Searched defs:permission (Results 26 - 44 of 44) sorted by relevance

12

/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DSmsUsageMonitor.java74 /** Default checking period for SMS sent without user permission. */
77 /** Default number of SMS sent in checking period without user permission. */
101 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */
104 /** Default premium SMS permission (ask user for each premium SMS sent). */
107 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */
110 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */
143 /** Directory for per-app SMS permission XML file. */
146 /** Per-app SMS permission XML filename. */
185 /** XML attribute for the package's premium SMS permission (integer type). */
538 * Returns the premium SMS permission fo
569 setPremiumSmsPermission(String packageName, int permission) argument
[all...]
H A DSMSDispatcher.java89 public static final String RECEIVE_SMS_PERMISSION = "android.permission.RECEIVE_SMS";
93 "android.permission.RECEIVE_EMERGENCY_BROADCAST";
97 "android.permission.SEND_SMS_NO_CONFIRMATION";
388 * @param permission Receivers are required to have this permission
390 public void dispatch(Intent intent, String permission) { argument
394 mContext.sendOrderedBroadcast(intent, permission, mResultReceiver,
403 * @param permission Receivers are required to have this permission
406 public void dispatch(Intent intent, String permission, BroadcastReceive argument
1232 setPremiumSmsPermission(String packageName, int permission) argument
[all...]
/frameworks/base/core/java/android/content/
H A DContextWrapper.java499 public int checkPermission(String permission, int pid, int uid) { argument
500 return mBase.checkPermission(permission, pid, uid);
504 public int checkCallingPermission(String permission) { argument
505 return mBase.checkCallingPermission(permission);
509 public int checkCallingOrSelfPermission(String permission) { argument
510 return mBase.checkCallingOrSelfPermission(permission);
515 String permission, int pid, int uid, String message) {
516 mBase.enforcePermission(permission, pid, uid, message);
520 public void enforceCallingPermission(String permission, String message) { argument
521 mBase.enforceCallingPermission(permission, messag
514 enforcePermission( String permission, int pid, int uid, String message) argument
525 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
H A DContext.java625 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} permission.</p>
710 * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} permission.</p>
874 * <p>This method requires the caller to hold the permission
875 * {@link android.Manifest.permission#SET_WALLPAPER}.
883 * <p>This method requires the caller to hold the permission
884 * {@link android.Manifest.permission#SET_WALLPAPER}.
892 * <p>This method requires the caller to hold the permission
893 * {@link android.Manifest.permission#SET_WALLPAPE
2273 checkPermission(String permission, int pid, int uid) argument
2296 checkCallingPermission(String permission) argument
2314 checkCallingOrSelfPermission(String permission) argument
2328 enforcePermission( String permission, int pid, int uid, String message) argument
2349 enforceCallingPermission( String permission, String message) argument
2365 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
/frameworks/base/services/java/com/android/server/
H A DAppWidgetServiceImpl.java366 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
602 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BIND_APPWIDGET,
610 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BIND_APPWIDGET, null);
637 android.Manifest.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS,
646 public void setBindAppWidgetPermission(String packageName, boolean permission) { argument
648 android.Manifest.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS,
653 if (permission) {
674 if (!android.Manifest.permission.BIND_REMOTEVIEWS.equals(si.permission)) {
676 + android.Manifest.permission
[all...]
/frameworks/base/services/java/com/android/server/am/
H A DActiveServices.java234 return new ComponentName("!", res.permission != null
235 ? res.permission : "private to package");
306 // r.record is null if findServiceLocked() failed the caller permission check
312 + " requires " + r.permission);
680 final String permission; field in class:ActiveServices.ServiceLookupResult
684 permission = _permission;
776 if (mAm.checkComponentPermission(r.permission,
790 + " requires " + r.permission);
791 return new ServiceLookupResult(null, r.permission);
1761 android.Manifest.permission
[all...]
H A DActivityManagerService.java1375 ServiceManager.addService("permission", new PermissionController(m));
1493 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
1497 + " without permission " + android.Manifest.permission.DUMP);
1514 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
1518 + " without permission " + android.Manifest.permission.DUMP);
1534 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
1538 + " without permission " + android.Manifest.permission
4860 checkPermission(String permission, int pid, int uid) argument
4869 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument
4899 checkPermission(String permission, int pid, int uid) argument
4910 checkCallingPermission(String permission) argument
4919 enforceCallingPermission(String permission, String func) argument
11311 registerReceiver(IApplicationThread caller, String callerPackage, IIntentReceiver receiver, IntentFilter filter, String permission, int userId) argument
[all...]
/frameworks/base/test-runner/src/android/test/mock/
H A DMockContext.java435 public int checkPermission(String permission, int pid, int uid) { argument
440 public int checkCallingPermission(String permission) { argument
445 public int checkCallingOrSelfPermission(String permission) { argument
451 String permission, int pid, int uid, String message) {
456 public void enforceCallingPermission(String permission, String message) { argument
461 public void enforceCallingOrSelfPermission(String permission, String message) { argument
450 enforcePermission( String permission, int pid, int uid, String message) argument
/frameworks/base/media/libdrm/mobile1/src/jni/
H A Ddrm1_jni.c484 /* if no this permission */
769 (JNIEnv * env, jobject rights, jint permission, jobject constraint)
814 switch (permission) {
846 (JNIEnv * env, jobject rights, jint permission)
854 switch (permission) {
856 permission = DRM_PERMISSION_PLAY;
859 permission = DRM_PERMISSION_DISPLAY;
862 permission = DRM_PERMISSION_EXECUTE;
865 permission = DRM_PERMISSION_PRINT;
892 if (DRM_SUCCESS != SVC_drm_updateRights(nativeStr, permission)) {
768 Java_android_drm_mobile1_DrmRights_nativeGetConstraintInfo(JNIEnv * env, jobject rights, jint permission, jobject constraint) argument
845 Java_android_drm_mobile1_DrmRights_nativeConsumeRights(JNIEnv * env, jobject rights, jint permission) argument
[all...]
/frameworks/base/media/libdrm/mobile1/src/objmng/
H A Ddrm_api.c506 int32_t drm_checkRoAndUpdate(int32_t id, int32_t permission) argument
545 switch(permission) {
634 switch (permission) {
1118 int32_t SVC_drm_checkRights(int32_t session, int32_t permission) argument
1136 if (DRM_PERMISSION_PLAY == permission ||
1137 DRM_PERMISSION_DISPLAY == permission ||
1138 DRM_PERMISSION_EXECUTE == permission ||
1139 DRM_PERMISSION_PRINT == permission)
1146 if (DRM_PERMISSION_FORWARD == permission) {
1169 switch (permission) {
1199 SVC_drm_consumeRights(int32_t session, int32_t permission) argument
1817 SVC_drm_updateRights(uint8_t* contentID, int32_t permission) argument
[all...]
/frameworks/base/core/java/android/app/
H A DActivityManager.java83 * caller does not have permission to start the activity.
182 * a sticky intent without appropriate permission.
541 * not hold the {@link android.Manifest.permission#GET_TASKS} permission.
557 * the {@link android.Manifest.permission#INTERACT_ACROSS_USERS_FULL} permission.
568 * not hold the {@link android.Manifest.permission#GET_TASKS} or the
569 * {@link android.Manifest.permission#INTERACT_ACROSS_USERS_FULL} permissions.
704 * not hold the {@link android.Manifest.permission#GET_TASKS} permission
1873 checkComponentPermission(String permission, int uid, int owningUid, boolean exported) argument
1907 checkUidPermission(String permission, int uid) argument
[all...]
H A DContextImpl.java1373 + " without permission " + cn.getClassName());
1501 public int checkPermission(String permission, int pid, int uid) { argument
1502 if (permission == null) {
1503 throw new IllegalArgumentException("permission is null");
1508 permission, pid, uid);
1515 public int checkCallingPermission(String permission) { argument
1516 if (permission == null) {
1517 throw new IllegalArgumentException("permission is null");
1522 return checkPermission(permission, pid, Binder.getCallingUid());
1528 public int checkCallingOrSelfPermission(String permission) { argument
1537 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument
1551 enforcePermission( String permission, int pid, int uid, String message) argument
1560 enforceCallingPermission(String permission, String message) argument
1568 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
H A DActivityManagerNative.java90 * If you don't care about permission, use null.
92 static public void broadcastStickyIntent(Intent intent, String permission, int userId) { argument
96 null /*permission*/, false, true, userId);
3073 public int checkPermission(String permission, int pid, int uid) argument
3078 data.writeString(permission);
H A DIActivityManager.java194 public int checkPermission(String permission, int pid, int uid) argument
/frameworks/base/services/java/com/android/server/accessibility/
H A DAccessibilityManagerService.java512 mSecurityPolicy.enforceCallingPermission(Manifest.permission.RETRIEVE_WINDOW_CONTENT,
543 Manifest.permission.TEMPORARY_ENABLE_ACCESSIBILITY,
793 if (!android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE.equals(
794 serviceInfo.permission)) {
797 + ": it does not require the permission "
798 + android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE);
1944 // not have permission to access the window content.
2280 if (!hasPermission(Manifest.permission.INTERACT_ACROSS_USERS)
2281 && !hasPermission(Manifest.permission.INTERACT_ACROSS_USERS_FULL)) {
2283 + userId + " without permission INTERACT_ACROSS_USER
2310 enforceCallingPermission(String permission, String function) argument
2320 hasPermission(String permission) argument
[all...]
/frameworks/base/services/java/com/android/server/input/
H A DInputManagerService.java528 Slog.w(TAG, "Input event injection from pid " + pid + " permission denied.");
530 "Injecting to another application requires INJECT_EVENTS permission");
910 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
912 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
947 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
949 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
975 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
977 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
1082 if (!checkCallingPermission(android.Manifest.permission.SET_POINTER_SPEED,
1084 throw new SecurityException("Requires SET_POINTER_SPEED permission");
1228 checkCallingPermission(String permission, String func) argument
[all...]
/frameworks/base/core/java/android/view/
H A DViewRootImpl.java593 " -- permission denied for this window type");
4884 private static int checkCallingPermission(String permission) { argument
4887 permission, Binder.getCallingPid(), Binder.getCallingUid());
4898 if (checkCallingPermission(Manifest.permission.DUMP) !=
/frameworks/base/services/java/com/android/server/pm/
H A DPackageManagerService.java19 import static android.Manifest.permission.GRANT_REVOKE_PERMISSIONS;
20 import static android.Manifest.permission.READ_EXTERNAL_STORAGE;
338 // These are the built-in uid -> permission mappings that were read from the
379 // Mapping from permission names to info about them.
1286 // we need to re-grant app permission to catch any new ones that
1346 .contains(android.Manifest.permission.PACKAGE_VERIFICATION_AGENT)) {
1390 // Read permissions from .../etc/permission directory.
1460 } else if ("permission".equals(name)) {
1463 Slog.w(TAG, "<permission> without name at "
1471 } else if ("assign-permission"
10125 setPermissionEnforced(String permission, boolean enforced) argument
10154 isPermissionEnforced(String permission) argument
10165 isPermissionEnforcedDefault(String permission) argument
10179 isPermissionEnforcedLocked(String permission, boolean enforcedDefault) argument
[all...]
/frameworks/base/services/java/com/android/server/wm/
H A DWindowManagerService.java2730 // if they don't have this permission, mask out the status bar bits
2735 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR)
3080 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO,
3082 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission.");
3092 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO,
3094 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission.");
3107 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO,
3109 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission.");
3131 android.Manifest.permission.MAGNIFY_DISPLAY, "magnifyDisplay()")) {
3132 throw new SecurityException("Requires MAGNIFY_DISPLAY permission");
3605 checkCallingPermission(String permission, String func) argument
[all...]

Completed in 74 milliseconds

12