/frameworks/base/core/java/android/app/ |
H A D | ActivityManager.java | 111 * caller does not have permission to start the activity. 210 * a sticky intent without appropriate permission. 973 * the {@link android.Manifest.permission#INTERACT_ACROSS_USERS_FULL} permission. 1376 * the caller hold permission {@link android.Manifest.permission#REORDER_TASKS} 2280 * <p>You must hold the permission 2281 * {@link android.Manifest.permission#KILL_BACKGROUND_PROCESSES} to be able to 2303 * <p>You must hold the permission 2304 * {@link android.Manifest.permission#FORCE_STOP_PACKAGE 2469 checkComponentPermission(String permission, int uid, int owningUid, boolean exported) argument 2508 checkUidPermission(String permission, int uid) argument [all...] |
H A D | ActivityManagerNative.java | 97 * If you don't care about permission, use null. 99 static public void broadcastStickyIntent(Intent intent, String permission, int userId) { argument 103 null /*permission*/, AppOpsManager.OP_NONE, false, true, userId); 3873 public int checkPermission(String permission, int pid, int uid) argument 3878 data.writeString(permission); 3888 public int checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument 3893 data.writeString(permission);
|
H A D | ContextImpl.java | 1718 + " without permission " + cn.getClassName()); 1859 public int checkPermission(String permission, int pid, int uid) { argument 1860 if (permission == null) { 1861 throw new IllegalArgumentException("permission is null"); 1866 permission, pid, uid); 1874 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 1875 if (permission == null) { 1876 throw new IllegalArgumentException("permission is null"); 1881 permission, pid, uid, callerToken); 1888 public int checkCallingPermission(String permission) { argument 1901 checkCallingOrSelfPermission(String permission) argument 1910 enforce( String permission, int resultOfCheck, boolean selfToo, int uid, String message) argument 1924 enforcePermission( String permission, int pid, int uid, String message) argument 1933 enforceCallingPermission(String permission, String message) argument 1941 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
H A D | IActivityManager.java | 221 public int checkPermission(String permission, int pid, int uid) argument 223 public int checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument
|
/frameworks/base/core/java/android/appwidget/ |
H A D | AppWidgetManager.java | 798 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 817 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 839 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 841 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to 847 * @return true if this component has permission to bind the AppWidget 859 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 861 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to 870 * @return true if this component has permission to bind the AppWidget 881 * Set the provider for a given appWidgetId if the caller has a permission. 883 * <strong>Note:</strong> You need the {@link android.Manifest.permission#BIND_APPWIDGE 957 setBindAppWidgetPermission(String packageName, boolean permission) argument 975 setBindAppWidgetPermission(String packageName, int userId, boolean permission) argument [all...] |
/frameworks/base/core/java/android/content/ |
H A D | ContentProvider.java | 20 import static android.Manifest.permission.INTERACT_ACROSS_USERS; 142 * @param writePermission The write permission you want this instance should have 500 // <path-permission> below removes this ability 513 // any denied <path-permission> means we lose 522 // if we passed <path-permission> checks above, and no default 523 // <provider> permission, then allow access. 568 // <path-permission> below removes this ability 581 // any denied <path-permission> means we lose 590 // if we passed <path-permission> checks above, and no default 591 // <provider> permission, the 691 setReadPermission(String permission) argument 713 setWritePermission(String permission) argument [all...] |
H A D | Context.java | 688 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to 696 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} 697 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required. 800 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to 808 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} 809 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required. 912 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to 920 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} 921 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required. 1160 * <p>This method requires the caller to hold the permission 2935 checkPermission(@onNull String permission, int pid, int uid) argument 2939 checkPermission(@onNull String permission, int pid, int uid, IBinder callerToken) argument 2964 checkCallingPermission(@onNull String permission) argument 2983 checkCallingOrSelfPermission(@onNull String permission) argument 2997 enforcePermission( @onNull String permission, int pid, int uid, @Nullable String message) argument 3018 enforceCallingPermission( @onNull String permission, @Nullable String message) argument 3034 enforceCallingOrSelfPermission( @onNull String permission, @Nullable String message) argument [all...] |
H A D | ContextWrapper.java | 566 public int checkPermission(String permission, int pid, int uid) { argument 567 return mBase.checkPermission(permission, pid, uid); 572 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 573 return mBase.checkPermission(permission, pid, uid, callerToken); 577 public int checkCallingPermission(String permission) { argument 578 return mBase.checkCallingPermission(permission); 582 public int checkCallingOrSelfPermission(String permission) { argument 583 return mBase.checkCallingOrSelfPermission(permission); 588 String permission, int pid, int uid, String message) { 589 mBase.enforcePermission(permission, pi 587 enforcePermission( String permission, int pid, int uid, String message) argument 593 enforceCallingPermission(String permission, String message) argument 598 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ActivityInfo.java | 135 * Optional name of a permission required to be able to access this 136 * Activity. From the "permission" attribute. 138 public String permission; field in class:ActivityInfo 651 permission = orig.permission; 685 if (permission != null) { 686 pw.println(prefix + "permission=" + permission); 722 dest.writeString(permission); 749 permission [all...] |
H A D | ApplicationInfo.java | 48 * Optional name of a permission required to be able to access this 49 * application's components. From the "permission" attribute. 51 public String permission; field in class:ApplicationInfo 136 * {@link android.Manifest.permission#FACTORY_TEST} permission and the 595 if (permission != null) { 596 pw.println(prefix + "permission=" + permission); 678 permission = orig.permission; [all...] |
H A D | ServiceInfo.java | 31 * Optional name of a permission required to be able to access this 32 * Service. From the "permission" attribute. 34 public String permission; field in class:ServiceInfo 72 permission = orig.permission; 78 pw.println(prefix + "permission=" + permission); 94 dest.writeString(permission); 110 permission = source.readString();
|
/frameworks/base/core/java/android/test/ |
H A D | AndroidTestCase.java | 80 * Asserts that launching a given activity is protected by a particular permission by 82 * is thrown that mentions the permission in its error message. 89 * @param permission The name of the permission. 92 String packageName, String className, String permission) { 99 fail("expected security exception for " + permission); 102 assertTrue("error message should contain " + permission + ".", 103 expected.getMessage().contains(permission)); 109 * Asserts that reading from the content uri requires a particular permission by querying the 110 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission 91 assertActivityRequiresPermission( String packageName, String className, String permission) argument 115 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument 134 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument [all...] |
/frameworks/base/core/java/android/view/ |
H A D | ViewRootImpl.java | 588 " -- permission denied for this window type"); 6528 private static int checkCallingPermission(String permission) { argument 6531 permission, Binder.getCallingPid(), Binder.getCallingUid()); 6543 if (checkCallingPermission(Manifest.permission.DUMP) !=
|
/frameworks/base/core/tests/coretests/src/android/app/activity/ |
H A D | BroadcastTest.java | 177 public void registerMyReceiver(IntentFilter filter, String permission) { argument 180 getContext().registerReceiver(mReceiver, filter, permission, null);
|
/frameworks/base/services/accessibility/java/com/android/server/accessibility/ |
H A D | AccessibilityManagerService.java | 619 mSecurityPolicy.enforceCallingPermission(Manifest.permission.RETRIEVE_WINDOW_CONTENT, 680 Manifest.permission.TEMPORARY_ENABLE_ACCESSIBILITY, 712 Manifest.permission.RETRIEVE_WINDOW_TOKEN, 953 if (!android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE.equals( 954 serviceInfo.permission)) { 957 + ": it does not require the permission " 958 + android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE); 1397 // use to get a permission to white list the service. 1552 // use to get a permission to white list the service. 1625 mSecurityPolicy.enforceCallingPermission(Manifest.permission 3653 enforceCallingPermission(String permission, String function) argument 3664 hasPermission(String permission) argument [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | MmsServiceBroker.java | 227 mContext.enforceCallingPermission(Manifest.permission.SEND_SMS, "Send MMS message"); 244 mContext.enforceCallingPermission(Manifest.permission.RECEIVE_MMS, 267 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Import SMS message"); 282 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Import MMS message"); 296 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, 308 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Delete conversation"); 319 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, 328 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, 337 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Add SMS draft"); 350 mContext.enforceCallingPermission(Manifest.permission 398 adjustUriForUserAndGrantPermission(Uri contentUri, String action, int permission) argument [all...] |
H A D | NetworkManagementService.java | 19 import static android.Manifest.permission.CONNECTIVITY_INTERNAL; 20 import static android.Manifest.permission.DUMP; 21 import static android.Manifest.permission.SHUTDOWN; 2076 public void setPermission(String permission, int[] uids) { argument 2080 argv[0] = "permission"; 2083 argv[3] = permission; 2104 argv[0] = "permission";
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActiveServices.java | 326 return new ComponentName("!", res.permission != null 327 ? res.permission : "private to package"); 509 // r.record is null if findServiceLocked() failed the caller permission check 515 + " requires " + r.permission); 733 mAm.enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS, 989 final String permission; field in class:ActiveServices.ServiceLookupResult 993 permission = _permission; 1086 if (mAm.checkComponentPermission(r.permission, 1100 + " requires " + r.permission); 1101 return new ServiceLookupResult(null, r.permission); [all...] |
H A D | ActivityManagerService.java | 19 import static android.Manifest.permission.INTERACT_ACROSS_USERS; 20 import static android.Manifest.permission.INTERACT_ACROSS_USERS_FULL; 21 import static android.Manifest.permission.START_TASKS_FROM_RECENTS; 1913 ServiceManager.addService("permission", new PermissionController(this)); 1964 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) 1968 + " without permission " + android.Manifest.permission.DUMP); 1984 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) 1988 + " without permission " + android.Manifest.permission 6800 checkPermission(String permission, int pid, int uid) argument 6808 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 6823 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 6842 checkPermission(String permission, int pid, int uid) argument 6850 checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument 6873 checkCallingPermission(String permission) argument 6882 enforceCallingPermission(String permission, String func) argument 15564 registerReceiver(IApplicationThread caller, String callerPackage, IIntentReceiver receiver, IntentFilter filter, String permission, int userId) argument [all...] |
H A D | ServiceRecord.java | 73 final String permission;// permission needed to access service field in class:ServiceRecord 207 if (permission != null) { 208 pw.print(prefix); pw.print("permission="); pw.println(permission); 315 permission = sInfo.permission;
|
/frameworks/base/services/core/java/com/android/server/connectivity/ |
H A D | PermissionMonitor.java | 19 import static android.Manifest.permission.CHANGE_NETWORK_STATE; 20 import static android.Manifest.permission.CONNECTIVITY_INTERNAL; 70 // Keys are App IDs. Values are true for SYSTEM permission and false for NETWORK permission. 132 Boolean permission = mApps.get(uid); 135 if (permission == null || permission == NETWORK) { 152 private boolean hasPermission(PackageInfo app, String permission) { argument 155 if (permission.equals(p)) { 240 Boolean permission [all...] |
/frameworks/base/services/core/java/com/android/server/dreams/ |
H A D | DreamManagerService.java | 19 import static android.Manifest.permission.BIND_DREAM_SERVICE; 266 && !BIND_DREAM_SERVICE.equals(serviceInfo.permission)) { 269 + " permission on the dream service declaration."); 408 private void checkPermission(String permission) { argument 409 if (mContext.checkCallingOrSelfPermission(permission) 412 + ", must have permission " + permission); 465 if (mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP) 483 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 496 checkPermission(android.Manifest.permission [all...] |
/frameworks/base/services/core/java/com/android/server/firewall/ |
H A D | IntentFirewall.java | 581 int checkComponentPermission(String permission, int pid, int uid, argument 589 * @param permission If present, the caller must have this permission 596 boolean checkComponentPermission(String permission, int pid, int uid, int owningUid, argument 598 return mAms.checkComponentPermission(permission, pid, uid, owningUid, exported) ==
|
H A D | SenderPermissionFilter.java | 31 private SenderPermissionFilter(String permission) { argument 32 mPermission = permission; 45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") { 49 String permission = parser.getAttributeValue(null, ATTR_NAME); 50 if (permission == null) { 54 return new SenderPermissionFilter(permission);
|
/frameworks/base/services/core/java/com/android/server/input/ |
H A D | InputManagerService.java | 555 Slog.w(TAG, "Input event injection from pid " + pid + " permission denied."); 557 "Injecting to another application requires INJECT_EVENTS permission"); 751 if (!checkCallingPermission(android.Manifest.permission.SET_INPUT_CALIBRATION, 753 throw new SecurityException("Requires SET_INPUT_CALIBRATION permission"); 1032 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 1034 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 1071 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 1073 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 1100 if (!checkCallingPermission(android.Manifest.permission.SET_KEYBOARD_LAYOUT, 1102 throw new SecurityException("Requires SET_KEYBOARD_LAYOUT permission"); 1359 checkCallingPermission(String permission, String func) argument [all...] |