/frameworks/base/services/core/java/com/android/server/media/projection/ |
H A D | MediaProjectionManagerService.java | 57 * as well as the capabilities they grant. Any service using MediaProjection tokens as permission 218 android.Manifest.permission.CAPTURE_VIDEO_OUTPUT) 231 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 234 + "projection permission"); 261 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 276 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 294 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 309 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 325 || mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP) 341 private boolean checkPermission(String packageName, String permission) { argument [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PackageManagerService.java | 19 import static android.Manifest.permission.GRANT_REVOKE_PERMISSIONS; 20 import static android.Manifest.permission.READ_EXTERNAL_STORAGE; 256 // Cap the size of permission trees that 3rd party apps can define 449 // Mapping from permission names to info about them. 464 /** Set of packages associated with each app op permission. */ 1369 // Propagate permission configuration in to package manager. 1749 // we need to re-grant app permission to catch any new ones that 1844 .contains(android.Manifest.permission.PACKAGE_VERIFICATION_AGENT)) { 2168 android.Manifest.permission.CLEAR_APP_CACHE, null); 2194 android.Manifest.permission 13427 setPermissionEnforced(String permission, boolean enforced) argument 13456 isPermissionEnforced(String permission) argument [all...] |
/frameworks/base/services/core/java/com/android/server/wallpaper/ |
H A D | WallpaperManagerService.java | 694 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS); 748 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS); 825 checkPermission(android.Manifest.permission.SET_WALLPAPER); 872 checkPermission(android.Manifest.permission.SET_WALLPAPER_COMPONENT); 929 if (!android.Manifest.permission.BIND_WALLPAPER.equals(si.permission)) { 931 + android.Manifest.permission.BIND_WALLPAPER 1093 private void checkPermission(String permission) { argument 1094 if (PackageManager.PERMISSION_GRANTED!= mContext.checkCallingOrSelfPermission(permission)) { 1096 + ", must have permission " [all...] |
/frameworks/base/services/core/java/com/android/server/wm/ |
H A D | WindowManagerService.java | 3007 mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR) 3029 // if they don't have the permission, mask out the status bar bits 3496 boolean checkCallingPermission(String permission, String func) { argument 3497 // Quick check: if the calling permission is me, it's all okay. 3502 if (mContext.checkCallingPermission(permission) 3509 + " requires " + permission; 3528 if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS, 3530 throw new SecurityException("Requires MANAGE_APP_TOKENS permission"); 3549 if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS, 3551 throw new SecurityException("Requires MANAGE_APP_TOKENS permission"); [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/accounts/ |
H A D | AccountManagerServiceTest.java | 236 public int checkCallingOrSelfPermission(final String permission) { argument
|
/frameworks/base/services/tests/servicestests/src/com/android/server/content/ |
H A D | SyncStorageEngineTest.java | 908 public void enforceCallingOrSelfPermission(String permission, String message) { argument
|
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockContext.java | 483 public int checkPermission(String permission, int pid, int uid) { argument 489 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 490 return checkPermission(permission, pid, uid); 494 public int checkCallingPermission(String permission) { argument 499 public int checkCallingOrSelfPermission(String permission) { argument 505 String permission, int pid, int uid, String message) { 510 public void enforceCallingPermission(String permission, String message) { argument 515 public void enforceCallingOrSelfPermission(String permission, String message) { argument 504 enforcePermission( String permission, int pid, int uid, String message) argument
|
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ActivityManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
H A D | PmPermissionsTests.java | 17 package com.android.framework.permission.tests; 29 private String mPkgName = "com.android.framework.permission.tests"; 38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission 39 * android.permission.GET_PACKAGE_SIZE 53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission 54 * android.permission.DELETE_CACHE_FILES 68 * This test verifies that PackageManger.installPackage enforces permission 69 * android.permission.INSTALL_PACKAGES 88 * enforces permission android.permission [all...] |
H A D | ServiceManagerPermissionTests.java | 17 package com.android.framework.permission.tests; 52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
|
H A D | SmsManagerPermissionTest.java | 17 package com.android.framework.permission.tests; 38 * {@link android.Manifest.permission#SEND_SMS}. 54 * {@link android.Manifest.permission#SEND_SMS}. 70 * {@link android.Manifest.permission#SEND_MMS}.
|
H A D | VibratorServicePermissionTest.java | 17 package com.android.framework.permission.tests; 45 * <p>Tests permission: 46 * {@link android.Manifest.permission#VIBRATE} 62 * <p>Tests permission: 63 * {@link android.Manifest.permission#VIBRATE} 78 * <p>Tests permission: 79 * {@link android.Manifest.permission#VIBRATE}
|
H A D | WindowManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
/frameworks/base/tools/aapt/ |
H A D | Command.cpp | 369 printf("uses-permission: name='%s'", ResTable::normalizeForOutput(name.string()).string()); 376 printf("optional-permission: name='%s'", 386 printf("uses-implied-permission: name='%s' reason='%s'\n", 740 } else if (depth == 2 && tag == "permission") { 747 printf("permission: %s\n", 749 } else if (depth == 2 && tag == "uses-permission") { 863 // heuristic is "if an app requests a permission but doesn't explicitly 867 // have no corresponding permission, so we cannot implement any 1300 } else if (tag == "uses-permission") { 1303 if (name == "android.permission 1522 String8 permission = AaptXml::getAttribute(tree, PERMISSION_ATTR, local 1542 String8 permission = AaptXml::getAttribute(tree, PERMISSION_ATTR, local 1581 String8 permission = AaptXml::getResolvedAttribute(res, tree, local [all...] |
/frameworks/native/libs/binder/ |
H A D | IPermissionController.cpp | 39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 43 data.writeString16(permission); 64 String16 permission = data.readString16(); local 67 bool res = checkPermission(permission, pid, uid);
|
H A D | IServiceManager.cpp | 50 bool checkCallingPermission(const String16& permission) argument 52 return checkCallingPermission(permission, NULL, NULL); 55 static String16 _permission("permission"); 58 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument 65 return checkPermission(permission, pid, uid); 68 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 79 bool res = pc->checkPermission(permission, pid, uid); 84 String8(permission).string(), uid, pid); 89 // Is this a permission failure, or did the controller go away? 92 String8(permission) [all...] |
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_ 37 check(bool* granted, const String16& permission, uid_t uid) const argument 81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | IccSmsInterfaceManager.java | 177 Manifest.permission.RECEIVE_SMS, message); 179 Manifest.permission.SEND_SMS, message); 290 Manifest.permission.RECEIVE_SMS, 348 Manifest.permission.SEND_SMS, 391 Manifest.permission.SEND_SMS, 457 Manifest.permission.SEND_SMS, 512 public void setPremiumSmsPermission(String packageName, int permission) { argument 513 mDispatcher.setPremiumSmsPermission(packageName, permission); 603 "android.permission.RECEIVE_SMS", 630 "android.permission [all...] |
H A D | InboundSmsHandler.java | 593 mContext.sendBroadcast(intent, android.Manifest.permission.RECEIVE_SMS); 790 String carrierFilterSmsPerm = "android.permission.CARRIER_FILTER_SMS"; 808 * Dispatch the intent with the specified permission, appOp, and result receiver, using 812 * @param permission receivers are required to have this permission 816 protected void dispatchIntent(Intent intent, String permission, int appOp, argument 846 mContext.sendOrderedBroadcastAsUser(intent, targetUser, permission, appOp, 851 mContext.sendOrderedBroadcastAsUser(intent, user, permission, appOp, 913 dispatchIntent(intent, android.Manifest.permission.RECEIVE_SMS, 1043 dispatchIntent(intent, android.Manifest.permission [all...] |
H A D | SMSDispatcher.java | 92 "android.permission.SEND_SMS_NO_CONFIRMATION"; 1030 // Wait for user confirmation unless the user has set permission to always allow/deny 1181 * Returns the premium SMS permission for the specified package. If the package has never 1184 * @param packageName the name of the package to query permission 1195 * Sets the premium SMS permission for the specified package and save the value asynchronously 1197 * @param packageName the name of the package to set permission 1198 * @param permission one of {@link SmsUsageMonitor#PREMIUM_SMS_PERMISSION_ASK_USER}, 1202 public void setPremiumSmsPermission(String packageName, int permission) { argument 1203 mUsageMonitor.setPremiumSmsPermission(packageName, permission); 1614 // Always set the SMS permission s [all...] |
H A D | SmsUsageMonitor.java | 71 /** Default checking period for SMS sent without user permission. */ 74 /** Default number of SMS sent in checking period without user permission. */ 98 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */ 101 /** Default premium SMS permission (ask user for each premium SMS sent). */ 104 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */ 107 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */ 137 /** Directory for per-app SMS permission XML file. */ 140 /** Per-app SMS permission XML filename. */ 179 /** XML attribute for the package's premium SMS permission (integer type). */ 532 * Returns the premium SMS permission fo 563 setPremiumSmsPermission(String packageName, int permission) argument [all...] |
H A D | UiccSmsController.java | 241 public void setPremiumSmsPermission(String packageName, int permission) { argument 242 setPremiumSmsPermissionForSubscriber(getPreferredSmsSubscription(), packageName, permission); 246 public void setPremiumSmsPermissionForSubscriber(int subId, String packageName, int permission) { argument 249 iccSmsIntMgr.setPremiumSmsPermission(packageName, permission);
|