/frameworks/base/core/java/android/content/pm/ |
H A D | RegisteredServicesCache.java | 391 protected boolean inSystemImage(int callerUid) { argument 392 String[] packages = mContext.getPackageManager().getPackagesForUid(callerUid);
|
/frameworks/base/core/java/android/speech/tts/ |
H A D | AbstractEventLogger.java | 40 AbstractEventLogger(int callerUid, int callerPid, String serviceApp) { argument 41 mCallerUid = callerUid;
|
H A D | EventLoggerV1.java | 28 EventLoggerV1(SynthesisRequest request, int callerUid, int callerPid, String serviceApp) { argument 29 super(callerUid, callerPid, serviceApp);
|
H A D | TextToSpeechService.java | 756 public SpeechItem(Object caller, int callerUid, int callerPid) { argument 758 mCallerUid = callerUid; 832 public UtteranceSpeechItem(Object caller, int callerUid, int callerPid) { argument 833 super(caller, callerUid, callerPid); 908 SpeechItemV1(Object callerIdentity, int callerUid, int callerPid, argument 910 super(callerIdentity, callerUid, callerPid); 948 public SynthesisSpeechItemV1(Object callerIdentity, int callerUid, int callerPid, argument 950 super(callerIdentity, callerUid, callerPid, params, utteranceId); 952 mCallerUid = callerUid; 956 mEventLogger = new EventLoggerV1(mSynthesisRequest, callerUid, callerPi 1054 SynthesisToFileOutputStreamSpeechItemV1(Object callerIdentity, int callerUid, int callerPid, Bundle params, String utteranceId, CharSequence text, FileOutputStream fileOutputStream) argument 1081 AudioSpeechItemV1(Object callerIdentity, int callerUid, int callerPid, Bundle params, String utteranceId, Uri uri) argument 1118 SilenceSpeechItem(Object callerIdentity, int callerUid, int callerPid, String utteranceId, long duration) argument 1155 LoadLanguageItem(Object callerIdentity, int callerUid, int callerPid, String language, String country, String variant) argument 1185 LoadVoiceItem(Object callerIdentity, int callerUid, int callerPid, String voiceName) argument [all...] |
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
H A D | RegisteredServicesCacheTest.java | 282 protected boolean inSystemImage(int callerUid) { argument 283 return callerUid == SYSTEM_IMAGE_UID;
|
/frameworks/base/services/core/java/com/android/server/ |
H A D | MountService.java | 2426 private boolean isUidOwnerOfPackageOrSystem(String packageName, int callerUid) { argument 2427 if (callerUid == android.os.Process.SYSTEM_UID) { 2436 PackageManager.MATCH_DEBUG_TRIAGED_MISSING, UserHandle.getUserId(callerUid)); 2440 packageUid + ", callerUid = " + callerUid); 2443 return callerUid == packageUid;
|
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | AccountManagerService.java | 1000 String msg = String.format("getUserData( account: %s, key: %s, callerUid: %s, pid: %s", 1184 "accountAuthenticated( account: %s, callerUid: %s)", 1875 int callerUid = Binder.getCallingUid(); 1878 + ", caller's uid " + callerUid 2357 final int callerUid = Binder.getCallingUid(); 2359 customTokens || permissionIsGranted(account, authTokenType, callerUid, userId); 2366 callerOwnedPackageNames = Arrays.asList(mPackageManager.getPackagesForUid(callerUid)); 2373 callerUid, 2379 loginOptions.putInt(AccountManager.KEY_CALLER_UID, callerUid); 2467 callerUid, 5370 permissionIsGranted( Account account, String authTokenType, int callerUid, int userId) argument 5487 hasExplicitlyGrantedPermission(Account account, String authTokenType, int callerUid) argument [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActivityManagerService.java | 5796 int callerUid = Binder.getCallingUid(); 5798 if (UserHandle.getAppId(callerUid) == Process.SYSTEM_UID) { 5809 throw new SecurityException(callerUid + " cannot kill pkg: " + 5920 int callerUid = Binder.getCallingUid(); 5922 if (callerUid == Process.SYSTEM_UID) { 5937 throw new SecurityException(callerUid + " cannot kill app process: " + 7251 * <p>{@code callerUid} must be allowed to request such whitelist by calling 7254 void tempWhitelistAppForPowerSave(int callerPid, int callerUid, int targetUid, long duration) { argument 7256 Slog.d(TAG, "tempWhitelistAppForPowerSave(" + callerPid + ", " + callerUid + ", " 7277 true, "pe from uid:" + callerUid); [all...] |
/frameworks/base/services/core/java/com/android/server/firewall/ |
H A D | AndFilter.java | 29 int callerUid, int callerPid, String resolvedType, int receivingUid) { 31 if (!children.get(i).matches(ifw, resolvedComponent, intent, callerUid, callerPid, 28 matches(IntentFirewall ifw, ComponentName resolvedComponent, Intent intent, int callerUid, int callerPid, String resolvedType, int receivingUid) argument
|
H A D | CategoryFilter.java | 38 int callerUid, int callerPid, String resolvedType, int receivingUid) { 37 matches(IntentFirewall ifw, ComponentName resolvedComponent, Intent intent, int callerUid, int callerPid, String resolvedType, int receivingUid) argument
|
H A D | Filter.java | 29 * @param callerUid The uid of the caller 35 int callerUid, int callerPid, String resolvedType, int receivingUid); 34 matches(IntentFirewall ifw, ComponentName resolvedComponent, Intent intent, int callerUid, int callerPid, String resolvedType, int receivingUid) argument
|
H A D | IntentFirewall.java | 127 public boolean checkStartActivity(Intent intent, int callerUid, int callerPid, argument 130 callerUid, callerPid, resolvedType, resolvedApp.uid); 133 public boolean checkService(ComponentName resolvedService, Intent intent, int callerUid, argument 135 return checkIntent(mServiceResolver, resolvedService, TYPE_SERVICE, intent, callerUid, 139 public boolean checkBroadcast(Intent intent, int callerUid, int callerPid, argument 142 callerUid, callerPid, resolvedType, receivingUid); 146 int intentType, Intent intent, int callerUid, int callerPid, String resolvedType, 164 if (rule.matches(this, resolvedComponent, intent, callerUid, callerPid, resolvedType, 178 logIntent(intentType, intent, callerUid, resolvedType); 184 private static void logIntent(int intentType, Intent intent, int callerUid, argument 145 checkIntent(FirewallIntentResolver resolver, ComponentName resolvedComponent, int intentType, Intent intent, int callerUid, int callerPid, String resolvedType, int receivingUid) argument [all...] |
H A D | NotFilter.java | 36 int callerUid, int callerPid, String resolvedType, int receivingUid) { 37 return !mChild.matches(ifw, resolvedComponent, intent, callerUid, callerPid, resolvedType, 35 matches(IntentFirewall ifw, ComponentName resolvedComponent, Intent intent, int callerUid, int callerPid, String resolvedType, int receivingUid) argument
|
H A D | OrFilter.java | 29 int callerUid, int callerPid, String resolvedType, int receivingUid) { 31 if (children.get(i).matches(ifw, resolvedComponent, intent, callerUid, callerPid, 28 matches(IntentFirewall ifw, ComponentName resolvedComponent, Intent intent, int callerUid, int callerPid, String resolvedType, int receivingUid) argument
|
H A D | PortFilter.java | 45 int callerUid, int callerPid, String resolvedType, int receivingUid) { 44 matches(IntentFirewall ifw, ComponentName resolvedComponent, Intent intent, int callerUid, int callerPid, String resolvedType, int receivingUid) argument
|
H A D | SenderFilter.java | 40 static boolean isPrivilegedApp(int callerUid, int callerPid) { argument 41 if (callerUid == Process.SYSTEM_UID || callerUid == 0 || 48 return (pm.getPrivateFlagsForUid(callerUid) & ApplicationInfo.PRIVATE_FLAG_PRIVILEGED) 83 int callerUid, int callerPid, String resolvedType, int receivingUid) { 84 return ifw.signaturesMatch(callerUid, receivingUid); 91 int callerUid, int callerPid, String resolvedType, int receivingUid) { 92 return isPrivilegedApp(callerUid, callerPid); 99 int callerUid, int callerPid, String resolvedType, int receivingUid) { 100 return isPrivilegedApp(callerUid, callerPi [all...] |
H A D | SenderPackageFilter.java | 43 int callerUid, int callerPid, String resolvedType, int receivingUid) { 60 return UserHandle.isSameApp(packageUid, callerUid); 42 matches(IntentFirewall ifw, ComponentName resolvedComponent, Intent intent, int callerUid, int callerPid, String resolvedType, int receivingUid) argument
|
H A D | SenderPermissionFilter.java | 37 int callerUid, int callerPid, String resolvedType, int receivingUid) { 41 return ifw.checkComponentPermission(mPermission, callerPid, callerUid, receivingUid, 36 matches(IntentFirewall ifw, ComponentName resolvedComponent, Intent intent, int callerUid, int callerPid, String resolvedType, int receivingUid) argument
|
H A D | StringFilter.java | 122 int callerUid, int callerPid, String resolvedType, int receivingUid) { 121 matches(IntentFirewall ifw, ComponentName resolvedComponent, Intent intent, int callerUid, int callerPid, String resolvedType, int receivingUid) argument
|
/frameworks/base/services/core/java/com/android/server/media/ |
H A D | MediaSessionService.java | 429 private MediaSessionRecord createSessionInternal(int callerPid, int callerUid, int userId, argument 432 return createSessionLocked(callerPid, callerUid, userId, callerPackageName, cb, tag); 443 private MediaSessionRecord createSessionLocked(int callerPid, int callerUid, int userId, argument 452 final MediaSessionRecord session = new MediaSessionRecord(callerPid, callerUid, userId,
|
/frameworks/base/services/core/java/com/android/server/net/ |
H A D | NetworkStatsAccess.java | 145 public static boolean isAccessibleToUser(int uid, int callerUid, argument 157 || UserHandle.getUserId(uid) == UserHandle.getUserId(callerUid); 163 || UserHandle.getUserId(uid) == UserHandle.getUserId(callerUid); 167 return uid == callerUid;
|
H A D | NetworkStatsCollection.java | 142 final int callerUid) { 146 if (NetworkStatsAccess.isAccessibleToUser(key.uid, callerUid, accessLevel)) { 186 @NetworkStatsAccess.Level int accessLevel, int callerUid) { 187 if (!NetworkStatsAccess.isAccessibleToUser(uid, callerUid, accessLevel)) { 189 + " is forbidden for caller " + callerUid); 223 @NetworkStatsAccess.Level int accessLevel, int callerUid) { 236 && NetworkStatsAccess.isAccessibleToUser(key.uid, callerUid, accessLevel) 141 getRelevantUids(@etworkStatsAccess.Level int accessLevel, final int callerUid) argument 184 getHistory( NetworkTemplate template, int uid, int set, int tag, int fields, long start, long end, @NetworkStatsAccess.Level int accessLevel, int callerUid) argument 222 getSummary(NetworkTemplate template, long start, long end, @NetworkStatsAccess.Level int accessLevel, int callerUid) argument
|
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | IntentFilterVerificationResponse.java | 23 public final int callerUid; field in class:IntentFilterVerificationResponse 27 public IntentFilterVerificationResponse(int callerUid, int code, List<String> failedDomains) { argument 28 this.callerUid = callerUid;
|
H A D | IntentFilterVerificationState.java | 109 public boolean setVerifierResponse(int callerUid, int code) { argument 110 if (mRequiredVerifierUid == callerUid) { 121 Slog.d(TAG, "Cannot set verifier response with callerUid:" + callerUid + " and code:" +
|
H A D | PackageVerificationResponse.java | 22 public final int callerUid; field in class:PackageVerificationResponse 24 public PackageVerificationResponse(int code, int callerUid) { argument 26 this.callerUid = callerUid;
|