Searched refs:permission (Results 76 - 100 of 243) sorted by relevance

12345678910

/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DSmsApplication.java19 import android.Manifest.permission;
149 * Require BROADCAST_SMS permission.
152 * Require BROADCAST_WAP_PUSH permission.
156 * Require SEND_RESPOND_VIA_MESSAGE permission.
188 if (!permission.BROADCAST_SMS.equals(activityInfo.permission)) {
211 if (!permission.BROADCAST_WAP_PUSH.equals(activityInfo.permission)) {
231 if (!permission.SEND_RESPOND_VIA_MESSAGE.equals(serviceInfo.permission)) {
[all...]
H A DWapPushOverSms.java275 String permission;
279 permission = android.Manifest.permission.RECEIVE_MMS;
282 permission = android.Manifest.permission.RECEIVE_WAP_PUSH;
314 handler.dispatchIntent(intent, permission, appOp, options, receiver, UserHandle.OWNER);
H A DSmsStorageMonitor.java148 mContext.sendBroadcast(intent, android.Manifest.permission.RECEIVE_SMS);
H A DUiccSmsController.java240 public void setPremiumSmsPermission(String packageName, int permission) { argument
241 setPremiumSmsPermissionForSubscriber(getPreferredSmsSubscription(), packageName, permission);
245 public void setPremiumSmsPermissionForSubscriber(int subId, String packageName, int permission) { argument
248 iccSmsIntMgr.setPremiumSmsPermission(packageName, permission);
H A DSmsUsageMonitor.java72 /** Default checking period for SMS sent without user permission. */
75 /** Default number of SMS sent in checking period without user permission. */
99 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */
102 /** Default premium SMS permission (ask user for each premium SMS sent). */
105 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */
108 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */
138 /** Directory for per-app SMS permission XML file. */
141 /** Per-app SMS permission XML filename. */
180 /** XML attribute for the package's premium SMS permission (integer type). */
533 * Returns the premium SMS permission fo
564 setPremiumSmsPermission(String packageName, int permission) argument
[all...]
/frameworks/base/core/java/android/app/
H A DContextImpl.java1247 + " without permission " + cn.getClassName());
1374 public int checkPermission(String permission, int pid, int uid) { argument
1375 if (permission == null) {
1376 throw new IllegalArgumentException("permission is null");
1381 permission, pid, uid);
1389 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument
1390 if (permission == null) {
1391 throw new IllegalArgumentException("permission is null");
1396 permission, pid, uid, callerToken);
1403 public int checkCallingPermission(String permission) { argument
1416 checkCallingOrSelfPermission(String permission) argument
1426 checkSelfPermission(String permission) argument
1434 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument
1449 enforcePermission( String permission, int pid, int uid, String message) argument
1459 enforceCallingPermission(String permission, String message) argument
1468 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
H A DUiAutomation.java850 * Grants a runtime permission to a package for a user.
852 * @param permission The permission to grant.
857 public boolean grantRuntimePermission(String packageName, String permission, argument
864 Log.i(LOG_TAG, "Granting runtime permission");
868 permission, userHandle.getIdentifier());
872 Log.e(LOG_TAG, "Error granting runtime permission", re);
878 * Revokes a runtime permission from a package for a user.
880 * @param permission The permission t
885 revokeRuntimePermission(String packageName, String permission, UserHandle userHandle) argument
[all...]
/frameworks/base/services/core/java/com/android/server/
H A DTelephonyRegistry.java366 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE,
368 // SKIP checking for run-time permission since caller or self has PRIVILEGED permission
371 android.Manifest.permission.READ_PHONE_STATE,
403 r.canReadPhoneState = true; // permission has been enforced above
479 /* Checks permission and throws Security exception */
485 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE, null);
486 // SKIP checking for run-time permission since caller or self has PRIVILEGED
487 // permission
666 android.Manifest.permission
[all...]
H A DMountService.java664 android.Manifest.permission.WRITE_MEDIA_STORAGE);
855 enforcePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS);
1554 enforcePermission(android.Manifest.permission.SHUTDOWN);
1604 enforcePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS);
1620 enforcePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS);
1649 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS);
1662 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS);
1679 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS);
1695 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS);
1712 enforcePermission(android.Manifest.permission
[all...]
H A DDiskStatsService.java46 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
H A DSamplingProfilerService.java99 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
H A DUpdateLockService.java40 static final String PERMISSION = "android.permission.UPDATE_LOCK";
115 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
H A DVibratorService.java271 mContext.enforcePermission(android.Manifest.permission.UPDATE_APP_OPS_STATS,
278 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.VIBRATE)
280 throw new SecurityException("Requires VIBRATE permission");
326 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.VIBRATE)
328 throw new SecurityException("Requires VIBRATE permission");
388 android.Manifest.permission.VIBRATE,
750 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
H A DTextServicesManagerService.java232 if (!android.Manifest.permission.BIND_TEXT_SERVICE.equals(si.permission)) {
234 + ": it does not require the permission "
235 + android.Manifest.permission.BIND_TEXT_SERVICE);
647 android.Manifest.permission.WRITE_SECURE_SETTINGS)
650 "Requires permission "
651 + android.Manifest.permission.WRITE_SECURE_SETTINGS);
664 android.Manifest.permission.WRITE_SECURE_SETTINGS)
667 "Requires permission "
668 + android.Manifest.permission
[all...]
/frameworks/base/core/java/android/bluetooth/le/
H A DBluetoothLeScanner.java49 * {@link android.Manifest.permission#BLUETOOTH_ADMIN} permission.
81 * Requires {@link android.Manifest.permission#BLUETOOTH_ADMIN} permission.
83 * {@link android.Manifest.permission#ACCESS_COARSE_LOCATION ACCESS_COARSE_LOCATION} or
84 * {@link android.Manifest.permission#ACCESS_FINE_LOCATION ACCESS_FINE_LOCATION} permission
90 @RequiresPermission(Manifest.permission.BLUETOOTH_ADMIN)
101 * Requires {@link android.Manifest.permission#BLUETOOTH_ADMIN} permission
[all...]
/frameworks/base/core/java/android/net/
H A DNetworkScoreManager.java42 * <li>Declares the {@link android.Manifest.permission#SCORE_NETWORKS} permission.
44 * {@link android.Manifest.permission#BROADCAST_NETWORK_PRIVILEGED} permission which scores
200 * {@link android.Manifest.permission#SCORE_NETWORKS} permission.
234 * {@link android.Manifest.permission#BROADCAST_NETWORK_PRIVILEGED} permission.
248 mContext.sendBroadcastAsUser(intent, UserHandle.OWNER, Manifest.permission.SCORE_NETWORKS);
258 * {@link android.Manifest.permission#BROADCAST_NETWORK_PRIVILEGE
[all...]
/frameworks/base/core/java/android/provider/
H A DSearchIndexablesProvider.java49 * android:permission="android.permission.READ_SEARCH_INDEXABLES"
59 * {@link android.Manifest.permission#READ_SEARCH_INDEXABLES}, which is a permission only the system
98 if (!android.Manifest.permission.READ_SEARCH_INDEXABLES.equals(info.readPermission)) {
/frameworks/base/services/core/java/com/android/server/power/
H A DPowerManagerService.java418 // Time when we last logged a warning about calling userActivity() without permission.
3017 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DEVICE_POWER, null);
3032 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.WAKE_LOCK, null);
3035 android.Manifest.permission.DEVICE_POWER, null);
3039 android.Manifest.permission.UPDATE_DEVICE_STATS, null);
3060 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.WAKE_LOCK, null);
3091 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.WAKE_LOCK, null);
3094 android.Manifest.permission.UPDATE_DEVICE_STATS, null);
3121 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DEVICE_POWER)
3124 android.Manifest.permission
[all...]
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DWifiServiceImpl.java526 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.ACCESS_WIFI_STATE,
531 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.CHANGE_WIFI_STATE,
536 mContext.enforceCallingOrSelfPermission(Manifest.permission.LOCATION_HARDWARE,
541 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.READ_WIFI_CREDENTIAL,
546 mContext.enforceCallingPermission(android.Manifest.permission.UPDATE_DEVICE_STATS,
553 android.Manifest.permission.CHANGE_WIFI_MULTICAST_STATE,
559 android.Manifest.permission.CONNECTIVITY_INTERNAL,
1003 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL)
1012 android.Manifest.permission.PEERS_MAC_ADDRESS) == PackageManager.PERMISSION_GRANTED;
1443 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission
[all...]
/frameworks/base/core/java/android/content/
H A DContentProvider.java19 import static android.Manifest.permission.INTERACT_ACROSS_USERS;
148 * @param writePermission The write permission you want this instance should have
515 * Verify that calling app holds both the given permission and any app-op
516 * associated with that permission.
518 private int checkPermissionAndAppOp(String permission, String callingPkg, argument
520 if (getContext().checkPermission(permission, Binder.getCallingPid(), Binder.getCallingUid(),
525 final int permOp = AppOpsManager.permissionToOpCode(permission);
559 // <path-permission> below removes this ability
572 // any denied <path-permission> means we lose
582 // if we passed <path-permission> check
766 setReadPermission(@ullable String permission) argument
788 setWritePermission(@ullable String permission) argument
[all...]
H A DContext.java755 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
763 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
764 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
868 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
876 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
877 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
980 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
988 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
989 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
1228 * <p>This method requires the caller to hold the permission
3281 checkPermission(@onNull String permission, int pid, int uid) argument
3285 checkPermission(@onNull String permission, int pid, int uid, IBinder callerToken) argument
3311 checkCallingPermission(@onNull String permission) argument
3331 checkCallingOrSelfPermission(@onNull String permission) argument
3345 checkSelfPermission(@onNull String permission) argument
3359 enforcePermission( @onNull String permission, int pid, int uid, @Nullable String message) argument
3380 enforceCallingPermission( @onNull String permission, @Nullable String message) argument
3396 enforceCallingOrSelfPermission( @onNull String permission, @Nullable String message) argument
[all...]
/frameworks/base/core/java/android/hardware/soundtrigger/
H A DKeyphraseEnrollmentInfo.java113 if (!Manifest.permission.MANAGE_VOICE_KEYPHRASES.equals(ai.permission)) {
115 // require the MANAGE_VOICE_KEYPHRASES permission.
/frameworks/base/core/java/com/android/internal/appwidget/
H A DIAppWidgetService.aidl62 void setBindAppWidgetPermission(in String packageName, int userId, in boolean permission);
/frameworks/support/v4/java/android/support/v4/app/
H A DActivityCompat.java47 * This interface is the contract for receiving the results for permission requests.
283 * and the results of permission requests will be delivered to its {@link
288 * Note that requesting a permission does not guarantee it will be granted and
289 * your app should be able to run without having this permission.
300 * When checking whether you have a permission you should use {@link
341 * Gets whether you should show UI with rationale for requesting a permission.
342 * You should do this only if you do not have the permission and the context in
343 * which the permission is requested does not clearly communicate to the user
344 * what would be the benefit from granting this permission.
346 * For example, if you write a camera app, requesting the camera permission
360 shouldShowRequestPermissionRationale(@onNull Activity activity, @NonNull String permission) argument
[all...]
/frameworks/base/services/core/java/com/android/server/am/
H A DServiceRecord.java78 final String permission;// permission needed to access service field in class:ServiceRecord
212 if (permission != null) {
213 pw.print(prefix); pw.print("permission="); pw.println(permission);
320 permission = sInfo.permission;

Completed in 382 milliseconds

12345678910