Searched refs:permission (Results 176 - 200 of 243) sorted by relevance

12345678910

/frameworks/base/packages/SystemUI/src/com/android/systemui/power/
H A DPowerNotificationWarnings.java380 android.Manifest.permission.STATUS_BAR_SERVICE, mHandler);
/frameworks/base/services/core/java/com/android/server/
H A DBluetoothManagerService.java68 private static final String BLUETOOTH_ADMIN_PERM = android.Manifest.permission.BLUETOOTH_ADMIN;
69 private static final String BLUETOOTH_PERM = android.Manifest.permission.BLUETOOTH;
387 "Need BLUETOOTH permission");
395 "Need BLUETOOTH permission");
403 "Need BLUETOOTH permission");
551 // waive WRITE_SECURE_SETTINGS permission check
601 "Need BLUETOOTH ADMIN permission");
610 throw new SecurityException("no permission to enable Bluetooth quietly");
629 "Need BLUETOOTH ADMIN permission");
638 // waive WRITE_SECURE_SETTINGS permission chec
[all...]
H A DInputMethodManagerService.java1126 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL)
1130 + "the INTERACT_ACROSS_USERS_FULL permission");
2206 + "android.permission.INTERACT_ACROSS_USERS_FULL");
2595 android.Manifest.permission.WRITE_SECURE_SETTINGS)
2598 "Using null token requires permission "
2599 + android.Manifest.permission.WRITE_SECURE_SETTINGS);
2915 if (!android.Manifest.permission.BIND_INPUT_METHOD.equals(
2916 si.permission)) {
2918 + ": it does not require the permission "
2919 + android.Manifest.permission
[all...]
H A DWatchdog.java252 android.Manifest.permission.REBOOT, null);
H A DConnectivityService.java19 import static android.Manifest.permission.RECEIVE_DATA_ACTIVITY_CHANGE;
1407 * Require that the caller is either in the same user or has appropriate permission to interact
1418 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL,
1424 android.Manifest.permission.INTERNET,
1430 android.Manifest.permission.ACCESS_NETWORK_STATE,
1443 android.Manifest.permission.ACCESS_NETWORK_STATE,
1449 android.Manifest.permission.CONNECTIVITY_INTERNAL,
1761 android.Manifest.permission.DUMP)
2698 // Don't call getLinkProperties() as it requires ACCESS_NETWORK_STATE permission, which
2959 * {@link android.Manifest.permission
[all...]
H A DLockSettingsService.java28 import static android.Manifest.permission.ACCESS_KEYGUARD_SECURE_STORAGE;
30 import static android.Manifest.permission.READ_CONTACTS;
272 + " needs permission " + READ_CONTACTS + " to read "
282 + " needs permission " + PERMISSION + " to read "
749 // Reading these settings needs the contacts permission
755 // Reading these settings needs the same permission as checking the password
/frameworks/base/services/core/java/com/android/server/storage/
H A DDeviceStorageMonitorService.java398 if (getContext().checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
/frameworks/base/services/core/java/com/android/server/trust/
H A DTrustAgentWrapper.java53 private static final String PERMISSION = android.Manifest.permission.PROVIDE_TRUST_AGENT;
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DSubscriptionController.java201 * READ_PHONE_STATE permission and the OP_READ_PHONE_STATE app op being
207 * @throws SecurityException if the caller does not have READ_PHONE_STATE permission.
212 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE, message);
214 // SKIP checking run-time permission since self or using PRIVILEDGED permission
217 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.READ_PHONE_STATE,
227 android.Manifest.permission.MODIFY_PHONE_STATE, message);
1806 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP,
/frameworks/base/services/core/java/com/android/server/policy/
H A DPhoneWindowManager.java1849 String permission = null;
1870 permission = android.Manifest.permission.SYSTEM_ALERT_WINDOW;
1874 permission = android.Manifest.permission.INTERNAL_SYSTEM_WINDOW;
1876 if (permission != null) {
1877 if (permission == android.Manifest.permission.SYSTEM_ALERT_WINDOW) {
1899 if (mContext.checkCallingPermission(permission) !=
1908 if (mContext.checkCallingOrSelfPermission(permission)
[all...]
/frameworks/base/core/java/android/app/
H A DFragment.java1153 * Note that requesting a permission does not guarantee it will be granted and
1154 * your app should be able to run without having this permission.
1165 * When checking whether you have a permission you should use {@link
1169 * You cannot request a permission if your activity sets {@link
1179 * if (getActivity().checkSelfPermission(Manifest.permission.READ_CONTACTS)
1181 * requestPermissions(new String[]{Manifest.permission.READ_CONTACTS},
1236 * Gets whether you should show UI with rationale for requesting a permission.
1237 * You should do this only if you do not have the permission and the context in
1238 * which the permission is requested does not clearly communicate to the user
1239 * what would be the benefit from granting this permission
1255 shouldShowRequestPermissionRationale(@onNull String permission) argument
[all...]
/frameworks/base/core/java/android/content/pm/
H A DPackageManager.java181 * {@link ProviderInfo#uriPermissionPatterns URI permission patterns}
254 * if the permission has been granted to the given package.
260 * if the permission has not been granted to the given package.
678 * the old package has target SDK high enough to support runtime permission and
800 * permission that is already defined by some existing package.
802 * <p>The package name of the app which has already defined the permission is passed to
804 * string extra; and the name of the permission being redefined is passed in the
1881 * The action used to request that the user approve a permission request
1917 * the existing definition for the permission.
1925 * {@link #INSTALL_FAILED_DUPLICATE_PERMISSION}. This extra names the permission tha
2615 shouldShowRequestPermissionRationale(String permission) argument
[all...]
H A DPackageInstaller.java227 * permission, incompatible certificates, etc. The user may be able to
997 * Using this API requires holding {@link android.Manifest.permission
1006 @RequiresPermission(android.Manifest.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS)
/frameworks/base/core/java/android/hardware/location/
H A DGeofenceHardwareImpl.java89 // Resolution level constants used for permission checks.
921 if (mContext.checkPermission(android.Manifest.permission.ACCESS_FINE_LOCATION,
924 } else if (mContext.checkPermission(android.Manifest.permission.ACCESS_COARSE_LOCATION,
/frameworks/base/location/java/android/location/
H A DLocationManager.java38 import static android.Manifest.permission.ACCESS_COARSE_LOCATION;
39 import static android.Manifest.permission.ACCESS_FINE_LOCATION;
54 * the {@link android.Manifest.permission#ACCESS_COARSE_LOCATION} or
55 * {@link android.Manifest.permission#ACCESS_FINE_LOCATION} permissions.
56 * If your application only has the coarse permission then it will not have
87 * a location fix. Requires the permission
88 * {@link android.Manifest.permission#ACCESS_FINE_LOCATION}.
106 * the origin of the location update. Requires the permission
107 * {@link android.Manifest.permission#ACCESS_FINE_LOCATION}, although if the GPS is
454 * @throws SecurityException if no suitable permission i
[all...]
/frameworks/base/packages/SystemUI/src/com/android/systemui/usb/
H A DStorageNotification.java158 android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS, null);
160 android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS, null);
/frameworks/support/v4/java/android/support/v4/app/
H A DFragment.java968 * Note that requesting a permission does not guarantee it will be granted and
969 * your app should be able to run without having this permission.
980 * When checking whether you have a permission you should use {@link
988 * if (getActivity().checkSelfPermission(Manifest.permission.READ_CONTACTS)
990 * requestPermissions(new String[]{Manifest.permission.READ_CONTACTS},
1044 * Gets whether you should show UI with rationale for requesting a permission.
1045 * You should do this only if you do not have the permission and the context in
1046 * which the permission is requested does not clearly communicate to the user
1047 * what would be the benefit from granting this permission.
1049 * For example, if you write a camera app, requesting the camera permission
1063 shouldShowRequestPermissionRationale(@onNull String permission) argument
[all...]
/frameworks/base/services/core/java/com/android/server/pm/
H A DUserManagerService.java651 * {@link android.Manifest.permission#MANAGE_USERS MANAGE_USERS}
652 * permission can make certain calls to the UserManager.
661 android.Manifest.permission.MANAGE_USERS,
663 throw new SecurityException("You need MANAGE_USERS permission to: " + message);
1307 android.Manifest.permission.MANAGE_USERS);
1467 android.Manifest.permission.MANAGE_USERS,
1981 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
1986 + " without permission "
1987 + android.Manifest.permission.DUMP);
/frameworks/base/services/appwidget/java/com/android/server/appwidget/
H A DAppWidgetServiceImpl.java450 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP,
633 // A special permission is required for managing white listing.
657 // A special permission is required for managing white listing.
758 // A special permission or white listing is required to bind widgets.
939 // requires a permission which allows only the system to bind to it.
944 // user, and requires the bind permission.
3166 if (!android.Manifest.permission.BIND_REMOTEVIEWS.equals(serviceInfo.permission)) {
3169 + android.Manifest.permission.BIND_REMOTEVIEWS);
3180 android.Manifest.permission
[all...]
/frameworks/base/services/core/java/com/android/server/accounts/
H A DAccountManagerService.java705 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL)
750 + android.Manifest.permission.INTERACT_ACROSS_USERS_FULL);
1892 // if the caller has permission, do the peek. otherwise go the more expensive
1946 // If the caller doesn't have permission then create and return the
1947 // "grant permission" intent instead of the "getAuthToken" intent.
2595 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL)
3570 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
3574 + " without permission " + android.Manifest.permission.DUMP);
3766 + ", has explicit permission
[all...]
/frameworks/base/services/core/java/com/android/server/audio/
H A DMediaFocusControl.java171 * <li>the caller has android.Manifest.permission.MEDIA_CONTENT_CONTROL permission</li>
178 // MEDIA_CONTENT_CONTROL permission check
180 android.Manifest.permission.MEDIA_CONTENT_CONTROL)) {
181 if (DEBUG_RC) { Log.d(TAG, "ok to register Rcd: has MEDIA_CONTENT_CONTROL permission");}
227 ", must have permission " + android.Manifest.permission.MEDIA_CONTENT_CONTROL +
240 ", must have permission " + android.Manifest.permission.MEDIA_CONTENT_CONTROL +
1643 if (mContext.checkCallingPermission("android.permission
[all...]
/frameworks/base/services/print/java/com/android/server/print/
H A DUserState.java650 if (!android.Manifest.permission.BIND_PRINT_SERVICE.equals(
651 installedService.serviceInfo.permission)) {
657 + " since it does not require permission "
658 + android.Manifest.permission.BIND_PRINT_SERVICE);
/frameworks/base/core/java/android/hardware/camera2/
H A DCameraManager.java282 * @throws SecurityException if the application does not have permission to
433 * @throws SecurityException if the application does not have permission to
439 @RequiresPermission(android.Manifest.permission.CAMERA)
/frameworks/base/core/java/android/widget/
H A DActivityChooserModel.java716 if (ActivityManager.checkComponentPermission(activityInfo.permission,
/frameworks/base/media/java/android/media/
H A DMediaDrm.java123 private static final String PERMISSION = android.Manifest.permission.ACCESS_DRM_CERTIFICATES;

Completed in 1828 milliseconds

12345678910