Searched defs:permission (Results 26 - 44 of 44) sorted by path

12

/frameworks/base/services/java/com/android/server/am/
H A DServiceRecord.java69 final String permission;// permission needed to access service field in class:ServiceRecord
204 if (permission != null) {
205 pw.print(prefix); pw.print("permission="); pw.println(permission);
295 permission = sInfo.permission;
/frameworks/base/services/java/com/android/server/dreams/
H A DDreamManagerService.java86 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
107 checkPermission(android.Manifest.permission.READ_DREAM_STATE);
120 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE);
136 checkPermission(android.Manifest.permission.READ_DREAM_STATE);
152 checkPermission(android.Manifest.permission.READ_DREAM_STATE);
161 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE);
179 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE);
206 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE);
223 // Requires no permission, called by Dream from an arbitrary process.
333 private void checkPermission(String permission) { argument
[all...]
/frameworks/base/services/java/com/android/server/input/
H A DInputManagerService.java528 Slog.w(TAG, "Input event injection from pid " + pid + " permission denied.");
530 "Injecting to another application requires INJECT_EVENTS permission");
910 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
912 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
947 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
949 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
975 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
977 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
1082 if (!checkCallingPermission(android.Manifest.permission.SET_POINTER_SPEED,
1084 throw new SecurityException("Requires SET_POINTER_SPEED permission");
1228 checkCallingPermission(String permission, String func) argument
[all...]
/frameworks/base/services/java/com/android/server/pm/
H A DPackageManagerService.java19 import static android.Manifest.permission.GRANT_REVOKE_PERMISSIONS;
20 import static android.Manifest.permission.READ_EXTERNAL_STORAGE;
338 // These are the built-in uid -> permission mappings that were read from the
379 // Mapping from permission names to info about them.
1286 // we need to re-grant app permission to catch any new ones that
1346 .contains(android.Manifest.permission.PACKAGE_VERIFICATION_AGENT)) {
1390 // Read permissions from .../etc/permission directory.
1460 } else if ("permission".equals(name)) {
1463 Slog.w(TAG, "<permission> without name at "
1471 } else if ("assign-permission"
10125 setPermissionEnforced(String permission, boolean enforced) argument
10154 isPermissionEnforced(String permission) argument
10165 isPermissionEnforcedDefault(String permission) argument
10179 isPermissionEnforcedLocked(String permission, boolean enforcedDefault) argument
[all...]
/frameworks/base/services/java/com/android/server/wm/
H A DWindowManagerService.java2730 // if they don't have this permission, mask out the status bar bits
2735 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR)
3080 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO,
3082 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission.");
3092 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO,
3094 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission.");
3107 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO,
3109 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission.");
3131 android.Manifest.permission.MAGNIFY_DISPLAY, "magnifyDisplay()")) {
3132 throw new SecurityException("Requires MAGNIFY_DISPLAY permission");
3605 checkCallingPermission(String permission, String func) argument
[all...]
/frameworks/base/test-runner/src/android/test/mock/
H A DMockContext.java435 public int checkPermission(String permission, int pid, int uid) { argument
440 public int checkCallingPermission(String permission) { argument
445 public int checkCallingOrSelfPermission(String permission) { argument
451 String permission, int pid, int uid, String message) {
456 public void enforceCallingPermission(String permission, String message) { argument
461 public void enforceCallingOrSelfPermission(String permission, String message) { argument
450 enforcePermission( String permission, int pid, int uid, String message) argument
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/
H A DActivityManagerPermissionTests.java17 package com.android.framework.permission.tests;
H A DPmPermissionsTests.java17 package com.android.framework.permission.tests;
29 private String mPkgName = "com.android.framework.permission.tests";
38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission
39 * android.permission.GET_PACKAGE_SIZE
53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission
54 * android.permission.DELETE_CACHE_FILES
68 * This test verifies that PackageManger.installPackage enforces permission
69 * android.permission.INSTALL_PACKAGES
84 * enforces permission android.permission
[all...]
H A DServiceManagerPermissionTests.java17 package com.android.framework.permission.tests;
52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
H A DSmsManagerPermissionTest.java17 package com.android.framework.permission.tests;
38 * {@link android.Manifest.permission#SEND_SMS}.
54 * {@link android.Manifest.permission#SEND_SMS}.
70 * {@link android.Manifest.permission#SEND_MMS}.
H A DVibratorServicePermissionTest.java17 package com.android.framework.permission.tests;
43 * <p>Tests permission:
44 * {@link android.Manifest.permission#VIBRATE}
59 * <p>Tests permission:
60 * {@link android.Manifest.permission#VIBRATE}
74 * <p>Tests permission:
75 * {@link android.Manifest.permission#VIBRATE}
H A DWindowManagerPermissionTests.java17 package com.android.framework.permission.tests;
/frameworks/native/libs/binder/
H A DIPermissionController.cpp40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument
44 data.writeString16(permission);
65 String16 permission = data.readString16(); local
68 bool res = checkPermission(permission, pid, uid);
H A DIServiceManager.cpp49 bool checkCallingPermission(const String16& permission) argument
51 return checkCallingPermission(permission, NULL, NULL);
54 static String16 _permission("permission");
57 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument
64 return checkPermission(permission, pid, uid);
67 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument
78 bool res = pc->checkPermission(permission, pid, uid);
83 String8(permission).string(), uid, pid);
88 // Is this a permission failure, or did the controller go away?
91 String8(permission)
[all...]
H A DPermissionCache.cpp38 const String16& permission, uid_t uid) const {
41 e.name = permission;
51 void PermissionCache::cache(const String16& permission, argument
55 ssize_t index = mPermissionNamesPool.indexOf(permission);
59 mPermissionNamesPool.add(permission);
60 e.name = permission;
63 // permission checks
77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument
78 return PermissionCache::checkCallingPermission(permission, NULL, NULL);
82 const String16& permission, int32_
37 check(bool* granted, const String16& permission, uid_t uid) const argument
81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument
91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument
[all...]
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DIccSmsInterfaceManager.java46 "android.permission.RECEIVE_SMS", message);
48 "android.permission.SEND_SMS", message);
79 "android.permission.SEND_SMS",
116 "android.permission.SEND_SMS",
154 "android.permission.SEND_SMS",
171 public void setPremiumSmsPermission(String packageName, int permission) { argument
172 mDispatcher.setPremiumSmsPermission(packageName, permission);
H A DIccSmsInterfaceManagerProxy.java93 public void setPremiumSmsPermission(String packageName, int permission) { argument
94 mIccSmsInterfaceManager.setPremiumSmsPermission(packageName, permission);
H A DSMSDispatcher.java89 public static final String RECEIVE_SMS_PERMISSION = "android.permission.RECEIVE_SMS";
93 "android.permission.RECEIVE_EMERGENCY_BROADCAST";
97 "android.permission.SEND_SMS_NO_CONFIRMATION";
388 * @param permission Receivers are required to have this permission
390 public void dispatch(Intent intent, String permission) { argument
394 mContext.sendOrderedBroadcast(intent, permission, mResultReceiver,
403 * @param permission Receivers are required to have this permission
406 public void dispatch(Intent intent, String permission, BroadcastReceive argument
1232 setPremiumSmsPermission(String packageName, int permission) argument
[all...]
H A DSmsUsageMonitor.java74 /** Default checking period for SMS sent without user permission. */
77 /** Default number of SMS sent in checking period without user permission. */
101 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */
104 /** Default premium SMS permission (ask user for each premium SMS sent). */
107 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */
110 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */
143 /** Directory for per-app SMS permission XML file. */
146 /** Per-app SMS permission XML filename. */
185 /** XML attribute for the package's premium SMS permission (integer type). */
538 * Returns the premium SMS permission fo
569 setPremiumSmsPermission(String packageName, int permission) argument
[all...]

Completed in 2655 milliseconds

12