/frameworks/support/compat/java/android/support/v4/content/ |
H A D | ContextCompat.java | 208 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to 214 * <pre class="prettyprint"><uses-permission 215 * android:name="android.permission.WRITE_EXTERNAL_STORAGE" 267 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to 273 * <pre class="prettyprint"><uses-permission 274 * android:name="android.permission.WRITE_EXTERNAL_STORAGE" 320 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to 326 * <pre class="prettyprint"><uses-permission 327 * android:name="android.permission.WRITE_EXTERNAL_STORAGE" 439 * Determine whether <em>you</em> have been granted a particular permission 448 checkSelfPermission(@onNull Context context, @NonNull String permission) argument [all...] |
/frameworks/base/core/java/android/app/ |
H A D | UiAutomationConnection.java | 239 public void grantRuntimePermission(String packageName, String permission, int userId) argument 248 mPackageManager.grantRuntimePermission(packageName, permission, userId); 255 public void revokeRuntimePermission(String packageName, String permission, int userId) argument 264 mPackageManager.revokeRuntimePermission(packageName, permission, userId);
|
H A D | UiAutomation.java | 911 * Grants a runtime permission to a package for a user. 913 * @param permission The permission to grant. 919 public boolean grantRuntimePermission(String packageName, String permission, argument 926 Log.i(LOG_TAG, "Granting runtime permission"); 930 permission, userHandle.getIdentifier()); 934 Log.e(LOG_TAG, "Error granting runtime permission", re); 940 * Revokes a runtime permission from a package for a user. 942 * @param permission The permission t 948 revokeRuntimePermission(String packageName, String permission, UserHandle userHandle) argument [all...] |
/frameworks/base/core/java/android/content/pm/permission/ |
H A D | RuntimePermissionPresenter.java | 17 package android.content.pm.permission; 47 * runtime permissions in the same permission group may be presented as a 48 * single permission in the UI. 61 "android.content.pm.permission.RuntimePermissionPresenter.key.result"; 94 * Gets the singleton runtime permission presenter.
|
/frameworks/base/services/voiceinteraction/java/com/android/server/soundtrigger/ |
H A D | SoundTriggerService.java | 124 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER); 142 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER); 152 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER); 163 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER); 172 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER); 235 private void enforceCallingPermission(String permission) { argument 236 if (mContext.checkCallingOrSelfPermission(permission) 238 throw new SecurityException("Caller does not hold the permission " + permission);
|
/frameworks/support/compat/java/android/support/v4/app/ |
H A D | ActivityCompat.java | 48 * This interface is the contract for receiving the results for permission requests. 321 * and the results of permission requests will be delivered to its {@link 326 * Note that requesting a permission does not guarantee it will be granted and 327 * your app should be able to run without having this permission. 338 * When checking whether you have a permission you should use {@link 348 * You cannot request a permission if your activity sets {@link 397 * Gets whether you should show UI with rationale for requesting a permission. 398 * You should do this only if you do not have the permission and the context in 399 * which the permission is requested does not clearly communicate to the user 400 * what would be the benefit from granting this permission 416 shouldShowRequestPermissionRationale(@onNull Activity activity, @NonNull String permission) argument [all...] |
/frameworks/base/core/java/android/appwidget/ |
H A D | AppWidgetManager.java | 792 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 811 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 833 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 835 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to 841 * @return true if this component has permission to bind the AppWidget 853 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 855 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to 864 * @return true if this component has permission to bind the AppWidget 875 * Set the provider for a given appWidgetId if the caller has a permission. 877 * <strong>Note:</strong> You need the {@link android.Manifest.permission#BIND_APPWIDGE 949 setBindAppWidgetPermission(String packageName, boolean permission) argument 967 setBindAppWidgetPermission(String packageName, int userId, boolean permission) argument [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | MmsServiceBroker.java | 335 mContext.enforceCallingPermission(Manifest.permission.SEND_SMS, "Send MMS message"); 352 mContext.enforceCallingPermission(Manifest.permission.RECEIVE_MMS, 492 * Grants the phone package on primary user permission to access the contentUri, 497 * @param permission The permission to add 501 int permission) { 508 mContext.grantUriPermission(PHONE_PACKAGE_NAME, contentUri, permission); 510 // Grant permission for the carrier app. 517 mContext.grantUriPermission(carrierPackages.get(0), contentUri, permission); 500 adjustUriForUserAndGrantPermission(Uri contentUri, String action, int permission) argument
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PermissionsState.java | 54 /** The permission operation failed. */ 57 /** The permission operation succeeded and no gids changed. */ 60 /** The permission operation succeeded and gids changed. */ 148 * Grant an install permission. 150 * @param permission The permission to grant. 155 public int grantInstallPermission(BasePermission permission) { argument 156 return grantPermission(permission, UserHandle.USER_ALL); 160 * Revoke an install permission. 162 * @param permission Th 167 revokeInstallPermission(BasePermission permission) argument 180 grantRuntimePermission(BasePermission permission, int userId) argument 197 revokeRuntimePermission(BasePermission permission, int userId) argument 366 updatePermissionFlags(BasePermission permission, int userId, int flagMask, int flagValues) argument 517 grantPermission(BasePermission permission, int userId) argument 541 revokePermission(BasePermission permission, int userId) argument 584 ensurePermissionData(BasePermission permission) argument [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | UiccSmsController.java | 240 public void setPremiumSmsPermission(String packageName, int permission) { argument 241 setPremiumSmsPermissionForSubscriber(getPreferredSmsSubscription(), packageName, permission); 245 public void setPremiumSmsPermissionForSubscriber(int subId, String packageName, int permission) { argument 248 iccSmsIntMgr.setPremiumSmsPermission(packageName, permission);
|
H A D | IccSmsInterfaceManager.java | 176 Manifest.permission.RECEIVE_SMS, message); 178 Manifest.permission.SEND_SMS, message); 289 Manifest.permission.RECEIVE_SMS, 318 * This method checks if the calling package or itself has the permission to send the data sms. 323 Manifest.permission.SEND_SMS, 331 * This method checks only if the calling package has the permission to send the data sms. 336 Manifest.permission.SEND_SMS, 385 * This method checks only if the calling package has the permission to send the sms. 391 Manifest.permission.SEND_SMS, 399 * This method checks if the calling package or itself has the permission t 567 setPremiumSmsPermission(String packageName, int permission) argument [all...] |
H A D | SmsUsageMonitor.java | 72 /** Default checking period for SMS sent without user permission. */ 75 /** Default number of SMS sent in checking period without user permission. */ 99 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */ 102 /** Default premium SMS permission (ask user for each premium SMS sent). */ 105 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */ 108 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */ 138 /** Directory for per-app SMS permission XML file. */ 141 /** Per-app SMS permission XML filename. */ 180 /** XML attribute for the package's premium SMS permission (integer type). */ 533 * Returns the premium SMS permission fo 564 setPremiumSmsPermission(String packageName, int permission) argument [all...] |
/frameworks/support/fragment/java/android/support/v4/app/ |
H A D | FragmentHostCallback.java | 160 * Checks whether to show permission rationale UI from a fragment. 163 public boolean onShouldShowRequestPermissionRationale(@NonNull String permission) { argument
|
/frameworks/support/fragment/tests/java/android/support/v4/app/ |
H A D | FragmentLifecycleTest.java | 645 public boolean onShouldShowRequestPermissionRationale(@NonNull String permission) { argument 647 mActivity, permission);
|
/frameworks/base/core/tests/coretests/src/android/app/activity/ |
H A D | BroadcastTest.java | 177 public void registerMyReceiver(IntentFilter filter, String permission) { argument 180 getContext().registerReceiver(mReceiver, filter, permission, null);
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ServiceRecord.java | 78 final String permission;// permission needed to access service field in class:ServiceRecord 213 if (permission != null) { 214 pw.print(prefix); pw.print("permission="); pw.println(permission); 324 permission = sInfo.permission;
|
/frameworks/base/services/core/java/com/android/server/dreams/ |
H A D | DreamManagerService.java | 19 import static android.Manifest.permission.BIND_DREAM_SERVICE; 278 && !BIND_DREAM_SERVICE.equals(serviceInfo.permission)) { 281 + " permission on the dream service declaration."); 412 private void checkPermission(String permission) { argument 413 if (mContext.checkCallingOrSelfPermission(permission) 416 + ", must have permission " + permission); 482 if (mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP) 500 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 513 checkPermission(android.Manifest.permission [all...] |
/frameworks/base/services/core/java/com/android/server/firewall/ |
H A D | IntentFirewall.java | 581 int checkComponentPermission(String permission, int pid, int uid, argument 589 * @param permission If present, the caller must have this permission 596 boolean checkComponentPermission(String permission, int pid, int uid, int owningUid, argument 598 return mAms.checkComponentPermission(permission, pid, uid, owningUid, exported) ==
|
/frameworks/base/services/core/java/com/android/server/media/projection/ |
H A D | MediaProjectionManagerService.java | 52 * as well as the capabilities they grant. Any service using MediaProjection tokens as permission 211 android.Manifest.permission.CAPTURE_VIDEO_OUTPUT) 224 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 227 + "projection permission"); 254 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 269 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 287 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 302 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 318 || mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP) 334 private boolean checkPermission(String packageName, String permission) { argument [all...] |
/frameworks/base/services/core/java/com/android/server/vr/ |
H A D | VrManagerService.java | 292 enforceCallerPermission(Manifest.permission.ACCESS_VR_MANAGER); 302 enforceCallerPermission(Manifest.permission.ACCESS_VR_MANAGER); 317 if (getContext().checkCallingOrSelfPermission(android.Manifest.permission.DUMP) 319 pw.println("permission denied: can't dump VrManagerService from pid=" 363 private void enforceCallerPermission(String permission) { argument 364 if (mContext.checkCallingOrSelfPermission(permission) 366 throw new SecurityException("Caller does not hold the permission " + permission); 422 android.Manifest.permission.BIND_VR_LISTENER_SERVICE, 620 android.Manifest.permission 679 isPermissionUserUpdated(String permission, String pkg, int userId) argument [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/accounts/ |
H A D | AccountManagerServiceTest.java | 367 public int checkCallingOrSelfPermission(final String permission) { argument
|
/frameworks/base/core/java/android/content/ |
H A D | ContentProvider.java | 19 import static android.Manifest.permission.INTERACT_ACROSS_USERS; 149 * @param writePermission The write permission you want this instance should have 518 * Verify that calling app holds both the given permission and any app-op 519 * associated with that permission. 521 private int checkPermissionAndAppOp(String permission, String callingPkg, argument 523 if (getContext().checkPermission(permission, Binder.getCallingPid(), Binder.getCallingUid(), 528 final int permOp = AppOpsManager.permissionToOpCode(permission); 562 // <path-permission> below removes this ability 575 // any denied <path-permission> means we lose 585 // if we passed <path-permission> check 769 setReadPermission(@ullable String permission) argument 791 setWritePermission(@ullable String permission) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ActivityInfo.java | 140 * Optional name of a permission required to be able to access this 141 * Activity. From the "permission" attribute. 143 public String permission; field in class:ActivityInfo 791 permission = orig.permission; 875 if (permission != null) { 876 pw.println(prefix + "permission=" + permission); 928 dest.writeString(permission); 971 permission [all...] |
H A D | ApplicationInfo.java | 54 * Optional name of a permission required to be able to access this 55 * application's components. From the "permission" attribute. 57 public String permission; field in class:ApplicationInfo 159 * {@link android.Manifest.permission#FACTORY_TEST} permission and the 783 if (permission != null) { 784 pw.println(prefix + "permission=" + permission); 894 permission = orig.permission; [all...] |
/frameworks/base/services/core/java/com/android/server/fingerprint/ |
H A D | FingerprintService.java | 63 import static android.Manifest.permission.INTERACT_ACROSS_USERS; 65 import static android.Manifest.permission.MANAGE_FINGERPRINT; 66 import static android.Manifest.permission.RESET_FINGERPRINT_LOCKOUT; 67 import static android.Manifest.permission.USE_FINGERPRINT; 422 boolean hasPermission(String permission) { argument 423 return getContext().checkCallingOrSelfPermission(permission) 427 void checkPermission(String permission) { argument 428 getContext().enforceCallingOrSelfPermission(permission, 429 "Must have " + permission + " permission [all...] |