/frameworks/base/media/java/android/drm/mobile1/ |
H A D | DrmRights.java | 24 * The DRM permission of play. 29 * The DRM permission of display. 34 * The DRM permission of execute. 39 * The DRM permission of print. 66 * Get the constraint of the given permission on this rights object. 68 * @param permission the given permission. 72 public DrmConstraintInfo getConstraint(int permission) { argument 76 int res = nativeGetConstraintInfo(permission, c); 85 * Consume the rights of the given permission 92 consumeRights(int permission) argument 112 nativeGetConstraintInfo(int permission, DrmConstraintInfo constraint) argument 122 nativeConsumeRights(int permission) argument [all...] |
/frameworks/base/core/java/android/os/ |
H A D | IPermissionController.aidl | 22 boolean checkPermission(String permission, int pid, int uid);
|
/frameworks/native/libs/binder/ |
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_ 37 check(bool* granted, const String16& permission, uid_t uid) const argument 81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
H A D | IPermissionController.cpp | 40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 44 data.writeString16(permission); 65 String16 permission = data.readString16(); local 68 bool res = checkPermission(permission, pid, uid);
|
H A D | IServiceManager.cpp | 49 bool checkCallingPermission(const String16& permission) argument 51 return checkCallingPermission(permission, NULL, NULL); 54 static String16 _permission("permission"); 57 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument 64 return checkPermission(permission, pid, uid); 67 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 78 bool res = pc->checkPermission(permission, pid, uid); 83 String8(permission).string(), uid, pid); 88 // Is this a permission failure, or did the controller go away? 91 String8(permission) [all...] |
/frameworks/native/include/binder/ |
H A D | PermissionCache.h | 31 * PermissionCache caches permission checks for a given uid. 33 * Currently the cache is not updated when there is a permission change, 51 // we pool all the permission names we see, as many permissions checks 57 // free the whole cache, but keep the permission name pool 61 const String16& permission, uid_t uid) const; 63 void cache(const String16& permission, uid_t uid, bool granted); 68 static bool checkCallingPermission(const String16& permission); 70 static bool checkCallingPermission(const String16& permission, 73 static bool checkPermission(const String16& permission,
|
H A D | IServiceManager.h | 79 bool checkCallingPermission(const String16& permission); 80 bool checkCallingPermission(const String16& permission, 82 bool checkPermission(const String16& permission, pid_t pid, uid_t uid);
|
H A D | IPermissionController.h | 32 virtual bool checkPermission(const String16& permission,
|
/frameworks/base/core/java/android/test/ |
H A D | AndroidTestCase.java | 78 * Asserts that launching a given activity is protected by a particular permission by 80 * is thrown that mentions the permission in its error message. 87 * @param permission The name of the permission. 90 String packageName, String className, String permission) { 97 fail("expected security exception for " + permission); 100 assertTrue("error message should contain " + permission + ".", 101 expected.getMessage().contains(permission)); 107 * Asserts that reading from the content uri requires a particular permission by querying the 108 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission 89 assertActivityRequiresPermission( String packageName, String className, String permission) argument 113 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument 132 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ServiceInfo.java | 31 * Optional name of a permission required to be able to access this 32 * Service. From the "permission" attribute. 34 public String permission; field in class:ServiceInfo 72 permission = orig.permission; 78 pw.println(prefix + "permission=" + permission); 94 dest.writeString(permission); 110 permission = source.readString();
|
H A D | ActivityInfo.java | 67 * Optional name of a permission required to be able to access this 68 * Activity. From the "permission" attribute. 70 public String permission; field in class:ActivityInfo 500 permission = orig.permission; 524 if (permission != null) { 525 pw.println(prefix + "permission=" + permission); 560 dest.writeString(permission); 585 permission [all...] |
H A D | ApplicationInfo.java | 44 * Optional name of a permission required to be able to access this 45 * application's components. From the "permission" attribute. 47 public String permission; field in class:ApplicationInfo 132 * {@link android.Manifest.permission#FACTORY_TEST} permission and the 459 if (permission != null) { 460 pw.println(prefix + "permission=" + permission); 535 permission = orig.permission; [all...] |
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ServiceManagerPermissionTests.java | 17 package com.android.framework.permission.tests; 52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
|
H A D | SmsManagerPermissionTest.java | 17 package com.android.framework.permission.tests; 38 * {@link android.Manifest.permission#SEND_SMS}. 54 * {@link android.Manifest.permission#SEND_SMS}. 70 * {@link android.Manifest.permission#SEND_MMS}.
|
H A D | VibratorServicePermissionTest.java | 17 package com.android.framework.permission.tests; 43 * <p>Tests permission: 44 * {@link android.Manifest.permission#VIBRATE} 59 * <p>Tests permission: 60 * {@link android.Manifest.permission#VIBRATE} 74 * <p>Tests permission: 75 * {@link android.Manifest.permission#VIBRATE}
|
/frameworks/base/services/java/com/android/server/dreams/ |
H A D | DreamManagerService.java | 86 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG); 107 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 120 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 136 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 152 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 161 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 179 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 206 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 223 // Requires no permission, called by Dream from an arbitrary process. 333 private void checkPermission(String permission) { argument [all...] |
/frameworks/base/services/java/com/android/server/usb/ |
H A D | UsbService.java | 163 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 169 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 200 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 207 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 214 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 220 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 226 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 236 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 246 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 252 mContext.enforceCallingOrSelfPermission(android.Manifest.permission [all...] |
/frameworks/base/services/java/com/android/server/ |
H A D | SerialService.java | 38 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.SERIAL_PORT, null); 53 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.SERIAL_PORT, null);
|
/frameworks/base/media/libdrm/mobile1/include/objmng/ |
H A D | svc_drm.h | 150 * The rights permission and constraint information structure. 221 * Check whether a specific DRM object has the specific permission rights or not. 224 * \param permission Specify the permission to be checked. 227 * -DRM_SUCCESS, when it has the rights for the permission. 234 int32_t SVC_drm_checkRights(int32_t session, int32_t permission); 240 * \param permission Specify the permission to be checked. 250 int32_t SVC_drm_consumeRights(int32_t session, int32_t permission); 324 * Check and update the given rights according the given permission [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | PhoneSubInfo.java | 34 android.Manifest.permission.READ_PHONE_STATE; 37 android.Manifest.permission.CALL_PRIVILEGED; 39 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE; 193 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
H A D | ISms.aidl | 202 * Returns the premium SMS send permission for the specified package. 203 * Requires system permission. 208 * Set the SMS send permission for the specified package. 209 * Requires system permission. 211 void setPremiumSmsPermission(String packageName, int permission);
|
H A D | IccSmsInterfaceManagerProxy.java | 93 public void setPremiumSmsPermission(String packageName, int permission) { argument 94 mIccSmsInterfaceManager.setPremiumSmsPermission(packageName, permission);
|
/frameworks/base/core/java/android/webkit/ |
H A D | HTML5VideoInline.java | 19 import android.Manifest.permission; 71 if (mProxy.getContext().checkCallingOrSelfPermission(permission.WAKE_LOCK)
|
/frameworks/base/core/java/android/content/ |
H A D | ContextWrapper.java | 499 public int checkPermission(String permission, int pid, int uid) { argument 500 return mBase.checkPermission(permission, pid, uid); 504 public int checkCallingPermission(String permission) { argument 505 return mBase.checkCallingPermission(permission); 509 public int checkCallingOrSelfPermission(String permission) { argument 510 return mBase.checkCallingOrSelfPermission(permission); 515 String permission, int pid, int uid, String message) { 516 mBase.enforcePermission(permission, pid, uid, message); 520 public void enforceCallingPermission(String permission, String message) { argument 521 mBase.enforceCallingPermission(permission, messag 514 enforcePermission( String permission, int pid, int uid, String message) argument 525 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
H A D | ContentService.java | 68 mContext.enforceCallingOrSelfPermission(Manifest.permission.DUMP, 69 "caller doesn't have the DUMP permission"); 71 // This makes it so that future permission checks will be in the context of this 146 * the calling user without requiring any permission, otherwise the caller needs to 147 * hold the INTERACT_ACROSS_USERS_FULL permission. Pseudousers USER_ALL and 159 mContext.enforceCallingOrSelfPermission(Manifest.permission.INTERACT_ACROSS_USERS_FULL, 160 "no permission to observe other users' provider view"); 199 * the calling user without requiring any permission, otherwise the caller needs to 200 * hold the INTERACT_ACROSS_USERS_FULL permission. Pseudousers USER_ALL and 212 // Notify for any user other than the caller's own requires permission [all...] |