/frameworks/native/include/binder/ |
H A D | IAppOpsService.h | 33 virtual int32_t checkOperation(int32_t code, int32_t uid, const String16& packageName) = 0; 34 virtual int32_t noteOperation(int32_t code, int32_t uid, const String16& packageName) = 0; 35 virtual int32_t startOperation(const sp<IBinder>& token, int32_t code, int32_t uid, 37 virtual void finishOperation(const sp<IBinder>& token, int32_t code, int32_t uid,
|
H A D | IPermissionController.h | 33 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) = 0; 35 virtual void getPackagesForUid(const uid_t uid, Vector<String16> &packages) = 0;
|
/frameworks/native/libs/binder/ |
H A D | IAppOpsService.cpp | 39 virtual int32_t checkOperation(int32_t code, int32_t uid, const String16& packageName) { argument 43 data.writeInt32(uid); 51 virtual int32_t noteOperation(int32_t code, int32_t uid, const String16& packageName) { argument 55 data.writeInt32(uid); 63 virtual int32_t startOperation(const sp<IBinder>& token, int32_t code, int32_t uid, argument 69 data.writeInt32(uid); 77 virtual void finishOperation(const sp<IBinder>& token, int32_t code, int32_t uid, argument 83 data.writeInt32(uid); 139 int32_t uid = data.readInt32(); local 141 int32_t res = checkOperation(code, uid, packageNam 149 int32_t uid = data.readInt32(); local 160 int32_t uid = data.readInt32(); local 171 int32_t uid = data.readInt32(); local [all...] |
H A D | AppOpsManager.cpp | 88 int32_t AppOpsManager::checkOp(int32_t op, int32_t uid, const String16& callingPackage) argument 92 ? service->checkOperation(op, uid, callingPackage) 96 int32_t AppOpsManager::noteOp(int32_t op, int32_t uid, const String16& callingPackage) { argument 99 ? service->noteOperation(op, uid, callingPackage) 103 int32_t AppOpsManager::startOp(int32_t op, int32_t uid, const String16& callingPackage) { argument 106 ? service->startOperation(getToken(service), op, uid, callingPackage) 110 void AppOpsManager::finishOp(int32_t op, int32_t uid, const String16& callingPackage) { argument 113 service->finishOperation(getToken(service), op, uid, callingPackage); local
|
H A D | IServiceManager.cpp | 63 uid_t uid = ipcState->getCallingUid(); local 65 if (outUid) *outUid = uid; 66 return checkPermission(permission, pid, uid); 69 bool checkPermission(const String16& permission, pid_t pid, uid_t uid) argument 80 bool res = pc->checkPermission(permission, pid, uid); 83 ALOGI("Check passed after %d seconds for %s from uid=%d pid=%d", 85 String8(permission).string(), uid, pid); 92 ALOGW("Permission failure: %s from uid=%d pid=%d", 93 String8(permission).string(), uid, pid); 111 ALOGI("Waiting to check permission %s from uid [all...] |
/frameworks/native/libs/binder/include/binder/ |
H A D | IAppOpsService.h | 33 virtual int32_t checkOperation(int32_t code, int32_t uid, const String16& packageName) = 0; 34 virtual int32_t noteOperation(int32_t code, int32_t uid, const String16& packageName) = 0; 35 virtual int32_t startOperation(const sp<IBinder>& token, int32_t code, int32_t uid, 37 virtual void finishOperation(const sp<IBinder>& token, int32_t code, int32_t uid,
|
H A D | IPermissionController.h | 33 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) = 0; 35 virtual void getPackagesForUid(const uid_t uid, Vector<String16> &packages) = 0;
|
/frameworks/native/services/inputflinger/host/ |
H A D | InputFlinger.cpp | 52 const int uid = ipc->getCallingUid(); local 53 if ((uid != AID_SHELL) 54 && !PermissionCache::checkPermission(sDumpPermission, pid, uid)) { 56 "can't dump SurfaceFlinger from pid=%d, uid=%d\n", pid, uid);
|
/frameworks/native/services/nativeperms/ |
H A D | nativeperms.cpp | 38 const ::android::String16& permission, int32_t pid, int32_t uid, 42 (void)uid; 48 int32_t uid, ::std::vector<::android::String16>* _aidl_return) { 49 (void)uid; 37 checkPermission( const ::android::String16& permission, int32_t pid, int32_t uid, bool* _aidl_return) argument 47 getPackagesForUid( int32_t uid, ::std::vector<::android::String16>* _aidl_return) argument
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
H A D | WifiMulticastLockManager.java | 95 return "Multicaster{" + mTag + " uid=" + mUid + "}"; 145 int uid = Binder.getCallingUid(); 148 mBatteryStats.noteWifiMulticastEnabled(uid); 157 int uid = Binder.getCallingUid(); 163 if ((m != null) && (m.getUid() == uid)) { 164 removeMulticasterLocked(i, uid); 170 private void removeMulticasterLocked(int i, int uid) { argument 182 mBatteryStats.noteWifiMulticastDisabled(uid);
|
/frameworks/base/services/usb/java/com/android/server/usb/ |
H A D | UsbUserSettingsManager.java | 100 int uid = Binder.getCallingUid(); 101 if (uid == Process.SYSTEM_UID || mDisablePermissionDialogs) { 108 return uidList.get(uid); 114 int uid = Binder.getCallingUid(); 115 if (uid == Process.SYSTEM_UID || mDisablePermissionDialogs) { 122 return uidList.get(uid); 139 final int uid = Binder.getCallingUid(); 141 // compare uid with packageName to foil apps pretending to be someone else 144 if (aInfo.uid != uid) { 207 grantDevicePermission(UsbDevice device, int uid) argument 219 grantAccessoryPermission(UsbAccessory accessory, int uid) argument [all...] |
/frameworks/base/keystore/java/android/security/ |
H A D | KeyStore.java | 168 public byte[] get(String key, int uid) { argument 170 return mBinder.get(key, uid); 181 public boolean put(String key, byte[] value, int uid, int flags) { argument 182 return insert(key, value, uid, flags) == NO_ERROR; 185 public int insert(String key, byte[] value, int uid, int flags) { argument 187 return mBinder.insert(key, value, uid, flags); 194 public boolean delete(String key, int uid) { argument 196 int ret = mBinder.del(key, uid); 208 public boolean contains(String key, int uid) { argument 210 return mBinder.exist(key, uid) 224 list(String prefix, int uid) argument 306 generate(String key, int uid, int keyType, int keySize, int flags, byte[][] args) argument 317 importKey(String keyName, byte[] key, int uid, int flags) argument 344 grant(String key, int uid) argument 353 ungrant(String key, int uid) argument 366 getmtime(String key, int uid) argument 407 clearUid(int uid) argument 429 generateKey(String alias, KeymasterArguments args, byte[] entropy, int uid, int flags, KeyCharacteristics outCharacteristics) argument 444 getKeyCharacteristics(String alias, KeymasterBlob clientId, KeymasterBlob appId, int uid, KeyCharacteristics outCharacteristics) argument 459 importKey(String alias, KeymasterArguments args, int format, byte[] keyData, int uid, int flags, KeyCharacteristics outCharacteristics) argument 475 exportKey(String alias, int format, KeymasterBlob clientId, KeymasterBlob appId, int uid) argument 489 begin(String alias, int purpose, boolean pruneable, KeymasterArguments args, byte[] entropy, int uid) argument 705 getInvalidKeyException( String keystoreKeyAlias, int uid, KeyStoreException e) argument 775 getInvalidKeyException(String keystoreKeyAlias, int uid, int errorCode) argument [all...] |
/frameworks/base/core/java/android/os/ |
H A D | Process.java | 168 * First uid used for fully isolated sandboxed processes (with no permissions of their own) 174 * Last uid used for fully isolated sandboxed processes (with no permissions of their own) 419 * and not a zygote fork. Note that this is only allowed for uid 0 or when 425 * @param uid The user-id under which the process will run. 444 int uid, int gid, int[] gids, 453 return zygoteProcess.start(processClass, niceName, uid, gid, gids, 461 int uid, int gid, int[] gids, 470 return WebViewZygote.getProcess().start(processClass, niceName, uid, gid, gids, 533 * Returns the identifier of this process's uid. This is the kernel uid 442 start(final String processClass, final String niceName, int uid, int gid, int[] gids, int debugFlags, int mountExternal, int targetSdkVersion, String seInfo, String abi, String instructionSet, String appDataDir, String invokeWith, String[] zygoteArgs) argument 459 startWebView(final String processClass, final String niceName, int uid, int gid, int[] gids, int debugFlags, int mountExternal, int targetSdkVersion, String seInfo, String abi, String instructionSet, String appDataDir, String invokeWith, String[] zygoteArgs) argument 558 isApplicationUid(int uid) argument 571 isIsolated(int uid) argument 871 setUid(int uid) argument 874 setGid(int uid) argument 981 killProcessGroup(int uid, int pid) argument [all...] |
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/net/ |
H A D | UidDetailProvider.java | 78 public UidDetail getUidDetail(int uid, boolean blocking) { argument 82 detail = mUidDetailCache.get(uid); 91 detail = buildUidDetail(uid); 94 mUidDetailCache.put(uid, detail); 104 private UidDetail buildUidDetail(int uid) { argument 109 detail.label = pm.getNameForUid(uid); 113 switch (uid) { 135 if (isKeyForUser(uid)) { 136 final int userHandle = getUserIdForKey(uid); 146 final String[] packageNames = pm.getPackagesForUid(uid); [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | RescueParty.java | 107 incrementRescueLevel(sBoot.uid); 116 public static void notePersistentAppCrash(Context context, int uid) { argument 118 Threshold t = sApps.get(uid); 120 t = new AppThreshold(uid); 121 sApps.put(uid, t); 125 incrementRescueLevel(t.uid); 227 private final int uid; field in class:RescueParty.Threshold 231 public Threshold(int uid, int triggerCount, long triggerWindow) { argument 232 this.uid = uid; 304 AppThreshold(int uid) argument [all...] |
/frameworks/base/services/core/java/com/android/server/notification/ |
H A D | RankingHelper.java | 74 private static final String ATT_UID = "uid"; 90 private final ArrayMap<String, Record> mRecords = new ArrayMap<>(); // pkg|uid => Record 172 int uid = safeInt(parser, ATT_UID, Record.UNKNOWN_UID); 178 uid = mPm.getPackageUidAsUser(name, UserHandle.USER_SYSTEM); 184 Record r = getOrCreateRecord(name, uid, 240 private static String recordKey(String pkg, int uid) { argument 241 return pkg + "|" + uid; 244 private Record getRecord(String pkg, int uid) { argument 245 final String key = recordKey(pkg, uid); 251 private Record getOrCreateRecord(String pkg, int uid) { argument 256 getOrCreateRecord(String pkg, int uid, int importance, int priority, int visibility, boolean showBadge) argument 494 getImportance(String packageName, int uid) argument 499 canShowBadge(String packageName, int uid) argument 504 setShowBadge(String packageName, int uid, boolean showBadge) argument 509 getPackagePriority(String pkg, int uid) argument 513 getPackageVisibility(String pkg, int uid) argument 518 createNotificationChannelGroup(String pkg, int uid, NotificationChannelGroup group, boolean fromTargetApp) argument 538 createNotificationChannel(String pkg, int uid, NotificationChannel channel, boolean fromTargetApp) argument 600 updateNotificationChannel(String pkg, int uid, NotificationChannel updatedChannel) argument 635 getNotificationChannel(String pkg, int uid, String channelId, boolean includeDeleted) argument 653 deleteNotificationChannel(String pkg, int uid, String channelId) argument 670 permanentlyDeleteNotificationChannel(String pkg, int uid, String channelId) argument 682 permanentlyDeleteNotificationChannels(String pkg, int uid) argument 698 getNotificationChannelGroup(String groupId, String pkg, int uid) argument 706 getNotificationChannelGroups(String pkg, int uid, boolean includeDeleted) argument 740 deleteNotificationChannelGroup(String pkg, int uid, String groupId) argument 763 getNotificationChannelGroups(String pkg, int uid) argument 773 getNotificationChannels(String pkg, int uid, boolean includeDeleted) argument 797 onlyHasDefaultChannel(String pkg, int uid) argument 806 getDeletedChannelCount(String pkg, int uid) argument 827 setImportance(String pkgName, int uid, int importance) argument 832 setEnabled(String packageName, int uid, boolean enabled) argument 1196 int uid = UNKNOWN_UID; field in class:RankingHelper.Record [all...] |
/frameworks/base/core/java/android/app/ |
H A D | AppOpsManager.java | 1185 public PackageOps(String packageName, int uid, List<OpEntry> entries) { argument 1187 mUid = uid; 1371 * @param uid The uid of the application of interest. 1376 public List<AppOpsManager.PackageOps> getOpsForPackage(int uid, String packageName, int[] ops) { argument 1378 return mService.getOpsForPackage(uid, packageName, ops); 1390 * @param uid The UID for which to set the app. 1394 public void setUidMode(int code, int uid, int mode) { argument 1396 mService.setUidMode(code, uid, mode); 1408 * @param uid Th 1414 setUidMode(String appOp, int uid, int mode) argument 1444 setMode(int code, int uid, String packageName, int mode) argument 1559 buildSecurityExceptionMsg(int op, int uid, String packageName) argument 1590 checkOp(String op, int uid, String packageName) argument 1598 checkOpNoThrow(String op, int uid, String packageName) argument 1616 noteOp(String op, int uid, String packageName) argument 1624 noteOpNoThrow(String op, int uid, String packageName) argument 1671 startOp(String op, int uid, String packageName) argument 1679 startOpNoThrow(String op, int uid, String packageName) argument 1689 finishOp(String op, int uid, String packageName) argument 1710 checkOp(int op, int uid, String packageName) argument 1727 checkOpNoThrow(int op, int uid, String packageName) argument 1741 checkPackage(int uid, String packageName) argument 1756 checkAudioOp(int op, int stream, int uid, String packageName) argument 1773 checkAudioOpNoThrow(int op, int stream, int uid, String packageName) argument 1796 noteOp(int op, int uid, String packageName) argument 1856 noteOpNoThrow(int op, int uid, String packageName) argument 1901 startOp(int op, int uid, String packageName) argument 1918 startOpNoThrow(int op, int uid, String packageName) argument 1938 finishOp(int op, int uid, String packageName) argument [all...] |
/frameworks/base/core/java/com/android/internal/os/ |
H A D | Zygote.java | 72 * @param uid the UNIX uid that the new process should setuid() to after 99 public static int forkAndSpecialize(int uid, int gid, int[] gids, int debugFlags, argument 106 uid, gid, gids, debugFlags, rlimits, mountExternal, seInfo, niceName, fdsToClose, 119 native private static int nativeForkAndSpecialize(int uid, int gid, int[] gids,int debugFlags, argument 129 * @param uid the UNIX uid that the new process should setuid() to after 146 public static int forkSystemServer(int uid, int gid, int[] gids, int debugFlags, argument 152 uid, gid, gids, debugFlags, rlimits, permittedCapabilities, effectiveCapabilities); 161 native private static int nativeForkSystemServer(int uid, in argument [all...] |
/frameworks/base/keystore/java/android/security/keystore/ |
H A D | AndroidKeyStoreProvider.java | 175 int uid, 189 return new AndroidKeyStoreECPublicKey(alias, uid, (ECPublicKey) publicKey); 191 return new AndroidKeyStoreRSAPublicKey(alias, uid, (RSAPublicKey) publicKey); 216 @NonNull KeyStore keyStore, @NonNull String privateKeyAlias, int uid) 220 privateKeyAlias, null, null, uid, keyCharacteristics); 227 privateKeyAlias, KeymasterDefs.KM_KEY_FORMAT_X509, null, null, uid); 251 privateKeyAlias, uid, jcaKeyAlgorithm, x509EncodedPublicKey); 256 @NonNull KeyStore keyStore, @NonNull String privateKeyAlias, int uid) 259 loadAndroidKeyStorePublicKeyFromKeystore(keyStore, privateKeyAlias, uid); 267 @NonNull KeyStore keyStore, @NonNull String privateKeyAlias, int uid) 173 getAndroidKeyStorePublicKey( @onNull String alias, int uid, @NonNull @KeyProperties.KeyAlgorithmEnum String keyAlgorithm, @NonNull byte[] x509EncodedForm) argument 215 loadAndroidKeyStorePublicKeyFromKeystore( @onNull KeyStore keyStore, @NonNull String privateKeyAlias, int uid) argument 255 loadAndroidKeyStoreKeyPairFromKeystore( @onNull KeyStore keyStore, @NonNull String privateKeyAlias, int uid) argument 266 loadAndroidKeyStorePrivateKeyFromKeystore( @onNull KeyStore keyStore, @NonNull String privateKeyAlias, int uid) argument 274 loadAndroidKeyStoreSecretKeyFromKeystore( @onNull KeyStore keyStore, @NonNull String secretKeyAlias, int uid) argument 323 getKeyStoreForUid(int uid) argument [all...] |
H A D | AndroidKeyStorePublicKey.java | 31 public AndroidKeyStorePublicKey(String alias, int uid, String algorithm, byte[] x509EncodedForm) { argument 32 super(alias, uid, algorithm);
|
/frameworks/base/core/java/android/service/notification/ |
H A D | StatusBarNotification.java | 40 private final int uid; field in class:StatusBarNotification 51 String tag, int uid, int initialPid, Notification notification, UserHandle user, 60 this.uid = uid; 74 public StatusBarNotification(String pkg, String opPkg, int id, String tag, int uid, argument 84 this.uid = uid; 102 this.uid = in.readInt(); 117 String sbnKey = user.getIdentifier() + "|" + pkg + "|" + id + "|" + tag + "|" + uid; 171 out.writeInt(this.uid); 50 StatusBarNotification(String pkg, String opPkg, int id, String tag, int uid, int initialPid, Notification notification, UserHandle user, String overrideGroupKey, long postTime) argument [all...] |
/frameworks/av/services/audiopolicy/common/managerdefinitions/include/ |
H A D | AudioSourceDescriptor.h | 36 uid_t uid) : 37 mDevice(device), mAttributes(*attributes), mUid(uid) {} 35 AudioSourceDescriptor(const sp<DeviceDescriptor> device, const audio_attributes_t *attributes, uid_t uid) argument
|
/frameworks/base/services/core/java/com/android/server/media/ |
H A D | AudioPlaybackMonitor.java | 49 void onAudioPlaybackStarted(int uid); argument 126 for (int uid : newActiveAudioPlaybackClientUids) { 127 mListener.onAudioPlaybackStarted(uid); 147 * Returns if the audio playback is active for the uid. 149 public boolean isPlaybackActive(int uid) { argument 151 return mActiveAudioPlaybackClientUids.contains(uid); 189 int uid = mSortedAudioPlaybackClientUids.get(i); 190 pw.print(indent + "uid=" + uid + " packages="); 191 String[] packages = mContext.getPackageManager().getPackagesForUid(uid); [all...] |
/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ServiceManagerPermissionTests.java | 52 public boolean checkPermission(java.lang.String permission, int pid, int uid) { 57 public String[] getPackagesForUid(int uid) {
|
/frameworks/support/compat/java/android/support/v4/app/ |
H A D | AppOpsManagerCompat.java | 70 * in both the uid and name of the application to be checked; this function will verify 76 * @param uid The user id of the application attempting to perform the operation. 83 public static int noteOp(@NonNull Context context, @NonNull String op, int uid, argument 87 return appOpsManager.noteOp(op, uid, packageName); 97 * the IPC state; this function will verify that the calling uid and proxied
|