/frameworks/base/services/java/com/android/server/am/ |
H A D | ServiceRecord.java | 69 final String permission;// permission needed to access service field in class:ServiceRecord 204 if (permission != null) { 205 pw.print(prefix); pw.print("permission="); pw.println(permission); 295 permission = sInfo.permission;
|
/frameworks/base/services/java/com/android/server/dreams/ |
H A D | DreamManagerService.java | 86 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG); 107 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 120 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 136 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 152 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 161 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 179 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 206 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 223 // Requires no permission, called by Dream from an arbitrary process. 333 private void checkPermission(String permission) { argument [all...] |
/frameworks/base/services/java/com/android/server/input/ |
H A D | InputManagerService.java | 528 Slog.w(TAG, "Input event injection from pid " + pid + " permission denied."); 530 "Injecting to another application requires INJECT_EVENTS permission"); 910 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 912 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 947 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 949 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 975 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 977 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 1082 if (!checkCallingPermission(android.Manifest.permission.SET_POINTER_SPEED, 1084 throw new SecurityException("Requires SET_POINTER_SPEED permission"); 1228 checkCallingPermission(String permission, String func) argument [all...] |
/frameworks/base/services/java/com/android/server/pm/ |
H A D | PackageManagerService.java | 19 import static android.Manifest.permission.GRANT_REVOKE_PERMISSIONS; 20 import static android.Manifest.permission.READ_EXTERNAL_STORAGE; 338 // These are the built-in uid -> permission mappings that were read from the 379 // Mapping from permission names to info about them. 1286 // we need to re-grant app permission to catch any new ones that 1346 .contains(android.Manifest.permission.PACKAGE_VERIFICATION_AGENT)) { 1390 // Read permissions from .../etc/permission directory. 1460 } else if ("permission".equals(name)) { 1463 Slog.w(TAG, "<permission> without name at " 1471 } else if ("assign-permission" 10125 setPermissionEnforced(String permission, boolean enforced) argument 10154 isPermissionEnforced(String permission) argument 10165 isPermissionEnforcedDefault(String permission) argument 10179 isPermissionEnforcedLocked(String permission, boolean enforcedDefault) argument [all...] |
/frameworks/base/services/java/com/android/server/wm/ |
H A D | WindowManagerService.java | 2730 // if they don't have this permission, mask out the status bar bits 2735 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR) 3080 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO, 3082 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission."); 3092 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO, 3094 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission."); 3107 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO, 3109 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission."); 3131 android.Manifest.permission.MAGNIFY_DISPLAY, "magnifyDisplay()")) { 3132 throw new SecurityException("Requires MAGNIFY_DISPLAY permission"); 3605 checkCallingPermission(String permission, String func) argument [all...] |
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockContext.java | 435 public int checkPermission(String permission, int pid, int uid) { argument 440 public int checkCallingPermission(String permission) { argument 445 public int checkCallingOrSelfPermission(String permission) { argument 451 String permission, int pid, int uid, String message) { 456 public void enforceCallingPermission(String permission, String message) { argument 461 public void enforceCallingOrSelfPermission(String permission, String message) { argument 450 enforcePermission( String permission, int pid, int uid, String message) argument
|
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ActivityManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
H A D | PmPermissionsTests.java | 17 package com.android.framework.permission.tests; 29 private String mPkgName = "com.android.framework.permission.tests"; 38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission 39 * android.permission.GET_PACKAGE_SIZE 53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission 54 * android.permission.DELETE_CACHE_FILES 68 * This test verifies that PackageManger.installPackage enforces permission 69 * android.permission.INSTALL_PACKAGES 84 * enforces permission android.permission [all...] |
H A D | ServiceManagerPermissionTests.java | 17 package com.android.framework.permission.tests; 52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
|
H A D | SmsManagerPermissionTest.java | 17 package com.android.framework.permission.tests; 38 * {@link android.Manifest.permission#SEND_SMS}. 54 * {@link android.Manifest.permission#SEND_SMS}. 70 * {@link android.Manifest.permission#SEND_MMS}.
|
H A D | VibratorServicePermissionTest.java | 17 package com.android.framework.permission.tests; 43 * <p>Tests permission: 44 * {@link android.Manifest.permission#VIBRATE} 59 * <p>Tests permission: 60 * {@link android.Manifest.permission#VIBRATE} 74 * <p>Tests permission: 75 * {@link android.Manifest.permission#VIBRATE}
|
H A D | WindowManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
/frameworks/native/libs/binder/ |
H A D | IPermissionController.cpp | 40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 44 data.writeString16(permission); 65 String16 permission = data.readString16(); local 68 bool res = checkPermission(permission, pid, uid);
|
H A D | IServiceManager.cpp | 49 bool checkCallingPermission(const String16& permission) argument 51 return checkCallingPermission(permission, NULL, NULL); 54 static String16 _permission("permission"); 57 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument 64 return checkPermission(permission, pid, uid); 67 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 78 bool res = pc->checkPermission(permission, pid, uid); 83 String8(permission).string(), uid, pid); 88 // Is this a permission failure, or did the controller go away? 91 String8(permission) [all...] |
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_ 37 check(bool* granted, const String16& permission, uid_t uid) const argument 81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | IccSmsInterfaceManager.java | 46 "android.permission.RECEIVE_SMS", message); 48 "android.permission.SEND_SMS", message); 79 "android.permission.SEND_SMS", 116 "android.permission.SEND_SMS", 154 "android.permission.SEND_SMS", 171 public void setPremiumSmsPermission(String packageName, int permission) { argument 172 mDispatcher.setPremiumSmsPermission(packageName, permission);
|
H A D | IccSmsInterfaceManagerProxy.java | 93 public void setPremiumSmsPermission(String packageName, int permission) { argument 94 mIccSmsInterfaceManager.setPremiumSmsPermission(packageName, permission);
|
H A D | SMSDispatcher.java | 89 public static final String RECEIVE_SMS_PERMISSION = "android.permission.RECEIVE_SMS"; 93 "android.permission.RECEIVE_EMERGENCY_BROADCAST"; 97 "android.permission.SEND_SMS_NO_CONFIRMATION"; 388 * @param permission Receivers are required to have this permission 390 public void dispatch(Intent intent, String permission) { argument 394 mContext.sendOrderedBroadcast(intent, permission, mResultReceiver, 403 * @param permission Receivers are required to have this permission 406 public void dispatch(Intent intent, String permission, BroadcastReceive argument 1232 setPremiumSmsPermission(String packageName, int permission) argument [all...] |
H A D | SmsUsageMonitor.java | 74 /** Default checking period for SMS sent without user permission. */ 77 /** Default number of SMS sent in checking period without user permission. */ 101 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */ 104 /** Default premium SMS permission (ask user for each premium SMS sent). */ 107 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */ 110 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */ 143 /** Directory for per-app SMS permission XML file. */ 146 /** Per-app SMS permission XML filename. */ 185 /** XML attribute for the package's premium SMS permission (integer type). */ 538 * Returns the premium SMS permission fo 569 setPremiumSmsPermission(String packageName, int permission) argument [all...] |