/frameworks/base/packages/SystemUI/src/com/android/systemui/power/ |
H A D | PowerNotificationWarnings.java | 380 android.Manifest.permission.STATUS_BAR_SERVICE, mHandler);
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | BluetoothManagerService.java | 68 private static final String BLUETOOTH_ADMIN_PERM = android.Manifest.permission.BLUETOOTH_ADMIN; 69 private static final String BLUETOOTH_PERM = android.Manifest.permission.BLUETOOTH; 387 "Need BLUETOOTH permission"); 395 "Need BLUETOOTH permission"); 403 "Need BLUETOOTH permission"); 551 // waive WRITE_SECURE_SETTINGS permission check 601 "Need BLUETOOTH ADMIN permission"); 610 throw new SecurityException("no permission to enable Bluetooth quietly"); 629 "Need BLUETOOTH ADMIN permission"); 638 // waive WRITE_SECURE_SETTINGS permission chec [all...] |
H A D | InputMethodManagerService.java | 1126 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL) 1130 + "the INTERACT_ACROSS_USERS_FULL permission"); 2206 + "android.permission.INTERACT_ACROSS_USERS_FULL"); 2595 android.Manifest.permission.WRITE_SECURE_SETTINGS) 2598 "Using null token requires permission " 2599 + android.Manifest.permission.WRITE_SECURE_SETTINGS); 2915 if (!android.Manifest.permission.BIND_INPUT_METHOD.equals( 2916 si.permission)) { 2918 + ": it does not require the permission " 2919 + android.Manifest.permission [all...] |
H A D | Watchdog.java | 252 android.Manifest.permission.REBOOT, null);
|
H A D | ConnectivityService.java | 19 import static android.Manifest.permission.RECEIVE_DATA_ACTIVITY_CHANGE; 1407 * Require that the caller is either in the same user or has appropriate permission to interact 1418 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL, 1424 android.Manifest.permission.INTERNET, 1430 android.Manifest.permission.ACCESS_NETWORK_STATE, 1443 android.Manifest.permission.ACCESS_NETWORK_STATE, 1449 android.Manifest.permission.CONNECTIVITY_INTERNAL, 1761 android.Manifest.permission.DUMP) 2698 // Don't call getLinkProperties() as it requires ACCESS_NETWORK_STATE permission, which 2959 * {@link android.Manifest.permission [all...] |
H A D | LockSettingsService.java | 28 import static android.Manifest.permission.ACCESS_KEYGUARD_SECURE_STORAGE; 30 import static android.Manifest.permission.READ_CONTACTS; 272 + " needs permission " + READ_CONTACTS + " to read " 282 + " needs permission " + PERMISSION + " to read " 749 // Reading these settings needs the contacts permission 755 // Reading these settings needs the same permission as checking the password
|
/frameworks/base/services/core/java/com/android/server/storage/ |
H A D | DeviceStorageMonitorService.java | 398 if (getContext().checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
/frameworks/base/services/core/java/com/android/server/trust/ |
H A D | TrustAgentWrapper.java | 53 private static final String PERMISSION = android.Manifest.permission.PROVIDE_TRUST_AGENT;
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | SubscriptionController.java | 201 * READ_PHONE_STATE permission and the OP_READ_PHONE_STATE app op being 207 * @throws SecurityException if the caller does not have READ_PHONE_STATE permission. 212 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE, message); 214 // SKIP checking run-time permission since self or using PRIVILEDGED permission 217 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.READ_PHONE_STATE, 227 android.Manifest.permission.MODIFY_PHONE_STATE, message); 1806 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP,
|
/frameworks/base/services/core/java/com/android/server/policy/ |
H A D | PhoneWindowManager.java | 1849 String permission = null; 1870 permission = android.Manifest.permission.SYSTEM_ALERT_WINDOW; 1874 permission = android.Manifest.permission.INTERNAL_SYSTEM_WINDOW; 1876 if (permission != null) { 1877 if (permission == android.Manifest.permission.SYSTEM_ALERT_WINDOW) { 1899 if (mContext.checkCallingPermission(permission) != 1908 if (mContext.checkCallingOrSelfPermission(permission) [all...] |
/frameworks/base/core/java/android/app/ |
H A D | Fragment.java | 1153 * Note that requesting a permission does not guarantee it will be granted and 1154 * your app should be able to run without having this permission. 1165 * When checking whether you have a permission you should use {@link 1169 * You cannot request a permission if your activity sets {@link 1179 * if (getActivity().checkSelfPermission(Manifest.permission.READ_CONTACTS) 1181 * requestPermissions(new String[]{Manifest.permission.READ_CONTACTS}, 1236 * Gets whether you should show UI with rationale for requesting a permission. 1237 * You should do this only if you do not have the permission and the context in 1238 * which the permission is requested does not clearly communicate to the user 1239 * what would be the benefit from granting this permission 1255 shouldShowRequestPermissionRationale(@onNull String permission) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | PackageManager.java | 181 * {@link ProviderInfo#uriPermissionPatterns URI permission patterns} 254 * if the permission has been granted to the given package. 260 * if the permission has not been granted to the given package. 678 * the old package has target SDK high enough to support runtime permission and 800 * permission that is already defined by some existing package. 802 * <p>The package name of the app which has already defined the permission is passed to 804 * string extra; and the name of the permission being redefined is passed in the 1881 * The action used to request that the user approve a permission request 1917 * the existing definition for the permission. 1925 * {@link #INSTALL_FAILED_DUPLICATE_PERMISSION}. This extra names the permission tha 2615 shouldShowRequestPermissionRationale(String permission) argument [all...] |
H A D | PackageInstaller.java | 227 * permission, incompatible certificates, etc. The user may be able to 997 * Using this API requires holding {@link android.Manifest.permission 1006 @RequiresPermission(android.Manifest.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS)
|
/frameworks/base/core/java/android/hardware/location/ |
H A D | GeofenceHardwareImpl.java | 89 // Resolution level constants used for permission checks. 921 if (mContext.checkPermission(android.Manifest.permission.ACCESS_FINE_LOCATION, 924 } else if (mContext.checkPermission(android.Manifest.permission.ACCESS_COARSE_LOCATION,
|
/frameworks/base/location/java/android/location/ |
H A D | LocationManager.java | 38 import static android.Manifest.permission.ACCESS_COARSE_LOCATION; 39 import static android.Manifest.permission.ACCESS_FINE_LOCATION; 54 * the {@link android.Manifest.permission#ACCESS_COARSE_LOCATION} or 55 * {@link android.Manifest.permission#ACCESS_FINE_LOCATION} permissions. 56 * If your application only has the coarse permission then it will not have 87 * a location fix. Requires the permission 88 * {@link android.Manifest.permission#ACCESS_FINE_LOCATION}. 106 * the origin of the location update. Requires the permission 107 * {@link android.Manifest.permission#ACCESS_FINE_LOCATION}, although if the GPS is 454 * @throws SecurityException if no suitable permission i [all...] |
/frameworks/base/packages/SystemUI/src/com/android/systemui/usb/ |
H A D | StorageNotification.java | 158 android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS, null); 160 android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS, null);
|
/frameworks/support/v4/java/android/support/v4/app/ |
H A D | Fragment.java | 968 * Note that requesting a permission does not guarantee it will be granted and 969 * your app should be able to run without having this permission. 980 * When checking whether you have a permission you should use {@link 988 * if (getActivity().checkSelfPermission(Manifest.permission.READ_CONTACTS) 990 * requestPermissions(new String[]{Manifest.permission.READ_CONTACTS}, 1044 * Gets whether you should show UI with rationale for requesting a permission. 1045 * You should do this only if you do not have the permission and the context in 1046 * which the permission is requested does not clearly communicate to the user 1047 * what would be the benefit from granting this permission. 1049 * For example, if you write a camera app, requesting the camera permission 1063 shouldShowRequestPermissionRationale(@onNull String permission) argument [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | UserManagerService.java | 651 * {@link android.Manifest.permission#MANAGE_USERS MANAGE_USERS} 652 * permission can make certain calls to the UserManager. 661 android.Manifest.permission.MANAGE_USERS, 663 throw new SecurityException("You need MANAGE_USERS permission to: " + message); 1307 android.Manifest.permission.MANAGE_USERS); 1467 android.Manifest.permission.MANAGE_USERS, 1981 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP) 1986 + " without permission " 1987 + android.Manifest.permission.DUMP);
|
/frameworks/base/services/appwidget/java/com/android/server/appwidget/ |
H A D | AppWidgetServiceImpl.java | 450 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, 633 // A special permission is required for managing white listing. 657 // A special permission is required for managing white listing. 758 // A special permission or white listing is required to bind widgets. 939 // requires a permission which allows only the system to bind to it. 944 // user, and requires the bind permission. 3166 if (!android.Manifest.permission.BIND_REMOTEVIEWS.equals(serviceInfo.permission)) { 3169 + android.Manifest.permission.BIND_REMOTEVIEWS); 3180 android.Manifest.permission [all...] |
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | AccountManagerService.java | 705 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL) 750 + android.Manifest.permission.INTERACT_ACROSS_USERS_FULL); 1892 // if the caller has permission, do the peek. otherwise go the more expensive 1946 // If the caller doesn't have permission then create and return the 1947 // "grant permission" intent instead of the "getAuthToken" intent. 2595 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL) 3570 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP) 3574 + " without permission " + android.Manifest.permission.DUMP); 3766 + ", has explicit permission [all...] |
/frameworks/base/services/core/java/com/android/server/audio/ |
H A D | MediaFocusControl.java | 171 * <li>the caller has android.Manifest.permission.MEDIA_CONTENT_CONTROL permission</li> 178 // MEDIA_CONTENT_CONTROL permission check 180 android.Manifest.permission.MEDIA_CONTENT_CONTROL)) { 181 if (DEBUG_RC) { Log.d(TAG, "ok to register Rcd: has MEDIA_CONTENT_CONTROL permission");} 227 ", must have permission " + android.Manifest.permission.MEDIA_CONTENT_CONTROL + 240 ", must have permission " + android.Manifest.permission.MEDIA_CONTENT_CONTROL + 1643 if (mContext.checkCallingPermission("android.permission [all...] |
/frameworks/base/services/print/java/com/android/server/print/ |
H A D | UserState.java | 650 if (!android.Manifest.permission.BIND_PRINT_SERVICE.equals( 651 installedService.serviceInfo.permission)) { 657 + " since it does not require permission " 658 + android.Manifest.permission.BIND_PRINT_SERVICE);
|
/frameworks/base/core/java/android/hardware/camera2/ |
H A D | CameraManager.java | 282 * @throws SecurityException if the application does not have permission to 433 * @throws SecurityException if the application does not have permission to 439 @RequiresPermission(android.Manifest.permission.CAMERA)
|
/frameworks/base/core/java/android/widget/ |
H A D | ActivityChooserModel.java | 716 if (ActivityManager.checkComponentPermission(activityInfo.permission,
|
/frameworks/base/media/java/android/media/ |
H A D | MediaDrm.java | 123 private static final String PERMISSION = android.Manifest.permission.ACCESS_DRM_CERTIFICATES;
|