/frameworks/base/services/core/java/com/android/server/ |
H A D | StorageManagerService.java | 654 android.Manifest.permission.WRITE_MEDIA_STORAGE); 954 enforcePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS); 1642 enforcePermission(android.Manifest.permission.SHUTDOWN); 1650 enforcePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS); 1665 enforcePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS); 1677 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS); 1689 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS); 1728 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS); 1741 enforcePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS); 1755 enforcePermission(android.Manifest.permission [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | PackageInstaller.java | 259 * permission, incompatible certificates, etc. The user may be able to 464 Manifest.permission.DELETE_PACKAGES, 465 Manifest.permission.REQUEST_DELETE_PACKAGES}) 507 Manifest.permission.DELETE_PACKAGES, 508 Manifest.permission.REQUEST_DELETE_PACKAGES}) 529 Manifest.permission.DELETE_PACKAGES, 530 Manifest.permission.REQUEST_DELETE_PACKAGES}) 544 @RequiresPermission(android.Manifest.permission.INSTALL_PACKAGES) 993 @RequiresPermission(android.Manifest.permission.INSTALL_PACKAGES) 1014 * permission [all...] |
H A D | ApplicationInfo.java | 66 * Optional name of a permission required to be able to access this 67 * application's components. From the "permission" attribute. 69 public String permission; field in class:ApplicationInfo 171 * {@link android.Manifest.permission#FACTORY_TEST} permission and the 1187 if (permission != null) { 1188 pw.println(prefix + "permission=" + permission); 1273 proto.write(ApplicationInfoProto.PERMISSION, permission); 1410 permission [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | WapPushOverSms.java | 600 String permission; 602 permission = android.Manifest.permission.RECEIVE_MMS; 604 permission = android.Manifest.permission.RECEIVE_WAP_PUSH; 606 return permission;
|
H A D | IccSmsInterfaceManager.java | 189 Manifest.permission.RECEIVE_SMS, message); 191 Manifest.permission.SEND_SMS, message); 302 Manifest.permission.RECEIVE_SMS, 331 * This method checks if the calling package or itself has the permission to send the data sms. 343 * This method checks only if the calling package has the permission to send the data sms. 393 * This method checks only if the calling package has the permission to send the sms. 409 * This method checks if the calling package or itself has the permission to send the sms. 553 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.MODIFY_PHONE_STATE) 720 public void setPremiumSmsPermission(String packageName, int permission) { argument 721 mDispatchersController.setPremiumSmsPermission(packageName, permission); [all...] |
H A D | SmsStorageMonitor.java | 149 mContext.sendBroadcast(intent, android.Manifest.permission.RECEIVE_SMS);
|
H A D | UiccSmsController.java | 275 public void setPremiumSmsPermission(String packageName, int permission) { argument 276 setPremiumSmsPermissionForSubscriber(getPreferredSmsSubscription(), packageName, permission); 280 public void setPremiumSmsPermissionForSubscriber(int subId, String packageName, int permission) { argument 283 iccSmsIntMgr.setPremiumSmsPermission(packageName, permission);
|
/frameworks/base/core/java/android/service/trust/ |
H A D | TrustAgentService.java | 56 * the {@link android.Manifest.permission#BIND_TRUST_AGENT} permission 61 * android:permission="android.permission.BIND_TRUST_AGENT"> 248 if (!Manifest.permission.BIND_TRUST_AGENT.equals(serviceInfo.permission)) { 250 + " is not declared with the permission " 251 + "\"" + Manifest.permission.BIND_TRUST_AGENT + "\"");
|
/frameworks/base/services/autofill/java/com/android/server/autofill/ |
H A D | FieldClassificationStrategy.java | 107 if (!Manifest.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE 108 .equals(serviceInfo.permission)) { 109 Slog.w(TAG, name.flattenToShortString() + " does not require permission " 110 + Manifest.permission.BIND_AUTOFILL_FIELD_CLASSIFICATION_SERVICE);
|
/frameworks/support/compat/src/androidTest/java/androidx/core/content/pm/ |
H A D | ShortcutManagerCompatTest.java | 143 // We do not have the permission 144 setMockPm(mockResolveInfo("com.android.permission.something-we-dont-have")); 152 setMockPm(mockResolveInfo("com.android.permission.something-we-dont-have"), 156 // We have the permission 213 private ResolveInfo mockResolveInfo(String permission) { argument 216 aInfo.permission = permission;
|
/frameworks/base/core/java/android/appwidget/ |
H A D | AppWidgetManager.java | 896 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 915 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 937 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 939 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to 945 * @return true if this component has permission to bind the AppWidget 957 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 959 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to 968 * @return true if this component has permission to bind the AppWidget 979 * Set the provider for a given appWidgetId if the caller has a permission. 981 * <strong>Note:</strong> You need the {@link android.Manifest.permission#BIND_APPWIDGE 1053 setBindAppWidgetPermission(String packageName, boolean permission) argument 1071 setBindAppWidgetPermission(String packageName, int userId, boolean permission) argument [all...] |
/frameworks/base/core/java/android/content/ |
H A D | ContentProvider.java | 19 import static android.Manifest.permission.INTERACT_ACROSS_USERS; 151 * @param writePermission The write permission you want this instance should have 536 * Verify that calling app holds both the given permission and any app-op 537 * associated with that permission. 539 private int checkPermissionAndAppOp(String permission, String callingPkg, argument 541 if (getContext().checkPermission(permission, Binder.getCallingPid(), Binder.getCallingUid(), 546 final int permOp = AppOpsManager.permissionToOpCode(permission); 580 // <path-permission> below removes this ability 593 // any denied <path-permission> means we lose 603 // if we passed <path-permission> check 792 setReadPermission(@ullable String permission) argument 814 setWritePermission(@ullable String permission) argument [all...] |
/frameworks/base/core/java/android/net/ |
H A D | IpSecManager.java | 749 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS) 770 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS) 884 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS) 913 @RequiresPermission(android.Manifest.permission.MANAGE_IPSEC_TUNNELS)
|
/frameworks/base/core/java/android/os/ |
H A D | RecoverySystem.java | 432 @RequiresPermission(android.Manifest.permission.RECOVERY) 493 @RequiresPermission(android.Manifest.permission.RECOVERY) 504 * Requires the {@link android.Manifest.permission#REBOOT} permission. 515 @RequiresPermission(android.Manifest.permission.RECOVERY) 537 @RequiresPermission(android.Manifest.permission.RECOVERY) 572 Log.e(TAG, "Error setting permission for " + UNCRYPT_PACKAGE_FILE); 629 @RequiresPermission(android.Manifest.permission.RECOVERY) 667 @RequiresPermission(android.Manifest.permission.RECOVERY) 681 * {@link android.Manifest.permission#REBOO [all...] |
/frameworks/base/core/java/android/provider/ |
H A D | SearchIndexablesProvider.java | 49 * android:permission="android.permission.READ_SEARCH_INDEXABLES" 59 * {@link android.Manifest.permission#READ_SEARCH_INDEXABLES}, which is a permission only the system 101 if (!android.Manifest.permission.READ_SEARCH_INDEXABLES.equals(info.readPermission)) {
|
/frameworks/base/core/tests/coretests/src/android/provider/ |
H A D | TestDocumentsProvider.java | 112 public void enforceCallingPermission(String permission, String message) { argument
|
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | WindowManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
/frameworks/base/wifi/java/android/net/wifi/ |
H A D | WifiScanner.java | 168 * Only apps holding android.Manifest.permission.NETWORK_STACK permission can set this value. 215 @RequiresPermission(android.Manifest.permission.NETWORK_STACK) 250 @RequiresPermission(android.Manifest.permission.NETWORK_STACK) 764 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE) 777 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE) 795 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE) 807 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE) 822 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE) 836 @RequiresPermission(android.Manifest.permission [all...] |
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/ |
H A D | WifiAwareServiceImpl.java | 57 * (permission and clientID-UID mapping) checks and delegates execution to the 439 android.Manifest.permission.DUMP) != PackageManager.PERMISSION_GRANTED) { 464 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.ACCESS_WIFI_STATE, TAG); 468 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.CHANGE_WIFI_STATE, TAG); 476 mContext.enforceCallingOrSelfPermission(Manifest.permission.NETWORK_STACK, TAG);
|
/frameworks/support/fragment/src/main/java/androidx/fragment/app/ |
H A D | FragmentHostCallback.java | 156 * Checks whether to show permission rationale UI from a fragment. 159 public boolean onShouldShowRequestPermissionRationale(@NonNull String permission) { argument
|
/frameworks/base/core/java/android/app/ |
H A D | ActivityManager.java | 279 * caller does not have permission to start the activity. 406 * a sticky intent without appropriate permission. 2009 @RequiresPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS) 2037 @RequiresPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS) 2055 @RequiresPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS) 2072 @RequiresPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS) 2087 @RequiresPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS) 2280 @RequiresPermission(android.Manifest.permission.REORDER_TASKS) 2296 @RequiresPermission(android.Manifest.permission.REORDER_TASKS) 2755 @RequiresPermission(anyOf={Manifest.permission 3844 checkComponentPermission(String permission, int uid, int owningUid, boolean exported) argument 3882 checkUidPermission(String permission, int uid) argument [all...] |
H A D | StatsManager.java | 18 import static android.Manifest.permission.DUMP; 19 import static android.Manifest.permission.PACKAGE_USAGE_STATS;
|
/frameworks/base/core/java/com/android/internal/appwidget/ |
H A D | IAppWidgetService.aidl | 65 void setBindAppWidgetPermission(in String packageName, int userId, in boolean permission);
|
/frameworks/base/core/java/com/android/internal/util/ |
H A D | DumpUtils.java | 80 * Verify that caller holds {@link android.Manifest.permission#DUMP}. 86 if (context.checkCallingOrSelfPermission(android.Manifest.permission.DUMP) 90 + " due to missing android.permission.DUMP permission"); 99 * {@link android.Manifest.permission#PACKAGE_USAGE_STATS} and that they 116 // Caller always needs to hold permission 117 if (context.checkCallingOrSelfPermission(android.Manifest.permission.PACKAGE_USAGE_STATS) 121 + " due to missing android.permission.PACKAGE_USAGE_STATS permission"); 152 * Verify that caller holds both {@link android.Manifest.permission#DUM [all...] |
/frameworks/base/core/proto/android/content/ |
H A D | package_item_info.proto | 41 optional string permission = 2;
|