Searched refs:permission (Results 251 - 275 of 467) sorted by relevance

<<111213141516171819

/frameworks/base/services/core/java/com/android/server/power/
H A DPowerManagerService.java497 // Time when we last logged a warning about calling userActivity() without permission.
4133 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DEVICE_POWER, null);
4148 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.WAKE_LOCK, null);
4151 android.Manifest.permission.DEVICE_POWER, null);
4155 android.Manifest.permission.UPDATE_DEVICE_STATS, null);
4176 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.WAKE_LOCK, null);
4207 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.WAKE_LOCK, null);
4210 android.Manifest.permission.UPDATE_DEVICE_STATS, null);
4237 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DEVICE_POWER)
4240 android.Manifest.permission
[all...]
/frameworks/base/services/core/java/com/android/server/am/
H A DBatteryStatsService.java374 android.Manifest.permission.BATTERY_STATS, null);
389 android.Manifest.permission.BATTERY_STATS, null);
473 // No need to enforce calling permission, as it is called from an internal interface
1136 android.Manifest.permission.BATTERY_STATS, null);
1142 android.Manifest.permission.BATTERY_STATS, null);
1150 mContext.enforcePermission(android.Manifest.permission.UPDATE_DEVICE_STATS,
1542 android.Manifest.permission.BATTERY_STATS, null);
1567 android.Manifest.permission.BATTERY_STATS, null);
H A DActivityManagerService.java19 import static android.Manifest.permission.BIND_VOICE_INTERACTION;
20 import static android.Manifest.permission.CHANGE_CONFIGURATION;
21 import static android.Manifest.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST;
22 import static android.Manifest.permission.CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS;
23 import static android.Manifest.permission.INTERACT_ACROSS_USERS;
24 import static android.Manifest.permission.INTERACT_ACROSS_USERS_FULL;
25 import static android.Manifest.permission.INTERNAL_SYSTEM_WINDOW;
26 import static android.Manifest.permission.MANAGE_ACTIVITY_STACKS;
27 import static android.Manifest.permission.READ_FRAME_BUFFER;
28 import static android.Manifest.permission
9047 checkPermission(String permission, int pid, int uid) argument
9065 isRuntimePermission(String permission) argument
9090 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument
9102 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument
9121 checkPermission(String permission, int pid, int uid) argument
9129 checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument
9152 checkCallingPermission(String permission) argument
9161 enforceCallingPermission(String permission, String func) argument
9178 enforcePermission(String permission, int pid, int uid, String func) argument
9192 enforceCallerIsRecentsOrHasPermission(String permission, String func) argument
20801 registerReceiver(IApplicationThread caller, String callerPackage, IIntentReceiver receiver, IntentFilter filter, String permission, int userId, int flags) argument
26825 enforceCallerIsRecentsOrHasPermission(String permission, String func) argument
[all...]
/frameworks/base/services/accessibility/java/com/android/server/accessibility/
H A DAccessibilityManagerService.java771 mSecurityPolicy.enforceCallingPermission(Manifest.permission.MODIFY_ACCESSIBILITY_DATA,
793 mSecurityPolicy.enforceCallingPermission(Manifest.permission.RETRIEVE_WINDOW_CONTENT,
815 Manifest.permission.TEMPORARY_ENABLE_ACCESSIBILITY,
842 Manifest.permission.RETRIEVE_WINDOW_TOKEN,
866 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR_SERVICE)
868 throw new SecurityException("Caller does not hold permission "
869 + android.Manifest.permission.STATUS_BAR_SERVICE);
885 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR_SERVICE)
887 throw new SecurityException("Caller does not hold permission "
888 + android.Manifest.permission
3597 enforceCallingPermission(String permission, String function) argument
3608 hasPermission(String permission) argument
[all...]
/frameworks/base/services/core/java/com/android/server/
H A DLocationManagerService.java132 android.Manifest.permission.ACCESS_MOCK_LOCATION;
134 android.Manifest.permission.ACCESS_LOCATION_EXTRA_COMMANDS;
136 android.Manifest.permission.INSTALL_LOCATION_PROVIDER;
1176 mContext.enforceCallingPermission(android.Manifest.permission.LOCATION_HARDWARE,
1177 "Location Hardware permission not granted to access hardware batching");
1192 mContext.enforceCallingPermission(android.Manifest.permission.LOCATION_HARDWARE,
1193 "Location Hardware permission not granted to access hardware batching");
1256 mContext.enforceCallingPermission(android.Manifest.permission.LOCATION_HARDWARE,
1257 "Location Hardware permission not granted to access hardware batching");
1279 mContext.enforceCallingPermission(android.Manifest.permission
[all...]
H A DNetworkManagementService.java19 import static android.Manifest.permission.CONNECTIVITY_INTERNAL;
20 import static android.Manifest.permission.DUMP;
21 import static android.Manifest.permission.NETWORK_SETTINGS;
22 import static android.Manifest.permission.NETWORK_STACK;
23 import static android.Manifest.permission.SHUTDOWN;
171 * to apps that have the CHANGE_NETWORK_STATE permission.
178 * permission.
2473 public void createPhysicalNetwork(int netId, String permission) { argument
2477 if (permission != null) {
2478 mConnector.execute("network", "create", netId, permission);
2577 setNetworkPermission(int netId, String permission) argument
2593 setPermission(String permission, int[] uids) argument
[all...]
H A DNetworkScoreService.java19 import android.Manifest.permission;
737 // REQUEST_NETWORK_SCORES is a signature only permission.
738 mContext.enforceCallingOrSelfPermission(permission.REQUEST_NETWORK_SCORES,
743 if (mContext.checkCallingOrSelfPermission(permission.REQUEST_NETWORK_SCORES)
745 && mContext.checkCallingOrSelfPermission(permission.SCORE_NETWORKS)
753 if (mContext.checkCallingOrSelfPermission(permission.REQUEST_NETWORK_SCORES)
/frameworks/base/services/tests/servicestests/src/com/android/server/
H A DNetworkScorerAppManagerTest.java33 import android.Manifest.permission;
575 when(mMockPm.checkPermission(permission.SCORE_NETWORKS, packageName))
580 when(mMockPm.checkPermission(permission.SCORE_NETWORKS, packageName))
598 when(mMockPm.checkPermission(permission.ACCESS_COARSE_LOCATION, packageName))
605 when(mMockPm.checkPermission(permission.ACCESS_COARSE_LOCATION, packageName))
/frameworks/base/telephony/java/android/telephony/
H A DSubscriptionManager.java237 * TelephonyProvider column name for permission for data roaming of a SIM.
482 * {@code android.permission.MANAGE_SUBSCRIPTION_PLANS} permission.
499 @RequiresPermission(android.Manifest.permission.MANAGE_SUBSCRIPTION_PLANS)
521 * Permissions android.Manifest.permission.READ_PHONE_STATE is required
663 * <p>Requires Permission: {@link android.Manifest.permission#READ_PHONE_STATE READ_PHONE_STATE}
671 @RequiresPermission(android.Manifest.permission.READ_PHONE_STATE)
726 * <p>Requires Permission: {@link android.Manifest.permission#READ_PHONE_STATE READ_PHONE_STATE}
734 @RequiresPermission(android.Manifest.permission.READ_PHONE_STATE)
786 * <p>Requires Permission: {@link android.Manifest.permission#READ_PHONE_STAT
[all...]
/frameworks/base/wifi/java/android/net/wifi/
H A DRttManager.java142 /** Do not have required permission */
322 @RequiresPermission(Manifest.permission.LOCATION_HARDWARE)
943 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE)
1024 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE)
1062 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE)
1082 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE)
/frameworks/base/core/java/android/app/admin/
H A DDevicePolicyManager.java295 * <p> The activity must be protected by permission
296 * {@link android.Manifest.permission#BIND_DEVICE_ADMIN}, and the process must hold
297 * {@link android.Manifest.permission#DISPATCH_PROVISIONING_MESSAGE} to be launched.
320 * by a privileged app with the permission
321 * {@link android.Manifest.permission#DISPATCH_PROVISIONING_MESSAGE}.
534 * the permission {@link android.Manifest.permission#BIND_DEVICE_ADMIN}.
1313 * Permission policy to prompt user for new permission requests for runtime permissions.
1319 * Permission policy to always grant new permission requests for runtime permissions.
1325 * Permission policy to always deny new permission request
7873 setPermissionGrantState(@onNull ComponentName admin, String packageName, String permission, int grantState) argument
7908 getPermissionGrantState(@ullable ComponentName admin, String packageName, String permission) argument
[all...]
/frameworks/base/services/core/java/com/android/server/firewall/
H A DIntentFirewall.java581 int checkComponentPermission(String permission, int pid, int uid, argument
589 * @param permission If present, the caller must have this permission
596 boolean checkComponentPermission(String permission, int pid, int uid, int owningUid, argument
598 return mAms.checkComponentPermission(permission, pid, uid, owningUid, exported) ==
/frameworks/base/services/core/java/com/android/server/storage/
H A DDeviceStorageMonitorService.java372 android.Manifest.permission.DEVICE_POWER, null);
384 android.Manifest.permission.DEVICE_POWER, null);
396 android.Manifest.permission.DEVICE_POWER, null);
/frameworks/base/services/core/java/com/android/server/wm/
H A DSession.java19 import static android.Manifest.permission.DEVICE_POWER;
20 import static android.Manifest.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS;
21 import static android.Manifest.permission.INTERNAL_SYSTEM_WINDOW;
/frameworks/base/tests/net/java/com/android/server/
H A DIpSecServiceParameterizedTest.java111 public void enforceCallingOrSelfPermission(String permission, String message) {
112 if (permission == android.Manifest.permission.MANAGE_IPSEC_TUNNELS) {
115 throw new SecurityException("Unavailable permission requested");
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DWifiServiceImpl.java368 * {@link Manifest.permission#CHANGE_WIFI_STATE} permission, and reply with a failure if it
374 * @return true if the sender holds the permission, false otherwise.
710 return mContext.checkPermission(android.Manifest.permission.NETWORK_SETTINGS, pid, uid)
715 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.NETWORK_SETTINGS,
720 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.NETWORK_STACK,
725 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.ACCESS_WIFI_STATE,
742 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.CHANGE_WIFI_STATE,
750 mContext.enforceCallingOrSelfPermission(Manifest.permission.LOCATION_HARDWARE,
755 mContext.enforceCallingOrSelfPermission(android.Manifest.permission
[all...]
/frameworks/support/compat/src/main/java/androidx/core/content/
H A DContextCompat.java306 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to
312 * <pre class="prettyprint">&lt;uses-permission
313 * android:name="android.permission.WRITE_EXTERNAL_STORAGE"
358 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to
364 * <pre class="prettyprint">&lt;uses-permission
365 * android:name="android.permission.WRITE_EXTERNAL_STORAGE"
411 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to
417 * <pre class="prettyprint">&lt;uses-permission
418 * android:name="android.permission.WRITE_EXTERNAL_STORAGE"
530 * Determine whether <em>you</em> have been granted a particular permission
539 checkSelfPermission(@onNull Context context, @NonNull String permission) argument
[all...]
/frameworks/base/core/java/android/content/pm/
H A DIPackageManager.aidl592 void setPermissionEnforced(String permission, boolean enforced);
593 boolean isPermissionEnforced(String permission);
622 boolean isPermissionRevokedByPolicy(String permission, String packageName, int userId);
/frameworks/base/services/core/java/com/android/server/pm/
H A DInstantAppRegistry.java106 private static final String TAG_PERMISSION = "permission";
1072 String permission = XmlUtils.readStringAttribute(parser, ATTR_NAME);
1073 outRequestedPermissions.add(permission);
1075 outGrantedPermissions.add(permission);
1106 for (String permission : instantApp.getRequestedPermissions()) {
1108 serializer.attribute(null, ATTR_NAME, permission);
1109 if (ArrayUtils.contains(instantApp.getGrantedPermissions(), permission)) {
H A DPackageInstallerService.java88 import com.android.server.pm.permission.PermissionManagerInternal;
426 if (mContext.checkCallingOrSelfPermission(Manifest.permission.INSTALL_PACKAGES) !=
442 && mContext.checkCallingOrSelfPermission(Manifest.permission
445 + "android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS permission "
733 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DELETE_PACKAGES)
739 // Need to clear the calling identity to get DELETE_PACKAGES permission
749 mContext.enforceCallingOrSelfPermission(Manifest.permission.REQUEST_DELETE_PACKAGES,
763 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.INSTALL_PACKAGES, TAG);
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DInboundSmsHandler.java670 mContext.sendBroadcast(intent, android.Manifest.permission.RECEIVE_SMS);
1016 * Dispatch the intent with the specified permission, appOp, and result receiver, using
1020 * @param permission receivers are required to have this permission
1024 public void dispatchIntent(Intent intent, String permission, int appOp, argument
1067 mContext.sendOrderedBroadcastAsUser(intent, targetUser, permission, appOp, opts,
1072 mContext.sendOrderedBroadcastAsUser(intent, user, permission, appOp, opts,
1170 dispatchIntent(intent, android.Manifest.permission.RECEIVE_SMS,
1321 dispatchIntent(intent, android.Manifest.permission.RECEIVE_SMS,
/frameworks/base/core/java/android/app/
H A DAlarmManager.java615 @RequiresPermission(android.Manifest.permission.UPDATE_DEVICE_STATS)
650 @RequiresPermission(android.Manifest.permission.UPDATE_DEVICE_STATS)
957 * Requires the permission android.permission.SET_TIME.
/frameworks/base/core/java/android/os/
H A DPowerManager.java103 * Any application using a WakeLock must request the {@code android.permission.WAKE_LOCK}
104 * permission in an {@code <uses-permission>} element of the application's manifest.
139 * as the user moves between applications and doesn't require a special permission.
156 * as the user moves between applications and doesn't require a special permission.
174 * as the user moves between applications and doesn't require a special permission.
208 * Requires the {@link android.Manifest.permission#DEVICE_POWER} permission.
222 * Requires the {@link android.Manifest.permission#DEVICE_POWER} permission
[all...]
/frameworks/base/core/java/android/view/
H A DInputDevice.java785 @RequiresPermission(android.Manifest.permission.DISABLE_INPUT_DEVICE)
796 @RequiresPermission(android.Manifest.permission.DISABLE_INPUT_DEVICE)
/frameworks/base/core/tests/coretests/src/android/app/activity/
H A DBroadcastTest.java178 public void registerMyReceiver(IntentFilter filter, String permission) { argument
181 getContext().registerReceiver(mReceiver, filter, permission, null);

Completed in 723 milliseconds

<<111213141516171819