Searched refs:permission (Results 176 - 186 of 186) sorted by relevance

12345678

/frameworks/base/core/java/com/android/internal/app/
H A DResolverActivity.java852 // have permission for. We don't do this when we have an explicit
860 ai.permission, mLaunchedFromUid,
/frameworks/base/core/java/com/android/internal/widget/
H A DLockPatternUtils.java202 Manifest.permission.INTERACT_ACROSS_USERS_FULL) == PackageManager.PERMISSION_GRANTED;
/frameworks/base/services/tests/servicestests/src/com/android/server/content/
H A DSyncStorageEngineTest.java908 public void enforceCallingOrSelfPermission(String permission, String message) { argument
/frameworks/base/core/java/android/app/
H A DActivityManagerNative.java97 * If you don't care about permission, use null.
99 static public void broadcastStickyIntent(Intent intent, String permission, int userId) { argument
103 null /*permission*/, AppOpsManager.OP_NONE, false, true, userId);
3873 public int checkPermission(String permission, int pid, int uid) argument
3878 data.writeString(permission);
3888 public int checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument
3893 data.writeString(permission);
/frameworks/base/core/java/android/view/
H A DViewRootImpl.java588 " -- permission denied for this window type");
6528 private static int checkCallingPermission(String permission) { argument
6531 permission, Binder.getCallingPid(), Binder.getCallingUid());
6543 if (checkCallingPermission(Manifest.permission.DUMP) !=
/frameworks/base/media/java/android/media/
H A DMediaRouter.java126 // enforces this with a permission check. Set a flag here so that we
129 Manifest.permission.CONFIGURE_WIFI_DISPLAY,
1161 * Requires the interact across users permission to access the routes of another user.
1303 // The display manager will enforce this with a permission check but it
/frameworks/base/services/core/java/com/android/server/connectivity/
H A DTethering.java1680 android.Manifest.permission.DUMP) != PackageManager.PERMISSION_GRANTED) {
/frameworks/base/services/core/java/com/android/server/hdmi/
H A DHdmiControlService.java100 static final String PERMISSION = "android.permission.HDMI_CEC";
1620 getContext().enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DWifiScanningServiceImpl.java83 android.Manifest.permission.CONNECTIVITY_INTERNAL,
/frameworks/base/services/core/java/com/android/server/am/
H A DActivityStack.java1597 android.Manifest.permission.STOP_APP_SWITCHES,
/frameworks/base/services/core/java/com/android/server/pm/
H A DSettings.java24 import static android.Manifest.permission.READ_EXTERNAL_STORAGE;
227 // Mapping from permission names to info about them.
231 // Mapping from permission tree names to info about them.
453 "Moving permission " + bp.name
731 * associated with each permission of the deleted package
762 // can safely delete this permission from list
1572 serializer.startTag(null, "permission-trees");
1576 serializer.endTag(null, "permission-trees");
2018 } else if (tagName.equals("permission-trees")) {

Completed in 7492 milliseconds

12345678