Searched refs:permission (Results 126 - 150 of 467) sorted by relevance

1234567891011>>

/frameworks/base/core/jni/
H A Dandroid_os_SELinux.cpp256 * permissionStr: permission name as a string
257 * Returns: boolean: (true) if permission was granted, (false) otherwise
281 ScopedUtfChars permission(env, permissionStr);
282 if (permission.c_str() == NULL) {
288 int accessGranted = selinux_check_access(tmp1, tmp2, objectClass.c_str(), permission.c_str(),
292 objectClass.c_str(), permission.c_str(), accessGranted);
/frameworks/base/packages/Shell/src/com/android/shell/
H A DRemoteBugreportReceiver.java65 android.Manifest.permission.DUMP);
/frameworks/base/services/core/java/com/android/server/tv/
H A DTvRemoteProviderWatcher.java146 if (serviceInfo.permission == null || !serviceInfo.permission.equals(
147 Manifest.permission.BIND_TV_REMOTE_SERVICE)) {
148 // If the service does not require this permission then any app could
153 + "require the BIND_TV_REMOTE_SERVICE permission in its manifest: "
167 // If the service does not have permission to be
170 + "have TV_VIRTUAL_REMOTE_CONTROLLER permission: " + serviceInfo.packageName);
179 // Manifest.permission.TV_VIRTUAL_REMOTE_CONTROLLER : virtual remote controller on TV
181 if ((mPackageManager.checkPermission(Manifest.permission.TV_VIRTUAL_REMOTE_CONTROLLER,
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/
H A DDeviceAdminServiceController.java18 import android.Manifest.permission;
126 if (!permission.BIND_DEVICE_ADMIN.equals(si.permission)) {
129 + " must be protected with " + permission.BIND_DEVICE_ADMIN
/frameworks/base/services/voiceinteraction/java/com/android/server/soundtrigger/
H A DSoundTriggerService.java19 import static android.Manifest.permission.BIND_SOUND_TRIGGER_DETECTION_SERVICE;
181 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER);
199 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER);
209 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER);
220 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER);
229 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER);
240 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER);
267 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER);
319 enforceCallingPermission(Manifest.permission.MANAGE_SOUND_TRIGGER);
369 enforceCallingPermission(Manifest.permission
1242 enforceCallingPermission(String permission) argument
[all...]
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/
H A DPmPermissionsTests.java17 package com.android.framework.permission.tests;
29 private String mPkgName = "com.android.framework.permission.tests";
38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission
39 * android.permission.GET_PACKAGE_SIZE
53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission
54 * android.permission.DELETE_CACHE_FILES
68 * This test verifies that PackageManger.installPackage enforces permission
69 * android.permission.INSTALL_PACKAGES
76 * enforces permission android.permission
[all...]
/frameworks/compile/mclinker/lib/Core/
H A DLinker.cpp259 FileHandle::Permission permission; local
263 permission = FileHandle::Permission(0x644);
268 permission = FileHandle::Permission(0x755);
274 bool result = file.open(sys::fs::Path(pPath), open_mode, permission);
/frameworks/native/libs/binder/
H A DIAppOpsService.cpp117 virtual int32_t permissionToOpCode(const String16& permission) { argument
120 data.writeString16(permission);
205 String16 permission = data.readString16(); local
206 const int32_t opCode = permissionToOpCode(permission);
H A DAppOpsManager.cpp133 int32_t AppOpsManager::permissionToOpCode(const String16& permission) { argument
136 return service->permissionToOpCode(permission);
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DWifiLockManager.java60 * This method verifies that the caller has permission to make the call and that the lock mode
70 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.WAKE_LOCK, null);
78 android.Manifest.permission.UPDATE_DEVICE_STATS, null);
91 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.WAKE_LOCK, null);
136 // Does the caller have permission to make this call?
138 android.Manifest.permission.UPDATE_DEVICE_STATS, null);
/frameworks/base/core/java/android/bluetooth/
H A DBluetoothHearingAid.java47 * <p> Each method is protected with its appropriate permission.
70 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission to
91 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission to
107 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission to
252 * <p>Requires {@link android.Manifest.permission#BLUETOOTH_ADMIN}
253 * permission.
294 * <p>Requires {@link android.Manifest.permission#BLUETOOTH_ADMI
[all...]
H A DBluetoothHeadset.java50 * Each method is protected with its appropriate permission.
71 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission to
91 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission
107 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission to
146 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission
297 * <p>Requires {@link android.Manifest.permission#BLUETOOT
[all...]
/frameworks/base/core/java/android/net/
H A DIpSecTransform.java290 android.Manifest.permission.MANAGE_IPSEC_TUNNELS,
291 android.Manifest.permission.PACKET_KEEPALIVE_OFFLOAD
332 android.Manifest.permission.MANAGE_IPSEC_TUNNELS,
333 android.Manifest.permission.PACKET_KEEPALIVE_OFFLOAD
484 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS)
/frameworks/base/core/java/android/os/
H A DUserManager.java1198 * MANAGE_USERS permission.
1368 @RequiresPermission(android.Manifest.permission.MANAGE_USERS)
1385 * Requires {@link android.Manifest.permission#MANAGE_USERS} permission, otherwise the caller
1392 @RequiresPermission(android.Manifest.permission.MANAGE_USERS)
1406 * Requires {@link android.Manifest.permission#MANAGE_USERS} permission, otherwise the caller
1448 * {@link android.os.Build.VERSION_CODES#N), this API required a system permission
1477 * {@link android.os.Build.VERSION_CODES#N), this API required a system permission
1524 * <p>Requires {@code android.permission
[all...]
H A DINetworkManagementService.aidl396 * @param permission null if no permissions required to access this network. PERMISSION_NETWORK
397 * or PERMISSION_SYSTEM to set respective permission.
399 void createPhysicalNetwork(int netId, String permission);
427 * Set permission for a network.
428 * @param permission null to clear permissions. PERMISSION_NETWORK or PERMISSION_SYSTEM to set
429 * permission.
431 void setNetworkPermission(int netId, String permission);
433 void setPermission(String permission, in int[] uids);
/frameworks/base/services/core/java/com/android/server/content/
H A DContentService.java197 // This makes it so that future permission checks will be in the context of this
318 * the calling user without requiring any permission, otherwise the caller needs to
319 * hold the INTERACT_ACROSS_USERS_FULL permission or hold a read uri grant to the uri.
380 * the calling user without requiring any permission, otherwise the caller needs to
381 * hold the INTERACT_ACROSS_USERS_FULL permission or hold a write uri grant to the uri.
419 // This makes it so that future permission checks will be in the context of this
516 // This makes it so that future permission checks will be in the context of this
557 * INTERACT_ACROSS_USERS_FULL permission.
561 enforceCrossUserPermission(userId, "no permission to request sync as user: " + userId);
569 // This makes it so that future permission check
[all...]
/frameworks/base/test-mock/src/android/test/mock/
H A DMockContext.java608 public int checkPermission(String permission, int pid, int uid) { argument
614 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument
615 return checkPermission(permission, pid, uid);
619 public int checkCallingPermission(String permission) { argument
624 public int checkCallingOrSelfPermission(String permission) { argument
629 public int checkSelfPermission(String permission) { argument
635 String permission, int pid, int uid, String message) {
640 public void enforceCallingPermission(String permission, String message) { argument
645 public void enforceCallingOrSelfPermission(String permission, String message) { argument
634 enforcePermission( String permission, int pid, int uid, String message) argument
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/
H A DWifiServiceImplTest.java316 when(mContext.checkPermission(eq(android.Manifest.permission.NETWORK_SETTINGS),
383 * Verify that wifi can be enabled by a caller with WIFI_STATE_CHANGE permission when wifi is
407 * Verify a SecurityException is thrown if a caller does not have the correct permission to
413 .enforceCallingOrSelfPermission(eq(android.Manifest.permission.CHANGE_WIFI_STATE),
459 * Verify that a call from an app with the NETWORK_SETTINGS permission can enable wifi if we
467 eq(android.Manifest.permission.NETWORK_SETTINGS), anyInt(), anyInt()))
474 * Verify that a caller without the NETWORK_SETTINGS permission can't enable wifi
482 eq(android.Manifest.permission.NETWORK_SETTINGS), anyInt(), anyInt()))
489 * Verify that a call from an app with the NETWORK_SETTINGS permission can enable wifi if we
507 eq(android.Manifest.permission
[all...]
/frameworks/base/core/java/android/app/
H A DWallpaperManager.java417 Log.w(TAG, "No permission to access wallpaper, suppressing"
420 // Post-O apps really most sincerely need the permission.
793 @RequiresPermission(android.Manifest.permission.READ_EXTERNAL_STORAGE)
809 @RequiresPermission(android.Manifest.permission.READ_EXTERNAL_STORAGE)
860 * not have permission to read the current wallpaper.
865 @RequiresPermission(android.Manifest.permission.READ_EXTERNAL_STORAGE)
949 * permission to access another user's wallpaper data.
978 Log.w(TAG, "No permission to access wallpaper, suppressing"
1115 * <p>This method requires the caller to hold the permission
1116 * {@link android.Manifest.permission#SET_WALLPAPE
[all...]
/frameworks/base/core/java/android/content/pm/dex/
H A DArtManager.java19 import static android.Manifest.permission.PACKAGE_USAGE_STATS;
20 import static android.Manifest.permission.READ_RUNTIME_PROFILES;
91 * The calling process must have {@code android.permission.READ_RUNTIME_PROFILE} permission.
126 * The calling process must have {@code android.permission.READ_RUNTIME_PROFILE} permission.
/frameworks/base/core/java/android/nfc/
H A DNfcAdapter.java153 * <p>This intent will only be sent if the application has requested permission for
154 * {@link android.Manifest.permission#NFC_TRANSACTION_EVENT} and if the application has the
157 @RequiresPermission(android.Manifest.permission.NFC_TRANSACTION_EVENT)
775 @RequiresPermission(android.Manifest.permission.WRITE_SECURE_SETTINGS)
804 @RequiresPermission(android.Manifest.permission.WRITE_SECURE_SETTINGS)
819 @RequiresPermission(android.Manifest.permission.WRITE_SECURE_SETTINGS)
911 * <p class="note">Requires the {@link android.Manifest.permission#NFC} permission.
993 * <p class="note">Requires the {@link android.Manifest.permission#NFC} permission
[all...]
/frameworks/base/core/java/com/android/internal/app/
H A DIAppOpsService.aidl35 int permissionToOpCode(String permission);
H A DSuspendedAppActivity.java58 final String requiredPermission = Manifest.permission.SEND_SHOW_SUSPENDED_APP_DETAILS;
61 && requiredPermission.equals(resolvedInfo.activityInfo.permission)) {
/frameworks/base/services/core/java/com/android/server/media/projection/
H A DMediaProjectionManagerService.java53 * as well as the capabilities they grant. Any service using MediaProjection tokens as permission
212 android.Manifest.permission.CAPTURE_VIDEO_OUTPUT)
225 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
228 + "projection permission");
255 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
270 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
288 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
303 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
328 private boolean checkPermission(String packageName, String permission) { argument
329 return mContext.getPackageManager().checkPermission(permission, packageNam
[all...]
/frameworks/base/services/core/java/com/android/server/net/
H A DNetworkStatsAccess.java19 import static android.Manifest.permission.READ_NETWORK_USAGE_HISTORY;
83 * <li>Apps with the PACKAGE_USAGE_STATS permission granted. Note that this is an AppOps bit
85 * <li>Apps with the (signature/privileged) READ_NETWORK_USAGE_HISTORY permission.
132 // Apps with the AppOps permission, profile owners, and apps with the privileged
133 // permission can access data usage for all apps in this user/profile.
181 // permission.
183 Manifest.permission.PACKAGE_USAGE_STATS);

Completed in 2405 milliseconds

1234567891011>>