| From class ContextWrapper
                
                  
                    | Boolean | bindIsolatedService(service: Intent, flags: Int, instanceName: String, executor: Executor, conn: ServiceConnection) |  
                    | Boolean | bindService(service: Intent, flags: Context.BindServiceFlags, executor: Executor, conn: ServiceConnection)
                         See bindService(android.content.Intent,int,java.util.concurrent.Executor,android.content.ServiceConnection)CallBindServiceFlags.of(long)to obtain a BindServiceFlags object. |  
                    | Boolean | bindService(service: Intent, conn: ServiceConnection, flags: Context.BindServiceFlags)
                         See bindService(android.content.Intent,android.content.ServiceConnection,int)CallBindServiceFlags.of(long)to obtain a BindServiceFlags object. |  
                    | Boolean | bindService(service: Intent, conn: ServiceConnection, flags: Int) |  
                    | Boolean | bindService(service: Intent, flags: Int, executor: Executor, conn: ServiceConnection) |  
                    | Int | checkCallingOrSelfPermission(permission: String) |  
                    | Int | checkCallingOrSelfUriPermission(uri: Uri!, modeFlags: Int) |  
                    | IntArray | checkCallingOrSelfUriPermissions(uris: MutableList<Uri!>, modeFlags: Int)
                         Determine whether the calling process of an IPC or you has been granted permission to access a list of URIs. This is the same as checkCallingUriPermission, except it grants your own permissions if you are not currently processing an IPC. Use with care! |  
                    | Int | checkCallingPermission(permission: String) |  
                    | Int | checkCallingUriPermission(uri: Uri!, modeFlags: Int) |  
                    | IntArray | checkCallingUriPermissions(uris: MutableList<Uri!>, modeFlags: Int)
                         Determine whether the calling process and uid has been granted permission to access a list of URIs. This is basically the same as calling checkUriPermissions(java.util.List,int,int,int)with the pid and uid returned byandroid.os.Binder#getCallingPidandandroid.os.Binder#getCallingUid. One important difference is that if you are not currently processing an IPC, this function will always fail. |  
                    | Int | checkContentUriPermissionFull(uri: Uri, pid: Int, uid: Int, modeFlags: Int)
                         Determine whether a particular process and uid has been granted permission to access a specific content URI.  Unlike checkUriPermission(android.net.Uri,int,int,int), this method checks for general access to the URI's content provider, as well as explicitly granted permissions. Note, this check will throw an IllegalArgumentExceptionfor non-content URIs. |  
                    | Int | checkPermission(permission: String, pid: Int, uid: Int) |  
                    | Int | checkSelfPermission(permission: String) |  
                    | Int | checkUriPermission(uri: Uri!, pid: Int, uid: Int, modeFlags: Int) |  
                    | Int | checkUriPermission(uri: Uri?, readPermission: String?, writePermission: String?, pid: Int, uid: Int, modeFlags: Int)
                         Check both a Uri and normal permission. This allows you to perform both checkPermissionand #checkUriPermission in one call. |  
                    | IntArray | checkUriPermissions(uris: MutableList<Uri!>, pid: Int, uid: Int, modeFlags: Int)
                         Determine whether a particular process and uid has been granted permission to access a list of URIs. This only checks for permissions that have been explicitly granted -- if the given process/uid has more general access to the URI's content provider then this check will always fail. Note: On SDK Version android.os.Build.VERSION_CODES#S, calling this method from a secondary-user's context will incorrectly returnPackageManager.PERMISSION_DENIEDfor all {code uris}. |  
                    | Unit | clearWallpaper() |  
                    | Context | createAttributionContext(attributionTag: String?)
                         Return a new Context object for the current Context but attribute to a different tag. In complex apps attribution tagging can be used to distinguish between separate logical parts. |  
                    | Context! | createConfigurationContext(overrideConfiguration: Configuration) |  
                    | Context | createContext(contextParams: ContextParams)
                         Creates a context with specific properties and behaviors. |  
                    | Context | createDeviceContext(deviceId: Int)
                         Returns a new Contextobject from the current context but with device association given by thedeviceId. Each call to this method returns a new instance of a context object. Context objects are not shared; however, common state (such as theClassLoaderand other resources for the same configuration) can be shared, so theContextitself is lightweight.  Applications that run on virtual devices may use this method to access the default device capabilities and functionality (by passing Context.DEVICE_ID_DEFAULT. Similarly, applications running on the default device may access the functionality of virtual devices.  Note that the newly created instance will be associated with the same display as the parent Context, regardless of the device ID passed here.  |  
                    | Context! | createDeviceProtectedStorageContext() |  
                    | Context! | createDisplayContext(display: Display) |  
                    | Context! | createPackageContext(packageName: String!, flags: Int) |  
                    | Context | createWindowContext(display: Display, type: Int, options: Bundle?)
                         Creates a Contextfor a non-activitywindow on the givenDisplay.  Similar to createWindowContext(int,android.os.Bundle), but thedisplayis passed in, instead of implicitly using theoriginal Context's Display. |  
                    | Context | createWindowContext(type: Int, options: Bundle?)
                         Creates a Context for a non-activity window.   A window context is a context that can be used to add non-activity windows, such as android.view.WindowManager.LayoutParams#TYPE_APPLICATION_OVERLAY. A window context must be created from a context that has an associatedDisplay, such asActivityor a context created withcreateDisplayContext(android.view.Display).  The window context is created with the appropriate Configurationfor the area of the display that the windows created with it can occupy; it must be used wheninflatingviews, such that they can be inflated with properResources. Below is a sample code to add an application overlay window on the primary display: ...
  final DisplayManager dm = anyContext.getSystemService(DisplayManager.class);
  final Display primaryDisplay = dm.getDisplay(DEFAULT_DISPLAY);
  final Context windowContext = anyContext.createDisplayContext(primaryDisplay)
          .createWindowContext(TYPE_APPLICATION_OVERLAY, null);
  final View overlayView = Inflater.from(windowContext).inflate(someLayoutXml, null);
 
  // WindowManager.LayoutParams initialization
  ...
  // The types used in addView and createWindowContext must match.
  mParams.type = TYPE_APPLICATION_OVERLAY;
  ...
 
  windowContext.getSystemService(WindowManager.class).addView(overlayView, mParams);
   This context's configuration and resources are adjusted to an area of the display where the windows with provided type will be added. Note that all windows associated with the same context will have an affinity and can only be moved together between different displays or areas on a display. If there is a need to add different window types, or non-associated windows, separate Contexts should be used.   Creating a window context is an expensive operation. Misuse of this API may lead to a huge performance drop. The best practice is to use the same window context when possible. An approach is to create one window context with specific window type and display and use it everywhere it's needed.   After Build.VERSION_CODES.S, window context provides the capability to receive configuration changes for existing token by overriding thetokenof theandroid.view.WindowManager.LayoutParamspassed inWindowManager.addView(View, LayoutParams). This is useful when an application needs to attach its window to an existing activity for window token sharing use-case.  Note that the window context in Below is sample code to attach an existing token to a window context:Build.VERSION_CODES.Rdidn't have this capability. This is a no-op for the window context inBuild.VERSION_CODES.R. final DisplayManager dm = anyContext.getSystemService(DisplayManager.class);
  final Display primaryDisplay = dm.getDisplay(DEFAULT_DISPLAY);
  final Context windowContext = anyContext.createWindowContext(primaryDisplay,
          TYPE_APPLICATION, null);
 
  // Get an existing token.
  final IBinder existingToken = activity.getWindow().getAttributes().token;
 
  // The types used in addView() and createWindowContext() must match.
  final WindowManager.LayoutParams params = new WindowManager.LayoutParams(TYPE_APPLICATION);
  params.token = existingToken;
 
  // After WindowManager#addView(), the server side will extract the provided token from
  // LayoutParams#token (existingToken in the sample code), and switch to propagate
  // configuration changes from the node associated with the provided token.
  windowContext.getSystemService(WindowManager.class).addView(overlayView, mParams);
   After Build.VERSION_CODES.S, window context provides the capability to listen to itsConfigurationchanges by callingregisterComponentCallbacks(android.content.ComponentCallbacks), while other kinds ofContextwill register theComponentCallbackstoits. Note that window context only propagateComponentCallbacks.onConfigurationChanged(Configuration)callback.ComponentCallbacks.onLowMemory()or other callbacks inComponentCallbacks2won't be invoked.  Note that using android.app.Applicationorandroid.app.Servicecontext for UI-related queries may result in layout or continuity issues on devices with variable screen sizes (e.g. foldables) or in multi-window modes, since these non-UI contexts may not reflect theConfigurationchanges for the visual container. |  
                    | Array<String!>! | databaseList() |  
                    | Boolean | deleteDatabase(name: String!) |  
                    | Boolean | deleteFile(name: String!) |  
                    | Boolean | deleteSharedPreferences(name: String!) |  
                    | Unit | enforceCallingOrSelfPermission(permission: String, message: String?)
                         If neither you nor the calling process of an IPC you are handling has been granted a particular permission, throw a SecurityException. This is the same asenforceCallingPermission, except it grants your own permissions if you are not currently processing an IPC. Use with care! |  
                    | Unit | enforceCallingOrSelfUriPermission(uri: Uri!, modeFlags: Int, message: String!) |  
                    | Unit | enforceCallingPermission(permission: String, message: String?)
                         If the calling process of an IPC you are handling has not been granted a particular permission, throw a SecurityException. This is basically the same as callingenforcePermission(java.lang.String,int,int,java.lang.String)with the pid and uid returned byandroid.os.Binder#getCallingPidandandroid.os.Binder#getCallingUid. One important difference is that if you are not currently processing an IPC, this function will always throw the SecurityException. This is done to protect against accidentally leaking permissions; you can useenforceCallingOrSelfPermissionto avoid this protection. |  
                    | Unit | enforceCallingUriPermission(uri: Uri!, modeFlags: Int, message: String!) |  
                    | Unit | enforcePermission(permission: String, pid: Int, uid: Int, message: String?)
                         If the given permission is not allowed for a particular process and user ID running in the system, throw a SecurityException. |  
                    | Unit | enforceUriPermission(uri: Uri!, pid: Int, uid: Int, modeFlags: Int, message: String!) |  
                    | Unit | enforceUriPermission(uri: Uri?, readPermission: String?, writePermission: String?, pid: Int, uid: Int, modeFlags: Int, message: String?)
                         Enforce both a Uri and normal permission. This allows you to perform both enforcePermissionand #enforceUriPermission in one call. |  
                    | Array<String!>! | fileList() |  
                    | Context! | getApplicationContext() |  
                    | ApplicationInfo! | getApplicationInfo() |  
                    | AssetManager! | getAssets() |  
                    | AttributionSource | getAttributionSource() |  
                    | Context! | getBaseContext() |  
                    | File! | getCacheDir() |  
                    | ClassLoader! | getClassLoader() |  
                    | File! | getCodeCacheDir() |  
                    | ContentResolver! | getContentResolver() |  
                    | File! | getDataDir() |  
                    | File! | getDatabasePath(name: String!) |  
                    | Int | getDeviceId() |  
                    | File! | getDir(name: String!, mode: Int) |  
                    | Display! | getDisplay()
                         Get the display this context is associated with. Applications should use this method with android.app.Activityor a context associated with aDisplayviacreateDisplayContext(android.view.Display)to get a display object associated with a Context, orandroid.hardware.display.DisplayManager#getDisplayto get a display object by id. |  
                    | File? | getExternalCacheDir()
                         Returns absolute path to application-specific directory on the primary shared/external storage device where the application can place cache files it owns. These files are internal to the application, and not typically visible to the user as media.   This is like getCacheDir()in that these files will be deleted when the application is uninstalled, however there are some important differences:  If a shared storage device is emulated (as determined by Environment.isExternalStorageEmulated(File)), its contents are backed by a private user data partition, which means there is little benefit to storing data here instead of the private directory returned bygetCacheDir().  Starting in android.os.Build.VERSION_CODES#KITKAT, no permissions are required to read or write to the returned path; it's always accessible to the calling app. This only applies to paths generated for package name of the calling application. To access paths belonging to other packages,android.Manifest.permission#WRITE_EXTERNAL_STORAGEand/orandroid.Manifest.permission#READ_EXTERNAL_STORAGEare required.  On devices with multiple users (as described by UserManager), each user has their own isolated shared storage. Applications only have access to the shared storage for the user they're running as.  The returned path may change over time if different shared storage media is inserted, so only relative paths should be persisted. |  
                    | Array<File!>! | getExternalCacheDirs() |  
                    | File? | getExternalFilesDir(type: String?)
                         Returns the absolute path to the directory on the primary shared/external storage device where the application can place persistent files it owns. These files are internal to the applications, and not typically visible to the user as media.   This is like getFilesDir()in that these files will be deleted when the application is uninstalled, however there are some important differences:  If a shared storage device is emulated (as determined by Environment.isExternalStorageEmulated(File)), its contents are backed by a private user data partition, which means there is little benefit to storing data here instead of the private directories returned bygetFilesDir(), etc.  Starting in android.os.Build.VERSION_CODES#KITKAT, no permissions are required to read or write to the returned path; it's always accessible to the calling app. This only applies to paths generated for package name of the calling application. To access paths belonging to other packages,android.Manifest.permission#WRITE_EXTERNAL_STORAGEand/orandroid.Manifest.permission#READ_EXTERNAL_STORAGEare required.  On devices with multiple users (as described by UserManager), each user has their own isolated shared storage. Applications only have access to the shared storage for the user they're running as.  The returned path may change over time if different shared storage media is inserted, so only relative paths should be persisted.   Here is an example of typical code to manipulate a file in an application's shared storage:   If you supply a non-null type to this function, the returned file will be a path to a sub-directory of the given type. Though these files are not automatically scanned by the media scanner, you can explicitly add them to the media database with  MediaScannerConnection.scanFile. Note that this is not the same as Environment.getExternalStoragePublicDirectory(), which provides directories of media shared by all applications. The directories returned here are owned by the application, and their contents will be removed when the application is uninstalled. Unlike Environment.getExternalStoragePublicDirectory(), the directory returned here will be automatically created for you.  Here is an example of typical code to manipulate a picture in an application's shared storage and add it to the media database:  |  
                    | Array<File!>! | getExternalFilesDirs(type: String!) |  
                    | Array<File!>! | getExternalMediaDirs() |  
                    | File! | getFileStreamPath(name: String!) |  
                    | File! | getFilesDir() |  
                    | Executor! | getMainExecutor() |  
                    | Looper! | getMainLooper() |  
                    | File! | getNoBackupFilesDir() |  
                    | File! | getObbDir() |  
                    | Array<File!>! | getObbDirs() |  
                    | String! | getPackageCodePath() |  
                    | PackageManager! | getPackageManager() |  
                    | String! | getPackageName() |  
                    | String! | getPackageResourcePath() |  
                    | ContextParams? | getParams()
                         Return the set of parameters which this Context was created with, if it was created via createContext(android.content.ContextParams). |  
                    | Resources! | getResources() |  
                    | SharedPreferences! | getSharedPreferences(name: String!, mode: Int) |  
                    | Any! | getSystemService(name: String) |  
                    | String? | getSystemServiceName(serviceClass: Class<*>) |  
                    | Resources.Theme! | getTheme() |  
                    | Drawable! | getWallpaper() |  
                    | Int | getWallpaperDesiredMinimumHeight() |  
                    | Int | getWallpaperDesiredMinimumWidth() |  
                    | Unit | grantUriPermission(toPackage: String!, uri: Uri!, modeFlags: Int) |  
                    | Boolean | isDeviceProtectedStorage() |  
                    | Boolean | isRestricted() |  
                    | Boolean | moveDatabaseFrom(sourceContext: Context!, name: String!) |  
                    | Boolean | moveSharedPreferencesFrom(sourceContext: Context!, name: String!) |  
                    | FileInputStream! | openFileInput(name: String!) |  
                    | FileOutputStream! | openFileOutput(name: String!, mode: Int) |  
                    | SQLiteDatabase! | openOrCreateDatabase(name: String!, mode: Int, factory: SQLiteDatabase.CursorFactory!) |  
                    | SQLiteDatabase! | openOrCreateDatabase(name: String!, mode: Int, factory: SQLiteDatabase.CursorFactory!, errorHandler: DatabaseErrorHandler?)
                         Open a new private SQLiteDatabase associated with this Context's application package. Creates the database file if it doesn't exist.   Accepts input param: a concrete instance of DatabaseErrorHandlerto be used to handle corruption when sqlite reports database corruption. |  
                    | Drawable! | peekWallpaper() |  
                    | Unit | registerComponentCallbacks(callback: ComponentCallbacks!)
                         Add a new ComponentCallbacksto the base application of the Context, which will be called at the same times as the ComponentCallbacks methods of activities and other components are called. Note that you must be sure to useunregisterComponentCallbackswhen appropriate in the future; this will not be removed for you.  After Build.VERSION_CODES.TIRAMISU, theComponentCallbackswill be registered tothe base Context, and can be only used afterattachBaseContext(android.content.Context). Users can still call togetApplicationContext().registerComponentCallbacks(ComponentCallbacks)to addComponentCallbacksto the base application. |  
                    | Unit | registerDeviceIdChangeListener(executor: Executor, listener: IntConsumer)
                         Adds a new device ID changed listener to the Context, which will be called when the device association is changed by the system.  The callback can be called when an app is moved to a different device and the Contextis not explicitly associated with a specific device.  When an application receives a device id update callback, this Context is guaranteed to also have an updated display ID(if any) and Configuration. |  
                    | Intent? | registerReceiver(receiver: BroadcastReceiver?, filter: IntentFilter!)
                         Register a BroadcastReceiver to be run in the main activity thread. The receiver will be called with any broadcast Intent that matches filter, in the main application thread.  The system may broadcast Intents that are "sticky" -- these stay around after the broadcast has finished, to be sent to any later registrations. If your IntentFilter matches one of these sticky Intents, that Intent will be returned by this function and sent to your receiver as if it had just been broadcast.  There may be multiple sticky Intents that match filter, in which case each of these will be sent to receiver. In this case, only one of these can be returned directly by the function; which of these that is returned is arbitrarily decided by the system.  If you know the Intent you are registering for is sticky, you can supply null for your receiver. In this case, no receiver is registered -- the function simply returns the sticky Intent that matches filter. In the case of multiple matches, the same rules as described above apply.  See BroadcastReceiverfor more information on Intent broadcasts. As of android.os.Build.VERSION_CODES#UPSIDE_DOWN_CAKE, the system can place context-registered broadcasts in a queue while the app is in the cached state. When the app leaves the cached state, such as returning to the foreground, the system delivers any queued broadcasts. Multiple instances of certain broadcasts might be merged into one broadcast. As of android.os.Build.VERSION_CODES#ICE_CREAM_SANDWICH, receivers registered with this method will correctly respect theIntent.setPackage(String)specified for an Intent being broadcast. Prior to that, it would be ignored and delivered to all matching registered receivers. Be careful if using this for security. For apps targeting android.os.Build.VERSION_CODES#UPSIDE_DOWN_CAKE, eitherRECEIVER_EXPORTEDorRECEIVER_NOT_EXPORTEDmust be specified if the receiver is not being registered for system broadcasts or aSecurityExceptionwill be thrown. SeeregisterReceiver(android.content.BroadcastReceiver,android.content.IntentFilter,int)to register a receiver with flags. Note: this method cannot be called from a BroadcastReceivercomponent; that is, from a BroadcastReceiver that is declared in an application's manifest. It is okay, however, to call this method from another BroadcastReceiver that has itself been registered at run time with #registerReceiver, since the lifetime of such a registered BroadcastReceiver is tied to the object that registered it. |  
                    | Intent? | registerReceiver(receiver: BroadcastReceiver?, filter: IntentFilter!, flags: Int)
                         Register to receive intent broadcasts, with the receiver optionally being exposed to Instant Apps. See registerReceiver(android.content.BroadcastReceiver,android.content.IntentFilter)for more information. By default Instant Apps cannot interact with receivers in other applications, this allows you to expose a receiver that Instant Apps can interact with. See BroadcastReceiverfor more information on Intent broadcasts. As of android.os.Build.VERSION_CODES#UPSIDE_DOWN_CAKE, the system can place context-registered broadcasts in a queue while the app is in the cached state. When the app leaves the cached state, such as returning to the foreground, the system delivers any queued broadcasts. Multiple instances of certain broadcasts might be merged into one broadcast. As of android.os.Build.VERSION_CODES#ICE_CREAM_SANDWICH, receivers registered with this method will correctly respect theIntent.setPackage(String)specified for an Intent being broadcast. Prior to that, it would be ignored and delivered to all matching registered receivers. Be careful if using this for security. |  
                    | Intent? | registerReceiver(receiver: BroadcastReceiver?, filter: IntentFilter!, broadcastPermission: String?, scheduler: Handler?)
                         Register to receive intent broadcasts, to run in the context of scheduler. See registerReceiver(android.content.BroadcastReceiver,android.content.IntentFilter)for more information. This allows you to enforce permissions on who can broadcast intents to your receiver, or have the receiver run in a different thread than the main application thread. See BroadcastReceiverfor more information on Intent broadcasts. As of android.os.Build.VERSION_CODES#UPSIDE_DOWN_CAKE, the system can place context-registered broadcasts in a queue while the app is in the cached state. When the app leaves the cached state, such as returning to the foreground, the system delivers any queued broadcasts. Multiple instances of certain broadcasts might be merged into one broadcast. As of android.os.Build.VERSION_CODES#ICE_CREAM_SANDWICH, receivers registered with this method will correctly respect theIntent.setPackage(String)specified for an Intent being broadcast. Prior to that, it would be ignored and delivered to all matching registered receivers. Be careful if using this for security. For apps targeting android.os.Build.VERSION_CODES#UPSIDE_DOWN_CAKE, eitherRECEIVER_EXPORTEDorRECEIVER_NOT_EXPORTEDmust be specified if the receiver is not being registered for system broadcasts or aSecurityExceptionwill be thrown. SeeregisterReceiver(android.content.BroadcastReceiver,android.content.IntentFilter,java.lang.String,android.os.Handler,int)to register a receiver with flags. |  
                    | Intent? | registerReceiver(receiver: BroadcastReceiver?, filter: IntentFilter!, broadcastPermission: String?, scheduler: Handler?, flags: Int)
                         Register to receive intent broadcasts, to run in the context of scheduler. See registerReceiver(android.content.BroadcastReceiver,android.content.IntentFilter,int)andregisterReceiver(android.content.BroadcastReceiver,android.content.IntentFilter,java.lang.String,android.os.Handler)for more information. See BroadcastReceiverfor more information on Intent broadcasts. As of android.os.Build.VERSION_CODES#UPSIDE_DOWN_CAKE, the system can place context-registered broadcasts in a queue while the app is in the cached state. When the app leaves the cached state, such as returning to the foreground, the system delivers any queued broadcasts. Multiple instances of certain broadcasts might be merged into one broadcast. As of android.os.Build.VERSION_CODES#ICE_CREAM_SANDWICH, receivers registered with this method will correctly respect theIntent.setPackage(String)specified for an Intent being broadcast. Prior to that, it would be ignored and delivered to all matching registered receivers. Be careful if using this for security. |  
                    | Unit | removeStickyBroadcast(intent: Intent!) |  
                    | Unit | removeStickyBroadcastAsUser(intent: Intent!, user: UserHandle!) |  
                    | Unit | revokeSelfPermissionsOnKill(permissions: MutableCollection<String!>)
                         Triggers the revocation of one or more permissions for the calling package. A package is only able to revoke runtime permissions. If a permission is not currently granted, it is ignored and will not get revoked (even if later granted by the user). Ultimately, you should never make assumptions about a permission status as users may grant or revoke them at any time.   Background permissions which have no corresponding foreground permission still granted once the revocation is effective will also be revoked.   The revocation happens asynchronously and kills all processes running in the calling UID. It will be triggered once it is safe to do so. In particular, it will not be triggered as long as the package remains in the foreground, or has any active manifest components (e.g. when another app is accessing a content provider in the package).   If you want to revoke the permissions right away, you could call System.exit()inHandler.postDelayedwith a delay to allow completion of async IPC, ButSystem.exit()could affect other apps that are accessing your app at the moment. For example, apps accessing a content provider in your app will all crash.  Note that the settings UI shows a permission group as granted as long as at least one permission in the group is granted. If you want the user to observe the revocation in the settings, you should revoke every permission in the target group. To learn the current list of permissions in a group, you may use PackageManager.getGroupOfPlatformPermission(String, Executor, Consumer)andPackageManager.getPlatformPermissionsForGroup(String, Executor, Consumer). This list of permissions may evolve over time, so it is recommended to check whether it contains any permission you wish to retain before trying to revoke an entire group. |  
                    | Unit | revokeUriPermission(uri: Uri!, modeFlags: Int) |  
                    | Unit | revokeUriPermission(targetPackage: String!, uri: Uri!, modeFlags: Int) |  
                    | Unit | sendBroadcast(intent: Intent!) |  
                    | Unit | sendBroadcast(intent: Intent!, receiverPermission: String?)
                         Broadcast the given intent to all interested BroadcastReceivers, allowing an optional required permission to be enforced. This call is asynchronous; it returns immediately, and you will continue executing while the receivers are run. No results are propagated from receivers and receivers can not abort the broadcast. If you want to allow receivers to propagate results or abort the broadcast, you must send an ordered broadcast using sendOrderedBroadcast(android.content.Intent,java.lang.String). See BroadcastReceiverfor more information on Intent broadcasts. |  
                    | Unit | sendBroadcast(intent: Intent, receiverPermission: String?, options: Bundle?)
                         Broadcast the given intent to all interested BroadcastReceivers, allowing an optional required permission to be enforced. This call is asynchronous; it returns immediately, and you will continue executing while the receivers are run. No results are propagated from receivers and receivers can not abort the broadcast. If you want to allow receivers to propagate results or abort the broadcast, you must send an ordered broadcast using sendOrderedBroadcast(android.content.Intent,java.lang.String). See BroadcastReceiverfor more information on Intent broadcasts. |  
                    | Unit | sendBroadcastAsUser(intent: Intent!, user: UserHandle!) |  
                    | Unit | sendBroadcastAsUser(intent: Intent!, user: UserHandle!, receiverPermission: String?) |  
                    | Unit | sendOrderedBroadcast(intent: Intent, initialCode: Int, receiverPermission: String?, receiverAppOp: String?, resultReceiver: BroadcastReceiver?, scheduler: Handler?, initialData: String?, initialExtras: Bundle?, options: Bundle?) |  
                    | Unit | sendOrderedBroadcast(intent: Intent!, receiverPermission: String?)
                         Broadcast the given intent to all interested BroadcastReceivers, delivering them one at a time to allow more preferred receivers to consume the broadcast before it is delivered to less preferred receivers. This call is asynchronous; it returns immediately, and you will continue executing while the receivers are run.  See BroadcastReceiverfor more information on Intent broadcasts. |  
                    | Unit | sendOrderedBroadcast(intent: Intent, receiverPermission: String?, resultReceiver: BroadcastReceiver?, scheduler: Handler?, initialCode: Int, initialData: String?, initialExtras: Bundle?)
                         Version of sendBroadcast(android.content.Intent)that allows you to receive data back from the broadcast. This is accomplished by supplying your own BroadcastReceiver when calling, which will be treated as a final receiver at the end of the broadcast -- itsBroadcastReceiver.onReceivemethod will be called with the result values collected from the other receivers. The broadcast will be serialized in the same way as callingsendOrderedBroadcast(android.content.Intent,java.lang.String). Like sendBroadcast(android.content.Intent), this method is asynchronous; it will return before resultReceiver.onReceive() is called. See BroadcastReceiverfor more information on Intent broadcasts. |  
                    | Unit | sendOrderedBroadcast(intent: Intent, receiverPermission: String?, options: Bundle?)
                         Broadcast the given intent to all interested BroadcastReceivers, delivering them one at a time to allow more preferred receivers to consume the broadcast before it is delivered to less preferred receivers. This call is asynchronous; it returns immediately, and you will continue executing while the receivers are run.  See BroadcastReceiverfor more information on Intent broadcasts. |  
                    | Unit | sendOrderedBroadcast(intent: Intent, receiverPermission: String?, options: Bundle?, resultReceiver: BroadcastReceiver?, scheduler: Handler?, initialCode: Int, initialData: String?, initialExtras: Bundle?)
                         Version of sendBroadcast(android.content.Intent)that allows you to receive data back from the broadcast. This is accomplished by supplying your own BroadcastReceiver when calling, which will be treated as a final receiver at the end of the broadcast -- itsBroadcastReceiver.onReceivemethod will be called with the result values collected from the other receivers. The broadcast will be serialized in the same way as callingsendOrderedBroadcast(android.content.Intent,java.lang.String). Like sendBroadcast(android.content.Intent), this method is asynchronous; it will return before resultReceiver.onReceive() is called. See BroadcastReceiverfor more information on Intent broadcasts. |  
                    | Unit | sendOrderedBroadcast(intent: Intent, receiverPermission: String?, receiverAppOp: String?, resultReceiver: BroadcastReceiver?, scheduler: Handler?, initialCode: Int, initialData: String?, initialExtras: Bundle?)
                         Version of sendOrderedBroadcast(android.content.Intent,java.lang.String,android.content.BroadcastReceiver,android.os.Handler,int,java.lang.String,android.os.Bundle)that allows you to specify the App Op to enforce restrictions on which receivers the broadcast will be sent to. See BroadcastReceiverfor more information on Intent broadcasts. |  
                    | Unit | sendOrderedBroadcastAsUser(intent: Intent!, user: UserHandle!, receiverPermission: String?, resultReceiver: BroadcastReceiver?, scheduler: Handler?, initialCode: Int, initialData: String?, initialExtras: Bundle?)
                         Version of sendOrderedBroadcast(android.content.Intent,java.lang.String,android.content.BroadcastReceiver,android.os.Handler,int,java.lang.String,android.os.Bundle)that allows you to specify the user the broadcast will be sent to. This is not available to applications that are not pre-installed on the system image. See BroadcastReceiverfor more information on Intent broadcasts.Requires android.Manifest.permission.INTERACT_ACROSS_USERS
 |  
                    | Unit | sendStickyBroadcast(intent: Intent!) |  
                    | Unit | sendStickyBroadcast(intent: Intent, options: Bundle?)
                         Perform a sendBroadcast(android.content.Intent)that is "sticky," meaning the Intent you are sending stays around after the broadcast is complete, so that others can quickly retrieve that data through the return value ofregisterReceiver(android.content.BroadcastReceiver,android.content.IntentFilter). In all other ways, this behaves the same assendBroadcast(android.content.Intent). |  
                    | Unit | sendStickyBroadcastAsUser(intent: Intent!, user: UserHandle!) |  
                    | Unit | sendStickyOrderedBroadcast(intent: Intent!, resultReceiver: BroadcastReceiver?, scheduler: Handler?, initialCode: Int, initialData: String?, initialExtras: Bundle?)
                         Version of #sendStickyBroadcast that allows you to receive data back from the broadcast. This is accomplished by supplying your own BroadcastReceiver when calling, which will be treated as a final receiver at the end of the broadcast -- its BroadcastReceiver.onReceivemethod will be called with the result values collected from the other receivers. The broadcast will be serialized in the same way as callingsendOrderedBroadcast(android.content.Intent,java.lang.String). Like sendBroadcast(android.content.Intent), this method is asynchronous; it will return before resultReceiver.onReceive() is called. Note that the sticky data stored is only the data you initially supply to the broadcast, not the result of any changes made by the receivers. See BroadcastReceiverfor more information on Intent broadcasts.Requires
 android.Manifest.permission#BROADCAST_STICKY |  
                    | Unit | sendStickyOrderedBroadcastAsUser(intent: Intent!, user: UserHandle!, resultReceiver: BroadcastReceiver?, scheduler: Handler?, initialCode: Int, initialData: String?, initialExtras: Bundle?)
                         Version of sendStickyOrderedBroadcast(android.content.Intent,android.content.BroadcastReceiver,android.os.Handler,int,java.lang.String,android.os.Bundle)that allows you to specify the user the broadcast will be sent to. This is not available to applications that are not pre-installed on the system image. See BroadcastReceiverfor more information on Intent broadcasts.Requires android.Manifest.permission.INTERACT_ACROSS_USERS and
 android.Manifest.permission#BROADCAST_STICKY |  
                    | Unit | setTheme(resid: Int) |  
                    | Unit | setWallpaper(bitmap: Bitmap!) |  
                    | Unit | setWallpaper(data: InputStream!) |  
                    | Unit | startActivities(intents: Array<Intent!>!) |  
                    | Unit | startActivities(intents: Array<Intent!>!, options: Bundle?)
                         Launch multiple new activities. This is generally the same as calling startActivity(android.content.Intent)for the first Intent in the array, that activity during its creation callingstartActivity(android.content.Intent)for the second entry, etc. Note that unlike that approach, generally none of the activities except the last in the array will be created at this point, but rather will be created when the user first visits them (due to pressing back from the activity on top). This method throws ActivityNotFoundExceptionif there was no Activity found for any given Intent. In this case the state of the activity stack is undefined (some Intents in the list may be on it, some not), so you probably want to avoid such situations. |  
                    | Unit | startActivity(intent: Intent!) |  
                    | Unit | startActivity(intent: Intent!, options: Bundle?)
                         Launch a new activity. You will not receive any information about when the activity exits.  Note that if this method is being called from outside of an android.app.ActivityContext, then the Intent must include theIntent.FLAG_ACTIVITY_NEW_TASKlaunch flag. This is because, without being started from an existing Activity, there is no existing task in which to place the new activity and thus it needs to be placed in its own separate task. This method throws ActivityNotFoundExceptionif there was no Activity found to run the given Intent. |  
                    | ComponentName? | startForegroundService(service: Intent!)
                         Similar to startService(android.content.Intent), but with an implicit promise that the Service will call startForeground(int, android.app.Notification)once it begins running. The service is given an amount of time comparable to the ANR interval to do this, otherwise the system will automatically crash the process, in which case an internal exceptionForegroundServiceDidNotStartInTimeExceptionis logged on logcat on devices running SDK Versionandroid.os.Build.VERSION_CODES#Sor later. On older Android versions, an internal exceptionRemoteServiceExceptionis logged instead, with a corresponding message. Unlike the ordinary startService(android.content.Intent), this method can be used at any time, regardless of whether the app hosting the service is in a foreground state.  
                           Note: Beginning with SDK Version android.os.Build.VERSION_CODES#S, apps targeting SDK Versionandroid.os.Build.VERSION_CODES#Sor higher are not allowed to start foreground services from the background. See  Behavior changes: Apps targeting Android 12  for more details. |  
                    | Boolean | startInstrumentation(className: ComponentName, profileFile: String?, arguments: Bundle?)
                         Start executing an android.app.Instrumentationclass. The given Instrumentation component will be run by killing its target application (if currently running), starting the target process, instantiating the instrumentation component, and then letting it drive the application. This function is not synchronous -- it returns as soon as the instrumentation has started and while it is running.  Instrumentation is normally only allowed to run against a package that is either unsigned or signed with a signature that the the instrumentation package is also signed with (ensuring the target trusts the instrumentation). |  
                    | Unit | startIntentSender(intent: IntentSender!, fillInIntent: Intent?, flagsMask: Int, flagsValues: Int, extraFlags: Int)
                         Same as startIntentSender(android.content.IntentSender,android.content.Intent,int,int,int,android.os.Bundle)with no options specified. |  
                    | Unit | startIntentSender(intent: IntentSender!, fillInIntent: Intent?, flagsMask: Int, flagsValues: Int, extraFlags: Int, options: Bundle?)
                         Like startActivity(android.content.Intent,android.os.Bundle), but taking a IntentSender to start. If the IntentSender is for an activity, that activity will be started as if you had called the regularstartActivity(android.content.Intent)here; otherwise, its associated action will be executed (such as sending a broadcast) as if you had called android.content.IntentSender#sendIntent on it. |  
                    | ComponentName? | startService(service: Intent!)
                         Request that a given application service be started. The Intent should either contain the complete class name of a specific service implementation to start, or a specific package name to target. If the Intent is less specified, it logs a warning about this. In this case any of the multiple matching services may be used. If this service is not already running, it will be instantiated and started (creating a process for it if needed); if it is running then it remains running.  Every call to this method will result in a corresponding call to the target service's android.app.Service#onStartCommandmethod, with the intent given here. This provides a convenient way to submit jobs to a service without having to bind and call on to its interface. Using startService() overrides the default service lifetime that is managed by #bindService: it requires the service to remain running until stopServiceis called, regardless of whether any clients are connected to it. Note that calls to startService() do not nest: no matter how many times you call startService(), a single call tostopServicewill stop it. The system attempts to keep running services around as much as possible. The only time they should be stopped is if the current foreground application is using so many resources that the service needs to be killed. If any errors happen in the service's process, it will automatically be restarted.  This function will throw SecurityExceptionif you do not have permission to start the given service.  
                           Note: Each call to startService() results in significant work done by the system to manage service lifecycle surrounding the processing of the intent, which can take multiple milliseconds of CPU time. Due to this cost, startService() should not be used for frequent intent delivery to a service, and only for scheduling significant work. Use #bindService for high frequency calls. Beginning with SDK Version android.os.Build.VERSION_CODES#O, apps targeting SDK Versionandroid.os.Build.VERSION_CODES#Oor higher are not allowed to start background services from the background. See  Background Execution Limits for more details.Note: Beginning with SDK Version android.os.Build.VERSION_CODES#S, apps targeting SDK Versionandroid.os.Build.VERSION_CODES#Sor higher are not allowed to start foreground services from the background. See  Behavior changes: Apps targeting Android 12  for more details. |  
                    | Boolean | stopService(name: Intent!) |  
                    | Unit | unbindService(conn: ServiceConnection) |  
                    | Unit | unregisterComponentCallbacks(callback: ComponentCallbacks!)
                         Remove a ComponentCallbacksobject that was previously registered withregisterComponentCallbacks(android.content.ComponentCallbacks).  After Build.VERSION_CODES.TIRAMISU, theComponentCallbackswill be unregistered tothe base Context, and can be only used afterattachBaseContext(android.content.Context) |  
                    | Unit | unregisterDeviceIdChangeListener(listener: IntConsumer)
                         Removes a device ID changed listener from the Context. It's a no-op if the listener is not already registered. |  
                    | Unit | unregisterReceiver(receiver: BroadcastReceiver!) |  
                    | Unit | updateServiceGroup(conn: ServiceConnection, group: Int, importance: Int) |  |