Searched defs:permission (Results 1 - 25 of 112) sorted by relevance

12345

/frameworks/base/tests/permission/src/com/android/framework/permission/tests/
H A DServiceManagerPermissionTests.java17 package com.android.framework.permission.tests;
54 public boolean checkPermission(java.lang.String permission, int pid, int uid) {
69 public boolean isRuntimePermission(String permission) {
H A DVibratorServicePermissionTest.java17 package com.android.framework.permission.tests;
46 * <p>Tests permission:
47 * {@link android.Manifest.permission#VIBRATE}
64 * <p>Tests permission:
65 * {@link android.Manifest.permission#VIBRATE}
H A DPmPermissionsTests.java17 package com.android.framework.permission.tests;
29 private String mPkgName = "com.android.framework.permission.tests";
38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission
39 * android.permission.GET_PACKAGE_SIZE
53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission
54 * android.permission.DELETE_CACHE_FILES
68 * This test verifies that PackageManger.installPackage enforces permission
69 * android.permission.INSTALL_PACKAGES
76 * enforces permission android.permission
[all...]
H A DSmsManagerPermissionTest.java17 package com.android.framework.permission.tests;
38 * {@link android.Manifest.permission#SEND_SMS}.
54 * {@link android.Manifest.permission#SEND_SMS}.
70 * {@link android.Manifest.permission#SEND_MMS}.
H A DWindowManagerPermissionTests.java17 package com.android.framework.permission.tests;
H A DActivityManagerPermissionTests.java17 package com.android.framework.permission.tests;
/frameworks/base/core/java/android/content/
H A DPermissionChecker.java31 * This class provides permission check APIs that verify both the
32 * permission and the associated app op for this permission if
35 * In the new permission model permissions with protection level
40 * permission revocations and would crash. Therefore, when the
41 * user disables a permission for a legacy app in the UI the
42 * platform disables the APIs guarded by this permission making
50 * permission model for which the user had disabled the "permission"
57 /** Permission result: The permission i
91 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, @Nullable String packageName) argument
129 checkSelfPermission(@onNull Context context, @NonNull String permission) argument
147 checkCallingPermission(@onNull Context context, @NonNull String permission, @Nullable String packageName) argument
166 checkCallingOrSelfPermission(@onNull Context context, @NonNull String permission) argument
[all...]
/frameworks/base/tests/testables/src/android/testing/
H A DTestablePermissions.java22 * Simple class for simulating basic permission states for tests.
35 * for a specific permission value. For all enforcePermission* calls
38 public void setPermission(String permission, int value) { argument
39 mPermissions.put(permission, value);
44 * for a specific permission value. For all enforceUriPermission* calls
52 boolean wantsCall(String permission) { argument
53 return mPermissions.containsKey(permission);
60 int check(String permission) { argument
61 return mPermissions.get(permission);
69 public void enforce(String permission) { argument
[all...]
/frameworks/native/services/nativeperms/
H A Dnativeperms.cpp30 static android::String16 serviceName("permission");
38 const ::android::String16& permission, int32_t pid, int32_t uid,
40 (void)permission;
58 const ::android::String16& permission, bool* _aidl_return) {
59 (void)permission;
37 checkPermission( const ::android::String16& permission, int32_t pid, int32_t uid, bool* _aidl_return) argument
57 isRuntimePermission( const ::android::String16& permission, bool* _aidl_return) argument
/frameworks/opt/chips/src/com/android/ex/chips/
H A DChipsUtil.java29 * Listener that gets notified when we check whether we have permission.
32 void onPermissionCheck(String permission, boolean granted); argument
39 new String[] { Manifest.permission.READ_CONTACTS };
51 * <p>This is interesting for us because new permission model is introduced in M and we need to
59 * Returns {@link PackageManager#PERMISSION_GRANTED} if given permission is granted, or
62 public static int checkPermission(Context context, String permission) { argument
64 // TODO: Use "context.checkSelfPermission(permission)" once it's safe to move to M sdk
65 return context.checkPermission(permission, Process.myPid(), Process.myUid());
67 // Assume that we have permission before M.
80 for (String permission
[all...]
/frameworks/base/core/java/android/app/
H A DActivityManagerNative.java58 static public void broadcastStickyIntent(Intent intent, String permission, int userId) { argument
59 broadcastStickyIntent(intent, permission, AppOpsManager.OP_NONE, userId);
64 * If you don't care about permission, use null.
68 static public void broadcastStickyIntent(Intent intent, String permission, int appOp, argument
/frameworks/base/core/java/android/content/pm/permission/
H A DRuntimePermissionPresentationInfo.java17 package android.content.pm.permission;
25 * This class contains information about how a runtime permission
26 * is to be presented in the UI. A single runtime permission
28 * permissions, e.g. the location permission may control both the
44 * @param label The permission label.
45 * @param granted Whether the permission is granted.
46 * @param standard Whether this is a platform-defined permission.
67 * @return Whether the permission is granted.
74 * @return Whether the permission is platform-defined.
81 * Gets the permission labe
[all...]
/frameworks/base/services/core/java/com/android/server/firewall/
H A DSenderPermissionFilter.java31 private SenderPermissionFilter(String permission) { argument
32 mPermission = permission;
45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") {
49 String permission = parser.getAttributeValue(null, ATTR_NAME);
50 if (permission == null) {
54 return new SenderPermissionFilter(permission);
/frameworks/native/libs/binder/
H A DPermissionCache.cpp38 const String16& permission, uid_t uid) const {
41 e.name = permission;
51 void PermissionCache::cache(const String16& permission, argument
55 ssize_t index = mPermissionNamesPool.indexOf(permission);
59 mPermissionNamesPool.add(permission);
60 e.name = permission;
63 // permission checks
77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument
78 return PermissionCache::checkCallingPermission(permission, NULL, NULL);
82 const String16& permission, int32_
37 check(bool* granted, const String16& permission, uid_t uid) const argument
81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument
91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument
[all...]
H A DPermissionController.cpp36 sp<IBinder> binder = defaultServiceManager()->checkService(String16("permission"));
41 ALOGI("Waiting for permission service");
43 ALOGW("Waiting too long for permission service, giving up");
56 bool PermissionController::checkPermission(const String16& permission, int32_t pid, int32_t uid) argument
59 return service != NULL ? service->checkPermission(permission, pid, uid) : false;
76 bool PermissionController::isRuntimePermission(const String16& permission) argument
79 return service != nullptr ? service->isRuntimePermission(permission) : false;
H A DAppOpsManager.cpp133 int32_t AppOpsManager::permissionToOpCode(const String16& permission) { argument
136 return service->permissionToOpCode(permission);
H A DIAppOpsService.cpp117 virtual int32_t permissionToOpCode(const String16& permission) { argument
120 data.writeString16(permission);
205 String16 permission = data.readString16(); local
206 const int32_t opCode = permissionToOpCode(permission);
H A DIPermissionController.cpp39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument
43 data.writeString16(permission);
84 virtual bool isRuntimePermission(const String16& permission) argument
88 data.writeString16(permission);
118 String16 permission = data.readString16(); local
121 bool res = checkPermission(permission, pid, uid);
154 String16 permission = data.readString16(); local
155 const bool res = isRuntimePermission(permission);
/frameworks/native/services/vr/hardware_composer/
H A Dvr_composer.cpp14 const bool permission = PermissionCache::checkPermission( local
15 String16("android.permission.RESTRICTED_VR_ACCESS"), pid, uid);
16 if (!permission)
17 ALOGE("permission denied to pid=%d uid=%u", pid, uid);
19 return permission;
/frameworks/support/compat/src/main/java/androidx/core/app/
H A DAppOpsManagerCompat.java63 * Gets the app op name associated with a given permission.
70 * @param permission The permission.
71 * @return The app op associated with the permission or null.
74 public static String permissionToOp(@NonNull String permission) { argument
76 return AppOpsManager.permissionToOp(permission);
/frameworks/support/compat/src/main/java/androidx/core/content/
H A DPermissionChecker.java36 * This class provides permission check APIs that verify both the
37 * permission and the associated app op for this permission if
40 * In the new permission model permissions with protection level
45 * permission revocations and would crash. Therefore, when the
46 * user disables a permission for a legacy app in the UI the
47 * platform disables the APIs guarded by this permission making
55 * permission model for which the user had disabled the "permission"
60 /** Permission result: The permission i
95 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, @Nullable String packageName) argument
132 checkSelfPermission(@onNull Context context, @NonNull String permission) argument
150 checkCallingPermission(@onNull Context context, @NonNull String permission, @Nullable String packageName) argument
169 checkCallingOrSelfPermission(@onNull Context context, @NonNull String permission) argument
[all...]
/frameworks/base/core/java/android/content/pm/
H A DServiceInfo.java31 * Optional name of a permission required to be able to access this
32 * Service. From the "permission" attribute.
34 public String permission; field in class:ServiceInfo
85 permission = orig.permission;
96 pw.println(prefix + "permission=" + permission);
113 dest.writeString(permission);
129 permission = source.readString();
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/
H A DMockLockSettingsContext.java71 public void enforceCallingOrSelfPermission(String permission, String message) { argument
72 // Skip permission checks for unit tests.
76 public int checkCallingOrSelfPermission(String permission) { argument
/frameworks/base/test-base/src/android/test/
H A DAndroidTestCase.java88 * Asserts that launching a given activity is protected by a particular permission by
90 * is thrown that mentions the permission in its error message.
97 * @param permission The name of the permission.
100 String packageName, String className, String permission) {
107 fail("expected security exception for " + permission);
110 assertTrue("error message should contain " + permission + ".",
111 expected.getMessage().contains(permission));
117 * Asserts that reading from the content uri requires a particular permission by querying the
118 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission
99 assertActivityRequiresPermission( String packageName, String className, String permission) argument
123 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument
142 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument
[all...]
/frameworks/native/services/vr/virtual_touchpad/
H A DVirtualTouchpadService.cpp17 const String16 kDumpPermission("android.permission.DUMP");
18 const String16 kTouchPermission("android.permission.RESTRICTED_VR_ACCESS");
136 const bool permission = PermissionCache::checkPermission(kTouchPermission, *out_pid, uid); local
137 if (!permission) {
138 ALOGE("permission denied to pid=%ld uid=%ld", static_cast<long>(*out_pid),
141 return permission;

Completed in 7247 milliseconds

12345