/frameworks/base/core/java/android/os/ |
H A D | IPermissionController.aidl | 22 boolean checkPermission(String permission, int pid, int uid);
|
/frameworks/native/libs/binder/ |
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_ 37 check(bool* granted, const String16& permission, uid_t uid) const argument 81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
H A D | IPermissionController.cpp | 39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 43 data.writeString16(permission); 64 String16 permission = data.readString16(); local 67 bool res = checkPermission(permission, pid, uid);
|
H A D | IServiceManager.cpp | 50 bool checkCallingPermission(const String16& permission) argument 52 return checkCallingPermission(permission, NULL, NULL); 55 static String16 _permission("permission"); 58 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument 65 return checkPermission(permission, pid, uid); 68 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 79 bool res = pc->checkPermission(permission, pid, uid); 84 String8(permission).string(), uid, pid); 89 // Is this a permission failure, or did the controller go away? 92 String8(permission) [all...] |
/frameworks/base/services/core/java/com/android/server/firewall/ |
H A D | SenderPermissionFilter.java | 31 private SenderPermissionFilter(String permission) { argument 32 mPermission = permission; 45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") { 49 String permission = parser.getAttributeValue(null, ATTR_NAME); 50 if (permission == null) { 54 return new SenderPermissionFilter(permission);
|
/frameworks/native/include/binder/ |
H A D | PermissionCache.h | 31 * PermissionCache caches permission checks for a given uid. 33 * Currently the cache is not updated when there is a permission change, 51 // we pool all the permission names we see, as many permissions checks 57 // free the whole cache, but keep the permission name pool 61 const String16& permission, uid_t uid) const; 63 void cache(const String16& permission, uid_t uid, bool granted); 68 static bool checkCallingPermission(const String16& permission); 70 static bool checkCallingPermission(const String16& permission, 73 static bool checkPermission(const String16& permission,
|
H A D | IServiceManager.h | 79 bool checkCallingPermission(const String16& permission); 80 bool checkCallingPermission(const String16& permission, 82 bool checkPermission(const String16& permission, pid_t pid, uid_t uid);
|
H A D | IPermissionController.h | 32 virtual bool checkPermission(const String16& permission,
|
/frameworks/base/core/java/android/test/ |
H A D | AndroidTestCase.java | 80 * Asserts that launching a given activity is protected by a particular permission by 82 * is thrown that mentions the permission in its error message. 89 * @param permission The name of the permission. 92 String packageName, String className, String permission) { 99 fail("expected security exception for " + permission); 102 assertTrue("error message should contain " + permission + ".", 103 expected.getMessage().contains(permission)); 109 * Asserts that reading from the content uri requires a particular permission by querying the 110 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission 91 assertActivityRequiresPermission( String packageName, String className, String permission) argument 115 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument 134 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ServiceInfo.java | 31 * Optional name of a permission required to be able to access this 32 * Service. From the "permission" attribute. 34 public String permission; field in class:ServiceInfo 72 permission = orig.permission; 78 pw.println(prefix + "permission=" + permission); 94 dest.writeString(permission); 110 permission = source.readString();
|
H A D | ActivityInfo.java | 135 * Optional name of a permission required to be able to access this 136 * Activity. From the "permission" attribute. 138 public String permission; field in class:ActivityInfo 651 permission = orig.permission; 685 if (permission != null) { 686 pw.println(prefix + "permission=" + permission); 722 dest.writeString(permission); 749 permission [all...] |
/frameworks/base/core/java/android/hardware/location/ |
H A D | GeofenceHardwareService.java | 77 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 78 "Location Hardware permission not granted to access hardware geofence"); 84 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 85 "Location Hardware permission not granted to access hardware geofence"); 93 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 94 "Location Hardware permission not granted to access hardware geofence"); 100 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 101 "Location Hardware permission not granted to access hardware geofence"); 108 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 109 "Location Hardware permission no [all...] |
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ServiceManagerPermissionTests.java | 17 package com.android.framework.permission.tests; 52 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
|
H A D | SmsManagerPermissionTest.java | 17 package com.android.framework.permission.tests; 38 * {@link android.Manifest.permission#SEND_SMS}. 54 * {@link android.Manifest.permission#SEND_SMS}. 70 * {@link android.Manifest.permission#SEND_MMS}.
|
H A D | VibratorServicePermissionTest.java | 17 package com.android.framework.permission.tests; 45 * <p>Tests permission: 46 * {@link android.Manifest.permission#VIBRATE} 62 * <p>Tests permission: 63 * {@link android.Manifest.permission#VIBRATE} 78 * <p>Tests permission: 79 * {@link android.Manifest.permission#VIBRATE}
|
/frameworks/base/services/usb/java/com/android/server/usb/ |
H A D | UsbService.java | 188 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 194 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 225 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 232 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 239 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 245 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 251 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 270 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 280 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); 286 mContext.enforceCallingOrSelfPermission(android.Manifest.permission [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | MmsServiceBroker.java | 227 mContext.enforceCallingPermission(Manifest.permission.SEND_SMS, "Send MMS message"); 244 mContext.enforceCallingPermission(Manifest.permission.RECEIVE_MMS, 267 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Import SMS message"); 282 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Import MMS message"); 296 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, 308 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Delete conversation"); 319 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, 328 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, 337 mContext.enforceCallingPermission(Manifest.permission.WRITE_SMS, "Add SMS draft"); 350 mContext.enforceCallingPermission(Manifest.permission 398 adjustUriForUserAndGrantPermission(Uri contentUri, String action, int permission) argument [all...] |
H A D | SerialService.java | 38 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.SERIAL_PORT, null); 53 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.SERIAL_PORT, null);
|
H A D | ConsumerIrService.java | 72 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.TRANSMIT_IR) 74 throw new SecurityException("Requires TRANSMIT_IR permission"); 104 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.TRANSMIT_IR) 106 throw new SecurityException("Requires TRANSMIT_IR permission");
|
/frameworks/base/core/java/android/net/ |
H A D | NetworkScorerAppManager.java | 20 import android.Manifest.permission; 80 * <li>Declares the {@link android.Manifest.permission#SCORE_NETWORKS} permission. 82 * {@link android.Manifest.permission#BROADCAST_NETWORK_PRIVILEGED} permission. 101 if (!permission.BROADCAST_NETWORK_PRIVILEGED.equals(receiverInfo.permission)) { 102 // Receiver doesn't require the BROADCAST_NETWORK_PRIVILEGED permission, which means 106 if (pm.checkPermission(permission.SCORE_NETWORKS, receiverInfo.packageName) != 108 // Application doesn't hold the SCORE_NETWORKS permission, s [all...] |
/frameworks/base/services/core/java/com/android/server/connectivity/ |
H A D | PermissionMonitor.java | 19 import static android.Manifest.permission.CHANGE_NETWORK_STATE; 20 import static android.Manifest.permission.CONNECTIVITY_INTERNAL; 70 // Keys are App IDs. Values are true for SYSTEM permission and false for NETWORK permission. 132 Boolean permission = mApps.get(uid); 135 if (permission == null || permission == NETWORK) { 152 private boolean hasPermission(PackageInfo app, String permission) { argument 155 if (permission.equals(p)) { 240 Boolean permission [all...] |
/frameworks/base/core/java/android/app/ |
H A D | AppOpsManager.java | 401 * This optionally maps a permission to an operation. If there 402 * is no permission associated with an operation, it is null. 405 android.Manifest.permission.ACCESS_COARSE_LOCATION, 406 android.Manifest.permission.ACCESS_FINE_LOCATION, 408 android.Manifest.permission.VIBRATE, 409 android.Manifest.permission.READ_CONTACTS, 410 android.Manifest.permission.WRITE_CONTACTS, 411 android.Manifest.permission.READ_CALL_LOG, 412 android.Manifest.permission.WRITE_CALL_LOG, 413 android.Manifest.permission [all...] |
/frameworks/base/core/tests/coretests/src/android/net/ |
H A D | NetworkScorerAppManagerTest.java | 19 import android.Manifest.permission; 62 // Package 2 - Receiver does not have BROADCAST_NETWORK_PRIVILEGED permission. 65 // Package 3 - App does not have SCORE_NETWORKS permission. 128 Mockito.when(mMockPm.checkPermission(permission.SCORE_NETWORKS, packageName)) 137 resolveInfo.activityInfo.permission = permission.BROADCAST_NETWORK_PRIVILEGED;
|
/frameworks/opt/net/ethernet/java/com/android/server/ethernet/ |
H A D | EthernetServiceImpl.java | 72 android.Manifest.permission.ACCESS_NETWORK_STATE, 78 android.Manifest.permission.CHANGE_NETWORK_STATE, 84 android.Manifest.permission.CONNECTIVITY_INTERNAL, 175 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | CellBroadcastHandler.java | 85 receiverPermission = Manifest.permission.RECEIVE_EMERGENCY_BROADCAST; 90 receiverPermission = Manifest.permission.RECEIVE_SMS;
|