/frameworks/native/libs/binder/ |
D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { in check() argument 41 e.name = permission; in check() 51 void PermissionCache::cache(const String16& permission, in cache() argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); in cache() 59 mPermissionNamesPool.add(permission); in cache() 60 e.name = permission; in cache() 77 bool PermissionCache::checkCallingPermission(const String16& permission) { in checkCallingPermission() argument 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); in checkCallingPermission() 82 const String16& permission, int32_t* outPid, int32_t* outUid) { in checkCallingPermission() argument 88 return PermissionCache::checkPermission(permission, pid, uid); in checkCallingPermission() [all …]
|
D | IServiceManager.cpp | 51 bool checkCallingPermission(const String16& permission) in checkCallingPermission() argument 53 return checkCallingPermission(permission, NULL, NULL); in checkCallingPermission() 59 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) in checkCallingPermission() argument 66 return checkPermission(permission, pid, uid); in checkCallingPermission() 69 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) in checkPermission() argument 80 bool res = pc->checkPermission(permission, pid, uid); in checkPermission() 85 String8(permission).string(), uid, pid); in checkPermission() 93 String8(permission).string(), uid, pid); in checkPermission() 112 String8(permission).string(), uid, pid); in checkPermission()
|
D | IPermissionController.cpp | 40 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) in checkPermission() argument 44 data.writeString16(permission); in checkPermission() 65 String16 permission = data.readString16(); in onTransact() local 68 bool res = checkPermission(permission, pid, uid); in onTransact()
|
/frameworks/base/core/java/android/test/ |
D | AndroidTestCase.java | 92 String packageName, String className, String permission) { in assertActivityRequiresPermission() argument 99 fail("expected security exception for " + permission); in assertActivityRequiresPermission() 102 assertTrue("error message should contain " + permission + ".", in assertActivityRequiresPermission() 103 expected.getMessage().contains(permission)); in assertActivityRequiresPermission() 115 public void assertReadingContentUriRequiresPermission(Uri uri, String permission) { in assertReadingContentUriRequiresPermission() argument 118 fail("expected SecurityException requiring " + permission); in assertReadingContentUriRequiresPermission() 121 assertTrue("error message should contain " + permission + ".", in assertReadingContentUriRequiresPermission() 122 expected.getMessage().contains(permission)); in assertReadingContentUriRequiresPermission() 134 public void assertWritingContentUriRequiresPermission(Uri uri, String permission) { in assertWritingContentUriRequiresPermission() argument 137 fail("expected SecurityException requiring " + permission); in assertWritingContentUriRequiresPermission() [all …]
|
/frameworks/base/docs/html/guide/topics/manifest/ |
D | permission-element.jd | 1 page.title=<permission> 8 <dd><pre class="stx"><permission android:<a href="#desc">description</a>="<i>string resource</i>" 20 <dd>Declares a security permission that can be used to limit access 30 <dd>A user-readable description of the permission, longer and more 32 permission to the user — for example, when the user is asked 33 whether to grant the permission to another application. 42 permission.</dd> 45 <dd>A name for the permission, one that can be displayed to users. 56 <dd>The name of the permission. This is the name that will be used in 57 code to refer to the permission — for example, in a [all …]
|
D | permission-group-element.jd | 1 page.title=<permission-group> 8 <dd><pre class="stx"><permission-group android:<a href="#desc">description</a>="<i>string resour… 18 permission join the group through the {@code permissionGroup} attribute of the 19 <code><a href="{@docRoot}guide/topics/manifest/permission-element.html"><permission></a></cod… 23 Note that this element does not declare a permission itself, only a category in 25 <code><a href="{@docRoot}guide/topics/manifest/permission-element.html"><permission></a></cod… 38 <dd>An icon representing the permission. This attribute must be set 50 <code><a href="{@docRoot}guide/topics/manifest/permission-element.html"><permission></a></cod… 52 <code><a href="{@docRoot}guide/topics/manifest/permission-element.html#pgroup"><permissionGroup&… 61 <dd><code><a href="{@docRoot}guide/topics/manifest/permission-element.html"><permission></a><… [all …]
|
D | uses-permission-element.jd | 1 page.title=<uses-permission> 14 through <code><uses-permission></code> can affect how 17 <p>If you request a hardware-related permission — 25 <code><uses-permission></code> elements. Then, if you want to disable 38 <dd><pre class="stx"><uses-permission android:<a href="#nm">name</a>="<i>string</i>" /></pre>… 44 <dd>Requests a permission that the application must be granted in 54 {@link android.Manifest.permission android.Manifest.permission}. 59 <dd>The name of the permission. It can be a permission defined by the 60 … with the <code><a href="{@docRoot}guide/topics/manifest/permission-element.html"><permission&g… 61 element, a permission defined by another application, or one of the [all …]
|
D | permission-tree-element.jd | 1 page.title=<permission-tree> 8 <dd><pre class="stx"><permission-tree android:<a href="#icon">icon</a>="<i>drawable resource</i>" 28 Note that this element does not declare a permission itself, only a 30 <code><a href="{@docRoot}guide/topics/manifest/permission-element.html"><permission></a></cod… 48 <dd>The name that's at the base of the permission tree. It serves as 49 a prefix to all permission names in the tree. Java-style scoping should 61 <dd><code><a href="{@docRoot}guide/topics/manifest/permission-element.html"><permission></a><… 62 <br/><code><a href="{@docRoot}guide/topics/manifest/permission-group-element.html"><permission-g… 63 …/><code><a href="{@docRoot}guide/topics/manifest/uses-permission-element.html"><uses-permission…
|
D | manifest-intro.jd | 77 …<a href="{@docRoot}guide/topics/manifest/uses-permission-element.html"><uses-permission /></… 78 <a href="{@docRoot}guide/topics/manifest/permission-element.html"><permission /></a> 79 …<a href="{@docRoot}guide/topics/manifest/permission-tree-element.html"><permission-tree /></… 80 …<a href="{@docRoot}guide/topics/manifest/permission-group-element.html"><permission-group />… 116 …<a href="{@docRoot}guide/topics/manifest/grant-uri-permission-element.html"><grant-uri-permissi… 118 …<a href="{@docRoot}guide/topics/manifest/path-permission-element.html"><path-permission /></… 141 …><a href="{@docRoot}guide/topics/manifest/grant-uri-permission-element.html"><grant-uri-permiss… 146 <br/><code><a href="{@docRoot}guide/topics/manifest/permission-element.html"><permission></a>… 147 <br/><code><a href="{@docRoot}guide/topics/manifest/permission-group-element.html"><permission-g… 148 <br/><code><a href="{@docRoot}guide/topics/manifest/permission-tree-element.html"><permission-tr… [all …]
|
D | grant-uri-permission-element.jd | 1 page.title=<grant-uri-permission> 8 <dd><pre class="stx"><grant-uri-permission android:<a href="#path">path</a>="<i>string</i>" 16 <dd>Specifies which data subsets of the parent content provider permission 20 Granting permission is a way of enabling clients of the provider that don't 21 normally have permission to access its data to overcome that restriction on 26 attribute is "{@code true}", permission can be granted for any the data under 27 the provider's purview. However, if that attribute is "{@code false}", permission 29 A provider can contain any number of {@code <grant-uri-permission>} elements. 34 For information on how permission is granted, see the 44 <dd>A path identifying the data subset or subsets that permission can be [all …]
|
D | path-permission-element.jd | 1 page.title=<path-permission> 9 <path-permission android:<a href="#path">path</a>="<i>string</i>" 12 android:<a href="#permission">permission</a>="<i>string</i>" 75 <dt><a name="permission"></a>{@code android:permission}</dt> 76 <dd>The name of a permission that clients must have in order to read or write the 78 single permission for both reading and writing. However, the 85 <dd>A permission that clients must have in order to query the content provider. 89 <dd>A permission that clients must have in order to make changes to the data controlled by the cont… 102 <dd>{@link android.Manifest.permission}</dd>
|
D | provider-element.jd | 19 android:<a href="#prmsn">permission</a>="<i>string</i>" 35 …><a href="{@docRoot}guide/topics/manifest/grant-uri-permission-element.html"><grant-uri-permiss… 36 …/><code><a href="{@docRoot}guide/topics/manifest/path-permission-element.html"><path-permission… 137 <code><a href="{@docRoot}guide/topics/manifest/provider-element.html#prmsn">permission</a></code> 143 <dd>Whether or not those who ordinarily would not have permission to 144 access the content provider's data can be granted permission to do so, 148 <code><a href="{@docRoot}guide/topics/manifest/provider-element.html#prmsn">permission</a></code> a… 150 "{@code true}" if permission can be granted, and "{@code false}" if not. 151 If "{@code true}", permission can be granted to any of the content 152 provider's data. If "{@code false}", permission can be granted only [all …]
|
/frameworks/base/core/java/android/content/pm/ |
D | ServiceInfo.java | 34 public String permission; field in ServiceInfo 72 permission = orig.permission; in ServiceInfo() 78 pw.println(prefix + "permission=" + permission); in dump() 94 dest.writeString(permission); in writeToParcel() 110 permission = source.readString(); in ServiceInfo()
|
D | ActivityInfo.java | 71 public String permission; field in ActivityInfo 535 permission = orig.permission; in ActivityInfo() 559 if (permission != null) { in dump() 560 pw.println(prefix + "permission=" + permission); in dump() 595 dest.writeString(permission); in writeToParcel() 620 permission = source.readString(); in ActivityInfo()
|
D | ApplicationInfo.java | 47 public String permission; field in ApplicationInfo 483 if (permission != null) { in dump() 484 pw.println(prefix + "permission=" + permission); in dump() 562 permission = orig.permission; in ApplicationInfo() 602 dest.writeString(permission); in writeToParcel() 641 permission = source.readString(); in ApplicationInfo()
|
/frameworks/base/core/java/android/app/ |
D | AppOpsManager.java | 362 android.Manifest.permission.ACCESS_COARSE_LOCATION, 363 android.Manifest.permission.ACCESS_FINE_LOCATION, 365 android.Manifest.permission.VIBRATE, 366 android.Manifest.permission.READ_CONTACTS, 367 android.Manifest.permission.WRITE_CONTACTS, 368 android.Manifest.permission.READ_CALL_LOG, 369 android.Manifest.permission.WRITE_CALL_LOG, 370 android.Manifest.permission.READ_CALENDAR, 371 android.Manifest.permission.WRITE_CALENDAR, 373 android.Manifest.permission.ACCESS_WIFI_STATE, [all …]
|
/frameworks/native/include/binder/ |
D | PermissionCache.h | 61 const String16& permission, uid_t uid) const; 63 void cache(const String16& permission, uid_t uid, bool granted); 68 static bool checkCallingPermission(const String16& permission); 70 static bool checkCallingPermission(const String16& permission, 73 static bool checkPermission(const String16& permission,
|
D | IServiceManager.h | 79 bool checkCallingPermission(const String16& permission); 80 bool checkCallingPermission(const String16& permission, 82 bool checkPermission(const String16& permission, pid_t pid, uid_t uid);
|
/frameworks/base/services/java/com/android/server/firewall/ |
D | SenderPermissionFilter.java | 31 private SenderPermissionFilter(String permission) { in SenderPermissionFilter() argument 32 mPermission = permission; in SenderPermissionFilter() 49 String permission = parser.getAttributeValue(null, ATTR_NAME); 50 if (permission == null) { 54 return new SenderPermissionFilter(permission);
|
/frameworks/base/core/java/android/hardware/location/ |
D | GeofenceHardwareService.java | 77 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 84 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 92 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 101 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 109 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 117 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 126 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 136 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE,
|
/frameworks/base/docs/html/guide/topics/security/ |
D | permissions.jd | 34 "permission" mechanism that enforces restrictions on the specific operations 42 application, by default, has permission to perform any operations that would 75 href="/guide/topics/manifest/permission-element.html#plevel">signature-level 120 <code>{@link android.R.styleable#AndroidManifestUsesPermission <uses-permission>}</code> 128 <uses-permission android:name="android.permission.RECEIVE_SMS" /> 137 permission when installed, and can use that feature as desired, or the 138 permission was not granted and any attempt to use the feature will fail 141 <p>Often times a permission failure will result in a {@link 146 will not receive an exception if there are permission failures. In almost all 147 cases, however, a permission failure will be printed to the system log.</p> [all …]
|
/frameworks/base/services/java/com/android/server/usb/ |
D | UsbService.java | 164 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); in setDevicePackage() 170 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); in setAccessoryPackage() 201 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); in grantDevicePermission() 208 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); in grantAccessoryPermission() 215 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); in hasDefaults() 221 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); in clearDefaults() 227 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); in setCurrentFunction() 237 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); in setMassStorageBackingFile() 247 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); in allowUsbDebugging() 253 mContext.enforceCallingOrSelfPermission(android.Manifest.permission.MANAGE_USB, null); in denyUsbDebugging() [all …]
|
/frameworks/base/services/java/com/android/server/dreams/ |
D | DreamManagerService.java | 116 checkPermission(android.Manifest.permission.READ_DREAM_STATE); in getDreamComponents() 129 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); in setDreamComponents() 145 checkPermission(android.Manifest.permission.READ_DREAM_STATE); in getDefaultDreamComponent() 161 checkPermission(android.Manifest.permission.READ_DREAM_STATE); in isDreaming() 170 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); in dream() 188 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); in testDream() 215 checkPermission(android.Manifest.permission.WRITE_DREAM_STATE); in awaken() 372 private void checkPermission(String permission) { in checkPermission() argument 373 if (mContext.checkCallingOrSelfPermission(permission) in checkPermission() 376 + ", must have permission " + permission); in checkPermission()
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
D | WapPushOverSms.java | 226 String permission; in dispatchWapPdu() local 230 permission = android.Manifest.permission.RECEIVE_MMS; in dispatchWapPdu() 233 permission = android.Manifest.permission.RECEIVE_WAP_PUSH; in dispatchWapPdu() 255 handler.dispatchIntent(intent, permission, appOp, receiver); in dispatchWapPdu()
|
/frameworks/base/core/java/android/content/ |
D | ContextWrapper.java | 544 public int checkPermission(String permission, int pid, int uid) { in checkPermission() argument 545 return mBase.checkPermission(permission, pid, uid); in checkPermission() 549 public int checkCallingPermission(String permission) { in checkCallingPermission() argument 550 return mBase.checkCallingPermission(permission); in checkCallingPermission() 554 public int checkCallingOrSelfPermission(String permission) { in checkCallingOrSelfPermission() argument 555 return mBase.checkCallingOrSelfPermission(permission); in checkCallingOrSelfPermission() 560 String permission, int pid, int uid, String message) { in enforcePermission() argument 561 mBase.enforcePermission(permission, pid, uid, message); in enforcePermission() 565 public void enforceCallingPermission(String permission, String message) { in enforceCallingPermission() argument 566 mBase.enforceCallingPermission(permission, message); in enforceCallingPermission() [all …]
|