/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | IccSmsInterfaceManager.java | 177 Manifest.permission.RECEIVE_SMS, message); 179 Manifest.permission.SEND_SMS, message); 290 Manifest.permission.RECEIVE_SMS, 348 Manifest.permission.SEND_SMS, 391 Manifest.permission.SEND_SMS, 457 Manifest.permission.SEND_SMS, 512 public void setPremiumSmsPermission(String packageName, int permission) { argument 513 mDispatcher.setPremiumSmsPermission(packageName, permission); 603 "android.permission.RECEIVE_SMS", 630 "android.permission [all...] |
H A D | InboundSmsHandler.java | 593 mContext.sendBroadcast(intent, android.Manifest.permission.RECEIVE_SMS); 790 String carrierFilterSmsPerm = "android.permission.CARRIER_FILTER_SMS"; 808 * Dispatch the intent with the specified permission, appOp, and result receiver, using 812 * @param permission receivers are required to have this permission 816 protected void dispatchIntent(Intent intent, String permission, int appOp, argument 846 mContext.sendOrderedBroadcastAsUser(intent, targetUser, permission, appOp, 851 mContext.sendOrderedBroadcastAsUser(intent, user, permission, appOp, 913 dispatchIntent(intent, android.Manifest.permission.RECEIVE_SMS, 1043 dispatchIntent(intent, android.Manifest.permission [all...] |
H A D | SMSDispatcher.java | 92 "android.permission.SEND_SMS_NO_CONFIRMATION"; 1030 // Wait for user confirmation unless the user has set permission to always allow/deny 1181 * Returns the premium SMS permission for the specified package. If the package has never 1184 * @param packageName the name of the package to query permission 1195 * Sets the premium SMS permission for the specified package and save the value asynchronously 1197 * @param packageName the name of the package to set permission 1198 * @param permission one of {@link SmsUsageMonitor#PREMIUM_SMS_PERMISSION_ASK_USER}, 1202 public void setPremiumSmsPermission(String packageName, int permission) { argument 1203 mUsageMonitor.setPremiumSmsPermission(packageName, permission); 1614 // Always set the SMS permission s [all...] |
H A D | SmsUsageMonitor.java | 71 /** Default checking period for SMS sent without user permission. */ 74 /** Default number of SMS sent in checking period without user permission. */ 98 /** Premium SMS permission for a new package (ask user when first premium SMS sent). */ 101 /** Default premium SMS permission (ask user for each premium SMS sent). */ 104 /** Premium SMS permission when the owner has denied the app from sending premium SMS. */ 107 /** Premium SMS permission when the owner has allowed the app to send premium SMS. */ 137 /** Directory for per-app SMS permission XML file. */ 140 /** Per-app SMS permission XML filename. */ 179 /** XML attribute for the package's premium SMS permission (integer type). */ 532 * Returns the premium SMS permission fo 563 setPremiumSmsPermission(String packageName, int permission) argument [all...] |
H A D | UiccSmsController.java | 241 public void setPremiumSmsPermission(String packageName, int permission) { argument 242 setPremiumSmsPermissionForSubscriber(getPreferredSmsSubscription(), packageName, permission); 246 public void setPremiumSmsPermissionForSubscriber(int subId, String packageName, int permission) { argument 249 iccSmsIntMgr.setPremiumSmsPermission(packageName, permission);
|
/frameworks/native/libs/binder/ |
H A D | IPermissionController.cpp | 39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 43 data.writeString16(permission); 64 String16 permission = data.readString16(); local 67 bool res = checkPermission(permission, pid, uid);
|
H A D | IServiceManager.cpp | 50 bool checkCallingPermission(const String16& permission) argument 52 return checkCallingPermission(permission, NULL, NULL); 55 static String16 _permission("permission"); 58 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument 65 return checkPermission(permission, pid, uid); 68 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 79 bool res = pc->checkPermission(permission, pid, uid); 84 String8(permission).string(), uid, pid); 89 // Is this a permission failure, or did the controller go away? 92 String8(permission) [all...] |
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_ 37 check(bool* granted, const String16& permission, uid_t uid) const argument 81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ActivityManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
H A D | PmPermissionsTests.java | 17 package com.android.framework.permission.tests; 29 private String mPkgName = "com.android.framework.permission.tests"; 38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission 39 * android.permission.GET_PACKAGE_SIZE 53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission 54 * android.permission.DELETE_CACHE_FILES 68 * This test verifies that PackageManger.installPackage enforces permission 69 * android.permission.INSTALL_PACKAGES 88 * enforces permission android.permission [all...] |
H A D | ServiceManagerPermissionTests.java | 17 package com.android.framework.permission.tests; 52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
|
H A D | SmsManagerPermissionTest.java | 17 package com.android.framework.permission.tests; 38 * {@link android.Manifest.permission#SEND_SMS}. 54 * {@link android.Manifest.permission#SEND_SMS}. 70 * {@link android.Manifest.permission#SEND_MMS}.
|
H A D | VibratorServicePermissionTest.java | 17 package com.android.framework.permission.tests; 45 * <p>Tests permission: 46 * {@link android.Manifest.permission#VIBRATE} 62 * <p>Tests permission: 63 * {@link android.Manifest.permission#VIBRATE} 78 * <p>Tests permission: 79 * {@link android.Manifest.permission#VIBRATE}
|
H A D | WindowManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
/frameworks/base/tools/aapt/ |
H A D | Command.cpp | 369 printf("uses-permission: name='%s'", ResTable::normalizeForOutput(name.string()).string()); 376 printf("optional-permission: name='%s'", 386 printf("uses-implied-permission: name='%s' reason='%s'\n", 740 } else if (depth == 2 && tag == "permission") { 747 printf("permission: %s\n", 749 } else if (depth == 2 && tag == "uses-permission") { 863 // heuristic is "if an app requests a permission but doesn't explicitly 867 // have no corresponding permission, so we cannot implement any 1300 } else if (tag == "uses-permission") { 1303 if (name == "android.permission 1522 String8 permission = AaptXml::getAttribute(tree, PERMISSION_ATTR, local 1542 String8 permission = AaptXml::getAttribute(tree, PERMISSION_ATTR, local 1581 String8 permission = AaptXml::getResolvedAttribute(res, tree, local [all...] |
/frameworks/base/services/accessibility/java/com/android/server/accessibility/ |
H A D | AccessibilityManagerService.java | 619 mSecurityPolicy.enforceCallingPermission(Manifest.permission.RETRIEVE_WINDOW_CONTENT, 680 Manifest.permission.TEMPORARY_ENABLE_ACCESSIBILITY, 712 Manifest.permission.RETRIEVE_WINDOW_TOKEN, 953 if (!android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE.equals( 954 serviceInfo.permission)) { 957 + ": it does not require the permission " 958 + android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE); 1397 // use to get a permission to white list the service. 1552 // use to get a permission to white list the service. 1625 mSecurityPolicy.enforceCallingPermission(Manifest.permission 3653 enforceCallingPermission(String permission, String function) argument 3664 hasPermission(String permission) argument [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | MmsServiceBroker.java | 227 mContext.enforceCallingPermission(Manifest.permission.SEND_SMS, "Send MMS message"); 244 mContext.enforceCallingPermission(Manifest.permission.RECEIVE_MMS, 267 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Import SMS message"); 282 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Import MMS message"); 296 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, 308 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Delete conversation"); 319 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, 328 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, 337 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Add SMS draft"); 350 mContext.enforceCallingPermission(Manifest.permission 398 adjustUriForUserAndGrantPermission(Uri contentUri, String action, int permission) argument [all...] |
H A D | NetworkManagementService.java | 19 import static android.Manifest.permission.CONNECTIVITY_INTERNAL; 20 import static android.Manifest.permission.DUMP; 21 import static android.Manifest.permission.SHUTDOWN; 2076 public void setPermission(String permission, int[] uids) { argument 2080 argv[0] = "permission"; 2083 argv[3] = permission; 2104 argv[0] = "permission";
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActiveServices.java | 326 return new ComponentName("!", res.permission != null 327 ? res.permission : "private to package"); 509 // r.record is null if findServiceLocked() failed the caller permission check 515 + " requires " + r.permission); 733 mAm.enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS, 989 final String permission; field in class:ActiveServices.ServiceLookupResult 993 permission = _permission; 1086 if (mAm.checkComponentPermission(r.permission, 1100 + " requires " + r.permission); 1101 return new ServiceLookupResult(null, r.permission); [all...] |
H A D | ActivityManagerService.java | 19 import static android.Manifest.permission.INTERACT_ACROSS_USERS; 20 import static android.Manifest.permission.INTERACT_ACROSS_USERS_FULL; 21 import static android.Manifest.permission.START_TASKS_FROM_RECENTS; 1913 ServiceManager.addService("permission", new PermissionController(this)); 1964 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) 1968 + " without permission " + android.Manifest.permission.DUMP); 1984 if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) 1988 + " without permission " + android.Manifest.permission 6800 checkPermission(String permission, int pid, int uid) argument 6808 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 6823 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 6842 checkPermission(String permission, int pid, int uid) argument 6850 checkPermissionWithToken(String permission, int pid, int uid, IBinder callerToken) argument 6873 checkCallingPermission(String permission) argument 6882 enforceCallingPermission(String permission, String func) argument 15564 registerReceiver(IApplicationThread caller, String callerPackage, IIntentReceiver receiver, IntentFilter filter, String permission, int userId) argument [all...] |
H A D | ServiceRecord.java | 73 final String permission;// permission needed to access service field in class:ServiceRecord 207 if (permission != null) { 208 pw.print(prefix); pw.print("permission="); pw.println(permission); 315 permission = sInfo.permission;
|
/frameworks/base/services/core/java/com/android/server/connectivity/ |
H A D | PermissionMonitor.java | 19 import static android.Manifest.permission.CHANGE_NETWORK_STATE; 20 import static android.Manifest.permission.CONNECTIVITY_INTERNAL; 70 // Keys are App IDs. Values are true for SYSTEM permission and false for NETWORK permission. 132 Boolean permission = mApps.get(uid); 135 if (permission == null || permission == NETWORK) { 152 private boolean hasPermission(PackageInfo app, String permission) { argument 155 if (permission.equals(p)) { 240 Boolean permission [all...] |
/frameworks/base/services/core/java/com/android/server/dreams/ |
H A D | DreamManagerService.java | 19 import static android.Manifest.permission.BIND_DREAM_SERVICE; 266 && !BIND_DREAM_SERVICE.equals(serviceInfo.permission)) { 269 + " permission on the dream service declaration."); 408 private void checkPermission(String permission) { argument 409 if (mContext.checkCallingOrSelfPermission(permission) 412 + ", must have permission " + permission); 465 if (mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP) 483 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 496 checkPermission(android.Manifest.permission [all...] |
/frameworks/base/services/core/java/com/android/server/firewall/ |
H A D | IntentFirewall.java | 581 int checkComponentPermission(String permission, int pid, int uid, argument 589 * @param permission If present, the caller must have this permission 596 boolean checkComponentPermission(String permission, int pid, int uid, int owningUid, argument 598 return mAms.checkComponentPermission(permission, pid, uid, owningUid, exported) ==
|
H A D | SenderPermissionFilter.java | 31 private SenderPermissionFilter(String permission) { argument 32 mPermission = permission; 45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") { 49 String permission = parser.getAttributeValue(null, ATTR_NAME); 50 if (permission == null) { 54 return new SenderPermissionFilter(permission);
|