/frameworks/base/services/core/java/com/android/server/ |
H A D | NsdService.java | 599 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.INTERNET, 605 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.CONNECTIVITY_INTERNAL, 827 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
H A D | NetworkManagementService.java | 19 import static android.Manifest.permission.CONNECTIVITY_INTERNAL; 20 import static android.Manifest.permission.DUMP; 21 import static android.Manifest.permission.SHUTDOWN; 2076 public void setPermission(String permission, int[] uids) { argument 2080 argv[0] = "permission"; 2083 argv[3] = permission; 2104 argv[0] = "permission";
|
H A D | BluetoothManagerService.java | 65 private static final String BLUETOOTH_ADMIN_PERM = android.Manifest.permission.BLUETOOTH_ADMIN; 66 private static final String BLUETOOTH_PERM = android.Manifest.permission.BLUETOOTH; 362 "Need BLUETOOTH permission"); 370 "Need BLUETOOTH permission"); 378 "Need BLUETOOTH permission"); 412 "Need BLUETOOTH ADMIN permission"); 421 throw new SecurityException("no permission to enable Bluetooth quietly"); 440 "Need BLUETOOTH ADMIN permission"); 449 // waive WRITE_SECURE_SETTINGS permission check 475 // waive WRITE_SECURE_SETTINGS permission chec [all...] |
H A D | InputMethodManagerService.java | 973 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL) 977 + "the INTERACT_ACROSS_USERS_FULL permission"); 2015 + "android.permission.INTERACT_ACROSS_USERS_FULL"); 2402 android.Manifest.permission.WRITE_SECURE_SETTINGS) 2405 "Using null token requires permission " 2406 + android.Manifest.permission.WRITE_SECURE_SETTINGS); 2692 if (!android.Manifest.permission.BIND_INPUT_METHOD.equals( 2693 si.permission)) { 2695 + ": it does not require the permission " 2696 + android.Manifest.permission [all...] |
H A D | Watchdog.java | 239 android.Manifest.permission.REBOOT, null);
|
H A D | ConnectivityService.java | 19 import static android.Manifest.permission.MANAGE_NETWORK_POLICY; 20 import static android.Manifest.permission.RECEIVE_DATA_ACTIVITY_CHANGE; 1429 android.Manifest.permission.INTERNET, 1435 android.Manifest.permission.ACCESS_NETWORK_STATE, 1441 android.Manifest.permission.CHANGE_NETWORK_STATE, 1447 android.Manifest.permission.ACCESS_NETWORK_STATE, 1453 android.Manifest.permission.CONNECTIVITY_INTERNAL, 1767 android.Manifest.permission.DUMP)
|
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | AccountManagerService.java | 642 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL) 679 + android.Manifest.permission.INTERACT_ACROSS_USERS_FULL); 1612 checkBinderPermission(Manifest.permission.USE_CREDENTIALS); 1636 // if the caller has permission, do the peek. otherwise go the more expensive 1664 // If the caller doesn't have permission then create and return the 1665 // "grant permission" intent instead of the "getAuthToken" intent. 2237 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL) 2361 checkBinderPermission(android.Manifest.permission.INTERACT_ACROSS_USERS); 2929 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP) 2933 + " without permission " [all...] |
/frameworks/base/services/core/java/com/android/server/job/ |
H A D | JobSchedulerService.java | 713 // named service properly requires the BIND_JOB_SERVICE permission 726 if (!JobService.PERMISSION_BIND.equals(si.permission)) { 728 + " does not require android.permission.BIND_JOB_SERVICE permission"); 746 // permission 748 android.Manifest.permission.RECEIVE_BOOT_COMPLETED, pid, uid); 769 + " holding RECEIVE_BOOT_COMPLETED permission."); 822 getContext().enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
H A D | BackupManagerService.java | 1039 android.Manifest.permission.BACKUP, null); 1045 android.Manifest.permission.BACKUP, null); 1467 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP, 1547 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP, 8102 // If the caller does not hold the BACKUP permission, it can only request a 8104 if ((mContext.checkPermission(android.Manifest.permission.BACKUP, Binder.getCallingPid(), 8111 // a caller with full permission can ask to back up any participating app 8181 // If the caller does not hold the BACKUP permission, it can only request a 8184 if ((mContext.checkPermission(android.Manifest.permission.BACKUP, Binder.getCallingPid(), 8188 // a caller with full permission ca [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActiveServices.java | 326 return new ComponentName("!", res.permission != null 327 ? res.permission : "private to package"); 509 // r.record is null if findServiceLocked() failed the caller permission check 515 + " requires " + r.permission); 733 mAm.enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS, 989 final String permission; field in class:ActiveServices.ServiceLookupResult 993 permission = _permission; 1086 if (mAm.checkComponentPermission(r.permission, 1100 + " requires " + r.permission); 1101 return new ServiceLookupResult(null, r.permission); [all...] |
/frameworks/base/services/core/java/com/android/server/net/ |
H A D | NetworkPolicyManagerService.java | 19 import static android.Manifest.permission.ACCESS_NETWORK_STATE; 20 import static android.Manifest.permission.CONNECTIVITY_INTERNAL; 21 import static android.Manifest.permission.DUMP; 22 import static android.Manifest.permission.MANAGE_NETWORK_POLICY; 23 import static android.Manifest.permission.READ_NETWORK_USAGE_HISTORY; 24 import static android.Manifest.permission.READ_PHONE_STATE; 560 // READ_NETWORK_USAGE_HISTORY permission above. 578 // permission above. 592 // permission above. 606 // permission abov [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/p2p/ |
H A D | WifiP2pServiceImpl.java | 386 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.ACCESS_WIFI_STATE, 391 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.CHANGE_WIFI_STATE, 397 android.Manifest.permission.CONNECTIVITY_INTERNAL, 403 android.Manifest.permission.CONNECTIVITY_INTERNAL); 408 android.Manifest.permission.LOCATION_HARDWARE); 456 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
/frameworks/base/services/core/java/com/android/server/connectivity/ |
H A D | Vpn.java | 19 import static android.Manifest.permission.BIND_VPN_SERVICE; 242 /** Prepare the VPN for the given package. Does not perform permission checks. */ 320 // Verify that the caller matches the given package and has permission to activate VPNs. 495 if (!BIND_VPN_SERVICE.equals(info.serviceInfo.permission)) { 745 mContext.enforceCallingPermission(Manifest.permission.CONTROL_VPN, "Unauthorized Caller"); 850 * Should only be called to respond to Binder requests as this enforces caller permission. Use 852 * permission check only when the caller is trusted (or the call is initiated by the system).
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
H A D | DevicePolicyManagerService.java | 19 import static android.Manifest.permission.MANAGE_CA_CERTIFICATES; 161 private static final String ATTR_PERMISSION_PROVIDER = "permission-provider"; 1418 // Extract the permission provider component name if available 1774 android.Manifest.permission.MANAGE_DEVICE_ADMINS, null); 1905 android.Manifest.permission.MANAGE_DEVICE_ADMINS, null); 3075 android.Manifest.permission.BIND_DEVICE_ADMIN, null); 3111 android.Manifest.permission.BIND_DEVICE_ADMIN, null); 3175 android.Manifest.permission.BIND_DEVICE_ADMIN, null); 3215 android.Manifest.permission.BIND_DEVICE_ADMIN, null); 3797 mContext.enforceCallingOrSelfPermission(android.Manifest.permission [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | SubscriptionController.java | 193 * Make sure the caller has the READ_PHONE_STATE permission. 195 * @throws SecurityException if the caller does not have the required permission 198 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.READ_PHONE_STATE, 214 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.MODIFY_PHONE_STATE) 1539 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP,
|
/frameworks/base/core/java/android/accounts/ |
H A D | AbstractAccountAuthenticator.java | 340 final String perm = Manifest.permission.ACCOUNT_MANAGER;
|
/frameworks/base/core/java/android/os/ |
H A D | RecoverySystem.java | 322 * Requires the {@link android.Manifest.permission#REBOOT} permission. 348 * {@link android.Manifest.permission#REBOOT} permission. 376 * {@link android.Manifest.permission#REBOOT} permission. 400 android.Manifest.permission.MASTER_CLEAR,
|
/frameworks/base/services/core/java/com/android/server/storage/ |
H A D | DeviceStorageMonitorService.java | 397 if (getContext().checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
/frameworks/base/services/core/java/com/android/server/trust/ |
H A D | TrustAgentWrapper.java | 52 private static final String PERMISSION = android.Manifest.permission.PROVIDE_TRUST_AGENT;
|
/frameworks/base/core/java/android/content/pm/ |
H A D | PackageManager.java | 154 * {@link ProviderInfo#uriPermissionPatterns URI permission patterns} 220 * if the permission has been granted to the given package. 226 * if the permission has not been granted to the given package. 741 * permission that is already defined by some existing package. 743 * <p>The package name of the app which has already defined the permission is passed to 745 * string extra; and the name of the permission being redefined is passed in the 1662 * The action used to request that the user approve a permission request 1681 * the existing definition for the permission. 1689 * {@link #INSTALL_FAILED_DUPLICATE_PERMISSION}. This extra names the permission that is 1816 * Retrieve all of the information we know about a particular permission [all...] |
/frameworks/base/core/java/android/hardware/location/ |
H A D | GeofenceHardwareImpl.java | 86 // Resolution level constants used for permission checks. 882 if (mContext.checkPermission(android.Manifest.permission.ACCESS_FINE_LOCATION, 885 } else if (mContext.checkPermission(android.Manifest.permission.ACCESS_COARSE_LOCATION,
|
/frameworks/base/core/java/android/net/ |
H A D | ConnectivityManager.java | 572 * <p>This method requires the caller to hold the permission 573 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}. 593 * <p>This method requires the call to hold the permission 594 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}. 613 * <p>This method requires the caller to hold the permission 614 * {@link android.Manifest.permission#CONNECTIVITY_INTERNAL} 635 * <p>This method requires the caller to hold the permission 636 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}. 656 * <p>This method requires the caller to hold the permission 657 * {@link android.Manifest.permission#ACCESS_NETWORK_STAT [all...] |
/frameworks/base/policy/src/com/android/internal/policy/impl/ |
H A D | PhoneWindowManager.java | 1654 String permission = null; 1675 permission = android.Manifest.permission.SYSTEM_ALERT_WINDOW; 1679 permission = android.Manifest.permission.INTERNAL_SYSTEM_WINDOW; 1681 if (permission != null) { 1682 if (mContext.checkCallingOrSelfPermission(permission) 1700 // {@link WindowManager.LayoutParams}. Note that permission 1701 // {@link android.Manifest.permission.INTERNAL_SYSTEM_WINDOW} is required as well. 1734 android.Manifest.permission [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | UserManagerService.java | 555 * {@link android.Manifest.permission#MANAGE_USERS MANAGE_USERS} 556 * permission can make certain calls to the UserManager. 565 android.Manifest.permission.MANAGE_USERS, 567 throw new SecurityException("You need MANAGE_USERS permission to: " + message); 1211 android.Manifest.permission.MANAGE_USERS); 1371 android.Manifest.permission.MANAGE_USERS, 1865 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP) 1870 + " without permission " 1871 + android.Manifest.permission.DUMP);
|
/frameworks/base/services/appwidget/java/com/android/server/appwidget/ |
H A D | AppWidgetServiceImpl.java | 445 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, 628 // A special permission is required for managing white listing. 652 // A special permission is required for managing white listing. 750 // A special permission or white listing is required to bind widgets. 929 // requires a permission which allows only the system to bind to it. 934 // user, and requires the bind permission. 3050 if (!android.Manifest.permission.BIND_REMOTEVIEWS.equals(serviceInfo.permission)) { 3053 + android.Manifest.permission.BIND_REMOTEVIEWS); 3064 android.Manifest.permission [all...] |