/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | SmsApplication.java | 19 import android.Manifest.permission; 149 * Require BROADCAST_SMS permission. 152 * Require BROADCAST_WAP_PUSH permission. 156 * Require SEND_RESPOND_VIA_MESSAGE permission. 188 if (!permission.BROADCAST_SMS.equals(activityInfo.permission)) { 211 if (!permission.BROADCAST_WAP_PUSH.equals(activityInfo.permission)) { 231 if (!permission.SEND_RESPOND_VIA_MESSAGE.equals(serviceInfo.permission)) { [all...] |
H A D | WapPushOverSms.java | 275 String permission; 279 permission = android.Manifest.permission.RECEIVE_MMS; 282 permission = android.Manifest.permission.RECEIVE_WAP_PUSH; 314 handler.dispatchIntent(intent, permission, appOp, options, receiver, UserHandle.OWNER);
|
H A D | SmsStorageMonitor.java | 148 mContext.sendBroadcast(intent, android.Manifest.permission.RECEIVE_SMS);
|
H A D | UiccSmsController.java | 240 public void setPremiumSmsPermission(String packageName, int permission) { argument 241 setPremiumSmsPermissionForSubscriber(getPreferredSmsSubscription(), packageName, permission); 245 public void setPremiumSmsPermissionForSubscriber(int subId, String packageName, int permission) { argument 248 iccSmsIntMgr.setPremiumSmsPermission(packageName, permission);
|
H A D | SmsUsageMonitor.java | 72 /** Default checking period for SMS sent without user permission. */ 75 /** Default number of SMS sent in checking period without user permission. */ 99 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */ 102 /** Default premium SMS permission (ask user for each premium SMS sent). */ 105 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */ 108 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */ 138 /** Directory for per-app SMS permission XML file. */ 141 /** Per-app SMS permission XML filename. */ 180 /** XML attribute for the package's premium SMS permission (integer type). */ 533 * Returns the premium SMS permission fo 564 setPremiumSmsPermission(String packageName, int permission) argument [all...] |
/frameworks/base/core/java/android/app/ |
H A D | ContextImpl.java | 1247 + " without permission " + cn.getClassName()); 1374 public int checkPermission(String permission, int pid, int uid) { argument 1375 if (permission == null) { 1376 throw new IllegalArgumentException("permission is null"); 1381 permission, pid, uid); 1389 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 1390 if (permission == null) { 1391 throw new IllegalArgumentException("permission is null"); 1396 permission, pid, uid, callerToken); 1403 public int checkCallingPermission(String permission) { argument 1416 checkCallingOrSelfPermission(String permission) argument 1426 checkSelfPermission(String permission) argument 1434 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument 1449 enforcePermission( String permission, int pid, int uid, String message) argument 1459 enforceCallingPermission(String permission, String message) argument 1468 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
H A D | UiAutomation.java | 850 * Grants a runtime permission to a package for a user. 852 * @param permission The permission to grant. 857 public boolean grantRuntimePermission(String packageName, String permission, argument 864 Log.i(LOG_TAG, "Granting runtime permission"); 868 permission, userHandle.getIdentifier()); 872 Log.e(LOG_TAG, "Error granting runtime permission", re); 878 * Revokes a runtime permission from a package for a user. 880 * @param permission The permission t 885 revokeRuntimePermission(String packageName, String permission, UserHandle userHandle) argument [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | TelephonyRegistry.java | 366 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE, 368 // SKIP checking for run-time permission since caller or self has PRIVILEGED permission 371 android.Manifest.permission.READ_PHONE_STATE, 403 r.canReadPhoneState = true; // permission has been enforced above 479 /* Checks permission and throws Security exception */ 485 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE, null); 486 // SKIP checking for run-time permission since caller or self has PRIVILEGED 487 // permission 666 android.Manifest.permission [all...] |
H A D | MountService.java | 664 android.Manifest.permission.WRITE_MEDIA_STORAGE); 855 enforcePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS); 1554 enforcePermission(android.Manifest.permission.SHUTDOWN); 1604 enforcePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS); 1620 enforcePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS); 1649 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS); 1662 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS); 1679 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS); 1695 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS); 1712 enforcePermission(android.Manifest.permission [all...] |
H A D | DiskStatsService.java | 46 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
|
H A D | SamplingProfilerService.java | 99 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
|
H A D | UpdateLockService.java | 40 static final String PERMISSION = "android.permission.UPDATE_LOCK"; 115 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
H A D | VibratorService.java | 271 mContext.enforcePermission(android.Manifest.permission.UPDATE_APP_OPS_STATS, 278 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.VIBRATE) 280 throw new SecurityException("Requires VIBRATE permission"); 326 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.VIBRATE) 328 throw new SecurityException("Requires VIBRATE permission"); 388 android.Manifest.permission.VIBRATE, 750 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
H A D | TextServicesManagerService.java | 232 if (!android.Manifest.permission.BIND_TEXT_SERVICE.equals(si.permission)) { 234 + ": it does not require the permission " 235 + android.Manifest.permission.BIND_TEXT_SERVICE); 647 android.Manifest.permission.WRITE_SECURE_SETTINGS) 650 "Requires permission " 651 + android.Manifest.permission.WRITE_SECURE_SETTINGS); 664 android.Manifest.permission.WRITE_SECURE_SETTINGS) 667 "Requires permission " 668 + android.Manifest.permission [all...] |
/frameworks/base/core/java/android/bluetooth/le/ |
H A D | BluetoothLeScanner.java | 49 * {@link android.Manifest.permission#BLUETOOTH_ADMIN} permission. 81 * Requires {@link android.Manifest.permission#BLUETOOTH_ADMIN} permission. 83 * {@link android.Manifest.permission#ACCESS_COARSE_LOCATION ACCESS_COARSE_LOCATION} or 84 * {@link android.Manifest.permission#ACCESS_FINE_LOCATION ACCESS_FINE_LOCATION} permission 90 @RequiresPermission(Manifest.permission.BLUETOOTH_ADMIN) 101 * Requires {@link android.Manifest.permission#BLUETOOTH_ADMIN} permission [all...] |
/frameworks/base/core/java/android/net/ |
H A D | NetworkScoreManager.java | 42 * <li>Declares the {@link android.Manifest.permission#SCORE_NETWORKS} permission. 44 * {@link android.Manifest.permission#BROADCAST_NETWORK_PRIVILEGED} permission which scores 200 * {@link android.Manifest.permission#SCORE_NETWORKS} permission. 234 * {@link android.Manifest.permission#BROADCAST_NETWORK_PRIVILEGED} permission. 248 mContext.sendBroadcastAsUser(intent, UserHandle.OWNER, Manifest.permission.SCORE_NETWORKS); 258 * {@link android.Manifest.permission#BROADCAST_NETWORK_PRIVILEGE [all...] |
/frameworks/base/core/java/android/provider/ |
H A D | SearchIndexablesProvider.java | 49 * android:permission="android.permission.READ_SEARCH_INDEXABLES" 59 * {@link android.Manifest.permission#READ_SEARCH_INDEXABLES}, which is a permission only the system 98 if (!android.Manifest.permission.READ_SEARCH_INDEXABLES.equals(info.readPermission)) {
|
/frameworks/base/services/core/java/com/android/server/power/ |
H A D | PowerManagerService.java | 418 // Time when we last logged a warning about calling userActivity() without permission. 3017 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DEVICE_POWER, null); 3032 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.WAKE_LOCK, null); 3035 android.Manifest.permission.DEVICE_POWER, null); 3039 android.Manifest.permission.UPDATE_DEVICE_STATS, null); 3060 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.WAKE_LOCK, null); 3091 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.WAKE_LOCK, null); 3094 android.Manifest.permission.UPDATE_DEVICE_STATS, null); 3121 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DEVICE_POWER) 3124 android.Manifest.permission [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiServiceImpl.java | 526 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.ACCESS_WIFI_STATE, 531 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.CHANGE_WIFI_STATE, 536 mContext.enforceCallingOrSelfPermission(Manifest.permission.LOCATION_HARDWARE, 541 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.READ_WIFI_CREDENTIAL, 546 mContext.enforceCallingPermission(android.Manifest.permission.UPDATE_DEVICE_STATS, 553 android.Manifest.permission.CHANGE_WIFI_MULTICAST_STATE, 559 android.Manifest.permission.CONNECTIVITY_INTERNAL, 1003 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL) 1012 android.Manifest.permission.PEERS_MAC_ADDRESS) == PackageManager.PERMISSION_GRANTED; 1443 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission [all...] |
/frameworks/base/core/java/android/content/ |
H A D | ContentProvider.java | 19 import static android.Manifest.permission.INTERACT_ACROSS_USERS; 148 * @param writePermission The write permission you want this instance should have 515 * Verify that calling app holds both the given permission and any app-op 516 * associated with that permission. 518 private int checkPermissionAndAppOp(String permission, String callingPkg, argument 520 if (getContext().checkPermission(permission, Binder.getCallingPid(), Binder.getCallingUid(), 525 final int permOp = AppOpsManager.permissionToOpCode(permission); 559 // <path-permission> below removes this ability 572 // any denied <path-permission> means we lose 582 // if we passed <path-permission> check 766 setReadPermission(@ullable String permission) argument 788 setWritePermission(@ullable String permission) argument [all...] |
H A D | Context.java | 755 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to 763 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} 764 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required. 868 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to 876 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} 877 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required. 980 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to 988 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} 989 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required. 1228 * <p>This method requires the caller to hold the permission 3281 checkPermission(@onNull String permission, int pid, int uid) argument 3285 checkPermission(@onNull String permission, int pid, int uid, IBinder callerToken) argument 3311 checkCallingPermission(@onNull String permission) argument 3331 checkCallingOrSelfPermission(@onNull String permission) argument 3345 checkSelfPermission(@onNull String permission) argument 3359 enforcePermission( @onNull String permission, int pid, int uid, @Nullable String message) argument 3380 enforceCallingPermission( @onNull String permission, @Nullable String message) argument 3396 enforceCallingOrSelfPermission( @onNull String permission, @Nullable String message) argument [all...] |
/frameworks/base/core/java/android/hardware/soundtrigger/ |
H A D | KeyphraseEnrollmentInfo.java | 113 if (!Manifest.permission.MANAGE_VOICE_KEYPHRASES.equals(ai.permission)) { 115 // require the MANAGE_VOICE_KEYPHRASES permission.
|
/frameworks/base/core/java/com/android/internal/appwidget/ |
H A D | IAppWidgetService.aidl | 62 void setBindAppWidgetPermission(in String packageName, int userId, in boolean permission);
|
/frameworks/support/v4/java/android/support/v4/app/ |
H A D | ActivityCompat.java | 47 * This interface is the contract for receiving the results for permission requests. 283 * and the results of permission requests will be delivered to its {@link 288 * Note that requesting a permission does not guarantee it will be granted and 289 * your app should be able to run without having this permission. 300 * When checking whether you have a permission you should use {@link 341 * Gets whether you should show UI with rationale for requesting a permission. 342 * You should do this only if you do not have the permission and the context in 343 * which the permission is requested does not clearly communicate to the user 344 * what would be the benefit from granting this permission. 346 * For example, if you write a camera app, requesting the camera permission 360 shouldShowRequestPermissionRationale(@onNull Activity activity, @NonNull String permission) argument [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ServiceRecord.java | 78 final String permission;// permission needed to access service field in class:ServiceRecord 212 if (permission != null) { 213 pw.print(prefix); pw.print("permission="); pw.println(permission); 320 permission = sInfo.permission;
|