Searched defs:permission (Results 1 - 25 of 44) sorted by last modified time

12

/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DIccSmsInterfaceManager.java46 "android.permission.RECEIVE_SMS", message);
48 "android.permission.SEND_SMS", message);
79 "android.permission.SEND_SMS",
116 "android.permission.SEND_SMS",
154 "android.permission.SEND_SMS",
171 public void setPremiumSmsPermission(String packageName, int permission) { argument
172 mDispatcher.setPremiumSmsPermission(packageName, permission);
H A DIccSmsInterfaceManagerProxy.java93 public void setPremiumSmsPermission(String packageName, int permission) { argument
94 mIccSmsInterfaceManager.setPremiumSmsPermission(packageName, permission);
H A DSMSDispatcher.java89 public static final String RECEIVE_SMS_PERMISSION = "android.permission.RECEIVE_SMS";
93 "android.permission.RECEIVE_EMERGENCY_BROADCAST";
97 "android.permission.SEND_SMS_NO_CONFIRMATION";
388 * @param permission Receivers are required to have this permission
390 public void dispatch(Intent intent, String permission) { argument
394 mContext.sendOrderedBroadcast(intent, permission, mResultReceiver,
403 * @param permission Receivers are required to have this permission
406 public void dispatch(Intent intent, String permission, BroadcastReceive argument
1232 setPremiumSmsPermission(String packageName, int permission) argument
[all...]
H A DSmsUsageMonitor.java74 /** Default checking period for SMS sent without user permission. */
77 /** Default number of SMS sent in checking period without user permission. */
101 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */
104 /** Default premium SMS permission (ask user for each premium SMS sent). */
107 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */
110 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */
143 /** Directory for per-app SMS permission XML file. */
146 /** Per-app SMS permission XML filename. */
185 /** XML attribute for the package's premium SMS permission (integer type). */
538 * Returns the premium SMS permission fo
569 setPremiumSmsPermission(String packageName, int permission) argument
[all...]
/frameworks/native/libs/binder/
H A DIPermissionController.cpp40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument
44 data.writeString16(permission);
65 String16 permission = data.readString16(); local
68 bool res = checkPermission(permission, pid, uid);
H A DIServiceManager.cpp49 bool checkCallingPermission(const String16& permission) argument
51 return checkCallingPermission(permission, NULL, NULL);
54 static String16 _permission("permission");
57 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument
64 return checkPermission(permission, pid, uid);
67 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument
78 bool res = pc->checkPermission(permission, pid, uid);
83 String8(permission).string(), uid, pid);
88 // Is this a permission failure, or did the controller go away?
91 String8(permission)
[all...]
H A DPermissionCache.cpp38 const String16& permission, uid_t uid) const {
41 e.name = permission;
51 void PermissionCache::cache(const String16& permission, argument
55 ssize_t index = mPermissionNamesPool.indexOf(permission);
59 mPermissionNamesPool.add(permission);
60 e.name = permission;
63 // permission checks
77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument
78 return PermissionCache::checkCallingPermission(permission, NULL, NULL);
82 const String16& permission, int32_
37 check(bool* granted, const String16& permission, uid_t uid) const argument
81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument
91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument
[all...]
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/
H A DActivityManagerPermissionTests.java17 package com.android.framework.permission.tests;
H A DPmPermissionsTests.java17 package com.android.framework.permission.tests;
29 private String mPkgName = "com.android.framework.permission.tests";
38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission
39 * android.permission.GET_PACKAGE_SIZE
53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission
54 * android.permission.DELETE_CACHE_FILES
68 * This test verifies that PackageManger.installPackage enforces permission
69 * android.permission.INSTALL_PACKAGES
84 * enforces permission android.permission
[all...]
H A DServiceManagerPermissionTests.java17 package com.android.framework.permission.tests;
52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
H A DSmsManagerPermissionTest.java17 package com.android.framework.permission.tests;
38 * {@link android.Manifest.permission#SEND_SMS}.
54 * {@link android.Manifest.permission#SEND_SMS}.
70 * {@link android.Manifest.permission#SEND_MMS}.
H A DVibratorServicePermissionTest.java17 package com.android.framework.permission.tests;
43 * <p>Tests permission:
44 * {@link android.Manifest.permission#VIBRATE}
59 * <p>Tests permission:
60 * {@link android.Manifest.permission#VIBRATE}
74 * <p>Tests permission:
75 * {@link android.Manifest.permission#VIBRATE}
H A DWindowManagerPermissionTests.java17 package com.android.framework.permission.tests;
/frameworks/base/services/java/com/android/server/
H A DAppWidgetService.java179 public void setBindAppWidgetPermission(String packageName, boolean permission) argument
182 packageName, permission);
313 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
H A DAppWidgetServiceImpl.java366 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
602 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BIND_APPWIDGET,
610 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.BIND_APPWIDGET, null);
637 android.Manifest.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS,
646 public void setBindAppWidgetPermission(String packageName, boolean permission) { argument
648 android.Manifest.permission.MODIFY_APPWIDGET_BIND_PERMISSIONS,
653 if (permission) {
674 if (!android.Manifest.permission.BIND_REMOTEVIEWS.equals(si.permission)) {
676 + android.Manifest.permission
[all...]
H A DWallpaperManagerService.java631 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS);
719 checkPermission(android.Manifest.permission.SET_WALLPAPER);
766 checkPermission(android.Manifest.permission.SET_WALLPAPER_COMPONENT);
824 if (!android.Manifest.permission.BIND_WALLPAPER.equals(si.permission)) {
826 + android.Manifest.permission.BIND_WALLPAPER
987 private void checkPermission(String permission) { argument
988 if (PackageManager.PERMISSION_GRANTED!= mContext.checkCallingOrSelfPermission(permission)) {
990 + ", must have permission " + permission);
[all...]
/frameworks/base/services/java/com/android/server/accessibility/
H A DAccessibilityManagerService.java512 mSecurityPolicy.enforceCallingPermission(Manifest.permission.RETRIEVE_WINDOW_CONTENT,
543 Manifest.permission.TEMPORARY_ENABLE_ACCESSIBILITY,
793 if (!android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE.equals(
794 serviceInfo.permission)) {
797 + ": it does not require the permission "
798 + android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE);
1944 // not have permission to access the window content.
2280 if (!hasPermission(Manifest.permission.INTERACT_ACROSS_USERS)
2281 && !hasPermission(Manifest.permission.INTERACT_ACROSS_USERS_FULL)) {
2283 + userId + " without permission INTERACT_ACROSS_USER
2310 enforceCallingPermission(String permission, String function) argument
2320 hasPermission(String permission) argument
[all...]
/frameworks/base/services/java/com/android/server/am/
H A DActiveServices.java234 return new ComponentName("!", res.permission != null
235 ? res.permission : "private to package");
306 // r.record is null if findServiceLocked() failed the caller permission check
312 + " requires " + r.permission);
680 final String permission; field in class:ActiveServices.ServiceLookupResult
684 permission = _permission;
776 if (mAm.checkComponentPermission(r.permission,
790 + " requires " + r.permission);
791 return new ServiceLookupResult(null, r.permission);
1761 android.Manifest.permission
[all...]
H A DActivityManagerService.java1375 ServiceManager.addService("permission", new PermissionController(m));
1493 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
1497 + " without permission " + android.Manifest.permission.DUMP);
1514 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
1518 + " without permission " + android.Manifest.permission.DUMP);
1534 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
1538 + " without permission " + android.Manifest.permission
4860 checkPermission(String permission, int pid, int uid) argument
4869 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument
4899 checkPermission(String permission, int pid, int uid) argument
4910 checkCallingPermission(String permission) argument
4919 enforceCallingPermission(String permission, String func) argument
11311 registerReceiver(IApplicationThread caller, String callerPackage, IIntentReceiver receiver, IntentFilter filter, String permission, int userId) argument
[all...]
H A DServiceRecord.java69 final String permission;// permission needed to access service field in class:ServiceRecord
204 if (permission != null) {
205 pw.print(prefix); pw.print("permission="); pw.println(permission);
295 permission = sInfo.permission;
/frameworks/base/services/java/com/android/server/dreams/
H A DDreamManagerService.java86 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.DUMP, TAG);
107 checkPermission(android.Manifest.permission.READ_DREAM_STATE);
120 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE);
136 checkPermission(android.Manifest.permission.READ_DREAM_STATE);
152 checkPermission(android.Manifest.permission.READ_DREAM_STATE);
161 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE);
179 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE);
206 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE);
223 // Requires no permission, called by Dream from an arbitrary process.
333 private void checkPermission(String permission) { argument
[all...]
/frameworks/base/services/java/com/android/server/input/
H A DInputManagerService.java528 Slog.w(TAG, "Input event injection from pid " + pid + " permission denied.");
530 "Injecting to another application requires INJECT_EVENTS permission");
910 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
912 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
947 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
949 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
975 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
977 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
1082 if (!checkCallingPermission(android.Manifest.permission.SET_POINTER_SPEED,
1084 throw new SecurityException("Requires SET_POINTER_SPEED permission");
1228 checkCallingPermission(String permission, String func) argument
[all...]
/frameworks/base/services/java/com/android/server/pm/
H A DPackageManagerService.java19 import static android.Manifest.permission.GRANT_REVOKE_PERMISSIONS;
20 import static android.Manifest.permission.READ_EXTERNAL_STORAGE;
338 // These are the built-in uid -> permission mappings that were read from the
379 // Mapping from permission names to info about them.
1286 // we need to re-grant app permission to catch any new ones that
1346 .contains(android.Manifest.permission.PACKAGE_VERIFICATION_AGENT)) {
1390 // Read permissions from .../etc/permission directory.
1460 } else if ("permission".equals(name)) {
1463 Slog.w(TAG, "<permission> without name at "
1471 } else if ("assign-permission"
10125 setPermissionEnforced(String permission, boolean enforced) argument
10154 isPermissionEnforced(String permission) argument
10165 isPermissionEnforcedDefault(String permission) argument
10179 isPermissionEnforcedLocked(String permission, boolean enforcedDefault) argument
[all...]
/frameworks/base/services/java/com/android/server/wm/
H A DWindowManagerService.java2730 // if they don't have this permission, mask out the status bar bits
2735 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR)
3080 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO,
3082 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission.");
3092 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO,
3094 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission.");
3107 if (!checkCallingPermission(android.Manifest.permission.RETRIEVE_WINDOW_INFO,
3109 throw new SecurityException("Requires RETRIEVE_WINDOW_INFO permission.");
3131 android.Manifest.permission.MAGNIFY_DISPLAY, "magnifyDisplay()")) {
3132 throw new SecurityException("Requires MAGNIFY_DISPLAY permission");
3605 checkCallingPermission(String permission, String func) argument
[all...]
/frameworks/base/test-runner/src/android/test/mock/
H A DMockContext.java435 public int checkPermission(String permission, int pid, int uid) { argument
440 public int checkCallingPermission(String permission) { argument
445 public int checkCallingOrSelfPermission(String permission) { argument
451 String permission, int pid, int uid, String message) {
456 public void enforceCallingPermission(String permission, String message) { argument
461 public void enforceCallingOrSelfPermission(String permission, String message) { argument
450 enforcePermission( String permission, int pid, int uid, String message) argument

Completed in 278 milliseconds

12