Searched refs:permission (Results 1 - 25 of 119) sorted by relevance

12345

/frameworks/base/media/java/android/drm/mobile1/
H A DDrmRights.java24 * The DRM permission of play.
29 * The DRM permission of display.
34 * The DRM permission of execute.
39 * The DRM permission of print.
66 * Get the constraint of the given permission on this rights object.
68 * @param permission the given permission.
72 public DrmConstraintInfo getConstraint(int permission) { argument
76 int res = nativeGetConstraintInfo(permission, c);
85 * Consume the rights of the given permission
92 consumeRights(int permission) argument
112 nativeGetConstraintInfo(int permission, DrmConstraintInfo constraint) argument
122 nativeConsumeRights(int permission) argument
[all...]
/frameworks/base/core/java/android/os/
H A DIPermissionController.aidl22 boolean checkPermission(String permission, int pid, int uid);
/frameworks/native/libs/binder/
H A DPermissionCache.cpp38 const String16& permission, uid_t uid) const {
41 e.name = permission;
51 void PermissionCache::cache(const String16& permission, argument
55 ssize_t index = mPermissionNamesPool.indexOf(permission);
59 mPermissionNamesPool.add(permission);
60 e.name = permission;
63 // permission checks
77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument
78 return PermissionCache::checkCallingPermission(permission, NULL, NULL);
82 const String16& permission, int32_
37 check(bool* granted, const String16& permission, uid_t uid) const argument
81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument
91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument
[all...]
H A DIPermissionController.cpp40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument
44 data.writeString16(permission);
65 String16 permission = data.readString16(); local
68 bool res = checkPermission(permission, pid, uid);
H A DIServiceManager.cpp49 bool checkCallingPermission(const String16& permission) argument
51 return checkCallingPermission(permission, NULL, NULL);
54 static String16 _permission("permission");
57 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument
64 return checkPermission(permission, pid, uid);
67 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument
78 bool res = pc->checkPermission(permission, pid, uid);
83 String8(permission).string(), uid, pid);
88 // Is this a permission failure, or did the controller go away?
91 String8(permission)
[all...]
/frameworks/native/include/binder/
H A DPermissionCache.h31 * PermissionCache caches permission checks for a given uid.
33 * Currently the cache is not updated when there is a permission change,
51 // we pool all the permission names we see, as many permissions checks
57 // free the whole cache, but keep the permission name pool
61 const String16& permission, uid_t uid) const;
63 void cache(const String16& permission, uid_t uid, bool granted);
68 static bool checkCallingPermission(const String16& permission);
70 static bool checkCallingPermission(const String16& permission,
73 static bool checkPermission(const String16& permission,
H A DIServiceManager.h79 bool checkCallingPermission(const String16& permission);
80 bool checkCallingPermission(const String16& permission,
82 bool checkPermission(const String16& permission, pid_t pid, uid_t uid);
H A DIPermissionController.h32 virtual bool checkPermission(const String16& permission,
/frameworks/base/core/java/android/test/
H A DAndroidTestCase.java78 * Asserts that launching a given activity is protected by a particular permission by
80 * is thrown that mentions the permission in its error message.
87 * @param permission The name of the permission.
90 String packageName, String className, String permission) {
97 fail("expected security exception for " + permission);
100 assertTrue("error message should contain " + permission + ".",
101 expected.getMessage().contains(permission));
107 * Asserts that reading from the content uri requires a particular permission by querying the
108 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission
89 assertActivityRequiresPermission( String packageName, String className, String permission) argument
113 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument
132 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument
[all...]
/frameworks/base/core/java/android/content/pm/
H A DServiceInfo.java31 * Optional name of a permission required to be able to access this
32 * Service. From the "permission" attribute.
34 public String permission; field in class:ServiceInfo
72 permission = orig.permission;
78 pw.println(prefix + "permission=" + permission);
94 dest.writeString(permission);
110 permission = source.readString();
H A DActivityInfo.java67 * Optional name of a permission required to be able to access this
68 * Activity. From the "permission" attribute.
70 public String permission; field in class:ActivityInfo
500 permission = orig.permission;
524 if (permission != null) {
525 pw.println(prefix + "permission=" + permission);
560 dest.writeString(permission);
585 permission
[all...]
H A DApplicationInfo.java44 * Optional name of a permission required to be able to access this
45 * application's components. From the "permission" attribute.
47 public String permission; field in class:ApplicationInfo
132 * {@link android.Manifest.permission#FACTORY_TEST} permission and the
459 if (permission != null) {
460 pw.println(prefix + "permission=" + permission);
535 permission = orig.permission;
[all...]
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/
H A DServiceManagerPermissionTests.java17 package com.android.framework.permission.tests;
52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
H A DSmsManagerPermissionTest.java17 package com.android.framework.permission.tests;
38 * {@link android.Manifest.permission#SEND_SMS}.
54 * {@link android.Manifest.permission#SEND_SMS}.
70 * {@link android.Manifest.permission#SEND_MMS}.
H A DVibratorServicePermissionTest.java17 package com.android.framework.permission.tests;
43 * <p>Tests permission:
44 * {@link android.Manifest.permission#VIBRATE}
59 * <p>Tests permission:
60 * {@link android.Manifest.permission#VIBRATE}
74 * <p>Tests permission:
75 * {@link android.Manifest.permission#VIBRATE}
/frameworks/base/services/java/com/android/server/dreams/
H A DDreamManagerService.java86 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
107 checkPermission(android.Manifest.permission.READ_DREAM_STATE);
120 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE);
136 checkPermission(android.Manifest.permission.READ_DREAM_STATE);
152 checkPermission(android.Manifest.permission.READ_DREAM_STATE);
161 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE);
179 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE);
206 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE);
223 // Requires no permission, called by Dream from an arbitrary process.
333 private void checkPermission(String permission) { argument
[all...]
/frameworks/base/services/java/com/android/server/usb/
H A DUsbService.java163 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
169 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
200 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
207 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
214 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
220 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
226 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
236 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
246 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
252 mContext.enforceCallingOrSelfPermission(android.Manifest.permission
[all...]
/frameworks/base/services/java/com/android/server/
H A DSerialService.java38 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.SERIAL_PORT, null);
53 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.SERIAL_PORT, null);
/frameworks/base/media/libdrm/mobile1/include/objmng/
H A Dsvc_drm.h150 * The rights permission and constraint information structure.
221 * Check whether a specific DRM object has the specific permission rights or not.
224 * \param permission Specify the permission to be checked.
227 * -DRM_SUCCESS, when it has the rights for the permission.
234 int32_t SVC_drm_checkRights(int32_t session, int32_t permission);
240 * \param permission Specify the permission to be checked.
250 int32_t SVC_drm_consumeRights(int32_t session, int32_t permission);
324 * Check and update the given rights according the given permission
[all...]
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DPhoneSubInfo.java34 android.Manifest.permission.READ_PHONE_STATE;
37 android.Manifest.permission.CALL_PRIVILEGED;
39 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE;
193 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
H A DISms.aidl202 * Returns the premium SMS send permission for the specified package.
203 * Requires system permission.
208 * Set the SMS send permission for the specified package.
209 * Requires system permission.
211 void setPremiumSmsPermission(String packageName, int permission);
H A DIccSmsInterfaceManagerProxy.java93 public void setPremiumSmsPermission(String packageName, int permission) { argument
94 mIccSmsInterfaceManager.setPremiumSmsPermission(packageName, permission);
/frameworks/base/core/java/android/webkit/
H A DHTML5VideoInline.java19 import android.Manifest.permission;
71 if (mProxy.getContext().checkCallingOrSelfPermission(permission.WAKE_LOCK)
/frameworks/base/core/java/android/content/
H A DContextWrapper.java499 public int checkPermission(String permission, int pid, int uid) { argument
500 return mBase.checkPermission(permission, pid, uid);
504 public int checkCallingPermission(String permission) { argument
505 return mBase.checkCallingPermission(permission);
509 public int checkCallingOrSelfPermission(String permission) { argument
510 return mBase.checkCallingOrSelfPermission(permission);
515 String permission, int pid, int uid, String message) {
516 mBase.enforcePermission(permission, pid, uid, message);
520 public void enforceCallingPermission(String permission, String message) { argument
521 mBase.enforceCallingPermission(permission, messag
514 enforcePermission( String permission, int pid, int uid, String message) argument
525 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
H A DContentService.java68 mContext.enforceCallingOrSelfPermission(Manifest.permission.DUMP,
69 "caller doesn't have the DUMP permission");
71 // This makes it so that future permission checks will be in the context of this
146 * the calling user without requiring any permission, otherwise the caller needs to
147 * hold the INTERACT_ACROSS_USERS_FULL permission. Pseudousers USER_ALL and
159 mContext.enforceCallingOrSelfPermission(Manifest.permission.INTERACT_ACROSS_USERS_FULL,
160 "no permission to observe other users' provider view");
199 * the calling user without requiring any permission, otherwise the caller needs to
200 * hold the INTERACT_ACROSS_USERS_FULL permission. Pseudousers USER_ALL and
212 // Notify for any user other than the caller's own requires permission
[all...]

Completed in 332 milliseconds

12345