Searched defs:permission (Results 1 - 25 of 91) sorted by last modified time

1234

/frameworks/support/frameworks/support/samples/SupportLeanbackShowcase/libs/
H A Dpicasso-2.5.2.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/squareup/ com/squareup/picasso/ com/squareup/picasso/Action ...
/frameworks/support/samples/SupportLeanbackShowcase/libs/
H A Dpicasso-2.5.2.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/squareup/ com/squareup/picasso/ com/squareup/picasso/Action ...
/frameworks/support/v13/api23/android/support/v13/app/
H A DFragmentCompat23.java28 String permission) {
29 return fragment.shouldShowRequestPermissionRationale(permission);
27 shouldShowRequestPermissionRationale(Fragment fragment, String permission) argument
/frameworks/support/v13/java/android/support/v13/app/
H A DFragmentCompat.java39 boolean shouldShowRequestPermissionRationale(Fragment fragment, String permission); argument
78 public boolean shouldShowRequestPermissionRationale(Fragment fragment, String permission) { argument
104 public boolean shouldShowRequestPermissionRationale(Fragment fragment, String permission) { argument
105 return FragmentCompat23.shouldShowRequestPermissionRationale(fragment, permission);
132 * This interface is the contract for receiving the results for permission requests.
189 * and the results of permission requests will be delivered to its
194 * Note that requesting a permission does not guarantee it will be granted and
195 * your app should be able to run without having this permission.
206 * When checking whether you have a permission you should use {@link
227 * Gets whether you should show UI with rationale for requesting a permission
247 shouldShowRequestPermissionRationale(@onNull Fragment fragment, @NonNull String permission) argument
[all...]
/frameworks/support/compat/api23/android/support/v4/app/
H A DActivityCompatApi23.java49 String permission) {
50 return activity.shouldShowRequestPermissionRationale(permission);
48 shouldShowRequestPermissionRationale(Activity activity, String permission) argument
H A DAppOpsManagerCompat23.java26 public static String permissionToOp(String permission) { argument
27 return AppOpsManager.permissionToOp(permission);
/frameworks/support/compat/java/android/support/v4/app/
H A DActivityCompat.java48 * This interface is the contract for receiving the results for permission requests.
321 * and the results of permission requests will be delivered to its {@link
326 * Note that requesting a permission does not guarantee it will be granted and
327 * your app should be able to run without having this permission.
338 * When checking whether you have a permission you should use {@link
348 * You cannot request a permission if your activity sets {@link
397 * Gets whether you should show UI with rationale for requesting a permission.
398 * You should do this only if you do not have the permission and the context in
399 * which the permission is requested does not clearly communicate to the user
400 * what would be the benefit from granting this permission
416 shouldShowRequestPermissionRationale(@onNull Activity activity, @NonNull String permission) argument
[all...]
H A DAppOpsManagerCompat.java54 public String permissionToOp(String permission) { argument
72 public String permissionToOp(String permission) { argument
73 return AppOpsManagerCompat23.permissionToOp(permission);
99 * Gets the app op name associated with a given permission.
101 * @param permission The permission.
102 * @return The app op associated with the permission or null.
104 public static String permissionToOp(@NonNull String permission) { argument
105 return IMPL.permissionToOp(permission);
/frameworks/support/compat/java/android/support/v4/content/
H A DContextCompat.java208 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to
214 * <pre class="prettyprint">&lt;uses-permission
215 * android:name="android.permission.WRITE_EXTERNAL_STORAGE"
267 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to
273 * <pre class="prettyprint">&lt;uses-permission
274 * android:name="android.permission.WRITE_EXTERNAL_STORAGE"
320 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to
326 * <pre class="prettyprint">&lt;uses-permission
327 * android:name="android.permission.WRITE_EXTERNAL_STORAGE"
439 * Determine whether <em>you</em> have been granted a particular permission
448 checkSelfPermission(@onNull Context context, @NonNull String permission) argument
[all...]
/frameworks/support/core-utils/java/android/support/v4/content/
H A DPermissionChecker.java31 * This class provides permission check APIs that verify both the
32 * permission and the associated app op for this permission if
35 * In the new permission model permissions with protection level
40 * permission revocations and would crash. Therefore, when the
41 * user disables a permission for a legacy app in the UI the
42 * platform disables the APIs guarded by this permission making
50 * permission model for which the user had disabled the "permission"
55 /** Permission result: The permission i
87 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, String packageName) argument
123 checkSelfPermission(@onNull Context context, @NonNull String permission) argument
140 checkCallingPermission(@onNull Context context, @NonNull String permission, String packageName) argument
158 checkCallingOrSelfPermission(@onNull Context context, @NonNull String permission) argument
[all...]
/frameworks/support/fragment/java/android/support/v4/app/
H A DFragment.java1011 * Note that requesting a permission does not guarantee it will be granted and
1012 * your app should be able to run without having this permission.
1023 * When checking whether you have a permission you should use {@link
1037 * if (getActivity().checkSelfPermission(Manifest.permission.READ_CONTACTS)
1039 * requestPermissions(new String[]{Manifest.permission.READ_CONTACTS},
1093 * Gets whether you should show UI with rationale for requesting a permission.
1094 * You should do this only if you do not have the permission and the context in
1095 * which the permission is requested does not clearly communicate to the user
1096 * what would be the benefit from granting this permission.
1098 * For example, if you write a camera app, requesting the camera permission
1112 shouldShowRequestPermissionRationale(@onNull String permission) argument
[all...]
H A DFragmentActivity.java1065 public boolean onShouldShowRequestPermissionRationale(@NonNull String permission) { argument
1067 FragmentActivity.this, permission);
H A DFragmentHostCallback.java160 * Checks whether to show permission rationale UI from a fragment.
163 public boolean onShouldShowRequestPermissionRationale(@NonNull String permission) { argument
/frameworks/support/fragment/tests/java/android/support/v4/app/
H A DFragmentLifecycleTest.java645 public boolean onShouldShowRequestPermissionRationale(@NonNull String permission) { argument
647 mActivity, permission);
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DIccSmsInterfaceManager.java176 Manifest.permission.RECEIVE_SMS, message);
178 Manifest.permission.SEND_SMS, message);
289 Manifest.permission.RECEIVE_SMS,
318 * This method checks if the calling package or itself has the permission to send the data sms.
323 Manifest.permission.SEND_SMS,
331 * This method checks only if the calling package has the permission to send the data sms.
336 Manifest.permission.SEND_SMS,
385 * This method checks only if the calling package has the permission to send the sms.
391 Manifest.permission.SEND_SMS,
399 * This method checks if the calling package or itself has the permission t
567 setPremiumSmsPermission(String packageName, int permission) argument
[all...]
H A DInboundSmsHandler.java642 mContext.sendBroadcast(intent, android.Manifest.permission.RECEIVE_SMS);
981 String carrierFilterSmsPerm = "android.permission.CARRIER_FILTER_SMS";
999 * Dispatch the intent with the specified permission, appOp, and result receiver, using
1003 * @param permission receivers are required to have this permission
1007 public void dispatchIntent(Intent intent, String permission, int appOp, argument
1050 mContext.sendOrderedBroadcastAsUser(intent, targetUser, permission, appOp, opts,
1055 mContext.sendOrderedBroadcastAsUser(intent, user, permission, appOp, opts,
1141 dispatchIntent(intent, android.Manifest.permission.RECEIVE_SMS,
1289 dispatchIntent(intent, android.Manifest.permission
[all...]
H A DSMSDispatcher.java78 import static android.Manifest.permission.SEND_SMS_NO_CONFIRMATION;
1053 // Wait for user confirmation unless the user has set permission to always allow/deny
1204 * Returns the premium SMS permission for the specified package. If the package has never
1207 * @param packageName the name of the package to query permission
1218 * Sets the premium SMS permission for the specified package and save the value asynchronously
1220 * @param packageName the name of the package to set permission
1221 * @param permission one of {@link SmsUsageMonitor#PREMIUM_SMS_PERMISSION_ASK_USER},
1225 public void setPremiumSmsPermission(String packageName, int permission) { argument
1226 mUsageMonitor.setPremiumSmsPermission(packageName, permission);
1644 // Always set the SMS permission s
[all...]
H A DSmsUsageMonitor.java72 /** Default checking period for SMS sent without user permission. */
75 /** Default number of SMS sent in checking period without user permission. */
99 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */
102 /** Default premium SMS permission (ask user for each premium SMS sent). */
105 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */
108 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */
138 /** Directory for per-app SMS permission XML file. */
141 /** Per-app SMS permission XML filename. */
180 /** XML attribute for the package's premium SMS permission (integer type). */
533 * Returns the premium SMS permission fo
564 setPremiumSmsPermission(String packageName, int permission) argument
[all...]
H A DUiccSmsController.java240 public void setPremiumSmsPermission(String packageName, int permission) { argument
241 setPremiumSmsPermissionForSubscriber(getPreferredSmsSubscription(), packageName, permission);
245 public void setPremiumSmsPermissionForSubscriber(int subId, String packageName, int permission) { argument
248 iccSmsIntMgr.setPremiumSmsPermission(packageName, permission);
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/
H A DContextFixture.java94 public static final String PERMISSION_ENABLE_ALL = "android.permission.STUB_PERMISSION";
418 public void enforceCallingOrSelfPermission(String permission, String message) { argument
419 if (mPermissionTable.contains(permission)
423 logd("requested permission: " + permission + " got denied");
424 throw new SecurityException(permission + " denied: " + message);
428 public int checkCallingOrSelfPermission(String permission) { argument
586 public void addCallingOrSelfPermission(String permission) { argument
588 if (mPermissionTable != null && permission != null) {
590 mPermissionTable.add(permission);
595 removeCallingOrSelfPermission(String permission) argument
[all...]
/frameworks/opt/chips/src/com/android/ex/chips/
H A DChipsUtil.java29 * Listener that gets notified when we check whether we have permission.
32 void onPermissionCheck(String permission, boolean granted); argument
39 new String[] { Manifest.permission.READ_CONTACTS };
51 * <p>This is interesting for us because new permission model is introduced in M and we need to
59 * Returns {@link PackageManager#PERMISSION_GRANTED} if given permission is granted, or
62 public static int checkPermission(Context context, String permission) { argument
64 // TODO: Use "context.checkSelfPermission(permission)" once it's safe to move to M sdk
65 return context.checkPermission(permission, Process.myPid(), Process.myUid());
67 // Assume that we have permission before M.
80 for (String permission
[all...]
/frameworks/native/libs/binder/
H A DAppOpsManager.cpp107 int32_t AppOpsManager::permissionToOpCode(const String16& permission) { argument
110 return service->permissionToOpCode(permission);
H A DIAppOpsService.cpp116 virtual int32_t permissionToOpCode(const String16& permission) { argument
119 data.writeString16(permission);
203 String16 permission = data.readString16(); local
204 const int32_t opCode = permissionToOpCode(permission);
H A DIPermissionController.cpp39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument
43 data.writeString16(permission);
71 virtual bool isRuntimePermission(const String16& permission) argument
75 data.writeString16(permission);
93 String16 permission = data.readString16(); local
96 bool res = checkPermission(permission, pid, uid);
118 String16 permission = data.readString16(); local
119 const bool res = isRuntimePermission(permission);
H A DIServiceManager.cpp50 bool checkCallingPermission(const String16& permission) argument
52 return checkCallingPermission(permission, NULL, NULL);
55 static String16 _permission("permission");
58 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument
65 return checkPermission(permission, pid, uid);
68 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument
84 bool res = pc->checkPermission(permission, pid, uid);
89 String8(permission).string(), uid, pid);
94 // Is this a permission failure, or did the controller go away?
97 String8(permission)
[all...]

Completed in 1395 milliseconds

1234