Searched defs:permission (Results 1 - 25 of 47) sorted by path

12

/frameworks/base/core/java/android/app/
H A DActivityManager.java111 * caller does not have permission to start the activity.
210 * a sticky intent without appropriate permission.
973 * the {@link android.Manifest.permission#INTERACT_ACROSS_USERS_FULL} permission.
1376 * the caller hold permission {@link android.Manifest.permission#REORDER_TASKS}
2280 * <p>You must hold the permission
2281 * {@link android.Manifest.permission#KILL_BACKGROUND_PROCESSES} to be able to
2303 * <p>You must hold the permission
2304 * {@link android.Manifest.permission#FORCE_STOP_PACKAGE
2469 checkComponentPermission(String permission, int uid, int owningUid, boolean exported) argument
2508 checkUidPermission(String permission, int uid) argument
[all...]
H A DActivityManagerNative.java97 * If you don't care about permission, use null.
99 static public void broadcastStickyIntent(Intent intent, String permission, int userId) { argument
103 null /*permission*/, AppOpsManager.OP_NONE, false, true, userId);
3873 public int checkPermission(String permission, int pid, int uid) argument
3878 data.writeString(permission);
3888 public int checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument
3893 data.writeString(permission);
H A DContextImpl.java1718 + " without permission " + cn.getClassName());
1859 public int checkPermission(String permission, int pid, int uid) { argument
1860 if (permission == null) {
1861 throw new IllegalArgumentException("permission is null");
1866 permission, pid, uid);
1874 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument
1875 if (permission == null) {
1876 throw new IllegalArgumentException("permission is null");
1881 permission, pid, uid, callerToken);
1888 public int checkCallingPermission(String permission) { argument
1901 checkCallingOrSelfPermission(String permission) argument
1910 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument
1924 enforcePermission( String permission, int pid, int uid, String message) argument
1933 enforceCallingPermission(String permission, String message) argument
1941 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
H A DIActivityManager.java221 public int checkPermission(String permission, int pid, int uid) argument
223 public int checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument
/frameworks/base/core/java/android/appwidget/
H A DAppWidgetManager.java798 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
817 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
839 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
841 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to
847 * @return true if this component has permission to bind the AppWidget
859 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
861 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to
870 * @return true if this component has permission to bind the AppWidget
881 * Set the provider for a given appWidgetId if the caller has a permission.
883 * <strong>Note:</strong> You need the {@link android.Manifest.permission#BIND_APPWIDGE
957 setBindAppWidgetPermission(String packageName, boolean permission) argument
975 setBindAppWidgetPermission(String packageName, int userId, boolean permission) argument
[all...]
/frameworks/base/core/java/android/content/
H A DContentProvider.java20 import static android.Manifest.permission.INTERACT_ACROSS_USERS;
142 * @param writePermission The write permission you want this instance should have
500 // <path-permission> below removes this ability
513 // any denied <path-permission> means we lose
522 // if we passed <path-permission> checks above, and no default
523 // <provider> permission, then allow access.
568 // <path-permission> below removes this ability
581 // any denied <path-permission> means we lose
590 // if we passed <path-permission> checks above, and no default
591 // <provider> permission, the
691 setReadPermission(String permission) argument
713 setWritePermission(String permission) argument
[all...]
H A DContext.java688 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
696 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
697 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
800 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
808 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
809 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
912 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
920 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
921 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
1160 * <p>This method requires the caller to hold the permission
2935 checkPermission(@onNull String permission, int pid, int uid) argument
2939 checkPermission(@onNull String permission, int pid, int uid, IBinder callerToken) argument
2964 checkCallingPermission(@onNull String permission) argument
2983 checkCallingOrSelfPermission(@onNull String permission) argument
2997 enforcePermission( @onNull String permission, int pid, int uid, @Nullable String message) argument
3018 enforceCallingPermission( @onNull String permission, @Nullable String message) argument
3034 enforceCallingOrSelfPermission( @onNull String permission, @Nullable String message) argument
[all...]
H A DContextWrapper.java566 public int checkPermission(String permission, int pid, int uid) { argument
567 return mBase.checkPermission(permission, pid, uid);
572 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument
573 return mBase.checkPermission(permission, pid, uid, callerToken);
577 public int checkCallingPermission(String permission) { argument
578 return mBase.checkCallingPermission(permission);
582 public int checkCallingOrSelfPermission(String permission) { argument
583 return mBase.checkCallingOrSelfPermission(permission);
588 String permission, int pid, int uid, String message) {
589 mBase.enforcePermission(permission, pi
587 enforcePermission( String permission, int pid, int uid, String message) argument
593 enforceCallingPermission(String permission, String message) argument
598 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
/frameworks/base/core/java/android/content/pm/
H A DActivityInfo.java135 * Optional name of a permission required to be able to access this
136 * Activity. From the "permission" attribute.
138 public String permission; field in class:ActivityInfo
651 permission = orig.permission;
685 if (permission != null) {
686 pw.println(prefix + "permission=" + permission);
722 dest.writeString(permission);
749 permission
[all...]
H A DApplicationInfo.java48 * Optional name of a permission required to be able to access this
49 * application's components. From the "permission" attribute.
51 public String permission; field in class:ApplicationInfo
136 * {@link android.Manifest.permission#FACTORY_TEST} permission and the
595 if (permission != null) {
596 pw.println(prefix + "permission=" + permission);
678 permission = orig.permission;
[all...]
H A DServiceInfo.java31 * Optional name of a permission required to be able to access this
32 * Service. From the "permission" attribute.
34 public String permission; field in class:ServiceInfo
72 permission = orig.permission;
78 pw.println(prefix + "permission=" + permission);
94 dest.writeString(permission);
110 permission = source.readString();
/frameworks/base/core/java/android/test/
H A DAndroidTestCase.java80 * Asserts that launching a given activity is protected by a particular permission by
82 * is thrown that mentions the permission in its error message.
89 * @param permission The name of the permission.
92 String packageName, String className, String permission) {
99 fail("expected security exception for " + permission);
102 assertTrue("error message should contain " + permission + ".",
103 expected.getMessage().contains(permission));
109 * Asserts that reading from the content uri requires a particular permission by querying the
110 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission
91 assertActivityRequiresPermission( String packageName, String className, String permission) argument
115 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument
134 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument
[all...]
/frameworks/base/core/java/android/view/
H A DViewRootImpl.java588 " -- permission denied for this window type");
6528 private static int checkCallingPermission(String permission) { argument
6531 permission, Binder.getCallingPid(), Binder.getCallingUid());
6543 if (checkCallingPermission(Manifest.permission.DUMP) !=
/frameworks/base/core/tests/coretests/src/android/app/activity/
H A DBroadcastTest.java177 public void registerMyReceiver(IntentFilter filter, String permission) { argument
180 getContext().registerReceiver(mReceiver, filter, permission, null);
/frameworks/base/services/accessibility/java/com/android/server/accessibility/
H A DAccessibilityManagerService.java619 mSecurityPolicy.enforceCallingPermission(Manifest.permission.RETRIEVE_WINDOW_CONTENT,
680 Manifest.permission.TEMPORARY_ENABLE_ACCESSIBILITY,
712 Manifest.permission.RETRIEVE_WINDOW_TOKEN,
953 if (!android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE.equals(
954 serviceInfo.permission)) {
957 + ": it does not require the permission "
958 + android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE);
1397 // use to get a permission to white list the service.
1552 // use to get a permission to white list the service.
1625 mSecurityPolicy.enforceCallingPermission(Manifest.permission
3653 enforceCallingPermission(String permission, String function) argument
3664 hasPermission(String permission) argument
[all...]
/frameworks/base/services/core/java/com/android/server/
H A DMmsServiceBroker.java227 mContext.enforceCallingPermission(Manifest.permission.SEND_SMS, "Send MMS message");
244 mContext.enforceCallingPermission(Manifest.permission.RECEIVE_MMS,
267 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Import SMS message");
282 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Import MMS message");
296 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS,
308 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Delete conversation");
319 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS,
328 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS,
337 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Add SMS draft");
350 mContext.enforceCallingPermission(Manifest.permission
398 adjustUriForUserAndGrantPermission(Uri contentUri, String action, int permission) argument
[all...]
H A DNetworkManagementService.java19 import static android.Manifest.permission.CONNECTIVITY_INTERNAL;
20 import static android.Manifest.permission.DUMP;
21 import static android.Manifest.permission.SHUTDOWN;
2076 public void setPermission(String permission, int[] uids) { argument
2080 argv[0] = "permission";
2083 argv[3] = permission;
2104 argv[0] = "permission";
/frameworks/base/services/core/java/com/android/server/am/
H A DActiveServices.java326 return new ComponentName("!", res.permission != null
327 ? res.permission : "private to package");
509 // r.record is null if findServiceLocked() failed the caller permission check
515 + " requires " + r.permission);
733 mAm.enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS,
989 final String permission; field in class:ActiveServices.ServiceLookupResult
993 permission = _permission;
1086 if (mAm.checkComponentPermission(r.permission,
1100 + " requires " + r.permission);
1101 return new ServiceLookupResult(null, r.permission);
[all...]
H A DActivityManagerService.java19 import static android.Manifest.permission.INTERACT_ACROSS_USERS;
20 import static android.Manifest.permission.INTERACT_ACROSS_USERS_FULL;
21 import static android.Manifest.permission.START_TASKS_FROM_RECENTS;
1913 ServiceManager.addService("permission", new PermissionController(this));
1964 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
1968 + " without permission " + android.Manifest.permission.DUMP);
1984 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP)
1988 + " without permission " + android.Manifest.permission
6800 checkPermission(String permission, int pid, int uid) argument
6808 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument
6823 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument
6842 checkPermission(String permission, int pid, int uid) argument
6850 checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument
6873 checkCallingPermission(String permission) argument
6882 enforceCallingPermission(String permission, String func) argument
15564 registerReceiver(IApplicationThread caller, String callerPackage, IIntentReceiver receiver, IntentFilter filter, String permission, int userId) argument
[all...]
H A DServiceRecord.java73 final String permission;// permission needed to access service field in class:ServiceRecord
207 if (permission != null) {
208 pw.print(prefix); pw.print("permission="); pw.println(permission);
315 permission = sInfo.permission;
/frameworks/base/services/core/java/com/android/server/connectivity/
H A DPermissionMonitor.java19 import static android.Manifest.permission.CHANGE_NETWORK_STATE;
20 import static android.Manifest.permission.CONNECTIVITY_INTERNAL;
70 // Keys are App IDs. Values are true for SYSTEM permission and false for NETWORK permission.
132 Boolean permission = mApps.get(uid);
135 if (permission == null || permission == NETWORK) {
152 private boolean hasPermission(PackageInfo app, String permission) { argument
155 if (permission.equals(p)) {
240 Boolean permission
[all...]
/frameworks/base/services/core/java/com/android/server/dreams/
H A DDreamManagerService.java19 import static android.Manifest.permission.BIND_DREAM_SERVICE;
266 && !BIND_DREAM_SERVICE.equals(serviceInfo.permission)) {
269 + " permission on the dream service declaration.");
408 private void checkPermission(String permission) { argument
409 if (mContext.checkCallingOrSelfPermission(permission)
412 + ", must have permission " + permission);
465 if (mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP)
483 checkPermission(android.Manifest.permission.READ_DREAM_STATE);
496 checkPermission(android.Manifest.permission
[all...]
/frameworks/base/services/core/java/com/android/server/firewall/
H A DIntentFirewall.java581 int checkComponentPermission(String permission, int pid, int uid, argument
589 * @param permission If present, the caller must have this permission
596 boolean checkComponentPermission(String permission, int pid, int uid, int owningUid, argument
598 return mAms.checkComponentPermission(permission, pid, uid, owningUid, exported) ==
H A DSenderPermissionFilter.java31 private SenderPermissionFilter(String permission) { argument
32 mPermission = permission;
45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") {
49 String permission = parser.getAttributeValue(null, ATTR_NAME);
50 if (permission == null) {
54 return new SenderPermissionFilter(permission);
/frameworks/base/services/core/java/com/android/server/input/
H A DInputManagerService.java555 Slog.w(TAG, "Input event injection from pid " + pid + " permission denied.");
557 "Injecting to another application requires INJECT_EVENTS permission");
751 if (!checkCallingPermission(android.Manifest.permission.SET_INPUT_CALIBRATION,
753 throw new SecurityException("Requires SET_INPUT_CALIBRATION permission");
1032 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
1034 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
1071 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
1073 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
1100 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT,
1102 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission");
1359 checkCallingPermission(String permission, String func) argument
[all...]

Completed in 434 milliseconds

12