/frameworks/base/services/core/java/com/android/server/ |
H A D | HardwarePropertiesManagerService.java | 71 // cross user permission - b/63697518 82 // cross user permission - b/63697518 92 // cross user permission - b/63697518 159 * or a caller holding the {@link Manifest.permission#DEVICE_POWER} permission tries to 170 && mContext.checkCallingOrSelfPermission(Manifest.permission.DEVICE_POWER) 173 + ", or holding the DEVICE_POWER permission.");
|
H A D | MmsServiceBroker.java | 336 mContext.enforceCallingPermission(Manifest.permission.SEND_SMS, "Send MMS message"); 353 mContext.enforceCallingPermission(Manifest.permission.RECEIVE_MMS, 493 * Grants the phone package on primary user permission to access the contentUri, 498 * @param permission The permission to add 502 int permission) { 505 grantIntent.setFlags(permission); 519 // Grant permission for the carrier app. 501 adjustUriForUserAndGrantPermission(Uri contentUri, String action, int permission) argument
|
H A D | PersistentDataBlockService.java | 163 if (mContext.checkCallingOrSelfPermission(Manifest.permission.READ_OEM_UNLOCK_STATE) 165 && mContext.checkCallingOrSelfPermission(Manifest.permission.OEM_UNLOCK_STATE) 168 + "READ_OEM_UNLOCK_STATE or OEM_UNLOCK_STATE permission."); 174 Manifest.permission.OEM_UNLOCK_STATE, 571 if (mContext.checkCallingPermission(Manifest.permission.ACCESS_PDB_STATE)
|
H A D | TelephonyRegistry.java | 480 // Checks permission and throws SecurityException for disallowed operations. For pre-M 481 // apps whose runtime permission has been revoked, we return immediately to skip sending 670 // Only reveal the incoming number if the record has read call log permission. 746 // Ensure the listener has read call log permission; if they do not return 1595 // Send broadcast twice, once for apps that have PRIVILEGED permission and once for those 1598 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE); 1600 android.Manifest.permission.READ_PHONE_STATE, 1603 new String[] { android.Manifest.permission.READ_PHONE_STATE, 1604 android.Manifest.permission.READ_CALL_LOG}); 1659 android.Manifest.permission [all...] |
/frameworks/base/services/core/java/com/android/server/broadcastradio/ |
H A D | BroadcastRadioService.java | 76 Manifest.permission.ACCESS_BROADCAST_RADIO)) { 77 throw new SecurityException("ACCESS_BROADCAST_RADIO permission not granted");
|
/frameworks/base/services/core/java/com/android/server/location/ |
H A D | ContextHubServiceUtil.java | 44 private static final String HARDWARE_PERMISSION = Manifest.permission.LOCATION_HARDWARE;
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PackageSetting.java | 26 import com.android.server.pm.permission.PermissionsState;
|
H A D | PackageInstallerSession.java | 131 private static final String TAG_GRANTED_RUNTIME_PERMISSION = "granted-runtime-permission"; 357 (mPm.checkUidPermission(android.Manifest.permission.INSTALL_PACKAGES, 360 (mPm.checkUidPermission(android.Manifest.permission.INSTALL_SELF_UPDATES, 363 (mPm.checkUidPermission(android.Manifest.permission.INSTALL_PACKAGE_UPDATES, 375 // the permission check is waived if the installer is the device owner. 795 mContext.enforceCallingOrSelfPermission(Manifest.permission.INSTALL_PACKAGES, null); 888 Manifest.permission.INSTALL_PACKAGES, newOwnerAppInfo.uid)) { 890 + "the " + Manifest.permission.INSTALL_PACKAGES + " permission"); 1642 for (String permission [all...] |
/frameworks/base/services/core/java/com/android/server/timezone/ |
H A D | PackageTrackerHelperImpl.java | 141 boolean requiresPermission = requiredPermissionName.equals(matched.activityInfo.permission); 144 + intent + " must require permission " + requiredPermissionName);
|
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/ |
H A D | CellularNetworkServiceTest.java | 57 serviceInfo.permission = "android.permission.BIND_NETWORK_SERVICE";
|
H A D | WapPushOverSmsTest.java | 91 eq(android.Manifest.permission.RECEIVE_WAP_PUSH),
|
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/gsm/ |
H A D | GsmCellBroadcastHandlerTest.java | 122 eq(Manifest.permission.RECEIVE_SMS), eq(AppOpsManager.OP_RECEIVE_SMS),
|
/frameworks/base/core/java/android/hardware/soundtrigger/ |
H A D | KeyphraseEnrollmentInfo.java | 126 if (!Manifest.permission.MANAGE_VOICE_KEYPHRASES.equals(ai.permission)) { 128 // require the MANAGE_VOICE_KEYPHRASES permission.
|
/frameworks/base/location/java/android/location/ |
H A D | LocationManager.java | 19 import static android.Manifest.permission.ACCESS_COARSE_LOCATION; 20 import static android.Manifest.permission.ACCESS_FINE_LOCATION; 21 import static android.Manifest.permission.LOCATION_HARDWARE; 22 import static android.Manifest.permission.WRITE_SECURE_SETTINGS; 64 * the {@link android.Manifest.permission#ACCESS_COARSE_LOCATION} or 65 * {@link android.Manifest.permission#ACCESS_FINE_LOCATION} permissions. 66 * If your application only has the coarse permission then it will not have 106 * a location fix. Requires the permission 107 * {@link android.Manifest.permission#ACCESS_FINE_LOCATION}. 125 * the origin of the location update. Requires the permission [all...] |
/frameworks/base/services/core/java/com/android/server/connectivity/ |
H A D | IpConnectivityMetrics.java | 317 enforcePermission(android.Manifest.permission.CONNECTIVITY_INTERNAL); 321 enforcePermission(android.Manifest.permission.DUMP); 331 throw new SecurityException(String.format("Uid %d has no permission to listen for"
|
/frameworks/base/services/tests/servicestests/src/com/android/server/policy/ |
H A D | PhoneWindowManagerTestBase.java | 195 public int checkPermission(String permission, int pid, int uid) { argument 200 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument
|
/frameworks/base/services/usage/java/com/android/server/usage/ |
H A D | UsageStatsService.java | 84 * This data can be queried by apps that have been granted permission by AppOps. 681 // permission. 682 return getContext().checkCallingPermission(Manifest.permission.PACKAGE_USAGE_STATS) 698 return getContext().checkCallingPermission(Manifest.permission.OBSERVE_APP_USAGE) 837 Manifest.permission.INTERACT_ACROSS_USERS_FULL, 838 "No permission to query usage stats for this user"); 861 Manifest.permission.INTERACT_ACROSS_USERS_FULL, 862 "No permission to query usage stats for this user"); 905 getContext().enforceCallingPermission(Manifest.permission.CHANGE_APP_IDLE_STATE, 906 "No permission t [all...] |
/frameworks/support/compat/src/main/java/androidx/core/app/ |
H A D | ActivityCompat.java | 53 * This interface is the contract for receiving the results for permission requests. 81 * Customizable delegate that allows delegating permission compatibility methods to a custom 85 * To delegate permission compatibility methods to a custom class, implement this interface, 87 * to the permission compatibility methods in this class will first check whether the 96 * permissions if applicable. If this method returns true, it means that permission 98 * further requests for permission. 107 * @return Whether the delegate has handled the permission request. 114 * Determines whether the delegate should handle the permission request as part of 154 * Sets the permission delegate for {@code ActivityCompat}. Replaces the previously set 448 * and the results of permission request 553 shouldShowRequestPermissionRationale(@onNull Activity activity, @NonNull String permission) argument [all...] |
/frameworks/support/frameworks/support/samples/SupportMediaDemos/src/main/java/com/example/androidx/media/ |
H A D | VideoSelector.java | 81 if (checkSelfPermission(Manifest.permission.READ_EXTERNAL_STORAGE) 85 requestPermissions(new String[] {Manifest.permission.READ_EXTERNAL_STORAGE},
|
/frameworks/support/samples/SupportMediaDemos/src/main/java/com/example/androidx/media/ |
H A D | VideoSelector.java | 81 if (checkSelfPermission(Manifest.permission.READ_EXTERNAL_STORAGE) 85 requestPermissions(new String[] {Manifest.permission.READ_EXTERNAL_STORAGE},
|
/frameworks/base/core/java/android/print/ |
H A D | PrintManager.java | 288 * @return An instance if the caller has the permission to access all print 559 @RequiresPermission(android.Manifest.permission.READ_PRINT_SERVICES) 595 @RequiresPermission(android.Manifest.permission.READ_PRINT_SERVICES) 637 @RequiresPermission(android.Manifest.permission.READ_PRINT_SERVICES) 663 @RequiresPermission(android.Manifest.permission.READ_PRINT_SERVICE_RECOMMENDATIONS) 700 @RequiresPermission(android.Manifest.permission.READ_PRINT_SERVICE_RECOMMENDATIONS) 740 @RequiresPermission(android.Manifest.permission.READ_PRINT_SERVICE_RECOMMENDATIONS)
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ServiceRecord.java | 81 final String permission;// permission needed to access service field in class:ServiceRecord 247 proto.write(ServiceRecordProto.PERMISSION, permission); 349 if (permission != null) { 350 pw.print(prefix); pw.print("permission="); pw.println(permission); 460 permission = sInfo.permission;
|
/frameworks/base/services/print/java/com/android/server/print/ |
H A D | PrintManagerService.java | 317 android.Manifest.permission.READ_PRINT_SERVICES, null); 372 android.Manifest.permission.READ_PRINT_SERVICE_RECOMMENDATIONS, null); 595 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.READ_PRINT_SERVICES, 619 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.READ_PRINT_SERVICES, 645 android.Manifest.permission.READ_PRINT_SERVICE_RECOMMENDATIONS, null); 669 android.Manifest.permission.READ_PRINT_SERVICE_RECOMMENDATIONS, null); 1049 "com.android.printspooler.permission.ACCESS_ALL_PRINT_JOBS") 1052 + appId + " without com.android.printspooler.permission"
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/euicc/ |
H A D | EuiccController.java | 21 import android.Manifest.permission; 132 * <LI>The resolution activity is restricted by a privileged permission; unprivileged apps 318 // With WRITE_EMBEDDED_SUBSCRIPTIONS, we can skip profile-specific permission checks 354 // require that the user resolve the stronger permission dialog. 508 * <p>Does not perform permission checks as this is not an exposed API and is only used within 899 mContext.enforceCallingPermission(Manifest.permission.MASTER_CLEAR, 972 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, "Requires DUMP"); 992 mContext.sendBroadcast(intent, permission.WRITE_EMBEDDED_SUBSCRIPTIONS); 1093 return mContext.checkCallingPermission(Manifest.permission.READ_PRIVILEGED_PHONE_STATE) 1098 return mContext.checkCallingPermission(Manifest.permission [all...] |
/frameworks/base/services/core/java/com/android/server/fingerprint/ |
H A D | FingerprintService.java | 19 import static android.Manifest.permission.INTERACT_ACROSS_USERS; 20 import static android.Manifest.permission.MANAGE_FINGERPRINT; 21 import static android.Manifest.permission.RESET_FINGERPRINT_LOCKOUT; 22 import static android.Manifest.permission.USE_BIOMETRIC; 23 import static android.Manifest.permission.USE_FINGERPRINT; 723 boolean hasPermission(String permission) { argument 724 return getContext().checkCallingOrSelfPermission(permission) 728 void checkPermission(String permission) { argument 729 getContext().enforceCallingOrSelfPermission(permission, 730 "Must have " + permission [all...] |