/frameworks/base/core/java/android/app/ |
H A D | UiAutomationConnection.java | 246 public void grantRuntimePermission(String packageName, String permission, int userId) argument 255 mPackageManager.grantRuntimePermission(packageName, permission, userId); 262 public void revokeRuntimePermission(String packageName, String permission, int userId) argument 271 mPackageManager.revokeRuntimePermission(packageName, permission, userId);
|
H A D | ContextImpl.java | 1570 + " without permission " + cn.getClassName()); 1730 public int checkPermission(String permission, int pid, int uid) { argument 1731 if (permission == null) { 1732 throw new IllegalArgumentException("permission is null"); 1739 // UID, then they totally have whatever permission this is. 1742 Slog.w(TAG, "Missing ActivityManager; assuming " + uid + " holds " + permission); 1746 + permission); 1751 return am.checkPermission(permission, pid, uid); 1759 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 1760 if (permission 1773 checkCallingPermission(String permission) argument 1786 checkCallingOrSelfPermission(String permission) argument 1796 checkSelfPermission(String permission) argument 1804 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument 1819 enforcePermission( String permission, int pid, int uid, String message) argument 1829 enforceCallingPermission(String permission, String message) argument 1838 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
H A D | PackageParserTest.java | 353 Permission permission) { 354 assertEquals(packageName, permission.owner.packageName); 355 assertEquals(name, permission.info.name); 356 assertEquals(protectionLevel, permission.info.protectionLevel); 445 assertEquals(Arrays.asList("android.permission.INTERNET"), 453 assertEquals(Arrays.asList("android.permission.NFC"), 463 "android.permission.ACCESS_NETWORK_STATE", 464 "android.permission.READ_CONTACTS"), 352 assertPermission(String name, String packageName, int protectionLevel, Permission permission) argument
|
/frameworks/base/core/tests/coretests/src/com/android/internal/app/ |
H A D | ResolverDataProvider.java | 65 ai.permission = null;
|
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/deviceinfo/ |
H A D | AbstractConnectivityPreferenceController.java | 76 android.Manifest.permission.CHANGE_NETWORK_STATE, null);
|
/frameworks/base/services/backup/java/com/android/server/backup/restore/ |
H A D | ActiveRestoreSession.java | 80 android.Manifest.permission.BACKUP, 135 android.Manifest.permission.BACKUP, 196 android.Manifest.permission.BACKUP, 314 // app's uid, throw a permission exception back to the caller. 316 android.Manifest.permission.BACKUP, 322 throw new SecurityException("No permission to restore other packages");
|
/frameworks/base/services/core/java/com/android/server/media/ |
H A D | MediaResourceMonitorService.java | 76 android.Manifest.permission.RECEIVE_MEDIA_RESOURCE_USAGE);
|
/frameworks/base/telephony/java/com/android/internal/telephony/ |
H A D | ISms.aidl | 420 * Returns the premium SMS send permission for the specified package. 421 * Requires system permission. 426 * Returns the premium SMS send permission for the specified package. 427 * Requires system permission. 432 * Set the SMS send permission for the specified package. 433 * Requires system permission. 435 void setPremiumSmsPermission(String packageName, int permission); 438 * Set the SMS send permission for the specified package. 439 * Requires system permission. 441 void setPremiumSmsPermissionForSubscriber(int subId, String packageName, int permission); [all...] |
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ActivityManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
/frameworks/native/include/binder/ |
H A D | AppOpsManager.h | 110 int32_t permissionToOpCode(const String16& permission);
|
H A D | IAppOpsService.h | 45 virtual int32_t permissionToOpCode(const String16& permission) = 0;
|
/frameworks/native/libs/binder/include/binder/ |
H A D | AppOpsManager.h | 110 int32_t permissionToOpCode(const String16& permission);
|
H A D | IAppOpsService.h | 45 virtual int32_t permissionToOpCode(const String16& permission) = 0;
|
/frameworks/opt/car/services/src/com/android/internal/car/ |
H A D | CarServiceHelperService.java | 102 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DEVICE_POWER, null);
|
/frameworks/base/core/java/android/hardware/hdmi/ |
H A D | HdmiControlManager.java | 58 * <p>Requires {@link android.Manifest.permission#HDMI_CEC} to receive. 357 @RequiresPermission(android.Manifest.permission.HDMI_CEC) 418 @RequiresPermission(android.Manifest.permission.HDMI_CEC) 442 @RequiresPermission(android.Manifest.permission.HDMI_CEC)
|
/frameworks/base/media/tests/CameraBrowser/src/com/android/camerabrowser/ |
H A D | MtpClient.java | 90 boolean permission = intent.getBooleanExtra(UsbManager.EXTRA_PERMISSION_GRANTED, 92 Log.d(TAG, "ACTION_USB_PERMISSION: " + permission); 93 if (permission) {
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/qs/customize/ |
H A D | TileQueryHelper.java | 19 import android.Manifest.permission; 145 if (!permission.BIND_QUICK_SETTINGS_TILE.equals(info.serviceInfo.permission)) {
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | SystemUpdateManagerService.java | 89 mContext.enforceCallingOrSelfPermission(Manifest.permission.RECOVERY, TAG); 115 if (mContext.checkCallingOrSelfPermission(Manifest.permission.READ_SYSTEM_UPDATE_INFO) 117 && mContext.checkCallingOrSelfPermission(Manifest.permission.RECOVERY) 120 + "READ_SYSTEM_UPDATE_INFO or RECOVERY permission.");
|
/frameworks/base/tests/net/java/com/android/server/net/ |
H A D | NetworkStatsAccessTest.java | 23 import android.Manifest.permission; 181 when(mContext.checkCallingPermission(Manifest.permission.PACKAGE_USAGE_STATS)).thenReturn( 187 when(mContext.checkCallingOrSelfPermission(permission.READ_NETWORK_USAGE_HISTORY))
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | IccPhoneBookInterfaceManager.java | 146 * throws SecurityException if no WRITE_CONTACTS permission 167 android.Manifest.permission.WRITE_CONTACTS) 170 "Requires android.permission.WRITE_CONTACTS permission"); 204 * throws SecurityException if no WRITE_CONTACTS permission 220 android.Manifest.permission.WRITE_CONTACTS) 223 "Requires android.permission.WRITE_CONTACTS permission"); 280 * throws SecurityException if no READ_CONTACTS permission 288 android.Manifest.permission [all...] |
/frameworks/support/compat/src/main/java/androidx/core/hardware/fingerprint/ |
H A D | FingerprintManagerCompat.java | 61 @RequiresPermission(android.Manifest.permission.USE_FINGERPRINT) 76 @RequiresPermission(android.Manifest.permission.USE_FINGERPRINT) 100 @RequiresPermission(android.Manifest.permission.USE_FINGERPRINT)
|
/frameworks/base/services/core/java/com/android/server/display/ |
H A D | DisplayManagerService.java | 1626 mContext.enforceCallingOrSelfPermission(Manifest.permission.CONFIGURE_WIFI_DISPLAY, 1640 mContext.enforceCallingOrSelfPermission(Manifest.permission.CONFIGURE_WIFI_DISPLAY, 1657 mContext.enforceCallingOrSelfPermission(Manifest.permission.CONFIGURE_WIFI_DISPLAY, 1688 mContext.enforceCallingOrSelfPermission(Manifest.permission.CONFIGURE_WIFI_DISPLAY, 1704 mContext.enforceCallingOrSelfPermission(Manifest.permission.CONFIGURE_WIFI_DISPLAY, 1717 mContext.enforceCallingOrSelfPermission(Manifest.permission.CONFIGURE_WIFI_DISPLAY, 1730 mContext.enforceCallingOrSelfPermission(Manifest.permission.CONFIGURE_WIFI_DISPLAY, 1757 Manifest.permission.CONFIGURE_DISPLAY_COLOR_MODE, 1770 Manifest.permission.CONTROL_DISPLAY_SATURATION, 1831 + "CAPTURE_SECURE_VIDEO_OUTPUT permission, o [all...] |
/frameworks/base/services/voiceinteraction/java/com/android/server/voiceinteraction/ |
H A D | VoiceInteractionManagerService.java | 803 enforceCallingPermission(Manifest.permission.MANAGE_VOICE_KEYPHRASES); 820 enforceCallingPermission(Manifest.permission.MANAGE_VOICE_KEYPHRASES); 845 enforceCallingPermission(Manifest.permission.MANAGE_VOICE_KEYPHRASES); 1002 enforceCallingPermission(Manifest.permission.ACCESS_VOICE_INTERACTION_SERVICE); 1011 enforceCallingPermission(Manifest.permission.ACCESS_VOICE_INTERACTION_SERVICE); 1033 enforceCallingPermission(Manifest.permission.ACCESS_VOICE_INTERACTION_SERVICE); 1055 enforceCallingPermission(Manifest.permission.ACCESS_VOICE_INTERACTION_SERVICE); 1073 enforceCallingPermission(Manifest.permission.ACCESS_VOICE_INTERACTION_SERVICE); 1081 enforceCallingPermission(Manifest.permission.ACCESS_VOICE_INTERACTION_SERVICE); 1089 enforceCallingPermission(Manifest.permission 1175 enforceCallingPermission(String permission) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ActivityInfo.java | 142 * Optional name of a permission required to be able to access this 143 * Activity. From the "permission" attribute. 145 public String permission; field in class:ActivityInfo 959 permission = orig.permission; 1099 if (permission != null) { 1100 pw.println(prefix + "permission=" + permission); 1155 dest.writeString(permission); 1283 permission [all...] |
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/util/ |
H A D | WifiPermissionsUtilTest.java | 85 private final String mMacAddressPermission = "android.permission.PEERS_MAC_ADDRESS"; 87 "android.permission.INTERACT_ACROSS_USERS_FULL"; 89 Manifest.permission.ACCESS_COARSE_LOCATION; 118 * Verify we return true when the UID does have the override config permission 132 * Verify we return false when the UID does not have the override config permission. 146 * Verify we return false when the override config permission check throws a RemoteException. 163 * This App has permission to request WIFI_SCAN 186 * This App has permission to request WIFI_SCAN 209 * - This App doesn't have permission to request Wifi Scan 229 * This App has permission t [all...] |