HomeSort by relevance Sort by last modified time
    Searched defs:permission (Results 51 - 75 of 678) sorted by null

1 23 4 5 6 7 8 91011>>

  /cts/tests/tests/permission/src/android/permission/cts/
NoKeyPermissionTest.java 17 package android.permission.cts;
42 * <p>Requires Permission:
43 * {@link android.Manifest.permission#DISABLE_KEYGUARD}.
62 * <p>Requires Permission:
63 * {@link android.Manifest.permission#DISABLE_KEYGUARD}.
82 * <p>Requires Permission:
83 * {@link android.Manifest.permission#DISABLE_KEYGUARD}.
NoNetworkStatePermissionTest.java 17 package android.permission.cts;
43 * <p>Requires Permission:
44 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
59 * <p>Requires Permission:
60 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
75 * <p>Requires Permission:
76 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
NoReadLogsPermissionTest.java 17 package android.permission.cts;
37 * Verify that we'll only get our logs without the READ_LOGS permission.
63 // no permission get an empty log buffer.
PackageManagerRequiringPermissionsTest.java 17 package android.permission.cts;
44 * Verify that PackageManager.setApplicationEnabledSetting requires permission.
45 * <p>Requires Permission:
46 * {@link android.Manifest.permission#CHANGE_COMPONENT_ENABLED_STATE}.
61 * Verify that PackageManager.addPreferredActivity requires permission.
62 * <p>Requires Permission:
63 * {@link android.Manifest.permission#SET_PREFERRED_APPLICATIONS}.
78 * Verify that PackageManager.clearPackagePreferredActivities requires permission.
79 * <p>Requires Permission:
80 * {@link android.Manifest.permission#SET_PREFERRED_APPLICATIONS}
    [all...]
NoCaptureVideoPermissionTest.java 17 package android.permission.cts;
29 * Verify the capture system video output permission requirements.
40 * <p>Requires Permission:
41 * {@link android.Manifest.permission#CAPTURE_VIDEO_OUTPUT} or
42 * {@link android.Manifest.permission#CAPTURE_SECURE_VIDEO_OUTPUT}.
64 * <p>Requires Permission:
65 * {@link android.Manifest.permission#CAPTURE_SECURE_VIDEO_OUTPUT}.
NoSystemFunctionPermissionTest.java 18 package android.permission.cts;
44 * <p>Requires Permission:
45 * {@link android.Manifest.permission#RESTART_PACKAGES}.
62 * <p>Requires Permission:
63 * {@link android.Manifest.permission#SET_TIME_ZONE}.
82 * <p>Requires Permission:
83 * {@link android.Manifest.permission#SET_WALLPAPER}.
119 * <p>Requires Permission:
120 * {@link android.Manifest.permission#VIBRATE}.
152 * <p>Requires Permission
    [all...]
NoWakeLockPermissionTest.java 18 package android.permission.cts;
46 * <p>Requires Permission:
47 * {@link android.Manifest.permission#WAKE_LOCK}.
65 * <p>Requires Permission:
66 * {@link android.Manifest.permission#WAKE_LOCK}.
84 * <p>Requires Permission:
85 * {@link android.Manifest.permission#WAKE_LOCK}.
99 * <p>Requires Permission:
100 * {@link android.Manifest.permission#WAKE_LOCK}.
TvPermissionTest.java 17 package android.permission.cts;
49 fail("Accessing " + tableName + " table should require WRITE_EPG_DATA permission.");
59 fail("Accessing " + tableName + " table should require WRITE_EPG_DATA permission.");
68 fail("Accessing " + tableName + " table should require WRITE_EPG_DATA permission.");
  /device/linaro/bootloader/edk2/SecurityPkg/Include/Library/
Tpm12CommandLib.h 76 TPM_NV_ATTRIBUTES permission; member in struct:__anon11528
  /frameworks/base/tests/permission/src/com/android/framework/permission/tests/
VibratorServicePermissionTest.java 17 package com.android.framework.permission.tests;
46 * <p>Tests permission:
47 * {@link android.Manifest.permission#VIBRATE}
64 * <p>Tests permission:
65 * {@link android.Manifest.permission#VIBRATE}
PmPermissionsTests.java 17 package com.android.framework.permission.tests;
29 private String mPkgName = "com.android.framework.permission.tests";
38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission
39 * android.permission.GET_PACKAGE_SIZE
53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission
54 * android.permission.DELETE_CACHE_FILES
68 * This test verifies that PackageManger.installPackage enforces permission
69 * android.permission.INSTALL_PACKAGES
76 * enforces permission android.permission.CLEAR_APP_CACH
    [all...]
  /frameworks/native/services/vr/virtual_touchpad/
VirtualTouchpadService.cpp 17 const String16 kDumpPermission("android.permission.DUMP");
18 const String16 kTouchPermission("android.permission.RESTRICTED_VR_ACCESS");
108 result.appendFormat("Permission denial: can't dump " LOG_TAG
136 const bool permission = PermissionCache::checkPermission(kTouchPermission, *out_pid, uid); local
137 if (!permission) {
138 ALOGE("permission denied to pid=%ld uid=%ld", static_cast<long>(*out_pid),
141 return permission;
  /hardware/qcom/display/msm8084/libqservice/
IQService.cpp 97 const bool permission = (callerUid == AID_MEDIA || local
127 if(!permission) {
  /hardware/qcom/display/msm8226/libqservice/
IQService.cpp 88 const bool permission = (callerUid == AID_MEDIA || local
106 if(!permission) {
  /hardware/qcom/display/msm8994/libqservice/
IQService.cpp 88 const bool permission = (callerUid == AID_MEDIA || local
106 if(!permission) {
  /packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/ui/
ConfirmActionDialogFragment.java 17 package com.android.packageinstaller.permission.ui;
ManagePermissionsActivity.java 17 package com.android.packageinstaller.permission.ui;
27 import com.android.packageinstaller.permission.ui.handheld.ManageStandardPermissionsFragment;
28 import com.android.packageinstaller.permission.ui.wear.AppPermissionsFragmentWear;
53 fragment = com.android.packageinstaller.permission.ui.television
68 fragment = com.android.packageinstaller.permission.ui.auto
73 fragment = com.android.packageinstaller.permission.ui.television
79 fragment = com.android.packageinstaller.permission.ui.handheld
82 fragment = com.android.packageinstaller.permission.ui.handheld
96 fragment = com.android.packageinstaller.permission.ui.television
99 fragment = com.android.packageinstaller.permission.ui.handhel
    [all...]
  /packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/ui/handheld/
RestrictedSwitchPreference.java 17 package com.android.packageinstaller.permission.ui.handheld;
  /packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/ui/television/
SettingsWithHeader.java 17 package com.android.packageinstaller.permission.ui.television;
  /packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/model/
AppPermissionGroup.java 17 package com.android.packageinstaller.permission.model;
35 import com.android.packageinstaller.permission.utils.ArrayUtils;
36 import com.android.packageinstaller.permission.utils.LocationUtils;
45 private static final String KILL_REASON_APP_OP_CHANGE = "Permission related app op changed";
60 private final ArrayMap<String, Permission> mPermissions = new ArrayMap<>();
150 // Don't allow toggling non-platform permission groups for legacy apps via app ops.
170 Permission permission = new Permission(requestedPermission, granted, local
172 group.addPermission(permission);
248 Permission permission = mPermissions.valueAt(i); local
259 Permission permission = mPermissions.valueAt(i); local
273 Permission permission = mPermissions.valueAt(i); local
336 Permission permission = mPermissions.valueAt(i); local
565 Permission permission = mPermissions.valueAt(i); local
583 Permission permission = mPermissions.valueAt(i); local
592 Permission permission = mPermissions.valueAt(i); local
603 Permission permission = mPermissions.valueAt(i); local
614 Permission permission = mPermissions.valueAt(i); local
625 Permission permission = mPermissions.valueAt(i); local
690 mPermissions.put(permission.getName(), permission); local
    [all...]
  /frameworks/base/core/java/android/content/pm/
ServiceInfo.java 31 * Optional name of a permission required to be able to access this
32 * Service. From the "permission" attribute.
34 public String permission; field in class:ServiceInfo
85 permission = orig.permission;
96 pw.println(prefix + "permission=" + permission);
113 dest.writeString(permission);
129 permission = source.readString();
  /frameworks/compile/mclinker/lib/Core/
Linker.cpp 259 FileHandle::Permission permission; local
263 permission = FileHandle::Permission(0x644);
268 permission = FileHandle::Permission(0x755);
274 bool result = file.open(sys::fs::Path(pPath), open_mode, permission);
  /frameworks/native/libs/binder/
IAppOpsService.cpp 117 virtual int32_t permissionToOpCode(const String16& permission) {
120 data.writeString16(permission);
205 String16 permission = data.readString16(); local
206 const int32_t opCode = permissionToOpCode(permission);
IPermissionController.cpp 39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid)
43 data.writeString16(permission);
84 virtual bool isRuntimePermission(const String16& permission)
88 data.writeString16(permission);
118 String16 permission = data.readString16(); local
121 bool res = checkPermission(permission, pid, uid);
154 String16 permission = data.readString16(); local
155 const bool res = isRuntimePermission(permission);
  /hardware/qcom/display/msm8960/libqservice/
IQService.cpp 94 const bool permission = (callerUid == AID_MEDIA); local
98 if(!permission) {
110 if(!permission) {

Completed in 559 milliseconds

1 23 4 5 6 7 8 91011>>