/frameworks/base/core/java/android/os/ |
H A D | IPermissionController.aidl | 22 boolean checkPermission(String permission, int pid, int uid); 24 boolean isRuntimePermission(String permission);
|
/frameworks/native/libs/binder/ |
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_ 37 check(bool* granted, const String16& permission, uid_t uid) const argument 81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
H A D | IPermissionController.cpp | 39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 43 data.writeString16(permission); 71 virtual bool isRuntimePermission(const String16& permission) argument 75 data.writeString16(permission); 93 String16 permission = data.readString16(); local 96 bool res = checkPermission(permission, pid, uid); 118 String16 permission = data.readString16(); local 119 const bool res = isRuntimePermission(permission);
|
H A D | IServiceManager.cpp | 50 bool checkCallingPermission(const String16& permission) argument 52 return checkCallingPermission(permission, NULL, NULL); 55 static String16 _permission("permission"); 58 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument 65 return checkPermission(permission, pid, uid); 68 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 79 bool res = pc->checkPermission(permission, pid, uid); 84 String8(permission).string(), uid, pid); 89 // Is this a permission failure, or did the controller go away? 92 String8(permission) [all...] |
/frameworks/support/v13/api23/android/support/v13/app/ |
H A D | FragmentCompat23.java | 28 String permission) { 29 return fragment.shouldShowRequestPermissionRationale(permission); 27 shouldShowRequestPermissionRationale(Fragment fragment, String permission) argument
|
/frameworks/base/services/core/java/com/android/server/firewall/ |
H A D | SenderPermissionFilter.java | 31 private SenderPermissionFilter(String permission) { argument 32 mPermission = permission; 45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") { 49 String permission = parser.getAttributeValue(null, ATTR_NAME); 50 if (permission == null) { 54 return new SenderPermissionFilter(permission);
|
/frameworks/native/include/binder/ |
H A D | PermissionCache.h | 31 * PermissionCache caches permission checks for a given uid. 33 * Currently the cache is not updated when there is a permission change, 51 // we pool all the permission names we see, as many permissions checks 57 // free the whole cache, but keep the permission name pool 61 const String16& permission, uid_t uid) const; 63 void cache(const String16& permission, uid_t uid, bool granted); 68 static bool checkCallingPermission(const String16& permission); 70 static bool checkCallingPermission(const String16& permission, 73 static bool checkPermission(const String16& permission,
|
H A D | IPermissionController.h | 33 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) = 0; 37 virtual bool isRuntimePermission(const String16& permission) = 0;
|
H A D | IServiceManager.h | 79 bool checkCallingPermission(const String16& permission); 80 bool checkCallingPermission(const String16& permission, 82 bool checkPermission(const String16& permission, pid_t pid, uid_t uid);
|
/frameworks/base/core/java/android/test/ |
H A D | AndroidTestCase.java | 80 * Asserts that launching a given activity is protected by a particular permission by 82 * is thrown that mentions the permission in its error message. 89 * @param permission The name of the permission. 92 String packageName, String className, String permission) { 99 fail("expected security exception for " + permission); 102 assertTrue("error message should contain " + permission + ".", 103 expected.getMessage().contains(permission)); 109 * Asserts that reading from the content uri requires a particular permission by querying the 110 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission 91 assertActivityRequiresPermission( String packageName, String className, String permission) argument 115 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument 134 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument [all...] |
/frameworks/support/v4/api23/android/support/v4/app/ |
H A D | ActivityCompat23.java | 36 String permission) { 37 return activity.shouldShowRequestPermissionRationale(permission); 35 shouldShowRequestPermissionRationale(Activity activity, String permission) argument
|
H A D | AppOpsManagerCompat23.java | 26 public static String permissionToOp(String permission) { argument 27 return AppOpsManager.permissionToOp(permission);
|
/frameworks/base/core/java/android/content/pm/ |
H A D | ServiceInfo.java | 31 * Optional name of a permission required to be able to access this 32 * Service. From the "permission" attribute. 34 public String permission; field in class:ServiceInfo 72 permission = orig.permission; 78 pw.println(prefix + "permission=" + permission); 94 dest.writeString(permission); 110 permission = source.readString();
|
/frameworks/support/v4/java/android/support/v4/content/ |
H A D | PermissionChecker.java | 31 * This class provides permission check APIs that verify both the 32 * permission and the associated app op for this permission if 35 * In the new permission model permissions with protection level 40 * permission revocations and would crash. Therefore, when the 41 * user disables a permission for a legacy app in the UI the 42 * platform disables the APIs guarded by this permission making 50 * permission model for which the user had disabled the "permission" 55 /** Permission result: The permission i 87 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, String packageName) argument 123 checkSelfPermission(@onNull Context context, @NonNull String permission) argument 140 checkCallingPermission(@onNull Context context, @NonNull String permission, String packageName) argument 158 checkCallingOrSelfPermission(@onNull Context context, @NonNull String permission) argument [all...] |
/frameworks/support/v4/java/android/support/v4/app/ |
H A D | AppOpsManagerCompat.java | 51 public String permissionToOp(String permission) { argument 66 public String permissionToOp(String permission) { argument 67 return AppOpsManagerCompat23.permissionToOp(permission); 91 * Gets the app op name associated with a given permission. 93 * @param permission The permission. 94 * @return The app op associated with the permission or null. 96 public static String permissionToOp(@NonNull String permission) { argument 97 return IMPL.permissionToOp(permission);
|
/frameworks/base/core/java/android/bluetooth/ |
H A D | BluetoothProfile.java | 165 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission. 169 @RequiresPermission(Manifest.permission.BLUETOOTH) 179 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission. 186 @RequiresPermission(Manifest.permission.BLUETOOTH) 192 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission. 199 @RequiresPermission(Manifest.permission.BLUETOOTH)
|
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ServiceManagerPermissionTests.java | 17 package com.android.framework.permission.tests; 52 public boolean checkPermission(java.lang.String permission, int pid, int uid) { 62 public boolean isRuntimePermission(String permission) {
|
/frameworks/base/core/java/android/hardware/location/ |
H A D | GeofenceHardwareService.java | 80 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 81 "Location Hardware permission not granted to access hardware geofence"); 88 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 89 "Location Hardware permission not granted to access hardware geofence"); 99 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 100 "Location Hardware permission not granted to access hardware geofence"); 107 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 108 "Location Hardware permission not granted to access hardware geofence"); 116 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 117 "Location Hardware permission no [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PermissionsState.java | 52 /** The permission operation failed. */ 55 /** The permission operation succeeded and no gids changed. */ 58 /** The permission operation succeeded and gids changed. */ 122 * Grant an install permission. 124 * @param permission The permission to grant. 129 public int grantInstallPermission(BasePermission permission) { argument 130 return grantPermission(permission, UserHandle.USER_ALL); 134 * Revoke an install permission. 136 * @param permission Th 141 revokeInstallPermission(BasePermission permission) argument 154 grantRuntimePermission(BasePermission permission, int userId) argument 171 revokeRuntimePermission(BasePermission permission, int userId) argument 339 updatePermissionFlags(BasePermission permission, int userId, int flagMask, int flagValues) argument 468 grantPermission(BasePermission permission, int userId) argument 492 revokePermission(BasePermission permission, int userId) argument 535 ensurePermissionData(BasePermission permission) argument [all...] |
H A D | DefaultPermissionGrantPolicy.java | 53 * have phone related permission by default. 63 PHONE_PERMISSIONS.add(Manifest.permission.READ_PHONE_STATE); 64 PHONE_PERMISSIONS.add(Manifest.permission.CALL_PHONE); 65 PHONE_PERMISSIONS.add(Manifest.permission.READ_CALL_LOG); 66 PHONE_PERMISSIONS.add(Manifest.permission.WRITE_CALL_LOG); 67 PHONE_PERMISSIONS.add(Manifest.permission.ADD_VOICEMAIL); 68 PHONE_PERMISSIONS.add(Manifest.permission.USE_SIP); 69 PHONE_PERMISSIONS.add(Manifest.permission.PROCESS_OUTGOING_CALLS); 74 CONTACTS_PERMISSIONS.add(Manifest.permission.READ_CONTACTS); 75 CONTACTS_PERMISSIONS.add(Manifest.permission [all...] |
/frameworks/base/core/java/android/app/ |
H A D | IUiAutomationConnection.aidl | 46 void grantRuntimePermission(String packageName, String permission, int userId); 47 void revokeRuntimePermission(String packageName, String permission, int userId);
|
H A D | AppOpsManager.java | 555 * This optionally maps a permission to an operation. If there 556 * is no permission associated with an operation, it is null. 559 android.Manifest.permission.ACCESS_COARSE_LOCATION, 560 android.Manifest.permission.ACCESS_FINE_LOCATION, 562 android.Manifest.permission.VIBRATE, 563 android.Manifest.permission.READ_CONTACTS, 564 android.Manifest.permission.WRITE_CONTACTS, 565 android.Manifest.permission.READ_CALL_LOG, 566 android.Manifest.permission.WRITE_CALL_LOG, 567 android.Manifest.permission 1011 permissionToOpCode(String permission) argument 1301 permissionToOp(String permission) argument [all...] |
/frameworks/base/tools/aapt2/ |
H A D | ManifestMerger_test.cpp | 29 <uses-permission android:name="android.permission.INTERNET"/> 50 <uses-permission android:name="android.permission.INTERNET" /> 52 <uses-permission android:name="android.permission.GPS" /> 63 android:permission="android.permission.MANAGE_DOCUMENTS" 76 <uses-permission android:name="android.permission [all...] |
/frameworks/support/v13/java/android/support/v13/app/ |
H A D | FragmentCompat.java | 38 boolean shouldShowRequestPermissionRationale(Fragment fragment, String permission); argument 73 public boolean shouldShowRequestPermissionRationale(Fragment fragment, String permission) { argument 99 public boolean shouldShowRequestPermissionRationale(Fragment fragment, String permission) { argument 100 return FragmentCompat23.shouldShowRequestPermissionRationale(fragment, permission); 118 * This interface is the contract for receiving the results for permission requests. 175 * and the results of permission requests will be delivered to its 180 * Note that requesting a permission does not guarantee it will be granted and 181 * your app should be able to run without having this permission. 192 * When checking whether you have a permission you should use {@link 213 * Gets whether you should show UI with rationale for requesting a permission 233 shouldShowRequestPermissionRationale(@onNull Fragment fragment, @NonNull String permission) argument [all...] |
/frameworks/support/v7/appcompat/src/android/support/v7/app/ |
H A D | TwilightManager.java | 85 int permission = PermissionChecker.checkSelfPermission(mContext, 86 Manifest.permission.ACCESS_FINE_LOCATION); 87 if (permission == PermissionChecker.PERMISSION_GRANTED) { 91 permission = PermissionChecker.checkSelfPermission(mContext, 92 Manifest.permission.ACCESS_COARSE_LOCATION); 93 if (permission == PermissionChecker.PERMISSION_GRANTED) {
|