/frameworks/base/core/java/android/content/pm/permission/ |
H A D | RuntimePermissionPresentationInfo.aidl | 17 package android.content.pm.permission;
|
H A D | IRuntimePermissionPresenter.aidl | 17 package android.content.pm.permission; 22 * Interface for communication with the permission presenter service.
|
/frameworks/base/core/java/android/os/ |
H A D | IPermissionController.aidl | 22 boolean checkPermission(String permission, int pid, int uid); 24 boolean isRuntimePermission(String permission);
|
/frameworks/native/libs/binder/ |
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_ 37 check(bool* granted, const String16& permission, uid_t uid) const argument 81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
H A D | IPermissionController.cpp | 39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 43 data.writeString16(permission); 71 virtual bool isRuntimePermission(const String16& permission) argument 75 data.writeString16(permission); 93 String16 permission = data.readString16(); local 96 bool res = checkPermission(permission, pid, uid); 118 String16 permission = data.readString16(); local 119 const bool res = isRuntimePermission(permission);
|
H A D | IServiceManager.cpp | 50 bool checkCallingPermission(const String16& permission) argument 52 return checkCallingPermission(permission, NULL, NULL); 55 static String16 _permission("permission"); 58 bool checkCallingPermission(const String16& permission, int32_t* outPid, int32_t* outUid) argument 65 return checkPermission(permission, pid, uid); 68 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 84 bool res = pc->checkPermission(permission, pid, uid); 89 String8(permission).string(), uid, pid); 94 // Is this a permission failure, or did the controller go away? 97 String8(permission) [all...] |
/frameworks/support/v13/api23/android/support/v13/app/ |
H A D | FragmentCompat23.java | 28 String permission) { 29 return fragment.shouldShowRequestPermissionRationale(permission); 27 shouldShowRequestPermissionRationale(Fragment fragment, String permission) argument
|
/frameworks/base/services/core/java/com/android/server/firewall/ |
H A D | SenderPermissionFilter.java | 31 private SenderPermissionFilter(String permission) { argument 32 mPermission = permission; 45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") { 49 String permission = parser.getAttributeValue(null, ATTR_NAME); 50 if (permission == null) { 54 return new SenderPermissionFilter(permission);
|
/frameworks/native/include/binder/ |
H A D | PermissionCache.h | 31 * PermissionCache caches permission checks for a given uid. 33 * Currently the cache is not updated when there is a permission change, 51 // we pool all the permission names we see, as many permissions checks 57 // free the whole cache, but keep the permission name pool 61 const String16& permission, uid_t uid) const; 63 void cache(const String16& permission, uid_t uid, bool granted); 68 static bool checkCallingPermission(const String16& permission); 70 static bool checkCallingPermission(const String16& permission, 73 static bool checkPermission(const String16& permission,
|
H A D | IPermissionController.h | 33 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) = 0; 37 virtual bool isRuntimePermission(const String16& permission) = 0;
|
H A D | IServiceManager.h | 79 bool checkCallingPermission(const String16& permission); 80 bool checkCallingPermission(const String16& permission, 82 bool checkPermission(const String16& permission, pid_t pid, uid_t uid);
|
/frameworks/opt/chips/src/com/android/ex/chips/ |
H A D | ChipsUtil.java | 29 * Listener that gets notified when we check whether we have permission. 32 void onPermissionCheck(String permission, boolean granted); argument 39 new String[] { Manifest.permission.READ_CONTACTS }; 51 * <p>This is interesting for us because new permission model is introduced in M and we need to 59 * Returns {@link PackageManager#PERMISSION_GRANTED} if given permission is granted, or 62 public static int checkPermission(Context context, String permission) { argument 64 // TODO: Use "context.checkSelfPermission(permission)" once it's safe to move to M sdk 65 return context.checkPermission(permission, Process.myPid(), Process.myUid()); 67 // Assume that we have permission before M. 80 for (String permission [all...] |
/frameworks/base/core/java/android/test/ |
H A D | AndroidTestCase.java | 88 * Asserts that launching a given activity is protected by a particular permission by 90 * is thrown that mentions the permission in its error message. 97 * @param permission The name of the permission. 100 String packageName, String className, String permission) { 107 fail("expected security exception for " + permission); 110 assertTrue("error message should contain " + permission + ".", 111 expected.getMessage().contains(permission)); 117 * Asserts that reading from the content uri requires a particular permission by querying the 118 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission 99 assertActivityRequiresPermission( String packageName, String className, String permission) argument 123 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument 142 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument [all...] |
/frameworks/support/v4/api23/android/support/v4/app/ |
H A D | ActivityCompat23.java | 36 String permission) { 37 return activity.shouldShowRequestPermissionRationale(permission); 35 shouldShowRequestPermissionRationale(Activity activity, String permission) argument
|
H A D | AppOpsManagerCompat23.java | 26 public static String permissionToOp(String permission) { argument 27 return AppOpsManager.permissionToOp(permission);
|
/frameworks/base/core/java/android/content/pm/ |
H A D | ServiceInfo.java | 31 * Optional name of a permission required to be able to access this 32 * Service. From the "permission" attribute. 34 public String permission; field in class:ServiceInfo 79 permission = orig.permission; 90 pw.println(prefix + "permission=" + permission); 107 dest.writeString(permission); 123 permission = source.readString();
|
/frameworks/base/tools/aapt2/java/ |
H A D | ManifestClassGenerator_test.cpp | 46 <permission android:name="android.permission.ACCESS_INTERNET" /> 47 <permission android:name="android.DO_DANGEROUS_THINGS" /> 48 <permission android:name="com.test.sample.permission.HUH" /> 49 <permission-group android:name="foo.bar.PERMISSION" /> 55 const size_t permissionClassPos = actual.find("public static final class permission {"); 62 // Make sure these permissions are in the permission class. 66 "\"android.permission.ACCESS_INTERNET\";"); 75 pos = actual.find("public static final String HUH=\"com.test.sample.permission [all...] |
/frameworks/support/v4/java/android/support/v4/content/ |
H A D | PermissionChecker.java | 31 * This class provides permission check APIs that verify both the 32 * permission and the associated app op for this permission if 35 * In the new permission model permissions with protection level 40 * permission revocations and would crash. Therefore, when the 41 * user disables a permission for a legacy app in the UI the 42 * platform disables the APIs guarded by this permission making 50 * permission model for which the user had disabled the "permission" 55 /** Permission result: The permission i 87 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, String packageName) argument 123 checkSelfPermission(@onNull Context context, @NonNull String permission) argument 140 checkCallingPermission(@onNull Context context, @NonNull String permission, String packageName) argument 158 checkCallingOrSelfPermission(@onNull Context context, @NonNull String permission) argument [all...] |
/frameworks/base/core/java/android/bluetooth/ |
H A D | BluetoothProfile.java | 171 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission. 175 @RequiresPermission(Manifest.permission.BLUETOOTH) 185 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission. 192 @RequiresPermission(Manifest.permission.BLUETOOTH) 198 * <p>Requires {@link android.Manifest.permission#BLUETOOTH} permission. 205 @RequiresPermission(Manifest.permission.BLUETOOTH)
|
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ServiceManagerPermissionTests.java | 17 package com.android.framework.permission.tests; 52 public boolean checkPermission(java.lang.String permission, int pid, int uid) { 62 public boolean isRuntimePermission(String permission) {
|
/frameworks/base/core/java/android/hardware/location/ |
H A D | GeofenceHardwareService.java | 80 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 81 "Location Hardware permission not granted to access hardware geofence"); 88 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 89 "Location Hardware permission not granted to access hardware geofence"); 99 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 100 "Location Hardware permission not granted to access hardware geofence"); 107 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 108 "Location Hardware permission not granted to access hardware geofence"); 116 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 117 "Location Hardware permission no [all...] |
/frameworks/support/v4/java/android/support/v4/app/ |
H A D | AppOpsManagerCompat.java | 51 public String permissionToOp(String permission) { argument 66 public String permissionToOp(String permission) { argument 67 return AppOpsManagerCompat23.permissionToOp(permission); 93 * Gets the app op name associated with a given permission. 95 * @param permission The permission. 96 * @return The app op associated with the permission or null. 98 public static String permissionToOp(@NonNull String permission) { argument 99 return IMPL.permissionToOp(permission);
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PermissionsState.java | 54 /** The permission operation failed. */ 57 /** The permission operation succeeded and no gids changed. */ 60 /** The permission operation succeeded and gids changed. */ 148 * Grant an install permission. 150 * @param permission The permission to grant. 155 public int grantInstallPermission(BasePermission permission) { argument 156 return grantPermission(permission, UserHandle.USER_ALL); 160 * Revoke an install permission. 162 * @param permission Th 167 revokeInstallPermission(BasePermission permission) argument 180 grantRuntimePermission(BasePermission permission, int userId) argument 197 revokeRuntimePermission(BasePermission permission, int userId) argument 365 updatePermissionFlags(BasePermission permission, int userId, int flagMask, int flagValues) argument 516 grantPermission(BasePermission permission, int userId) argument 540 revokePermission(BasePermission permission, int userId) argument 583 ensurePermissionData(BasePermission permission) argument [all...] |
/frameworks/base/core/java/android/app/ |
H A D | IUiAutomationConnection.aidl | 46 void grantRuntimePermission(String packageName, String permission, int userId); 47 void revokeRuntimePermission(String packageName, String permission, int userId);
|
/frameworks/support/v4/tests/java/android/support/v4/content/ |
H A D | ContextCompatTest.java | 138 assertEquals("Vibrate permission granted", PackageManager.PERMISSION_GRANTED, 140 android.Manifest.permission.VIBRATE)); 141 assertEquals("Wake lock permission granted", PackageManager.PERMISSION_GRANTED, 143 android.Manifest.permission.WAKE_LOCK)); 150 assertEquals("Read contacts permission granted", PackageManager.PERMISSION_DENIED, 152 android.Manifest.permission.READ_CONTACTS)); 153 assertEquals("Write contacts permission granted", PackageManager.PERMISSION_DENIED, 155 android.Manifest.permission.WRITE_CONTACTS)); 158 assertEquals("Read contacts permission denied", PackageManager.PERMISSION_GRANTED, 160 android.Manifest.permission [all...] |