Searched refs:permission (Results 176 - 200 of 467) sorted by relevance

1234567891011>>

/frameworks/base/services/core/java/com/android/server/
H A DStorageManagerService.java654 android.Manifest.permission.WRITE_MEDIA_STORAGE);
954 enforcePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS);
1642 enforcePermission(android.Manifest.permission.SHUTDOWN);
1650 enforcePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS);
1665 enforcePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS);
1677 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS);
1689 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS);
1728 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS);
1741 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS);
1755 enforcePermission(android.Manifest.permission
[all...]
/frameworks/base/core/java/android/content/pm/
H A DPackageInstaller.java259 * permission, incompatible certificates, etc. The user may be able to
464 Manifest.permission.DELETE_PACKAGES,
465 Manifest.permission.REQUEST_DELETE_PACKAGES})
507 Manifest.permission.DELETE_PACKAGES,
508 Manifest.permission.REQUEST_DELETE_PACKAGES})
529 Manifest.permission.DELETE_PACKAGES,
530 Manifest.permission.REQUEST_DELETE_PACKAGES})
544 @RequiresPermission(android.Manifest.permission.INSTALL_PACKAGES)
993 @RequiresPermission(android.Manifest.permission.INSTALL_PACKAGES)
1014 * permission
[all...]
H A DApplicationInfo.java66 * Optional name of a permission required to be able to access this
67 * application's components. From the "permission" attribute.
69 public String permission; field in class:ApplicationInfo
171 * {@link android.Manifest.permission#FACTORY_TEST} permission and the
1187 if (permission != null) {
1188 pw.println(prefix + "permission=" + permission);
1273 proto.write(ApplicationInfoProto.PERMISSION, permission);
1410 permission
[all...]
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DWapPushOverSms.java600 String permission;
602 permission = android.Manifest.permission.RECEIVE_MMS;
604 permission = android.Manifest.permission.RECEIVE_WAP_PUSH;
606 return permission;
H A DIccSmsInterfaceManager.java189 Manifest.permission.RECEIVE_SMS, message);
191 Manifest.permission.SEND_SMS, message);
302 Manifest.permission.RECEIVE_SMS,
331 * This method checks if the calling package or itself has the permission to send the data sms.
343 * This method checks only if the calling package has the permission to send the data sms.
393 * This method checks only if the calling package has the permission to send the sms.
409 * This method checks if the calling package or itself has the permission to send the sms.
553 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.MODIFY_PHONE_STATE)
720 public void setPremiumSmsPermission(String packageName, int permission) { argument
721 mDispatchersController.setPremiumSmsPermission(packageName, permission);
[all...]
H A DSmsStorageMonitor.java149 mContext.sendBroadcast(intent, android.Manifest.permission.RECEIVE_SMS);
H A DUiccSmsController.java275 public void setPremiumSmsPermission(String packageName, int permission) { argument
276 setPremiumSmsPermissionForSubscriber(getPreferredSmsSubscription(), packageName, permission);
280 public void setPremiumSmsPermissionForSubscriber(int subId, String packageName, int permission) { argument
283 iccSmsIntMgr.setPremiumSmsPermission(packageName, permission);
/frameworks/base/core/java/android/service/trust/
H A DTrustAgentService.java56 * the {@link android.Manifest.permission#BIND_TRUST_AGENT} permission
61 * android:permission="android.permission.BIND_TRUST_AGENT">
248 if (!Manifest.permission.BIND_TRUST_AGENT.equals(serviceInfo.permission)) {
250 + " is not declared with the permission "
251 + "\"" + Manifest.permission.BIND_TRUST_AGENT + "\"");
/frameworks/base/services/autofill/java/com/android/server/autofill/
H A DFieldClassificationStrategy.java107 if (!Manifest.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE
108 .equals(serviceInfo.permission)) {
109 Slog.w(TAG, name.flattenToShortString() + " does not require permission "
110 + Manifest.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE);
/frameworks/support/compat/src/androidTest/java/androidx/core/content/pm/
H A DShortcutManagerCompatTest.java143 // We do not have the permission
144 setMockPm(mockResolveInfo("com.android.permission.something-we-dont-have"));
152 setMockPm(mockResolveInfo("com.android.permission.something-we-dont-have"),
156 // We have the permission
213 private ResolveInfo mockResolveInfo(String permission) { argument
216 aInfo.permission = permission;
/frameworks/base/core/java/android/appwidget/
H A DAppWidgetManager.java896 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
915 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
937 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
939 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to
945 * @return true if this component has permission to bind the AppWidget
957 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
959 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to
968 * @return true if this component has permission to bind the AppWidget
979 * Set the provider for a given appWidgetId if the caller has a permission.
981 * <strong>Note:</strong> You need the {@link android.Manifest.permission#BIND_APPWIDGE
1053 setBindAppWidgetPermission(String packageName, boolean permission) argument
1071 setBindAppWidgetPermission(String packageName, int userId, boolean permission) argument
[all...]
/frameworks/base/core/java/android/content/
H A DContentProvider.java19 import static android.Manifest.permission.INTERACT_ACROSS_USERS;
151 * @param writePermission The write permission you want this instance should have
536 * Verify that calling app holds both the given permission and any app-op
537 * associated with that permission.
539 private int checkPermissionAndAppOp(String permission, String callingPkg, argument
541 if (getContext().checkPermission(permission, Binder.getCallingPid(), Binder.getCallingUid(),
546 final int permOp = AppOpsManager.permissionToOpCode(permission);
580 // <path-permission> below removes this ability
593 // any denied <path-permission> means we lose
603 // if we passed <path-permission> check
792 setReadPermission(@ullable String permission) argument
814 setWritePermission(@ullable String permission) argument
[all...]
/frameworks/base/core/java/android/net/
H A DIpSecManager.java749 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS)
770 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS)
884 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS)
913 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS)
/frameworks/base/core/java/android/os/
H A DRecoverySystem.java432 @RequiresPermission(android.Manifest.permission.RECOVERY)
493 @RequiresPermission(android.Manifest.permission.RECOVERY)
504 * Requires the {@link android.Manifest.permission#REBOOT} permission.
515 @RequiresPermission(android.Manifest.permission.RECOVERY)
537 @RequiresPermission(android.Manifest.permission.RECOVERY)
572 Log.e(TAG, "Error setting permission for " + UNCRYPT_PACKAGE_FILE);
629 @RequiresPermission(android.Manifest.permission.RECOVERY)
667 @RequiresPermission(android.Manifest.permission.RECOVERY)
681 * {@link android.Manifest.permission#REBOO
[all...]
/frameworks/base/core/java/android/provider/
H A DSearchIndexablesProvider.java49 * android:permission="android.permission.READ_SEARCH_INDEXABLES"
59 * {@link android.Manifest.permission#READ_SEARCH_INDEXABLES}, which is a permission only the system
101 if (!android.Manifest.permission.READ_SEARCH_INDEXABLES.equals(info.readPermission)) {
/frameworks/base/core/tests/coretests/src/android/provider/
H A DTestDocumentsProvider.java112 public void enforceCallingPermission(String permission, String message) { argument
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/
H A DWindowManagerPermissionTests.java17 package com.android.framework.permission.tests;
/frameworks/base/wifi/java/android/net/wifi/
H A DWifiScanner.java168 * Only apps holding android.Manifest.permission.NETWORK_STACK permission can set this value.
215 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
250 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
764 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE)
777 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE)
795 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE)
807 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE)
822 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE)
836 @RequiresPermission(android.Manifest.permission
[all...]
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/
H A DWifiAwareServiceImpl.java57 * (permission and clientID-UID mapping) checks and delegates execution to the
439 android.Manifest.permission.DUMP) != PackageManager.PERMISSION_GRANTED) {
464 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.ACCESS_WIFI_STATE, TAG);
468 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.CHANGE_WIFI_STATE, TAG);
476 mContext.enforceCallingOrSelfPermission(Manifest.permission.NETWORK_STACK, TAG);
/frameworks/support/fragment/src/main/java/androidx/fragment/app/
H A DFragmentHostCallback.java156 * Checks whether to show permission rationale UI from a fragment.
159 public boolean onShouldShowRequestPermissionRationale(@NonNull String permission) { argument
/frameworks/base/core/java/android/app/
H A DActivityManager.java279 * caller does not have permission to start the activity.
406 * a sticky intent without appropriate permission.
2009 @RequiresPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS)
2037 @RequiresPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS)
2055 @RequiresPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS)
2072 @RequiresPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS)
2087 @RequiresPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS)
2280 @RequiresPermission(android.Manifest.permission.REORDER_TASKS)
2296 @RequiresPermission(android.Manifest.permission.REORDER_TASKS)
2755 @RequiresPermission(anyOf={Manifest.permission
3844 checkComponentPermission(String permission, int uid, int owningUid, boolean exported) argument
3882 checkUidPermission(String permission, int uid) argument
[all...]
H A DStatsManager.java18 import static android.Manifest.permission.DUMP;
19 import static android.Manifest.permission.PACKAGE_USAGE_STATS;
/frameworks/base/core/java/com/android/internal/appwidget/
H A DIAppWidgetService.aidl65 void setBindAppWidgetPermission(in String packageName, int userId, in boolean permission);
/frameworks/base/core/java/com/android/internal/util/
H A DDumpUtils.java80 * Verify that caller holds {@link android.Manifest.permission#DUMP}.
86 if (context.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
90 + " due to missing android.permission.DUMP permission");
99 * {@link android.Manifest.permission#PACKAGE_USAGE_STATS} and that they
116 // Caller always needs to hold permission
117 if (context.checkCallingOrSelfPermission(android.Manifest.permission.PACKAGE_USAGE_STATS)
121 + " due to missing android.permission.PACKAGE_USAGE_STATS permission");
152 * Verify that caller holds both {@link android.Manifest.permission#DUM
[all...]
/frameworks/base/core/proto/android/content/
H A Dpackage_item_info.proto41 optional string permission = 2;

Completed in 1668 milliseconds

1234567891011>>