/frameworks/support/frameworks/support/samples/SupportLeanbackShowcase/libs/ |
H A D | picasso-2.5.2.jar | META-INF/ META-INF/MANIFEST.MF com/ com/squareup/ com/squareup/picasso/ com/squareup/picasso/Action ... |
/frameworks/support/samples/SupportLeanbackShowcase/libs/ |
H A D | picasso-2.5.2.jar | META-INF/ META-INF/MANIFEST.MF com/ com/squareup/ com/squareup/picasso/ com/squareup/picasso/Action ... |
/frameworks/support/v13/api23/android/support/v13/app/ |
H A D | FragmentCompat23.java | 28 String permission) { 29 return fragment.shouldShowRequestPermissionRationale(permission); 27 shouldShowRequestPermissionRationale(Fragment fragment, String permission) argument
|
/frameworks/support/v13/java/android/support/v13/app/ |
H A D | FragmentCompat.java | 39 boolean shouldShowRequestPermissionRationale(Fragment fragment, String permission); argument 78 public boolean shouldShowRequestPermissionRationale(Fragment fragment, String permission) { argument 104 public boolean shouldShowRequestPermissionRationale(Fragment fragment, String permission) { argument 105 return FragmentCompat23.shouldShowRequestPermissionRationale(fragment, permission); 132 * This interface is the contract for receiving the results for permission requests. 189 * and the results of permission requests will be delivered to its 194 * Note that requesting a permission does not guarantee it will be granted and 195 * your app should be able to run without having this permission. 206 * When checking whether you have a permission you should use {@link 227 * Gets whether you should show UI with rationale for requesting a permission 247 shouldShowRequestPermissionRationale(@onNull Fragment fragment, @NonNull String permission) argument [all...] |
/frameworks/support/compat/api23/android/support/v4/app/ |
H A D | ActivityCompatApi23.java | 49 String permission) { 50 return activity.shouldShowRequestPermissionRationale(permission); 48 shouldShowRequestPermissionRationale(Activity activity, String permission) argument
|
H A D | AppOpsManagerCompat23.java | 26 public static String permissionToOp(String permission) { argument 27 return AppOpsManager.permissionToOp(permission);
|
/frameworks/support/compat/java/android/support/v4/app/ |
H A D | ActivityCompat.java | 48 * This interface is the contract for receiving the results for permission requests. 321 * and the results of permission requests will be delivered to its {@link 326 * Note that requesting a permission does not guarantee it will be granted and 327 * your app should be able to run without having this permission. 338 * When checking whether you have a permission you should use {@link 348 * You cannot request a permission if your activity sets {@link 397 * Gets whether you should show UI with rationale for requesting a permission. 398 * You should do this only if you do not have the permission and the context in 399 * which the permission is requested does not clearly communicate to the user 400 * what would be the benefit from granting this permission 416 shouldShowRequestPermissionRationale(@onNull Activity activity, @NonNull String permission) argument [all...] |
H A D | AppOpsManagerCompat.java | 54 public String permissionToOp(String permission) { argument 72 public String permissionToOp(String permission) { argument 73 return AppOpsManagerCompat23.permissionToOp(permission); 99 * Gets the app op name associated with a given permission. 101 * @param permission The permission. 102 * @return The app op associated with the permission or null. 104 public static String permissionToOp(@NonNull String permission) { argument 105 return IMPL.permissionToOp(permission);
|
/frameworks/support/compat/java/android/support/v4/content/ |
H A D | ContextCompat.java | 208 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to 214 * <pre class="prettyprint"><uses-permission 215 * android:name="android.permission.WRITE_EXTERNAL_STORAGE" 267 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to 273 * <pre class="prettyprint"><uses-permission 274 * android:name="android.permission.WRITE_EXTERNAL_STORAGE" 320 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to 326 * <pre class="prettyprint"><uses-permission 327 * android:name="android.permission.WRITE_EXTERNAL_STORAGE" 439 * Determine whether <em>you</em> have been granted a particular permission 448 checkSelfPermission(@onNull Context context, @NonNull String permission) argument [all...] |
/frameworks/support/core-utils/java/android/support/v4/content/ |
H A D | PermissionChecker.java | 31 * This class provides permission check APIs that verify both the 32 * permission and the associated app op for this permission if 35 * In the new permission model permissions with protection level 40 * permission revocations and would crash. Therefore, when the 41 * user disables a permission for a legacy app in the UI the 42 * platform disables the APIs guarded by this permission making 50 * permission model for which the user had disabled the "permission" 55 /** Permission result: The permission i 87 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, String packageName) argument 123 checkSelfPermission(@onNull Context context, @NonNull String permission) argument 140 checkCallingPermission(@onNull Context context, @NonNull String permission, String packageName) argument 158 checkCallingOrSelfPermission(@onNull Context context, @NonNull String permission) argument [all...] |
/frameworks/support/fragment/java/android/support/v4/app/ |
H A D | Fragment.java | 1011 * Note that requesting a permission does not guarantee it will be granted and 1012 * your app should be able to run without having this permission. 1023 * When checking whether you have a permission you should use {@link 1037 * if (getActivity().checkSelfPermission(Manifest.permission.READ_CONTACTS) 1039 * requestPermissions(new String[]{Manifest.permission.READ_CONTACTS}, 1093 * Gets whether you should show UI with rationale for requesting a permission. 1094 * You should do this only if you do not have the permission and the context in 1095 * which the permission is requested does not clearly communicate to the user 1096 * what would be the benefit from granting this permission. 1098 * For example, if you write a camera app, requesting the camera permission 1112 shouldShowRequestPermissionRationale(@onNull String permission) argument [all...] |
H A D | FragmentActivity.java | 1065 public boolean onShouldShowRequestPermissionRationale(@NonNull String permission) { argument 1067 FragmentActivity.this, permission);
|
H A D | FragmentHostCallback.java | 160 * Checks whether to show permission rationale UI from a fragment. 163 public boolean onShouldShowRequestPermissionRationale(@NonNull String permission) { argument
|
/frameworks/support/fragment/tests/java/android/support/v4/app/ |
H A D | FragmentLifecycleTest.java | 645 public boolean onShouldShowRequestPermissionRationale(@NonNull String permission) { argument 647 mActivity, permission);
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | IccSmsInterfaceManager.java | 176 Manifest.permission.RECEIVE_SMS, message); 178 Manifest.permission.SEND_SMS, message); 289 Manifest.permission.RECEIVE_SMS, 318 * This method checks if the calling package or itself has the permission to send the data sms. 323 Manifest.permission.SEND_SMS, 331 * This method checks only if the calling package has the permission to send the data sms. 336 Manifest.permission.SEND_SMS, 385 * This method checks only if the calling package has the permission to send the sms. 391 Manifest.permission.SEND_SMS, 399 * This method checks if the calling package or itself has the permission t 567 setPremiumSmsPermission(String packageName, int permission) argument [all...] |
H A D | InboundSmsHandler.java | 642 mContext.sendBroadcast(intent, android.Manifest.permission.RECEIVE_SMS); 981 String carrierFilterSmsPerm = "android.permission.CARRIER_FILTER_SMS"; 999 * Dispatch the intent with the specified permission, appOp, and result receiver, using 1003 * @param permission receivers are required to have this permission 1007 public void dispatchIntent(Intent intent, String permission, int appOp, argument 1050 mContext.sendOrderedBroadcastAsUser(intent, targetUser, permission, appOp, opts, 1055 mContext.sendOrderedBroadcastAsUser(intent, user, permission, appOp, opts, 1141 dispatchIntent(intent, android.Manifest.permission.RECEIVE_SMS, 1289 dispatchIntent(intent, android.Manifest.permission [all...] |
H A D | SMSDispatcher.java | 78 import static android.Manifest.permission.SEND_SMS_NO_CONFIRMATION; 1053 // Wait for user confirmation unless the user has set permission to always allow/deny 1204 * Returns the premium SMS permission for the specified package. If the package has never 1207 * @param packageName the name of the package to query permission 1218 * Sets the premium SMS permission for the specified package and save the value asynchronously 1220 * @param packageName the name of the package to set permission 1221 * @param permission one of {@link SmsUsageMonitor#PREMIUM_SMS_PERMISSION_ASK_USER}, 1225 public void setPremiumSmsPermission(String packageName, int permission) { argument 1226 mUsageMonitor.setPremiumSmsPermission(packageName, permission); 1644 // Always set the SMS permission s [all...] |
H A D | SmsUsageMonitor.java | 72 /** Default checking period for SMS sent without user permission. */ 75 /** Default number of SMS sent in checking period without user permission. */ 99 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */ 102 /** Default premium SMS permission (ask user for each premium SMS sent). */ 105 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */ 108 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */ 138 /** Directory for per-app SMS permission XML file. */ 141 /** Per-app SMS permission XML filename. */ 180 /** XML attribute for the package's premium SMS permission (integer type). */ 533 * Returns the premium SMS permission fo 564 setPremiumSmsPermission(String packageName, int permission) argument [all...] |
H A D | UiccSmsController.java | 240 public void setPremiumSmsPermission(String packageName, int permission) { argument 241 setPremiumSmsPermissionForSubscriber(getPreferredSmsSubscription(), packageName, permission); 245 public void setPremiumSmsPermissionForSubscriber(int subId, String packageName, int permission) { argument 248 iccSmsIntMgr.setPremiumSmsPermission(packageName, permission);
|
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/ |
H A D | ContextFixture.java | 94 public static final String PERMISSION_ENABLE_ALL = "android.permission.STUB_PERMISSION"; 418 public void enforceCallingOrSelfPermission(String permission, String message) { argument 419 if (mPermissionTable.contains(permission) 423 logd("requested permission: " + permission + " got denied"); 424 throw new SecurityException(permission + " denied: " + message); 428 public int checkCallingOrSelfPermission(String permission) { argument 586 public void addCallingOrSelfPermission(String permission) { argument 588 if (mPermissionTable != null && permission != null) { 590 mPermissionTable.add(permission); 595 removeCallingOrSelfPermission(String permission) argument [all...] |
/frameworks/opt/chips/src/com/android/ex/chips/ |
H A D | ChipsUtil.java | 29 * Listener that gets notified when we check whether we have permission. 32 void onPermissionCheck(String permission, boolean granted); argument 39 new String[] { Manifest.permission.READ_CONTACTS }; 51 * <p>This is interesting for us because new permission model is introduced in M and we need to 59 * Returns {@link PackageManager#PERMISSION_GRANTED} if given permission is granted, or 62 public static int checkPermission(Context context, String permission) { argument 64 // TODO: Use "context.checkSelfPermission(permission)" once it's safe to move to M sdk 65 return context.checkPermission(permission, Process.myPid(), Process.myUid()); 67 // Assume that we have permission before M. 80 for (String permission [all...] |
/frameworks/native/libs/binder/ |
H A D | AppOpsManager.cpp | 107 int32_t AppOpsManager::permissionToOpCode(const String16& permission) { argument 110 return service->permissionToOpCode(permission);
|
H A D | IAppOpsService.cpp | 116 virtual int32_t permissionToOpCode(const String16& permission) { argument 119 data.writeString16(permission); 203 String16 permission = data.readString16(); local 204 const int32_t opCode = permissionToOpCode(permission);
|
H A D | IPermissionController.cpp | 39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 43 data.writeString16(permission); 71 virtual bool isRuntimePermission(const String16& permission) argument 75 data.writeString16(permission); 93 String16 permission = data.readString16(); local 96 bool res = checkPermission(permission, pid, uid); 118 String16 permission = data.readString16(); local 119 const bool res = isRuntimePermission(permission);
|
H A D | IServiceManager.cpp | 50 bool checkCallingPermission(const String16& permission) argument 52 return checkCallingPermission(permission, NULL, NULL); 55 static String16 _permission("permission"); 58 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument 65 return checkPermission(permission, pid, uid); 68 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 84 bool res = pc->checkPermission(permission, pid, uid); 89 String8(permission).string(), uid, pid); 94 // Is this a permission failure, or did the controller go away? 97 String8(permission) [all...] |