Searched defs:permission (Results 26 - 50 of 91) sorted by relevance

1234

/frameworks/support/compat/java/android/support/v4/content/
H A DContextCompat.java208 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to
214 * <pre class="prettyprint">&lt;uses-permission
215 * android:name="android.permission.WRITE_EXTERNAL_STORAGE"
267 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to
273 * <pre class="prettyprint">&lt;uses-permission
274 * android:name="android.permission.WRITE_EXTERNAL_STORAGE"
320 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to
326 * <pre class="prettyprint">&lt;uses-permission
327 * android:name="android.permission.WRITE_EXTERNAL_STORAGE"
439 * Determine whether <em>you</em> have been granted a particular permission
448 checkSelfPermission(@onNull Context context, @NonNull String permission) argument
[all...]
/frameworks/base/core/java/android/app/
H A DUiAutomationConnection.java239 public void grantRuntimePermission(String packageName, String permission, int userId) argument
248 mPackageManager.grantRuntimePermission(packageName, permission, userId);
255 public void revokeRuntimePermission(String packageName, String permission, int userId) argument
264 mPackageManager.revokeRuntimePermission(packageName, permission, userId);
H A DUiAutomation.java911 * Grants a runtime permission to a package for a user.
913 * @param permission The permission to grant.
919 public boolean grantRuntimePermission(String packageName, String permission, argument
926 Log.i(LOG_TAG, "Granting runtime permission");
930 permission, userHandle.getIdentifier());
934 Log.e(LOG_TAG, "Error granting runtime permission", re);
940 * Revokes a runtime permission from a package for a user.
942 * @param permission The permission t
948 revokeRuntimePermission(String packageName, String permission, UserHandle userHandle) argument
[all...]
/frameworks/base/core/java/android/content/pm/permission/
H A DRuntimePermissionPresenter.java17 package android.content.pm.permission;
47 * runtime permissions in the same permission group may be presented as a
48 * single permission in the UI.
61 "android.content.pm.permission.RuntimePermissionPresenter.key.result";
94 * Gets the singleton runtime permission presenter.
/frameworks/base/services/voiceinteraction/java/com/android/server/soundtrigger/
H A DSoundTriggerService.java124 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER);
142 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER);
152 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER);
163 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER);
172 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER);
235 private void enforceCallingPermission(String permission) { argument
236 if (mContext.checkCallingOrSelfPermission(permission)
238 throw new SecurityException("Caller does not hold the permission " + permission);
/frameworks/support/compat/java/android/support/v4/app/
H A DActivityCompat.java48 * This interface is the contract for receiving the results for permission requests.
321 * and the results of permission requests will be delivered to its {@link
326 * Note that requesting a permission does not guarantee it will be granted and
327 * your app should be able to run without having this permission.
338 * When checking whether you have a permission you should use {@link
348 * You cannot request a permission if your activity sets {@link
397 * Gets whether you should show UI with rationale for requesting a permission.
398 * You should do this only if you do not have the permission and the context in
399 * which the permission is requested does not clearly communicate to the user
400 * what would be the benefit from granting this permission
416 shouldShowRequestPermissionRationale(@onNull Activity activity, @NonNull String permission) argument
[all...]
/frameworks/base/core/java/android/appwidget/
H A DAppWidgetManager.java792 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
811 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
833 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
835 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to
841 * @return true if this component has permission to bind the AppWidget
853 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
855 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to
864 * @return true if this component has permission to bind the AppWidget
875 * Set the provider for a given appWidgetId if the caller has a permission.
877 * <strong>Note:</strong> You need the {@link android.Manifest.permission#BIND_APPWIDGE
949 setBindAppWidgetPermission(String packageName, boolean permission) argument
967 setBindAppWidgetPermission(String packageName, int userId, boolean permission) argument
[all...]
/frameworks/base/services/core/java/com/android/server/
H A DMmsServiceBroker.java335 mContext.enforceCallingPermission(Manifest.permission.SEND_SMS, "Send MMS message");
352 mContext.enforceCallingPermission(Manifest.permission.RECEIVE_MMS,
492 * Grants the phone package on primary user permission to access the contentUri,
497 * @param permission The permission to add
501 int permission) {
508 mContext.grantUriPermission(PHONE_PACKAGE_NAME, contentUri, permission);
510 // Grant permission for the carrier app.
517 mContext.grantUriPermission(carrierPackages.get(0), contentUri, permission);
500 adjustUriForUserAndGrantPermission(Uri contentUri, String action, int permission) argument
/frameworks/base/services/core/java/com/android/server/pm/
H A DPermissionsState.java54 /** The permission operation failed. */
57 /** The permission operation succeeded and no gids changed. */
60 /** The permission operation succeeded and gids changed. */
148 * Grant an install permission.
150 * @param permission The permission to grant.
155 public int grantInstallPermission(BasePermission permission) { argument
156 return grantPermission(permission, UserHandle.USER_ALL);
160 * Revoke an install permission.
162 * @param permission Th
167 revokeInstallPermission(BasePermission permission) argument
180 grantRuntimePermission(BasePermission permission, int userId) argument
197 revokeRuntimePermission(BasePermission permission, int userId) argument
366 updatePermissionFlags(BasePermission permission, int userId, int flagMask, int flagValues) argument
517 grantPermission(BasePermission permission, int userId) argument
541 revokePermission(BasePermission permission, int userId) argument
584 ensurePermissionData(BasePermission permission) argument
[all...]
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DUiccSmsController.java240 public void setPremiumSmsPermission(String packageName, int permission) { argument
241 setPremiumSmsPermissionForSubscriber(getPreferredSmsSubscription(), packageName, permission);
245 public void setPremiumSmsPermissionForSubscriber(int subId, String packageName, int permission) { argument
248 iccSmsIntMgr.setPremiumSmsPermission(packageName, permission);
H A DIccSmsInterfaceManager.java176 Manifest.permission.RECEIVE_SMS, message);
178 Manifest.permission.SEND_SMS, message);
289 Manifest.permission.RECEIVE_SMS,
318 * This method checks if the calling package or itself has the permission to send the data sms.
323 Manifest.permission.SEND_SMS,
331 * This method checks only if the calling package has the permission to send the data sms.
336 Manifest.permission.SEND_SMS,
385 * This method checks only if the calling package has the permission to send the sms.
391 Manifest.permission.SEND_SMS,
399 * This method checks if the calling package or itself has the permission t
567 setPremiumSmsPermission(String packageName, int permission) argument
[all...]
H A DSmsUsageMonitor.java72 /** Default checking period for SMS sent without user permission. */
75 /** Default number of SMS sent in checking period without user permission. */
99 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */
102 /** Default premium SMS permission (ask user for each premium SMS sent). */
105 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */
108 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */
138 /** Directory for per-app SMS permission XML file. */
141 /** Per-app SMS permission XML filename. */
180 /** XML attribute for the package's premium SMS permission (integer type). */
533 * Returns the premium SMS permission fo
564 setPremiumSmsPermission(String packageName, int permission) argument
[all...]
/frameworks/support/fragment/java/android/support/v4/app/
H A DFragmentHostCallback.java160 * Checks whether to show permission rationale UI from a fragment.
163 public boolean onShouldShowRequestPermissionRationale(@NonNull String permission) { argument
/frameworks/support/fragment/tests/java/android/support/v4/app/
H A DFragmentLifecycleTest.java645 public boolean onShouldShowRequestPermissionRationale(@NonNull String permission) { argument
647 mActivity, permission);
/frameworks/base/core/tests/coretests/src/android/app/activity/
H A DBroadcastTest.java177 public void registerMyReceiver(IntentFilter filter, String permission) { argument
180 getContext().registerReceiver(mReceiver, filter, permission, null);
/frameworks/base/services/core/java/com/android/server/am/
H A DServiceRecord.java78 final String permission;// permission needed to access service field in class:ServiceRecord
213 if (permission != null) {
214 pw.print(prefix); pw.print("permission="); pw.println(permission);
324 permission = sInfo.permission;
/frameworks/base/services/core/java/com/android/server/dreams/
H A DDreamManagerService.java19 import static android.Manifest.permission.BIND_DREAM_SERVICE;
278 && !BIND_DREAM_SERVICE.equals(serviceInfo.permission)) {
281 + " permission on the dream service declaration.");
412 private void checkPermission(String permission) { argument
413 if (mContext.checkCallingOrSelfPermission(permission)
416 + ", must have permission " + permission);
482 if (mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP)
500 checkPermission(android.Manifest.permission.READ_DREAM_STATE);
513 checkPermission(android.Manifest.permission
[all...]
/frameworks/base/services/core/java/com/android/server/firewall/
H A DIntentFirewall.java581 int checkComponentPermission(String permission, int pid, int uid, argument
589 * @param permission If present, the caller must have this permission
596 boolean checkComponentPermission(String permission, int pid, int uid, int owningUid, argument
598 return mAms.checkComponentPermission(permission, pid, uid, owningUid, exported) ==
/frameworks/base/services/core/java/com/android/server/media/projection/
H A DMediaProjectionManagerService.java52 * as well as the capabilities they grant. Any service using MediaProjection tokens as permission
211 android.Manifest.permission.CAPTURE_VIDEO_OUTPUT)
224 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
227 + "projection permission");
254 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
269 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
287 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
302 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
318 || mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP)
334 private boolean checkPermission(String packageName, String permission) { argument
[all...]
/frameworks/base/services/core/java/com/android/server/vr/
H A DVrManagerService.java292 enforceCallerPermission(Manifest.permission.ACCESS_VR_MANAGER);
302 enforceCallerPermission(Manifest.permission.ACCESS_VR_MANAGER);
317 if (getContext().checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
319 pw.println("permission denied: can't dump VrManagerService from pid="
363 private void enforceCallerPermission(String permission) { argument
364 if (mContext.checkCallingOrSelfPermission(permission)
366 throw new SecurityException("Caller does not hold the permission " + permission);
422 android.Manifest.permission.BIND_VR_LISTENER_SERVICE,
620 android.Manifest.permission
679 isPermissionUserUpdated(String permission, String pkg, int userId) argument
[all...]
/frameworks/base/services/tests/servicestests/src/com/android/server/accounts/
H A DAccountManagerServiceTest.java367 public int checkCallingOrSelfPermission(final String permission) { argument
/frameworks/base/core/java/android/content/
H A DContentProvider.java19 import static android.Manifest.permission.INTERACT_ACROSS_USERS;
149 * @param writePermission The write permission you want this instance should have
518 * Verify that calling app holds both the given permission and any app-op
519 * associated with that permission.
521 private int checkPermissionAndAppOp(String permission, String callingPkg, argument
523 if (getContext().checkPermission(permission, Binder.getCallingPid(), Binder.getCallingUid(),
528 final int permOp = AppOpsManager.permissionToOpCode(permission);
562 // <path-permission> below removes this ability
575 // any denied <path-permission> means we lose
585 // if we passed <path-permission> check
769 setReadPermission(@ullable String permission) argument
791 setWritePermission(@ullable String permission) argument
[all...]
/frameworks/base/core/java/android/content/pm/
H A DActivityInfo.java140 * Optional name of a permission required to be able to access this
141 * Activity. From the "permission" attribute.
143 public String permission; field in class:ActivityInfo
791 permission = orig.permission;
875 if (permission != null) {
876 pw.println(prefix + "permission=" + permission);
928 dest.writeString(permission);
971 permission
[all...]
H A DApplicationInfo.java54 * Optional name of a permission required to be able to access this
55 * application's components. From the "permission" attribute.
57 public String permission; field in class:ApplicationInfo
159 * {@link android.Manifest.permission#FACTORY_TEST} permission and the
783 if (permission != null) {
784 pw.println(prefix + "permission=" + permission);
894 permission = orig.permission;
[all...]
/frameworks/base/services/core/java/com/android/server/fingerprint/
H A DFingerprintService.java63 import static android.Manifest.permission.INTERACT_ACROSS_USERS;
65 import static android.Manifest.permission.MANAGE_FINGERPRINT;
66 import static android.Manifest.permission.RESET_FINGERPRINT_LOCKOUT;
67 import static android.Manifest.permission.USE_FINGERPRINT;
422 boolean hasPermission(String permission) { argument
423 return getContext().checkCallingOrSelfPermission(permission)
427 void checkPermission(String permission) { argument
428 getContext().enforceCallingOrSelfPermission(permission,
429 "Must have " + permission + " permission
[all...]

Completed in 1122 milliseconds

1234