model.AppPermissions; 27 import com.android.packageinstaller.permission.utils.Utils; 56 RuntimePermissionPresentationInfo permission = local 59 permissions.add(permission);
|
/frameworks/base/services/core/java/com/android/server/pm/permission/ |
DefaultPermissionGrantPolicy.java | 17 package com.android.server.pm.permission; 88 * have phone related permission by default. 107 private static final String TAG_PERMISSION = "permission"; 114 PHONE_PERMISSIONS.add(Manifest.permission.READ_PHONE_STATE); 115 PHONE_PERMISSIONS.add(Manifest.permission.CALL_PHONE); 116 PHONE_PERMISSIONS.add(Manifest.permission.READ_CALL_LOG); 117 PHONE_PERMISSIONS.add(Manifest.permission.WRITE_CALL_LOG); 118 PHONE_PERMISSIONS.add(Manifest.permission.ADD_VOICEMAIL); 119 PHONE_PERMISSIONS.add(Manifest.permission.USE_SIP); 120 PHONE_PERMISSIONS.add(Manifest.permission.PROCESS_OUTGOING_CALLS) 1227 String permission = requestedPermissions.get(i); local [all...] |
/cts/hostsidetests/appsecurity/test-apps/AccessSerialModern/src/android/os/cts/ |
AccessSerialModernTest.java | 28 * Test that legacy apps can access the device serial without the phone permission. 39 // We don't have the read phone state permission, so this should throw 42 fail("getSerial() must be gated on the READ_PHONE_STATE permission"); 54 // We have the READ_PHONE_STATE permission, so this should not throw 59 fail("getSerial() must be gated on the READ_PHONE_STATE permission"); 66 android.Manifest.permission.READ_PHONE_STATE);
|
/cts/hostsidetests/appsecurity/test-apps/PermissionPolicy25/src/com/android/cts/permission/policy/ |
PermissionPolicyTest25.java | 17 package com.android.cts.permission.policy; 29 * Tests for the platform permission policy around apps targeting API 25 51 + " to a normal protection permission: " + permissionInfo.name; 56 + " to a dangerous protection permission: " + permissionInfo.name;
|
/cts/tests/netlegacy22.permission/src/android/net/cts/legacy/api22/permission/ |
ConnectivityManagerPermissionTest.java | 17 package android.net.cts.legacy.api22.permission; 42 * <p>Tests Permission: 43 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE}.
|