Searched refs:permission (Results 1 - 25 of 467) sorted by relevance

1234567891011>>

/frameworks/base/core/java/android/content/pm/permission/
H A DRuntimePermissionPresentationInfo.aidl17 package android.content.pm.permission;
H A DIRuntimePermissionPresenter.aidl17 package android.content.pm.permission;
22 * Interface for communication with the permission presenter service.
/frameworks/native/services/nativeperms/android/os/
H A DIPermissionController.aidl22 boolean checkPermission(String permission, int pid, int uid);
24 boolean isRuntimePermission(String permission);
/frameworks/base/core/java/android/os/
H A DIPermissionController.aidl22 boolean checkPermission(String permission, int pid, int uid);
25 boolean isRuntimePermission(String permission);
/frameworks/native/libs/binder/
H A DPermissionCache.cpp38 const String16& permission, uid_t uid) const {
41 e.name = permission;
51 void PermissionCache::cache(const String16& permission, argument
55 ssize_t index = mPermissionNamesPool.indexOf(permission);
59 mPermissionNamesPool.add(permission);
60 e.name = permission;
63 // permission checks
77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument
78 return PermissionCache::checkCallingPermission(permission, NULL, NULL);
82 const String16& permission, int32_
37 check(bool* granted, const String16& permission, uid_t uid) const argument
81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument
91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument
[all...]
/frameworks/base/tests/testables/src/android/testing/
H A DTestablePermissions.java22 * Simple class for simulating basic permission states for tests.
35 * for a specific permission value. For all enforcePermission* calls
38 public void setPermission(String permission, int value) { argument
39 mPermissions.put(permission, value);
44 * for a specific permission value. For all enforceUriPermission* calls
52 boolean wantsCall(String permission) { argument
53 return mPermissions.containsKey(permission);
60 int check(String permission) { argument
61 return mPermissions.get(permission);
69 public void enforce(String permission) { argument
[all...]
H A DTestableContext.java316 public int checkCallingOrSelfPermission(String permission) { argument
317 if (mTestablePermissions != null && mTestablePermissions.wantsCall(permission)) {
318 return mTestablePermissions.check(permission);
320 return super.checkCallingOrSelfPermission(permission);
324 public int checkCallingPermission(String permission) { argument
325 if (mTestablePermissions != null && mTestablePermissions.wantsCall(permission)) {
326 return mTestablePermissions.check(permission);
328 return super.checkCallingPermission(permission);
332 public int checkPermission(String permission, int pid, int uid) { argument
333 if (mTestablePermissions != null && mTestablePermissions.wantsCall(permission)) {
340 checkPermission(String permission, int pid, int uid, IBinder callerToken) argument
348 checkSelfPermission(String permission) argument
356 enforceCallingOrSelfPermission(String permission, String message) argument
365 enforceCallingPermission(String permission, String message) argument
374 enforcePermission(String permission, int pid, int uid, String message) argument
[all...]
/frameworks/base/services/core/java/com/android/server/firewall/
H A DSenderPermissionFilter.java31 private SenderPermissionFilter(String permission) { argument
32 mPermission = permission;
45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") {
49 String permission = parser.getAttributeValue(null, ATTR_NAME);
50 if (permission == null) {
54 return new SenderPermissionFilter(permission);
/frameworks/base/tools/aapt2/java/
H A DManifestClassGenerator_test.cpp35 <permission android:name="android.permission.ACCESS_INTERNET" />
36 <permission android:name="android.DO_DANGEROUS_THINGS" />
37 <permission android:name="com.test.sample.permission.HUH" />
38 <permission-group android:name="foo.bar.PERMISSION" />
44 ASSERT_THAT(actual, HasSubstr("public static final class permission {"));
47 const size_t permission_start_pos = actual.find("public static final class permission {");
52 // Make sure these permissions are in the permission class.
60 "public static final String ACCESS_INTERNET=\"android.permission
[all...]
/frameworks/opt/chips/src/com/android/ex/chips/
H A DChipsUtil.java29 * Listener that gets notified when we check whether we have permission.
32 void onPermissionCheck(String permission, boolean granted); argument
39 new String[] { Manifest.permission.READ_CONTACTS };
51 * <p>This is interesting for us because new permission model is introduced in M and we need to
59 * Returns {@link PackageManager#PERMISSION_GRANTED} if given permission is granted, or
62 public static int checkPermission(Context context, String permission) { argument
64 // TODO: Use "context.checkSelfPermission(permission)" once it's safe to move to M sdk
65 return context.checkPermission(permission, Process.myPid(), Process.myUid());
67 // Assume that we have permission before M.
80 for (String permission
[all...]
/frameworks/base/tests/testables/tests/src/android/testing/
H A DTestablePermissionsTest.java22 import android.Manifest.permission;
45 mContext.getTestablePermissions().setPermission(permission.INTERACT_ACROSS_USERS,
47 mContext.getTestablePermissions().setPermission(permission.INTERACT_ACROSS_USERS_FULL,
50 mContext.checkPermission(permission.INTERACT_ACROSS_USERS, 0, 0));
52 mContext.checkPermission(permission.INTERACT_ACROSS_USERS_FULL, 0, 0));
66 mContext.getTestablePermissions().setPermission(permission.INTERACT_ACROSS_USERS,
68 mContext.enforceCallingOrSelfPermission(permission.INTERACT_ACROSS_USERS, "");
73 mContext.getTestablePermissions().setPermission(permission.INTERACT_ACROSS_USERS,
75 mContext.enforceCallingOrSelfPermission(permission.INTERACT_ACROSS_USERS, "");
/frameworks/base/test-base/src/android/test/
H A DAndroidTestCase.java88 * Asserts that launching a given activity is protected by a particular permission by
90 * is thrown that mentions the permission in its error message.
97 * @param permission The name of the permission.
100 String packageName, String className, String permission) {
107 fail("expected security exception for " + permission);
110 assertTrue("error message should contain " + permission + ".",
111 expected.getMessage().contains(permission));
117 * Asserts that reading from the content uri requires a particular permission by querying the
118 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission
99 assertActivityRequiresPermission( String packageName, String className, String permission) argument
123 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument
142 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument
[all...]
/frameworks/base/core/java/android/content/pm/
H A DServiceInfo.java31 * Optional name of a permission required to be able to access this
32 * Service. From the "permission" attribute.
34 public String permission; field in class:ServiceInfo
85 permission = orig.permission;
96 pw.println(prefix + "permission=" + permission);
113 dest.writeString(permission);
129 permission = source.readString();
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/applications/
H A DPermissionsSummaryHelper.java20 import android.content.pm.permission.RuntimePermissionPresentationInfo;
21 import android.content.pm.permission.RuntimePermissionPresenter;
46 RuntimePermissionPresentationInfo permission = permissions.get(i);
48 if (permission.isGranted()) {
49 if (permission.isStandard()) {
50 grantedStandardLabels.add(permission.getLabel());
/frameworks/base/core/java/android/service/persistentdata/
H A DPersistentDataBlockManager.java119 @RequiresPermission(android.Manifest.permission.ACCESS_PDB_STATE)
148 @RequiresPermission(android.Manifest.permission.OEM_UNLOCK_STATE)
162 @RequiresPermission(android.Manifest.permission.OEM_UNLOCK_STATE)
177 android.Manifest.permission.READ_OEM_UNLOCK_STATE,
178 android.Manifest.permission.OEM_UNLOCK_STATE
196 android.Manifest.permission.READ_OEM_UNLOCK_STATE,
197 android.Manifest.permission.OEM_UNLOCK_STATE
/frameworks/base/core/java/android/app/
H A DVrManager.java68 android.Manifest.permission.RESTRICTED_VR_ACCESS,
69 android.Manifest.permission.ACCESS_VR_STATE
97 android.Manifest.permission.RESTRICTED_VR_ACCESS,
98 android.Manifest.permission.ACCESS_VR_STATE
122 android.Manifest.permission.RESTRICTED_VR_ACCESS,
123 android.Manifest.permission.ACCESS_VR_STATE
139 android.Manifest.permission.RESTRICTED_VR_ACCESS,
140 android.Manifest.permission.ACCESS_VR_STATE
159 @RequiresPermission(android.Manifest.permission.RESTRICTED_VR_ACCESS)
177 @RequiresPermission(android.Manifest.permission
[all...]
/frameworks/base/core/java/android/content/
H A DPermissionChecker.java31 * This class provides permission check APIs that verify both the
32 * permission and the associated app op for this permission if
35 * In the new permission model permissions with protection level
40 * permission revocations and would crash. Therefore, when the
41 * user disables a permission for a legacy app in the UI the
42 * platform disables the APIs guarded by this permission making
50 * permission model for which the user had disabled the "permission"
57 /** Permission result: The permission i
91 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, @Nullable String packageName) argument
129 checkSelfPermission(@onNull Context context, @NonNull String permission) argument
147 checkCallingPermission(@onNull Context context, @NonNull String permission, @Nullable String packageName) argument
166 checkCallingOrSelfPermission(@onNull Context context, @NonNull String permission) argument
[all...]
/frameworks/support/compat/src/main/java/androidx/core/content/
H A DPermissionChecker.java36 * This class provides permission check APIs that verify both the
37 * permission and the associated app op for this permission if
40 * In the new permission model permissions with protection level
45 * permission revocations and would crash. Therefore, when the
46 * user disables a permission for a legacy app in the UI the
47 * platform disables the APIs guarded by this permission making
55 * permission model for which the user had disabled the "permission"
60 /** Permission result: The permission i
95 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, @Nullable String packageName) argument
132 checkSelfPermission(@onNull Context context, @NonNull String permission) argument
150 checkCallingPermission(@onNull Context context, @NonNull String permission, @Nullable String packageName) argument
169 checkCallingOrSelfPermission(@onNull Context context, @NonNull String permission) argument
[all...]
/frameworks/native/include/binder/
H A DPermissionCache.h33 * PermissionCache caches permission checks for a given uid.
35 * Currently the cache is not updated when there is a permission change,
53 // we pool all the permission names we see, as many permissions checks
59 // free the whole cache, but keep the permission name pool
63 const String16& permission, uid_t uid) const;
65 void cache(const String16& permission, uid_t uid, bool granted);
70 static bool checkCallingPermission(const String16& permission);
72 static bool checkCallingPermission(const String16& permission,
75 static bool checkPermission(const String16& permission,
/frameworks/native/libs/binder/include/binder/
H A DPermissionCache.h33 * PermissionCache caches permission checks for a given uid.
35 * Currently the cache is not updated when there is a permission change,
53 // we pool all the permission names we see, as many permissions checks
59 // free the whole cache, but keep the permission name pool
63 const String16& permission, uid_t uid) const;
65 void cache(const String16& permission, uid_t uid, bool granted);
70 static bool checkCallingPermission(const String16& permission);
72 static bool checkCallingPermission(const String16& permission,
75 static bool checkPermission(const String16& permission,
/frameworks/base/core/java/android/security/keystore/recovery/
H A DRecoveryController.java47 * <p>A system app with the {@code android.permission.RECOVER_KEYSTORE} permission may generate or
284 @RequiresPermission(android.Manifest.permission.RECOVER_KEYSTORE)
297 @RequiresPermission(android.Manifest.permission.RECOVER_KEYSTORE)
308 @RequiresPermission(android.Manifest.permission.RECOVER_KEYSTORE)
342 @RequiresPermission(android.Manifest.permission.RECOVER_KEYSTORE)
370 @RequiresPermission(android.Manifest.permission.RECOVER_KEYSTORE)
383 @RequiresPermission(android.Manifest.permission.RECOVER_KEYSTORE)
408 @RequiresPermission(android.Manifest.permission.RECOVER_KEYSTORE)
430 @RequiresPermission(android.Manifest.permission
[all...]
/frameworks/base/core/java/android/hardware/location/
H A DGeofenceHardwareService.java80 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE,
81 "Location Hardware permission not granted to access hardware geofence");
88 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE,
89 "Location Hardware permission not granted to access hardware geofence");
99 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE,
100 "Location Hardware permission not granted to access hardware geofence");
107 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE,
108 "Location Hardware permission not granted to access hardware geofence");
116 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE,
117 "Location Hardware permission no
[all...]
/frameworks/rs/tests/java_api/CannyLive/src/com/android/example/cannylive/
H A DMainActivity.java84 String []permission = {
85 Manifest.permission.CAMERA,
86 Manifest.permission.RECORD_AUDIO,
87 Manifest.permission.WRITE_EXTERNAL_STORAGE,
88 Manifest.permission.READ_EXTERNAL_STORAGE
91 boolean []permissionDenied = new boolean[permission.length];
92 for (int i = 0; i < permission.length; i++) {
93 String per = permission[i];
95 permission[i] );
108 permission[
[all...]
/frameworks/base/core/java/android/net/
H A DNetworkScoreManager.java19 import android.Manifest.permission;
41 * <li>Is granted the {@link permission#SCORE_NETWORKS} permission.
42 * <li>Is granted the {@link permission#ACCESS_COARSE_LOCATION} permission.
44 * protected by the {@link permission#BIND_NETWORK_RECOMMENDATION_SERVICE}
45 * permission.
229 * @throws SecurityException if the caller doesn't hold either {@link permission#SCORE_NETWORKS}
230 * or {@link permission#REQUEST_NETWORK_SCORES} permissions.
232 @RequiresPermission(anyOf = {android.Manifest.permission
[all...]
/frameworks/base/core/java/android/service/oemlock/
H A DOemLockManager.java62 @RequiresPermission(android.Manifest.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE)
77 @RequiresPermission(android.Manifest.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE)
96 @RequiresPermission(android.Manifest.permission.MANAGE_USER_OEM_UNLOCK_STATE)
111 @RequiresPermission(android.Manifest.permission.MANAGE_USER_OEM_UNLOCK_STATE)

Completed in 713 milliseconds

1234567891011>>