Searched refs:permission (Results 126 - 150 of 186) sorted by relevance

12345678

/frameworks/base/services/core/java/com/android/server/
H A DNsdService.java599 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.INTERNET,
605 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.CONNECTIVITY_INTERNAL,
827 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
H A DNetworkManagementService.java19 import static android.Manifest.permission.CONNECTIVITY_INTERNAL;
20 import static android.Manifest.permission.DUMP;
21 import static android.Manifest.permission.SHUTDOWN;
2076 public void setPermission(String permission, int[] uids) { argument
2080 argv[0] = "permission";
2083 argv[3] = permission;
2104 argv[0] = "permission";
H A DBluetoothManagerService.java65 private static final String BLUETOOTH_ADMIN_PERM = android.Manifest.permission.BLUETOOTH_ADMIN;
66 private static final String BLUETOOTH_PERM = android.Manifest.permission.BLUETOOTH;
362 "Need BLUETOOTH permission");
370 "Need BLUETOOTH permission");
378 "Need BLUETOOTH permission");
412 "Need BLUETOOTH ADMIN permission");
421 throw new SecurityException("no permission to enable Bluetooth quietly");
440 "Need BLUETOOTH ADMIN permission");
449 // waive WRITE_SECURE_SETTINGS permission check
475 // waive WRITE_SECURE_SETTINGS permission chec
[all...]
H A DInputMethodManagerService.java973 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL)
977 + "the INTERACT_ACROSS_USERS_FULL permission");
2015 + "android.permission.INTERACT_ACROSS_USERS_FULL");
2402 android.Manifest.permission.WRITE_SECURE_SETTINGS)
2405 "Using null token requires permission "
2406 + android.Manifest.permission.WRITE_SECURE_SETTINGS);
2692 if (!android.Manifest.permission.BIND_INPUT_METHOD.equals(
2693 si.permission)) {
2695 + ": it does not require the permission "
2696 + android.Manifest.permission
[all...]
H A DWatchdog.java239 android.Manifest.permission.REBOOT, null);
H A DConnectivityService.java19 import static android.Manifest.permission.MANAGE_NETWORK_POLICY;
20 import static android.Manifest.permission.RECEIVE_DATA_ACTIVITY_CHANGE;
1429 android.Manifest.permission.INTERNET,
1435 android.Manifest.permission.ACCESS_NETWORK_STATE,
1441 android.Manifest.permission.CHANGE_NETWORK_STATE,
1447 android.Manifest.permission.ACCESS_NETWORK_STATE,
1453 android.Manifest.permission.CONNECTIVITY_INTERNAL,
1767 android.Manifest.permission.DUMP)
/frameworks/base/services/core/java/com/android/server/accounts/
H A DAccountManagerService.java642 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL)
679 + android.Manifest.permission.INTERACT_ACROSS_USERS_FULL);
1612 checkBinderPermission(Manifest.permission.USE_CREDENTIALS);
1636 // if the caller has permission, do the peek. otherwise go the more expensive
1664 // If the caller doesn't have permission then create and return the
1665 // "grant permission" intent instead of the "getAuthToken" intent.
2237 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL)
2361 checkBinderPermission(android.Manifest.permission.INTERACT_ACROSS_USERS);
2929 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
2933 + " without permission "
[all...]
/frameworks/base/services/core/java/com/android/server/job/
H A DJobSchedulerService.java713 // named service properly requires the BIND_JOB_SERVICE permission
726 if (!JobService.PERMISSION_BIND.equals(si.permission)) {
728 + " does not require android.permission.BIND_JOB_SERVICE permission");
746 // permission
748 android.Manifest.permission.RECEIVE_BOOT_COMPLETED, pid, uid);
769 + " holding RECEIVE_BOOT_COMPLETED permission.");
822 getContext().enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
/frameworks/base/services/backup/java/com/android/server/backup/
H A DBackupManagerService.java1039 android.Manifest.permission.BACKUP, null);
1045 android.Manifest.permission.BACKUP, null);
1467 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP,
1547 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP,
8102 // If the caller does not hold the BACKUP permission, it can only request a
8104 if ((mContext.checkPermission(android.Manifest.permission.BACKUP, Binder.getCallingPid(),
8111 // a caller with full permission can ask to back up any participating app
8181 // If the caller does not hold the BACKUP permission, it can only request a
8184 if ((mContext.checkPermission(android.Manifest.permission.BACKUP, Binder.getCallingPid(),
8188 // a caller with full permission ca
[all...]
/frameworks/base/services/core/java/com/android/server/am/
H A DActiveServices.java326 return new ComponentName("!", res.permission != null
327 ? res.permission : "private to package");
509 // r.record is null if findServiceLocked() failed the caller permission check
515 + " requires " + r.permission);
733 mAm.enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
989 final String permission; field in class:ActiveServices.ServiceLookupResult
993 permission = _permission;
1086 if (mAm.checkComponentPermission(r.permission,
1100 + " requires " + r.permission);
1101 return new ServiceLookupResult(null, r.permission);
[all...]
/frameworks/base/services/core/java/com/android/server/net/
H A DNetworkPolicyManagerService.java19 import static android.Manifest.permission.ACCESS_NETWORK_STATE;
20 import static android.Manifest.permission.CONNECTIVITY_INTERNAL;
21 import static android.Manifest.permission.DUMP;
22 import static android.Manifest.permission.MANAGE_NETWORK_POLICY;
23 import static android.Manifest.permission.READ_NETWORK_USAGE_HISTORY;
24 import static android.Manifest.permission.READ_PHONE_STATE;
560 // READ_NETWORK_USAGE_HISTORY permission above.
578 // permission above.
592 // permission above.
606 // permission abov
[all...]
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/p2p/
H A DWifiP2pServiceImpl.java386 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.ACCESS_WIFI_STATE,
391 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.CHANGE_WIFI_STATE,
397 android.Manifest.permission.CONNECTIVITY_INTERNAL,
403 android.Manifest.permission.CONNECTIVITY_INTERNAL);
408 android.Manifest.permission.LOCATION_HARDWARE);
456 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
/frameworks/base/services/core/java/com/android/server/connectivity/
H A DVpn.java19 import static android.Manifest.permission.BIND_VPN_SERVICE;
242 /** Prepare the VPN for the given package. Does not perform permission checks. */
320 // Verify that the caller matches the given package and has permission to activate VPNs.
495 if (!BIND_VPN_SERVICE.equals(info.serviceInfo.permission)) {
745 mContext.enforceCallingPermission(Manifest.permission.CONTROL_VPN, "Unauthorized Caller");
850 * Should only be called to respond to Binder requests as this enforces caller permission. Use
852 * permission check only when the caller is trusted (or the call is initiated by the system).
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/
H A DDevicePolicyManagerService.java19 import static android.Manifest.permission.MANAGE_CA_CERTIFICATES;
161 private static final String ATTR_PERMISSION_PROVIDER = "permission-provider";
1418 // Extract the permission provider component name if available
1774 android.Manifest.permission.MANAGE_DEVICE_ADMINS, null);
1905 android.Manifest.permission.MANAGE_DEVICE_ADMINS, null);
3075 android.Manifest.permission.BIND_DEVICE_ADMIN, null);
3111 android.Manifest.permission.BIND_DEVICE_ADMIN, null);
3175 android.Manifest.permission.BIND_DEVICE_ADMIN, null);
3215 android.Manifest.permission.BIND_DEVICE_ADMIN, null);
3797 mContext.enforceCallingOrSelfPermission(android.Manifest.permission
[all...]
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DSubscriptionController.java193 * Make sure the caller has the READ_PHONE_STATE permission.
195 * @throws SecurityException if the caller does not have the required permission
198 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.READ_PHONE_STATE,
214 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.MODIFY_PHONE_STATE)
1539 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP,
/frameworks/base/core/java/android/accounts/
H A DAbstractAccountAuthenticator.java340 final String perm = Manifest.permission.ACCOUNT_MANAGER;
/frameworks/base/core/java/android/os/
H A DRecoverySystem.java322 * Requires the {@link android.Manifest.permission#REBOOT} permission.
348 * {@link android.Manifest.permission#REBOOT} permission.
376 * {@link android.Manifest.permission#REBOOT} permission.
400 android.Manifest.permission.MASTER_CLEAR,
/frameworks/base/services/core/java/com/android/server/storage/
H A DDeviceStorageMonitorService.java397 if (getContext().checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
/frameworks/base/services/core/java/com/android/server/trust/
H A DTrustAgentWrapper.java52 private static final String PERMISSION = android.Manifest.permission.PROVIDE_TRUST_AGENT;
/frameworks/base/core/java/android/content/pm/
H A DPackageManager.java154 * {@link ProviderInfo#uriPermissionPatterns URI permission patterns}
220 * if the permission has been granted to the given package.
226 * if the permission has not been granted to the given package.
741 * permission that is already defined by some existing package.
743 * <p>The package name of the app which has already defined the permission is passed to
745 * string extra; and the name of the permission being redefined is passed in the
1662 * The action used to request that the user approve a permission request
1681 * the existing definition for the permission.
1689 * {@link #INSTALL_FAILED_DUPLICATE_PERMISSION}. This extra names the permission that is
1816 * Retrieve all of the information we know about a particular permission
[all...]
/frameworks/base/core/java/android/hardware/location/
H A DGeofenceHardwareImpl.java86 // Resolution level constants used for permission checks.
882 if (mContext.checkPermission(android.Manifest.permission.ACCESS_FINE_LOCATION,
885 } else if (mContext.checkPermission(android.Manifest.permission.ACCESS_COARSE_LOCATION,
/frameworks/base/core/java/android/net/
H A DConnectivityManager.java572 * <p>This method requires the caller to hold the permission
573 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
593 * <p>This method requires the call to hold the permission
594 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
613 * <p>This method requires the caller to hold the permission
614 * {@link android.Manifest.permission#CONNECTIVITY_INTERNAL}
635 * <p>This method requires the caller to hold the permission
636 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}.
656 * <p>This method requires the caller to hold the permission
657 * {@link android.Manifest.permission#ACCESS_NETWORK_STAT
[all...]
/frameworks/base/policy/src/com/android/internal/policy/impl/
H A DPhoneWindowManager.java1654 String permission = null;
1675 permission = android.Manifest.permission.SYSTEM_ALERT_WINDOW;
1679 permission = android.Manifest.permission.INTERNAL_SYSTEM_WINDOW;
1681 if (permission != null) {
1682 if (mContext.checkCallingOrSelfPermission(permission)
1700 // {@link WindowManager.LayoutParams}. Note that permission
1701 // {@link android.Manifest.permission.INTERNAL_SYSTEM_WINDOW} is required as well.
1734 android.Manifest.permission
[all...]
/frameworks/base/services/core/java/com/android/server/pm/
H A DUserManagerService.java555 * {@link android.Manifest.permission#MANAGE_USERS MANAGE_USERS}
556 * permission can make certain calls to the UserManager.
565 android.Manifest.permission.MANAGE_USERS,
567 throw new SecurityException("You need MANAGE_USERS permission to: " + message);
1211 android.Manifest.permission.MANAGE_USERS);
1371 android.Manifest.permission.MANAGE_USERS,
1865 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
1870 + " without permission "
1871 + android.Manifest.permission.DUMP);
/frameworks/base/services/appwidget/java/com/android/server/appwidget/
H A DAppWidgetServiceImpl.java445 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP,
628 // A special permission is required for managing white listing.
652 // A special permission is required for managing white listing.
750 // A special permission or white listing is required to bind widgets.
929 // requires a permission which allows only the system to bind to it.
934 // user, and requires the bind permission.
3050 if (!android.Manifest.permission.BIND_REMOTEVIEWS.equals(serviceInfo.permission)) {
3053 + android.Manifest.permission.BIND_REMOTEVIEWS);
3064 android.Manifest.permission
[all...]

Completed in 670 milliseconds

12345678