Searched refs:permission (Results 226 - 250 of 467) sorted by relevance

1234567891011>>

/frameworks/base/services/core/java/com/android/server/
H A DHardwarePropertiesManagerService.java71 // cross user permission - b/63697518
82 // cross user permission - b/63697518
92 // cross user permission - b/63697518
159 * or a caller holding the {@link Manifest.permission#DEVICE_POWER} permission tries to
170 && mContext.checkCallingOrSelfPermission(Manifest.permission.DEVICE_POWER)
173 + ", or holding the DEVICE_POWER permission.");
H A DMmsServiceBroker.java336 mContext.enforceCallingPermission(Manifest.permission.SEND_SMS, "Send MMS message");
353 mContext.enforceCallingPermission(Manifest.permission.RECEIVE_MMS,
493 * Grants the phone package on primary user permission to access the contentUri,
498 * @param permission The permission to add
502 int permission) {
505 grantIntent.setFlags(permission);
519 // Grant permission for the carrier app.
501 adjustUriForUserAndGrantPermission(Uri contentUri, String action, int permission) argument
H A DPersistentDataBlockService.java163 if (mContext.checkCallingOrSelfPermission(Manifest.permission.READ_OEM_UNLOCK_STATE)
165 && mContext.checkCallingOrSelfPermission(Manifest.permission.OEM_UNLOCK_STATE)
168 + "READ_OEM_UNLOCK_STATE or OEM_UNLOCK_STATE permission.");
174 Manifest.permission.OEM_UNLOCK_STATE,
571 if (mContext.checkCallingPermission(Manifest.permission.ACCESS_PDB_STATE)
H A DTelephonyRegistry.java480 // Checks permission and throws SecurityException for disallowed operations. For pre-M
481 // apps whose runtime permission has been revoked, we return immediately to skip sending
670 // Only reveal the incoming number if the record has read call log permission.
746 // Ensure the listener has read call log permission; if they do not return
1595 // Send broadcast twice, once for apps that have PRIVILEGED permission and once for those
1598 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE);
1600 android.Manifest.permission.READ_PHONE_STATE,
1603 new String[] { android.Manifest.permission.READ_PHONE_STATE,
1604 android.Manifest.permission.READ_CALL_LOG});
1659 android.Manifest.permission
[all...]
/frameworks/base/services/core/java/com/android/server/broadcastradio/
H A DBroadcastRadioService.java76 Manifest.permission.ACCESS_BROADCAST_RADIO)) {
77 throw new SecurityException("ACCESS_BROADCAST_RADIO permission not granted");
/frameworks/base/services/core/java/com/android/server/location/
H A DContextHubServiceUtil.java44 private static final String HARDWARE_PERMISSION = Manifest.permission.LOCATION_HARDWARE;
/frameworks/base/services/core/java/com/android/server/pm/
H A DPackageSetting.java26 import com.android.server.pm.permission.PermissionsState;
H A DPackageInstallerSession.java131 private static final String TAG_GRANTED_RUNTIME_PERMISSION = "granted-runtime-permission";
357 (mPm.checkUidPermission(android.Manifest.permission.INSTALL_PACKAGES,
360 (mPm.checkUidPermission(android.Manifest.permission.INSTALL_SELF_UPDATES,
363 (mPm.checkUidPermission(android.Manifest.permission.INSTALL_PACKAGE_UPDATES,
375 // the permission check is waived if the installer is the device owner.
795 mContext.enforceCallingOrSelfPermission(Manifest.permission.INSTALL_PACKAGES, null);
888 Manifest.permission.INSTALL_PACKAGES, newOwnerAppInfo.uid)) {
890 + "the " + Manifest.permission.INSTALL_PACKAGES + " permission");
1642 for (String permission
[all...]
/frameworks/base/services/core/java/com/android/server/timezone/
H A DPackageTrackerHelperImpl.java141 boolean requiresPermission = requiredPermissionName.equals(matched.activityInfo.permission);
144 + intent + " must require permission " + requiredPermissionName);
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/
H A DCellularNetworkServiceTest.java57 serviceInfo.permission = "android.permission.BIND_NETWORK_SERVICE";
H A DWapPushOverSmsTest.java91 eq(android.Manifest.permission.RECEIVE_WAP_PUSH),
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/gsm/
H A DGsmCellBroadcastHandlerTest.java122 eq(Manifest.permission.RECEIVE_SMS), eq(AppOpsManager.OP_RECEIVE_SMS),
/frameworks/base/core/java/android/hardware/soundtrigger/
H A DKeyphraseEnrollmentInfo.java126 if (!Manifest.permission.MANAGE_VOICE_KEYPHRASES.equals(ai.permission)) {
128 // require the MANAGE_VOICE_KEYPHRASES permission.
/frameworks/base/location/java/android/location/
H A DLocationManager.java19 import static android.Manifest.permission.ACCESS_COARSE_LOCATION;
20 import static android.Manifest.permission.ACCESS_FINE_LOCATION;
21 import static android.Manifest.permission.LOCATION_HARDWARE;
22 import static android.Manifest.permission.WRITE_SECURE_SETTINGS;
64 * the {@link android.Manifest.permission#ACCESS_COARSE_LOCATION} or
65 * {@link android.Manifest.permission#ACCESS_FINE_LOCATION} permissions.
66 * If your application only has the coarse permission then it will not have
106 * a location fix. Requires the permission
107 * {@link android.Manifest.permission#ACCESS_FINE_LOCATION}.
125 * the origin of the location update. Requires the permission
[all...]
/frameworks/base/services/core/java/com/android/server/connectivity/
H A DIpConnectivityMetrics.java317 enforcePermission(android.Manifest.permission.CONNECTIVITY_INTERNAL);
321 enforcePermission(android.Manifest.permission.DUMP);
331 throw new SecurityException(String.format("Uid %d has no permission to listen for"
/frameworks/base/services/tests/servicestests/src/com/android/server/policy/
H A DPhoneWindowManagerTestBase.java195 public int checkPermission(String permission, int pid, int uid) { argument
200 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument
/frameworks/base/services/usage/java/com/android/server/usage/
H A DUsageStatsService.java84 * This data can be queried by apps that have been granted permission by AppOps.
681 // permission.
682 return getContext().checkCallingPermission(Manifest.permission.PACKAGE_USAGE_STATS)
698 return getContext().checkCallingPermission(Manifest.permission.OBSERVE_APP_USAGE)
837 Manifest.permission.INTERACT_ACROSS_USERS_FULL,
838 "No permission to query usage stats for this user");
861 Manifest.permission.INTERACT_ACROSS_USERS_FULL,
862 "No permission to query usage stats for this user");
905 getContext().enforceCallingPermission(Manifest.permission.CHANGE_APP_IDLE_STATE,
906 "No permission t
[all...]
/frameworks/support/compat/src/main/java/androidx/core/app/
H A DActivityCompat.java53 * This interface is the contract for receiving the results for permission requests.
81 * Customizable delegate that allows delegating permission compatibility methods to a custom
85 * To delegate permission compatibility methods to a custom class, implement this interface,
87 * to the permission compatibility methods in this class will first check whether the
96 * permissions if applicable. If this method returns true, it means that permission
98 * further requests for permission.
107 * @return Whether the delegate has handled the permission request.
114 * Determines whether the delegate should handle the permission request as part of
154 * Sets the permission delegate for {@code ActivityCompat}. Replaces the previously set
448 * and the results of permission request
553 shouldShowRequestPermissionRationale(@onNull Activity activity, @NonNull String permission) argument
[all...]
/frameworks/support/frameworks/support/samples/SupportMediaDemos/src/main/java/com/example/androidx/media/
H A DVideoSelector.java81 if (checkSelfPermission(Manifest.permission.READ_EXTERNAL_STORAGE)
85 requestPermissions(new String[] {Manifest.permission.READ_EXTERNAL_STORAGE},
/frameworks/support/samples/SupportMediaDemos/src/main/java/com/example/androidx/media/
H A DVideoSelector.java81 if (checkSelfPermission(Manifest.permission.READ_EXTERNAL_STORAGE)
85 requestPermissions(new String[] {Manifest.permission.READ_EXTERNAL_STORAGE},
/frameworks/base/core/java/android/print/
H A DPrintManager.java288 * @return An instance if the caller has the permission to access all print
559 @RequiresPermission(android.Manifest.permission.READ_PRINT_SERVICES)
595 @RequiresPermission(android.Manifest.permission.READ_PRINT_SERVICES)
637 @RequiresPermission(android.Manifest.permission.READ_PRINT_SERVICES)
663 @RequiresPermission(android.Manifest.permission.READ_PRINT_SERVICE_RECOMMENDATIONS)
700 @RequiresPermission(android.Manifest.permission.READ_PRINT_SERVICE_RECOMMENDATIONS)
740 @RequiresPermission(android.Manifest.permission.READ_PRINT_SERVICE_RECOMMENDATIONS)
/frameworks/base/services/core/java/com/android/server/am/
H A DServiceRecord.java81 final String permission;// permission needed to access service field in class:ServiceRecord
247 proto.write(ServiceRecordProto.PERMISSION, permission);
349 if (permission != null) {
350 pw.print(prefix); pw.print("permission="); pw.println(permission);
460 permission = sInfo.permission;
/frameworks/base/services/print/java/com/android/server/print/
H A DPrintManagerService.java317 android.Manifest.permission.READ_PRINT_SERVICES, null);
372 android.Manifest.permission.READ_PRINT_SERVICE_RECOMMENDATIONS, null);
595 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.READ_PRINT_SERVICES,
619 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.READ_PRINT_SERVICES,
645 android.Manifest.permission.READ_PRINT_SERVICE_RECOMMENDATIONS, null);
669 android.Manifest.permission.READ_PRINT_SERVICE_RECOMMENDATIONS, null);
1049 "com.android.printspooler.permission.ACCESS_ALL_PRINT_JOBS")
1052 + appId + " without com.android.printspooler.permission"
/frameworks/opt/telephony/src/java/com/android/internal/telephony/euicc/
H A DEuiccController.java21 import android.Manifest.permission;
132 * <LI>The resolution activity is restricted by a privileged permission; unprivileged apps
318 // With WRITE_EMBEDDED_SUBSCRIPTIONS, we can skip profile-specific permission checks
354 // require that the user resolve the stronger permission dialog.
508 * <p>Does not perform permission checks as this is not an exposed API and is only used within
899 mContext.enforceCallingPermission(Manifest.permission.MASTER_CLEAR,
972 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, "Requires DUMP");
992 mContext.sendBroadcast(intent, permission.WRITE_EMBEDDED_SUBSCRIPTIONS);
1093 return mContext.checkCallingPermission(Manifest.permission.READ_PRIVILEGED_PHONE_STATE)
1098 return mContext.checkCallingPermission(Manifest.permission
[all...]
/frameworks/base/services/core/java/com/android/server/fingerprint/
H A DFingerprintService.java19 import static android.Manifest.permission.INTERACT_ACROSS_USERS;
20 import static android.Manifest.permission.MANAGE_FINGERPRINT;
21 import static android.Manifest.permission.RESET_FINGERPRINT_LOCKOUT;
22 import static android.Manifest.permission.USE_BIOMETRIC;
23 import static android.Manifest.permission.USE_FINGERPRINT;
723 boolean hasPermission(String permission) { argument
724 return getContext().checkCallingOrSelfPermission(permission)
728 void checkPermission(String permission) { argument
729 getContext().enforceCallingOrSelfPermission(permission,
730 "Must have " + permission
[all...]

Completed in 731 milliseconds

1234567891011>>