/frameworks/base/media/libdrm/mobile1/include/objmng/ |
H A D | drm_rights_manager.h | 30 #define DRM_UID_FILE_PATH "/data/drm/rights/uid.txt" 33 #define DRM_UID_FILE_PATH "/home/user/golf/esmertec/device/out/debug/host/linux-x86/product/sim/data/data/com.android.drm.mobile1/uid.txt" 48 * Get the id or uid from the "uid.txt" file. 52 * \param option The option to get id or uid, the value includes: GET_ID, GET_UID. 86 * Get the mex id number from the "uid.txt" file. 106 * Update the "uid.txt" file when delete the rights object. 119 * \param uid The content id for a specially DRM object. 126 int32_t drm_getKey(uint8_t* uid, uint8_t* KeyValue);
|
/frameworks/base/media/libdrm/mobile1/include/parser/ |
H A D | parser_rel.h | 69 uint8_t uid[256]; /**< record the rights object name */ member in struct:_T_DRM_Rights
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/usb/ |
H A D | UsbConfirmActivity.java | 117 final int uid = mResolveInfo.activityInfo.applicationInfo.uid; 127 service.grantDevicePermission(mDevice, uid); 140 service.grantAccessoryPermission(mAccessory, uid);
|
/frameworks/base/services/java/com/android/server/am/ |
H A D | PendingIntentRecord.java | 37 final int uid; field in class:PendingIntentRecord 186 uid = _u; 249 owner.startActivitiesInPackage(uid, allIntents, 252 owner.startActivityInPackage(uid, finalIntent, resolvedType, 268 owner.broadcastIntentInPackage(key.packageName, uid, 280 owner.startServiceInPackage(uid, 327 pw.print(prefix); pw.print("uid="); pw.print(uid);
|
H A D | ActivityManagerService.java | 604 public int uid; field in class:ActivityManagerService.Identity 608 uid = _uid; 786 int uid; field in class:ActivityManagerService.ProcessChangeItem 929 if (!showBackground && UserHandle.getAppId(proc.uid) 1263 final int uid = msg.arg2; 1264 dispatchProcessDied(pid, uid); 1389 mSelf.mProcessNames.put(app.processName, app.uid, app); 1496 + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid() 1517 + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid() 1537 + Binder.getCallingPid() + ", uid 1907 getProcessRecordLocked( String processName, int uid) argument 2428 dispatchProcessDied(int pid, int uid) argument 2630 startActivityInPackage(int uid, Intent intent, String resolvedType, IBinder resultTo, String resultWho, int requestCode, int startFlags, Bundle options, int userId) argument 2654 startActivitiesInPackage(int uid, Intent[] intents, String[] resolvedTypes, IBinder resultTo, Bundle options, int userId) argument 2801 crashApplication(int uid, int initialPid, String packageName, String message) argument 3695 killApplicationProcess(String processName, int uid) argument 3722 forceStopPackageLocked(final String packageName, int uid) argument 4860 checkPermission(String permission, int pid, int uid) argument 4869 checkComponentPermission(String permission, int pid, int uid, int owningUid, boolean exported) argument 4899 checkPermission(String permission, int pid, int uid) argument 4938 checkHoldingPermissionsLocked( IPackageManager pm, ProviderInfo pi, Uri uri, int uid, int modeFlags) argument 5020 checkUriPermissionLocked(Uri uri, int uid, int modeFlags) argument 5033 checkUriPermission(Uri uri, int pid, int uid, int modeFlags) argument 10920 startServiceInPackage(int uid, Intent service, String resolvedType, int userId) argument 11977 broadcastIntentInPackage(String packageName, int uid, Intent intent, String resolvedType, IIntentReceiver resultTo, int resultCode, String resultData, Bundle map, String requiredPermission, boolean serialized, boolean sticky, int userId) argument 14676 checkValidCaller(int uid, int userId) argument 14683 applyUserId(int uid, int userId) argument [all...] |
/frameworks/base/core/java/android/content/ |
H A D | Context.java | 2263 * @param uid The user ID being checked against. A uid of 0 is the root 2267 * pid/uid is allowed that permission, or 2273 public abstract int checkPermission(String permission, int pid, int uid); argument 2278 * {@link #checkPermission(String, int, int)} with the pid and uid returned 2289 * pid/uid is allowed that permission, or 2307 * pid/uid is allowed that permission, or 2322 * @param uid The user ID being checked against. A uid of 0 is the root 2329 String permission, int pid, int uid, Strin 2328 enforcePermission( String permission, int pid, int uid, String message) argument 2444 checkUriPermission(Uri uri, int pid, int uid, int modeFlags) argument 2510 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 2532 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 2597 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument [all...] |
H A D | IntentSender.java | 241 * Return the uid of the application that created this 244 * that an application can not spoof its uid. 246 * @return The uid of the PendingIntent, or -1 if there is 272 int uid = ActivityManagerNative.getDefault() 274 return uid > 0 ? new UserHandle(UserHandle.getUserId(uid)) : null;
|
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockContext.java | 435 public int checkPermission(String permission, int pid, int uid) { argument 451 String permission, int pid, int uid, String message) { 476 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 492 String writePermission, int pid, int uid, int modeFlags) { 498 Uri uri, int pid, int uid, int modeFlags, String message) { 516 int pid, int uid, int modeFlags, String message) { 450 enforcePermission( String permission, int pid, int uid, String message) argument 491 checkUriPermission(Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument 497 enforceUriPermission( Uri uri, int pid, int uid, int modeFlags, String message) argument 514 enforceUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags, String message) argument
|
/frameworks/base/services/java/com/android/server/pm/ |
H A D | PackageManagerService.java | 338 // These are the built-in uid -> permission mappings that were read from the 711 extras.putInt(Intent.EXTRA_UID, res.uid); 974 mSettings.addSharedUserLPw("android.uid.system", 976 mSettings.addSharedUserLPw("android.uid.phone", RADIO_UID, ApplicationInfo.FLAG_SYSTEM); 977 mSettings.addSharedUserLPw("android.uid.log", LOG_UID, ApplicationInfo.FLAG_SYSTEM); 978 mSettings.addSharedUserLPw("android.uid.nfc", NFC_UID, ApplicationInfo.FLAG_SYSTEM); 979 mSettings.addSharedUserLPw("android.uid.bluetooth", BLUETOOTH_UID, ApplicationInfo.FLAG_SYSTEM); 1479 String uidStr = parser.getAttributeValue(null, "uid"); 1481 Slog.w(TAG, "<assign-permission> without uid at " 1486 int uid 2018 checkValidCaller(int uid, int userId) argument 2047 checkUidPermission(String permName, int uid) argument 2373 getPackagesForUid(int uid) argument 2396 getNameForUid(int uid) argument 3066 queryContentProviders(String processName, int uid, int flags) argument 3406 fixProcessName(String defProcessName, String processName, int uid) argument 3580 createDataDirsLI(String packageName, int uid) argument 6585 int uid; field in class:PackageManagerService.MoveParams 6588 MoveParams(InstallArgs srcArgs, IPackageMoveObserver observer, int flags, String packageName, String dataDir, int uid, UserHandle user) argument 6761 doPostInstall(int status, int uid) argument 6786 doPostCopy(int uid) argument 6996 doPostInstall(int status, int uid) argument 7314 doPostInstall(int status, int uid) argument 7400 doPostCopy(int uid) argument 7496 int uid; field in class:PackageManagerService.PackageInstalledInfo 8053 deletePackageX(String packageName, int uid, int flags) argument 8114 int uid = -1; field in class:PackageManagerService.PackageRemovedInfo 8649 getUidTargetSdkVersionLockedLPr(int uid) argument [all...] |
/frameworks/base/core/java/android/accounts/ |
H A D | AccountManagerService.java | 126 private static final String GRANTS_GRANTEE_UID = "uid"; 288 final int uid = cursor.getInt(0); 289 final boolean packageExists = mPackageManager.getPackagesForUid(uid) != null; 293 Log.d(TAG, "deleting grants for UID " + uid 296 new String[]{Integer.toString(uid)}); 431 + ", caller's uid " + Binder.getCallingUid() 471 + ", caller's uid " + Binder.getCallingUid() 489 + "caller's uid " + Binder.getCallingUid() 514 + ", caller's uid " + Binder.getCallingUid() 592 + ", caller's uid " 1206 newGrantCredentialsPermissionIntent(Account account, int uid, AccountAuthenticatorResponse response, String authTokenType, String authTokenLabel) argument 1225 getCredentialPermissionNotificationId(Account account, String authTokenType, int uid) argument 2304 updateAppPermission(Account account, String authTokenType, int uid, boolean value) argument 2326 grantAppPermission(Account account, String authTokenType, int uid) argument 2361 revokeAppPermission(Account account, String authTokenType, int uid) argument [all...] |
/frameworks/av/media/libmediaplayerservice/ |
H A D | StagefrightPlayer.cpp | 50 status_t StagefrightPlayer::setUID(uid_t uid) { argument 51 mPlayer->setUID(uid);
|
H A D | StagefrightPlayer.h | 34 virtual status_t setUID(uid_t uid);
|
/frameworks/av/media/libmediaplayerservice/nuplayer/ |
H A D | HTTPLiveSource.cpp | 39 bool uidValid, uid_t uid) 42 mUID(uid), 36 HTTPLiveSource( const char *url, const KeyedVector<String8, String8> *headers, bool uidValid, uid_t uid) argument
|
H A D | RTSPSource.h | 38 uid_t uid = 0);
|
/frameworks/av/media/libstagefright/ |
H A D | WVMExtractor.cpp | 145 void WVMExtractor::setUID(uid_t uid) { argument 147 mImpl->setUID(uid);
|
/frameworks/av/media/libstagefright/chromium_http/ |
H A D | support.h | 95 bool getUID(uid_t *uid) const; 97 void setUID(uid_t uid);
|
/frameworks/base/core/java/android/content/pm/ |
H A D | IPackageManager.aidl | 83 int checkUidPermission(String permName, int uid); 99 String[] getPackagesForUid(int uid); 101 String getNameForUid(int uid); 162 String processName, int uid, int flags);
|
H A D | VerificationParams.java | 30 /** A constant used to indicate that a uid value is not present. */ 107 public void setInstallerUid(int uid) { argument 108 mInstallerUid = uid;
|
/frameworks/base/test-runner/src/android/test/ |
H A D | IsolatedContext.java | 107 int uid, int modeFlags) { 112 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { argument 105 checkUriPermission( Uri uri, String readPermission, String writePermission, int pid, int uid, int modeFlags) argument
|
/frameworks/base/core/java/android/appwidget/ |
H A D | AppWidgetHost.java | 228 int uid = Process.myUid(); 229 if (UserHandle.getAppId(uid) == Process.SYSTEM_UID || uid == 0) { 232 throw new SecurityException("Disallowed call for uid " + uid);
|
/frameworks/base/core/java/android/nfc/tech/ |
H A D | MifareClassic.java | 388 byte[] uid = getTag().getId(); 389 System.arraycopy(uid, uid.length - 4, cmd, 2, 4);
|
/frameworks/base/services/java/com/android/server/ |
H A D | ServiceWatcher.java | 211 public void onPackageUpdateFinished(String packageName, int uid) { 223 public void onPackageAdded(String packageName, int uid) { 235 public void onPackageRemoved(String packageName, int uid) {
|
H A D | ConnectivityService.java | 775 private boolean isNetworkBlocked(NetworkStateTracker tracker, int uid) { argument 782 uidRules = mUidRules.get(uid, RULE_ALLOW_ALL); 798 private NetworkInfo getFilteredNetworkInfo(NetworkStateTracker tracker, int uid) { argument 800 if (isNetworkBlocked(tracker, uid)) { 821 final int uid = Binder.getCallingUid(); 822 return getNetworkInfo(mActiveDefaultNetwork, uid); 837 public NetworkInfo getActiveNetworkInfoForUid(int uid) { argument 839 return getNetworkInfo(mActiveDefaultNetwork, uid); 845 final int uid = Binder.getCallingUid(); 846 return getNetworkInfo(networkType, uid); 849 getNetworkInfo(int networkType, int uid) argument 1058 isSameUser(int pid, int uid, int networkType, String feature) argument [all...] |
/frameworks/base/media/libdrm/mobile1/src/objmng/ |
H A D | drm_rights_manager.c | 241 static int32_t drm_acquireId(uint8_t* uid, int32_t* id) argument 243 if (TRUE == drm_readFromUidTxt(uid, id, GET_ID)) 246 drm_writeToUidTxt(uid, id); 362 drm_acquireId(rights->uid, &id); 403 /* this means the uid.txt file is not exist, so there is not any DRM object */ 532 int32_t drm_getKey(uint8_t* uid, uint8_t* KeyValue) argument 537 if (NULL == uid || NULL == KeyValue) 540 if (FALSE == drm_readFromUidTxt(uid, &id, GET_ID))
|
/frameworks/base/services/java/com/android/server/usb/ |
H A D | UsbSettingsManager.java | 362 public void onPackageAdded(String packageName, int uid) { argument 367 public void onPackageChanged(String packageName, int uid, String[] components) { argument 372 public void onPackageRemoved(String packageName, int uid) { argument 718 grantDevicePermission(device, defaultRI.activityInfo.applicationInfo.uid); 720 grantAccessoryPermission(accessory, defaultRI.activityInfo.applicationInfo.uid); 886 final int uid = Binder.getCallingUid(); 888 // compare uid with packageName to foil apps pretending to be someone else 891 if (aInfo.uid != uid) { 893 " does not match caller's uid " 990 grantDevicePermission(UsbDevice device, int uid) argument 1002 grantAccessoryPermission(UsbAccessory accessory, int uid) argument [all...] |