Searched defs:uid (Results 1 - 25 of 329) sorted by last modified time

1234567891011>>

/frameworks/support/compat/java/android/support/v4/app/
H A DAppOpsManagerCompat.java70 * in both the uid and name of the application to be checked; this function will verify
76 * @param uid The user id of the application attempting to perform the operation.
83 public static int noteOp(@NonNull Context context, @NonNull String op, int uid, argument
87 return appOpsManager.noteOp(op, uid, packageName);
97 * the IPC state; this function will verify that the calling uid and proxied
/frameworks/support/core-utils/java/android/support/v4/content/
H A DPermissionChecker.java86 * @param uid The uid for which to check.
93 int pid, int uid, String packageName) {
94 if (context.checkPermission(permission, pid, uid) == PackageManager.PERMISSION_DENIED) {
104 String[] packageNames = context.getPackageManager().getPackagesForUid(uid);
92 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, String packageName) argument
/frameworks/support/media-compat/java/android/support/v4/media/
H A DMediaBrowserServiceCompat.java534 // Binder.getCallingUid() in handleMessage will return the uid of this process.
535 // In order to get the right calling uid, Binder.getCallingUid() should be called here.
714 public void connect(final String pkg, final int uid, final Bundle rootHints, argument
717 if (!isValidPackage(pkg, uid)) {
718 throw new IllegalArgumentException("Package/uid mismatch: uid=" + uid
736 MediaBrowserServiceCompat.this.onGetRoot(pkg, uid, rootHints);
1012 * @param clientUid The uid of the application which is requesting access to
1238 * Return whether the given package is one of the ones that is owned by the uid
1240 isValidPackage(String pkg, int uid) argument
[all...]
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
H A DCarrierServiceBindHelper.java345 public void onPackageUpdateFinished(String packageName, int uid) { argument
355 public boolean onHandleForceStop(Intent intent, String[] packages, int uid, boolean doit) { argument
361 return super.onHandleForceStop(intent, packages, uid, doit);
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/mocks/
H A DConnectivityServiceMock.java395 " from uid/pid:" + mUid + "/" + mPid +
419 public Network getActiveNetworkForUid(int uid, boolean ignoreBlocked) { argument
428 public NetworkInfo getActiveNetworkInfoForUid(int uid, boolean ignoreBlocked) { argument
438 public NetworkInfo getNetworkInfoForUid(Network network, int uid, boolean ignoreBlocked) { argument
/frameworks/opt/net/voip/src/java/android/net/sip/
H A DSipProfile.java485 public void setCallingUid(int uid) { argument
486 mCallingUid = uid;
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/
H A DFrameworkFacade.java138 * Checks whether the given uid has been granted the given permission.
140 * @param uid The uid to check
144 public int checkUidPermission(String permName, int uid) throws RemoteException { argument
145 return AppGlobals.getPackageManager().checkUidPermission(permName, uid);
167 * Check if the provided uid is the app in the foreground.
168 * @param uid the uid to check
172 public boolean isAppForeground(int uid) throws RemoteException { argument
173 return ActivityManager.getService().isAppForeground(uid);
[all...]
H A DRttService.java200 ClientInfo(AsyncChannel channel, int uid) { argument
202 mUid = uid;
279 return "ClientInfo [uid=" + mUid + ", channel=" + mChannel + "]";
679 + ", uid=" + Binder.getCallingUid()
H A DWifiConfigManager.java312 * UID of system UI. This uid is allowed to modify network configurations regardless of which
643 * Checks if |uid| has permission to modify the provided configuration.
646 * @param uid UID of the app requesting the modification.
649 private boolean canModifyNetwork(WifiConfiguration config, int uid, boolean ignoreLockdown) { argument
654 if (config.isPasspoint() && uid == Process.WIFI_UID) {
662 && uid == Process.WIFI_UID
670 final boolean isUidDeviceOwner = dpmi != null && dpmi.isActiveAdminWithPolicy(uid,
673 // If |uid| corresponds to the device owner, allow all modifications.
678 final boolean isCreator = (config.creatorUid == uid);
680 // Check if the |uid| hold
715 doesUidBelongToCurrentUser(int uid) argument
869 createNewInternalWifiConfigurationFromExternal( WifiConfiguration externalConfig, int uid) argument
911 updateExistingInternalWifiConfigurationFromExternal( WifiConfiguration internalConfig, WifiConfiguration externalConfig, int uid) argument
935 addOrUpdateNetworkInternal(WifiConfiguration config, int uid) argument
1034 addOrUpdateNetwork(WifiConfiguration config, int uid) argument
1107 removeNetwork(int networkId, int uid) argument
1410 enableNetwork(int networkId, boolean disableOthers, int uid) argument
1445 disableNetwork(int networkId, int uid) argument
1485 checkAndUpdateLastConnectUid(int networkId, int uid) argument
2811 canModifyProxySettings(int uid) argument
[all...]
H A DWifiConfigurationUtil.java55 * Check whether a uid belong to a user or any of its managed profiles.
57 * @param uid uid of the app.
60 * @return whether the uid belongs to the user or any of its managed profiles.
62 public static boolean doesUidBelongToAnyProfile(int uid, List<UserInfo> profiles) { argument
63 final int userId = UserHandle.getUserId(uid);
H A DWifiMulticastLockManager.java95 return "Multicaster{" + mTag + " uid=" + mUid + "}";
145 int uid = Binder.getCallingUid();
148 mBatteryStats.noteWifiMulticastEnabled(uid);
157 int uid = Binder.getCallingUid();
163 if ((m != null) && (m.getUid() == uid)) {
164 removeMulticasterLocked(i, uid);
170 private void removeMulticasterLocked(int i, int uid) { argument
182 mBatteryStats.noteWifiMulticastDisabled(uid);
H A DWifiServiceImpl.java267 + " uid=" + msg.sendingUid
290 + " uid=" + msg.sendingUid
543 * @param workSource If null, all blame is given to the calling uid.
550 mLog.trace("startScan uid=%").c(Binder.getCallingUid()).flush();
642 mLog.trace("getCurrentNetworkWpsNfcConfigurationToken uid=%")
720 private void enforceLocationPermission(String pkgName, int uid) { argument
721 mWifiPermissionsUtil.enforceLocationPermission(pkgName, uid);
741 + ", uid=" + Binder.getCallingUid() + ", package=" + packageName);
742 mLog.trace("setWifiEnabled package=% uid=% enable=%").c(packageName)
803 mLog.trace("getWifiEnabledState uid
[all...]
H A DWifiStateMachine.java1285 * @param uid UID of the app requesting the connection.
1289 private boolean connectToUserSelectNetwork(int netId, int uid, boolean forceReconnect) { argument
1290 logd("connectToUserSelectNetwork netId " + netId + ", uid " + uid
1296 if (!mWifiConfigManager.enableNetwork(netId, true, uid)
1297 || !mWifiConfigManager.checkAndUpdateLastConnectUid(netId, uid)) {
1298 logi("connectToUserSelectNetwork Allowing uid " + uid
1330 * @param callingUid The uid initiating the wifi scan. Blame will be given here unless
1799 public void disconnectCommand(int uid, in argument
1873 syncAddOrUpdatePasspointConfig(AsyncChannel channel, PasspointConfiguration config, int uid) argument
2069 removeAppConfigs(String packageName, int uid) argument
3085 getWiFiInfoForUid(int uid) argument
[all...]
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/aware/
H A DWifiAwareClientState.java69 public WifiAwareClientState(Context context, int clientId, int uid, int pid, argument
74 mUid = uid;
H A DWifiAwareDataPathStateManager.java809 public int uid; field in class:WifiAwareDataPathStateManager.AwareNetworkRequestInformation
821 int uid, pubSubId = 0;
860 uid = client.getUid();
911 nnri.uid = uid;
923 ", uid=").append(uid).append(", interfaceName=").append(interfaceName).append(
H A DWifiAwareServiceImpl.java135 final int uid = getMockableCallingUid();
144 Log.v(TAG, "connect: uid=" + uid + ", clientId=" + clientId + ", configRequest"
177 mUidByClientId.put(clientId, uid);
180 mStateManager.connect(clientId, uid, pid, callingPackage, callback, configRequest,
189 int uid = getMockableCallingUid();
190 enforceClientValidity(uid, clientId);
191 if (VDBG) Log.v(TAG, "disconnect: uid=" + uid + ", clientId=" + clientId);
214 int uid
390 enforceClientValidity(int uid, int clientId) argument
[all...]
H A DWifiAwareStateManager.java166 private static final String MESSAGE_BUNDLE_KEY_UID = "uid";
266 public void connect(int clientId, int uid, int pid, String callingPackage, argument
274 msg.getData().putInt(MESSAGE_BUNDLE_KEY_UID, uid);
1204 int uid = msg.getData().getInt(MESSAGE_BUNDLE_KEY_UID);
1211 waitForResponse = connectLocal(mCurrentTransactionId, clientId, uid, pid,
1766 private boolean connectLocal(short transactionId, int clientId, int uid, int pid, argument
1771 + ", uid=" + uid + ", pid=" + pid + ", callingPackage=" + callingPackage
1811 WifiAwareClientState client = new WifiAwareClientState(mContext, clientId, uid, pid,
2139 int uid
[all...]
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/
H A DPasspointManager.java236 public boolean addOrUpdateProvider(PasspointConfiguration config, int uid) { argument
263 config, mKeyStore, mSimAccessor, mProviderIndex++, uid);
280 + " by " + uid);
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/p2p/
H A DWifiP2pServiceImpl.java510 throw new SecurityException("Wifi Display Permission denied for uid = "
515 private boolean getWfdPermission(int uid) { argument
521 android.Manifest.permission.CONFIGURE_WIFI_DISPLAY, uid)
531 + ", uid=" + Binder.getCallingUid());
3334 * @param uid of the caller
3337 private WifiP2pDeviceList getPeers(Bundle pkg, int uid) { argument
3349 scanPermission = wifiPermissionsUtil.canAccessScanResults(pkgName, uid,
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/scanner/
H A DWifiScanningServiceImpl.java104 mLog.trace("getMessenger() uid=%").c(Binder.getCallingUid()).flush();
121 mLog.trace("getAvailableChannels uid=%").c(Binder.getCallingUid()).flush();
125 private void enforceLocationHardwarePermission(int uid) { argument
128 UNKNOWN_PID, uid,
1831 ClientInfo(int uid, Messenger messenger) { argument
1832 mUid = uid;
1834 mWorkSource = new WorkSource(uid);
1923 return "ClientInfo[uid=" + mUid + "," + mMessenger + "]";
1938 ExternalClientInfo(int uid, Messenger messenger, AsyncChannel c) { argument
1939 super(uid, messenge
2062 toString(int uid, ScanSettings settings) argument
[all...]
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/util/
H A DWifiPermissionsUtil.java65 * @param uid uid of the app.
68 public boolean checkConfigOverridePermission(int uid) { argument
70 int permission = mWifiPermissionsWrapper.getOverrideWifiConfigPermission(uid);
91 * @param uid The uid of the package
93 public void enforceLocationPermission(String pkgName, int uid) { argument
94 if (!checkCallersLocationPermission(pkgName, uid)) {
95 throw new SecurityException("UID " + uid + " does not have Location permission");
103 * @param uid Th
107 canAccessScanResults(String pkgName, int uid, int minVersion) argument
144 checkCallerHasPeersMacAddressPermission(int uid) argument
153 isCallerActiveNwScorer(int uid) argument
161 isScanAllowedbyApps(String pkgName, int uid) argument
168 checkInteractAcrossUsersFull(int uid) argument
178 isCurrentProfile(int uid) argument
211 checkAppOpAllowed(int op, String pkgName, int uid) argument
227 checkCallersLocationPermission(String pkgName, int uid) argument
[all...]
H A DWifiPermissionsWrapper.java48 * @param uid Calling Uid
51 public int getCallingUserId(int uid) { argument
52 return UserHandle.getUserId(uid);
76 public int getUidPermission(String permissionType, int uid) { argument
77 return ActivityManager.checkUidPermission(permissionType, uid);
90 * @param uid to check the permission for
94 public int getOverrideWifiConfigPermission(int uid) throws RemoteException { argument
96 android.Manifest.permission.OVERRIDE_WIFI_CONFIG, uid);
/frameworks/opt/net/wifi/tests/wifitests/src/com/android/server/wifi/
H A DBinderUtil.java22 * Utilities for faking the calling uid in Binder.
26 * Fake the calling uid in Binder.
27 * @param uid the calling uid that Binder should return from now on
29 public static void setUid(int uid) { argument
30 Binder.restoreCallingIdentity((((long) uid) << 32) | Binder.getCallingPid());
H A DMockKeyStore.java91 private KeyBlob access(int uid, String key, boolean createIfNotExist) { argument
92 if (mStore.get(uid) == null) {
93 mStore.put(uid, new HashMap<String, KeyBlob>());
95 HashMap<String, KeyBlob> map = mStore.get(uid);
109 public KeyBlob getKeyBlob(int uid, String key) { argument
110 return access(uid, key, false);
113 private boolean put(String key, byte[] value, int uid, int flags) { argument
114 access(uid, key, true).update(value, flags);
118 private boolean importKey(String keyName, byte[] key, int uid, int flags) { argument
119 return put(keyName, key, uid, flag
122 delete(String key, int uid) argument
129 contains(String key, int uid) argument
[all...]
H A DWifiConfigManagerTest.java146 public String answer(int uid) throws Exception {
147 if (uid == TEST_CREATOR_UID) {
149 } else if (uid == TEST_UPDATE_UID) {
151 } else if (uid == TEST_SYSUI_UID) {
153 } else if (uid == TEST_NO_PERM_UID) {
156 fail("Unexpected UID: " + uid);
2609 app.uid = TEST_CREATOR_UID;
2987 // Testing updating network with uid permission OVERRIDE_WIFI_CONFIG
3266 int uid = withConfOverride ? TEST_CREATOR_UID : TEST_NO_PERM_UID;
3267 NetworkUpdateResult result = addNetworkToWifiConfigManager(network, uid);
3587 addNetworkToWifiConfigManager(WifiConfiguration configuration, int uid) argument
[all...]

Completed in 645 milliseconds

1234567891011>>