/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ServiceManagerPermissionTests.java | 17 package com.android.framework.permission.tests; 52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
|
H A D | PmPermissionsTests.java | 17 package com.android.framework.permission.tests; 29 private String mPkgName = "com.android.framework.permission.tests"; 38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission 39 * android.permission.GET_PACKAGE_SIZE 53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission 54 * android.permission.DELETE_CACHE_FILES 68 * This test verifies that PackageManger.installPackage enforces permission 69 * android.permission.INSTALL_PACKAGES 84 * enforces permission android.permission [all...] |
H A D | SmsManagerPermissionTest.java | 17 package com.android.framework.permission.tests; 38 * {@link android.Manifest.permission#SEND_SMS}. 54 * {@link android.Manifest.permission#SEND_SMS}. 70 * {@link android.Manifest.permission#SEND_MMS}.
|
H A D | VibratorServicePermissionTest.java | 17 package com.android.framework.permission.tests; 43 * <p>Tests permission: 44 * {@link android.Manifest.permission#VIBRATE} 59 * <p>Tests permission: 60 * {@link android.Manifest.permission#VIBRATE} 74 * <p>Tests permission: 75 * {@link android.Manifest.permission#VIBRATE}
|
H A D | WindowManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
H A D | ActivityManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
/frameworks/native/libs/binder/ |
H A D | IPermissionController.cpp | 40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 44 data.writeString16(permission); 65 String16 permission = data.readString16(); local 68 bool res = checkPermission(permission, pid, uid);
|
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_ 37 check(bool* granted, const String16& permission, uid_t uid) const argument 81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
H A D | IServiceManager.cpp | 49 bool checkCallingPermission(const String16& permission) argument 51 return checkCallingPermission(permission, NULL, NULL); 54 static String16 _permission("permission"); 57 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument 64 return checkPermission(permission, pid, uid); 67 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 78 bool res = pc->checkPermission(permission, pid, uid); 83 String8(permission).string(), uid, pid); 88 // Is this a permission failure, or did the controller go away? 91 String8(permission) [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ServiceInfo.java | 31 * Optional name of a permission required to be able to access this 32 * Service. From the "permission" attribute. 34 public String permission; field in class:ServiceInfo 72 permission = orig.permission; 78 pw.println(prefix + "permission=" + permission); 94 dest.writeString(permission); 110 permission = source.readString();
|
H A D | ActivityInfo.java | 67 * Optional name of a permission required to be able to access this 68 * Activity. From the "permission" attribute. 70 public String permission; field in class:ActivityInfo 500 permission = orig.permission; 524 if (permission != null) { 525 pw.println(prefix + "permission=" + permission); 560 dest.writeString(permission); 585 permission [all...] |
H A D | ApplicationInfo.java | 44 * Optional name of a permission required to be able to access this 45 * application's components. From the "permission" attribute. 47 public String permission; field in class:ApplicationInfo 132 * {@link android.Manifest.permission#FACTORY_TEST} permission and the 459 if (permission != null) { 460 pw.println(prefix + "permission=" + permission); 535 permission = orig.permission; [all...] |
/frameworks/base/media/java/android/drm/mobile1/ |
H A D | DrmRights.java | 24 * The DRM permission of play. 29 * The DRM permission of display. 34 * The DRM permission of execute. 39 * The DRM permission of print. 66 * Get the constraint of the given permission on this rights object. 68 * @param permission the given permission. 72 public DrmConstraintInfo getConstraint(int permission) { argument 76 int res = nativeGetConstraintInfo(permission, c); 85 * Consume the rights of the given permission 92 consumeRights(int permission) argument 112 nativeGetConstraintInfo(int permission, DrmConstraintInfo constraint) argument 122 nativeConsumeRights(int permission) argument [all...] |
/frameworks/base/core/java/android/test/ |
H A D | AndroidTestCase.java | 78 * Asserts that launching a given activity is protected by a particular permission by 80 * is thrown that mentions the permission in its error message. 87 * @param permission The name of the permission. 90 String packageName, String className, String permission) { 97 fail("expected security exception for " + permission); 100 assertTrue("error message should contain " + permission + ".", 101 expected.getMessage().contains(permission)); 107 * Asserts that reading from the content uri requires a particular permission by querying the 108 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission 89 assertActivityRequiresPermission( String packageName, String className, String permission) argument 113 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument 132 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument [all...] |
/frameworks/base/core/tests/coretests/src/android/content/ |
H A D | SyncStorageEngineTest.java | 454 public void enforceCallingOrSelfPermission(String permission, String message) { argument
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | IccSmsInterfaceManager.java | 46 "android.permission.RECEIVE_SMS", message); 48 "android.permission.SEND_SMS", message); 79 "android.permission.SEND_SMS", 116 "android.permission.SEND_SMS", 154 "android.permission.SEND_SMS", 171 public void setPremiumSmsPermission(String packageName, int permission) { argument 172 mDispatcher.setPremiumSmsPermission(packageName, permission);
|
H A D | IccSmsInterfaceManagerProxy.java | 93 public void setPremiumSmsPermission(String packageName, int permission) { argument 94 mIccSmsInterfaceManager.setPremiumSmsPermission(packageName, permission);
|
/frameworks/base/core/java/android/appwidget/ |
H A D | AppWidgetManager.java | 609 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 630 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 654 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 656 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to 662 * @return true if this component has permission to bind the AppWidget 680 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 682 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to 691 * @return true if this component has permission to bind the AppWidget 708 * Query if a given package was granted permission by the user to bind app widgets 710 * <p class="note">You need the MODIFY_APPWIDGET_BIND_PERMISSIONS permission 734 setBindAppWidgetPermission(String packageName, boolean permission) argument [all...] |
/frameworks/base/core/tests/coretests/src/android/accounts/ |
H A D | AccountManagerServiceTest.java | 234 public int checkCallingOrSelfPermission(final String permission) { argument
|
/frameworks/base/services/java/com/android/server/ |
H A D | AppWidgetService.java | 192 public void setBindAppWidgetPermission(String packageName, boolean permission) argument 195 packageName, permission); 359 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
|
H A D | WallpaperManagerService.java | 631 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS); 719 checkPermission(android.Manifest.permission.SET_WALLPAPER); 766 checkPermission(android.Manifest.permission.SET_WALLPAPER_COMPONENT); 824 if (!android.Manifest.permission.BIND_WALLPAPER.equals(si.permission)) { 826 + android.Manifest.permission.BIND_WALLPAPER 987 private void checkPermission(String permission) { argument 988 if (PackageManager.PERMISSION_GRANTED!= mContext.checkCallingOrSelfPermission(permission)) { 990 + ", must have permission " + permission); [all...] |
/frameworks/base/services/java/com/android/server/dreams/ |
H A D | DreamManagerService.java | 89 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG); 110 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 123 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 139 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 155 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 164 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 182 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 209 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 226 // Requires no permission, called by Dream from an arbitrary process. 366 private void checkPermission(String permission) { argument [all...] |
/frameworks/base/core/java/android/content/ |
H A D | ContentProvider.java | 131 * @param writePermission The write permission you want this instance should have 297 // <path-permission> below removes this ability 309 // any denied <path-permission> means we lose 318 // if we passed <path-permission> checks above, and no default 319 // <provider> permission, then allow access. 358 // <path-permission> below removes this ability 370 // any denied <path-permission> means we lose 379 // if we passed <path-permission> checks above, and no default 380 // <provider> permission, then allow access. 409 * Change the permission require 415 setReadPermission(String permission) argument 437 setWritePermission(String permission) argument [all...] |
/frameworks/base/services/java/com/android/server/am/ |
H A D | ServiceRecord.java | 69 final String permission;// permission needed to access service field in class:ServiceRecord 204 if (permission != null) { 205 pw.print(prefix); pw.print("permission="); pw.println(permission); 295 permission = sInfo.permission;
|
/frameworks/base/core/tests/coretests/src/android/app/activity/ |
H A D | BroadcastTest.java | 177 public void registerMyReceiver(IntentFilter filter, String permission) { argument 180 getContext().registerReceiver(mReceiver, filter, permission, null);
|