/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/utils/ |
H A D | EventLogger.java | 17 package com.android.packageinstaller.permission.utils; 33 * For each permission there are four events. The events are in the order of 34 * #ALL_DANGEROUS_PERMISSIONS. The four events per permission are (in that order): "requested", 40 /** All dangerous permission names in the same order as the events in MetricsEvent */ 42 Manifest.permission.READ_CALENDAR, 43 Manifest.permission.WRITE_CALENDAR, 44 Manifest.permission.CAMERA, 45 Manifest.permission.READ_CONTACTS, 46 Manifest.permission.WRITE_CONTACTS, 47 Manifest.permission [all...] |
H A D | SafetyNetLogger.java | 17 package com.android.packageinstaller.permission.utils; 22 import com.android.packageinstaller.permission.model.AppPermissionGroup; 23 import com.android.packageinstaller.permission.model.Permission; 67 Permission permission = group.getPermissions().get(permissionNum); 73 builder.append(permission.getName()).append('|'); 76 builder.append(permission.isGranted()).append('|'); 78 builder.append(permission.isGranted() && (permission.getAppOp() == null 79 || permission.isAppOpAllowed())).append('|'); 82 builder.append(permission [all...] |
H A D | IoUtils.java | 17 package com.android.packageinstaller.permission.utils;
|
H A D | Utils.java | 17 package com.android.packageinstaller.permission.utils; 32 import com.android.packageinstaller.permission.model.AppPermissionGroup; 33 import com.android.packageinstaller.permission.model.AppPermissions; 34 import com.android.packageinstaller.permission.model.PermissionApps.PermissionApp; 162 public static boolean isPermissionIndividuallyControlled(Context context, String permission) { argument 166 return Manifest.permission.READ_CONTACTS.equals(permission) 167 || Manifest.permission.WRITE_CONTACTS.equals(permission) 168 || Manifest.permission [all...] |
/packages/apps/Contacts/src/com/android/contacts/activities/ |
H A D | RequestImportVCardPermissionsActivity.java | 19 import android.Manifest.permission; 29 permission.GET_ACCOUNTS, 30 permission.READ_CONTACTS, 31 permission.WRITE_CONTACTS, 33 permission.READ_EXTERNAL_STORAGE,
|
H A D | RequestPermissionsActivity.java | 19 import android.Manifest.permission; 63 permissions.add(permission.GET_ACCOUNTS); 64 permissions.add(permission.READ_CONTACTS); 65 permissions.add(permission.WRITE_CONTACTS); 70 // ImportExportDialogFragment. We work around missing this permission when 72 permissions.add(permission.CALL_PHONE); 73 permissions.add(permission.READ_CALL_LOG); 74 permissions.add(permission.READ_PHONE_STATE);
|
/packages/apps/Dialer/java/com/android/voicemail/ |
H A D | VoicemailPermissionHelper.java | 19 import android.Manifest.permission; 27 * Handles permission checking for the voicemail module. Currently "phone" and "sms" permissions are 34 permission.ADD_VOICEMAIL, 35 permission.WRITE_VOICEMAIL, 36 permission.READ_VOICEMAIL, 37 permission.READ_PHONE_STATE, 38 permission.SEND_SMS 49 /** Returns a list of permission that is missing for the voicemail module to operate. */ 53 for (String permission : VOICEMAIL_PERMISSIONS) { 54 if (context.checkSelfPermission(permission) ! [all...] |
/packages/providers/ContactsProvider/src/com/android/providers/contacts/ |
H A D | VoicemailPermissions.java | 38 return callerHasPermission(android.Manifest.permission.ADD_VOICEMAIL); 46 return callerHasPermission(android.Manifest.permission.READ_VOICEMAIL); 49 /** Determine if the calling process has the permission required to update and remove all 55 return callerHasPermission(android.Manifest.permission.WRITE_VOICEMAIL); 61 * @throws SecurityException if the caller does not have the voicemail source permission. 65 throw new SecurityException("The caller must have permission: " + 66 android.Manifest.permission.ADD_VOICEMAIL); 73 * @throws SecurityException if the caller does not have the voicemail source permission. 78 + "dialer, or have the system-only %s permission: ", 79 android.Manifest.permission 108 packageHasPermission(String packageName, String permission) argument 113 callerHasPermission(String permission) argument [all...] |
/packages/apps/Dialer/java/com/android/dialer/util/ |
H A D | PermissionsUtil.java | 19 import static android.Manifest.permission.ACCESS_COARSE_LOCATION; 20 import static android.Manifest.permission.ACCESS_FINE_LOCATION; 21 import static android.Manifest.permission.ADD_VOICEMAIL; 22 import static android.Manifest.permission.CALL_PHONE; 23 import static android.Manifest.permission.MODIFY_PHONE_STATE; 24 import static android.Manifest.permission.READ_CALL_LOG; 25 import static android.Manifest.permission.READ_CONTACTS; 26 import static android.Manifest.permission.READ_PHONE_STATE; 27 import static android.Manifest.permission.READ_VOICEMAIL; 28 import static android.Manifest.permission 120 hasPermission(Context context, String permission) argument 132 isFirstRequest(Context context, String permission) argument 145 permissionRequested(Context context, String permission) argument 174 registerPermissionReceiver( Context context, BroadcastReceiver receiver, String permission) argument 186 notifyPermissionGranted(Context context, String permission) argument [all...] |
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/model/ |
H A D | AppPermissionGroup.java | 17 package com.android.packageinstaller.permission.model; 33 import com.android.packageinstaller.permission.utils.ArrayUtils; 34 import com.android.packageinstaller.permission.utils.LocationUtils; 145 // Don't allow toggling non-platform permission groups for legacy apps via app ops. 165 Permission permission = new Permission(requestedPermission, granted, 167 group.addPermission(permission); 230 Permission permission = mPermissions.valueAt(i); 231 if (permission.isReviewRequired()) { 241 Permission permission = mPermissions.valueAt(i); 242 if (permission 295 hasPermission(String permission) argument 662 addPermission(Permission permission) argument [all...] |
/packages/apps/Contacts/src/com/android/contacts/util/ |
H A D | PermissionsUtil.java | 19 import android.Manifest.permission; 34 // Each permission in this list is a cherry-picked permission from a particular permission 35 // group. Granting a permission group enables access to all permissions in that group so we 36 // only need to check a single permission in each group. 39 public static final String PHONE = permission.CALL_PHONE; 40 public static final String CONTACTS = permission.READ_CONTACTS; 41 public static final String LOCATION = permission.ACCESS_FINE_LOCATION; 55 public static boolean hasPermission(Context context, String permission) { argument 94 registerPermissionReceiver(Context context, BroadcastReceiver receiver, String permission) argument 104 notifyPermissionGranted(Context context, String permission) argument [all...] |
/packages/apps/Messaging/src/com/android/messaging/util/ |
H A D | OsUtil.java | 188 * Check if the app has the specified permission. If it does not, the app needs to use 191 * any permission is revoked. 192 * @param permission A permission from {@link android.Manifest.permission} 194 public static boolean hasPermission(final String permission) { argument 197 // user revokes the permission setting. However, PERMISSION_DENIED should not be 198 // cached as the process does not get killed if the user enables the permission setting. 199 if (!sPermissions.containsKey(permission) 200 || sPermissions.get(permission) [all...] |
/packages/apps/Settings/src/com/android/settings/fuelgauge/anomaly/action/ |
H A D | LocationCheckAction.java | 21 import android.content.pm.permission.RuntimePermissionPresenter; 29 * Location action for anomaly app, which means to turn off location permission for this app 52 Manifest.permission.ACCESS_COARSE_LOCATION); 54 Manifest.permission.ACCESS_FINE_LOCATION); 59 return isPermissionGranted(anomaly, Manifest.permission.ACCESS_COARSE_LOCATION) 60 || isPermissionGranted(anomaly, Manifest.permission.ACCESS_FINE_LOCATION); 68 private boolean isPermissionGranted(Anomaly anomaly, String permission) { argument 69 return PermissionChecker.checkPermission(mContext, permission, -1, anomaly.uid,
|
/packages/providers/ContactsProvider/src/com/android/providers/contacts/util/ |
H A D | ContactsPermissions.java | 38 public static boolean hasCallerOrSelfPermission(Context context, String permission) { argument 44 ok = context.checkCallingOrSelfPermission(permission) 49 + " perm=" + permission 57 public static void enforceCallingOrSelfPermission(Context context, String permission) { argument 58 final boolean ok = hasCallerOrSelfPermission(context, permission); 60 throw new SecurityException(String.format("The caller must have the %s permission.", 61 permission)); 65 public static boolean hasPackagePermission(Context context, String permission, String pkg) { argument 70 ok = context.getPackageManager().checkPermission(permission, pkg) 75 + " perm=" + permission [all...] |
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/service/ |
H A D | RuntimePermissionPresenterServiceImpl.java | 17 package com.android.packageinstaller.permission.service; 21 import android.content.pm.permission.RuntimePermissionPresentationInfo; 25 import com.android.packageinstaller.permission.model.AppPermissionGroup; 26 import com.android.packageinstaller.permission.model.AppPermissions; 27 import com.android.packageinstaller.permission.utils.Utils; 56 RuntimePermissionPresentationInfo permission = 59 permissions.add(permission);
|
/packages/apps/Car/Stream/src/com/android/car/stream/ |
H A D | PermissionsActivity.java | 43 android.Manifest.permission.READ_PHONE_STATE, 44 android.Manifest.permission.CALL_PHONE, 45 android.Manifest.permission.READ_CALL_LOG, 46 android.Manifest.permission.READ_CONTACTS, 47 android.Manifest.permission.ACCESS_FINE_LOCATION, 48 android.Manifest.permission.RECEIVE_SMS, 49 android.Manifest.permission.READ_EXTERNAL_STORAGE 93 String permission = permissions[i]; 96 granted.add(permission); 98 notGranted.add(permission); [all...] |
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/ui/ |
H A D | ManagePermissionsActivity.java | 17 package com.android.packageinstaller.permission.ui; 25 import com.android.packageinstaller.permission.ui.handheld.ManageStandardPermissionsFragment; 26 import com.android.packageinstaller.permission.ui.wear.AppPermissionsFragmentWear; 48 fragment = com.android.packageinstaller.permission.ui.television 65 fragment = com.android.packageinstaller.permission.ui.television 71 fragment = com.android.packageinstaller.permission.ui.handheld 74 fragment = com.android.packageinstaller.permission.ui.handheld 88 fragment = com.android.packageinstaller.permission.ui.television 91 fragment = com.android.packageinstaller.permission.ui.handheld
|
H A D | OverlayTouchActivity.java | 16 package com.android.packageinstaller.permission.ui;
|
/packages/inputmethods/LatinIME/java/src/com/android/inputmethod/latin/permissions/ |
H A D | PermissionsUtil.java | 39 * @return the list of permissions that do not have permission to use. 44 for (String permission : permissions) { 45 if (ContextCompat.checkSelfPermission(context, permission) 47 deniedPermissions.add(permission); 77 * Queries if al the permissions are granted for the given permission strings. 85 for (String permission : permissions) { 86 if (ContextCompat.checkSelfPermission(context, permission)
|
/packages/apps/Car/LocalMediaPlayer/src/com/android/car/media/localmediaplayer/ |
H A D | Utils.java | 26 android.Manifest.permission.READ_EXTERNAL_STORAGE 38 for (String permission : PERMISSIONS) { 39 if (context.checkSelfPermission(permission) != PackageManager.PERMISSION_GRANTED) {
|
/packages/apps/Settings/tests/robotests/src/com/android/settings/testutils/shadow/ |
H A D | ShadowPermissionChecker.java | 44 public static void addPermission(String permission, int pid, int uid, String packageName, argument 46 sPermissions.put(new PermissionInfo(permission, pid, uid, packageName), permissionValue); 50 public static int checkPermission(@NonNull Context context, @NonNull String permission, argument 52 return sPermissions.getOrDefault(new PermissionInfo(permission, pid, uid, packageName), 62 public PermissionInfo(String permission, int pid, int uid, String packageName) { argument 66 mPermission = permission;
|
/packages/apps/Nfc/src/com/android/nfc/ |
H A D | NfcPermissions.java | 10 * NFC ADMIN permission - only for system apps 12 private static final String ADMIN_PERM = android.Manifest.permission.WRITE_SECURE_SETTINGS; 13 private static final String ADMIN_PERM_ERROR = "WRITE_SECURE_SETTINGS permission required"; 16 * Regular NFC permission 18 static final String NFC_PERMISSION = android.Manifest.permission.NFC; 19 private static final String NFC_PERM_ERROR = "NFC permission required";
|
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/ui/auto/ |
H A D | GrantPermissionsAutoViewHandler.java | 17 package com.android.packageinstaller.permission.ui.auto; 22 import com.android.packageinstaller.permission.ui.handheld.GrantPermissionsViewHandlerImpl; 25 * A {@link com.android.packageinstaller.permission.ui.GrantPermissionsViewHandler} that is
|
/packages/apps/Settings/src/com/android/settings/enterprise/ |
H A D | AdminGrantedLocationPermissionsPreferenceController.java | 30 super(context, lifecycle, async, new String[] {Manifest.permission.ACCESS_COARSE_LOCATION, 31 Manifest.permission.ACCESS_FINE_LOCATION}, Manifest.permission_group.LOCATION);
|
/packages/apps/Settings/tests/robotests/src/com/android/settings/enterprise/ |
H A D | AdminGrantedLocationPermissionsPreferenceControllerTest.java | 37 new String[] {Manifest.permission.ACCESS_COARSE_LOCATION, 38 Manifest.permission.ACCESS_FINE_LOCATION},
|