/frameworks/base/tests/permission/src/com/android/framework/permission/tests/ |
H A D | ServiceManagerPermissionTests.java | 17 package com.android.framework.permission.tests; 54 public boolean checkPermission(java.lang.String permission, int pid, int uid) { 69 public boolean isRuntimePermission(String permission) {
|
H A D | VibratorServicePermissionTest.java | 17 package com.android.framework.permission.tests; 46 * <p>Tests permission: 47 * {@link android.Manifest.permission#VIBRATE} 64 * <p>Tests permission: 65 * {@link android.Manifest.permission#VIBRATE}
|
H A D | PmPermissionsTests.java | 17 package com.android.framework.permission.tests; 29 private String mPkgName = "com.android.framework.permission.tests"; 38 * This test verifies that PackageManger.getPackageSizeInfo enforces permission 39 * android.permission.GET_PACKAGE_SIZE 53 * This test verifies that PackageManger.DeleteApplicationCacheFiles enforces permission 54 * android.permission.DELETE_CACHE_FILES 68 * This test verifies that PackageManger.installPackage enforces permission 69 * android.permission.INSTALL_PACKAGES 76 * enforces permission android.permission [all...] |
H A D | SmsManagerPermissionTest.java | 17 package com.android.framework.permission.tests; 38 * {@link android.Manifest.permission#SEND_SMS}. 54 * {@link android.Manifest.permission#SEND_SMS}. 70 * {@link android.Manifest.permission#SEND_MMS}.
|
H A D | WindowManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
H A D | ActivityManagerPermissionTests.java | 17 package com.android.framework.permission.tests;
|
/frameworks/base/core/java/android/content/ |
H A D | PermissionChecker.java | 31 * This class provides permission check APIs that verify both the 32 * permission and the associated app op for this permission if 35 * In the new permission model permissions with protection level 40 * permission revocations and would crash. Therefore, when the 41 * user disables a permission for a legacy app in the UI the 42 * platform disables the APIs guarded by this permission making 50 * permission model for which the user had disabled the "permission" 57 /** Permission result: The permission i 91 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, @Nullable String packageName) argument 129 checkSelfPermission(@onNull Context context, @NonNull String permission) argument 147 checkCallingPermission(@onNull Context context, @NonNull String permission, @Nullable String packageName) argument 166 checkCallingOrSelfPermission(@onNull Context context, @NonNull String permission) argument [all...] |
/frameworks/base/tests/testables/src/android/testing/ |
H A D | TestablePermissions.java | 22 * Simple class for simulating basic permission states for tests. 35 * for a specific permission value. For all enforcePermission* calls 38 public void setPermission(String permission, int value) { argument 39 mPermissions.put(permission, value); 44 * for a specific permission value. For all enforceUriPermission* calls 52 boolean wantsCall(String permission) { argument 53 return mPermissions.containsKey(permission); 60 int check(String permission) { argument 61 return mPermissions.get(permission); 69 public void enforce(String permission) { argument [all...] |
/frameworks/native/services/nativeperms/ |
H A D | nativeperms.cpp | 30 static android::String16 serviceName("permission"); 38 const ::android::String16& permission, int32_t pid, int32_t uid, 40 (void)permission; 58 const ::android::String16& permission, bool* _aidl_return) { 59 (void)permission; 37 checkPermission( const ::android::String16& permission, int32_t pid, int32_t uid, bool* _aidl_return) argument 57 isRuntimePermission( const ::android::String16& permission, bool* _aidl_return) argument
|
/frameworks/opt/chips/src/com/android/ex/chips/ |
H A D | ChipsUtil.java | 29 * Listener that gets notified when we check whether we have permission. 32 void onPermissionCheck(String permission, boolean granted); argument 39 new String[] { Manifest.permission.READ_CONTACTS }; 51 * <p>This is interesting for us because new permission model is introduced in M and we need to 59 * Returns {@link PackageManager#PERMISSION_GRANTED} if given permission is granted, or 62 public static int checkPermission(Context context, String permission) { argument 64 // TODO: Use "context.checkSelfPermission(permission)" once it's safe to move to M sdk 65 return context.checkPermission(permission, Process.myPid(), Process.myUid()); 67 // Assume that we have permission before M. 80 for (String permission [all...] |
/frameworks/base/core/java/android/app/ |
H A D | ActivityManagerNative.java | 58 static public void broadcastStickyIntent(Intent intent, String permission, int userId) { argument 59 broadcastStickyIntent(intent, permission, AppOpsManager.OP_NONE, userId); 64 * If you don't care about permission, use null. 68 static public void broadcastStickyIntent(Intent intent, String permission, int appOp, argument
|
/frameworks/base/core/java/android/content/pm/permission/ |
H A D | RuntimePermissionPresentationInfo.java | 17 package android.content.pm.permission; 25 * This class contains information about how a runtime permission 26 * is to be presented in the UI. A single runtime permission 28 * permissions, e.g. the location permission may control both the 44 * @param label The permission label. 45 * @param granted Whether the permission is granted. 46 * @param standard Whether this is a platform-defined permission. 67 * @return Whether the permission is granted. 74 * @return Whether the permission is platform-defined. 81 * Gets the permission labe [all...] |
/frameworks/base/services/core/java/com/android/server/firewall/ |
H A D | SenderPermissionFilter.java | 31 private SenderPermissionFilter(String permission) { argument 32 mPermission = permission; 45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") { 49 String permission = parser.getAttributeValue(null, ATTR_NAME); 50 if (permission == null) { 54 return new SenderPermissionFilter(permission);
|
/frameworks/native/libs/binder/ |
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_ 37 check(bool* granted, const String16& permission, uid_t uid) const argument 81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
H A D | PermissionController.cpp | 36 sp<IBinder> binder = defaultServiceManager()->checkService(String16("permission")); 41 ALOGI("Waiting for permission service"); 43 ALOGW("Waiting too long for permission service, giving up"); 56 bool PermissionController::checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 59 return service != NULL ? service->checkPermission(permission, pid, uid) : false; 76 bool PermissionController::isRuntimePermission(const String16& permission) argument 79 return service != nullptr ? service->isRuntimePermission(permission) : false;
|
H A D | AppOpsManager.cpp | 133 int32_t AppOpsManager::permissionToOpCode(const String16& permission) { argument 136 return service->permissionToOpCode(permission);
|
H A D | IAppOpsService.cpp | 117 virtual int32_t permissionToOpCode(const String16& permission) { argument 120 data.writeString16(permission); 205 String16 permission = data.readString16(); local 206 const int32_t opCode = permissionToOpCode(permission);
|
H A D | IPermissionController.cpp | 39 virtual bool checkPermission(const String16& permission, int32_t pid, int32_t uid) argument 43 data.writeString16(permission); 84 virtual bool isRuntimePermission(const String16& permission) argument 88 data.writeString16(permission); 118 String16 permission = data.readString16(); local 121 bool res = checkPermission(permission, pid, uid); 154 String16 permission = data.readString16(); local 155 const bool res = isRuntimePermission(permission);
|
/frameworks/native/services/vr/hardware_composer/ |
H A D | vr_composer.cpp | 14 const bool permission = PermissionCache::checkPermission( local 15 String16("android.permission.RESTRICTED_VR_ACCESS"), pid, uid); 16 if (!permission) 17 ALOGE("permission denied to pid=%d uid=%u", pid, uid); 19 return permission;
|
/frameworks/support/compat/src/main/java/androidx/core/app/ |
H A D | AppOpsManagerCompat.java | 63 * Gets the app op name associated with a given permission. 70 * @param permission The permission. 71 * @return The app op associated with the permission or null. 74 public static String permissionToOp(@NonNull String permission) { argument 76 return AppOpsManager.permissionToOp(permission);
|
/frameworks/support/compat/src/main/java/androidx/core/content/ |
H A D | PermissionChecker.java | 36 * This class provides permission check APIs that verify both the 37 * permission and the associated app op for this permission if 40 * In the new permission model permissions with protection level 45 * permission revocations and would crash. Therefore, when the 46 * user disables a permission for a legacy app in the UI the 47 * platform disables the APIs guarded by this permission making 55 * permission model for which the user had disabled the "permission" 60 /** Permission result: The permission i 95 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, @Nullable String packageName) argument 132 checkSelfPermission(@onNull Context context, @NonNull String permission) argument 150 checkCallingPermission(@onNull Context context, @NonNull String permission, @Nullable String packageName) argument 169 checkCallingOrSelfPermission(@onNull Context context, @NonNull String permission) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ServiceInfo.java | 31 * Optional name of a permission required to be able to access this 32 * Service. From the "permission" attribute. 34 public String permission; field in class:ServiceInfo 85 permission = orig.permission; 96 pw.println(prefix + "permission=" + permission); 113 dest.writeString(permission); 129 permission = source.readString();
|
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
H A D | MockLockSettingsContext.java | 71 public void enforceCallingOrSelfPermission(String permission, String message) { argument 72 // Skip permission checks for unit tests. 76 public int checkCallingOrSelfPermission(String permission) { argument
|
/frameworks/base/test-base/src/android/test/ |
H A D | AndroidTestCase.java | 88 * Asserts that launching a given activity is protected by a particular permission by 90 * is thrown that mentions the permission in its error message. 97 * @param permission The name of the permission. 100 String packageName, String className, String permission) { 107 fail("expected security exception for " + permission); 110 assertTrue("error message should contain " + permission + ".", 111 expected.getMessage().contains(permission)); 117 * Asserts that reading from the content uri requires a particular permission by querying the 118 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission 99 assertActivityRequiresPermission( String packageName, String className, String permission) argument 123 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument 142 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument [all...] |
/frameworks/native/services/vr/virtual_touchpad/ |
H A D | VirtualTouchpadService.cpp | 17 const String16 kDumpPermission("android.permission.DUMP"); 18 const String16 kTouchPermission("android.permission.RESTRICTED_VR_ACCESS"); 136 const bool permission = PermissionCache::checkPermission(kTouchPermission, *out_pid, uid); local 137 if (!permission) { 138 ALOGE("permission denied to pid=%ld uid=%ld", static_cast<long>(*out_pid), 141 return permission;
|