Searched defs:permission (Results 26 - 44 of 44) sorted by last modified time

12

/frameworks/base/media/java/android/drm/mobile1/
H A DDrmRights.java24 * The DRM permission of play.
29 * The DRM permission of display.
34 * The DRM permission of execute.
39 * The DRM permission of print.
66 * Get the constraint of the given permission on this rights object.
68 * @param permission the given permission.
72 public DrmConstraintInfo getConstraint(int permission) { argument
76 int res = nativeGetConstraintInfo(permission, c);
85 * Consume the rights of the given permission
92 consumeRights(int permission) argument
112 nativeGetConstraintInfo(int permission, DrmConstraintInfo constraint) argument
122 nativeConsumeRights(int permission) argument
[all...]
/frameworks/base/media/libdrm/mobile1/src/jni/
H A Ddrm1_jni.c484 /* if no this permission */
769 (JNIEnv * env, jobject rights, jint permission, jobject constraint)
814 switch (permission) {
846 (JNIEnv * env, jobject rights, jint permission)
854 switch (permission) {
856 permission = DRM_PERMISSION_PLAY;
859 permission = DRM_PERMISSION_DISPLAY;
862 permission = DRM_PERMISSION_EXECUTE;
865 permission = DRM_PERMISSION_PRINT;
892 if (DRM_SUCCESS != SVC_drm_updateRights(nativeStr, permission)) {
768 Java_android_drm_mobile1_DrmRights_nativeGetConstraintInfo(JNIEnv * env, jobject rights, jint permission, jobject constraint) argument
845 Java_android_drm_mobile1_DrmRights_nativeConsumeRights(JNIEnv * env, jobject rights, jint permission) argument
[all...]
/frameworks/base/media/libdrm/mobile1/src/objmng/
H A Ddrm_api.c506 int32_t drm_checkRoAndUpdate(int32_t id, int32_t permission) argument
545 switch(permission) {
634 switch (permission) {
1118 int32_t SVC_drm_checkRights(int32_t session, int32_t permission) argument
1136 if (DRM_PERMISSION_PLAY == permission ||
1137 DRM_PERMISSION_DISPLAY == permission ||
1138 DRM_PERMISSION_EXECUTE == permission ||
1139 DRM_PERMISSION_PRINT == permission)
1146 if (DRM_PERMISSION_FORWARD == permission) {
1169 switch (permission) {
1199 SVC_drm_consumeRights(int32_t session, int32_t permission) argument
1817 SVC_drm_updateRights(uint8_t* contentID, int32_t permission) argument
[all...]
/frameworks/base/core/tests/coretests/src/android/accounts/
H A DAccountManagerServiceTest.java234 public int checkCallingOrSelfPermission(final String permission) { argument
/frameworks/base/core/tests/coretests/src/android/app/activity/
H A DBroadcastTest.java177 public void registerMyReceiver(IntentFilter filter, String permission) { argument
180 getContext().registerReceiver(mReceiver, filter, permission, null);
/frameworks/base/core/tests/coretests/src/android/content/
H A DSyncStorageEngineTest.java454 public void enforceCallingOrSelfPermission(String permission, String message) { argument
/frameworks/base/core/java/android/app/
H A DActivityManager.java83 * caller does not have permission to start the activity.
182 * a sticky intent without appropriate permission.
541 * not hold the {@link android.Manifest.permission#GET_TASKS} permission.
557 * the {@link android.Manifest.permission#INTERACT_ACROSS_USERS_FULL} permission.
568 * not hold the {@link android.Manifest.permission#GET_TASKS} or the
569 * {@link android.Manifest.permission#INTERACT_ACROSS_USERS_FULL} permissions.
704 * not hold the {@link android.Manifest.permission#GET_TASKS} permission
1873 checkComponentPermission(String permission, int uid, int owningUid, boolean exported) argument
1907 checkUidPermission(String permission, int uid) argument
[all...]
H A DActivityManagerNative.java90 * If you don't care about permission, use null.
92 static public void broadcastStickyIntent(Intent intent, String permission, int userId) { argument
96 null /*permission*/, false, true, userId);
3073 public int checkPermission(String permission, int pid, int uid) argument
3078 data.writeString(permission);
H A DContextImpl.java1373 + " without permission " + cn.getClassName());
1501 public int checkPermission(String permission, int pid, int uid) { argument
1502 if (permission == null) {
1503 throw new IllegalArgumentException("permission is null");
1508 permission, pid, uid);
1515 public int checkCallingPermission(String permission) { argument
1516 if (permission == null) {
1517 throw new IllegalArgumentException("permission is null");
1522 return checkPermission(permission, pid, Binder.getCallingUid());
1528 public int checkCallingOrSelfPermission(String permission) { argument
1537 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument
1551 enforcePermission( String permission, int pid, int uid, String message) argument
1560 enforceCallingPermission(String permission, String message) argument
1568 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
H A DIActivityManager.java194 public int checkPermission(String permission, int pid, int uid) argument
/frameworks/base/core/java/android/appwidget/
H A DAppWidgetManager.java597 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
618 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
642 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
644 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to
650 * @return true if this component has permission to bind the AppWidget
668 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
670 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to
679 * @return true if this component has permission to bind the AppWidget
696 * Query if a given package was granted permission by the user to bind app widgets
698 * <p class="note">You need the MODIFY_APPWIDGET_BIND_PERMISSIONS permission
722 setBindAppWidgetPermission(String packageName, boolean permission) argument
[all...]
/frameworks/base/core/java/android/content/
H A DContentProvider.java131 * @param writePermission The write permission you want this instance should have
297 // <path-permission> below removes this ability
309 // any denied <path-permission> means we lose
318 // if we passed <path-permission> checks above, and no default
319 // <provider> permission, then allow access.
358 // <path-permission> below removes this ability
370 // any denied <path-permission> means we lose
379 // if we passed <path-permission> checks above, and no default
380 // <provider> permission, then allow access.
409 * Change the permission require
415 setReadPermission(String permission) argument
437 setWritePermission(String permission) argument
[all...]
H A DContext.java625 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} permission.</p>
710 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} permission.</p>
874 * <p>This method requires the caller to hold the permission
875 * {@link android.Manifest.permission#SET_WALLPAPER}.
883 * <p>This method requires the caller to hold the permission
884 * {@link android.Manifest.permission#SET_WALLPAPER}.
892 * <p>This method requires the caller to hold the permission
893 * {@link android.Manifest.permission#SET_WALLPAPE
2273 checkPermission(String permission, int pid, int uid) argument
2296 checkCallingPermission(String permission) argument
2314 checkCallingOrSelfPermission(String permission) argument
2328 enforcePermission( String permission, int pid, int uid, String message) argument
2349 enforceCallingPermission( String permission, String message) argument
2365 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
H A DContextWrapper.java499 public int checkPermission(String permission, int pid, int uid) { argument
500 return mBase.checkPermission(permission, pid, uid);
504 public int checkCallingPermission(String permission) { argument
505 return mBase.checkCallingPermission(permission);
509 public int checkCallingOrSelfPermission(String permission) { argument
510 return mBase.checkCallingOrSelfPermission(permission);
515 String permission, int pid, int uid, String message) {
516 mBase.enforcePermission(permission, pid, uid, message);
520 public void enforceCallingPermission(String permission, String message) { argument
521 mBase.enforceCallingPermission(permission, messag
514 enforcePermission( String permission, int pid, int uid, String message) argument
525 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
/frameworks/base/core/java/android/content/pm/
H A DActivityInfo.java67 * Optional name of a permission required to be able to access this
68 * Activity. From the "permission" attribute.
70 public String permission; field in class:ActivityInfo
500 permission = orig.permission;
524 if (permission != null) {
525 pw.println(prefix + "permission=" + permission);
560 dest.writeString(permission);
585 permission
[all...]
H A DApplicationInfo.java44 * Optional name of a permission required to be able to access this
45 * application's components. From the "permission" attribute.
47 public String permission; field in class:ApplicationInfo
132 * {@link android.Manifest.permission#FACTORY_TEST} permission and the
459 if (permission != null) {
460 pw.println(prefix + "permission=" + permission);
535 permission = orig.permission;
[all...]
H A DServiceInfo.java31 * Optional name of a permission required to be able to access this
32 * Service. From the "permission" attribute.
34 public String permission; field in class:ServiceInfo
72 permission = orig.permission;
78 pw.println(prefix + "permission=" + permission);
94 dest.writeString(permission);
110 permission = source.readString();
/frameworks/base/core/java/android/test/
H A DAndroidTestCase.java78 * Asserts that launching a given activity is protected by a particular permission by
80 * is thrown that mentions the permission in its error message.
87 * @param permission The name of the permission.
90 String packageName, String className, String permission) {
97 fail("expected security exception for " + permission);
100 assertTrue("error message should contain " + permission + ".",
101 expected.getMessage().contains(permission));
107 * Asserts that reading from the content uri requires a particular permission by querying the
108 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission
89 assertActivityRequiresPermission( String packageName, String className, String permission) argument
113 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument
132 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument
[all...]
/frameworks/base/core/java/android/view/
H A DViewRootImpl.java593 " -- permission denied for this window type");
4884 private static int checkCallingPermission(String permission) { argument
4887 permission, Binder.getCallingPid(), Binder.getCallingUid());
4898 if (checkCallingPermission(Manifest.permission.DUMP) !=

Completed in 2259 milliseconds

12