Searched refs:permission (Results 1 - 25 of 78) sorted by relevance

1234

/frameworks/base/media/java/android/drm/mobile1/
H A DDrmRights.java24 * The DRM permission of play.
29 * The DRM permission of display.
34 * The DRM permission of execute.
39 * The DRM permission of print.
66 * Get the constraint of the given permission on this rights object.
68 * @param permission the given permission.
72 public DrmConstraintInfo getConstraint(int permission) { argument
76 int res = nativeGetConstraintInfo(permission, c);
85 * Consume the rights of the given permission
92 consumeRights(int permission) argument
112 nativeGetConstraintInfo(int permission, DrmConstraintInfo constraint) argument
122 nativeConsumeRights(int permission) argument
[all...]
/frameworks/base/core/java/android/os/
H A DIPermissionController.aidl22 boolean checkPermission(String permission, int pid, int uid);
/frameworks/base/core/java/android/content/pm/
H A DServiceInfo.java31 * Optional name of a permission required to be able to access this
32 * Service. From the "permission" attribute.
34 public String permission; field in class:ServiceInfo
41 permission = orig.permission;
46 pw.println(prefix + "permission=" + permission);
61 dest.writeString(permission);
76 permission = source.readString();
H A DActivityInfo.java67 * Optional name of a permission required to be able to access this
68 * Activity. From the "permission" attribute.
70 public String permission; field in class:ActivityInfo
312 permission = orig.permission;
334 if (permission != null) {
335 pw.println(prefix + "permission=" + permission);
367 dest.writeString(permission);
390 permission
[all...]
H A DApplicationInfo.java44 * Optional name of a permission required to be able to access this
45 * application's components. From the "permission" attribute.
47 public String permission; field in class:ApplicationInfo
125 * {@link android.Manifest.permission#FACTORY_TEST} permission and the
356 if (permission != null) {
357 pw.println(prefix + "permission=" + permission);
411 permission = orig.permission;
[all...]
/frameworks/base/core/java/android/test/
H A DAndroidTestCase.java78 * Asserts that launching a given activity is protected by a particular permission by
80 * is thrown that mentions the permission in its error message.
87 * @param permission The name of the permission.
90 String packageName, String className, String permission) {
97 fail("expected security exception for " + permission);
100 assertTrue("error message should contain " + permission + ".",
101 expected.getMessage().contains(permission));
107 * Asserts that reading from the content uri requires a particular permission by querying the
108 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission
89 assertActivityRequiresPermission( String packageName, String className, String permission) argument
113 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument
132 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument
[all...]
/frameworks/base/libs/binder/
H A DIPermissionController.cpp40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument
44 data.writeString16(permission);
65 String16 permission = data.readString16(); local
68 bool res = checkPermission(permission, pid, uid);
H A DIServiceManager.cpp49 bool checkCallingPermission(const String16& permission) argument
51 return checkCallingPermission(permission, NULL, NULL);
54 static String16 _permission("permission");
57 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument
64 return checkPermission(permission, pid, uid);
67 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument
78 bool res = pc->checkPermission(permission, pid, uid);
83 String8(permission).string(), uid, pid);
88 // Is this a permission failure, or did the controller go away?
91 String8(permission)
[all...]
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/
H A DServiceManagerPermissionTests.java17 package com.android.framework.permission.tests;
52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
H A DSmsManagerPermissionTest.java17 package com.android.framework.permission.tests;
38 * {@link android.Manifest.permission#SEND_SMS}.
54 * {@link android.Manifest.permission#SEND_SMS}.
70 * {@link android.Manifest.permission#SEND_MMS}.
H A DVibratorServicePermissionTest.java17 package com.android.framework.permission.tests;
43 * <p>Tests permission:
44 * {@link android.Manifest.permission#VIBRATE}
59 * <p>Tests permission:
60 * {@link android.Manifest.permission#VIBRATE}
74 * <p>Tests permission:
75 * {@link android.Manifest.permission#VIBRATE}
H A DPmPermissionsTests.java17 package com.android.framework.permission.tests;
29 private String mPkgName = "com.android.framework.permission.tests";
38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission
39 * android.permission.GET_PACKAGE_SIZE
53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission
54 * android.permission.DELETE_CACHE_FILES
68 * This test verifies that PackageManger.installPackage enforces permission
69 * android.permission.INSTALL_PACKAGES
84 * enforces permission android.permission
[all...]
/frameworks/base/include/binder/
H A DIServiceManager.h78 bool checkCallingPermission(const String16& permission);
79 bool checkCallingPermission(const String16& permission,
81 bool checkPermission(const String16& permission, pid_t pid, uid_t uid);
H A DIPermissionController.h32 virtual bool checkPermission(const String16& permission,
/frameworks/base/services/java/com/android/server/
H A DNetworkManagementService.java228 android.Manifest.permission.ACCESS_NETWORK_STATE, "NetworkManagementService");
303 android.Manifest.permission.SHUTDOWN)
305 throw new SecurityException("Requires SHUTDOWN permission");
313 android.Manifest.permission.ACCESS_NETWORK_STATE, "NetworkManagementService");
343 android.Manifest.permission.CHANGE_NETWORK_STATE, "NetworkManagementService");
350 android.Manifest.permission.CHANGE_NETWORK_STATE, "NetworkManagementService");
367 android.Manifest.permission.CHANGE_NETWORK_STATE, "NetworkManagementService");
377 android.Manifest.permission.ACCESS_NETWORK_STATE, "NetworkManagementService");
405 android.Manifest.permission.CHANGE_NETWORK_STATE, "NetworkManagementService");
416 android.Manifest.permission
[all...]
H A DLightsService.java155 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.FLASHLIGHT)
157 mContext.checkCallingOrSelfPermission(android.Manifest.permission.HARDWARE_TEST)
159 throw new SecurityException("Requires FLASHLIGHT or HARDWARE_TEST permission");
/frameworks/base/core/java/android/content/
H A DContextWrapper.java367 public int checkPermission(String permission, int pid, int uid) { argument
368 return mBase.checkPermission(permission, pid, uid);
372 public int checkCallingPermission(String permission) { argument
373 return mBase.checkCallingPermission(permission);
377 public int checkCallingOrSelfPermission(String permission) { argument
378 return mBase.checkCallingOrSelfPermission(permission);
383 String permission, int pid, int uid, String message) {
384 mBase.enforcePermission(permission, pid, uid, message);
388 public void enforceCallingPermission(String permission, String message) { argument
389 mBase.enforceCallingPermission(permission, messag
382 enforcePermission( String permission, int pid, int uid, String message) argument
393 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
H A DContentService.java62 mContext.enforceCallingOrSelfPermission(Manifest.permission.DUMP,
63 "caller doesn't have the DUMP permission");
65 // This makes it so that future permission checks will be in the context of this
128 // This makes it so that future permission checks will be in the context of this
195 // This makes it so that future permission checks will be in the context of this
216 // This makes it so that future permission checks will be in the context of this
235 // This makes it so that future permission checks will be in the context of this
247 mContext.enforceCallingOrSelfPermission(Manifest.permission.READ_SYNC_SETTINGS,
248 "no permission to read the sync settings");
263 mContext.enforceCallingOrSelfPermission(Manifest.permission
[all...]
H A DContext.java743 * an optional required permission to be enforced. This
757 * If null, no permission is required.
781 * If null, no permission is required.
811 * If null, no permission is required.
846 * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY}
847 * permission in order to use this API. If you do not hold that
848 * permission, {@link SecurityException} will be thrown.
909 * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY}
910 * permission in order to use this API. If you do not hold that
911 * permission, {
1553 checkPermission(String permission, int pid, int uid) argument
1576 checkCallingPermission(String permission) argument
1594 checkCallingOrSelfPermission(String permission) argument
1608 enforcePermission( String permission, int pid, int uid, String message) argument
1629 enforceCallingPermission( String permission, String message) argument
1645 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
/frameworks/base/media/libdrm/mobile1/include/objmng/
H A Dsvc_drm.h150 * The rights permission and constraint information structure.
221 * Check whether a specific DRM object has the specific permission rights or not.
224 * \param permission Specify the permission to be checked.
227 * -DRM_SUCCESS, when it has the rights for the permission.
234 int32_t SVC_drm_checkRights(int32_t session, int32_t permission);
240 * \param permission Specify the permission to be checked.
250 int32_t SVC_drm_consumeRights(int32_t session, int32_t permission);
324 * Check and update the given rights according the given permission
[all...]
H A Ddrm_rights_manager.h168 * \param permission The permission to be check and updated.
177 int32_t drm_checkRoAndUpdate(int32_t id, int32_t permission);
/frameworks/base/telephony/java/com/android/internal/telephony/
H A DPhoneSubInfo.java32 android.Manifest.permission.READ_PHONE_STATE;
35 android.Manifest.permission.CALL_PRIVILEGED;
135 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
H A DIccPhoneBookInterfaceManager.java116 * throws SecurityException if no WRITE_CONTACTS permission
137 android.Manifest.permission.WRITE_CONTACTS)
140 "Requires android.permission.WRITE_CONTACTS permission");
169 * throws SecurityException if no WRITE_CONTACTS permission
185 android.Manifest.permission.WRITE_CONTACTS)
188 "Requires android.permission.WRITE_CONTACTS permission");
224 * throws SecurityException if no READ_CONTACTS permission
232 android.Manifest.permission
[all...]
/frameworks/base/test-runner/src/android/test/mock/
H A DMockContext.java336 public int checkPermission(String permission, int pid, int uid) { argument
341 public int checkCallingPermission(String permission) { argument
346 public int checkCallingOrSelfPermission(String permission) { argument
352 String permission, int pid, int uid, String message) {
357 public void enforceCallingPermission(String permission, String message) { argument
362 public void enforceCallingOrSelfPermission(String permission, String message) { argument
351 enforcePermission( String permission, int pid, int uid, String message) argument
/frameworks/base/services/java/com/android/server/am/
H A DBatteryStatsService.java86 android.Manifest.permission.BATTERY_STATS, null);
336 android.Manifest.permission.BATTERY_STATS, null);
342 android.Manifest.permission.BATTERY_STATS, null);
350 mContext.enforcePermission(android.Manifest.permission.UPDATE_DEVICE_STATS,

Completed in 325 milliseconds

1234