Searched refs:permission (Results 1 - 25 of 186) sorted by relevance

12345678

/frameworks/base/core/java/android/os/
H A DIPermissionController.aidl22 boolean checkPermission(String permission, int pid, int uid);
/frameworks/native/libs/binder/
H A DPermissionCache.cpp38 const String16& permission, uid_t uid) const {
41 e.name = permission;
51 void PermissionCache::cache(const String16& permission, argument
55 ssize_t index = mPermissionNamesPool.indexOf(permission);
59 mPermissionNamesPool.add(permission);
60 e.name = permission;
63 // permission checks
77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument
78 return PermissionCache::checkCallingPermission(permission, NULL, NULL);
82 const String16& permission, int32_
37 check(bool* granted, const String16& permission, uid_t uid) const argument
81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument
91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument
[all...]
H A DIPermissionController.cpp39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument
43 data.writeString16(permission);
64 String16 permission = data.readString16(); local
67 bool res = checkPermission(permission, pid, uid);
H A DIServiceManager.cpp50 bool checkCallingPermission(const String16& permission) argument
52 return checkCallingPermission(permission, NULL, NULL);
55 static String16 _permission("permission");
58 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument
65 return checkPermission(permission, pid, uid);
68 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument
79 bool res = pc->checkPermission(permission, pid, uid);
84 String8(permission).string(), uid, pid);
89 // Is this a permission failure, or did the controller go away?
92 String8(permission)
[all...]
/frameworks/base/services/core/java/com/android/server/firewall/
H A DSenderPermissionFilter.java31 private SenderPermissionFilter(String permission) { argument
32 mPermission = permission;
45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") {
49 String permission = parser.getAttributeValue(null, ATTR_NAME);
50 if (permission == null) {
54 return new SenderPermissionFilter(permission);
/frameworks/native/include/binder/
H A DPermissionCache.h31 * PermissionCache caches permission checks for a given uid.
33 * Currently the cache is not updated when there is a permission change,
51 // we pool all the permission names we see, as many permissions checks
57 // free the whole cache, but keep the permission name pool
61 const String16& permission, uid_t uid) const;
63 void cache(const String16& permission, uid_t uid, bool granted);
68 static bool checkCallingPermission(const String16& permission);
70 static bool checkCallingPermission(const String16& permission,
73 static bool checkPermission(const String16& permission,
H A DIServiceManager.h79 bool checkCallingPermission(const String16& permission);
80 bool checkCallingPermission(const String16& permission,
82 bool checkPermission(const String16& permission, pid_t pid, uid_t uid);
H A DIPermissionController.h32 virtual bool checkPermission(const String16& permission,
/frameworks/base/core/java/android/test/
H A DAndroidTestCase.java80 * Asserts that launching a given activity is protected by a particular permission by
82 * is thrown that mentions the permission in its error message.
89 * @param permission The name of the permission.
92 String packageName, String className, String permission) {
99 fail("expected security exception for " + permission);
102 assertTrue("error message should contain " + permission + ".",
103 expected.getMessage().contains(permission));
109 * Asserts that reading from the content uri requires a particular permission by querying the
110 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission
91 assertActivityRequiresPermission( String packageName, String className, String permission) argument
115 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument
134 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument
[all...]
/frameworks/base/core/java/android/content/pm/
H A DServiceInfo.java31 * Optional name of a permission required to be able to access this
32 * Service. From the "permission" attribute.
34 public String permission; field in class:ServiceInfo
72 permission = orig.permission;
78 pw.println(prefix + "permission=" + permission);
94 dest.writeString(permission);
110 permission = source.readString();
H A DActivityInfo.java135 * Optional name of a permission required to be able to access this
136 * Activity. From the "permission" attribute.
138 public String permission; field in class:ActivityInfo
651 permission = orig.permission;
685 if (permission != null) {
686 pw.println(prefix + "permission=" + permission);
722 dest.writeString(permission);
749 permission
[all...]
/frameworks/base/core/java/android/hardware/location/
H A DGeofenceHardwareService.java77 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE,
78 "Location Hardware permission not granted to access hardware geofence");
84 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE,
85 "Location Hardware permission not granted to access hardware geofence");
93 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE,
94 "Location Hardware permission not granted to access hardware geofence");
100 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE,
101 "Location Hardware permission not granted to access hardware geofence");
108 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE,
109 "Location Hardware permission no
[all...]
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/
H A DServiceManagerPermissionTests.java17 package com.android.framework.permission.tests;
52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
H A DSmsManagerPermissionTest.java17 package com.android.framework.permission.tests;
38 * {@link android.Manifest.permission#SEND_SMS}.
54 * {@link android.Manifest.permission#SEND_SMS}.
70 * {@link android.Manifest.permission#SEND_MMS}.
H A DVibratorServicePermissionTest.java17 package com.android.framework.permission.tests;
45 * <p>Tests permission:
46 * {@link android.Manifest.permission#VIBRATE}
62 * <p>Tests permission:
63 * {@link android.Manifest.permission#VIBRATE}
78 * <p>Tests permission:
79 * {@link android.Manifest.permission#VIBRATE}
/frameworks/base/services/usb/java/com/android/server/usb/
H A DUsbService.java188 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
194 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
225 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
232 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
239 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
245 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
251 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
270 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
280 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null);
286 mContext.enforceCallingOrSelfPermission(android.Manifest.permission
[all...]
/frameworks/base/services/core/java/com/android/server/
H A DMmsServiceBroker.java227 mContext.enforceCallingPermission(Manifest.permission.SEND_SMS, "Send MMS message");
244 mContext.enforceCallingPermission(Manifest.permission.RECEIVE_MMS,
267 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Import SMS message");
282 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Import MMS message");
296 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS,
308 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Delete conversation");
319 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS,
328 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS,
337 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Add SMS draft");
350 mContext.enforceCallingPermission(Manifest.permission
398 adjustUriForUserAndGrantPermission(Uri contentUri, String action, int permission) argument
[all...]
H A DSerialService.java38 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.SERIAL_PORT, null);
53 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.SERIAL_PORT, null);
H A DConsumerIrService.java72 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.TRANSMIT_IR)
74 throw new SecurityException("Requires TRANSMIT_IR permission");
104 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.TRANSMIT_IR)
106 throw new SecurityException("Requires TRANSMIT_IR permission");
/frameworks/base/core/java/android/net/
H A DNetworkScorerAppManager.java20 import android.Manifest.permission;
80 * <li>Declares the {@link android.Manifest.permission#SCORE_NETWORKS} permission.
82 * {@link android.Manifest.permission#BROADCAST_NETWORK_PRIVILEGED} permission.
101 if (!permission.BROADCAST_NETWORK_PRIVILEGED.equals(receiverInfo.permission)) {
102 // Receiver doesn't require the BROADCAST_NETWORK_PRIVILEGED permission, which means
106 if (pm.checkPermission(permission.SCORE_NETWORKS, receiverInfo.packageName) !=
108 // Application doesn't hold the SCORE_NETWORKS permission, s
[all...]
/frameworks/base/services/core/java/com/android/server/connectivity/
H A DPermissionMonitor.java19 import static android.Manifest.permission.CHANGE_NETWORK_STATE;
20 import static android.Manifest.permission.CONNECTIVITY_INTERNAL;
70 // Keys are App IDs. Values are true for SYSTEM permission and false for NETWORK permission.
132 Boolean permission = mApps.get(uid);
135 if (permission == null || permission == NETWORK) {
152 private boolean hasPermission(PackageInfo app, String permission) { argument
155 if (permission.equals(p)) {
240 Boolean permission
[all...]
/frameworks/base/core/java/android/app/
H A DAppOpsManager.java401 * This optionally maps a permission to an operation. If there
402 * is no permission associated with an operation, it is null.
405 android.Manifest.permission.ACCESS_COARSE_LOCATION,
406 android.Manifest.permission.ACCESS_FINE_LOCATION,
408 android.Manifest.permission.VIBRATE,
409 android.Manifest.permission.READ_CONTACTS,
410 android.Manifest.permission.WRITE_CONTACTS,
411 android.Manifest.permission.READ_CALL_LOG,
412 android.Manifest.permission.WRITE_CALL_LOG,
413 android.Manifest.permission
[all...]
/frameworks/base/core/tests/coretests/src/android/net/
H A DNetworkScorerAppManagerTest.java19 import android.Manifest.permission;
62 // Package 2 - Receiver does not have BROADCAST_NETWORK_PRIVILEGED permission.
65 // Package 3 - App does not have SCORE_NETWORKS permission.
128 Mockito.when(mMockPm.checkPermission(permission.SCORE_NETWORKS, packageName))
137 resolveInfo.activityInfo.permission = permission.BROADCAST_NETWORK_PRIVILEGED;
/frameworks/opt/net/ethernet/java/com/android/server/ethernet/
H A DEthernetServiceImpl.java72 android.Manifest.permission.ACCESS_NETWORK_STATE,
78 android.Manifest.permission.CHANGE_NETWORK_STATE,
84 android.Manifest.permission.CONNECTIVITY_INTERNAL,
175 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DCellBroadcastHandler.java85 receiverPermission = Manifest.permission.RECEIVE_EMERGENCY_BROADCAST;
90 receiverPermission = Manifest.permission.RECEIVE_SMS;

Completed in 8374 milliseconds

12345678