Searched refs:perm (Results 1 - 18 of 18) sorted by relevance

/frameworks/base/services/java/com/android/server/am/
H A DUriPermissionOwner.java69 for (UriPermission perm : readUriPermissions) {
70 perm.readOwners.remove(this);
71 if (perm.readOwners.size() == 0 && (perm.globalModeFlags
73 perm.modeFlags &= ~Intent.FLAG_GRANT_READ_URI_PERMISSION;
74 service.removeUriPermissionIfNeededLocked(perm);
81 for (UriPermission perm : writeUriPermissions) {
82 perm.writeOwners.remove(this);
83 if (perm.writeOwners.size() == 0 && (perm
134 addReadPermission(UriPermission perm) argument
141 addWritePermission(UriPermission perm) argument
148 removeReadPermission(UriPermission perm) argument
155 removeWritePermission(UriPermission perm) argument
[all...]
H A DBroadcastQueue.java385 int perm = mService.checkComponentPermission(filter.requiredPermission,
387 if (perm != PackageManager.PERMISSION_GRANTED) {
398 int perm = mService.checkComponentPermission(r.requiredPermission,
400 if (perm != PackageManager.PERMISSION_GRANTED) {
679 int perm = mService.checkComponentPermission(info.activityInfo.permission,
682 if (perm != PackageManager.PERMISSION_GRANTED) {
703 perm = AppGlobals.getPackageManager().
707 perm = PackageManager.PERMISSION_DENIED;
709 if (perm != PackageManager.PERMISSION_GRANTED) {
H A DActivityManagerService.java5091 if (DEBUG_URI_PERMISSION) Slog.v(TAG, "Checking read perm for "
5105 if (DEBUG_URI_PERMISSION) Slog.v(TAG, "Checking write perm "
5141 UriPermission perm = perms.get(uri);
5142 if (perm == null) return false;
5143 return (modeFlags&perm.modeFlags) == modeFlags;
5327 UriPermission perm = targetUris.get(uri);
5328 if (perm == null) {
5329 perm = new UriPermission(targetUid, uri);
5330 targetUris.put(uri, perm);
5333 perm
5482 removeUriPermissionIfNeededLocked(UriPermission perm) argument
[all...]
/frameworks/base/services/java/com/android/server/pm/
H A DBasePermission.java39 PackageParser.Permission perm; field in class:BasePermission
H A DPackageManagerService.java1567 String perm = parser.getAttributeValue(null, "name");
1568 if (perm == null) {
1574 perm = perm.intern();
1575 readPermission(parser, perm);
1578 String perm = parser.getAttributeValue(null, "name");
1579 if (perm == null) {
1600 perm = perm.intern();
1606 perms.add(perm);
5096 hasPermission(PackageParser.Package pkgInfo, String perm) argument
5313 isNewPlatformPermissionForPackage(String perm, PackageParser.Package pkg) argument
5330 grantSignaturePermission(String perm, PackageParser.Package pkg, BasePermission bp, HashSet<String> origPermissions) argument
[all...]
H A DSettings.java354 bp.perm = null;
1537 Log.v(PackageManagerService.TAG, "Writing perm: name=" + bp.name + " type="
1540 final PermissionInfo pi = bp.perm != null ? bp.perm.info : bp.pendingInfo;
2913 if (p.perm != null) {
2914 pw.print(" perm="); pw.println(p.perm);
/frameworks/base/core/java/android/os/
H A DSELinux.java123 * @param perm The permission name.
126 public static final native boolean checkSELinuxAccess(String scon, String tcon, String tclass, String perm); argument
/frameworks/base/core/java/android/widget/
H A DAppSecurityPermissions.java91 MyPermissionGroupInfo(PermissionInfo perm) { argument
92 name = perm.packageName;
93 packageName = perm.packageName;
151 public void setPermission(MyPermissionGroupInfo grp, MyPermissionInfo perm, argument
155 mPerm = perm;
167 CharSequence label = perm.mLabel;
168 if (perm.mNew && newPermPrefix != null) {
184 if (localLOGV) Log.i(TAG, "Made perm item " + perm.name
494 MyPermissionInfo perm
514 getPermissionItemView(MyPermissionGroupInfo grp, MyPermissionInfo perm, boolean first, CharSequence newPermPrefix, boolean showRevokeUI) argument
520 getPermissionItemView(Context context, LayoutInflater inflater, MyPermissionGroupInfo grp, MyPermissionInfo perm, boolean first, CharSequence newPermPrefix, String packageName, boolean showRevokeUI) argument
[all...]
/frameworks/av/media/mtp/
H A DMtpDevice.h103 int perm);
H A DMtpDevice.cpp668 bool MtpDevice::readObject(MtpObjectHandle handle, const char* destPath, int group, int perm) { argument
679 fchmod(fd, perm);
/frameworks/base/core/java/android/content/pm/
H A DPackageParser.java424 final String perm = p.requestedPermissions.get(i);
425 pi.requestedPermissions[i] = perm;
429 if (grantedPermissions != null && grantedPermissions.contains(perm)) {
1353 final String perm = spi.newPerms[in];
1354 if (!pkg.requestedPermissions.contains(perm)) {
1355 pkg.requestedPermissions.add(perm);
1526 PermissionGroup perm = new PermissionGroup(owner);
1531 if (!parsePackageItemInfo(owner, perm.info, outError,
1542 perm.info.descriptionRes = sa.getResourceId(
1545 perm
[all...]
/frameworks/compile/mclinker/lib/Core/
H A DLinker.cpp228 FileHandle::Permission perm = 0755; local
231 perm)) {
/frameworks/base/core/java/android/accounts/
H A DAbstractAccountAuthenticator.java340 final String perm = Manifest.permission.ACCOUNT_MANAGER;
341 if (mContext.checkCallingOrSelfPermission(perm) != PackageManager.PERMISSION_GRANTED) {
342 throw new SecurityException("caller uid " + uid + " lacks " + perm);
/frameworks/base/cmds/pm/src/com/android/commands/pm/
H A DPm.java1250 String perm = nextArg();
1251 if (perm == null) {
1258 mPm.grantPermission(pkg, perm);
1260 mPm.revokePermission(pkg, perm);
/frameworks/base/core/java/android/app/
H A DActivityManagerNative.java306 String perm = data.readString();
308 Intent intent = registerReceiver(app, packageName, rec, filter, perm, userId);
346 String perm = data.readString();
352 resultCode, resultData, resultExtras, perm, appOp,
1016 String perm = data.readString();
1019 int res = checkPermission(perm, pid, uid);
1481 IBinder perm = newUriPermissionOwner(name);
1483 reply.writeStrongBinder(perm);
2169 IntentFilter filter, String perm, int userId) throws RemoteException
2178 data.writeString(perm);
2167 registerReceiver(IApplicationThread caller, String packageName, IIntentReceiver receiver, IntentFilter filter, String perm, int userId) argument
[all...]
/frameworks/base/services/java/com/android/server/
H A DMountService.java1151 private void validatePermission(String perm) { argument
1152 if (mContext.checkCallingOrSelfPermission(perm) != PackageManager.PERMISSION_GRANTED) {
1153 throw new SecurityException(String.format("Requires %s permission", perm));
H A DBackupManagerService.java5869 int perm = mContext.checkPermission(android.Manifest.permission.BACKUP,
5871 if ((perm == PackageManager.PERMISSION_DENIED) &&
/frameworks/base/services/java/com/android/server/accounts/
H A DAccountManagerService.java2516 for (String perm : permissions) {
2517 if (mContext.checkCallingOrSelfPermission(perm) == PackageManager.PERMISSION_GRANTED) {
2519 Log.v(TAG, " caller uid " + uid + " has " + perm);

Completed in 491 milliseconds