Searched refs:permission (Results 26 - 50 of 186) sorted by relevance

12345678

/frameworks/base/core/java/android/content/
H A DContextWrapper.java566 public int checkPermission(String permission, int pid, int uid) { argument
567 return mBase.checkPermission(permission, pid, uid);
572 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument
573 return mBase.checkPermission(permission, pid, uid, callerToken);
577 public int checkCallingPermission(String permission) { argument
578 return mBase.checkCallingPermission(permission);
582 public int checkCallingOrSelfPermission(String permission) { argument
583 return mBase.checkCallingOrSelfPermission(permission);
588 String permission, int pid, int uid, String message) {
589 mBase.enforcePermission(permission, pi
587 enforcePermission( String permission, int pid, int uid, String message) argument
593 enforceCallingPermission(String permission, String message) argument
598 enforceCallingOrSelfPermission( String permission, String message) argument
[all...]
H A DContext.java688 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
696 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
697 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
800 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
808 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
809 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
912 * holding {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
920 * to other packages, {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE}
921 * and/or {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
1160 * <p>This method requires the caller to hold the permission
2935 checkPermission(@onNull String permission, int pid, int uid) argument
2939 checkPermission(@onNull String permission, int pid, int uid, IBinder callerToken) argument
2964 checkCallingPermission(@onNull String permission) argument
2983 checkCallingOrSelfPermission(@onNull String permission) argument
2997 enforcePermission( @onNull String permission, int pid, int uid, @Nullable String message) argument
3018 enforceCallingPermission( @onNull String permission, @Nullable String message) argument
3034 enforceCallingOrSelfPermission( @onNull String permission, @Nullable String message) argument
[all...]
/frameworks/base/services/core/java/com/android/server/dreams/
H A DDreamManagerService.java19 import static android.Manifest.permission.BIND_DREAM_SERVICE;
266 && !BIND_DREAM_SERVICE.equals(serviceInfo.permission)) {
269 + " permission on the dream service declaration.");
408 private void checkPermission(String permission) { argument
409 if (mContext.checkCallingOrSelfPermission(permission)
412 + ", must have permission " + permission);
465 if (mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP)
483 checkPermission(android.Manifest.permission.READ_DREAM_STATE);
496 checkPermission(android.Manifest.permission
[all...]
/frameworks/base/services/core/java/com/android/server/media/
H A DRemoteDisplayProviderWatcher.java151 if (serviceInfo.permission == null || !serviceInfo.permission.equals(
152 Manifest.permission.BIND_REMOTE_DISPLAY)) {
153 // If the service does not require this permission then any app could
158 + "require the BIND_REMOTE_DISPLAY permission in its manifest: "
163 // If the service does not have permission to capture video then it
168 + "permission: " + serviceInfo.packageName + "/" + serviceInfo.name);
176 if (mPackageManager.checkPermission(Manifest.permission.CAPTURE_VIDEO_OUTPUT,
180 if (mPackageManager.checkPermission(Manifest.permission.CAPTURE_SECURE_VIDEO_OUTPUT,
/frameworks/base/core/java/android/service/trust/
H A DTrustAgentService.java50 * the {@link android.Manifest.permission#BIND_TRUST_AGENT} permission
55 * android:permission="android.permission.BIND_TRUST_AGENT">
155 if (!Manifest.permission.BIND_TRUST_AGENT.equals(serviceInfo.permission)) {
157 + " is not declared with the permission "
158 + "\"" + Manifest.permission.BIND_TRUST_AGENT + "\"");
/frameworks/base/core/java/android/service/voice/
H A DVoiceInteractionServiceInfo.java59 if (!Manifest.permission.BIND_VOICE_INTERACTION.equals(si.permission)) {
60 mParseError = "Service does not require permission "
61 + Manifest.permission.BIND_VOICE_INTERACTION;
/frameworks/base/services/core/java/com/android/server/
H A DNetworkScoreService.java19 import android.Manifest.permission;
187 mContext.checkCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED) ==
206 // mContext.enforceCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED, TAG);
207 mContext.enforceCallingOrSelfPermission(permission.SCORE_NETWORKS, TAG);
217 mContext.checkCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED) ==
267 mContext.enforceCallingOrSelfPermission(permission.BROADCAST_NETWORK_PRIVILEGED, TAG);
279 mContext.enforceCallingOrSelfPermission(permission.DUMP, TAG);
/frameworks/base/services/core/java/com/android/server/content/
H A DContentService.java86 mContext.enforceCallingOrSelfPermission(Manifest.permission.DUMP,
87 "caller doesn't have the DUMP permission");
89 // This makes it so that future permission checks will be in the context of this
164 * the calling user without requiring any permission, otherwise the caller needs to
165 * hold the INTERACT_ACROSS_USERS_FULL permission. Pseudousers USER_ALL and
176 "no permission to observe other users' provider view");
214 * the calling user without requiring any permission, otherwise the caller needs to
215 * hold the INTERACT_ACROSS_USERS_FULL permission. Pseudousers USER_ALL and
227 // Notify for any user other than the caller's own requires permission.
230 mContext.enforceCallingOrSelfPermission(Manifest.permission
[all...]
/frameworks/base/test-runner/src/android/test/mock/
H A DMockContext.java483 public int checkPermission(String permission, int pid, int uid) { argument
489 public int checkPermission(String permission, int pid, int uid, IBinder callerToken) { argument
490 return checkPermission(permission, pid, uid);
494 public int checkCallingPermission(String permission) { argument
499 public int checkCallingOrSelfPermission(String permission) { argument
505 String permission, int pid, int uid, String message) {
510 public void enforceCallingPermission(String permission, String message) { argument
515 public void enforceCallingOrSelfPermission(String permission, String message) { argument
504 enforcePermission( String permission, int pid, int uid, String message) argument
/frameworks/base/services/core/java/com/android/server/location/
H A DFusedProxy.java57 Manifest.permission.LOCATION_HARDWARE);
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/
H A DPmPermissionsTests.java17 package com.android.framework.permission.tests;
29 private String mPkgName = "com.android.framework.permission.tests";
38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission
39 * android.permission.GET_PACKAGE_SIZE
53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission
54 * android.permission.DELETE_CACHE_FILES
68 * This test verifies that PackageManger.installPackage enforces permission
69 * android.permission.INSTALL_PACKAGES
88 * enforces permission android.permission
[all...]
H A DActivityManagerPermissionTests.java17 package com.android.framework.permission.tests;
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DPhoneSubInfo.java40 android.Manifest.permission.READ_PHONE_STATE;
43 android.Manifest.permission.CALL_PRIVILEGED;
45 android.Manifest.permission.READ_PRIVILEGED_PHONE_STATE;
327 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP)
H A DWapPushOverSms.java263 String permission;
267 permission = android.Manifest.permission.RECEIVE_MMS;
270 permission = android.Manifest.permission.RECEIVE_WAP_PUSH;
293 handler.dispatchIntent(intent, permission, appOp, receiver, UserHandle.OWNER);
H A DIccPhoneBookInterfaceManager.java143 * throws SecurityException if no WRITE_CONTACTS permission
164 android.Manifest.permission.WRITE_CONTACTS)
167 "Requires android.permission.WRITE_CONTACTS permission");
200 * throws SecurityException if no WRITE_CONTACTS permission
216 android.Manifest.permission.WRITE_CONTACTS)
219 "Requires android.permission.WRITE_CONTACTS permission");
256 * throws SecurityException if no READ_CONTACTS permission
264 android.Manifest.permission
[all...]
/frameworks/base/core/java/android/content/pm/
H A DApplicationInfo.java48 * Optional name of a permission required to be able to access this
49 * application's components. From the "permission" attribute.
51 public String permission; field in class:ApplicationInfo
136 * {@link android.Manifest.permission#FACTORY_TEST} permission and the
595 if (permission != null) {
596 pw.println(prefix + "permission=" + permission);
678 permission = orig.permission;
[all...]
/frameworks/base/services/core/java/com/android/server/media/projection/
H A DMediaProjectionManagerService.java57 * as well as the capabilities they grant. Any service using MediaProjection tokens as permission
218 android.Manifest.permission.CAPTURE_VIDEO_OUTPUT)
231 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
234 + "projection permission");
261 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
276 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
294 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
309 if (mContext.checkCallingPermission(Manifest.permission.MANAGE_MEDIA_PROJECTION)
325 || mContext.checkCallingOrSelfPermission(Manifest.permission.DUMP)
341 private boolean checkPermission(String packageName, String permission) { argument
[all...]
/frameworks/base/packages/Keyguard/test/
H A DAndroid.mk23 # Remove these to verify permission checks are working correctly
/frameworks/base/packages/Keyguard/test/SampleTrustAgent/
H A DAndroid.mk23 # Remove this to verify permission checks are working correctly
/frameworks/base/services/core/java/com/android/server/lights/
H A DLightsService.java147 if (context.checkCallingOrSelfPermission(android.Manifest.permission.FLASHLIGHT)
149 context.checkCallingOrSelfPermission(android.Manifest.permission.HARDWARE_TEST)
151 throw new SecurityException("Requires FLASHLIGHT or HARDWARE_TEST permission");
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DWifiNetworkScoreCache.java19 import android.Manifest.permission;
169 mContext.enforceCallingOrSelfPermission(permission.DUMP, TAG);
/frameworks/base/core/java/android/appwidget/
H A DAppWidgetManager.java798 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
817 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
839 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
841 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to
847 * @return true if this component has permission to bind the AppWidget
859 * <p class="note">You need the BIND_APPWIDGET permission or the user must have enabled binding
861 * method returns false, call {@link #ACTION_APPWIDGET_BIND} to request permission to
870 * @return true if this component has permission to bind the AppWidget
881 * Set the provider for a given appWidgetId if the caller has a permission.
883 * <strong>Note:</strong> You need the {@link android.Manifest.permission#BIND_APPWIDGE
957 setBindAppWidgetPermission(String packageName, boolean permission) argument
975 setBindAppWidgetPermission(String packageName, int userId, boolean permission) argument
[all...]
/frameworks/base/core/jni/
H A Dandroid_os_SELinux.cpp359 * permissionStr: permission name as a string
360 * Returns: boolean: (true) if permission was granted, (false) otherwise
384 ScopedUtfChars permission(env, permissionStr);
385 if (permission.c_str() == NULL) {
391 int accessGranted = selinux_check_access(tmp1, tmp2, objectClass.c_str(), permission.c_str(),
395 objectClass.c_str(), permission.c_str(), accessGranted);
/frameworks/base/telephony/java/com/android/internal/telephony/
H A DISms.aidl439 * Returns the premium SMS send permission for the specified package.
440 * Requires system permission.
445 * Returns the premium SMS send permission for the specified package.
446 * Requires system permission.
451 * Set the SMS send permission for the specified package.
452 * Requires system permission.
454 void setPremiumSmsPermission(String packageName, int permission);
457 * Set the SMS send permission for the specified package.
458 * Requires system permission.
460 void setPremiumSmsPermissionForSubscriber(int subId, String packageName, int permission);
[all...]
/frameworks/base/media/tests/CameraBrowser/src/com/android/camerabrowser/
H A DMtpClient.java90 boolean permission = intent.getBooleanExtra(UsbManager.EXTRA_PERMISSION_GRANTED,
92 Log.d(TAG, "ACTION_USB_PERMISSION: " + permission);
93 if (permission) {

Completed in 627 milliseconds

12345678