/frameworks/base/core/java/android/service/autofill/ |
H A D | AutofillServiceInfo.java | 90 if (!Manifest.permission.BIND_AUTOFILL_SERVICE.equals(si.permission)) { 91 if (Manifest.permission.BIND_AUTOFILL.equals(si.permission)) { 94 + "permission " + Manifest.permission.BIND_AUTOFILL + ". It works for " 100 + "' does not require permission " 101 + Manifest.permission.BIND_AUTOFILL_SERVICE); 102 throw new SecurityException("Service does not require permission " 103 + Manifest.permission [all...] |
/frameworks/base/core/java/android/permissionpresenterservice/ |
H A D | RuntimePermissionPresenterService.java | 23 import android.content.pm.permission.IRuntimePermissionPresenter; 24 import android.content.pm.permission.RuntimePermissionPresentationInfo; 25 import android.content.pm.permission.RuntimePermissionPresenter; 40 * a single permission in the UI but may be composed of several individual 53 * in its manifest for the system to recognize it as a runtime permission 76 * Revoke the permission {@code permissionName} for app {@code packageName} 79 * @param permissionName The permission to revoke
|
/frameworks/support/slices/core/src/androidTest/java/androidx/slice/compat/ |
H A D | CompatPermissionManagerTest.java | 54 final String testPermission = "android.permission.SOME_PERMISSION"; 64 public int checkPermission(String permission, int pid, int uid) { 65 if (testPermission.equals(permission)) { 72 return super.checkPermission(permission, pid, uid);
|
/frameworks/base/services/core/java/com/android/server/pm/permission/ |
H A D | DefaultPermissionGrantPolicy.java | 17 package com.android.server.pm.permission; 88 * have phone related permission by default. 107 private static final String TAG_PERMISSION = "permission"; 114 PHONE_PERMISSIONS.add(Manifest.permission.READ_PHONE_STATE); 115 PHONE_PERMISSIONS.add(Manifest.permission.CALL_PHONE); 116 PHONE_PERMISSIONS.add(Manifest.permission.READ_CALL_LOG); 117 PHONE_PERMISSIONS.add(Manifest.permission.WRITE_CALL_LOG); 118 PHONE_PERMISSIONS.add(Manifest.permission.ADD_VOICEMAIL); 119 PHONE_PERMISSIONS.add(Manifest.permission.USE_SIP); 120 PHONE_PERMISSIONS.add(Manifest.permission [all...] |
/frameworks/base/core/java/android/app/trust/ |
H A D | TrustManager.java | 60 @RequiresPermission(Manifest.permission.ACCESS_KEYGUARD_SECURE_STORAGE) 74 * Requires the {@link android.Manifest.permission#ACCESS_KEYGUARD_SECURE_STORAGE} permission. 94 * Requires the {@link android.Manifest.permission#ACCESS_KEYGUARD_SECURE_STORAGE} permission. 107 * Requires the {@link android.Manifest.permission#ACCESS_KEYGUARD_SECURE_STORAGE} permission. 120 * Requires the {@link android.Manifest.permission#ACCESS_KEYGUARD_SECURE_STORAGE} permission. 133 * Requires the {@link android.Manifest.permission#TRUST_LISTENE [all...] |
/frameworks/base/services/core/java/com/android/server/oemlock/ |
H A D | OemLockService.java | 236 Manifest.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE, 242 Manifest.permission.MANAGE_USER_OEM_UNLOCK_STATE, 247 if (mContext.checkCallingOrSelfPermission(Manifest.permission.READ_OEM_UNLOCK_STATE) 249 && mContext.checkCallingOrSelfPermission(Manifest.permission.OEM_UNLOCK_STATE) 252 + "READ_OEM_UNLOCK_STATE or OEM_UNLOCK_STATE permission.");
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | SettingBase.java | 21 import com.android.server.pm.permission.PermissionsState;
|
/frameworks/base/tests/ActivityManagerPerfTests/tests/ |
H A D | Android.mk | 33 # For android.permission.FORCE_STOP_PACKAGES permission
|
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | SmsManagerPermissionTest.java | 17 package com.android.framework.permission.tests; 38 * {@link android.Manifest.permission#SEND_SMS}. 54 * {@link android.Manifest.permission#SEND_SMS}. 70 * {@link android.Manifest.permission#SEND_MMS}.
|
H A D | VibratorServicePermissionTest.java | 17 package com.android.framework.permission.tests; 46 * <p>Tests permission: 47 * {@link android.Manifest.permission#VIBRATE} 64 * <p>Tests permission: 65 * {@link android.Manifest.permission#VIBRATE}
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | ConsumerIrService.java | 72 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.TRANSMIT_IR) 74 throw new SecurityException("Requires TRANSMIT_IR permission"); 104 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.TRANSMIT_IR) 106 throw new SecurityException("Requires TRANSMIT_IR permission");
|
/frameworks/support/compat/src/main/java/androidx/core/app/ |
H A D | AppOpsManagerCompat.java | 63 * Gets the app op name associated with a given permission. 70 * @param permission The permission. 71 * @return The app op associated with the permission or null. 74 public static String permissionToOp(@NonNull String permission) { argument 76 return AppOpsManager.permissionToOp(permission);
|
/frameworks/support/compat/src/main/java/androidx/core/net/ |
H A D | ConnectivityManagerCompat.java | 90 * <p>This method requires the caller to hold the permission 91 * {@link android.Manifest.permission#ACCESS_NETWORK_STATE}. 97 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE) 136 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
|
/frameworks/base/core/java/android/hardware/display/ |
H A D | DisplayManager.java | 168 * {@link android.Manifest.permission#CAPTURE_SECURE_VIDEO_OUTPUT} permission. 169 * This permission is reserved for use by system components and is not available to 229 * {@link android.Manifest.permission#CAPTURE_VIDEO_OUTPUT} 230 * or {@link android.Manifest.permission#CAPTURE_SECURE_VIDEO_OUTPUT} permission. 435 * Requires {@link android.Manifest.permission#CONFIGURE_WIFI_DISPLAY}. 447 * Requires {@link android.Manifest.permission#CONFIGURE_WIFI_DISPLAY}. 463 * Requires {@link android.Manifest.permission#CONFIGURE_WIFI_DISPLAY}. 499 * Requires {@link android.Manifest.permission#CONFIGURE_WIFI_DISPLA [all...] |
/frameworks/base/services/core/java/com/android/server/webkit/ |
H A D | WebViewUpdateService.java | 115 null /* broadcast permission */, null /* handler */); 121 userAddedFilter, null /* broadcast permission */, null /* handler */); 203 android.Manifest.permission.WRITE_SECURE_SETTINGS) 208 + " requires " + android.Manifest.permission.WRITE_SECURE_SETTINGS; 251 android.Manifest.permission.WRITE_SECURE_SETTINGS) 256 + " requires " + android.Manifest.permission.WRITE_SECURE_SETTINGS; 277 android.Manifest.permission.WRITE_SECURE_SETTINGS) 282 + " requires " + android.Manifest.permission.WRITE_SECURE_SETTINGS;
|
/frameworks/base/services/robotests/src/com/android/server/backup/restore/ |
H A D | ActiveRestoreSessionTest.java | 151 mShadowApplication.denyPermissions(android.Manifest.permission.BACKUP); 162 mShadowApplication.grantPermissions(android.Manifest.permission.BACKUP); 173 mShadowApplication.grantPermissions(android.Manifest.permission.BACKUP); 184 mShadowApplication.grantPermissions(android.Manifest.permission.BACKUP); 203 mShadowApplication.grantPermissions(android.Manifest.permission.BACKUP); 218 mShadowApplication.grantPermissions(android.Manifest.permission.BACKUP); 236 mShadowApplication.grantPermissions(android.Manifest.permission.BACKUP); 261 mShadowApplication.grantPermissions(android.Manifest.permission.BACKUP); 272 mShadowApplication.grantPermissions(android.Manifest.permission.BACKUP); 284 mShadowApplication.grantPermissions(android.Manifest.permission [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/ |
H A D | NetworkScoreServiceTest.java | 42 import android.Manifest.permission; 232 .enforceCallingOrSelfPermission(eq(permission.REQUEST_NETWORK_SCORES), 356 when(mContext.checkCallingOrSelfPermission(permission.REQUEST_NETWORK_SCORES)) 369 when(mContext.checkCallingOrSelfPermission(permission.REQUEST_NETWORK_SCORES)) 390 when(mContext.checkCallingOrSelfPermission(permission.REQUEST_NETWORK_SCORES)) 402 when(mContext.checkCallingOrSelfPermission(permission.REQUEST_NETWORK_SCORES)) 404 when(mContext.checkCallingOrSelfPermission(permission.SCORE_NETWORKS)) 417 when(mContext.checkCallingOrSelfPermission(permission.REQUEST_NETWORK_SCORES)) 426 when(mContext.checkCallingOrSelfPermission(permission.REQUEST_NETWORK_SCORES)) 440 when(mContext.checkCallingOrSelfPermission(permission [all...] |
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/ |
H A D | TelephonyPermissionsTest.java | 84 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE, PID, UID, MSG); 92 android.Manifest.permission.READ_PHONE_STATE, PID, UID, MSG); 102 android.Manifest.permission.READ_PHONE_STATE, PID, UID, MSG); 137 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE, PID, UID, MSG); 145 android.Manifest.permission.READ_SMS, PID, UID, MSG); 155 android.Manifest.permission.READ_PHONE_NUMBERS, PID, UID, MSG);
|
/frameworks/support/compat/src/androidTest/java/androidx/core/content/ |
H A D | ContextCompatTest.java | 214 assertEquals("Vibrate permission granted", PackageManager.PERMISSION_GRANTED, 216 android.Manifest.permission.VIBRATE)); 217 assertEquals("Wake lock permission granted", PackageManager.PERMISSION_GRANTED, 219 android.Manifest.permission.WAKE_LOCK)); 223 assertEquals("Access network state permission denied", PackageManager.PERMISSION_DENIED, 225 android.Manifest.permission.ACCESS_NETWORK_STATE)); 226 assertEquals("Bluetooth permission denied", PackageManager.PERMISSION_DENIED, 228 android.Manifest.permission.BLUETOOTH)); 229 assertEquals("Call phone permission denied", PackageManager.PERMISSION_DENIED, 231 android.Manifest.permission [all...] |
/frameworks/base/core/java/android/net/ |
H A D | ConnectivityManager.java | 861 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE) 880 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE) 899 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE) 920 @RequiresPermission(android.Manifest.permission.CONNECTIVITY_INTERNAL) 962 * manifest guarded by {@link android.Manifest.permission.BIND_VPN_SERVICE}, 1011 @RequiresPermission(android.Manifest.permission.CONNECTIVITY_INTERNAL) 1044 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE) 1063 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE) 1089 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE) 1108 @RequiresPermission(android.Manifest.permission [all...] |
/frameworks/base/core/java/android/app/usage/ |
H A D | UsageStatsManager.java | 58 * <b>NOTE:</b> Most methods on this API require the permission 59 * android.permission.PACKAGE_USAGE_STATS. However, declaring the permission implies intention to 60 * use the API and the user of the device still needs to grant permission through the Settings 63 * Methods which only return the information for the calling package do not require this permission. 264 * <p> The caller must have {@link android.Manifest.permission#PACKAGE_USAGE_STATS} </p> 295 * <p> The caller must have {@link android.Manifest.permission#PACKAGE_USAGE_STATS} </p> 330 * <p> The caller must have {@link android.Manifest.permission#PACKAGE_USAGE_STATS} </p> 360 * <p> The caller must have {@link android.Manifest.permission#PACKAGE_USAGE_STATS} </p> 405 * <p> The caller must have {@link android.Manifest.permission#PACKAGE_USAGE_STAT [all...] |
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/bluetooth/ |
H A D | CachedBluetoothDevice.java | 817 int permission = mDevice.getPhonebookAccessPermission(); 818 if (permission == BluetoothDevice.ACCESS_ALLOWED) { 820 } else if (permission == BluetoothDevice.ACCESS_REJECTED) { 827 int permission = BluetoothDevice.ACCESS_UNKNOWN; 829 permission = BluetoothDevice.ACCESS_ALLOWED; 831 permission = BluetoothDevice.ACCESS_REJECTED; 833 mDevice.setPhonebookAccessPermission(permission); 860 int permission = mDevice.getMessageAccessPermission(); 861 if (permission == BluetoothDevice.ACCESS_ALLOWED) { 863 } else if (permission [all...] |
/frameworks/base/services/core/java/com/android/server/vr/ |
H A D | VrManagerService.java | 539 enforceCallerPermissionAnyOf(Manifest.permission.ACCESS_VR_MANAGER, 540 Manifest.permission.ACCESS_VR_STATE); 550 enforceCallerPermissionAnyOf(Manifest.permission.ACCESS_VR_MANAGER, 551 Manifest.permission.ACCESS_VR_STATE); 561 enforceCallerPermissionAnyOf(Manifest.permission.ACCESS_VR_MANAGER, 562 Manifest.permission.ACCESS_VR_STATE); 572 enforceCallerPermissionAnyOf(Manifest.permission.ACCESS_VR_MANAGER, 573 Manifest.permission.ACCESS_VR_STATE); 583 enforceCallerPermissionAnyOf(Manifest.permission.ACCESS_VR_MANAGER, 584 Manifest.permission 1102 isPermissionUserUpdated(String permission, String pkg, int userId) argument [all...] |
/frameworks/base/core/java/android/bluetooth/le/ |
H A D | BluetoothLeScanner.java | 50 * {@link android.Manifest.permission#BLUETOOTH_ADMIN} permission. 107 * {@link android.Manifest.permission#ACCESS_COARSE_LOCATION ACCESS_COARSE_LOCATION} or 108 * {@link android.Manifest.permission#ACCESS_FINE_LOCATION ACCESS_FINE_LOCATION} permission 114 @RequiresPermission(Manifest.permission.BLUETOOTH_ADMIN) 126 * {@link android.Manifest.permission#ACCESS_COARSE_LOCATION ACCESS_COARSE_LOCATION} or 127 * {@link android.Manifest.permission#ACCESS_FINE_LOCATION ACCESS_FINE_LOCATION} permission 135 @RequiresPermission(Manifest.permission [all...] |
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/applications/ |
H A D | ServiceListing.java | 42 * Class for managing services matching a given intent and requesting a given permission. 59 String setting, String intentAction, String permission, String noun) { 65 mPermission = permission; 140 if (!mPermission.equals(info.permission)) { 143 + ": it does not require the permission " 212 public Builder setPermission(String permission) { argument 213 mPermission = permission; 58 ServiceListing(Context context, String tag, String setting, String intentAction, String permission, String noun) argument
|