Searched refs:permission (Results 176 - 186 of 186) sorted by relevance
12345678
/frameworks/base/core/java/com/android/internal/app/ |
H A D | ResolverActivity.java | 852 // have permission for. We don't do this when we have an explicit 860 ai.permission, mLaunchedFromUid,
|
/frameworks/base/core/java/com/android/internal/widget/ |
H A D | LockPatternUtils.java | 202 Manifest.permission.INTERACT_ACROSS_USERS_FULL) == PackageManager.PERMISSION_GRANTED;
|
/frameworks/base/services/tests/servicestests/src/com/android/server/content/ |
H A D | SyncStorageEngineTest.java | 908 public void enforceCallingOrSelfPermission(String permission, String message) { argument
|
/frameworks/base/core/java/android/app/ |
H A D | ActivityManagerNative.java | 97 * If you don't care about permission, use null. 99 static public void broadcastStickyIntent(Intent intent, String permission, int userId) { argument 103 null /*permission*/, AppOpsManager.OP_NONE, false, true, userId); 3873 public int checkPermission(String permission, int pid, int uid) argument 3878 data.writeString(permission); 3888 public int checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument 3893 data.writeString(permission);
|
/frameworks/base/core/java/android/view/ |
H A D | ViewRootImpl.java | 588 " -- permission denied for this window type"); 6528 private static int checkCallingPermission(String permission) { argument 6531 permission, Binder.getCallingPid(), Binder.getCallingUid()); 6543 if (checkCallingPermission(Manifest.permission.DUMP) !=
|
/frameworks/base/media/java/android/media/ |
H A D | MediaRouter.java | 126 // enforces this with a permission check. Set a flag here so that we 129 Manifest.permission.CONFIGURE_WIFI_DISPLAY, 1161 * Requires the interact across users permission to access the routes of another user. 1303 // The display manager will enforce this with a permission check but it
|
/frameworks/base/services/core/java/com/android/server/connectivity/ |
H A D | Tethering.java | 1680 android.Manifest.permission.DUMP) != PackageManager.PERMISSION_GRANTED) {
|
/frameworks/base/services/core/java/com/android/server/hdmi/ |
H A D | HdmiControlService.java | 100 static final String PERMISSION = "android.permission.HDMI_CEC"; 1620 getContext().enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiScanningServiceImpl.java | 83 android.Manifest.permission.CONNECTIVITY_INTERNAL,
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActivityStack.java | 1597 android.Manifest.permission.STOP_APP_SWITCHES,
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | Settings.java | 24 import static android.Manifest.permission.READ_EXTERNAL_STORAGE; 227 // Mapping from permission names to info about them. 231 // Mapping from permission tree names to info about them. 453 "Moving permission " + bp.name 731 * associated with each permission of the deleted package 762 // can safely delete this permission from list 1572 serializer.startTag(null, "permission-trees"); 1576 serializer.endTag(null, "permission-trees"); 2018 } else if (tagName.equals("permission-trees")) {
|
Completed in 7492 milliseconds
12345678