/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ServiceManagerPermissionTests.java | 1 package com.android.framework.permission.tests; 36 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
|
H A D | SettingsPermissionsTests.java | 17 package com.android.framework.permission.tests; 41 * {@link android.Manifest.permission#WRITE_GSERVICES}
|
H A D | HardwareServicePermissionTest.java | 17 package com.android.framework.permission.tests; 43 * <p>Tests permission: 44 * {@link android.Manifest.permission#VIBRATE} 59 * <p>Tests permission: 60 * {@link android.Manifest.permission#VIBRATE} 74 * <p>Tests permission: 75 * {@link android.Manifest.permission#VIBRATE} 91 * {@link android.Manifest.permission#HARDWARE_TEST} 92 * {@link android.Manifest.permission#FLASHLIGHT} 107 * <p>Tests permission [all...] |
H A D | PmPermissionsTests.java | 17 package com.android.framework.permission.tests; 29 private String mPkgName = "com.android.framework.permission.tests"; 38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission 39 * android.permission.GET_PACKAGE_SIZE 53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission 54 * android.permission.DELETE_CACHE_FILES 68 * This test verifies that PackageManger.installPackage enforces permission 69 * android.permission.INSTALL_PACKAGES 84 * enforces permission android.permission [all...] |
H A D | SmsManagerPermissionTest.java | 17 package com.android.framework.permission.tests; 38 * {@link android.Manifest.permission#SEND_SMS}. 54 * {@link android.Manifest.permission#SEND_SMS}. 70 * {@link android.Manifest.permission#SEND_MMS}.
|
H A D | WindowManagerPermissionTests.java | 1 package com.android.framework.permission.tests;
|
H A D | ActivityManagerPermissionTests.java | 1 package com.android.framework.permission.tests;
|
/frameworks/base/core/java/android/content/pm/ |
H A D | ServiceInfo.java | 14 * Optional name of a permission required to be able to access this 15 * Service. From the "permission" attribute. 17 public String permission; field in class:ServiceInfo 24 permission = orig.permission; 39 dest.writeString(permission); 54 permission = source.readString();
|
H A D | ActivityInfo.java | 51 * Optional name of a permission required to be able to access this 52 * Activity. From the "permission" attribute. 54 public String permission; field in class:ActivityInfo 280 permission = orig.permission; 302 pw.println(prefix + "permission=" + permission); 328 dest.writeString(permission); 351 permission = source.readString();
|
H A D | ApplicationInfo.java | 25 * Optional name of a permission required to be able to access this 26 * application's components. From the "permission" attribute. 28 public String permission; field in class:ApplicationInfo 108 * {@link android.Manifest.permission#FACTORY_TEST} permission and the 251 pw.println(prefix + "permission=" + permission 297 permission = orig.permission; 327 dest.writeString(permission); [all...] |
/frameworks/base/libs/utils/ |
H A D | IPermissionController.cpp | 40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 44 data.writeString16(permission); 71 String16 permission = data.readString16(); local 74 bool res = checkPermission(permission, pid, uid);
|
H A D | IServiceManager.cpp | 49 bool checkCallingPermission(const String16& permission) argument 51 return checkCallingPermission(permission, NULL, NULL); 54 static String16 _permission("permission"); 56 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument 73 bool res = pc->checkPermission(permission, pid, uid); 78 String8(permission).string(), uid, pid); 83 // Is this a permission failure, or did the controller go away? 86 String8(permission).string(), uid, pid); 98 // Need to retrieve the permission controller. 101 // Wait for the permission controlle [all...] |
/frameworks/base/tests/CoreTests/android/content/ |
H A D | SyncStorageEngineTest.java | 57 public void enforceCallingOrSelfPermission(String permission, String message) { argument
|
/frameworks/base/core/java/android/test/ |
H A D | AndroidTestCase.java | 58 * Asserts that launching a given activity is protected by a particular permission by 60 * is thrown that mentions the permission in its error message. 67 * @param permission The name of the permission. 70 String packageName, String className, String permission) { 77 fail("expected security exception for " + permission); 80 assertTrue("error message should contain " + permission + ".", 81 expected.getMessage().contains(permission)); 87 * Asserts that reading from the content uri requires a particular permission by querying the 88 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission 69 assertActivityRequiresPermission( String packageName, String className, String permission) argument 93 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument 112 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument [all...] |
/frameworks/base/media/java/android/drm/mobile1/ |
H A D | DrmRights.java | 24 * The DRM permission of play. 29 * The DRM permission of display. 34 * The DRM permission of execute. 39 * The DRM permission of print. 66 * Get the constraint of the given permission on this rights object. 68 * @param permission the given permission. 72 public DrmConstraintInfo getConstraint(int permission) { argument 76 int res = nativeGetConstraintInfo(permission, c); 85 * Consume the rights of the given permission 92 consumeRights(int permission) argument 112 nativeGetConstraintInfo(int permission, DrmConstraintInfo constraint) argument 122 nativeConsumeRights(int permission) argument [all...] |
/frameworks/base/services/java/com/android/server/ |
H A D | WallpaperService.java | 112 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS); 157 checkPermission(android.Manifest.permission.SET_WALLPAPER); 197 private void checkPermission(String permission) { argument 198 if (PackageManager.PERMISSION_GRANTED != mContext.checkCallingOrSelfPermission(permission)) { 200 + ", must have permission " + permission);
|
/frameworks/base/core/java/android/content/ |
H A D | ContentProvider.java | 291 * Change the permission required to read data from the content 295 * @param permission Name of the permission required for read-only access. 297 protected final void setReadPermission(String permission) { argument 298 mReadPermission = permission; 302 * Return the name of the permission required for read-only access to 313 * Change the permission required to read and write data in the content 317 * @param permission Name of the permission required for read/write access. 319 protected final void setWritePermission(String permission) { argument [all...] |
H A D | ContextWrapper.java | 339 public int checkPermission(String permission, int pid, int uid) { argument 340 return mBase.checkPermission(permission, pid, uid); 344 public int checkCallingPermission(String permission) { argument 345 return mBase.checkCallingPermission(permission); 349 public int checkCallingOrSelfPermission(String permission) { argument 350 return mBase.checkCallingOrSelfPermission(permission); 355 String permission, int pid, int uid, String message) { 356 mBase.enforcePermission(permission, pid, uid, message); 360 public void enforceCallingPermission(String permission, String message) { argument 361 mBase.enforceCallingPermission(permission, messag 354 enforcePermission( String permission, int pid, int uid, String message) argument 365 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
H A D | Context.java | 623 * an optional required permission to be enforced. This 637 * If null, no permission is required. 661 * If null, no permission is required. 692 * If null, no permission is required. 726 * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY} 727 * permission in order to use this API. If you do not hold that 728 * permission, {@link SecurityException} will be thrown. 742 * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY} 743 * permission in order to use this API. If you do not hold that 744 * permission, { 1308 checkPermission(String permission, int pid, int uid) argument 1331 checkCallingPermission(String permission) argument 1349 checkCallingOrSelfPermission(String permission) argument 1363 enforcePermission( String permission, int pid, int uid, String message) argument 1384 enforceCallingPermission( String permission, String message) argument 1400 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
/frameworks/base/services/java/com/android/server/am/ |
H A D | ServiceRecord.java | 50 final String permission;// permission needed to access service field in class:ServiceRecord 88 if (permission != null) { 89 pw.print(prefix); pw.print("permission="); pw.println(permission); 138 permission = sInfo.permission;
|
/frameworks/base/telephony/java/com/android/internal/telephony/ |
H A D | SMSDispatcher.java | 361 * @param permission Receivers are required to have this permission 363 void dispatch(Intent intent, String permission) { argument 367 mContext.sendOrderedBroadcast(intent, permission, mResultReceiver, 379 mContext.sendBroadcast(intent, "android.permission.RECEIVE_SMS"); 589 dispatch(intent, "android.permission.RECEIVE_SMS"); 602 dispatch(intent, "android.permission.RECEIVE_SMS");
|
/frameworks/base/test-runner/android/test/mock/ |
H A D | MockContext.java | 311 public int checkPermission(String permission, int pid, int uid) { argument 316 public int checkCallingPermission(String permission) { argument 321 public int checkCallingOrSelfPermission(String permission) { argument 327 String permission, int pid, int uid, String message) { 332 public void enforceCallingPermission(String permission, String message) { argument 337 public void enforceCallingOrSelfPermission(String permission, String message) { argument 326 enforcePermission( String permission, int pid, int uid, String message) argument
|
/frameworks/base/tests/AndroidTests/src/com/android/unit_tests/activity/ |
H A D | BroadcastTest.java | 176 public void registerMyReceiver(IntentFilter filter, String permission) { argument 179 getContext().registerReceiver(mReceiver, filter, permission, null);
|
/frameworks/base/awt/java/awt/ |
H A D | Toolkit.java | 890 * AWTPermission("accessEventQueue") permission. 1172 security.checkPermission(awtEventsManager.permission); 1191 security.checkPermission(awtEventsManager.permission); 1210 security.checkPermission(awtEventsManager.permission); 1232 security.checkPermission(awtEventsManager.permission); 1256 * The permission. 1258 AWTPermission permission = new AWTPermission("listenToAllAWTEvents"); //$NON-NLS-1$ field in class:Toolkit.AWTEventsManager
|
/frameworks/base/media/libdrm/mobile1/src/jni/ |
H A D | drm1_jni.c | 483 /* if no this permission */ 778 (JNIEnv * env, jobject rights, jint permission, jobject constraint) 823 switch (permission) { 855 (JNIEnv * env, jobject rights, jint permission) 863 switch (permission) { 865 permission = DRM_PERMISSION_PLAY; 868 permission = DRM_PERMISSION_DISPLAY; 871 permission = DRM_PERMISSION_EXECUTE; 874 permission = DRM_PERMISSION_PRINT; 901 if (DRM_SUCCESS != SVC_drm_updateRights(nativeStr, permission)) { 777 Java_android_drm_mobile1_DrmRights_nativeGetConstraintInfo(JNIEnv * env, jobject rights, jint permission, jobject constraint) argument 854 Java_android_drm_mobile1_DrmRights_nativeConsumeRights(JNIEnv * env, jobject rights, jint permission) argument [all...] |