/frameworks/base/media/java/android/media/ |
H A D | AudioService.java | 19 import static android.Manifest.permission.REMOTE_AUDIO_PLAYBACK; 1641 android.Manifest.permission.CAPTURE_AUDIO_OUTPUT))) { 2089 android.Manifest.permission.MODIFY_PHONE_STATE) 3393 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.MODIFY_AUDIO_SETTINGS) 5134 // permission checks 5138 android.Manifest.permission.MODIFY_PHONE_STATE)) { 5139 Log.e(TAG, "Invalid permission to (un)lock audio focus", new Exception()); 5574 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG); 5616 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR_SERVICE, 5854 android.Manifest.permission [all...] |
H A D | MediaFocusControl.java | 158 * <li>the caller has android.Manifest.permission.MEDIA_CONTENT_CONTROL permission</li> 165 // MEDIA_CONTENT_CONTROL permission check 167 android.Manifest.permission.MEDIA_CONTENT_CONTROL)) { 168 if (DEBUG_RC) { Log.d(TAG, "ok to register Rcd: has MEDIA_CONTENT_CONTROL permission");} 214 ", must have permission " + android.Manifest.permission.MEDIA_CONTENT_CONTROL + 227 ", must have permission " + android.Manifest.permission.MEDIA_CONTENT_CONTROL + 1602 if (mContext.checkCallingPermission("android.permission [all...] |
/frameworks/base/cmds/pm/src/com/android/commands/pm/ |
H A D | Pm.java | 206 if ("set-permission-enforced".equals(op)) { 268 * pm list permission-groups 282 } else if ("permission-groups".equals(type)) { 525 * Lists all the known permission groups. 534 System.out.print("permission group:"); 706 + "permission:" + pi.name); 1526 System.err.println("Error: no permission specified"); 1552 final String permission = nextArg(); 1553 if (permission == null) { 1554 System.err.println("Error: no permission specifie [all...] |
/frameworks/base/services/print/java/com/android/server/print/ |
H A D | UserState.java | 650 if (!android.Manifest.permission.BIND_PRINT_SERVICE.equals( 651 installedService.serviceInfo.permission)) { 657 + " since it does not require permission " 658 + android.Manifest.permission.BIND_PRINT_SERVICE);
|
H A D | PrintManagerService.java | 444 if (mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP) 694 "com.android.printspooler.permission.ACCESS_ALL_PRINT_JOBS") 697 + appId + " without com.android.printspooler.permission"
|
/frameworks/base/core/java/android/widget/ |
H A D | ActivityChooserModel.java | 715 if (ActivityManager.checkComponentPermission(activityInfo.permission,
|
H A D | RemoteViewsAdapter.java | 54 private static final String MULTI_USER_PERM = Manifest.permission.INTERACT_ACROSS_USERS_FULL;
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | UiModeManagerService.java | 269 if (getContext().checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
H A D | BatteryService.java | 766 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
H A D | AlarmManagerService.java | 804 android.Manifest.permission.UPDATE_DEVICE_STATS, 815 "android.permission.SET_TIME", 831 "android.permission.SET_TIME_ZONE", 859 if (getContext().checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
/frameworks/base/services/core/java/com/android/server/notification/ |
H A D | ManagedServices.java | 62 * - A system permission for services to require in order to ensure system has exclusive binding. 190 // that's proof that you had permission to add it in the first place 231 if (!mConfig.bindPermission.equals(info.permission)) { 234 + ": it does not require the permission "
|
H A D | NotificationManagerService.java | 1230 // enforce() will ensure the calling uid has the correct permission 1232 android.Manifest.permission.ACCESS_NOTIFICATIONS, 1259 // enforce() will ensure the calling uid has the correct permission 1261 android.Manifest.permission.ACCESS_NOTIFICATIONS, 1526 getContext().enforceCallingPermission(android.Manifest.permission.STATUS_BAR_SERVICE, 1532 if (getContext().checkCallingOrSelfPermission(android.Manifest.permission.DUMP) 2132 // notifying app does not have the VIBRATE permission. 2146 // permission 2951 c.bindPermission = android.Manifest.permission.BIND_NOTIFICATION_LISTENER_SERVICE;
|
H A D | ConditionProviders.java | 91 c.bindPermission = android.Manifest.permission.BIND_CONDITION_PROVIDER_SERVICE;
|
/frameworks/base/telephony/java/android/telephony/ |
H A D | SubscriptionManager.java | 47 * All SDK public methods require android.Manifest.permission.READ_PHONE_STATE. 223 * TelephonyProvider column name for permission for data roaming of a SIM. 273 * Permissions android.Manifest.permission.READ_PHONE_STATE is required 279 android.Manifest.permission.READ_PHONE_STATE;
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | SubscriptionInfoUpdater.java | 19 import static android.Manifest.permission.READ_PHONE_STATE;
|
H A D | SMSDispatcher.java | 92 "android.permission.SEND_SMS_NO_CONFIRMATION"; 1030 // Wait for user confirmation unless the user has set permission to always allow/deny 1181 * Returns the premium SMS permission for the specified package. If the package has never 1184 * @param packageName the name of the package to query permission 1195 * Sets the premium SMS permission for the specified package and save the value asynchronously 1197 * @param packageName the name of the package to set permission 1198 * @param permission one of {@link SmsUsageMonitor#PREMIUM_SMS_PERMISSION_ASK_USER}, 1202 public void setPremiumSmsPermission(String packageName, int permission) { argument 1203 mUsageMonitor.setPremiumSmsPermission(packageName, permission); 1614 // Always set the SMS permission s [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
H A D | UiccCard.java | 19 import static android.Manifest.permission.READ_PHONE_STATE;
|
H A D | IccCardProxy.java | 19 import static android.Manifest.permission.READ_PHONE_STATE;
|
/frameworks/support/v4/java/android/support/v4/app/ |
H A D | NotificationManagerCompat.java | 398 if (resolveInfo.serviceInfo.permission != null) {
|
/frameworks/base/core/java/android/app/ |
H A D | IActivityManager.java | 221 public int checkPermission(String permission, int pid, int uid) argument 223 public int checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument
|
/frameworks/base/services/core/java/com/android/server/media/ |
H A D | MediaRouterService.java | 132 android.Manifest.permission.CONFIGURE_WIFI_DISPLAY) == 261 if (mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP)
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PackageInstallerService.java | 757 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DELETE_PACKAGES) 773 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.INSTALL_PACKAGES, TAG);
|
H A D | PackageInstallerSession.java | 211 if ((mPm.checkUidPermission(android.Manifest.permission.INSTALL_PACKAGES, installerUid)
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActivityStackSupervisor.java | 19 import static android.Manifest.permission.START_ANY_ACTIVITY; 964 mService.enforceCallingPermission(android.Manifest.permission.CHANGE_CONFIGURATION, 1432 final int componentPerm = mService.checkComponentPermission(aInfo.permission, callingPid, 1450 + " requires " + aInfo.permission;
|
/frameworks/webview/chromium/java/com/android/webview/chromium/ |
H A D | WebViewContentsClientAdapter.java | 62 import org.chromium.android_webview.permission.AwPermissionRequest; 626 // By default, we deny the permission.
|