/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | IccSmsInterfaceManager.java | 46 "android.permission.RECEIVE_SMS", message); 48 "android.permission.SEND_SMS", message); 79 "android.permission.SEND_SMS", 116 "android.permission.SEND_SMS", 154 "android.permission.SEND_SMS", 171 public void setPremiumSmsPermission(String packageName, int permission) { argument 172 mDispatcher.setPremiumSmsPermission(packageName, permission);
|
H A D | IccSmsInterfaceManagerProxy.java | 93 public void setPremiumSmsPermission(String packageName, int permission) { argument 94 mIccSmsInterfaceManager.setPremiumSmsPermission(packageName, permission);
|
H A D | SMSDispatcher.java | 89 public static final String RECEIVE_SMS_PERMISSION = "android.permission.RECEIVE_SMS"; 93 "android.permission.RECEIVE_EMERGENCY_BROADCAST"; 97 "android.permission.SEND_SMS_NO_CONFIRMATION"; 388 * @param permission Receivers are required to have this permission 390 public void dispatch(Intent intent, String permission) { argument 394 mContext.sendOrderedBroadcast(intent, permission, mResultReceiver, 403 * @param permission Receivers are required to have this permission 406 public void dispatch(Intent intent, String permission, BroadcastReceive argument 1232 setPremiumSmsPermission(String packageName, int permission) argument [all...] |
H A D | SmsUsageMonitor.java | 74 /** Default checking period for SMS sent without user permission. */ 77 /** Default number of SMS sent in checking period without user permission. */ 101 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */ 104 /** Default premium SMS permission (ask user for each premium SMS sent). */ 107 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */ 110 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */ 143 /** Directory for per-app SMS permission XML file. */ 146 /** Per-app SMS permission XML filename. */ 185 /** XML attribute for the package's premium SMS permission (integer type). */ 538 * Returns the premium SMS permission fo 569 setPremiumSmsPermission(String packageName, int permission) argument [all...] |
/frameworks/native/libs/binder/ |
H A D | IPermissionController.cpp | 40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 44 data.writeString16(permission); 65 String16 permission = data.readString16(); local 68 bool res = checkPermission(permission, pid, uid);
|
H A D | IServiceManager.cpp | 49 bool checkCallingPermission(const String16& permission) argument 51 return checkCallingPermission(permission, NULL, NULL); 54 static String16 _permission("permission"); 57 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument 64 return checkPermission(permission, pid, uid); 67 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 78 bool res = pc->checkPermission(permission, pid, uid); 83 String8(permission).string(), uid, pid); 88 // Is this a permission failure, or did the controller go away? 91 String8(permission) [all...] |
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_ 37 check(bool* granted, const String16& permission, uid_t uid) const argument 81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ActivityManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
H A D | PmPermissionsTests.java | 17 package com.android.framework.permission.tests; 29 private String mPkgName = "com.android.framework.permission.tests"; 38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission 39 * android.permission.GET_PACKAGE_SIZE 53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission 54 * android.permission.DELETE_CACHE_FILES 68 * This test verifies that PackageManger.installPackage enforces permission 69 * android.permission.INSTALL_PACKAGES 84 * enforces permission android.permission [all...] |
H A D | ServiceManagerPermissionTests.java | 17 package com.android.framework.permission.tests; 52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
|
H A D | SmsManagerPermissionTest.java | 17 package com.android.framework.permission.tests; 38 * {@link android.Manifest.permission#SEND_SMS}. 54 * {@link android.Manifest.permission#SEND_SMS}. 70 * {@link android.Manifest.permission#SEND_MMS}.
|
H A D | VibratorServicePermissionTest.java | 17 package com.android.framework.permission.tests; 43 * <p>Tests permission: 44 * {@link android.Manifest.permission#VIBRATE} 59 * <p>Tests permission: 60 * {@link android.Manifest.permission#VIBRATE} 74 * <p>Tests permission: 75 * {@link android.Manifest.permission#VIBRATE}
|
H A D | WindowManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
/frameworks/base/services/java/com/android/server/ |
H A D | AppWidgetService.java | 179 public void setBindAppWidgetPermission(String packageName, boolean permission) argument 182 packageName, permission); 313 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
|
H A D | AppWidgetServiceImpl.java | 366 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP) 602 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BIND_APPWIDGET, 610 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BIND_APPWIDGET, null); 637 android.Manifest.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS, 646 public void setBindAppWidgetPermission(String packageName, boolean permission) { argument 648 android.Manifest.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS, 653 if (permission) { 674 if (!android.Manifest.permission.BIND_REMOTEVIEWS.equals(si.permission)) { 676 + android.Manifest.permission [all...] |
H A D | WallpaperManagerService.java | 631 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS); 719 checkPermission(android.Manifest.permission.SET_WALLPAPER); 766 checkPermission(android.Manifest.permission.SET_WALLPAPER_COMPONENT); 824 if (!android.Manifest.permission.BIND_WALLPAPER.equals(si.permission)) { 826 + android.Manifest.permission.BIND_WALLPAPER 987 private void checkPermission(String permission) { argument 988 if (PackageManager.PERMISSION_GRANTED!= mContext.checkCallingOrSelfPermission(permission)) { 990 + ", must have permission " + permission); [all...] |
/frameworks/base/services/java/com/android/server/accessibility/ |
H A D | AccessibilityManagerService.java | 512 mSecurityPolicy.enforceCallingPermission(Manifest.permission.RETRIEVE_WINDOW_CONTENT, 543 Manifest.permission.TEMPORARY_ENABLE_ACCESSIBILITY, 793 if (!android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE.equals( 794 serviceInfo.permission)) { 797 + ": it does not require the permission " 798 + android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE); 1944 // not have permission to access the window content. 2280 if (!hasPermission(Manifest.permission.INTERACT_ACROSS_USERS) 2281 && !hasPermission(Manifest.permission.INTERACT_ACROSS_USERS_FULL)) { 2283 + userId + " without permission INTERACT_ACROSS_USER 2310 enforceCallingPermission(String permission, String function) argument 2320 hasPermission(String permission) argument [all...] |
/frameworks/base/services/java/com/android/server/am/ |
H A D | ActiveServices.java | 234 return new ComponentName("!", res.permission != null 235 ? res.permission : "private to package"); 306 // r.record is null if findServiceLocked() failed the caller permission check 312 + " requires " + r.permission); 680 final String permission; field in class:ActiveServices.ServiceLookupResult 684 permission = _permission; 776 if (mAm.checkComponentPermission(r.permission, 790 + " requires " + r.permission); 791 return new ServiceLookupResult(null, r.permission); 1761 android.Manifest.permission [all...] |
H A D | ActivityManagerService.java | 1375 ServiceManager.addService("permission", new PermissionController(m)); 1493 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) 1497 + " without permission " + android.Manifest.permission.DUMP); 1514 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) 1518 + " without permission " + android.Manifest.permission.DUMP); 1534 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) 1538 + " without permission " + android.Manifest.permission 4860 checkPermission(String permission, int pid, int uid) argument 4869 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 4899 checkPermission(String permission, int pid, int uid) argument 4910 checkCallingPermission(String permission) argument 4919 enforceCallingPermission(String permission, String func) argument 11311 registerReceiver(IApplicationThread caller, String callerPackage, IIntentReceiver receiver, IntentFilter filter, String permission, int userId) argument [all...] |
H A D | ServiceRecord.java | 69 final String permission;// permission needed to access service field in class:ServiceRecord 204 if (permission != null) { 205 pw.print(prefix); pw.print("permission="); pw.println(permission); 295 permission = sInfo.permission;
|
/frameworks/base/services/java/com/android/server/dreams/ |
H A D | DreamManagerService.java | 86 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG); 107 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 120 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 136 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 152 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 161 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 179 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 206 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); 223 // Requires no permission, called by Dream from an arbitrary process. 333 private void checkPermission(String permission) { argument [all...] |
/frameworks/base/services/java/com/android/server/input/ |
H A D | InputManagerService.java | 528 Slog.w(TAG, "Input event injection from pid " + pid + " permission denied."); 530 "Injecting to another application requires INJECT_EVENTS permission"); 910 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 912 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 947 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 949 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 975 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 977 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 1082 if (!checkCallingPermission(android.Manifest.permission.SET_POINTER_SPEED, 1084 throw new SecurityException("Requires SET_POINTER_SPEED permission"); 1228 checkCallingPermission(String permission, String func) argument [all...] |
/frameworks/base/services/java/com/android/server/pm/ |
H A D | PackageManagerService.java | 19 import static android.Manifest.permission.GRANT_REVOKE_PERMISSIONS; 20 import static android.Manifest.permission.READ_EXTERNAL_STORAGE; 338 // These are the built-in uid -> permission mappings that were read from the 379 // Mapping from permission names to info about them. 1286 // we need to re-grant app permission to catch any new ones that 1346 .contains(android.Manifest.permission.PACKAGE_VERIFICATION_AGENT)) { 1390 // Read permissions from .../etc/permission directory. 1460 } else if ("permission".equals(name)) { 1463 Slog.w(TAG, "<permission> without name at " 1471 } else if ("assign-permission" 10125 setPermissionEnforced(String permission, boolean enforced) argument 10154 isPermissionEnforced(String permission) argument 10165 isPermissionEnforcedDefault(String permission) argument 10179 isPermissionEnforcedLocked(String permission, boolean enforcedDefault) argument [all...] |
/frameworks/base/services/java/com/android/server/wm/ |
H A D | WindowManagerService.java | 2730 // if they don't have this permission, mask out the status bar bits 2735 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR) 3080 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO, 3082 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission."); 3092 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO, 3094 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission."); 3107 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO, 3109 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission."); 3131 android.Manifest.permission.MAGNIFY_DISPLAY, "magnifyDisplay()")) { 3132 throw new SecurityException("Requires MAGNIFY_DISPLAY permission"); 3605 checkCallingPermission(String permission, String func) argument [all...] |
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockContext.java | 435 public int checkPermission(String permission, int pid, int uid) { argument 440 public int checkCallingPermission(String permission) { argument 445 public int checkCallingOrSelfPermission(String permission) { argument 451 String permission, int pid, int uid, String message) { 456 public void enforceCallingPermission(String permission, String message) { argument 461 public void enforceCallingOrSelfPermission(String permission, String message) { argument 450 enforcePermission( String permission, int pid, int uid, String message) argument
|