Searched defs:permission (Results 26 - 47 of 47) sorted by relevance

12

/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DIccSmsInterfaceManager.java177 Manifest.permission.RECEIVE_SMS, message);
179 Manifest.permission.SEND_SMS, message);
290 Manifest.permission.RECEIVE_SMS,
348 Manifest.permission.SEND_SMS,
391 Manifest.permission.SEND_SMS,
457 Manifest.permission.SEND_SMS,
512 public void setPremiumSmsPermission(String packageName, int permission) { argument
513 mDispatcher.setPremiumSmsPermission(packageName, permission);
603 "android.permission.RECEIVE_SMS",
630 "android.permission
[all...]
H A DSmsUsageMonitor.java71 /** Default checking period for SMS sent without user permission. */
74 /** Default number of SMS sent in checking period without user permission. */
98 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */
101 /** Default premium SMS permission (ask user for each premium SMS sent). */
104 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */
107 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */
137 /** Directory for per-app SMS permission XML file. */
140 /** Per-app SMS permission XML filename. */
179 /** XML attribute for the package's premium SMS permission (integer type). */
532 * Returns the premium SMS permission fo
563 setPremiumSmsPermission(String packageName, int permission) argument
[all...]
H A DInboundSmsHandler.java593 mContext.sendBroadcast(intent, android.Manifest.permission.RECEIVE_SMS);
790 String carrierFilterSmsPerm = "android.permission.CARRIER_FILTER_SMS";
808 * Dispatch the intent with the specified permission, appOp, and result receiver, using
812 * @param permission receivers are required to have this permission
816 protected void dispatchIntent(Intent intent, String permission, int appOp, argument
846 mContext.sendOrderedBroadcastAsUser(intent, targetUser, permission, appOp,
851 mContext.sendOrderedBroadcastAsUser(intent, user, permission, appOp,
913 dispatchIntent(intent, android.Manifest.permission.RECEIVE_SMS,
1043 dispatchIntent(intent, android.Manifest.permission
[all...]
H A DSMSDispatcher.java92 "android.permission.SEND_SMS_NO_CONFIRMATION";
1030 // Wait for user confirmation unless the user has set permission to always allow/deny
1181 * Returns the premium SMS permission for the specified package. If the package has never
1184 * @param packageName the name of the package to query permission
1195 * Sets the premium SMS permission for the specified package and save the value asynchronously
1197 * @param packageName the name of the package to set permission
1198 * @param permission one of {@link SmsUsageMonitor#PREMIUM_SMS_PERMISSION_ASK_USER},
1202 public void setPremiumSmsPermission(String packageName, int permission) { argument
1203 mUsageMonitor.setPremiumSmsPermission(packageName, permission);
1614 // Always set the SMS permission s
[all...]
/frameworks/base/core/java/android/content/
H A DContentProvider.java20 import static android.Manifest.permission.INTERACT_ACROSS_USERS;
142 * @param writePermission The write permission you want this instance should have
500 // <path-permission> below removes this ability
513 // any denied <path-permission> means we lose
522 // if we passed <path-permission> checks above, and no default
523 // <provider> permission, then allow access.
568 // <path-permission> below removes this ability
581 // any denied <path-permission> means we lose
590 // if we passed <path-permission> checks above, and no default
591 // <provider> permission, the
691 setReadPermission(String permission) argument
713 setWritePermission(String permission) argument
[all...]
H A DContextWrapper.java566 public int checkPermission(String permission, int pid, int uid) { argument
567 return mBase.checkPermission(permission, pid, uid);
572 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument
573 return mBase.checkPermission(permission, pid, uid, callerToken);
577 public int checkCallingPermission(String permission) { argument
578 return mBase.checkCallingPermission(permission);
582 public int checkCallingOrSelfPermission(String permission) { argument
583 return mBase.checkCallingOrSelfPermission(permission);
588 String permission, int pid, int uid, String message) {
589 mBase.enforcePermission(permission, pi
587 enforcePermission( String permission, int pid, int uid, String message) argument
593 enforceCallingPermission(String permission, String message) argument
598 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
H A DContext.java688 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
696 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
697 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
800 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
808 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
809 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
912 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
920 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
921 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
1160 * <p>This method requires the caller to hold the permission
2935 checkPermission(@onNull String permission, int pid, int uid) argument
2939 checkPermission(@onNull String permission, int pid, int uid, IBinder callerToken) argument
2964 checkCallingPermission(@onNull String permission) argument
2983 checkCallingOrSelfPermission(@onNull String permission) argument
2997 enforcePermission( @onNull String permission, int pid, int uid, @Nullable String message) argument
3018 enforceCallingPermission( @onNull String permission, @Nullable String message) argument
3034 enforceCallingOrSelfPermission( @onNull String permission, @Nullable String message) argument
[all...]
/frameworks/base/services/core/java/com/android/server/wallpaper/
H A DWallpaperManagerService.java694 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS);
748 checkPermission(android.Manifest.permission.SET_WALLPAPER_HINTS);
825 checkPermission(android.Manifest.permission.SET_WALLPAPER);
872 checkPermission(android.Manifest.permission.SET_WALLPAPER_COMPONENT);
929 if (!android.Manifest.permission.BIND_WALLPAPER.equals(si.permission)) {
931 + android.Manifest.permission.BIND_WALLPAPER
1093 private void checkPermission(String permission) { argument
1094 if (PackageManager.PERMISSION_GRANTED!= mContext.checkCallingOrSelfPermission(permission)) {
1096 + ", must have permission "
[all...]
/frameworks/base/test-runner/src/android/test/mock/
H A DMockContext.java483 public int checkPermission(String permission, int pid, int uid) { argument
489 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument
490 return checkPermission(permission, pid, uid);
494 public int checkCallingPermission(String permission) { argument
499 public int checkCallingOrSelfPermission(String permission) { argument
505 String permission, int pid, int uid, String message) {
510 public void enforceCallingPermission(String permission, String message) { argument
515 public void enforceCallingOrSelfPermission(String permission, String message) { argument
504 enforcePermission( String permission, int pid, int uid, String message) argument
/frameworks/base/services/core/java/com/android/server/
H A DNetworkManagementService.java19 import static android.Manifest.permission.CONNECTIVITY_INTERNAL;
20 import static android.Manifest.permission.DUMP;
21 import static android.Manifest.permission.SHUTDOWN;
2076 public void setPermission(String permission, int[] uids) { argument
2080 argv[0] = "permission";
2083 argv[3] = permission;
2104 argv[0] = "permission";
/frameworks/base/services/core/java/com/android/server/am/
H A DActiveServices.java326 return new ComponentName("!", res.permission != null
327 ? res.permission : "private to package");
509 // r.record is null if findServiceLocked() failed the caller permission check
515 + " requires " + r.permission);
733 mAm.enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
989 final String permission; field in class:ActiveServices.ServiceLookupResult
993 permission = _permission;
1086 if (mAm.checkComponentPermission(r.permission,
1100 + " requires " + r.permission);
1101 return new ServiceLookupResult(null, r.permission);
[all...]
H A DActivityManagerService.java19 import static android.Manifest.permission.INTERACT_ACROSS_USERS;
20 import static android.Manifest.permission.INTERACT_ACROSS_USERS_FULL;
21 import static android.Manifest.permission.START_TASKS_FROM_RECENTS;
1913 ServiceManager.addService("permission", new PermissionController(this));
1964 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
1968 + " without permission " + android.Manifest.permission.DUMP);
1984 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
1988 + " without permission " + android.Manifest.permission
6800 checkPermission(String permission, int pid, int uid) argument
6808 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument
6823 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument
6842 checkPermission(String permission, int pid, int uid) argument
6850 checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument
6873 checkCallingPermission(String permission) argument
6882 enforceCallingPermission(String permission, String func) argument
15564 registerReceiver(IApplicationThread caller, String callerPackage, IIntentReceiver receiver, IntentFilter filter, String permission, int userId) argument
[all...]
/frameworks/base/core/java/android/app/
H A DActivityManager.java111 * caller does not have permission to start the activity.
210 * a sticky intent without appropriate permission.
973 * the {@link android.Manifest.permission#INTERACT_ACROSS_USERS_FULL} permission.
1376 * the caller hold permission {@link android.Manifest.permission#REORDER_TASKS}
2280 * <p>You must hold the permission
2281 * {@link android.Manifest.permission#KILL_BACKGROUND_PROCESSES} to be able to
2303 * <p>You must hold the permission
2304 * {@link android.Manifest.permission#FORCE_STOP_PACKAGE
2469 checkComponentPermission(String permission, int uid, int owningUid, boolean exported) argument
2508 checkUidPermission(String permission, int uid) argument
[all...]
H A DContextImpl.java1718 + " without permission " + cn.getClassName());
1859 public int checkPermission(String permission, int pid, int uid) { argument
1860 if (permission == null) {
1861 throw new IllegalArgumentException("permission is null");
1866 permission, pid, uid);
1874 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument
1875 if (permission == null) {
1876 throw new IllegalArgumentException("permission is null");
1881 permission, pid, uid, callerToken);
1888 public int checkCallingPermission(String permission) { argument
1901 checkCallingOrSelfPermission(String permission) argument
1910 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument
1924 enforcePermission( String permission, int pid, int uid, String message) argument
1933 enforceCallingPermission(String permission, String message) argument
1941 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
H A DActivityManagerNative.java97 * If you don't care about permission, use null.
99 static public void broadcastStickyIntent(Intent intent, String permission, int userId) { argument
103 null /*permission*/, AppOpsManager.OP_NONE, false, true, userId);
3873 public int checkPermission(String permission, int pid, int uid) argument
3878 data.writeString(permission);
3888 public int checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument
3893 data.writeString(permission);
H A DIActivityManager.java221 public int checkPermission(String permission, int pid, int uid) argument
223 public int checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument
/frameworks/base/services/core/java/com/android/server/input/
H A DInputManagerService.java555 Slog.w(TAG, "Input event injection from pid " + pid + " permission denied.");
557 "Injecting to another application requires INJECT_EVENTS permission");
751 if (!checkCallingPermission(android.Manifest.permission.SET_INPUT_CALIBRATION,
753 throw new SecurityException("Requires SET_INPUT_CALIBRATION permission");
1032 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
1034 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
1071 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
1073 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
1100 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
1102 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
1359 checkCallingPermission(String permission, String func) argument
[all...]
/frameworks/base/tools/aapt/
H A DCommand.cpp369 printf("uses-permission: name='%s'", ResTable::normalizeForOutput(name.string()).string());
376 printf("optional-permission: name='%s'",
386 printf("uses-implied-permission: name='%s' reason='%s'\n",
740 } else if (depth == 2 && tag == "permission") {
747 printf("permission: %s\n",
749 } else if (depth == 2 && tag == "uses-permission") {
863 // heuristic is "if an app requests a permission but doesn't explicitly
867 // have no corresponding permission, so we cannot implement any
1300 } else if (tag == "uses-permission") {
1303 if (name == "android.permission
1522 String8 permission = AaptXml::getAttribute(tree, PERMISSION_ATTR, local
1542 String8 permission = AaptXml::getAttribute(tree, PERMISSION_ATTR, local
1581 String8 permission = AaptXml::getResolvedAttribute(res, tree, local
[all...]
/frameworks/base/services/accessibility/java/com/android/server/accessibility/
H A DAccessibilityManagerService.java619 mSecurityPolicy.enforceCallingPermission(Manifest.permission.RETRIEVE_WINDOW_CONTENT,
680 Manifest.permission.TEMPORARY_ENABLE_ACCESSIBILITY,
712 Manifest.permission.RETRIEVE_WINDOW_TOKEN,
953 if (!android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE.equals(
954 serviceInfo.permission)) {
957 + ": it does not require the permission "
958 + android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE);
1397 // use to get a permission to white list the service.
1552 // use to get a permission to white list the service.
1625 mSecurityPolicy.enforceCallingPermission(Manifest.permission
3653 enforceCallingPermission(String permission, String function) argument
3664 hasPermission(String permission) argument
[all...]
/frameworks/base/core/java/android/view/
H A DViewRootImpl.java588 " -- permission denied for this window type");
6528 private static int checkCallingPermission(String permission) { argument
6531 permission, Binder.getCallingPid(), Binder.getCallingUid());
6543 if (checkCallingPermission(Manifest.permission.DUMP) !=
/frameworks/base/services/core/java/com/android/server/pm/
H A DPackageManagerService.java19 import static android.Manifest.permission.GRANT_REVOKE_PERMISSIONS;
20 import static android.Manifest.permission.READ_EXTERNAL_STORAGE;
256 // Cap the size of permission trees that 3rd party apps can define
449 // Mapping from permission names to info about them.
464 /** Set of packages associated with each app op permission. */
1369 // Propagate permission configuration in to package manager.
1749 // we need to re-grant app permission to catch any new ones that
1844 .contains(android.Manifest.permission.PACKAGE_VERIFICATION_AGENT)) {
2168 android.Manifest.permission.CLEAR_APP_CACHE, null);
2194 android.Manifest.permission
13427 setPermissionEnforced(String permission, boolean enforced) argument
13456 isPermissionEnforced(String permission) argument
[all...]
/frameworks/base/services/core/java/com/android/server/wm/
H A DWindowManagerService.java3007 mContext.checkCallingOrSelfPermission(android.Manifest.permission.STATUS_BAR)
3029 // if they don't have the permission, mask out the status bar bits
3496 boolean checkCallingPermission(String permission, String func) { argument
3497 // Quick check: if the calling permission is me, it's all okay.
3502 if (mContext.checkCallingPermission(permission)
3509 + " requires " + permission;
3528 if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS,
3530 throw new SecurityException("Requires MANAGE_APP_TOKENS permission");
3549 if (!checkCallingPermission(android.Manifest.permission.MANAGE_APP_TOKENS,
3551 throw new SecurityException("Requires MANAGE_APP_TOKENS permission");
[all...]

Completed in 442 milliseconds

12