/aosp12/frameworks/base/core/tests/coretests/src/android/content/pm/ |
H A D | AppsQueryHelperTests.java | 43 apps = mAppsQueryHelper.queryApps(0, false, UserHandle.SYSTEM); in testQueryAppsSystemAppsOnly() 58 List<String> apps = mAppsQueryHelper.queryApps( in testQueryAppsInteractAcrossUser() local 60 assertEqualsIgnoreOrder(Arrays.asList("sys_app1"), apps); in testQueryAppsInteractAcrossUser() 62 apps = mAppsQueryHelper.queryApps( in testQueryAppsInteractAcrossUser() 64 assertEqualsIgnoreOrder(Arrays.asList("sys_app1"), apps); in testQueryAppsInteractAcrossUser() 68 List<String> apps = mAppsQueryHelper.queryApps( in testQueryApps() local 74 apps = mAppsQueryHelper.queryApps( in testQueryApps() 85 assertEqualsIgnoreOrder(Arrays.asList("sys_app1"), apps); in testQueryAppsImes() 90 assertEqualsIgnoreOrder(Arrays.asList("sys_app1", "app4"), apps); in testQueryAppsImes() 97 assertEqualsIgnoreOrder(Arrays.asList("sys_app3"), apps); in testQueryAppsRequiredForSystemUser() [all …]
|
/aosp12/system/chre/apps/ |
H A D | apps.mk | 12 include apps/audio_world/audio_world.mk 16 include apps/gnss_world/gnss_world.mk 20 include apps/wifi_world/wifi_world.mk 24 include apps/wwan_world/wwan_world.mk 27 include apps/debug_dump_world/debug_dump_world.mk 28 include apps/hello_world/hello_world.mk 30 include apps/message_world/message_world.mk 31 include apps/sensor_world/sensor_world.mk 32 include apps/spammer/spammer.mk 33 include apps/timer_world/timer_world.mk [all …]
|
/aosp12/packages/apps/Car/Settings/tests/robotests/src/com/android/car/settings/applications/ |
H A D | ApplicationListItemManagerTest.java | 97 apps.add(appEntry); in onRebuildComplete_shouldNotifyRegisteredListener() 101 mApplicationListItemManager.onRebuildComplete(apps); in onRebuildComplete_shouldNotifyRegisteredListener() 103 verify(mAppListItemListener1).onDataLoaded(apps); in onRebuildComplete_shouldNotifyRegisteredListener() 104 verify(mAppListItemListener2).onDataLoaded(apps); in onRebuildComplete_shouldNotifyRegisteredListener() 119 apps.add(appEntry); in onRebuildComplete_unRegisterOneListener_shouldNotifyRegisteredListener() 124 mApplicationListItemManager.onRebuildComplete(apps); in onRebuildComplete_unRegisterOneListener_shouldNotifyRegisteredListener() 126 verify(mAppListItemListener1).onDataLoaded(apps); in onRebuildComplete_unRegisterOneListener_shouldNotifyRegisteredListener() 143 apps.add(appEntry); in onRebuildComplete_calledAgainImmediately_shouldNotRunSecondCallImmediately() 146 mApplicationListItemManager.onRebuildComplete(apps); in onRebuildComplete_calledAgainImmediately_shouldNotRunSecondCallImmediately() 147 mApplicationListItemManager.onRebuildComplete(apps); in onRebuildComplete_calledAgainImmediately_shouldNotRunSecondCallImmediately() [all …]
|
/aosp12/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/ |
H A D | OverlayPackagesProviderTest.java | 374 private void setRequiredAppsManagedDevice(String... apps) { in setRequiredAppsManagedDevice() argument 375 setStringArray(R.array.required_apps_managed_device, apps); in setRequiredAppsManagedDevice() 382 private void setDisallowedAppsManagedDevice(String... apps) { in setDisallowedAppsManagedDevice() argument 390 private void setRequiredAppsManagedProfile(String... apps) { in setRequiredAppsManagedProfile() argument 398 private void setDisallowedAppsManagedProfile(String... apps) { in setDisallowedAppsManagedProfile() argument 406 private void setRequiredAppsManagedUser(String... apps) { in setRequiredAppsManagedUser() argument 407 setStringArray(R.array.required_apps_managed_user, apps); in setRequiredAppsManagedUser() 410 private void setVendorRequiredAppsManagedUser(String... apps) { in setVendorRequiredAppsManagedUser() argument 414 private void setDisallowedAppsManagedUser(String... apps) { in setDisallowedAppsManagedUser() argument 444 private void setSystemAppsWithLauncher(String... apps) { in setSystemAppsWithLauncher() argument [all …]
|
/aosp12/packages/apps/Tag/src/com/android/apps/tag/message/ |
H A D | NdefMessageParser.java | 17 package com.android.apps.tag.message; 19 import com.android.apps.tag.record.ImageRecord; 20 import com.android.apps.tag.record.MimeRecord; 21 import com.android.apps.tag.record.ParsedNdefRecord; 22 import com.android.apps.tag.record.SmartPoster; 23 import com.android.apps.tag.record.TextRecord; 24 import com.android.apps.tag.record.UnknownRecord; 25 import com.android.apps.tag.record.UriRecord; 26 import com.android.apps.tag.record.VCardRecord;
|
/aosp12/packages/apps/Settings/tests/robotests/src/com/android/settings/applications/ |
H A D | AppStateNotificationBridgeTest.java | 210 ArrayList<AppEntry> apps = new ArrayList<>(); in testLoadAllExtraInfo_noEvents() local 211 apps.add(getMockAppEntry(PKG1)); in testLoadAllExtraInfo_noEvents() 212 when(mSession.getAllApps()).thenReturn(apps); in testLoadAllExtraInfo_noEvents() 238 ArrayList<AppEntry> apps = new ArrayList<>(); in testLoadAllExtraInfo_multipleEventsAgg() local 239 apps.add(getMockAppEntry(PKG1)); in testLoadAllExtraInfo_multipleEventsAgg() 240 when(mSession.getAllApps()).thenReturn(apps); in testLoadAllExtraInfo_multipleEventsAgg() 272 ArrayList<AppEntry> apps = new ArrayList<>(); in testLoadAllExtraInfo_multiplePkgs() local 273 apps.add(getMockAppEntry(PKG1)); in testLoadAllExtraInfo_multiplePkgs() 274 apps.add(getMockAppEntry(PKG2)); in testLoadAllExtraInfo_multiplePkgs() 325 apps.add(owner); in testLoadAllExtraInfo_multipleUsers() [all …]
|
/aosp12/packages/modules/StatsD/statsd/tests/ |
H A D | UidMap_test.cpp | 69 vector<String16> apps; in TEST() local 79 apps.push_back(String16(kApp1.c_str())); in TEST() 80 apps.push_back(String16(kApp2.c_str())); in TEST() 101 vector<String16> apps; in TEST() local 111 apps.push_back(String16(kApp1.c_str())); in TEST() 196 vector<String16> apps; in TEST() local 228 vector<String16> apps; in TEST() local 256 vector<String16> apps; in TEST() local 299 vector<String16> apps; in TEST() local 365 vector<String16> apps; in TEST() local [all …]
|
/aosp12/packages/apps/TvSettings/Settings/src/com/android/tv/settings/enterprise/ |
H A D | EnterpriseSetDefaultAppsListPreferenceController.java | 36 import com.android.tv.settings.enterprise.apps.EnterpriseDefaultApps; 37 import com.android.tv.settings.enterprise.apps.UserAppInfo; 90 List<UserAppInfo> apps = in buildAppList() local 93 if (apps.isEmpty()) { in buildAppList() 98 mUsers.add(apps.get(0).userInfo); in buildAppList() 103 for (UserAppInfo userAppInfo : apps) { in buildAppList() 166 final CharSequence[] appNames = new String[apps.size()]; in buildSummaryString() 167 for (int i = 0; i < apps.size(); i++) { in buildSummaryString() 168 appNames[i] = apps.get(i).loadLabel(mPm); in buildSummaryString() 170 if (apps.size() == 1) { in buildSummaryString() [all …]
|
/aosp12/packages/apps/Launcher3/quickstep/src/com/android/quickstep/ |
H A D | RemoteAnimationTargets.java | 35 public final RemoteAnimationTargetCompat[] apps; field in RemoteAnimationTargets 43 public RemoteAnimationTargets(RemoteAnimationTargetCompat[] apps, in RemoteAnimationTargets() argument 48 if (apps != null) { in RemoteAnimationTargets() 49 for (RemoteAnimationTargetCompat target : apps) { in RemoteAnimationTargets() 59 this.unfilteredApps = apps; in RemoteAnimationTargets() 60 this.apps = filteredApps.toArray(new RemoteAnimationTargetCompat[filteredApps.size()]); in RemoteAnimationTargets() 68 for (RemoteAnimationTargetCompat target : apps) { in findTask() 94 return apps.length > 0 ? apps[0] : null; in getFirstAppTarget()
|
/aosp12/system/sepolicy/prebuilts/api/29.0/private/ |
H A D | app_neverallows.te | 25 # Do not allow untrusted apps to register services. 30 # Do not allow untrusted apps to use VendorBinder 50 # Block calling execve() on files in an apps home directory. 63 # Exempt legacy apps (targetApi<=28) for compatibility. 80 # Do not allow untrusted apps to hard link to any files. 84 # bugs, so we want to ensure untrusted apps never have this 115 # Do not allow untrusted apps access to /cache 128 -app_data_file # The apps sandbox itself 233 # Binder service which apps were permitted to access. 304 # SELinux is not an API for untrusted apps to use [all …]
|
/aosp12/packages/apps/Settings/tests/robotests/src/com/android/settings/applications/specialaccess/pictureinpicture/ |
H A D | PictureInPictureSettingsTest.java | 94 List<Pair<ApplicationInfo, Integer>> apps = mFragment.collectPipApps(PRIMARY_USER_ID); in testCollectPipApps() local 95 assertThat(containsPackages(apps, primaryP1, profileP2)).isTrue(); in testCollectPipApps() 96 assertThat(containsPackages(apps, primaryP2, profileP1)).isFalse(); in testCollectPipApps() 115 List<Pair<ApplicationInfo, Integer>> apps = mFragment.collectPipApps(PRIMARY_USER_ID); in testAppSort() local 116 apps.sort(new PictureInPictureSettings.AppComparator(null)); in testAppSort() 117 assertThat(isOrdered(apps, primaryP1, profileP1, primaryP2, profileP2, primaryP3)).isTrue(); in testAppSort() 120 private boolean containsPackages(List<Pair<ApplicationInfo, Integer>> apps, in containsPackages() argument 124 for (Pair<ApplicationInfo, Integer> app : apps) { in containsPackages() 137 private boolean isOrdered(List<Pair<ApplicationInfo, Integer>> apps, PackageInfo... packages) { in isOrdered() argument 138 if (apps.size() != packages.length) { in isOrdered() [all …]
|
/aosp12/system/sepolicy/prebuilts/api/28.0/private/ |
H A D | app_neverallows.te | 25 # Do not allow untrusted apps to register services. 30 # Do not allow untrusted apps to use VendorBinder 34 # Do not allow untrusted apps to connect to the property service 54 # Do not allow untrusted apps to hard link to any files. 58 # bugs, so we want to ensure untrusted apps never have this 85 # Do not allow untrusted apps access to /cache 98 -app_data_file # The apps sandbox itself 111 # Do not allow untrusted apps to directly open tun_device 139 # Do not allow untrusted apps access to preloads data files 175 # Binder service which apps were permitted to access. [all …]
|
H A D | untrusted_app_all.te | 5 ### apps which target the v2 security sandbox (ephemeral_app for instant apps, 6 ### untrusted_v2_app for fully installed v2 apps). 14 ### attribute is assigned to all non-system apps as well as to any system apps 27 # Some apps ship with shared libraries and binaries that they write out 39 # TODO: Long term, we don't want apps probing into shell data files. 105 # Allow apps to view preloaded media content 110 # Allow untrusted apps read / execute access to /vendor/app for there can 111 # be pre-installed vendor apps that package a library within themselves. 113 # apps. 130 # Used by: https://play.google.com/store/apps/details?id=jackpal.androidterm [all …]
|
/aosp12/system/sepolicy/prebuilts/api/30.0/private/ |
H A D | app_neverallows.te | 27 # Do not allow untrusted apps to register services. 32 # Do not allow untrusted apps to use VendorBinder 51 # Block calling execve() on files in an apps home directory. 64 # Exempt legacy apps (targetApi<=28) for compatibility. 81 # Do not allow untrusted apps to hard link to any files. 85 # bugs, so we want to ensure untrusted apps never have this 124 # Do not allow untrusted apps access to /cache 137 -app_data_file # The apps sandbox itself 239 # SELinux is not an API for untrusted apps to use 250 # Untrusted apps are not allowed to use cgroups. [all …]
|
/aosp12/packages/apps/TvSettings/Settings/src/com/android/tv/settings/device/apps/specialaccess/ |
H A D | ManageApplicationsController.java | 17 package com.android.tv.settings.device.apps.specialaccess; 67 public void onRebuildComplete(ArrayList<ApplicationsState.AppEntry> apps) { 68 updateAppList(apps); 117 ArrayList<ApplicationsState.AppEntry> apps = mAppSession.rebuild(filter, mComparator); in updateAppList() local 118 if (apps != null) { in updateAppList() 119 updateAppList(apps); in updateAppList() 123 private void updateAppList(ArrayList<ApplicationsState.AppEntry> apps) { in updateAppList() argument 125 final List<Preference> newList = new ArrayList<>(apps.size() + 1); in updateAppList() 126 for (final ApplicationsState.AppEntry entry : apps) { in updateAppList()
|
/aosp12/system/sepolicy/prebuilts/api/31.0/private/ |
H A D | app_neverallows.te | 30 # Do not allow untrusted apps to register services. 35 # Do not allow untrusted apps to use VendorBinder 57 # Block calling execve() on files in an apps home directory. 70 # Exempt legacy apps (targetApi<=28) for compatibility. 87 # Do not allow untrusted apps to hard link to any files. 91 # bugs, so we want to ensure untrusted apps never have this 130 # Do not allow untrusted apps access to /cache 143 -app_data_file # The apps sandbox itself 221 # SELinux is not an API for untrusted apps to use 232 # Untrusted apps are not allowed to use cgroups. [all …]
|
/aosp12/system/sepolicy/prebuilts/api/32.0/private/ |
H A D | app_neverallows.te | 30 # Do not allow untrusted apps to register services. 35 # Do not allow untrusted apps to use VendorBinder 57 # Block calling execve() on files in an apps home directory. 70 # Exempt legacy apps (targetApi<=28) for compatibility. 87 # Do not allow untrusted apps to hard link to any files. 91 # bugs, so we want to ensure untrusted apps never have this 130 # Do not allow untrusted apps access to /cache 143 -app_data_file # The apps sandbox itself 221 # SELinux is not an API for untrusted apps to use 232 # Untrusted apps are not allowed to use cgroups. [all …]
|
/aosp12/system/sepolicy/private/ |
H A D | app_neverallows.te | 30 # Do not allow untrusted apps to register services. 35 # Do not allow untrusted apps to use VendorBinder 57 # Block calling execve() on files in an apps home directory. 70 # Exempt legacy apps (targetApi<=28) for compatibility. 87 # Do not allow untrusted apps to hard link to any files. 91 # bugs, so we want to ensure untrusted apps never have this 130 # Do not allow untrusted apps access to /cache 143 -app_data_file # The apps sandbox itself 221 # SELinux is not an API for untrusted apps to use 232 # Untrusted apps are not allowed to use cgroups. [all …]
|
/aosp12/packages/apps/Settings/src/com/android/settings/enterprise/ |
H A D | EnterpriseSetDefaultAppsListPreferenceController.java | 85 List<UserAppInfo> apps = mApplicationFeatureProvider. in buildAppList() local 88 if (apps.isEmpty()) { in buildAppList() 93 mUsers.add(apps.get(0).userInfo); in buildAppList() 98 for (UserAppInfo userAppInfo : apps) { in buildAppList() 142 EnumMap<EnterpriseDefaultApps, List<ApplicationInfo>> apps) { in createPreferences() argument 147 final List<ApplicationInfo> appsForCategory = apps.get(typeOfDefault); in createPreferences() 161 final CharSequence[] appNames = new String[apps.size()]; in buildSummaryString() 162 for (int i = 0; i < apps.size(); i++) { in buildSummaryString() 163 appNames[i] = apps.get(i).loadLabel(mPm); in buildSummaryString() 165 if (apps.size() == 1) { in buildSummaryString() [all …]
|
/aosp12/system/sepolicy/prebuilts/api/27.0/private/ |
H A D | app_neverallows.te | 24 # Do not allow untrusted apps to register services. 29 # Do not allow untrusted apps to use VendorBinder 39 # Do not allow untrusted apps to be assigned mlstrustedsubject. 49 # Do not allow untrusted apps to hard link to any files. 53 # bugs, so we want to ensure untrusted apps never have this 74 # Do not allow untrusted apps access to /cache 89 -app_data_file # The apps sandbox itself 102 # Do not allow untrusted apps to directly open tun_device 116 # Do not allow untrusted apps access to preloads data files 152 # Binder service which apps were permitted to access. [all …]
|
/aosp12/system/sepolicy/prebuilts/api/26.0/private/ |
H A D | app_neverallows.te | 19 # Do not allow untrusted apps to register services. 24 # Do not allow untrusted apps to use VendorBinder 28 # Do not allow untrusted apps to connect to the property service 34 # Do not allow untrusted apps to be assigned mlstrustedsubject. 44 # Do not allow untrusted apps to hard link to any files. 48 # bugs, so we want to ensure untrusted apps never have this 69 # Do not allow untrusted apps access to /cache 84 -app_data_file # The apps sandbox itself 97 # Do not allow untrusted apps to directly open tun_device 111 # Do not allow untrusted apps access to preloads data files [all …]
|
/aosp12/packages/apps/Settings/tests/robotests/src/com/android/settings/applications/specialaccess/interactacrossprofiles/ |
H A D | InteractAcrossProfilesSettingsTest.java | 87 List<Pair<ApplicationInfo, UserHandle>> apps = in collectConfigurableApps_fromPersonal_returnsCombinedPackages() local 91 assertThat(apps.size()).isEqualTo(2); in collectConfigurableApps_fromPersonal_returnsCombinedPackages() 92 assertTrue(apps.stream().anyMatch( in collectConfigurableApps_fromPersonal_returnsCombinedPackages() 94 assertTrue(apps.stream().anyMatch( in collectConfigurableApps_fromPersonal_returnsCombinedPackages() 113 List<Pair<ApplicationInfo, UserHandle>> apps = in collectConfigurableApps_fromWork_returnsCombinedPackages() local 117 assertThat(apps.size()).isEqualTo(2); in collectConfigurableApps_fromWork_returnsCombinedPackages() 118 assertTrue(apps.stream().anyMatch( in collectConfigurableApps_fromWork_returnsCombinedPackages() 120 assertTrue(apps.stream().anyMatch( in collectConfigurableApps_fromWork_returnsCombinedPackages() 132 List<Pair<ApplicationInfo, UserHandle>> apps = in collectConfigurableApps_onlyOneProfile_returnsEmpty() local 136 assertThat(apps).isEmpty(); in collectConfigurableApps_onlyOneProfile_returnsEmpty()
|
/aosp12/packages/apps/TvSettings/Settings/src/com/android/tv/settings/device/apps/ |
H A D | AllAppsFragment.java | 16 package com.android.tv.settings.device.apps; 171 updateAppList(mOtherPreferenceGroup, apps); in onActivityCreated() 195 ArrayList<ApplicationsState.AppEntry> apps = in rebuildInstalled() local 197 if (apps != null) { in rebuildInstalled() 198 updateAppList(mInstalledPreferenceGroup, apps); in rebuildInstalled() 203 ArrayList<ApplicationsState.AppEntry> apps = in rebuildDisabled() local 205 if (apps != null) { in rebuildDisabled() 206 updateAppList(mDisabledPreferenceGroup, apps); in rebuildDisabled() 211 ArrayList<ApplicationsState.AppEntry> apps = in rebuildOther() local 213 if (apps != null) { in rebuildOther() [all …]
|
/aosp12/art/tools/jvmti-agents/simple-profile/ |
H A D | README.md | 34 blueline:/data/data/com.google.android.apps.maps # cp /data/local/tmp/libsimpleprofileds.so . 35 blueline:/data/data/com.google.android.apps.maps # ps -A | grep maps 36 u0_a178 9143 927 15691440 190132 SyS_epoll_wait 0 S com.google.android.apps.maps 37 blueline:/data/data/com.google.android.apps.maps # cmd activity attach-agent com.google.android.app… 38 blueline:/data/data/com.google.android.apps.maps # # Do things on the app. 39 blueline:/data/data/com.google.android.apps.maps # kill -3 9143 40 blueline:/data/data/com.google.android.apps.maps # wc -l maps.json 42 blueline:/data/data/com.google.android.apps.maps # ^D 43 % adb pull /data/data/com.google.android.apps.maps/maps.json
|
/aosp12/frameworks/base/packages/BackupEncryption/test/robolectric/src/com/android/server/backup/encryption/keys/ |
H A D | TertiaryKeyRotationSchedulerTest.java | 133 List<String> apps = makeTestApps(MAXIMUM_ROTATIONS_PER_WINDOW * MAX_BACKUPS_TILL_ROTATION); in isKeyRotationDue_neverAllowsMoreThanInWindow() local 139 for (String app : apps) { in isKeyRotationDue_neverAllowsMoreThanInWindow() 154 List<String> apps = makeTestApps(MAXIMUM_ROTATIONS_PER_WINDOW * MAX_BACKUPS_TILL_ROTATION); in isKeyRotationDue_naturallyStaggersBackupsOverTime() local 157 for (String app : apps) { in isKeyRotationDue_naturallyStaggersBackupsOverTime() 164 for (String app : apps) { in isKeyRotationDue_naturallyStaggersBackupsOverTime() 174 for (String app : apps) { in isKeyRotationDue_naturallyStaggersBackupsOverTime() 183 ArrayList<String> apps = new ArrayList<>(); in makeTestApps() local 185 apps.add(String.format(Locale.US, "com.android.app%d", i)); in makeTestApps() 187 return apps; in makeTestApps()
|