/frameworks/base/core/java/android/content/ |
H A D | ContextWrapper.java | 566 public int checkPermission(String permission, int pid, int uid) { argument 567 return mBase.checkPermission(permission, pid, uid); 572 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 573 return mBase.checkPermission(permission, pid, uid, callerToken); 577 public int checkCallingPermission(String permission) { argument 578 return mBase.checkCallingPermission(permission); 582 public int checkCallingOrSelfPermission(String permission) { argument 583 return mBase.checkCallingOrSelfPermission(permission); 588 String permission, int pid, int uid, String message) { 589 mBase.enforcePermission(permission, pi 587 enforcePermission( String permission, int pid, int uid, String message) argument 593 enforceCallingPermission(String permission, String message) argument 598 enforceCallingOrSelfPermission( String permission, String message) argument [all...] |
H A D | Context.java | 688 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to 696 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} 697 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required. 800 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to 808 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} 809 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required. 912 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to 920 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} 921 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required. 1160 * <p>This method requires the caller to hold the permission 2935 checkPermission(@onNull String permission, int pid, int uid) argument 2939 checkPermission(@onNull String permission, int pid, int uid, IBinder callerToken) argument 2964 checkCallingPermission(@onNull String permission) argument 2983 checkCallingOrSelfPermission(@onNull String permission) argument 2997 enforcePermission( @onNull String permission, int pid, int uid, @Nullable String message) argument 3018 enforceCallingPermission( @onNull String permission, @Nullable String message) argument 3034 enforceCallingOrSelfPermission( @onNull String permission, @Nullable String message) argument [all...] |
/frameworks/base/services/core/java/com/android/server/dreams/ |
H A D | DreamManagerService.java | 19 import static android.Manifest.permission.BIND_DREAM_SERVICE; 266 && !BIND_DREAM_SERVICE.equals(serviceInfo.permission)) { 269 + " permission on the dream service declaration."); 408 private void checkPermission(String permission) { argument 409 if (mContext.checkCallingOrSelfPermission(permission) 412 + ", must have permission " + permission); 465 if (mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP) 483 checkPermission(android.Manifest.permission.READ_DREAM_STATE); 496 checkPermission(android.Manifest.permission [all...] |
/frameworks/base/services/core/java/com/android/server/media/ |
H A D | RemoteDisplayProviderWatcher.java | 151 if (serviceInfo.permission == null || !serviceInfo.permission.equals( 152 Manifest.permission.BIND_REMOTE_DISPLAY)) { 153 // If the service does not require this permission then any app could 158 + "require the BIND_REMOTE_DISPLAY permission in its manifest: " 163 // If the service does not have permission to capture video then it 168 + "permission: " + serviceInfo.packageName + "/" + serviceInfo.name); 176 if (mPackageManager.checkPermission(Manifest.permission.CAPTURE_VIDEO_OUTPUT, 180 if (mPackageManager.checkPermission(Manifest.permission.CAPTURE_SECURE_VIDEO_OUTPUT,
|
/frameworks/base/core/java/android/service/trust/ |
H A D | TrustAgentService.java | 50 * the {@link android.Manifest.permission#BIND_TRUST_AGENT} permission 55 * android:permission="android.permission.BIND_TRUST_AGENT"> 155 if (!Manifest.permission.BIND_TRUST_AGENT.equals(serviceInfo.permission)) { 157 + " is not declared with the permission " 158 + "\"" + Manifest.permission.BIND_TRUST_AGENT + "\"");
|
/frameworks/base/core/java/android/service/voice/ |
H A D | VoiceInteractionServiceInfo.java | 59 if (!Manifest.permission.BIND_VOICE_INTERACTION.equals(si.permission)) { 60 mParseError = "Service does not require permission " 61 + Manifest.permission.BIND_VOICE_INTERACTION;
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | NetworkScoreService.java | 19 import android.Manifest.permission; 187 mContext.checkCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED) == 206 // mContext.enforceCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED, TAG); 207 mContext.enforceCallingOrSelfPermission(permission.SCORE_NETWORKS, TAG); 217 mContext.checkCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED) == 267 mContext.enforceCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED, TAG); 279 mContext.enforceCallingOrSelfPermission(permission.DUMP, TAG);
|
/frameworks/base/services/core/java/com/android/server/content/ |
H A D | ContentService.java | 86 mContext.enforceCallingOrSelfPermission(Manifest.permission.DUMP, 87 "caller doesn't have the DUMP permission"); 89 // This makes it so that future permission checks will be in the context of this 164 * the calling user without requiring any permission, otherwise the caller needs to 165 * hold the INTERACT_ACROSS_USERS_FULL permission. Pseudousers USER_ALL and 176 "no permission to observe other users' provider view"); 214 * the calling user without requiring any permission, otherwise the caller needs to 215 * hold the INTERACT_ACROSS_USERS_FULL permission. Pseudousers USER_ALL and 227 // Notify for any user other than the caller's own requires permission. 230 mContext.enforceCallingOrSelfPermission(Manifest.permission [all...] |
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockContext.java | 483 public int checkPermission(String permission, int pid, int uid) { argument 489 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument 490 return checkPermission(permission, pid, uid); 494 public int checkCallingPermission(String permission) { argument 499 public int checkCallingOrSelfPermission(String permission) { argument 505 String permission, int pid, int uid, String message) { 510 public void enforceCallingPermission(String permission, String message) { argument 515 public void enforceCallingOrSelfPermission(String permission, String message) { argument 504 enforcePermission( String permission, int pid, int uid, String message) argument
|
/frameworks/base/services/core/java/com/android/server/location/ |
H A D | FusedProxy.java | 57 Manifest.permission.LOCATION_HARDWARE);
|
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | PmPermissionsTests.java | 17 package com.android.framework.permission.tests; 29 private String mPkgName = "com.android.framework.permission.tests"; 38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission 39 * android.permission.GET_PACKAGE_SIZE 53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission 54 * android.permission.DELETE_CACHE_FILES 68 * This test verifies that PackageManger.installPackage enforces permission 69 * android.permission.INSTALL_PACKAGES 88 * enforces permission android.permission [all...] |
H A D | ActivityManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
H A D | PhoneSubInfo.java | 40 android.Manifest.permission.READ_PHONE_STATE; 43 android.Manifest.permission.CALL_PRIVILEGED; 45 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE; 327 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
|
H A D | WapPushOverSms.java | 263 String permission; 267 permission = android.Manifest.permission.RECEIVE_MMS; 270 permission = android.Manifest.permission.RECEIVE_WAP_PUSH; 293 handler.dispatchIntent(intent, permission, appOp, receiver, UserHandle.OWNER);
|
H A D | IccPhoneBookInterfaceManager.java | 143 * throws SecurityException if no WRITE_CONTACTS permission 164 android.Manifest.permission.WRITE_CONTACTS) 167 "Requires android.permission.WRITE_CONTACTS permission"); 200 * throws SecurityException if no WRITE_CONTACTS permission 216 android.Manifest.permission.WRITE_CONTACTS) 219 "Requires android.permission.WRITE_CONTACTS permission"); 256 * throws SecurityException if no READ_CONTACTS permission 264 android.Manifest.permission [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ApplicationInfo.java | 48 * Optional name of a permission required to be able to access this 49 * application's components. From the "permission" attribute. 51 public String permission; field in class:ApplicationInfo 136 * {@link android.Manifest.permission#FACTORY_TEST} permission and the 595 if (permission != null) { 596 pw.println(prefix + "permission=" + permission); 678 permission = orig.permission; [all...] |
/frameworks/base/services/core/java/com/android/server/media/projection/ |
H A D | MediaProjectionManagerService.java | 57 * as well as the capabilities they grant. Any service using MediaProjection tokens as permission 218 android.Manifest.permission.CAPTURE_VIDEO_OUTPUT) 231 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 234 + "projection permission"); 261 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 276 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 294 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 309 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION) 325 || mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP) 341 private boolean checkPermission(String packageName, String permission) { argument [all...] |
/frameworks/base/packages/Keyguard/test/ |
H A D | Android.mk | 23 # Remove these to verify permission checks are working correctly
|
/frameworks/base/packages/Keyguard/test/SampleTrustAgent/ |
H A D | Android.mk | 23 # Remove this to verify permission checks are working correctly
|
/frameworks/base/services/core/java/com/android/server/lights/ |
H A D | LightsService.java | 147 if (context.checkCallingOrSelfPermission(android.Manifest.permission.FLASHLIGHT) 149 context.checkCallingOrSelfPermission(android.Manifest.permission.HARDWARE_TEST) 151 throw new SecurityException("Requires FLASHLIGHT or HARDWARE_TEST permission");
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiNetworkScoreCache.java | 19 import android.Manifest.permission; 169 mContext.enforceCallingOrSelfPermission(permission.DUMP, TAG);
|
/frameworks/base/core/java/android/appwidget/ |
H A D | AppWidgetManager.java | 798 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 817 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 839 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 841 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to 847 * @return true if this component has permission to bind the AppWidget 859 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding 861 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to 870 * @return true if this component has permission to bind the AppWidget 881 * Set the provider for a given appWidgetId if the caller has a permission. 883 * <strong>Note:</strong> You need the {@link android.Manifest.permission#BIND_APPWIDGE 957 setBindAppWidgetPermission(String packageName, boolean permission) argument 975 setBindAppWidgetPermission(String packageName, int userId, boolean permission) argument [all...] |
/frameworks/base/core/jni/ |
H A D | android_os_SELinux.cpp | 359 * permissionStr: permission name as a string 360 * Returns: boolean: (true) if permission was granted, (false) otherwise 384 ScopedUtfChars permission(env, permissionStr); 385 if (permission.c_str() == NULL) { 391 int accessGranted = selinux_check_access(tmp1, tmp2, objectClass.c_str(), permission.c_str(), 395 objectClass.c_str(), permission.c_str(), accessGranted);
|
/frameworks/base/telephony/java/com/android/internal/telephony/ |
H A D | ISms.aidl | 439 * Returns the premium SMS send permission for the specified package. 440 * Requires system permission. 445 * Returns the premium SMS send permission for the specified package. 446 * Requires system permission. 451 * Set the SMS send permission for the specified package. 452 * Requires system permission. 454 void setPremiumSmsPermission(String packageName, int permission); 457 * Set the SMS send permission for the specified package. 458 * Requires system permission. 460 void setPremiumSmsPermissionForSubscriber(int subId, String packageName, int permission); [all...] |
/frameworks/base/media/tests/CameraBrowser/src/com/android/camerabrowser/ |
H A D | MtpClient.java | 90 boolean permission = intent.getBooleanExtra(UsbManager.EXTRA_PERMISSION_GRANTED, 92 Log.d(TAG, "ACTION_USB_PERMISSION: " + permission); 93 if (permission) {
|