/frameworks/base/services/java/com/android/server/am/ |
H A D | UriPermissionOwner.java | 69 for (UriPermission perm : readUriPermissions) { 70 perm.readOwners.remove(this); 71 if (perm.readOwners.size() == 0 && (perm.globalModeFlags 73 perm.modeFlags &= ~Intent.FLAG_GRANT_READ_URI_PERMISSION; 74 service.removeUriPermissionIfNeededLocked(perm); 81 for (UriPermission perm : writeUriPermissions) { 82 perm.writeOwners.remove(this); 83 if (perm.writeOwners.size() == 0 && (perm 134 addReadPermission(UriPermission perm) argument 141 addWritePermission(UriPermission perm) argument 148 removeReadPermission(UriPermission perm) argument 155 removeWritePermission(UriPermission perm) argument [all...] |
H A D | BroadcastQueue.java | 385 int perm = mService.checkComponentPermission(filter.requiredPermission, 387 if (perm != PackageManager.PERMISSION_GRANTED) { 398 int perm = mService.checkComponentPermission(r.requiredPermission, 400 if (perm != PackageManager.PERMISSION_GRANTED) { 679 int perm = mService.checkComponentPermission(info.activityInfo.permission, 682 if (perm != PackageManager.PERMISSION_GRANTED) { 703 perm = AppGlobals.getPackageManager(). 707 perm = PackageManager.PERMISSION_DENIED; 709 if (perm != PackageManager.PERMISSION_GRANTED) {
|
H A D | ActivityManagerService.java | 5091 if (DEBUG_URI_PERMISSION) Slog.v(TAG, "Checking read perm for " 5105 if (DEBUG_URI_PERMISSION) Slog.v(TAG, "Checking write perm " 5141 UriPermission perm = perms.get(uri); 5142 if (perm == null) return false; 5143 return (modeFlags&perm.modeFlags) == modeFlags; 5327 UriPermission perm = targetUris.get(uri); 5328 if (perm == null) { 5329 perm = new UriPermission(targetUid, uri); 5330 targetUris.put(uri, perm); 5333 perm 5482 removeUriPermissionIfNeededLocked(UriPermission perm) argument [all...] |
/frameworks/base/services/java/com/android/server/pm/ |
H A D | BasePermission.java | 39 PackageParser.Permission perm; field in class:BasePermission
|
H A D | PackageManagerService.java | 1567 String perm = parser.getAttributeValue(null, "name"); 1568 if (perm == null) { 1574 perm = perm.intern(); 1575 readPermission(parser, perm); 1578 String perm = parser.getAttributeValue(null, "name"); 1579 if (perm == null) { 1600 perm = perm.intern(); 1606 perms.add(perm); 5096 hasPermission(PackageParser.Package pkgInfo, String perm) argument 5313 isNewPlatformPermissionForPackage(String perm, PackageParser.Package pkg) argument 5330 grantSignaturePermission(String perm, PackageParser.Package pkg, BasePermission bp, HashSet<String> origPermissions) argument [all...] |
H A D | Settings.java | 354 bp.perm = null; 1537 Log.v(PackageManagerService.TAG, "Writing perm: name=" + bp.name + " type=" 1540 final PermissionInfo pi = bp.perm != null ? bp.perm.info : bp.pendingInfo; 2913 if (p.perm != null) { 2914 pw.print(" perm="); pw.println(p.perm);
|
/frameworks/base/core/java/android/os/ |
H A D | SELinux.java | 123 * @param perm The permission name. 126 public static final native boolean checkSELinuxAccess(String scon, String tcon, String tclass, String perm); argument
|
/frameworks/base/core/java/android/widget/ |
H A D | AppSecurityPermissions.java | 91 MyPermissionGroupInfo(PermissionInfo perm) { argument 92 name = perm.packageName; 93 packageName = perm.packageName; 151 public void setPermission(MyPermissionGroupInfo grp, MyPermissionInfo perm, argument 155 mPerm = perm; 167 CharSequence label = perm.mLabel; 168 if (perm.mNew && newPermPrefix != null) { 184 if (localLOGV) Log.i(TAG, "Made perm item " + perm.name 494 MyPermissionInfo perm 514 getPermissionItemView(MyPermissionGroupInfo grp, MyPermissionInfo perm, boolean first, CharSequence newPermPrefix, boolean showRevokeUI) argument 520 getPermissionItemView(Context context, LayoutInflater inflater, MyPermissionGroupInfo grp, MyPermissionInfo perm, boolean first, CharSequence newPermPrefix, String packageName, boolean showRevokeUI) argument [all...] |
/frameworks/av/media/mtp/ |
H A D | MtpDevice.h | 103 int perm);
|
H A D | MtpDevice.cpp | 668 bool MtpDevice::readObject(MtpObjectHandle handle, const char* destPath, int group, int perm) { argument 679 fchmod(fd, perm);
|
/frameworks/base/core/java/android/content/pm/ |
H A D | PackageParser.java | 424 final String perm = p.requestedPermissions.get(i); 425 pi.requestedPermissions[i] = perm; 429 if (grantedPermissions != null && grantedPermissions.contains(perm)) { 1353 final String perm = spi.newPerms[in]; 1354 if (!pkg.requestedPermissions.contains(perm)) { 1355 pkg.requestedPermissions.add(perm); 1526 PermissionGroup perm = new PermissionGroup(owner); 1531 if (!parsePackageItemInfo(owner, perm.info, outError, 1542 perm.info.descriptionRes = sa.getResourceId( 1545 perm [all...] |
/frameworks/compile/mclinker/lib/Core/ |
H A D | Linker.cpp | 228 FileHandle::Permission perm = 0755; local 231 perm)) {
|
/frameworks/base/core/java/android/accounts/ |
H A D | AbstractAccountAuthenticator.java | 340 final String perm = Manifest.permission.ACCOUNT_MANAGER; 341 if (mContext.checkCallingOrSelfPermission(perm) != PackageManager.PERMISSION_GRANTED) { 342 throw new SecurityException("caller uid " + uid + " lacks " + perm);
|
/frameworks/base/cmds/pm/src/com/android/commands/pm/ |
H A D | Pm.java | 1250 String perm = nextArg(); 1251 if (perm == null) { 1258 mPm.grantPermission(pkg, perm); 1260 mPm.revokePermission(pkg, perm);
|
/frameworks/base/core/java/android/app/ |
H A D | ActivityManagerNative.java | 306 String perm = data.readString(); 308 Intent intent = registerReceiver(app, packageName, rec, filter, perm, userId); 346 String perm = data.readString(); 352 resultCode, resultData, resultExtras, perm, appOp, 1016 String perm = data.readString(); 1019 int res = checkPermission(perm, pid, uid); 1481 IBinder perm = newUriPermissionOwner(name); 1483 reply.writeStrongBinder(perm); 2169 IntentFilter filter, String perm, int userId) throws RemoteException 2178 data.writeString(perm); 2167 registerReceiver(IApplicationThread caller, String packageName, IIntentReceiver receiver, IntentFilter filter, String perm, int userId) argument [all...] |
/frameworks/base/services/java/com/android/server/ |
H A D | MountService.java | 1151 private void validatePermission(String perm) { argument 1152 if (mContext.checkCallingOrSelfPermission(perm) != PackageManager.PERMISSION_GRANTED) { 1153 throw new SecurityException(String.format("Requires %s permission", perm));
|
H A D | BackupManagerService.java | 5869 int perm = mContext.checkPermission(android.Manifest.permission.BACKUP, 5871 if ((perm == PackageManager.PERMISSION_DENIED) &&
|
/frameworks/base/services/java/com/android/server/accounts/ |
H A D | AccountManagerService.java | 2516 for (String perm : permissions) { 2517 if (mContext.checkCallingOrSelfPermission(perm) == PackageManager.PERMISSION_GRANTED) { 2519 Log.v(TAG, " caller uid " + uid + " has " + perm);
|