Searched refs:permission (Results 26 - 50 of 243) sorted by relevance

12345678910

/frameworks/base/packages/SettingsLib/src/com/android/settingslib/bluetooth/
H A DCachedBluetoothDevice.java670 int permission = mDevice.getPhonebookAccessPermission();
671 if (permission == BluetoothDevice.ACCESS_ALLOWED) {
673 } else if (permission == BluetoothDevice.ACCESS_REJECTED) {
680 int permission = BluetoothDevice.ACCESS_UNKNOWN;
682 permission = BluetoothDevice.ACCESS_ALLOWED;
684 permission = BluetoothDevice.ACCESS_REJECTED;
686 mDevice.setPhonebookAccessPermission(permission);
713 int permission = mDevice.getMessageAccessPermission();
714 if (permission == BluetoothDevice.ACCESS_ALLOWED) {
716 } else if (permission
[all...]
/frameworks/base/services/core/java/com/android/server/
H A DSerialService.java38 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.SERIAL_PORT, null);
53 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.SERIAL_PORT, null);
H A DConsumerIrService.java72 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.TRANSMIT_IR)
74 throw new SecurityException("Requires TRANSMIT_IR permission");
104 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.TRANSMIT_IR)
106 throw new SecurityException("Requires TRANSMIT_IR permission");
H A DNetworkScoreService.java19 import android.Manifest.permission;
187 mContext.checkCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED) ==
206 // mContext.enforceCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED, TAG);
207 mContext.enforceCallingOrSelfPermission(permission.SCORE_NETWORKS, TAG);
217 mContext.checkCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED) ==
267 mContext.enforceCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED, TAG);
279 mContext.enforceCallingOrSelfPermission(permission.DUMP, TAG);
/frameworks/base/core/java/android/net/
H A DNetworkScorerAppManager.java20 import android.Manifest.permission;
85 * <li>Declares the {@link android.Manifest.permission#SCORE_NETWORKS} permission.
87 * {@link android.Manifest.permission#BROADCAST_NETWORK_PRIVILEGED} permission.
106 if (!permission.BROADCAST_NETWORK_PRIVILEGED.equals(receiverInfo.permission)) {
107 // Receiver doesn't require the BROADCAST_NETWORK_PRIVILEGED permission, which means
111 if (pm.checkPermission(permission.SCORE_NETWORKS, receiverInfo.packageName) !=
113 // Application doesn't hold the SCORE_NETWORKS permission, s
[all...]
/frameworks/base/services/core/java/com/android/server/connectivity/
H A DPermissionMonitor.java19 import static android.Manifest.permission.CHANGE_NETWORK_STATE;
20 import static android.Manifest.permission.CONNECTIVITY_INTERNAL;
70 // Keys are App IDs. Values are true for SYSTEM permission and false for NETWORK permission.
132 Boolean permission = mApps.get(uid);
135 if (permission == null || permission == NETWORK) {
152 private boolean hasPermission(PackageInfo app, String permission) { argument
155 if (permission.equals(p)) {
240 Boolean permission
[all...]
/frameworks/base/core/java/android/content/pm/
H A DActivityInfo.java135 * Optional name of a permission required to be able to access this
136 * Activity. From the "permission" attribute.
138 public String permission; field in class:ActivityInfo
708 permission = orig.permission;
744 if (permission != null) {
745 pw.println(prefix + "permission=" + permission);
783 dest.writeString(permission);
812 permission
[all...]
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DPhoneSubInfo.java41 android.Manifest.permission.READ_PHONE_STATE;
44 android.Manifest.permission.CALL_PRIVILEGED;
46 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE;
355 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
371 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE, message);
376 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.READ_PHONE_STATE,
398 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.READ_SMS, message);
H A DCellBroadcastHandler.java85 receiverPermission = Manifest.permission.RECEIVE_EMERGENCY_BROADCAST;
90 receiverPermission = Manifest.permission.RECEIVE_SMS;
/frameworks/base/core/java/android/app/
H A DKeyguardManager.java111 * <p>This method requires the caller to hold the permission
112 * {@link android.Manifest.permission#DISABLE_KEYGUARD}.
116 @RequiresPermission(Manifest.permission.DISABLE_KEYGUARD)
133 * <p>This method requires the caller to hold the permission
134 * {@link android.Manifest.permission#DISABLE_KEYGUARD}.
138 @RequiresPermission(Manifest.permission.DISABLE_KEYGUARD)
291 * disabling the keyguard, your app, which was granted permission to
299 * <p>This method requires the caller to hold the permission
300 * {@link android.Manifest.permission#DISABLE_KEYGUARD}.
307 @RequiresPermission(Manifest.permission
[all...]
/frameworks/base/core/java/android/bluetooth/
H A DBluetoothManager.java85 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission.
94 @RequiresPermission(Manifest.permission.BLUETOOTH)
118 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission.
123 @RequiresPermission(Manifest.permission.BLUETOOTH)
159 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission.
168 @RequiresPermission(Manifest.permission.BLUETOOTH)
H A DBluetoothAdapter.java80 * Most methods require the {@link android.Manifest.permission#BLUETOOTH}
81 * permission and some also require the
82 * {@link android.Manifest.permission#BLUETOOTH_ADMIN} permission.
100 * android.permission.LOCAL_MAC_ADDRESS permission.
122 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} to receive.
214 * <p>Requires {@link android.Manifest.permission#BLUETOOTH}
242 * <p>Requires {@link android.Manifest.permission#BLUETOOTH}
271 * <p>Requires {@link android.Manifest.permission#BLUETOOT
[all...]
/frameworks/base/core/tests/coretests/src/android/net/
H A DNetworkScorerAppManagerTest.java19 import android.Manifest.permission;
63 // Package 2 - Receiver does not have BROADCAST_NETWORK_PRIVILEGED permission.
67 // Package 3 - App does not have SCORE_NETWORKS permission.
133 Mockito.when(mMockPm.checkPermission(permission.SCORE_NETWORKS, packageName))
143 resolveInfo.activityInfo.permission = permission.BROADCAST_NETWORK_PRIVILEGED;
/frameworks/base/services/usb/java/com/android/server/usb/
H A DUsbService.java222 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
228 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
259 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
266 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
273 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
279 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
285 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
291 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
324 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
330 mContext.enforceCallingOrSelfPermission(android.Manifest.permission
[all...]
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/
H A DSmsManagerPermissionTest.java17 package com.android.framework.permission.tests;
38 * {@link android.Manifest.permission#SEND_SMS}.
54 * {@link android.Manifest.permission#SEND_SMS}.
70 * {@link android.Manifest.permission#SEND_MMS}.
H A DVibratorServicePermissionTest.java17 package com.android.framework.permission.tests;
45 * <p>Tests permission:
46 * {@link android.Manifest.permission#VIBRATE}
62 * <p>Tests permission:
63 * {@link android.Manifest.permission#VIBRATE}
78 * <p>Tests permission:
79 * {@link android.Manifest.permission#VIBRATE}
/frameworks/base/services/core/java/com/android/server/dreams/
H A DDreamManagerService.java19 import static android.Manifest.permission.BIND_DREAM_SERVICE;
266 && !BIND_DREAM_SERVICE.equals(serviceInfo.permission)) {
269 + " permission on the dream service declaration.");
408 private void checkPermission(String permission) { argument
409 if (mContext.checkCallingOrSelfPermission(permission)
412 + ", must have permission " + permission);
465 if (mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP)
483 checkPermission(android.Manifest.permission.READ_DREAM_STATE);
496 checkPermission(android.Manifest.permission
[all...]
/frameworks/base/services/core/java/com/android/server/media/
H A DRemoteDisplayProviderWatcher.java151 if (serviceInfo.permission == null || !serviceInfo.permission.equals(
152 Manifest.permission.BIND_REMOTE_DISPLAY)) {
153 // If the service does not require this permission then any app could
158 + "require the BIND_REMOTE_DISPLAY permission in its manifest: "
163 // If the service does not have permission to capture video then it
168 + "permission: " + serviceInfo.packageName + "/" + serviceInfo.name);
176 if (mPackageManager.checkPermission(Manifest.permission.CAPTURE_VIDEO_OUTPUT,
180 if (mPackageManager.checkPermission(Manifest.permission.CAPTURE_SECURE_VIDEO_OUTPUT,
/frameworks/base/core/java/android/service/voice/
H A DVoiceInteractionServiceInfo.java61 if (!Manifest.permission.BIND_VOICE_INTERACTION.equals(si.permission)) {
62 mParseError = "Service does not require permission "
63 + Manifest.permission.BIND_VOICE_INTERACTION;
/frameworks/opt/net/ethernet/java/com/android/server/ethernet/
H A DEthernetServiceImpl.java73 android.Manifest.permission.ACCESS_NETWORK_STATE,
85 android.Manifest.permission.CONNECTIVITY_INTERNAL,
176 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
/frameworks/base/core/java/android/os/
H A DINetworkManagementService.aidl391 * @param permission null if no permissions required to access this network. PERMISSION_NETWORK
392 * or PERMISSION_SYSTEM to set respective permission.
394 void createPhysicalNetwork(int netId, String permission);
422 * Set permission for a network.
423 * @param permission null to clear permissions. PERMISSION_NETWORK or PERMISSION_SYSTEM to set
424 * permission.
426 void setNetworkPermission(int netId, String permission);
428 void setPermission(String permission, in int[] uids);
/frameworks/native/libs/binder/
H A DAppOpsManager.cpp107 int32_t AppOpsManager::permissionToOpCode(const String16& permission) { argument
110 return service->permissionToOpCode(permission);
/frameworks/base/services/core/java/com/android/server/content/
H A DContentService.java89 mContext.enforceCallingOrSelfPermission(Manifest.permission.DUMP,
90 "caller doesn't have the DUMP permission");
92 // This makes it so that future permission checks will be in the context of this
179 * the calling user without requiring any permission, otherwise the caller needs to
180 * hold the INTERACT_ACROSS_USERS_FULL permission or hold a read uri grant to the uri.
195 // cross user permission
200 "no permission to observe other users' provider view");
239 * the calling user without requiring any permission, otherwise the caller needs to
240 * hold the INTERACT_ACROSS_USERS_FULL permission or hold a write uri grant to the uri.
256 // Notify for any user other than the caller requires uri grant or cross user permission
[all...]
/frameworks/base/core/java/android/content/
H A DContextWrapper.java636 public int checkPermission(String permission, int pid, int uid) { argument
637 return mBase.checkPermission(permission, pid, uid);
642 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument
643 return mBase.checkPermission(permission, pid, uid, callerToken);
647 public int checkCallingPermission(String permission) { argument
648 return mBase.checkCallingPermission(permission);
652 public int checkCallingOrSelfPermission(String permission) { argument
653 return mBase.checkCallingOrSelfPermission(permission);
657 public int checkSelfPermission(String permission) { argument
658 return mBase.checkSelfPermission(permission);
662 enforcePermission( String permission, int pid, int uid, String message) argument
668 enforceCallingPermission(String permission, String message) argument
673 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
/frameworks/base/core/jni/
H A Dandroid_os_SELinux.cpp256 * permissionStr: permission name as a string
257 * Returns: boolean: (true) if permission was granted, (false) otherwise
281 ScopedUtfChars permission(env, permissionStr);
282 if (permission.c_str() == NULL) {
288 int accessGranted = selinux_check_access(tmp1, tmp2, objectClass.c_str(), permission.c_str(),
292 objectClass.c_str(), permission.c_str(), accessGranted);

Completed in 1780 milliseconds

12345678910