/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | IccSmsInterfaceManager.java | 177 Manifest.permission.RECEIVE_SMS, message); 179 Manifest.permission.SEND_SMS, message); 290 Manifest.permission.RECEIVE_SMS, 348 Manifest.permission.SEND_SMS, 391 Manifest.permission.SEND_SMS, 457 Manifest.permission.SEND_SMS, 512 public void setPremiumSmsPermission(String packageName, int permission) { argument 513 mDispatcher.setPremiumSmsPermission(packageName, permission); 603 "android.permission.RECEIVE_SMS", 630 "android.permission [all...] |
H A D | SmsUsageMonitor.java | 71 /** Default checking period for SMS sent without user permission. */ 74 /** Default number of SMS sent in checking period without user permission. */ 98 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */ 101 /** Default premium SMS permission (ask user for each premium SMS sent). */ 104 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */ 107 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */ 137 /** Directory for per-app SMS permission XML file. */ 140 /** Per-app SMS permission XML filename. */ 179 /** XML attribute for the package's premium SMS permission (integer type). */ 532 * Returns the premium SMS permission fo 563 setPremiumSmsPermission(String packageName, int permission) argument [all...] |
H A D | InboundSmsHandler.java | 593 mContext.sendBroadcast(intent, android.Manifest.permission.RECEIVE_SMS); 790 String carrierFilterSmsPerm = "android.permission.CARRIER_FILTER_SMS"; 808 * Dispatch the intent with the specified permission, appOp, and result receiver, using 812 * @param permission receivers are required to have this permission 816 protected void dispatchIntent(Intent intent, String permission, int appOp, argument 846 mContext.sendOrderedBroadcastAsUser(intent, targetUser, permission, appOp, 851 mContext.sendOrderedBroadcastAsUser(intent, user, permission, appOp, 913 dispatchIntent(intent, android.Manifest.permission.RECEIVE_SMS, 1043 dispatchIntent(intent, android.Manifest.permission [all...] |
H A D | SMSDispatcher.java | 92 "android.permission.SEND_SMS_NO_CONFIRMATION"; 1030 // Wait for user confirmation unless the user has set permission to always allow/deny 1181 * Returns the premium SMS permission for the specified package. If the package has never 1184 * @param packageName the name of the package to query permission 1195 * Sets the premium SMS permission for the specified package and save the value asynchronously 1197 * @param packageName the name of the package to set permission 1198 * @param permission one of {@link SmsUsageMonitor#PREMIUM_SMS_PERMISSION_ASK_USER}, 1202 public void setPremiumSmsPermission(String packageName, int permission) { argument 1203 mUsageMonitor.setPremiumSmsPermission(packageName, permission); 1614 // Always set the SMS permission s [all...] |
/frameworks/base/core/java/android/content/ |
H A D | ContentProvider.java | 20 import static android.Manifest.permission.INTERACT_ACROSS_USERS; 142 * @param writePermission The write permission you want this instance should have 500 // <path-permission> below removes this ability 513 // any denied <path-permission> means we lose 522 // if we passed <path-permission> checks above, and no default 523 // <provider> permission, then allow access. 568 // <path-permission> below removes this ability 581 // any denied <path-permission> means we lose 590 // if we passed <path-permission> checks above, and no default 591 // <provider> permission, the 691 setReadPermission(String permission) argument 713 setWritePermission(String permission) argument [all...] |
H A D | ContextWrapper.java | 566 public int checkPermission(String permission, int pid, int uid) { argument 567 return mBase.checkPermission(permission, pid, uid); 572 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 573 return mBase.checkPermission(permission, pid, uid, callerToken); 577 public int checkCallingPermission(String permission) { argument 578 return mBase.checkCallingPermission(permission); 582 public int checkCallingOrSelfPermission(String permission) { argument 583 return mBase.checkCallingOrSelfPermission(permission); 588 String permission, int pid, int uid, String message) { 589 mBase.enforcePermission(permission, pi 587 enforcePermission( String permission, int pid, int uid, String message) argument 593 enforceCallingPermission(String permission, String message) argument 598 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
H A D | Context.java | 688 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to 696 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} 697 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required. 800 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to 808 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} 809 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required. 912 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to 920 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} 921 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required. 1160 * <p>This method requires the caller to hold the permission 2935 checkPermission(@onNull String permission, int pid, int uid) argument 2939 checkPermission(@onNull String permission, int pid, int uid, IBinder callerToken) argument 2964 checkCallingPermission(@onNull String permission) argument 2983 checkCallingOrSelfPermission(@onNull String permission) argument 2997 enforcePermission( @onNull String permission, int pid, int uid, @Nullable String message) argument 3018 enforceCallingPermission( @onNull String permission, @Nullable String message) argument 3034 enforceCallingOrSelfPermission( @onNull String permission, @Nullable String message) argument [all...] |
/frameworks/base/services/core/java/com/android/server/wallpaper/ |
H A D | WallpaperManagerService.java | 694 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS); 748 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS); 825 checkPermission(android.Manifest.permission.SET_WALLPAPER); 872 checkPermission(android.Manifest.permission.SET_WALLPAPER_COMPONENT); 929 if (!android.Manifest.permission.BIND_WALLPAPER.equals(si.permission)) { 931 + android.Manifest.permission.BIND_WALLPAPER 1093 private void checkPermission(String permission) { argument 1094 if (PackageManager.PERMISSION_GRANTED!= mContext.checkCallingOrSelfPermission(permission)) { 1096 + ", must have permission " [all...] |
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockContext.java | 483 public int checkPermission(String permission, int pid, int uid) { argument 489 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 490 return checkPermission(permission, pid, uid); 494 public int checkCallingPermission(String permission) { argument 499 public int checkCallingOrSelfPermission(String permission) { argument 505 String permission, int pid, int uid, String message) { 510 public void enforceCallingPermission(String permission, String message) { argument 515 public void enforceCallingOrSelfPermission(String permission, String message) { argument 504 enforcePermission( String permission, int pid, int uid, String message) argument
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | NetworkManagementService.java | 19 import static android.Manifest.permission.CONNECTIVITY_INTERNAL; 20 import static android.Manifest.permission.DUMP; 21 import static android.Manifest.permission.SHUTDOWN; 2076 public void setPermission(String permission, int[] uids) { argument 2080 argv[0] = "permission"; 2083 argv[3] = permission; 2104 argv[0] = "permission";
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActiveServices.java | 326 return new ComponentName("!", res.permission != null 327 ? res.permission : "private to package"); 509 // r.record is null if findServiceLocked() failed the caller permission check 515 + " requires " + r.permission); 733 mAm.enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS, 989 final String permission; field in class:ActiveServices.ServiceLookupResult 993 permission = _permission; 1086 if (mAm.checkComponentPermission(r.permission, 1100 + " requires " + r.permission); 1101 return new ServiceLookupResult(null, r.permission); [all...] |
H A D | ActivityManagerService.java | 19 import static android.Manifest.permission.INTERACT_ACROSS_USERS; 20 import static android.Manifest.permission.INTERACT_ACROSS_USERS_FULL; 21 import static android.Manifest.permission.START_TASKS_FROM_RECENTS; 1913 ServiceManager.addService("permission", new PermissionController(this)); 1964 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) 1968 + " without permission " + android.Manifest.permission.DUMP); 1984 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) 1988 + " without permission " + android.Manifest.permission 6800 checkPermission(String permission, int pid, int uid) argument 6808 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 6823 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 6842 checkPermission(String permission, int pid, int uid) argument 6850 checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument 6873 checkCallingPermission(String permission) argument 6882 enforceCallingPermission(String permission, String func) argument 15564 registerReceiver(IApplicationThread caller, String callerPackage, IIntentReceiver receiver, IntentFilter filter, String permission, int userId) argument [all...] |
/frameworks/base/core/java/android/app/ |
H A D | ActivityManager.java | 111 * caller does not have permission to start the activity. 210 * a sticky intent without appropriate permission. 973 * the {@link android.Manifest.permission#INTERACT_ACROSS_USERS_FULL} permission. 1376 * the caller hold permission {@link android.Manifest.permission#REORDER_TASKS} 2280 * <p>You must hold the permission 2281 * {@link android.Manifest.permission#KILL_BACKGROUND_PROCESSES} to be able to 2303 * <p>You must hold the permission 2304 * {@link android.Manifest.permission#FORCE_STOP_PACKAGE 2469 checkComponentPermission(String permission, int uid, int owningUid, boolean exported) argument 2508 checkUidPermission(String permission, int uid) argument [all...] |
H A D | ContextImpl.java | 1718 + " without permission " + cn.getClassName()); 1859 public int checkPermission(String permission, int pid, int uid) { argument 1860 if (permission == null) { 1861 throw new IllegalArgumentException("permission is null"); 1866 permission, pid, uid); 1874 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 1875 if (permission == null) { 1876 throw new IllegalArgumentException("permission is null"); 1881 permission, pid, uid, callerToken); 1888 public int checkCallingPermission(String permission) { argument 1901 checkCallingOrSelfPermission(String permission) argument 1910 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument 1924 enforcePermission( String permission, int pid, int uid, String message) argument 1933 enforceCallingPermission(String permission, String message) argument 1941 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
H A D | ActivityManagerNative.java | 97 * If you don't care about permission, use null. 99 static public void broadcastStickyIntent(Intent intent, String permission, int userId) { argument 103 null /*permission*/, AppOpsManager.OP_NONE, false, true, userId); 3873 public int checkPermission(String permission, int pid, int uid) argument 3878 data.writeString(permission); 3888 public int checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument 3893 data.writeString(permission);
|
H A D | IActivityManager.java | 221 public int checkPermission(String permission, int pid, int uid) argument 223 public int checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument
|
/frameworks/base/services/core/java/com/android/server/input/ |
H A D | InputManagerService.java | 555 Slog.w(TAG, "Input event injection from pid " + pid + " permission denied."); 557 "Injecting to another application requires INJECT_EVENTS permission"); 751 if (!checkCallingPermission(android.Manifest.permission.SET_INPUT_CALIBRATION, 753 throw new SecurityException("Requires SET_INPUT_CALIBRATION permission"); 1032 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 1034 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 1071 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 1073 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 1100 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 1102 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 1359 checkCallingPermission(String permission, String func) argument [all...] |
/frameworks/base/tools/aapt/ |
H A D | Command.cpp | 369 printf("uses-permission: name='%s'", ResTable::normalizeForOutput(name.string()).string()); 376 printf("optional-permission: name='%s'", 386 printf("uses-implied-permission: name='%s' reason='%s'\n", 740 } else if (depth == 2 && tag == "permission") { 747 printf("permission: %s\n", 749 } else if (depth == 2 && tag == "uses-permission") { 863 // heuristic is "if an app requests a permission but doesn't explicitly 867 // have no corresponding permission, so we cannot implement any 1300 } else if (tag == "uses-permission") { 1303 if (name == "android.permission 1522 String8 permission = AaptXml::getAttribute(tree, PERMISSION_ATTR, local 1542 String8 permission = AaptXml::getAttribute(tree, PERMISSION_ATTR, local 1581 String8 permission = AaptXml::getResolvedAttribute(res, tree, local [all...] |
/frameworks/base/services/accessibility/java/com/android/server/accessibility/ |
H A D | AccessibilityManagerService.java | 619 mSecurityPolicy.enforceCallingPermission(Manifest.permission.RETRIEVE_WINDOW_CONTENT, 680 Manifest.permission.TEMPORARY_ENABLE_ACCESSIBILITY, 712 Manifest.permission.RETRIEVE_WINDOW_TOKEN, 953 if (!android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE.equals( 954 serviceInfo.permission)) { 957 + ": it does not require the permission " 958 + android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE); 1397 // use to get a permission to white list the service. 1552 // use to get a permission to white list the service. 1625 mSecurityPolicy.enforceCallingPermission(Manifest.permission 3653 enforceCallingPermission(String permission, String function) argument 3664 hasPermission(String permission) argument [all...] |
/frameworks/base/core/java/android/view/ |
H A D | ViewRootImpl.java | 588 " -- permission denied for this window type"); 6528 private static int checkCallingPermission(String permission) { argument 6531 permission, Binder.getCallingPid(), Binder.getCallingUid()); 6543 if (checkCallingPermission(Manifest.permission.DUMP) !=
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PackageManagerService.java | 19 import static android.Manifest.permission.GRANT_REVOKE_PERMISSIONS; 20 import static android.Manifest.permission.READ_EXTERNAL_STORAGE; 256 // Cap the size of permission trees that 3rd party apps can define 449 // Mapping from permission names to info about them. 464 /** Set of packages associated with each app op permission. */ 1369 // Propagate permission configuration in to package manager. 1749 // we need to re-grant app permission to catch any new ones that 1844 .contains(android.Manifest.permission.PACKAGE_VERIFICATION_AGENT)) { 2168 android.Manifest.permission.CLEAR_APP_CACHE, null); 2194 android.Manifest.permission 13427 setPermissionEnforced(String permission, boolean enforced) argument 13456 isPermissionEnforced(String permission) argument [all...] |
/frameworks/base/services/core/java/com/android/server/wm/ |
H A D | WindowManagerService.java | 3007 mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR) 3029 // if they don't have the permission, mask out the status bar bits 3496 boolean checkCallingPermission(String permission, String func) { argument 3497 // Quick check: if the calling permission is me, it's all okay. 3502 if (mContext.checkCallingPermission(permission) 3509 + " requires " + permission; 3528 if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS, 3530 throw new SecurityException("Requires MANAGE_APP_TOKENS permission"); 3549 if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS, 3551 throw new SecurityException("Requires MANAGE_APP_TOKENS permission"); [all...] |