/frameworks/support/v17/leanback/src/android/support/v17/leanback/widget/ |
H A D | SearchBar.java | 55 * <p>Note: Your application will need to request android.permission.RECORD_AUDIO</p> 721 String permission = "android.permission.RECORD_AUDIO"; 722 int res = getContext().checkCallingOrSelfPermission(permission); 724 throw new IllegalStateException("android.permission.RECORD_AUDIO required for search");
|
/frameworks/support/v4/java/android/support/v4/app/ |
H A D | FragmentActivity.java | 882 public boolean onShouldShowRequestPermissionRationale(@NonNull String permission) { argument 884 FragmentActivity.this, permission);
|
/frameworks/base/core/java/android/bluetooth/ |
H A D | BluetoothA2dp.java | 46 * Each method is protected with its appropriate permission. 68 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission to 89 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission to 222 * <p>Requires {@link android.Manifest.permission#BLUETOOTH_ADMIN} 223 * permission. 263 * <p>Requires {@link android.Manifest.permission#BLUETOOTH_ADMIN} 264 * permission. 345 * <p>Requires {@link android.Manifest.permission#BLUETOOTH_ADMI [all...] |
/frameworks/base/core/java/android/inputmethodservice/ |
H A D | IInputMethodWrapper.java | 221 if (target.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
/frameworks/base/media/java/android/media/ |
H A D | RingtoneManager.java | 366 * has the {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} permission. 464 * doesn't have the {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} permission, 506 android.Manifest.permission.READ_EXTERNAL_STORAGE, 508 Log.w(TAG, "No READ_EXTERNAL_STORAGE permission, ignoring ringtones on ext storage");
|
/frameworks/base/services/backup/java/com/android/server/backup/ |
H A D | Trampoline.java | 87 throw new SecurityException("No permission to configure backup activity"); 327 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
|
H A D | BackupManagerService.java | 1053 android.Manifest.permission.BACKUP, null); 1059 android.Manifest.permission.BACKUP, null); 1525 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP, 1605 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP, 2309 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BACKUP, 8439 // If the caller does not hold the BACKUP permission, it can only request a 8441 if ((mContext.checkPermission(android.Manifest.permission.BACKUP, Binder.getCallingPid(), 8448 // a caller with full permission can ask to back up any participating app 8521 // If the caller does not hold the BACKUP permission, it can only request a 8524 if ((mContext.checkPermission(android.Manifest.permission [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ProcessStatsService.java | 446 android.Manifest.permission.PACKAGE_USAGE_STATS, null); 478 android.Manifest.permission.PACKAGE_USAGE_STATS, null); 615 if (mAm.checkCallingPermission(android.Manifest.permission.DUMP) 619 + " without permission " + android.Manifest.permission.DUMP);
|
H A D | ActiveServices.java | 334 return new ComponentName("!", res.permission != null 335 ? res.permission : "private to package"); 519 // r.record is null if findServiceLocked() failed the caller permission check 525 + " requires " + r.permission); 743 mAm.enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS, 1003 final String permission; field in class:ActiveServices.ServiceLookupResult 1007 permission = _permission; 1100 if (mAm.checkComponentPermission(r.permission, 1114 + " requires " + r.permission); 1115 return new ServiceLookupResult(null, r.permission); [all...] |
H A D | ActivityStackSupervisor.java | 19 import static android.Manifest.permission.START_ANY_ACTIVITY; 178 // Activity actions an app cannot start if it uses a permission which is not granted. 183 Manifest.permission.CAMERA); 185 Manifest.permission.CAMERA); 187 Manifest.permission.CALL_PHONE); 192 /** Action restriction: launching the activity is restricted by a permission. */ 1058 mService.enforceCallingPermission(android.Manifest.permission.CHANGE_CONFIGURATION, 1575 + ", uid=" + callingUid + ")" + " with revoked permission " 1586 + " requires " + aInfo.permission; 1604 + " requires appop " + AppOpsManager.permissionToOp(aInfo.permission); [all...] |
/frameworks/base/services/core/java/com/android/server/location/ |
H A D | GeofenceManager.java | 371 android.Manifest.permission.ACCESS_FINE_LOCATION);
|
/frameworks/base/services/core/java/com/android/server/net/ |
H A D | LockdownVpnTracker.java | 19 import static android.Manifest.permission.CONNECTIVITY_INTERNAL; 171 // no additional permission checks are necessary.
|
/frameworks/base/services/core/java/com/android/server/search/ |
H A D | SearchManagerService.java | 299 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/accounts/ |
H A D | AccountManagerServiceTest.java | 236 public int checkCallingOrSelfPermission(final String permission) { argument
|
/frameworks/base/services/usage/java/com/android/server/usage/ |
H A D | UsageStatsService.java | 93 * This data can be queried by apps that have been granted permission by AppOps. 1157 // permission. 1158 return getContext().checkCallingPermission(Manifest.permission.PACKAGE_USAGE_STATS) 1248 getContext().enforceCallingPermission(Manifest.permission.CHANGE_APP_IDLE_STATE, 1249 "No permission to change app idle state"); 1274 if (getContext().checkCallingOrSelfPermission(android.Manifest.permission.DUMP) 1278 + " without permission " + android.Manifest.permission.DUMP);
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | DropBoxManagerService.java | 163 android.Manifest.permission.READ_LOGS); 279 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.READ_LOGS) 281 throw new SecurityException("READ_LOGS permission required"); 312 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
H A D | NsdService.java | 598 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.INTERNET, 604 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.CONNECTIVITY_INTERNAL, 826 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
/frameworks/base/services/core/java/com/android/server/job/ |
H A D | JobSchedulerService.java | 770 // named service properly requires the BIND_JOB_SERVICE permission 783 if (!JobService.PERMISSION_BIND.equals(si.permission)) { 785 + " does not require android.permission.BIND_JOB_SERVICE permission"); 803 // permission 805 android.Manifest.permission.RECEIVE_BOOT_COMPLETED, pid, uid); 826 + " holding RECEIVE_BOOT_COMPLETED permission."); 879 getContext().enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
|
/frameworks/base/services/core/java/com/android/server/audio/ |
H A D | AudioService.java | 19 import static android.Manifest.permission.REMOTE_AUDIO_PLAYBACK; 1728 android.Manifest.permission.CAPTURE_AUDIO_OUTPUT))) { 1775 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL) 1870 android.Manifest.permission.INTERACT_ACROSS_USERS_FULL) 2131 android.Manifest.permission.MODIFY_PHONE_STATE) 3526 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.MODIFY_AUDIO_SETTINGS) 5104 // TODO Kill recording streams instead of killing processes holding permission 5128 final String[] permissions = { Manifest.permission.RECORD_AUDIO }; 5142 // Skip packages that have permission to interact across users 5143 if (pm.checkPermission(Manifest.permission [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/p2p/ |
H A D | WifiP2pServiceImpl.java | 386 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.ACCESS_WIFI_STATE, 391 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.CHANGE_WIFI_STATE, 397 android.Manifest.permission.CONNECTIVITY_INTERNAL, 403 android.Manifest.permission.CONNECTIVITY_INTERNAL); 408 android.Manifest.permission.LOCATION_HARDWARE); 456 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
/frameworks/base/services/core/java/com/android/server/connectivity/ |
H A D | Vpn.java | 19 import static android.Manifest.permission.BIND_VPN_SERVICE; 250 /** Prepare the VPN for the given package. Does not perform permission checks. */ 330 // Verify that the caller matches the given package and has permission to activate VPNs. 514 if (!BIND_VPN_SERVICE.equals(info.serviceInfo.permission)) { 766 mContext.enforceCallingPermission(Manifest.permission.CONTROL_VPN, "Unauthorized Caller"); 886 * Should only be called to respond to Binder requests as this enforces caller permission. Use 888 * permission check only when the caller is trusted (or the call is initiated by the system).
|
/frameworks/base/core/java/android/accounts/ |
H A D | AbstractAccountAuthenticator.java | 369 final String perm = Manifest.permission.ACCOUNT_MANAGER;
|
/frameworks/base/core/java/android/app/admin/ |
H A D | DevicePolicyManager.java | 785 * Permission policy to prompt user for new permission requests for runtime permissions. 791 * Permission policy to always grant new permission requests for runtime permissions. 797 * Permission policy to always deny new permission requests for runtime permissions. 803 * Runtime permission state: The user can manage the permission 809 * Runtime permission state: The permission is granted to the app 810 * and the user cannot manage the permission through the UI. 815 * Runtime permission state: The permission i 4428 setPermissionGrantState(@onNull ComponentName admin, String packageName, String permission, int grantState) argument 4455 getPermissionGrantState(@onNull ComponentName admin, String packageName, String permission) argument [all...] |
/frameworks/base/core/java/android/os/ |
H A D | RecoverySystem.java | 323 * Requires the {@link android.Manifest.permission#REBOOT} permission. 362 * {@link android.Manifest.permission#REBOOT} permission. 390 * {@link android.Manifest.permission#REBOOT} permission. 414 android.Manifest.permission.MASTER_CLEAR,
|
/frameworks/base/media/java/android/media/audiopolicy/ |
H A D | AudioPolicy.java | 232 android.Manifest.permission.MODIFY_AUDIO_ROUTING))) {
|