/frameworks/base/packages/SettingsLib/src/com/android/settingslib/bluetooth/ |
H A D | CachedBluetoothDevice.java | 670 int permission = mDevice.getPhonebookAccessPermission(); 671 if (permission == BluetoothDevice.ACCESS_ALLOWED) { 673 } else if (permission == BluetoothDevice.ACCESS_REJECTED) { 680 int permission = BluetoothDevice.ACCESS_UNKNOWN; 682 permission = BluetoothDevice.ACCESS_ALLOWED; 684 permission = BluetoothDevice.ACCESS_REJECTED; 686 mDevice.setPhonebookAccessPermission(permission); 713 int permission = mDevice.getMessageAccessPermission(); 714 if (permission == BluetoothDevice.ACCESS_ALLOWED) { 716 } else if (permission [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | SerialService.java | 38 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.SERIAL_PORT, null); 53 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.SERIAL_PORT, null);
|
H A D | ConsumerIrService.java | 72 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.TRANSMIT_IR) 74 throw new SecurityException("Requires TRANSMIT_IR permission"); 104 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.TRANSMIT_IR) 106 throw new SecurityException("Requires TRANSMIT_IR permission");
|
H A D | NetworkScoreService.java | 19 import android.Manifest.permission; 187 mContext.checkCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED) == 206 // mContext.enforceCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED, TAG); 207 mContext.enforceCallingOrSelfPermission(permission.SCORE_NETWORKS, TAG); 217 mContext.checkCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED) == 267 mContext.enforceCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED, TAG); 279 mContext.enforceCallingOrSelfPermission(permission.DUMP, TAG);
|
/frameworks/base/core/java/android/net/ |
H A D | NetworkScorerAppManager.java | 20 import android.Manifest.permission; 85 * <li>Declares the {@link android.Manifest.permission#SCORE_NETWORKS} permission. 87 * {@link android.Manifest.permission#BROADCAST_NETWORK_PRIVILEGED} permission. 106 if (!permission.BROADCAST_NETWORK_PRIVILEGED.equals(receiverInfo.permission)) { 107 // Receiver doesn't require the BROADCAST_NETWORK_PRIVILEGED permission, which means 111 if (pm.checkPermission(permission.SCORE_NETWORKS, receiverInfo.packageName) != 113 // Application doesn't hold the SCORE_NETWORKS permission, s [all...] |
/frameworks/base/services/core/java/com/android/server/connectivity/ |
H A D | PermissionMonitor.java | 19 import static android.Manifest.permission.CHANGE_NETWORK_STATE; 20 import static android.Manifest.permission.CONNECTIVITY_INTERNAL; 70 // Keys are App IDs. Values are true for SYSTEM permission and false for NETWORK permission. 132 Boolean permission = mApps.get(uid); 135 if (permission == null || permission == NETWORK) { 152 private boolean hasPermission(PackageInfo app, String permission) { argument 155 if (permission.equals(p)) { 240 Boolean permission [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ActivityInfo.java | 135 * Optional name of a permission required to be able to access this 136 * Activity. From the "permission" attribute. 138 public String permission; field in class:ActivityInfo 708 permission = orig.permission; 744 if (permission != null) { 745 pw.println(prefix + "permission=" + permission); 783 dest.writeString(permission); 812 permission [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | PhoneSubInfo.java | 41 android.Manifest.permission.READ_PHONE_STATE; 44 android.Manifest.permission.CALL_PRIVILEGED; 46 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE; 355 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP) 371 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE, message); 376 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.READ_PHONE_STATE, 398 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.READ_SMS, message);
|
H A D | CellBroadcastHandler.java | 85 receiverPermission = Manifest.permission.RECEIVE_EMERGENCY_BROADCAST; 90 receiverPermission = Manifest.permission.RECEIVE_SMS;
|
/frameworks/base/core/java/android/app/ |
H A D | KeyguardManager.java | 111 * <p>This method requires the caller to hold the permission 112 * {@link android.Manifest.permission#DISABLE_KEYGUARD}. 116 @RequiresPermission(Manifest.permission.DISABLE_KEYGUARD) 133 * <p>This method requires the caller to hold the permission 134 * {@link android.Manifest.permission#DISABLE_KEYGUARD}. 138 @RequiresPermission(Manifest.permission.DISABLE_KEYGUARD) 291 * disabling the keyguard, your app, which was granted permission to 299 * <p>This method requires the caller to hold the permission 300 * {@link android.Manifest.permission#DISABLE_KEYGUARD}. 307 @RequiresPermission(Manifest.permission [all...] |
/frameworks/base/core/java/android/bluetooth/ |
H A D | BluetoothManager.java | 85 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission. 94 @RequiresPermission(Manifest.permission.BLUETOOTH) 118 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission. 123 @RequiresPermission(Manifest.permission.BLUETOOTH) 159 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission. 168 @RequiresPermission(Manifest.permission.BLUETOOTH)
|
H A D | BluetoothAdapter.java | 80 * Most methods require the {@link android.Manifest.permission#BLUETOOTH} 81 * permission and some also require the 82 * {@link android.Manifest.permission#BLUETOOTH_ADMIN} permission. 100 * android.permission.LOCAL_MAC_ADDRESS permission. 122 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} to receive. 214 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} 242 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} 271 * <p>Requires {@link android.Manifest.permission#BLUETOOT [all...] |
/frameworks/base/core/tests/coretests/src/android/net/ |
H A D | NetworkScorerAppManagerTest.java | 19 import android.Manifest.permission; 63 // Package 2 - Receiver does not have BROADCAST_NETWORK_PRIVILEGED permission. 67 // Package 3 - App does not have SCORE_NETWORKS permission. 133 Mockito.when(mMockPm.checkPermission(permission.SCORE_NETWORKS, packageName)) 143 resolveInfo.activityInfo.permission = permission.BROADCAST_NETWORK_PRIVILEGED;
|
/frameworks/base/services/usb/java/com/android/server/usb/ |
H A D | UsbService.java | 222 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 228 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 259 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 266 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 273 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 279 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 285 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 291 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 324 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 330 mContext.enforceCallingOrSelfPermission(android.Manifest.permission [all...] |
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | SmsManagerPermissionTest.java | 17 package com.android.framework.permission.tests; 38 * {@link android.Manifest.permission#SEND_SMS}. 54 * {@link android.Manifest.permission#SEND_SMS}. 70 * {@link android.Manifest.permission#SEND_MMS}.
|
H A D | VibratorServicePermissionTest.java | 17 package com.android.framework.permission.tests; 45 * <p>Tests permission: 46 * {@link android.Manifest.permission#VIBRATE} 62 * <p>Tests permission: 63 * {@link android.Manifest.permission#VIBRATE} 78 * <p>Tests permission: 79 * {@link android.Manifest.permission#VIBRATE}
|
/frameworks/base/services/core/java/com/android/server/dreams/ |
H A D | DreamManagerService.java | 19 import static android.Manifest.permission.BIND_DREAM_SERVICE; 266 && !BIND_DREAM_SERVICE.equals(serviceInfo.permission)) { 269 + " permission on the dream service declaration."); 408 private void checkPermission(String permission) { argument 409 if (mContext.checkCallingOrSelfPermission(permission) 412 + ", must have permission " + permission); 465 if (mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP) 483 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 496 checkPermission(android.Manifest.permission [all...] |
/frameworks/base/services/core/java/com/android/server/media/ |
H A D | RemoteDisplayProviderWatcher.java | 151 if (serviceInfo.permission == null || !serviceInfo.permission.equals( 152 Manifest.permission.BIND_REMOTE_DISPLAY)) { 153 // If the service does not require this permission then any app could 158 + "require the BIND_REMOTE_DISPLAY permission in its manifest: " 163 // If the service does not have permission to capture video then it 168 + "permission: " + serviceInfo.packageName + "/" + serviceInfo.name); 176 if (mPackageManager.checkPermission(Manifest.permission.CAPTURE_VIDEO_OUTPUT, 180 if (mPackageManager.checkPermission(Manifest.permission.CAPTURE_SECURE_VIDEO_OUTPUT,
|
/frameworks/base/core/java/android/service/voice/ |
H A D | VoiceInteractionServiceInfo.java | 61 if (!Manifest.permission.BIND_VOICE_INTERACTION.equals(si.permission)) { 62 mParseError = "Service does not require permission " 63 + Manifest.permission.BIND_VOICE_INTERACTION;
|
/frameworks/opt/net/ethernet/java/com/android/server/ethernet/ |
H A D | EthernetServiceImpl.java | 73 android.Manifest.permission.ACCESS_NETWORK_STATE, 85 android.Manifest.permission.CONNECTIVITY_INTERNAL, 176 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
/frameworks/base/core/java/android/os/ |
H A D | INetworkManagementService.aidl | 391 * @param permission null if no permissions required to access this network. PERMISSION_NETWORK 392 * or PERMISSION_SYSTEM to set respective permission. 394 void createPhysicalNetwork(int netId, String permission); 422 * Set permission for a network. 423 * @param permission null to clear permissions. PERMISSION_NETWORK or PERMISSION_SYSTEM to set 424 * permission. 426 void setNetworkPermission(int netId, String permission); 428 void setPermission(String permission, in int[] uids);
|
/frameworks/native/libs/binder/ |
H A D | AppOpsManager.cpp | 107 int32_t AppOpsManager::permissionToOpCode(const String16& permission) { argument 110 return service->permissionToOpCode(permission);
|
/frameworks/base/services/core/java/com/android/server/content/ |
H A D | ContentService.java | 89 mContext.enforceCallingOrSelfPermission(Manifest.permission.DUMP, 90 "caller doesn't have the DUMP permission"); 92 // This makes it so that future permission checks will be in the context of this 179 * the calling user without requiring any permission, otherwise the caller needs to 180 * hold the INTERACT_ACROSS_USERS_FULL permission or hold a read uri grant to the uri. 195 // cross user permission 200 "no permission to observe other users' provider view"); 239 * the calling user without requiring any permission, otherwise the caller needs to 240 * hold the INTERACT_ACROSS_USERS_FULL permission or hold a write uri grant to the uri. 256 // Notify for any user other than the caller requires uri grant or cross user permission [all...] |
/frameworks/base/core/java/android/content/ |
H A D | ContextWrapper.java | 636 public int checkPermission(String permission, int pid, int uid) { argument 637 return mBase.checkPermission(permission, pid, uid); 642 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 643 return mBase.checkPermission(permission, pid, uid, callerToken); 647 public int checkCallingPermission(String permission) { argument 648 return mBase.checkCallingPermission(permission); 652 public int checkCallingOrSelfPermission(String permission) { argument 653 return mBase.checkCallingOrSelfPermission(permission); 657 public int checkSelfPermission(String permission) { argument 658 return mBase.checkSelfPermission(permission); 662 enforcePermission( String permission, int pid, int uid, String message) argument 668 enforceCallingPermission(String permission, String message) argument 673 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
/frameworks/base/core/jni/ |
H A D | android_os_SELinux.cpp | 256 * permissionStr: permission name as a string 257 * Returns: boolean: (true) if permission was granted, (false) otherwise 281 ScopedUtfChars permission(env, permissionStr); 282 if (permission.c_str() == NULL) { 288 int accessGranted = selinux_check_access(tmp1, tmp2, objectClass.c_str(), permission.c_str(), 292 objectClass.c_str(), permission.c_str(), accessGranted);
|