/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ServiceManagerPermissionTests.java | 17 package com.android.framework.permission.tests; 52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
|
H A D | PmPermissionsTests.java | 17 package com.android.framework.permission.tests; 29 private String mPkgName = "com.android.framework.permission.tests"; 38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission 39 * android.permission.GET_PACKAGE_SIZE 53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission 54 * android.permission.DELETE_CACHE_FILES 68 * This test verifies that PackageManger.installPackage enforces permission 69 * android.permission.INSTALL_PACKAGES 84 * enforces permission android.permission [all...] |
H A D | SmsManagerPermissionTest.java | 17 package com.android.framework.permission.tests; 38 * {@link android.Manifest.permission#SEND_SMS}. 54 * {@link android.Manifest.permission#SEND_SMS}. 70 * {@link android.Manifest.permission#SEND_MMS}.
|
H A D | VibratorServicePermissionTest.java | 17 package com.android.framework.permission.tests; 43 * <p>Tests permission: 44 * {@link android.Manifest.permission#VIBRATE} 59 * <p>Tests permission: 60 * {@link android.Manifest.permission#VIBRATE} 74 * <p>Tests permission: 75 * {@link android.Manifest.permission#VIBRATE}
|
H A D | WindowManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
H A D | ActivityManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
/frameworks/base/libs/binder/ |
H A D | IPermissionController.cpp | 40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 44 data.writeString16(permission); 65 String16 permission = data.readString16(); local 68 bool res = checkPermission(permission, pid, uid);
|
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_ 37 check(bool* granted, const String16& permission, uid_t uid) const argument 81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
H A D | IServiceManager.cpp | 49 bool checkCallingPermission(const String16& permission) argument 51 return checkCallingPermission(permission, NULL, NULL); 54 static String16 _permission("permission"); 57 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument 64 return checkPermission(permission, pid, uid); 67 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 78 bool res = pc->checkPermission(permission, pid, uid); 83 String8(permission).string(), uid, pid); 88 // Is this a permission failure, or did the controller go away? 91 String8(permission) [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ServiceInfo.java | 31 * Optional name of a permission required to be able to access this 32 * Service. From the "permission" attribute. 34 public String permission; field in class:ServiceInfo 57 permission = orig.permission; 63 pw.println(prefix + "permission=" + permission); 79 dest.writeString(permission); 95 permission = source.readString();
|
H A D | ActivityInfo.java | 67 * Optional name of a permission required to be able to access this 68 * Activity. From the "permission" attribute. 70 public String permission; field in class:ActivityInfo 460 permission = orig.permission; 483 if (permission != null) { 484 pw.println(prefix + "permission=" + permission); 519 dest.writeString(permission); 543 permission [all...] |
H A D | ApplicationInfo.java | 44 * Optional name of a permission required to be able to access this 45 * application's components. From the "permission" attribute. 47 public String permission; field in class:ApplicationInfo 132 * {@link android.Manifest.permission#FACTORY_TEST} permission and the 434 if (permission != null) { 435 pw.println(prefix + "permission=" + permission); 501 permission = orig.permission; [all...] |
/frameworks/base/media/java/android/drm/mobile1/ |
H A D | DrmRights.java | 24 * The DRM permission of play. 29 * The DRM permission of display. 34 * The DRM permission of execute. 39 * The DRM permission of print. 66 * Get the constraint of the given permission on this rights object. 68 * @param permission the given permission. 72 public DrmConstraintInfo getConstraint(int permission) { argument 76 int res = nativeGetConstraintInfo(permission, c); 85 * Consume the rights of the given permission 92 consumeRights(int permission) argument 112 nativeGetConstraintInfo(int permission, DrmConstraintInfo constraint) argument 122 nativeConsumeRights(int permission) argument [all...] |
/frameworks/base/core/java/android/test/ |
H A D | AndroidTestCase.java | 78 * Asserts that launching a given activity is protected by a particular permission by 80 * is thrown that mentions the permission in its error message. 87 * @param permission The name of the permission. 90 String packageName, String className, String permission) { 97 fail("expected security exception for " + permission); 100 assertTrue("error message should contain " + permission + ".", 101 expected.getMessage().contains(permission)); 107 * Asserts that reading from the content uri requires a particular permission by querying the 108 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission 89 assertActivityRequiresPermission( String packageName, String className, String permission) argument 113 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument 132 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument [all...] |
/frameworks/base/core/tests/coretests/src/android/content/ |
H A D | SyncStorageEngineTest.java | 407 public void enforceCallingOrSelfPermission(String permission, String message) { argument
|
/frameworks/base/core/tests/coretests/src/android/accounts/ |
H A D | AccountManagerServiceTest.java | 223 public int checkCallingOrSelfPermission(final String permission) { argument
|
/frameworks/base/core/java/android/content/ |
H A D | ContentProvider.java | 122 * @param writePermission The write permission you want this instance should have 364 * Change the permission required to read data from the content 368 * @param permission Name of the permission required for read-only access. 370 protected final void setReadPermission(String permission) { argument 371 mReadPermission = permission; 375 * Return the name of the permission required for read-only access to 386 * Change the permission required to read and write data in the content 390 * @param permission Name of the permission require 392 setWritePermission(String permission) argument [all...] |
H A D | ContextWrapper.java | 390 public int checkPermission(String permission, int pid, int uid) { argument 391 return mBase.checkPermission(permission, pid, uid); 395 public int checkCallingPermission(String permission) { argument 396 return mBase.checkCallingPermission(permission); 400 public int checkCallingOrSelfPermission(String permission) { argument 401 return mBase.checkCallingOrSelfPermission(permission); 406 String permission, int pid, int uid, String message) { 407 mBase.enforcePermission(permission, pid, uid, message); 411 public void enforceCallingPermission(String permission, String message) { argument 412 mBase.enforceCallingPermission(permission, messag 405 enforcePermission( String permission, int pid, int uid, String message) argument 416 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
/frameworks/base/services/java/com/android/server/am/ |
H A D | ServiceRecord.java | 65 final String permission;// permission needed to access service field in class:ServiceRecord 199 if (permission != null) { 200 pw.print(prefix); pw.print("permission="); pw.println(permission); 284 permission = sInfo.permission;
|
/frameworks/base/core/tests/coretests/src/android/app/activity/ |
H A D | BroadcastTest.java | 176 public void registerMyReceiver(IntentFilter filter, String permission) { argument 179 getContext().registerReceiver(mReceiver, filter, permission, null);
|
/frameworks/base/services/java/com/android/server/ |
H A D | WallpaperManagerService.java | 390 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS); 461 checkPermission(android.Manifest.permission.SET_WALLPAPER); 498 checkPermission(android.Manifest.permission.SET_WALLPAPER_COMPONENT); 549 if (!android.Manifest.permission.BIND_WALLPAPER.equals(si.permission)) { 551 + android.Manifest.permission.BIND_WALLPAPER 695 private void checkPermission(String permission) { argument 696 if (PackageManager.PERMISSION_GRANTED!= mContext.checkCallingOrSelfPermission(permission)) { 698 + ", must have permission " + permission); [all...] |
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockContext.java | 353 public int checkPermission(String permission, int pid, int uid) { argument 358 public int checkCallingPermission(String permission) { argument 363 public int checkCallingOrSelfPermission(String permission) { argument 369 String permission, int pid, int uid, String message) { 374 public void enforceCallingPermission(String permission, String message) { argument 379 public void enforceCallingOrSelfPermission(String permission, String message) { argument 368 enforcePermission( String permission, int pid, int uid, String message) argument
|
/frameworks/base/media/libdrm/mobile1/src/jni/ |
H A D | drm1_jni.c | 484 /* if no this permission */ 769 (JNIEnv * env, jobject rights, jint permission, jobject constraint) 814 switch (permission) { 846 (JNIEnv * env, jobject rights, jint permission) 854 switch (permission) { 856 permission = DRM_PERMISSION_PLAY; 859 permission = DRM_PERMISSION_DISPLAY; 862 permission = DRM_PERMISSION_EXECUTE; 865 permission = DRM_PERMISSION_PRINT; 892 if (DRM_SUCCESS != SVC_drm_updateRights(nativeStr, permission)) { 768 Java_android_drm_mobile1_DrmRights_nativeGetConstraintInfo(JNIEnv * env, jobject rights, jint permission, jobject constraint) argument 845 Java_android_drm_mobile1_DrmRights_nativeConsumeRights(JNIEnv * env, jobject rights, jint permission) argument [all...] |
/frameworks/base/media/libdrm/mobile1/src/objmng/ |
H A D | drm_api.c | 506 int32_t drm_checkRoAndUpdate(int32_t id, int32_t permission) argument 545 switch(permission) { 634 switch (permission) { 1118 int32_t SVC_drm_checkRights(int32_t session, int32_t permission) argument 1136 if (DRM_PERMISSION_PLAY == permission || 1137 DRM_PERMISSION_DISPLAY == permission || 1138 DRM_PERMISSION_EXECUTE == permission || 1139 DRM_PERMISSION_PRINT == permission) 1146 if (DRM_PERMISSION_FORWARD == permission) { 1169 switch (permission) { 1199 SVC_drm_consumeRights(int32_t session, int32_t permission) argument 1817 SVC_drm_updateRights(uint8_t* contentID, int32_t permission) argument [all...] |
/frameworks/base/services/java/com/android/server/accessibility/ |
H A D | AccessibilityManagerService.java | 471 mSecurityPolicy.enforceCallingPermission(Manifest.permission.RETRIEVE_WINDOW_CONTENT, 578 // not have permission to access the window content. 1356 private void enforceCallingPermission(String permission, String function) { argument 1360 final int permissionStatus = mContext.checkCallingPermission(permission); 1362 throw new SecurityException("You do not have " + permission
|