Lines Matching refs:permission

755      * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
763 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
764 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
868 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
876 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
877 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
980 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
988 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
989 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
1228 * <p>This method requires the caller to hold the permission
1229 * {@link android.Manifest.permission#SET_WALLPAPER}.
1237 * <p>This method requires the caller to hold the permission
1238 * {@link android.Manifest.permission#SET_WALLPAPER}.
1246 * <p>This method requires the caller to hold the permission
1247 * {@link android.Manifest.permission#SET_WALLPAPER}.
1269 * the INTERACT_ACROSS_USERS_FULL permission.
1310 * the INTERACT_ACROSS_USERS_FULL permission.
1494 * an optional required permission to be enforced. This
1506 * @param receiverPermission (optional) String naming a permission that
1508 * If null, no permission is required.
1548 * an optional required permission to be enforced. This
1560 * @param receiverPermission (optional) String naming a permission that
1562 * If null, no permission is required.
1599 * If null, no permission is required.
1629 * If null, no permission is required.
1675 * If null, no permission is required.
1718 * the INTERACT_ACROSS_USERS permission.
1729 * the INTERACT_ACROSS_USERS permission.
1734 * @param receiverPermission (optional) String naming a permission that
1736 * If null, no permission is required.
1748 * the INTERACT_ACROSS_USERS permission.
1753 * @param receiverPermission (optional) String naming a permission that
1755 * If null, no permission is required.
1771 * the INTERACT_ACROSS_USERS permission.
1780 * If null, no permission is required.
1830 * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY}
1831 * permission in order to use this API. If you do not hold that
1832 * permission, {@link SecurityException} will be thrown.
1906 * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY}
1907 * permission in order to use this API. If you do not hold that
1908 * permission, {@link SecurityException} will be thrown.
1927 * the INTERACT_ACROSS_USERS permission.
1951 * the INTERACT_ACROSS_USERS permission.
1988 * the INTERACT_ACROSS_USERS permission.
1990 * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY}
1991 * permission in order to use this API. If you do not hold that
1992 * permission, {@link SecurityException} will be thrown.
2080 * no permission is required.
2101 * requires holding the {@link android.Manifest.permission#INTERACT_ACROSS_USERS_FULL}
2102 * permission.
2109 * no permission is required.
2165 * have permission to start the given service.
2198 * have permission to stop the given service.
2233 * have permission to bind to the given service.
3264 * Determine whether the given permission is allowed for a particular
3267 * @param permission The name of the permission being checked.
3270 * user, which will pass every permission check.
3273 * pid/uid is allowed that permission, or
3281 public abstract int checkPermission(@NonNull String permission, int pid, int uid);
3285 public abstract int checkPermission(@NonNull String permission, int pid, int uid,
3290 * granted a particular permission. This is basically the same as calling
3299 * @param permission The name of the permission being checked.
3302 * pid/uid is allowed that permission, or
3311 public abstract int checkCallingPermission(@NonNull String permission);
3315 * granted a particular permission. This is the same as
3319 * @param permission The name of the permission being checked.
3322 * pid/uid is allowed that permission, or
3331 public abstract int checkCallingOrSelfPermission(@NonNull String permission);
3334 * Determine whether <em>you</em> have been granted a particular permission.
3336 * @param permission The name of the permission being checked.
3339 * permission, or {@link PackageManager#PERMISSION_DENIED} if not.
3345 public abstract int checkSelfPermission(@NonNull String permission);
3348 * If the given permission is not allowed for a particular process
3351 * @param permission The name of the permission being checked.
3354 * user, which will pass every permission check.
3360 @NonNull String permission, int pid, int uid, @Nullable String message);
3364 * granted a particular permission, throw a {@link
3375 * @param permission The name of the permission being checked.
3381 @NonNull String permission, @Nullable String message);
3385 * handling has been granted a particular permission, throw a
3391 * @param permission The name of the permission being checked.
3397 @NonNull String permission, @Nullable String message);
3400 * Grant permission to access a specific Uri to another package, regardless
3401 * of whether that package has general permission to access the Uri's
3449 * regular permission access to a Uri, but had received access to it through
3450 * a specific Uri permission grant, you could not revoke that grant with this
3453 * but will remove whatever permission grants to the Uri had been given to the app
3469 * permission to access a specific URI. This only checks for permissions
3477 * user, which will pass every permission check.
3498 * granted permission to access a specific URI. This is basically
3522 * permission to access a specific URI. This is the same as
3542 * Check both a Uri and normal permission. This allows you to perform
3546 * @param uri The Uri whose permission is to be checked, or null to not
3548 * @param readPermission The permission that provides overall read access,
3550 * @param writePermission The permission that provides overall write
3554 * user, which will pass every permission check.
3570 * permission to access a specific URI, throw {@link
3579 * user, which will pass every permission check.
3592 * permission to access a specific URI, throw {@link
3614 * granted permission to access a specific URI, throw {@link
3632 * Enforce both a Uri and normal permission. This allows you to perform
3636 * @param uri The Uri whose permission is to be checked, or null to not
3638 * @param readPermission The permission that provides overall read access,
3640 * @param writePermission The permission that provides overall write
3644 * user, which will pass every permission check.