Searched refs:permission (Results 151 - 175 of 243) sorted by relevance

12345678910

/frameworks/support/v17/leanback/src/android/support/v17/leanback/widget/
H A DSearchBar.java55 * <p>Note: Your application will need to request android.permission.RECORD_AUDIO</p>
721 String permission = "android.permission.RECORD_AUDIO";
722 int res = getContext().checkCallingOrSelfPermission(permission);
724 throw new IllegalStateException("android.permission.RECORD_AUDIO required for search");
/frameworks/support/v4/java/android/support/v4/app/
H A DFragmentActivity.java882 public boolean onShouldShowRequestPermissionRationale(@NonNull String permission) { argument
884 FragmentActivity.this, permission);
/frameworks/base/core/java/android/bluetooth/
H A DBluetoothA2dp.java46 * Each method is protected with its appropriate permission.
68 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission to
89 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission to
222 * <p>Requires {@link android.Manifest.permission#BLUETOOTH_ADMIN}
223 * permission.
263 * <p>Requires {@link android.Manifest.permission#BLUETOOTH_ADMIN}
264 * permission.
345 * <p>Requires {@link android.Manifest.permission#BLUETOOTH_ADMI
[all...]
/frameworks/base/core/java/android/inputmethodservice/
H A DIInputMethodWrapper.java221 if (target.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
/frameworks/base/media/java/android/media/
H A DRingtoneManager.java366 * has the {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} permission.
464 * doesn't have the {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} permission,
506 android.Manifest.permission.READ_EXTERNAL_STORAGE,
508 Log.w(TAG, "No READ_EXTERNAL_STORAGE permission, ignoring ringtones on ext storage");
/frameworks/base/services/backup/java/com/android/server/backup/
H A DTrampoline.java87 throw new SecurityException("No permission to configure backup activity");
327 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
H A DBackupManagerService.java1053 android.Manifest.permission.BACKUP, null);
1059 android.Manifest.permission.BACKUP, null);
1525 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP,
1605 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP,
2309 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP,
8439 // If the caller does not hold the BACKUP permission, it can only request a
8441 if ((mContext.checkPermission(android.Manifest.permission.BACKUP, Binder.getCallingPid(),
8448 // a caller with full permission can ask to back up any participating app
8521 // If the caller does not hold the BACKUP permission, it can only request a
8524 if ((mContext.checkPermission(android.Manifest.permission
[all...]
/frameworks/base/services/core/java/com/android/server/am/
H A DProcessStatsService.java446 android.Manifest.permission.PACKAGE_USAGE_STATS, null);
478 android.Manifest.permission.PACKAGE_USAGE_STATS, null);
615 if (mAm.checkCallingPermission(android.Manifest.permission.DUMP)
619 + " without permission " + android.Manifest.permission.DUMP);
H A DActiveServices.java334 return new ComponentName("!", res.permission != null
335 ? res.permission : "private to package");
519 // r.record is null if findServiceLocked() failed the caller permission check
525 + " requires " + r.permission);
743 mAm.enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
1003 final String permission; field in class:ActiveServices.ServiceLookupResult
1007 permission = _permission;
1100 if (mAm.checkComponentPermission(r.permission,
1114 + " requires " + r.permission);
1115 return new ServiceLookupResult(null, r.permission);
[all...]
H A DActivityStackSupervisor.java19 import static android.Manifest.permission.START_ANY_ACTIVITY;
178 // Activity actions an app cannot start if it uses a permission which is not granted.
183 Manifest.permission.CAMERA);
185 Manifest.permission.CAMERA);
187 Manifest.permission.CALL_PHONE);
192 /** Action restriction: launching the activity is restricted by a permission. */
1058 mService.enforceCallingPermission(android.Manifest.permission.CHANGE_CONFIGURATION,
1575 + ", uid=" + callingUid + ")" + " with revoked permission "
1586 + " requires " + aInfo.permission;
1604 + " requires appop " + AppOpsManager.permissionToOp(aInfo.permission);
[all...]
/frameworks/base/services/core/java/com/android/server/location/
H A DGeofenceManager.java371 android.Manifest.permission.ACCESS_FINE_LOCATION);
/frameworks/base/services/core/java/com/android/server/net/
H A DLockdownVpnTracker.java19 import static android.Manifest.permission.CONNECTIVITY_INTERNAL;
171 // no additional permission checks are necessary.
/frameworks/base/services/core/java/com/android/server/search/
H A DSearchManagerService.java299 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
/frameworks/base/services/tests/servicestests/src/com/android/server/accounts/
H A DAccountManagerServiceTest.java236 public int checkCallingOrSelfPermission(final String permission) { argument
/frameworks/base/services/usage/java/com/android/server/usage/
H A DUsageStatsService.java93 * This data can be queried by apps that have been granted permission by AppOps.
1157 // permission.
1158 return getContext().checkCallingPermission(Manifest.permission.PACKAGE_USAGE_STATS)
1248 getContext().enforceCallingPermission(Manifest.permission.CHANGE_APP_IDLE_STATE,
1249 "No permission to change app idle state");
1274 if (getContext().checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
1278 + " without permission " + android.Manifest.permission.DUMP);
/frameworks/base/services/core/java/com/android/server/
H A DDropBoxManagerService.java163 android.Manifest.permission.READ_LOGS);
279 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.READ_LOGS)
281 throw new SecurityException("READ_LOGS permission required");
312 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
H A DNsdService.java598 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.INTERNET,
604 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.CONNECTIVITY_INTERNAL,
826 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
/frameworks/base/services/core/java/com/android/server/job/
H A DJobSchedulerService.java770 // named service properly requires the BIND_JOB_SERVICE permission
783 if (!JobService.PERMISSION_BIND.equals(si.permission)) {
785 + " does not require android.permission.BIND_JOB_SERVICE permission");
803 // permission
805 android.Manifest.permission.RECEIVE_BOOT_COMPLETED, pid, uid);
826 + " holding RECEIVE_BOOT_COMPLETED permission.");
879 getContext().enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
/frameworks/base/services/core/java/com/android/server/audio/
H A DAudioService.java19 import static android.Manifest.permission.REMOTE_AUDIO_PLAYBACK;
1728 android.Manifest.permission.CAPTURE_AUDIO_OUTPUT))) {
1775 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL)
1870 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL)
2131 android.Manifest.permission.MODIFY_PHONE_STATE)
3526 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.MODIFY_AUDIO_SETTINGS)
5104 // TODO Kill recording streams instead of killing processes holding permission
5128 final String[] permissions = { Manifest.permission.RECORD_AUDIO };
5142 // Skip packages that have permission to interact across users
5143 if (pm.checkPermission(Manifest.permission
[all...]
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/p2p/
H A DWifiP2pServiceImpl.java386 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.ACCESS_WIFI_STATE,
391 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.CHANGE_WIFI_STATE,
397 android.Manifest.permission.CONNECTIVITY_INTERNAL,
403 android.Manifest.permission.CONNECTIVITY_INTERNAL);
408 android.Manifest.permission.LOCATION_HARDWARE);
456 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
/frameworks/base/services/core/java/com/android/server/connectivity/
H A DVpn.java19 import static android.Manifest.permission.BIND_VPN_SERVICE;
250 /** Prepare the VPN for the given package. Does not perform permission checks. */
330 // Verify that the caller matches the given package and has permission to activate VPNs.
514 if (!BIND_VPN_SERVICE.equals(info.serviceInfo.permission)) {
766 mContext.enforceCallingPermission(Manifest.permission.CONTROL_VPN, "Unauthorized Caller");
886 * Should only be called to respond to Binder requests as this enforces caller permission. Use
888 * permission check only when the caller is trusted (or the call is initiated by the system).
/frameworks/base/core/java/android/accounts/
H A DAbstractAccountAuthenticator.java369 final String perm = Manifest.permission.ACCOUNT_MANAGER;
/frameworks/base/core/java/android/app/admin/
H A DDevicePolicyManager.java785 * Permission policy to prompt user for new permission requests for runtime permissions.
791 * Permission policy to always grant new permission requests for runtime permissions.
797 * Permission policy to always deny new permission requests for runtime permissions.
803 * Runtime permission state: The user can manage the permission
809 * Runtime permission state: The permission is granted to the app
810 * and the user cannot manage the permission through the UI.
815 * Runtime permission state: The permission i
4428 setPermissionGrantState(@onNull ComponentName admin, String packageName, String permission, int grantState) argument
4455 getPermissionGrantState(@onNull ComponentName admin, String packageName, String permission) argument
[all...]
/frameworks/base/core/java/android/os/
H A DRecoverySystem.java323 * Requires the {@link android.Manifest.permission#REBOOT} permission.
362 * {@link android.Manifest.permission#REBOOT} permission.
390 * {@link android.Manifest.permission#REBOOT} permission.
414 android.Manifest.permission.MASTER_CLEAR,
/frameworks/base/media/java/android/media/audiopolicy/
H A DAudioPolicy.java232 android.Manifest.permission.MODIFY_AUDIO_ROUTING))) {

Completed in 661 milliseconds

12345678910