Searched defs:permission (Results 26 - 47 of 47) sorted by path

12

/frameworks/base/services/core/java/com/android/server/media/projection/
H A DMediaProjectionManagerService.java57 * as well as the capabilities they grant. Any service using MediaProjection tokens as permission
218 android.Manifest.permission.CAPTURE_VIDEO_OUTPUT)
231 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
234 + "projection permission");
261 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
276 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
294 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
309 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
325 || mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP)
341 private boolean checkPermission(String packageName, String permission) { argument
[all...]
/frameworks/base/services/core/java/com/android/server/pm/
H A DPackageManagerService.java19 import static android.Manifest.permission.GRANT_REVOKE_PERMISSIONS;
20 import static android.Manifest.permission.READ_EXTERNAL_STORAGE;
256 // Cap the size of permission trees that 3rd party apps can define
449 // Mapping from permission names to info about them.
464 /** Set of packages associated with each app op permission. */
1369 // Propagate permission configuration in to package manager.
1749 // we need to re-grant app permission to catch any new ones that
1844 .contains(android.Manifest.permission.PACKAGE_VERIFICATION_AGENT)) {
2168 android.Manifest.permission.CLEAR_APP_CACHE, null);
2194 android.Manifest.permission
13427 setPermissionEnforced(String permission, boolean enforced) argument
13456 isPermissionEnforced(String permission) argument
[all...]
/frameworks/base/services/core/java/com/android/server/wallpaper/
H A DWallpaperManagerService.java694 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS);
748 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS);
825 checkPermission(android.Manifest.permission.SET_WALLPAPER);
872 checkPermission(android.Manifest.permission.SET_WALLPAPER_COMPONENT);
929 if (!android.Manifest.permission.BIND_WALLPAPER.equals(si.permission)) {
931 + android.Manifest.permission.BIND_WALLPAPER
1093 private void checkPermission(String permission) { argument
1094 if (PackageManager.PERMISSION_GRANTED!= mContext.checkCallingOrSelfPermission(permission)) {
1096 + ", must have permission "
[all...]
/frameworks/base/services/core/java/com/android/server/wm/
H A DWindowManagerService.java3007 mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR)
3029 // if they don't have the permission, mask out the status bar bits
3496 boolean checkCallingPermission(String permission, String func) { argument
3497 // Quick check: if the calling permission is me, it's all okay.
3502 if (mContext.checkCallingPermission(permission)
3509 + " requires " + permission;
3528 if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS,
3530 throw new SecurityException("Requires MANAGE_APP_TOKENS permission");
3549 if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS,
3551 throw new SecurityException("Requires MANAGE_APP_TOKENS permission");
[all...]
/frameworks/base/services/tests/servicestests/src/com/android/server/accounts/
H A DAccountManagerServiceTest.java236 public int checkCallingOrSelfPermission(final String permission) { argument
/frameworks/base/services/tests/servicestests/src/com/android/server/content/
H A DSyncStorageEngineTest.java908 public void enforceCallingOrSelfPermission(String permission, String message) { argument
/frameworks/base/test-runner/src/android/test/mock/
H A DMockContext.java483 public int checkPermission(String permission, int pid, int uid) { argument
489 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument
490 return checkPermission(permission, pid, uid);
494 public int checkCallingPermission(String permission) { argument
499 public int checkCallingOrSelfPermission(String permission) { argument
505 String permission, int pid, int uid, String message) {
510 public void enforceCallingPermission(String permission, String message) { argument
515 public void enforceCallingOrSelfPermission(String permission, String message) { argument
504 enforcePermission( String permission, int pid, int uid, String message) argument
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/
H A DActivityManagerPermissionTests.java17 package com.android.framework.permission.tests;
H A DPmPermissionsTests.java17 package com.android.framework.permission.tests;
29 private String mPkgName = "com.android.framework.permission.tests";
38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission
39 * android.permission.GET_PACKAGE_SIZE
53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission
54 * android.permission.DELETE_CACHE_FILES
68 * This test verifies that PackageManger.installPackage enforces permission
69 * android.permission.INSTALL_PACKAGES
88 * enforces permission android.permission
[all...]
H A DServiceManagerPermissionTests.java17 package com.android.framework.permission.tests;
52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
H A DSmsManagerPermissionTest.java17 package com.android.framework.permission.tests;
38 * {@link android.Manifest.permission#SEND_SMS}.
54 * {@link android.Manifest.permission#SEND_SMS}.
70 * {@link android.Manifest.permission#SEND_MMS}.
H A DVibratorServicePermissionTest.java17 package com.android.framework.permission.tests;
45 * <p>Tests permission:
46 * {@link android.Manifest.permission#VIBRATE}
62 * <p>Tests permission:
63 * {@link android.Manifest.permission#VIBRATE}
78 * <p>Tests permission:
79 * {@link android.Manifest.permission#VIBRATE}
H A DWindowManagerPermissionTests.java17 package com.android.framework.permission.tests;
/frameworks/base/tools/aapt/
H A DCommand.cpp369 printf("uses-permission: name='%s'", ResTable::normalizeForOutput(name.string()).string());
376 printf("optional-permission: name='%s'",
386 printf("uses-implied-permission: name='%s' reason='%s'\n",
740 } else if (depth == 2 && tag == "permission") {
747 printf("permission: %s\n",
749 } else if (depth == 2 && tag == "uses-permission") {
863 // heuristic is "if an app requests a permission but doesn't explicitly
867 // have no corresponding permission, so we cannot implement any
1300 } else if (tag == "uses-permission") {
1303 if (name == "android.permission
1522 String8 permission = AaptXml::getAttribute(tree, PERMISSION_ATTR, local
1542 String8 permission = AaptXml::getAttribute(tree, PERMISSION_ATTR, local
1581 String8 permission = AaptXml::getResolvedAttribute(res, tree, local
[all...]
/frameworks/native/libs/binder/
H A DIPermissionController.cpp39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument
43 data.writeString16(permission);
64 String16 permission = data.readString16(); local
67 bool res = checkPermission(permission, pid, uid);
H A DIServiceManager.cpp50 bool checkCallingPermission(const String16& permission) argument
52 return checkCallingPermission(permission, NULL, NULL);
55 static String16 _permission("permission");
58 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument
65 return checkPermission(permission, pid, uid);
68 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument
79 bool res = pc->checkPermission(permission, pid, uid);
84 String8(permission).string(), uid, pid);
89 // Is this a permission failure, or did the controller go away?
92 String8(permission)
[all...]
H A DPermissionCache.cpp38 const String16& permission, uid_t uid) const {
41 e.name = permission;
51 void PermissionCache::cache(const String16& permission, argument
55 ssize_t index = mPermissionNamesPool.indexOf(permission);
59 mPermissionNamesPool.add(permission);
60 e.name = permission;
63 // permission checks
77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument
78 return PermissionCache::checkCallingPermission(permission, NULL, NULL);
82 const String16& permission, int32_
37 check(bool* granted, const String16& permission, uid_t uid) const argument
81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument
91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument
[all...]
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DIccSmsInterfaceManager.java177 Manifest.permission.RECEIVE_SMS, message);
179 Manifest.permission.SEND_SMS, message);
290 Manifest.permission.RECEIVE_SMS,
348 Manifest.permission.SEND_SMS,
391 Manifest.permission.SEND_SMS,
457 Manifest.permission.SEND_SMS,
512 public void setPremiumSmsPermission(String packageName, int permission) { argument
513 mDispatcher.setPremiumSmsPermission(packageName, permission);
603 "android.permission.RECEIVE_SMS",
630 "android.permission
[all...]
H A DInboundSmsHandler.java593 mContext.sendBroadcast(intent, android.Manifest.permission.RECEIVE_SMS);
790 String carrierFilterSmsPerm = "android.permission.CARRIER_FILTER_SMS";
808 * Dispatch the intent with the specified permission, appOp, and result receiver, using
812 * @param permission receivers are required to have this permission
816 protected void dispatchIntent(Intent intent, String permission, int appOp, argument
846 mContext.sendOrderedBroadcastAsUser(intent, targetUser, permission, appOp,
851 mContext.sendOrderedBroadcastAsUser(intent, user, permission, appOp,
913 dispatchIntent(intent, android.Manifest.permission.RECEIVE_SMS,
1043 dispatchIntent(intent, android.Manifest.permission
[all...]
H A DSMSDispatcher.java92 "android.permission.SEND_SMS_NO_CONFIRMATION";
1030 // Wait for user confirmation unless the user has set permission to always allow/deny
1181 * Returns the premium SMS permission for the specified package. If the package has never
1184 * @param packageName the name of the package to query permission
1195 * Sets the premium SMS permission for the specified package and save the value asynchronously
1197 * @param packageName the name of the package to set permission
1198 * @param permission one of {@link SmsUsageMonitor#PREMIUM_SMS_PERMISSION_ASK_USER},
1202 public void setPremiumSmsPermission(String packageName, int permission) { argument
1203 mUsageMonitor.setPremiumSmsPermission(packageName, permission);
1614 // Always set the SMS permission s
[all...]
H A DSmsUsageMonitor.java71 /** Default checking period for SMS sent without user permission. */
74 /** Default number of SMS sent in checking period without user permission. */
98 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */
101 /** Default premium SMS permission (ask user for each premium SMS sent). */
104 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */
107 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */
137 /** Directory for per-app SMS permission XML file. */
140 /** Per-app SMS permission XML filename. */
179 /** XML attribute for the package's premium SMS permission (integer type). */
532 * Returns the premium SMS permission fo
563 setPremiumSmsPermission(String packageName, int permission) argument
[all...]
H A DUiccSmsController.java241 public void setPremiumSmsPermission(String packageName, int permission) { argument
242 setPremiumSmsPermissionForSubscriber(getPreferredSmsSubscription(), packageName, permission);
246 public void setPremiumSmsPermissionForSubscriber(int subId, String packageName, int permission) { argument
249 iccSmsIntMgr.setPremiumSmsPermission(packageName, permission);

Completed in 623 milliseconds

12