/frameworks/base/services/core/java/com/android/server/power/ |
H A D | PowerManagerService.java | 497 // Time when we last logged a warning about calling userActivity() without permission. 4133 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DEVICE_POWER, null); 4148 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.WAKE_LOCK, null); 4151 android.Manifest.permission.DEVICE_POWER, null); 4155 android.Manifest.permission.UPDATE_DEVICE_STATS, null); 4176 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.WAKE_LOCK, null); 4207 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.WAKE_LOCK, null); 4210 android.Manifest.permission.UPDATE_DEVICE_STATS, null); 4237 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DEVICE_POWER) 4240 android.Manifest.permission [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | BatteryStatsService.java | 374 android.Manifest.permission.BATTERY_STATS, null); 389 android.Manifest.permission.BATTERY_STATS, null); 473 // No need to enforce calling permission, as it is called from an internal interface 1136 android.Manifest.permission.BATTERY_STATS, null); 1142 android.Manifest.permission.BATTERY_STATS, null); 1150 mContext.enforcePermission(android.Manifest.permission.UPDATE_DEVICE_STATS, 1542 android.Manifest.permission.BATTERY_STATS, null); 1567 android.Manifest.permission.BATTERY_STATS, null);
|
H A D | ActivityManagerService.java | 19 import static android.Manifest.permission.BIND_VOICE_INTERACTION; 20 import static android.Manifest.permission.CHANGE_CONFIGURATION; 21 import static android.Manifest.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST; 22 import static android.Manifest.permission.CONTROL_REMOTE_APP_TRANSITION_ANIMATIONS; 23 import static android.Manifest.permission.INTERACT_ACROSS_USERS; 24 import static android.Manifest.permission.INTERACT_ACROSS_USERS_FULL; 25 import static android.Manifest.permission.INTERNAL_SYSTEM_WINDOW; 26 import static android.Manifest.permission.MANAGE_ACTIVITY_STACKS; 27 import static android.Manifest.permission.READ_FRAME_BUFFER; 28 import static android.Manifest.permission 9047 checkPermission(String permission, int pid, int uid) argument 9065 isRuntimePermission(String permission) argument 9090 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 9102 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 9121 checkPermission(String permission, int pid, int uid) argument 9129 checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument 9152 checkCallingPermission(String permission) argument 9161 enforceCallingPermission(String permission, String func) argument 9178 enforcePermission(String permission, int pid, int uid, String func) argument 9192 enforceCallerIsRecentsOrHasPermission(String permission, String func) argument 20801 registerReceiver(IApplicationThread caller, String callerPackage, IIntentReceiver receiver, IntentFilter filter, String permission, int userId, int flags) argument 26825 enforceCallerIsRecentsOrHasPermission(String permission, String func) argument [all...] |
/frameworks/base/services/accessibility/java/com/android/server/accessibility/ |
H A D | AccessibilityManagerService.java | 771 mSecurityPolicy.enforceCallingPermission(Manifest.permission.MODIFY_ACCESSIBILITY_DATA, 793 mSecurityPolicy.enforceCallingPermission(Manifest.permission.RETRIEVE_WINDOW_CONTENT, 815 Manifest.permission.TEMPORARY_ENABLE_ACCESSIBILITY, 842 Manifest.permission.RETRIEVE_WINDOW_TOKEN, 866 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR_SERVICE) 868 throw new SecurityException("Caller does not hold permission " 869 + android.Manifest.permission.STATUS_BAR_SERVICE); 885 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR_SERVICE) 887 throw new SecurityException("Caller does not hold permission " 888 + android.Manifest.permission 3597 enforceCallingPermission(String permission, String function) argument 3608 hasPermission(String permission) argument [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | LocationManagerService.java | 132 android.Manifest.permission.ACCESS_MOCK_LOCATION; 134 android.Manifest.permission.ACCESS_LOCATION_EXTRA_COMMANDS; 136 android.Manifest.permission.INSTALL_LOCATION_PROVIDER; 1176 mContext.enforceCallingPermission(android.Manifest.permission.LOCATION_HARDWARE, 1177 "Location Hardware permission not granted to access hardware batching"); 1192 mContext.enforceCallingPermission(android.Manifest.permission.LOCATION_HARDWARE, 1193 "Location Hardware permission not granted to access hardware batching"); 1256 mContext.enforceCallingPermission(android.Manifest.permission.LOCATION_HARDWARE, 1257 "Location Hardware permission not granted to access hardware batching"); 1279 mContext.enforceCallingPermission(android.Manifest.permission [all...] |
H A D | NetworkManagementService.java | 19 import static android.Manifest.permission.CONNECTIVITY_INTERNAL; 20 import static android.Manifest.permission.DUMP; 21 import static android.Manifest.permission.NETWORK_SETTINGS; 22 import static android.Manifest.permission.NETWORK_STACK; 23 import static android.Manifest.permission.SHUTDOWN; 171 * to apps that have the CHANGE_NETWORK_STATE permission. 178 * permission. 2473 public void createPhysicalNetwork(int netId, String permission) { argument 2477 if (permission != null) { 2478 mConnector.execute("network", "create", netId, permission); 2577 setNetworkPermission(int netId, String permission) argument 2593 setPermission(String permission, int[] uids) argument [all...] |
H A D | NetworkScoreService.java | 19 import android.Manifest.permission; 737 // REQUEST_NETWORK_SCORES is a signature only permission. 738 mContext.enforceCallingOrSelfPermission(permission.REQUEST_NETWORK_SCORES, 743 if (mContext.checkCallingOrSelfPermission(permission.REQUEST_NETWORK_SCORES) 745 && mContext.checkCallingOrSelfPermission(permission.SCORE_NETWORKS) 753 if (mContext.checkCallingOrSelfPermission(permission.REQUEST_NETWORK_SCORES)
|
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
H A D | NetworkScorerAppManagerTest.java | 33 import android.Manifest.permission; 575 when(mMockPm.checkPermission(permission.SCORE_NETWORKS, packageName)) 580 when(mMockPm.checkPermission(permission.SCORE_NETWORKS, packageName)) 598 when(mMockPm.checkPermission(permission.ACCESS_COARSE_LOCATION, packageName)) 605 when(mMockPm.checkPermission(permission.ACCESS_COARSE_LOCATION, packageName))
|
/frameworks/base/telephony/java/android/telephony/ |
H A D | SubscriptionManager.java | 237 * TelephonyProvider column name for permission for data roaming of a SIM. 482 * {@code android.permission.MANAGE_SUBSCRIPTION_PLANS} permission. 499 @RequiresPermission(android.Manifest.permission.MANAGE_SUBSCRIPTION_PLANS) 521 * Permissions android.Manifest.permission.READ_PHONE_STATE is required 663 * <p>Requires Permission: {@link android.Manifest.permission#READ_PHONE_STATE READ_PHONE_STATE} 671 @RequiresPermission(android.Manifest.permission.READ_PHONE_STATE) 726 * <p>Requires Permission: {@link android.Manifest.permission#READ_PHONE_STATE READ_PHONE_STATE} 734 @RequiresPermission(android.Manifest.permission.READ_PHONE_STATE) 786 * <p>Requires Permission: {@link android.Manifest.permission#READ_PHONE_STAT [all...] |
/frameworks/base/wifi/java/android/net/wifi/ |
H A D | RttManager.java | 142 /** Do not have required permission */ 322 @RequiresPermission(Manifest.permission.LOCATION_HARDWARE) 943 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE) 1024 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE) 1062 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE) 1082 @RequiresPermission(android.Manifest.permission.LOCATION_HARDWARE)
|
/frameworks/base/core/java/android/app/admin/ |
H A D | DevicePolicyManager.java | 295 * <p> The activity must be protected by permission 296 * {@link android.Manifest.permission#BIND_DEVICE_ADMIN}, and the process must hold 297 * {@link android.Manifest.permission#DISPATCH_PROVISIONING_MESSAGE} to be launched. 320 * by a privileged app with the permission 321 * {@link android.Manifest.permission#DISPATCH_PROVISIONING_MESSAGE}. 534 * the permission {@link android.Manifest.permission#BIND_DEVICE_ADMIN}. 1313 * Permission policy to prompt user for new permission requests for runtime permissions. 1319 * Permission policy to always grant new permission requests for runtime permissions. 1325 * Permission policy to always deny new permission request 7873 setPermissionGrantState(@onNull ComponentName admin, String packageName, String permission, int grantState) argument 7908 getPermissionGrantState(@ullable ComponentName admin, String packageName, String permission) argument [all...] |
/frameworks/base/services/core/java/com/android/server/firewall/ |
H A D | IntentFirewall.java | 581 int checkComponentPermission(String permission, int pid, int uid, argument 589 * @param permission If present, the caller must have this permission 596 boolean checkComponentPermission(String permission, int pid, int uid, int owningUid, argument 598 return mAms.checkComponentPermission(permission, pid, uid, owningUid, exported) ==
|
/frameworks/base/services/core/java/com/android/server/storage/ |
H A D | DeviceStorageMonitorService.java | 372 android.Manifest.permission.DEVICE_POWER, null); 384 android.Manifest.permission.DEVICE_POWER, null); 396 android.Manifest.permission.DEVICE_POWER, null);
|
/frameworks/base/services/core/java/com/android/server/wm/ |
H A D | Session.java | 19 import static android.Manifest.permission.DEVICE_POWER; 20 import static android.Manifest.permission.HIDE_NON_SYSTEM_OVERLAY_WINDOWS; 21 import static android.Manifest.permission.INTERNAL_SYSTEM_WINDOW;
|
/frameworks/base/tests/net/java/com/android/server/ |
H A D | IpSecServiceParameterizedTest.java | 111 public void enforceCallingOrSelfPermission(String permission, String message) { 112 if (permission == android.Manifest.permission.MANAGE_IPSEC_TUNNELS) { 115 throw new SecurityException("Unavailable permission requested");
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiServiceImpl.java | 368 * {@link Manifest.permission#CHANGE_WIFI_STATE} permission, and reply with a failure if it 374 * @return true if the sender holds the permission, false otherwise. 710 return mContext.checkPermission(android.Manifest.permission.NETWORK_SETTINGS, pid, uid) 715 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.NETWORK_SETTINGS, 720 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.NETWORK_STACK, 725 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.ACCESS_WIFI_STATE, 742 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.CHANGE_WIFI_STATE, 750 mContext.enforceCallingOrSelfPermission(Manifest.permission.LOCATION_HARDWARE, 755 mContext.enforceCallingOrSelfPermission(android.Manifest.permission [all...] |
/frameworks/support/compat/src/main/java/androidx/core/content/ |
H A D | ContextCompat.java | 306 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to 312 * <pre class="prettyprint"><uses-permission 313 * android:name="android.permission.WRITE_EXTERNAL_STORAGE" 358 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to 364 * <pre class="prettyprint"><uses-permission 365 * android:name="android.permission.WRITE_EXTERNAL_STORAGE" 411 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} is required to 417 * <pre class="prettyprint"><uses-permission 418 * android:name="android.permission.WRITE_EXTERNAL_STORAGE" 530 * Determine whether <em>you</em> have been granted a particular permission 539 checkSelfPermission(@onNull Context context, @NonNull String permission) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | IPackageManager.aidl | 592 void setPermissionEnforced(String permission, boolean enforced); 593 boolean isPermissionEnforced(String permission); 622 boolean isPermissionRevokedByPolicy(String permission, String packageName, int userId);
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | InstantAppRegistry.java | 106 private static final String TAG_PERMISSION = "permission"; 1072 String permission = XmlUtils.readStringAttribute(parser, ATTR_NAME); 1073 outRequestedPermissions.add(permission); 1075 outGrantedPermissions.add(permission); 1106 for (String permission : instantApp.getRequestedPermissions()) { 1108 serializer.attribute(null, ATTR_NAME, permission); 1109 if (ArrayUtils.contains(instantApp.getGrantedPermissions(), permission)) {
|
H A D | PackageInstallerService.java | 88 import com.android.server.pm.permission.PermissionManagerInternal; 426 if (mContext.checkCallingOrSelfPermission(Manifest.permission.INSTALL_PACKAGES) != 442 && mContext.checkCallingOrSelfPermission(Manifest.permission 445 + "android.permission.INSTALL_GRANT_RUNTIME_PERMISSIONS permission " 733 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DELETE_PACKAGES) 739 // Need to clear the calling identity to get DELETE_PACKAGES permission 749 mContext.enforceCallingOrSelfPermission(Manifest.permission.REQUEST_DELETE_PACKAGES, 763 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.INSTALL_PACKAGES, TAG);
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | InboundSmsHandler.java | 670 mContext.sendBroadcast(intent, android.Manifest.permission.RECEIVE_SMS); 1016 * Dispatch the intent with the specified permission, appOp, and result receiver, using 1020 * @param permission receivers are required to have this permission 1024 public void dispatchIntent(Intent intent, String permission, int appOp, argument 1067 mContext.sendOrderedBroadcastAsUser(intent, targetUser, permission, appOp, opts, 1072 mContext.sendOrderedBroadcastAsUser(intent, user, permission, appOp, opts, 1170 dispatchIntent(intent, android.Manifest.permission.RECEIVE_SMS, 1321 dispatchIntent(intent, android.Manifest.permission.RECEIVE_SMS,
|
/frameworks/base/core/java/android/app/ |
H A D | AlarmManager.java | 615 @RequiresPermission(android.Manifest.permission.UPDATE_DEVICE_STATS) 650 @RequiresPermission(android.Manifest.permission.UPDATE_DEVICE_STATS) 957 * Requires the permission android.permission.SET_TIME.
|
/frameworks/base/core/java/android/os/ |
H A D | PowerManager.java | 103 * Any application using a WakeLock must request the {@code android.permission.WAKE_LOCK} 104 * permission in an {@code <uses-permission>} element of the application's manifest. 139 * as the user moves between applications and doesn't require a special permission. 156 * as the user moves between applications and doesn't require a special permission. 174 * as the user moves between applications and doesn't require a special permission. 208 * Requires the {@link android.Manifest.permission#DEVICE_POWER} permission. 222 * Requires the {@link android.Manifest.permission#DEVICE_POWER} permission [all...] |
/frameworks/base/core/java/android/view/ |
H A D | InputDevice.java | 785 @RequiresPermission(android.Manifest.permission.DISABLE_INPUT_DEVICE) 796 @RequiresPermission(android.Manifest.permission.DISABLE_INPUT_DEVICE)
|
/frameworks/base/core/tests/coretests/src/android/app/activity/ |
H A D | BroadcastTest.java | 178 public void registerMyReceiver(IntentFilter filter, String permission) { argument 181 getContext().registerReceiver(mReceiver, filter, permission, null);
|