/cts/tests/tests/permission/src/android/permission/cts/ |
NoKeyPermissionTest.java | 17 package android.permission.cts; 42 * <p>Requires Permission: 43 * {@link android.Manifest.permission#DISABLE_KEYGUARD}. 62 * <p>Requires Permission: 63 * {@link android.Manifest.permission#DISABLE_KEYGUARD}. 82 * <p>Requires Permission: 83 * {@link android.Manifest.permission#DISABLE_KEYGUARD}.
|
NoNetworkStatePermissionTest.java | 17 package android.permission.cts; 43 * <p>Requires Permission: 44 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}. 59 * <p>Requires Permission: 60 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}. 75 * <p>Requires Permission: 76 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
|
NoReadLogsPermissionTest.java | 17 package android.permission.cts; 37 * Verify that we'll only get our logs without the READ_LOGS permission. 63 // no permission get an empty log buffer.
|
PackageManagerRequiringPermissionsTest.java | 17 package android.permission.cts; 44 * Verify that PackageManager.setApplicationEnabledSetting requires permission. 45 * <p>Requires Permission: 46 * {@link android.Manifest.permission#CHANGE_COMPONENT_ENABLED_STATE}. 61 * Verify that PackageManager.addPreferredActivity requires permission. 62 * <p>Requires Permission: 63 * {@link android.Manifest.permission#SET_PREFERRED_APPLICATIONS}. 78 * Verify that PackageManager.clearPackagePreferredActivities requires permission. 79 * <p>Requires Permission: 80 * {@link android.Manifest.permission#SET_PREFERRED_APPLICATIONS} [all...] |
NoCaptureVideoPermissionTest.java | 17 package android.permission.cts; 29 * Verify the capture system video output permission requirements. 40 * <p>Requires Permission: 41 * {@link android.Manifest.permission#CAPTURE_VIDEO_OUTPUT} or 42 * {@link android.Manifest.permission#CAPTURE_SECURE_VIDEO_OUTPUT}. 64 * <p>Requires Permission: 65 * {@link android.Manifest.permission#CAPTURE_SECURE_VIDEO_OUTPUT}.
|
NoSystemFunctionPermissionTest.java | 18 package android.permission.cts; 44 * <p>Requires Permission: 45 * {@link android.Manifest.permission#RESTART_PACKAGES}. 62 * <p>Requires Permission: 63 * {@link android.Manifest.permission#SET_TIME_ZONE}. 82 * <p>Requires Permission: 83 * {@link android.Manifest.permission#SET_WALLPAPER}. 119 * <p>Requires Permission: 120 * {@link android.Manifest.permission#VIBRATE}. 152 * <p>Requires Permission [all...] |
NoWakeLockPermissionTest.java | 18 package android.permission.cts; 46 * <p>Requires Permission: 47 * {@link android.Manifest.permission#WAKE_LOCK}. 65 * <p>Requires Permission: 66 * {@link android.Manifest.permission#WAKE_LOCK}. 84 * <p>Requires Permission: 85 * {@link android.Manifest.permission#WAKE_LOCK}. 99 * <p>Requires Permission: 100 * {@link android.Manifest.permission#WAKE_LOCK}.
|
TvPermissionTest.java | 17 package android.permission.cts; 49 fail("Accessing " + tableName + " table should require WRITE_EPG_DATA permission."); 59 fail("Accessing " + tableName + " table should require WRITE_EPG_DATA permission."); 68 fail("Accessing " + tableName + " table should require WRITE_EPG_DATA permission.");
|
/device/linaro/bootloader/edk2/SecurityPkg/Include/Library/ |
Tpm12CommandLib.h | 76 TPM_NV_ATTRIBUTES permission;
member in struct:__anon11528
|
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
VibratorServicePermissionTest.java | 17 package com.android.framework.permission.tests; 46 * <p>Tests permission: 47 * {@link android.Manifest.permission#VIBRATE} 64 * <p>Tests permission: 65 * {@link android.Manifest.permission#VIBRATE}
|
PmPermissionsTests.java | 17 package com.android.framework.permission.tests; 29 private String mPkgName = "com.android.framework.permission.tests"; 38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission 39 * android.permission.GET_PACKAGE_SIZE 53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission 54 * android.permission.DELETE_CACHE_FILES 68 * This test verifies that PackageManger.installPackage enforces permission 69 * android.permission.INSTALL_PACKAGES 76 * enforces permission android.permission.CLEAR_APP_CACH [all...] |
/frameworks/native/services/vr/virtual_touchpad/ |
VirtualTouchpadService.cpp | 17 const String16 kDumpPermission("android.permission.DUMP"); 18 const String16 kTouchPermission("android.permission.RESTRICTED_VR_ACCESS"); 108 result.appendFormat("Permission denial: can't dump " LOG_TAG 136 const bool permission = PermissionCache::checkPermission(kTouchPermission, *out_pid, uid); local 137 if (!permission) { 138 ALOGE("permission denied to pid=%ld uid=%ld", static_cast<long>(*out_pid), 141 return permission;
|
/hardware/qcom/display/msm8084/libqservice/ |
IQService.cpp | 97 const bool permission = (callerUid == AID_MEDIA || local 127 if(!permission) {
|
/hardware/qcom/display/msm8226/libqservice/ |
IQService.cpp | 88 const bool permission = (callerUid == AID_MEDIA || local 106 if(!permission) {
|
/hardware/qcom/display/msm8994/libqservice/ |
IQService.cpp | 88 const bool permission = (callerUid == AID_MEDIA || local 106 if(!permission) {
|
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/ui/ |
ConfirmActionDialogFragment.java | 17 package com.android.packageinstaller.permission.ui;
|
ManagePermissionsActivity.java | 17 package com.android.packageinstaller.permission.ui; 27 import com.android.packageinstaller.permission.ui.handheld.ManageStandardPermissionsFragment; 28 import com.android.packageinstaller.permission.ui.wear.AppPermissionsFragmentWear; 53 fragment = com.android.packageinstaller.permission.ui.television 68 fragment = com.android.packageinstaller.permission.ui.auto 73 fragment = com.android.packageinstaller.permission.ui.television 79 fragment = com.android.packageinstaller.permission.ui.handheld 82 fragment = com.android.packageinstaller.permission.ui.handheld 96 fragment = com.android.packageinstaller.permission.ui.television 99 fragment = com.android.packageinstaller.permission.ui.handhel [all...] |
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/ui/handheld/ |
RestrictedSwitchPreference.java | 17 package com.android.packageinstaller.permission.ui.handheld;
|
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/ui/television/ |
SettingsWithHeader.java | 17 package com.android.packageinstaller.permission.ui.television;
|
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/model/ |
AppPermissionGroup.java | 17 package com.android.packageinstaller.permission.model; 35 import com.android.packageinstaller.permission.utils.ArrayUtils; 36 import com.android.packageinstaller.permission.utils.LocationUtils; 45 private static final String KILL_REASON_APP_OP_CHANGE = "Permission related app op changed"; 60 private final ArrayMap<String, Permission> mPermissions = new ArrayMap<>(); 150 // Don't allow toggling non-platform permission groups for legacy apps via app ops. 170 Permission permission = new Permission(requestedPermission, granted, local 172 group.addPermission(permission); 248 Permission permission = mPermissions.valueAt(i); local 259 Permission permission = mPermissions.valueAt(i); local 273 Permission permission = mPermissions.valueAt(i); local 336 Permission permission = mPermissions.valueAt(i); local 565 Permission permission = mPermissions.valueAt(i); local 583 Permission permission = mPermissions.valueAt(i); local 592 Permission permission = mPermissions.valueAt(i); local 603 Permission permission = mPermissions.valueAt(i); local 614 Permission permission = mPermissions.valueAt(i); local 625 Permission permission = mPermissions.valueAt(i); local 690 mPermissions.put(permission.getName(), permission); local [all...] |
/frameworks/base/core/java/android/content/pm/ |
ServiceInfo.java | 31 * Optional name of a permission required to be able to access this 32 * Service. From the "permission" attribute. 34 public String permission; field in class:ServiceInfo 85 permission = orig.permission; 96 pw.println(prefix + "permission=" + permission); 113 dest.writeString(permission); 129 permission = source.readString();
|
/frameworks/compile/mclinker/lib/Core/ |
Linker.cpp | 259 FileHandle::Permission permission; local 263 permission = FileHandle::Permission(0x644); 268 permission = FileHandle::Permission(0x755); 274 bool result = file.open(sys::fs::Path(pPath), open_mode, permission);
|
/frameworks/native/libs/binder/ |
IAppOpsService.cpp | 117 virtual int32_t permissionToOpCode(const String16& permission) { 120 data.writeString16(permission); 205 String16 permission = data.readString16(); local 206 const int32_t opCode = permissionToOpCode(permission);
|
IPermissionController.cpp | 39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) 43 data.writeString16(permission); 84 virtual bool isRuntimePermission(const String16& permission) 88 data.writeString16(permission); 118 String16 permission = data.readString16(); local 121 bool res = checkPermission(permission, pid, uid); 154 String16 permission = data.readString16(); local 155 const bool res = isRuntimePermission(permission);
|
/hardware/qcom/display/msm8960/libqservice/ |
IQService.cpp | 94 const bool permission = (callerUid == AID_MEDIA); local 98 if(!permission) { 110 if(!permission) {
|