Searched defs:permission (Results 1 - 25 of 32) sorted by relevance

12

/frameworks/base/tests/permission/src/com/android/framework/permission/tests/
H A DServiceManagerPermissionTests.java1 package com.android.framework.permission.tests;
36 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
H A DSettingsPermissionsTests.java17 package com.android.framework.permission.tests;
41 * {@link android.Manifest.permission#WRITE_GSERVICES}
H A DHardwareServicePermissionTest.java17 package com.android.framework.permission.tests;
43 * <p>Tests permission:
44 * {@link android.Manifest.permission#VIBRATE}
59 * <p>Tests permission:
60 * {@link android.Manifest.permission#VIBRATE}
74 * <p>Tests permission:
75 * {@link android.Manifest.permission#VIBRATE}
91 * {@link android.Manifest.permission#HARDWARE_TEST}
92 * {@link android.Manifest.permission#FLASHLIGHT}
107 * <p>Tests permission
[all...]
H A DPmPermissionsTests.java17 package com.android.framework.permission.tests;
29 private String mPkgName = "com.android.framework.permission.tests";
38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission
39 * android.permission.GET_PACKAGE_SIZE
53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission
54 * android.permission.DELETE_CACHE_FILES
68 * This test verifies that PackageManger.installPackage enforces permission
69 * android.permission.INSTALL_PACKAGES
84 * enforces permission android.permission
[all...]
H A DSmsManagerPermissionTest.java17 package com.android.framework.permission.tests;
38 * {@link android.Manifest.permission#SEND_SMS}.
54 * {@link android.Manifest.permission#SEND_SMS}.
70 * {@link android.Manifest.permission#SEND_MMS}.
H A DWindowManagerPermissionTests.java1 package com.android.framework.permission.tests;
H A DActivityManagerPermissionTests.java1 package com.android.framework.permission.tests;
/frameworks/base/core/java/android/content/pm/
H A DServiceInfo.java14 * Optional name of a permission required to be able to access this
15 * Service. From the "permission" attribute.
17 public String permission; field in class:ServiceInfo
24 permission = orig.permission;
39 dest.writeString(permission);
54 permission = source.readString();
H A DActivityInfo.java51 * Optional name of a permission required to be able to access this
52 * Activity. From the "permission" attribute.
54 public String permission; field in class:ActivityInfo
280 permission = orig.permission;
302 pw.println(prefix + "permission=" + permission);
328 dest.writeString(permission);
351 permission = source.readString();
H A DApplicationInfo.java25 * Optional name of a permission required to be able to access this
26 * application's components. From the "permission" attribute.
28 public String permission; field in class:ApplicationInfo
108 * {@link android.Manifest.permission#FACTORY_TEST} permission and the
251 pw.println(prefix + "permission=" + permission
297 permission = orig.permission;
327 dest.writeString(permission);
[all...]
/frameworks/base/libs/utils/
H A DIPermissionController.cpp40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument
44 data.writeString16(permission);
71 String16 permission = data.readString16(); local
74 bool res = checkPermission(permission, pid, uid);
H A DIServiceManager.cpp49 bool checkCallingPermission(const String16& permission) argument
51 return checkCallingPermission(permission, NULL, NULL);
54 static String16 _permission("permission");
56 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument
73 bool res = pc->checkPermission(permission, pid, uid);
78 String8(permission).string(), uid, pid);
83 // Is this a permission failure, or did the controller go away?
86 String8(permission).string(), uid, pid);
98 // Need to retrieve the permission controller.
101 // Wait for the permission controlle
[all...]
/frameworks/base/tests/CoreTests/android/content/
H A DSyncStorageEngineTest.java57 public void enforceCallingOrSelfPermission(String permission, String message) { argument
/frameworks/base/core/java/android/test/
H A DAndroidTestCase.java58 * Asserts that launching a given activity is protected by a particular permission by
60 * is thrown that mentions the permission in its error message.
67 * @param permission The name of the permission.
70 String packageName, String className, String permission) {
77 fail("expected security exception for " + permission);
80 assertTrue("error message should contain " + permission + ".",
81 expected.getMessage().contains(permission));
87 * Asserts that reading from the content uri requires a particular permission by querying the
88 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission
69 assertActivityRequiresPermission( String packageName, String className, String permission) argument
93 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument
112 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument
[all...]
/frameworks/base/media/java/android/drm/mobile1/
H A DDrmRights.java24 * The DRM permission of play.
29 * The DRM permission of display.
34 * The DRM permission of execute.
39 * The DRM permission of print.
66 * Get the constraint of the given permission on this rights object.
68 * @param permission the given permission.
72 public DrmConstraintInfo getConstraint(int permission) { argument
76 int res = nativeGetConstraintInfo(permission, c);
85 * Consume the rights of the given permission
92 consumeRights(int permission) argument
112 nativeGetConstraintInfo(int permission, DrmConstraintInfo constraint) argument
122 nativeConsumeRights(int permission) argument
[all...]
/frameworks/base/services/java/com/android/server/
H A DWallpaperService.java112 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS);
157 checkPermission(android.Manifest.permission.SET_WALLPAPER);
197 private void checkPermission(String permission) { argument
198 if (PackageManager.PERMISSION_GRANTED != mContext.checkCallingOrSelfPermission(permission)) {
200 + ", must have permission " + permission);
/frameworks/base/core/java/android/content/
H A DContentProvider.java291 * Change the permission required to read data from the content
295 * @param permission Name of the permission required for read-only access.
297 protected final void setReadPermission(String permission) { argument
298 mReadPermission = permission;
302 * Return the name of the permission required for read-only access to
313 * Change the permission required to read and write data in the content
317 * @param permission Name of the permission required for read/write access.
319 protected final void setWritePermission(String permission) { argument
[all...]
H A DContextWrapper.java339 public int checkPermission(String permission, int pid, int uid) { argument
340 return mBase.checkPermission(permission, pid, uid);
344 public int checkCallingPermission(String permission) { argument
345 return mBase.checkCallingPermission(permission);
349 public int checkCallingOrSelfPermission(String permission) { argument
350 return mBase.checkCallingOrSelfPermission(permission);
355 String permission, int pid, int uid, String message) {
356 mBase.enforcePermission(permission, pid, uid, message);
360 public void enforceCallingPermission(String permission, String message) { argument
361 mBase.enforceCallingPermission(permission, messag
354 enforcePermission( String permission, int pid, int uid, String message) argument
365 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
H A DContext.java623 * an optional required permission to be enforced. This
637 * If null, no permission is required.
661 * If null, no permission is required.
692 * If null, no permission is required.
726 * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY}
727 * permission in order to use this API. If you do not hold that
728 * permission, {@link SecurityException} will be thrown.
742 * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY}
743 * permission in order to use this API. If you do not hold that
744 * permission, {
1308 checkPermission(String permission, int pid, int uid) argument
1331 checkCallingPermission(String permission) argument
1349 checkCallingOrSelfPermission(String permission) argument
1363 enforcePermission( String permission, int pid, int uid, String message) argument
1384 enforceCallingPermission( String permission, String message) argument
1400 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
/frameworks/base/services/java/com/android/server/am/
H A DServiceRecord.java50 final String permission;// permission needed to access service field in class:ServiceRecord
88 if (permission != null) {
89 pw.print(prefix); pw.print("permission="); pw.println(permission);
138 permission = sInfo.permission;
/frameworks/base/telephony/java/com/android/internal/telephony/
H A DSMSDispatcher.java361 * @param permission Receivers are required to have this permission
363 void dispatch(Intent intent, String permission) { argument
367 mContext.sendOrderedBroadcast(intent, permission, mResultReceiver,
379 mContext.sendBroadcast(intent, "android.permission.RECEIVE_SMS");
589 dispatch(intent, "android.permission.RECEIVE_SMS");
602 dispatch(intent, "android.permission.RECEIVE_SMS");
/frameworks/base/test-runner/android/test/mock/
H A DMockContext.java311 public int checkPermission(String permission, int pid, int uid) { argument
316 public int checkCallingPermission(String permission) { argument
321 public int checkCallingOrSelfPermission(String permission) { argument
327 String permission, int pid, int uid, String message) {
332 public void enforceCallingPermission(String permission, String message) { argument
337 public void enforceCallingOrSelfPermission(String permission, String message) { argument
326 enforcePermission( String permission, int pid, int uid, String message) argument
/frameworks/base/tests/AndroidTests/src/com/android/unit_tests/activity/
H A DBroadcastTest.java176 public void registerMyReceiver(IntentFilter filter, String permission) { argument
179 getContext().registerReceiver(mReceiver, filter, permission, null);
/frameworks/base/awt/java/awt/
H A DToolkit.java890 * AWTPermission("accessEventQueue") permission.
1172 security.checkPermission(awtEventsManager.permission);
1191 security.checkPermission(awtEventsManager.permission);
1210 security.checkPermission(awtEventsManager.permission);
1232 security.checkPermission(awtEventsManager.permission);
1256 * The permission.
1258 AWTPermission permission = new AWTPermission("listenToAllAWTEvents"); //$NON-NLS-1$ field in class:Toolkit.AWTEventsManager
/frameworks/base/media/libdrm/mobile1/src/jni/
H A Ddrm1_jni.c483 /* if no this permission */
778 (JNIEnv * env, jobject rights, jint permission, jobject constraint)
823 switch (permission) {
855 (JNIEnv * env, jobject rights, jint permission)
863 switch (permission) {
865 permission = DRM_PERMISSION_PLAY;
868 permission = DRM_PERMISSION_DISPLAY;
871 permission = DRM_PERMISSION_EXECUTE;
874 permission = DRM_PERMISSION_PRINT;
901 if (DRM_SUCCESS != SVC_drm_updateRights(nativeStr, permission)) {
777 Java_android_drm_mobile1_DrmRights_nativeGetConstraintInfo(JNIEnv * env, jobject rights, jint permission, jobject constraint) argument
854 Java_android_drm_mobile1_DrmRights_nativeConsumeRights(JNIEnv * env, jobject rights, jint permission) argument
[all...]

Completed in 1881 milliseconds

12