Searched refs:permission (Results 76 - 100 of 186) sorted by relevance

12345678

/frameworks/base/core/java/android/bluetooth/
H A DBluetoothGattServer.java337 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission.
430 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission.
456 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission.
484 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission.
516 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission
[all...]
/frameworks/base/core/java/android/hardware/location/
H A DActivityRecognitionHardware.java35 private static final String HARDWARE_PERMISSION = Manifest.permission.LOCATION_HARDWARE;
/frameworks/base/services/core/java/com/android/server/
H A DCountryDetectorService.java211 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
H A DVibratorService.java221 mContext.enforcePermission(android.Manifest.permission.UPDATE_APP_OPS_STATS,
228 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.VIBRATE)
230 throw new SecurityException("Requires VIBRATE permission");
275 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.VIBRATE)
277 throw new SecurityException("Requires VIBRATE permission");
328 android.Manifest.permission.VIBRATE,
H A DPersistentDataBlockService.java120 Manifest.permission.OEM_UNLOCK_STATE,
449 if (mContext.checkCallingPermission(Manifest.permission.ACCESS_PDB_STATE)
H A DTelephonyRegistry.java351 /* Checks permission and throws Security exception */
458 /* Checks permission and throws Security exception */
1251 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
1351 android.Manifest.permission.READ_PHONE_STATE);
1406 android.Manifest.permission.READ_PRECISE_PHONE_STATE);
1424 android.Manifest.permission.READ_PRECISE_PHONE_STATE);
1428 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.MODIFY_PHONE_STATE)
1441 android.Manifest.permission.ACCESS_COARSE_LOCATION, null);
1447 android.Manifest.permission.ACCESS_COARSE_LOCATION, null);
1453 android.Manifest.permission
[all...]
H A DLockSettingsService.java27 import static android.Manifest.permission.ACCESS_KEYGUARD_SECURE_STORAGE;
29 import static android.Manifest.permission.READ_PROFILE;
202 + " needs permission " + READ_PROFILE + " to read "
423 // These are protected with a read permission
/frameworks/base/services/core/java/com/android/server/statusbar/
H A DStatusBarManagerService.java458 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR,
463 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.EXPAND_STATUS_BAR,
468 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR_SERVICE,
692 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/
H A DWindowManagerPermissionTests.java17 package com.android.framework.permission.tests;
/frameworks/opt/net/ims/src/java/com/android/ims/
H A DImsConfig.java39 private static final String MODIFY_PHONE_STATE = android.Manifest.permission.MODIFY_PHONE_STATE;
/frameworks/opt/telephony/src/java/com/android/internal/telephony/cdma/
H A DCdmaServiceCategoryProgramHandler.java109 mContext.sendOrderedBroadcast(intent, Manifest.permission.RECEIVE_SMS,
/frameworks/base/services/core/java/com/android/server/wallpaper/
H A DWallpaperManagerService.java694 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS);
748 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS);
825 checkPermission(android.Manifest.permission.SET_WALLPAPER);
872 checkPermission(android.Manifest.permission.SET_WALLPAPER_COMPONENT);
929 if (!android.Manifest.permission.BIND_WALLPAPER.equals(si.permission)) {
931 + android.Manifest.permission.BIND_WALLPAPER
1093 private void checkPermission(String permission) { argument
1094 if (PackageManager.PERMISSION_GRANTED!= mContext.checkCallingOrSelfPermission(permission)) {
1096 + ", must have permission "
[all...]
/frameworks/base/core/java/android/os/
H A DINetworkManagementService.aidl403 void setPermission(String permission, in int[] uids);
/frameworks/base/core/java/android/view/accessibility/
H A DAccessibilityManager.java193 Manifest.permission.INTERACT_ACROSS_USERS)
196 Manifest.permission.INTERACT_ACROSS_USERS_FULL)
/frameworks/base/docs/html/guide/
H A Dguide_toc.cs168 <li><a href="<?cs var:toroot ?>guide/topics/manifest/grant-uri-permission-element.html">&lt;grant-uri-permission&gt;</a></li>
173 <li><a href="<?cs var:toroot ?>guide/topics/manifest/path-permission-element.html">&lt;path-permission&gt;</a></li>
174 <li><a href="<?cs var:toroot ?>guide/topics/manifest/permission-element.html">&lt;permission&gt;</a></li>
175 <li><a href="<?cs var:toroot ?>guide/topics/manifest/permission-group-element.html">&lt;permission-group&gt;</a></li>
176 <li><a href="<?cs var:toroot ?>guide/topics/manifest/permission-tree-element.html">&lt;permission
[all...]
/frameworks/base/services/core/java/com/android/server/am/
H A DActivityManagerService.java19 import static android.Manifest.permission.INTERACT_ACROSS_USERS;
20 import static android.Manifest.permission.INTERACT_ACROSS_USERS_FULL;
21 import static android.Manifest.permission.START_TASKS_FROM_RECENTS;
1913 ServiceManager.addService("permission", new PermissionController(this));
1964 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
1968 + " without permission " + android.Manifest.permission.DUMP);
1984 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
1988 + " without permission " + android.Manifest.permission
6800 checkPermission(String permission, int pid, int uid) argument
6808 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument
6823 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument
6842 checkPermission(String permission, int pid, int uid) argument
6850 checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument
6873 checkCallingPermission(String permission) argument
6882 enforceCallingPermission(String permission, String func) argument
15564 registerReceiver(IApplicationThread caller, String callerPackage, IIntentReceiver receiver, IntentFilter filter, String permission, int userId) argument
[all...]
/frameworks/base/services/core/java/com/android/server/input/
H A DInputManagerService.java555 Slog.w(TAG, "Input event injection from pid " + pid + " permission denied.");
557 "Injecting to another application requires INJECT_EVENTS permission");
751 if (!checkCallingPermission(android.Manifest.permission.SET_INPUT_CALIBRATION,
753 throw new SecurityException("Requires SET_INPUT_CALIBRATION permission");
1032 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
1034 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
1071 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
1073 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
1100 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
1102 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
1359 checkCallingPermission(String permission, String func) argument
[all...]
/frameworks/base/services/core/java/com/android/server/wm/
H A DWindowManagerService.java3007 mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR)
3029 // if they don't have the permission, mask out the status bar bits
3496 boolean checkCallingPermission(String permission, String func) { argument
3497 // Quick check: if the calling permission is me, it's all okay.
3502 if (mContext.checkCallingPermission(permission)
3509 + " requires " + permission;
3528 if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS,
3530 throw new SecurityException("Requires MANAGE_APP_TOKENS permission");
3549 if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS,
3551 throw new SecurityException("Requires MANAGE_APP_TOKENS permission");
[all...]
/frameworks/base/core/java/android/content/
H A DContentProvider.java20 import static android.Manifest.permission.INTERACT_ACROSS_USERS;
142 * @param writePermission The write permission you want this instance should have
500 // <path-permission> below removes this ability
513 // any denied <path-permission> means we lose
522 // if we passed <path-permission> checks above, and no default
523 // <provider> permission, then allow access.
568 // <path-permission> below removes this ability
581 // any denied <path-permission> means we lose
590 // if we passed <path-permission> checks above, and no default
591 // <provider> permission, the
691 setReadPermission(String permission) argument
713 setWritePermission(String permission) argument
[all...]
/frameworks/base/services/core/java/com/android/server/firewall/
H A DIntentFirewall.java581 int checkComponentPermission(String permission, int pid, int uid, argument
589 * @param permission If present, the caller must have this permission
596 boolean checkComponentPermission(String permission, int pid, int uid, int owningUid, argument
598 return mAms.checkComponentPermission(permission, pid, uid, owningUid, exported) ==
/frameworks/base/services/core/java/com/android/server/tv/
H A DTvInputManagerService.java263 return pm.checkPermission(android.Manifest.permission.TV_INPUT_HARDWARE,
279 if (!android.Manifest.permission.BIND_TV_INPUT.equals(si.permission)) {
280 Slog.w(TAG, "Skipping TV input " + si.name + ": it does not require the permission "
281 + android.Manifest.permission.BIND_TV_INPUT);
964 android.Manifest.permission.MODIFY_PARENTAL_CONTROLS)
967 "The caller does not have parental controls permission");
1345 if (mContext.checkCallingPermission(android.Manifest.permission.TV_INPUT_HARDWARE)
1362 if (mContext.checkCallingPermission(android.Manifest.permission.TV_INPUT_HARDWARE)
1382 if (mContext.checkCallingPermission(android.Manifest.permission
[all...]
/frameworks/base/core/java/android/content/pm/
H A DPackageParser.java143 * If sdkVersion is 0, then this is not a permission that we want to
150 new PackageParser.NewPermissionInfo(android.Manifest.permission.WRITE_EXTERNAL_STORAGE,
152 new PackageParser.NewPermissionInfo(android.Manifest.permission.READ_PHONE_STATE,
167 new PackageParser.SplitPermissionInfo(android.Manifest.permission.WRITE_EXTERNAL_STORAGE,
168 new String[] { android.Manifest.permission.READ_EXTERNAL_STORAGE },
170 new PackageParser.SplitPermissionInfo(android.Manifest.permission.READ_CONTACTS,
171 new String[] { android.Manifest.permission.READ_CALL_LOG },
173 new PackageParser.SplitPermissionInfo(android.Manifest.permission.WRITE_CONTACTS,
174 new String[] { android.Manifest.permission.WRITE_CALL_LOG },
1477 } else if (tagName.equals("permission
[all...]
/frameworks/base/core/java/android/provider/
H A DDocumentsProvider.java71 * android:permission="android.permission.MANAGE_DOCUMENTS"
82 * {@link android.Manifest.permission#MANAGE_DOCUMENTS}, which is a permission
87 * the system issues narrow URI permission grants to the requesting application.
166 if (!android.Manifest.permission.MANAGE_DOCUMENTS.equals(info.readPermission)
167 || !android.Manifest.permission.MANAGE_DOCUMENTS.equals(info.writePermission)) {
229 * URI permission grants will be updated to point at the new document. If
247 * Upon returning, any URI permission grants for the given document will be
539 * reference, issuing a narrower single-document URI permission gran
[all...]
/frameworks/base/core/tests/coretests/src/android/app/activity/
H A DBroadcastTest.java177 public void registerMyReceiver(IntentFilter filter, String permission) { argument
180 getContext().registerReceiver(mReceiver, filter, permission, null);
/frameworks/base/tools/aapt/
H A DCommand.cpp369 printf("uses-permission: name='%s'", ResTable::normalizeForOutput(name.string()).string());
376 printf("optional-permission: name='%s'",
386 printf("uses-implied-permission: name='%s' reason='%s'\n",
740 } else if (depth == 2 && tag == "permission") {
747 printf("permission: %s\n",
749 } else if (depth == 2 && tag == "uses-permission") {
863 // heuristic is "if an app requests a permission but doesn't explicitly
867 // have no corresponding permission, so we cannot implement any
1300 } else if (tag == "uses-permission") {
1303 if (name == "android.permission
1522 String8 permission = AaptXml::getAttribute(tree, PERMISSION_ATTR, local
1542 String8 permission = AaptXml::getAttribute(tree, PERMISSION_ATTR, local
1581 String8 permission = AaptXml::getResolvedAttribute(res, tree, local
[all...]

Completed in 737 milliseconds

12345678