/frameworks/base/media/java/android/drm/mobile1/ |
H A D | DrmRights.java | 24 * The DRM permission of play. 29 * The DRM permission of display. 34 * The DRM permission of execute. 39 * The DRM permission of print. 66 * Get the constraint of the given permission on this rights object. 68 * @param permission the given permission. 72 public DrmConstraintInfo getConstraint(int permission) { argument 76 int res = nativeGetConstraintInfo(permission, c); 85 * Consume the rights of the given permission 92 consumeRights(int permission) argument 112 nativeGetConstraintInfo(int permission, DrmConstraintInfo constraint) argument 122 nativeConsumeRights(int permission) argument [all...] |
/frameworks/base/core/java/android/os/ |
H A D | IPermissionController.aidl | 22 boolean checkPermission(String permission, int pid, int uid);
|
/frameworks/base/libs/binder/ |
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_ 37 check(bool* granted, const String16& permission, uid_t uid) const argument 81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
H A D | IPermissionController.cpp | 40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 44 data.writeString16(permission); 65 String16 permission = data.readString16(); local 68 bool res = checkPermission(permission, pid, uid);
|
H A D | IServiceManager.cpp | 49 bool checkCallingPermission(const String16& permission) argument 51 return checkCallingPermission(permission, NULL, NULL); 54 static String16 _permission("permission"); 57 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument 64 return checkPermission(permission, pid, uid); 67 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 78 bool res = pc->checkPermission(permission, pid, uid); 83 String8(permission).string(), uid, pid); 88 // Is this a permission failure, or did the controller go away? 91 String8(permission) [all...] |
/frameworks/base/include/binder/ |
H A D | PermissionCache.h | 30 * PermissionCache caches permission checks for a given uid. 32 * Currently the cache is not updated when there is a permission change, 50 // we pool all the permission names we see, as many permissions checks 56 // free the whole cache, but keep the permission name pool 60 const String16& permission, uid_t uid) const; 62 void cache(const String16& permission, uid_t uid, bool granted); 67 static bool checkCallingPermission(const String16& permission); 69 static bool checkCallingPermission(const String16& permission, 72 static bool checkPermission(const String16& permission,
|
H A D | IServiceManager.h | 78 bool checkCallingPermission(const String16& permission); 79 bool checkCallingPermission(const String16& permission, 81 bool checkPermission(const String16& permission, pid_t pid, uid_t uid);
|
H A D | IPermissionController.h | 32 virtual bool checkPermission(const String16& permission,
|
/frameworks/base/core/java/android/test/ |
H A D | AndroidTestCase.java | 78 * Asserts that launching a given activity is protected by a particular permission by 80 * is thrown that mentions the permission in its error message. 87 * @param permission The name of the permission. 90 String packageName, String className, String permission) { 97 fail("expected security exception for " + permission); 100 assertTrue("error message should contain " + permission + ".", 101 expected.getMessage().contains(permission)); 107 * Asserts that reading from the content uri requires a particular permission by querying the 108 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission 89 assertActivityRequiresPermission( String packageName, String className, String permission) argument 113 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument 132 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ServiceInfo.java | 31 * Optional name of a permission required to be able to access this 32 * Service. From the "permission" attribute. 34 public String permission; field in class:ServiceInfo 57 permission = orig.permission; 63 pw.println(prefix + "permission=" + permission); 79 dest.writeString(permission); 95 permission = source.readString();
|
H A D | ActivityInfo.java | 67 * Optional name of a permission required to be able to access this 68 * Activity. From the "permission" attribute. 70 public String permission; field in class:ActivityInfo 460 permission = orig.permission; 483 if (permission != null) { 484 pw.println(prefix + "permission=" + permission); 519 dest.writeString(permission); 543 permission [all...] |
H A D | ApplicationInfo.java | 44 * Optional name of a permission required to be able to access this 45 * application's components. From the "permission" attribute. 47 public String permission; field in class:ApplicationInfo 132 * {@link android.Manifest.permission#FACTORY_TEST} permission and the 434 if (permission != null) { 435 pw.println(prefix + "permission=" + permission); 501 permission = orig.permission; [all...] |
/frameworks/base/services/java/com/android/server/usb/ |
H A D | UsbService.java | 102 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 107 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 130 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 135 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 140 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 145 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 150 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 159 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 169 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ServiceManagerPermissionTests.java | 17 package com.android.framework.permission.tests; 52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
|
H A D | SmsManagerPermissionTest.java | 17 package com.android.framework.permission.tests; 38 * {@link android.Manifest.permission#SEND_SMS}. 54 * {@link android.Manifest.permission#SEND_SMS}. 70 * {@link android.Manifest.permission#SEND_MMS}.
|
H A D | VibratorServicePermissionTest.java | 17 package com.android.framework.permission.tests; 43 * <p>Tests permission: 44 * {@link android.Manifest.permission#VIBRATE} 59 * <p>Tests permission: 60 * {@link android.Manifest.permission#VIBRATE} 74 * <p>Tests permission: 75 * {@link android.Manifest.permission#VIBRATE}
|
/frameworks/base/services/java/com/android/server/ |
H A D | NetworkManagementService.java | 19 import static android.Manifest.permission.ACCESS_NETWORK_STATE; 20 import static android.Manifest.permission.CHANGE_NETWORK_STATE; 21 import static android.Manifest.permission.DUMP; 22 import static android.Manifest.permission.MANAGE_NETWORK_POLICY; 356 android.Manifest.permission.ACCESS_NETWORK_STATE, "NetworkManagementService"); 493 android.Manifest.permission.CHANGE_NETWORK_STATE, "NetworkManagementService"); 504 android.Manifest.permission.CHANGE_NETWORK_STATE, "NetworkManagementService"); 688 android.Manifest.permission.SHUTDOWN) 690 throw new SecurityException("Requires SHUTDOWN permission"); 698 android.Manifest.permission [all...] |
/frameworks/base/core/java/android/content/ |
H A D | ContextWrapper.java | 390 public int checkPermission(String permission, int pid, int uid) { argument 391 return mBase.checkPermission(permission, pid, uid); 395 public int checkCallingPermission(String permission) { argument 396 return mBase.checkCallingPermission(permission); 400 public int checkCallingOrSelfPermission(String permission) { argument 401 return mBase.checkCallingOrSelfPermission(permission); 406 String permission, int pid, int uid, String message) { 407 mBase.enforcePermission(permission, pid, uid, message); 411 public void enforceCallingPermission(String permission, String message) { argument 412 mBase.enforceCallingPermission(permission, messag 405 enforcePermission( String permission, int pid, int uid, String message) argument 416 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
H A D | ContentService.java | 65 mContext.enforceCallingOrSelfPermission(Manifest.permission.DUMP, 66 "caller doesn't have the DUMP permission"); 68 // This makes it so that future permission checks will be in the context of this 166 // This makes it so that future permission checks will be in the context of this 233 // This makes it so that future permission checks will be in the context of this 254 // This makes it so that future permission checks will be in the context of this 273 // This makes it so that future permission checks will be in the context of this 285 mContext.enforceCallingOrSelfPermission(Manifest.permission.READ_SYNC_SETTINGS, 286 "no permission to read the sync settings"); 301 mContext.enforceCallingOrSelfPermission(Manifest.permission [all...] |
H A D | Context.java | 909 * an optional required permission to be enforced. This 921 * @param receiverPermission (optional) String naming a permission that 923 * If null, no permission is required. 947 * If null, no permission is required. 977 * If null, no permission is required. 1012 * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY} 1013 * permission in order to use this API. If you do not hold that 1014 * permission, {@link SecurityException} will be thrown. 1075 * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY} 1076 * permission i 1807 checkPermission(String permission, int pid, int uid) argument 1830 checkCallingPermission(String permission) argument 1848 checkCallingOrSelfPermission(String permission) argument 1862 enforcePermission( String permission, int pid, int uid, String message) argument 1883 enforceCallingPermission( String permission, String message) argument 1899 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
/frameworks/base/media/libdrm/mobile1/include/objmng/ |
H A D | svc_drm.h | 150 * The rights permission and constraint information structure. 221 * Check whether a specific DRM object has the specific permission rights or not. 224 * \param permission Specify the permission to be checked. 227 * -DRM_SUCCESS, when it has the rights for the permission. 234 int32_t SVC_drm_checkRights(int32_t session, int32_t permission); 240 * \param permission Specify the permission to be checked. 250 int32_t SVC_drm_consumeRights(int32_t session, int32_t permission); 324 * Check and update the given rights according the given permission [all...] |
H A D | drm_rights_manager.h | 168 * \param permission The permission to be check and updated. 177 int32_t drm_checkRoAndUpdate(int32_t id, int32_t permission);
|
/frameworks/base/telephony/java/com/android/internal/telephony/ |
H A D | PhoneSubInfo.java | 34 android.Manifest.permission.READ_PHONE_STATE; 37 android.Manifest.permission.CALL_PRIVILEGED; 39 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE; 193 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
/frameworks/base/core/java/android/webkit/ |
H A D | HTML5VideoInline.java | 4 import android.Manifest.permission; 59 if (mProxy.getContext().checkCallingOrSelfPermission(permission.WAKE_LOCK)
|
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockContext.java | 353 public int checkPermission(String permission, int pid, int uid) { argument 358 public int checkCallingPermission(String permission) { argument 363 public int checkCallingOrSelfPermission(String permission) { argument 369 String permission, int pid, int uid, String message) { 374 public void enforceCallingPermission(String permission, String message) { argument 379 public void enforceCallingOrSelfPermission(String permission, String message) { argument 368 enforcePermission( String permission, int pid, int uid, String message) argument
|