/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
D | AlwaysOnVpnMultiStageTest.java | 59 final Set<String> whitelist = in testAlwaysOnSetAfterReboot() local 63 assertNotNull("whitelist is lost after reboot", whitelist); in testAlwaysOnSetAfterReboot() 65 Collections.singleton(mContext.getPackageName()), whitelist); in testAlwaysOnSetAfterReboot()
|
/cts/hostsidetests/devicepolicy/app/ManagedProfile/src/com/android/cts/managedprofile/ |
D | CrossProfileCalendarTest.java | 134 Set<String> whitelist = mDevicePolicyManager.getCrossProfileCalendarPackages( in testCrossProfileCalendarPackage() local 136 assertThat(whitelist).isEmpty(); in testCrossProfileCalendarPackage() 140 whitelist = mDevicePolicyManager.getCrossProfileCalendarPackages( in testCrossProfileCalendarPackage() 142 assertThat(whitelist.size()).isEqualTo(1); in testCrossProfileCalendarPackage() 143 assertThat(whitelist.contains(MANAGED_PROFILE_PKG)).isTrue(); in testCrossProfileCalendarPackage() 147 whitelist = mDevicePolicyManager.getCrossProfileCalendarPackages( in testCrossProfileCalendarPackage() 149 assertThat(whitelist).isEmpty(); in testCrossProfileCalendarPackage()
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/vpn/ |
D | VpnTestHelper.java | 108 boolean lockdown, boolean whitelist) { in waitForVpn() argument 133 setAlwaysOnVpn(context, packageName, lockdown, whitelist); in waitForVpn() 157 Context context, String packageName, boolean lockdown, boolean whitelist) in setAlwaysOnVpn() argument 162 lockdownWhitelist = whitelist ? in setAlwaysOnVpn()
|
/cts/tests/signature/intent-check/src/android/signature/cts/intent/ |
D | IntentTest.java | 180 Set<String> whitelist = new HashSet<>(); in getIntentWhitelist() local 188 whitelist.add(intent); in getIntentWhitelist() 191 return whitelist; in getIntentWhitelist()
|
/cts/tests/contentcaptureservice/src/android/contentcaptureservice/cts/ |
D | AbstractContentCaptureIntegrationTest.java | 223 @Nullable Pair<Set<String>, Set<ComponentName>> whitelist) throws InterruptedException { in enableService() argument 230 mServiceWatcher.whitelist(whitelist); in enableService()
|
D | CtsContentCaptureService.java | 509 public void whitelist(@Nullable Pair<Set<String>, Set<ComponentName>> whitelist) { in whitelist() argument 510 mWhitelist = whitelist; in whitelist() 519 whitelist(new Pair<>(pkgs, null)); in whitelistSelf()
|
/cts/tests/tests/permission2/src/android/permission2/cts/ |
D | PrivappPermissionsTest.java | 151 Set<String> whitelist = getPrivAppPermissions(packageName); in privappPermissionsNeedToBeWhitelisted() local 161 + getPrintableSet(" ", whitelist) in privappPermissionsNeedToBeWhitelisted() 174 Set<String> grantedNotInWhitelist = difference(granted, whitelist); in privappPermissionsNeedToBeWhitelisted()
|
D | RestrictedPermissionsTest.java | 789 private void assertWeCannotReadOrWriteWhileShellCanReadAndWrite(int whitelist) in assertWeCannotReadOrWriteWhileShellCanReadAndWrite() argument 793 packageManager.getWhitelistedRestrictedPermissions(PKG, whitelist); in assertWeCannotReadOrWriteWhileShellCanReadAndWrite() 800 permission.SEND_SMS, whitelist); in assertWeCannotReadOrWriteWhileShellCanReadAndWrite() 807 permission.SEND_SMS, whitelist); in assertWeCannotReadOrWriteWhileShellCanReadAndWrite() 809 whitelist)).contains(permission.SEND_SMS); in assertWeCannotReadOrWriteWhileShellCanReadAndWrite() 811 permission.SEND_SMS, whitelist); in assertWeCannotReadOrWriteWhileShellCanReadAndWrite() 813 whitelist)).doesNotContain(permission.SEND_SMS); in assertWeCannotReadOrWriteWhileShellCanReadAndWrite()
|
/cts/tests/tests/carrierapi/ |
D | Android.bp | 35 // This APK must be signed to match the test SIM's cert whitelist.
|
/cts/tests/AlarmManager/src/android/alarmmanager/cts/ |
D | AppStandbyTests.java | 469 private void setPowerWhitelisted(boolean whitelist) throws IOException { in setPowerWhitelisted() argument 471 cmd.append(whitelist ? "+" : "-"); in setPowerWhitelisted()
|