/frameworks/base/media/java/android/drm/mobile1/ |
H A D | DrmRights.java | 24 * The DRM permission of play. 29 * The DRM permission of display. 34 * The DRM permission of execute. 39 * The DRM permission of print. 66 * Get the constraint of the given permission on this rights object. 68 * @param permission the given permission. 72 public DrmConstraintInfo getConstraint(int permission) { argument 76 int res = nativeGetConstraintInfo(permission, c); 85 * Consume the rights of the given permission 92 consumeRights(int permission) argument 112 nativeGetConstraintInfo(int permission, DrmConstraintInfo constraint) argument 122 nativeConsumeRights(int permission) argument [all...] |
/frameworks/base/core/java/android/os/ |
H A D | IPermissionController.aidl | 22 boolean checkPermission(String permission, int pid, int uid);
|
/frameworks/base/core/java/android/content/pm/ |
H A D | ServiceInfo.java | 31 * Optional name of a permission required to be able to access this 32 * Service. From the "permission" attribute. 34 public String permission; field in class:ServiceInfo 41 permission = orig.permission; 46 pw.println(prefix + "permission=" + permission); 61 dest.writeString(permission); 76 permission = source.readString();
|
H A D | ActivityInfo.java | 67 * Optional name of a permission required to be able to access this 68 * Activity. From the "permission" attribute. 70 public String permission; field in class:ActivityInfo 312 permission = orig.permission; 334 if (permission != null) { 335 pw.println(prefix + "permission=" + permission); 367 dest.writeString(permission); 390 permission [all...] |
H A D | ApplicationInfo.java | 44 * Optional name of a permission required to be able to access this 45 * application's components. From the "permission" attribute. 47 public String permission; field in class:ApplicationInfo 125 * {@link android.Manifest.permission#FACTORY_TEST} permission and the 356 if (permission != null) { 357 pw.println(prefix + "permission=" + permission); 411 permission = orig.permission; [all...] |
/frameworks/base/core/java/android/test/ |
H A D | AndroidTestCase.java | 78 * Asserts that launching a given activity is protected by a particular permission by 80 * is thrown that mentions the permission in its error message. 87 * @param permission The name of the permission. 90 String packageName, String className, String permission) { 97 fail("expected security exception for " + permission); 100 assertTrue("error message should contain " + permission + ".", 101 expected.getMessage().contains(permission)); 107 * Asserts that reading from the content uri requires a particular permission by querying the 108 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission 89 assertActivityRequiresPermission( String packageName, String className, String permission) argument 113 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument 132 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument [all...] |
/frameworks/base/libs/binder/ |
H A D | IPermissionController.cpp | 40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 44 data.writeString16(permission); 65 String16 permission = data.readString16(); local 68 bool res = checkPermission(permission, pid, uid);
|
H A D | IServiceManager.cpp | 49 bool checkCallingPermission(const String16& permission) argument 51 return checkCallingPermission(permission, NULL, NULL); 54 static String16 _permission("permission"); 57 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument 64 return checkPermission(permission, pid, uid); 67 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 78 bool res = pc->checkPermission(permission, pid, uid); 83 String8(permission).string(), uid, pid); 88 // Is this a permission failure, or did the controller go away? 91 String8(permission) [all...] |
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ServiceManagerPermissionTests.java | 17 package com.android.framework.permission.tests; 52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
|
H A D | SmsManagerPermissionTest.java | 17 package com.android.framework.permission.tests; 38 * {@link android.Manifest.permission#SEND_SMS}. 54 * {@link android.Manifest.permission#SEND_SMS}. 70 * {@link android.Manifest.permission#SEND_MMS}.
|
H A D | VibratorServicePermissionTest.java | 17 package com.android.framework.permission.tests; 43 * <p>Tests permission: 44 * {@link android.Manifest.permission#VIBRATE} 59 * <p>Tests permission: 60 * {@link android.Manifest.permission#VIBRATE} 74 * <p>Tests permission: 75 * {@link android.Manifest.permission#VIBRATE}
|
H A D | PmPermissionsTests.java | 17 package com.android.framework.permission.tests; 29 private String mPkgName = "com.android.framework.permission.tests"; 38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission 39 * android.permission.GET_PACKAGE_SIZE 53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission 54 * android.permission.DELETE_CACHE_FILES 68 * This test verifies that PackageManger.installPackage enforces permission 69 * android.permission.INSTALL_PACKAGES 84 * enforces permission android.permission [all...] |
/frameworks/base/include/binder/ |
H A D | IServiceManager.h | 78 bool checkCallingPermission(const String16& permission); 79 bool checkCallingPermission(const String16& permission, 81 bool checkPermission(const String16& permission, pid_t pid, uid_t uid);
|
H A D | IPermissionController.h | 32 virtual bool checkPermission(const String16& permission,
|
/frameworks/base/services/java/com/android/server/ |
H A D | NetworkManagementService.java | 228 android.Manifest.permission.ACCESS_NETWORK_STATE, "NetworkManagementService"); 303 android.Manifest.permission.SHUTDOWN) 305 throw new SecurityException("Requires SHUTDOWN permission"); 313 android.Manifest.permission.ACCESS_NETWORK_STATE, "NetworkManagementService"); 343 android.Manifest.permission.CHANGE_NETWORK_STATE, "NetworkManagementService"); 350 android.Manifest.permission.CHANGE_NETWORK_STATE, "NetworkManagementService"); 367 android.Manifest.permission.CHANGE_NETWORK_STATE, "NetworkManagementService"); 377 android.Manifest.permission.ACCESS_NETWORK_STATE, "NetworkManagementService"); 405 android.Manifest.permission.CHANGE_NETWORK_STATE, "NetworkManagementService"); 416 android.Manifest.permission [all...] |
H A D | LightsService.java | 155 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.FLASHLIGHT) 157 mContext.checkCallingOrSelfPermission(android.Manifest.permission.HARDWARE_TEST) 159 throw new SecurityException("Requires FLASHLIGHT or HARDWARE_TEST permission");
|
/frameworks/base/core/java/android/content/ |
H A D | ContextWrapper.java | 367 public int checkPermission(String permission, int pid, int uid) { argument 368 return mBase.checkPermission(permission, pid, uid); 372 public int checkCallingPermission(String permission) { argument 373 return mBase.checkCallingPermission(permission); 377 public int checkCallingOrSelfPermission(String permission) { argument 378 return mBase.checkCallingOrSelfPermission(permission); 383 String permission, int pid, int uid, String message) { 384 mBase.enforcePermission(permission, pid, uid, message); 388 public void enforceCallingPermission(String permission, String message) { argument 389 mBase.enforceCallingPermission(permission, messag 382 enforcePermission( String permission, int pid, int uid, String message) argument 393 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
H A D | ContentService.java | 62 mContext.enforceCallingOrSelfPermission(Manifest.permission.DUMP, 63 "caller doesn't have the DUMP permission"); 65 // This makes it so that future permission checks will be in the context of this 128 // This makes it so that future permission checks will be in the context of this 195 // This makes it so that future permission checks will be in the context of this 216 // This makes it so that future permission checks will be in the context of this 235 // This makes it so that future permission checks will be in the context of this 247 mContext.enforceCallingOrSelfPermission(Manifest.permission.READ_SYNC_SETTINGS, 248 "no permission to read the sync settings"); 263 mContext.enforceCallingOrSelfPermission(Manifest.permission [all...] |
H A D | Context.java | 743 * an optional required permission to be enforced. This 757 * If null, no permission is required. 781 * If null, no permission is required. 811 * If null, no permission is required. 846 * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY} 847 * permission in order to use this API. If you do not hold that 848 * permission, {@link SecurityException} will be thrown. 909 * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY} 910 * permission in order to use this API. If you do not hold that 911 * permission, { 1553 checkPermission(String permission, int pid, int uid) argument 1576 checkCallingPermission(String permission) argument 1594 checkCallingOrSelfPermission(String permission) argument 1608 enforcePermission( String permission, int pid, int uid, String message) argument 1629 enforceCallingPermission( String permission, String message) argument 1645 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
/frameworks/base/media/libdrm/mobile1/include/objmng/ |
H A D | svc_drm.h | 150 * The rights permission and constraint information structure. 221 * Check whether a specific DRM object has the specific permission rights or not. 224 * \param permission Specify the permission to be checked. 227 * -DRM_SUCCESS, when it has the rights for the permission. 234 int32_t SVC_drm_checkRights(int32_t session, int32_t permission); 240 * \param permission Specify the permission to be checked. 250 int32_t SVC_drm_consumeRights(int32_t session, int32_t permission); 324 * Check and update the given rights according the given permission [all...] |
H A D | drm_rights_manager.h | 168 * \param permission The permission to be check and updated. 177 int32_t drm_checkRoAndUpdate(int32_t id, int32_t permission);
|
/frameworks/base/telephony/java/com/android/internal/telephony/ |
H A D | PhoneSubInfo.java | 32 android.Manifest.permission.READ_PHONE_STATE; 35 android.Manifest.permission.CALL_PRIVILEGED; 135 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
H A D | IccPhoneBookInterfaceManager.java | 116 * throws SecurityException if no WRITE_CONTACTS permission 137 android.Manifest.permission.WRITE_CONTACTS) 140 "Requires android.permission.WRITE_CONTACTS permission"); 169 * throws SecurityException if no WRITE_CONTACTS permission 185 android.Manifest.permission.WRITE_CONTACTS) 188 "Requires android.permission.WRITE_CONTACTS permission"); 224 * throws SecurityException if no READ_CONTACTS permission 232 android.Manifest.permission [all...] |
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockContext.java | 336 public int checkPermission(String permission, int pid, int uid) { argument 341 public int checkCallingPermission(String permission) { argument 346 public int checkCallingOrSelfPermission(String permission) { argument 352 String permission, int pid, int uid, String message) { 357 public void enforceCallingPermission(String permission, String message) { argument 362 public void enforceCallingOrSelfPermission(String permission, String message) { argument 351 enforcePermission( String permission, int pid, int uid, String message) argument
|
/frameworks/base/services/java/com/android/server/am/ |
H A D | BatteryStatsService.java | 86 android.Manifest.permission.BATTERY_STATS, null); 336 android.Manifest.permission.BATTERY_STATS, null); 342 android.Manifest.permission.BATTERY_STATS, null); 350 mContext.enforcePermission(android.Manifest.permission.UPDATE_DEVICE_STATS,
|