/frameworks/base/core/java/android/bluetooth/ |
H A D | BluetoothGattServer.java | 337 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission. 430 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission. 456 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission. 484 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission. 516 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission [all...] |
/frameworks/base/core/java/android/hardware/location/ |
H A D | ActivityRecognitionHardware.java | 35 private static final String HARDWARE_PERMISSION = Manifest.permission.LOCATION_HARDWARE;
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | CountryDetectorService.java | 211 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
|
H A D | VibratorService.java | 221 mContext.enforcePermission(android.Manifest.permission.UPDATE_APP_OPS_STATS, 228 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.VIBRATE) 230 throw new SecurityException("Requires VIBRATE permission"); 275 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.VIBRATE) 277 throw new SecurityException("Requires VIBRATE permission"); 328 android.Manifest.permission.VIBRATE,
|
H A D | PersistentDataBlockService.java | 120 Manifest.permission.OEM_UNLOCK_STATE, 449 if (mContext.checkCallingPermission(Manifest.permission.ACCESS_PDB_STATE)
|
H A D | TelephonyRegistry.java | 351 /* Checks permission and throws Security exception */ 458 /* Checks permission and throws Security exception */ 1251 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP) 1351 android.Manifest.permission.READ_PHONE_STATE); 1406 android.Manifest.permission.READ_PRECISE_PHONE_STATE); 1424 android.Manifest.permission.READ_PRECISE_PHONE_STATE); 1428 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.MODIFY_PHONE_STATE) 1441 android.Manifest.permission.ACCESS_COARSE_LOCATION, null); 1447 android.Manifest.permission.ACCESS_COARSE_LOCATION, null); 1453 android.Manifest.permission [all...] |
H A D | LockSettingsService.java | 27 import static android.Manifest.permission.ACCESS_KEYGUARD_SECURE_STORAGE; 29 import static android.Manifest.permission.READ_PROFILE; 202 + " needs permission " + READ_PROFILE + " to read " 423 // These are protected with a read permission
|
/frameworks/base/services/core/java/com/android/server/statusbar/ |
H A D | StatusBarManagerService.java | 458 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR, 463 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.EXPAND_STATUS_BAR, 468 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR_SERVICE, 692 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | WindowManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
/frameworks/opt/net/ims/src/java/com/android/ims/ |
H A D | ImsConfig.java | 39 private static final String MODIFY_PHONE_STATE = android.Manifest.permission.MODIFY_PHONE_STATE;
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/cdma/ |
H A D | CdmaServiceCategoryProgramHandler.java | 109 mContext.sendOrderedBroadcast(intent, Manifest.permission.RECEIVE_SMS,
|
/frameworks/base/services/core/java/com/android/server/wallpaper/ |
H A D | WallpaperManagerService.java | 694 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS); 748 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS); 825 checkPermission(android.Manifest.permission.SET_WALLPAPER); 872 checkPermission(android.Manifest.permission.SET_WALLPAPER_COMPONENT); 929 if (!android.Manifest.permission.BIND_WALLPAPER.equals(si.permission)) { 931 + android.Manifest.permission.BIND_WALLPAPER 1093 private void checkPermission(String permission) { argument 1094 if (PackageManager.PERMISSION_GRANTED!= mContext.checkCallingOrSelfPermission(permission)) { 1096 + ", must have permission " [all...] |
/frameworks/base/core/java/android/os/ |
H A D | INetworkManagementService.aidl | 403 void setPermission(String permission, in int[] uids);
|
/frameworks/base/core/java/android/view/accessibility/ |
H A D | AccessibilityManager.java | 193 Manifest.permission.INTERACT_ACROSS_USERS) 196 Manifest.permission.INTERACT_ACROSS_USERS_FULL)
|
/frameworks/base/docs/html/guide/ |
H A D | guide_toc.cs | 168 <li><a href="<?cs var:toroot ?>guide/topics/manifest/grant-uri-permission-element.html"><grant-uri-permission></a></li> 173 <li><a href="<?cs var:toroot ?>guide/topics/manifest/path-permission-element.html"><path-permission></a></li> 174 <li><a href="<?cs var:toroot ?>guide/topics/manifest/permission-element.html"><permission></a></li> 175 <li><a href="<?cs var:toroot ?>guide/topics/manifest/permission-group-element.html"><permission-group></a></li> 176 <li><a href="<?cs var:toroot ?>guide/topics/manifest/permission-tree-element.html"><permission [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActivityManagerService.java | 19 import static android.Manifest.permission.INTERACT_ACROSS_USERS; 20 import static android.Manifest.permission.INTERACT_ACROSS_USERS_FULL; 21 import static android.Manifest.permission.START_TASKS_FROM_RECENTS; 1913 ServiceManager.addService("permission", new PermissionController(this)); 1964 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) 1968 + " without permission " + android.Manifest.permission.DUMP); 1984 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) 1988 + " without permission " + android.Manifest.permission 6800 checkPermission(String permission, int pid, int uid) argument 6808 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 6823 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 6842 checkPermission(String permission, int pid, int uid) argument 6850 checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument 6873 checkCallingPermission(String permission) argument 6882 enforceCallingPermission(String permission, String func) argument 15564 registerReceiver(IApplicationThread caller, String callerPackage, IIntentReceiver receiver, IntentFilter filter, String permission, int userId) argument [all...] |
/frameworks/base/services/core/java/com/android/server/input/ |
H A D | InputManagerService.java | 555 Slog.w(TAG, "Input event injection from pid " + pid + " permission denied."); 557 "Injecting to another application requires INJECT_EVENTS permission"); 751 if (!checkCallingPermission(android.Manifest.permission.SET_INPUT_CALIBRATION, 753 throw new SecurityException("Requires SET_INPUT_CALIBRATION permission"); 1032 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 1034 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 1071 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 1073 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 1100 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 1102 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 1359 checkCallingPermission(String permission, String func) argument [all...] |
/frameworks/base/services/core/java/com/android/server/wm/ |
H A D | WindowManagerService.java | 3007 mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR) 3029 // if they don't have the permission, mask out the status bar bits 3496 boolean checkCallingPermission(String permission, String func) { argument 3497 // Quick check: if the calling permission is me, it's all okay. 3502 if (mContext.checkCallingPermission(permission) 3509 + " requires " + permission; 3528 if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS, 3530 throw new SecurityException("Requires MANAGE_APP_TOKENS permission"); 3549 if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS, 3551 throw new SecurityException("Requires MANAGE_APP_TOKENS permission"); [all...] |
/frameworks/base/core/java/android/content/ |
H A D | ContentProvider.java | 20 import static android.Manifest.permission.INTERACT_ACROSS_USERS; 142 * @param writePermission The write permission you want this instance should have 500 // <path-permission> below removes this ability 513 // any denied <path-permission> means we lose 522 // if we passed <path-permission> checks above, and no default 523 // <provider> permission, then allow access. 568 // <path-permission> below removes this ability 581 // any denied <path-permission> means we lose 590 // if we passed <path-permission> checks above, and no default 591 // <provider> permission, the 691 setReadPermission(String permission) argument 713 setWritePermission(String permission) argument [all...] |
/frameworks/base/services/core/java/com/android/server/firewall/ |
H A D | IntentFirewall.java | 581 int checkComponentPermission(String permission, int pid, int uid, argument 589 * @param permission If present, the caller must have this permission 596 boolean checkComponentPermission(String permission, int pid, int uid, int owningUid, argument 598 return mAms.checkComponentPermission(permission, pid, uid, owningUid, exported) ==
|
/frameworks/base/services/core/java/com/android/server/tv/ |
H A D | TvInputManagerService.java | 263 return pm.checkPermission(android.Manifest.permission.TV_INPUT_HARDWARE, 279 if (!android.Manifest.permission.BIND_TV_INPUT.equals(si.permission)) { 280 Slog.w(TAG, "Skipping TV input " + si.name + ": it does not require the permission " 281 + android.Manifest.permission.BIND_TV_INPUT); 964 android.Manifest.permission.MODIFY_PARENTAL_CONTROLS) 967 "The caller does not have parental controls permission"); 1345 if (mContext.checkCallingPermission(android.Manifest.permission.TV_INPUT_HARDWARE) 1362 if (mContext.checkCallingPermission(android.Manifest.permission.TV_INPUT_HARDWARE) 1382 if (mContext.checkCallingPermission(android.Manifest.permission [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | PackageParser.java | 143 * If sdkVersion is 0, then this is not a permission that we want to 150 new PackageParser.NewPermissionInfo(android.Manifest.permission.WRITE_EXTERNAL_STORAGE, 152 new PackageParser.NewPermissionInfo(android.Manifest.permission.READ_PHONE_STATE, 167 new PackageParser.SplitPermissionInfo(android.Manifest.permission.WRITE_EXTERNAL_STORAGE, 168 new String[] { android.Manifest.permission.READ_EXTERNAL_STORAGE }, 170 new PackageParser.SplitPermissionInfo(android.Manifest.permission.READ_CONTACTS, 171 new String[] { android.Manifest.permission.READ_CALL_LOG }, 173 new PackageParser.SplitPermissionInfo(android.Manifest.permission.WRITE_CONTACTS, 174 new String[] { android.Manifest.permission.WRITE_CALL_LOG }, 1477 } else if (tagName.equals("permission [all...] |
/frameworks/base/core/java/android/provider/ |
H A D | DocumentsProvider.java | 71 * android:permission="android.permission.MANAGE_DOCUMENTS" 82 * {@link android.Manifest.permission#MANAGE_DOCUMENTS}, which is a permission 87 * the system issues narrow URI permission grants to the requesting application. 166 if (!android.Manifest.permission.MANAGE_DOCUMENTS.equals(info.readPermission) 167 || !android.Manifest.permission.MANAGE_DOCUMENTS.equals(info.writePermission)) { 229 * URI permission grants will be updated to point at the new document. If 247 * Upon returning, any URI permission grants for the given document will be 539 * reference, issuing a narrower single-document URI permission gran [all...] |
/frameworks/base/core/tests/coretests/src/android/app/activity/ |
H A D | BroadcastTest.java | 177 public void registerMyReceiver(IntentFilter filter, String permission) { argument 180 getContext().registerReceiver(mReceiver, filter, permission, null);
|
/frameworks/base/tools/aapt/ |
H A D | Command.cpp | 369 printf("uses-permission: name='%s'", ResTable::normalizeForOutput(name.string()).string()); 376 printf("optional-permission: name='%s'", 386 printf("uses-implied-permission: name='%s' reason='%s'\n", 740 } else if (depth == 2 && tag == "permission") { 747 printf("permission: %s\n", 749 } else if (depth == 2 && tag == "uses-permission") { 863 // heuristic is "if an app requests a permission but doesn't explicitly 867 // have no corresponding permission, so we cannot implement any 1300 } else if (tag == "uses-permission") { 1303 if (name == "android.permission 1522 String8 permission = AaptXml::getAttribute(tree, PERMISSION_ATTR, local 1542 String8 permission = AaptXml::getAttribute(tree, PERMISSION_ATTR, local 1581 String8 permission = AaptXml::getResolvedAttribute(res, tree, local [all...] |