/frameworks/base/media/java/android/drm/mobile1/ |
H A D | DrmRights.java | 24 * The DRM permission of play. 29 * The DRM permission of display. 34 * The DRM permission of execute. 39 * The DRM permission of print. 66 * Get the constraint of the given permission on this rights object. 68 * @param permission the given permission. 72 public DrmConstraintInfo getConstraint(int permission) { argument 76 int res = nativeGetConstraintInfo(permission, c); 85 * Consume the rights of the given permission 92 consumeRights(int permission) argument 112 nativeGetConstraintInfo(int permission, DrmConstraintInfo constraint) argument 122 nativeConsumeRights(int permission) argument [all...] |
/frameworks/base/media/libdrm/mobile1/src/jni/ |
H A D | drm1_jni.c | 484 /* if no this permission */ 769 (JNIEnv * env, jobject rights, jint permission, jobject constraint) 814 switch (permission) { 846 (JNIEnv * env, jobject rights, jint permission) 854 switch (permission) { 856 permission = DRM_PERMISSION_PLAY; 859 permission = DRM_PERMISSION_DISPLAY; 862 permission = DRM_PERMISSION_EXECUTE; 865 permission = DRM_PERMISSION_PRINT; 892 if (DRM_SUCCESS != SVC_drm_updateRights(nativeStr, permission)) { 768 Java_android_drm_mobile1_DrmRights_nativeGetConstraintInfo(JNIEnv * env, jobject rights, jint permission, jobject constraint) argument 845 Java_android_drm_mobile1_DrmRights_nativeConsumeRights(JNIEnv * env, jobject rights, jint permission) argument [all...] |
/frameworks/base/media/libdrm/mobile1/src/objmng/ |
H A D | drm_api.c | 506 int32_t drm_checkRoAndUpdate(int32_t id, int32_t permission) argument 545 switch(permission) { 634 switch (permission) { 1118 int32_t SVC_drm_checkRights(int32_t session, int32_t permission) argument 1136 if (DRM_PERMISSION_PLAY == permission || 1137 DRM_PERMISSION_DISPLAY == permission || 1138 DRM_PERMISSION_EXECUTE == permission || 1139 DRM_PERMISSION_PRINT == permission) 1146 if (DRM_PERMISSION_FORWARD == permission) { 1169 switch (permission) { 1199 SVC_drm_consumeRights(int32_t session, int32_t permission) argument 1817 SVC_drm_updateRights(uint8_t* contentID, int32_t permission) argument [all...] |
/frameworks/base/core/tests/coretests/src/android/accounts/ |
H A D | AccountManagerServiceTest.java | 234 public int checkCallingOrSelfPermission(final String permission) { argument
|
/frameworks/base/core/tests/coretests/src/android/app/activity/ |
H A D | BroadcastTest.java | 177 public void registerMyReceiver(IntentFilter filter, String permission) { argument 180 getContext().registerReceiver(mReceiver, filter, permission, null);
|
/frameworks/base/core/tests/coretests/src/android/content/ |
H A D | SyncStorageEngineTest.java | 454 public void enforceCallingOrSelfPermission(String permission, String message) { argument
|
/frameworks/base/core/java/android/app/ |
H A D | ActivityManager.java | 83 * caller does not have permission to start the activity. 182 * a sticky intent without appropriate permission. 541 * not hold the {@link android.Manifest.permission#GET_TASKS} permission. 557 * the {@link android.Manifest.permission#INTERACT_ACROSS_USERS_FULL} permission. 568 * not hold the {@link android.Manifest.permission#GET_TASKS} or the 569 * {@link android.Manifest.permission#INTERACT_ACROSS_USERS_FULL} permissions. 704 * not hold the {@link android.Manifest.permission#GET_TASKS} permission 1873 checkComponentPermission(String permission, int uid, int owningUid, boolean exported) argument 1907 checkUidPermission(String permission, int uid) argument [all...] |
H A D | ActivityManagerNative.java | 90 * If you don't care about permission, use null. 92 static public void broadcastStickyIntent(Intent intent, String permission, int userId) { argument 96 null /*permission*/, false, true, userId); 3073 public int checkPermission(String permission, int pid, int uid) argument 3078 data.writeString(permission);
|
H A D | ContextImpl.java | 1373 + " without permission " + cn.getClassName()); 1501 public int checkPermission(String permission, int pid, int uid) { argument 1502 if (permission == null) { 1503 throw new IllegalArgumentException("permission is null"); 1508 permission, pid, uid); 1515 public int checkCallingPermission(String permission) { argument 1516 if (permission == null) { 1517 throw new IllegalArgumentException("permission is null"); 1522 return checkPermission(permission, pid, Binder.getCallingUid()); 1528 public int checkCallingOrSelfPermission(String permission) { argument 1537 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument 1551 enforcePermission( String permission, int pid, int uid, String message) argument 1560 enforceCallingPermission(String permission, String message) argument 1568 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
H A D | IActivityManager.java | 194 public int checkPermission(String permission, int pid, int uid) argument
|
/frameworks/base/core/java/android/appwidget/ |
H A D | AppWidgetManager.java | 597 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 618 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 642 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 644 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to 650 * @return true if this component has permission to bind the AppWidget 668 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 670 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to 679 * @return true if this component has permission to bind the AppWidget 696 * Query if a given package was granted permission by the user to bind app widgets 698 * <p class="note">You need the MODIFY_APPWIDGET_BIND_PERMISSIONS permission 722 setBindAppWidgetPermission(String packageName, boolean permission) argument [all...] |
/frameworks/base/core/java/android/content/ |
H A D | ContentProvider.java | 131 * @param writePermission The write permission you want this instance should have 297 // <path-permission> below removes this ability 309 // any denied <path-permission> means we lose 318 // if we passed <path-permission> checks above, and no default 319 // <provider> permission, then allow access. 358 // <path-permission> below removes this ability 370 // any denied <path-permission> means we lose 379 // if we passed <path-permission> checks above, and no default 380 // <provider> permission, then allow access. 409 * Change the permission require 415 setReadPermission(String permission) argument 437 setWritePermission(String permission) argument [all...] |
H A D | Context.java | 625 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} permission.</p> 710 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} permission.</p> 874 * <p>This method requires the caller to hold the permission 875 * {@link android.Manifest.permission#SET_WALLPAPER}. 883 * <p>This method requires the caller to hold the permission 884 * {@link android.Manifest.permission#SET_WALLPAPER}. 892 * <p>This method requires the caller to hold the permission 893 * {@link android.Manifest.permission#SET_WALLPAPE 2273 checkPermission(String permission, int pid, int uid) argument 2296 checkCallingPermission(String permission) argument 2314 checkCallingOrSelfPermission(String permission) argument 2328 enforcePermission( String permission, int pid, int uid, String message) argument 2349 enforceCallingPermission( String permission, String message) argument 2365 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
H A D | ContextWrapper.java | 499 public int checkPermission(String permission, int pid, int uid) { argument 500 return mBase.checkPermission(permission, pid, uid); 504 public int checkCallingPermission(String permission) { argument 505 return mBase.checkCallingPermission(permission); 509 public int checkCallingOrSelfPermission(String permission) { argument 510 return mBase.checkCallingOrSelfPermission(permission); 515 String permission, int pid, int uid, String message) { 516 mBase.enforcePermission(permission, pid, uid, message); 520 public void enforceCallingPermission(String permission, String message) { argument 521 mBase.enforceCallingPermission(permission, messag 514 enforcePermission( String permission, int pid, int uid, String message) argument 525 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ActivityInfo.java | 67 * Optional name of a permission required to be able to access this 68 * Activity. From the "permission" attribute. 70 public String permission; field in class:ActivityInfo 500 permission = orig.permission; 524 if (permission != null) { 525 pw.println(prefix + "permission=" + permission); 560 dest.writeString(permission); 585 permission [all...] |
H A D | ApplicationInfo.java | 44 * Optional name of a permission required to be able to access this 45 * application's components. From the "permission" attribute. 47 public String permission; field in class:ApplicationInfo 132 * {@link android.Manifest.permission#FACTORY_TEST} permission and the 459 if (permission != null) { 460 pw.println(prefix + "permission=" + permission); 535 permission = orig.permission; [all...] |
H A D | ServiceInfo.java | 31 * Optional name of a permission required to be able to access this 32 * Service. From the "permission" attribute. 34 public String permission; field in class:ServiceInfo 72 permission = orig.permission; 78 pw.println(prefix + "permission=" + permission); 94 dest.writeString(permission); 110 permission = source.readString();
|
/frameworks/base/core/java/android/test/ |
H A D | AndroidTestCase.java | 78 * Asserts that launching a given activity is protected by a particular permission by 80 * is thrown that mentions the permission in its error message. 87 * @param permission The name of the permission. 90 String packageName, String className, String permission) { 97 fail("expected security exception for " + permission); 100 assertTrue("error message should contain " + permission + ".", 101 expected.getMessage().contains(permission)); 107 * Asserts that reading from the content uri requires a particular permission by querying the 108 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission 89 assertActivityRequiresPermission( String packageName, String className, String permission) argument 113 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument 132 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument [all...] |
/frameworks/base/core/java/android/view/ |
H A D | ViewRootImpl.java | 593 " -- permission denied for this window type"); 4884 private static int checkCallingPermission(String permission) { argument 4887 permission, Binder.getCallingPid(), Binder.getCallingUid()); 4898 if (checkCallingPermission(Manifest.permission.DUMP) !=
|