/frameworks/base/core/java/android/content/pm/permission/ |
H A D | RuntimePermissionPresentationInfo.aidl | 17 package android.content.pm.permission;
|
H A D | IRuntimePermissionPresenter.aidl | 17 package android.content.pm.permission; 22 * Interface for communication with the permission presenter service.
|
/frameworks/native/services/nativeperms/android/os/ |
H A D | IPermissionController.aidl | 22 boolean checkPermission(String permission, int pid, int uid); 24 boolean isRuntimePermission(String permission);
|
/frameworks/base/core/java/android/os/ |
H A D | IPermissionController.aidl | 22 boolean checkPermission(String permission, int pid, int uid); 25 boolean isRuntimePermission(String permission);
|
/frameworks/native/libs/binder/ |
H A D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { argument 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_ 37 check(bool* granted, const String16& permission, uid_t uid) const argument 81 checkCallingPermission( const String16& permission, int32_t* outPid, int32_t* outUid) argument 91 checkPermission( const String16& permission, pid_t pid, uid_t uid) argument [all...] |
/frameworks/base/tests/testables/src/android/testing/ |
H A D | TestablePermissions.java | 22 * Simple class for simulating basic permission states for tests. 35 * for a specific permission value. For all enforcePermission* calls 38 public void setPermission(String permission, int value) { argument 39 mPermissions.put(permission, value); 44 * for a specific permission value. For all enforceUriPermission* calls 52 boolean wantsCall(String permission) { argument 53 return mPermissions.containsKey(permission); 60 int check(String permission) { argument 61 return mPermissions.get(permission); 69 public void enforce(String permission) { argument [all...] |
H A D | TestableContext.java | 316 public int checkCallingOrSelfPermission(String permission) { argument 317 if (mTestablePermissions != null && mTestablePermissions.wantsCall(permission)) { 318 return mTestablePermissions.check(permission); 320 return super.checkCallingOrSelfPermission(permission); 324 public int checkCallingPermission(String permission) { argument 325 if (mTestablePermissions != null && mTestablePermissions.wantsCall(permission)) { 326 return mTestablePermissions.check(permission); 328 return super.checkCallingPermission(permission); 332 public int checkPermission(String permission, int pid, int uid) { argument 333 if (mTestablePermissions != null && mTestablePermissions.wantsCall(permission)) { 340 checkPermission(String permission, int pid, int uid, IBinder callerToken) argument 348 checkSelfPermission(String permission) argument 356 enforceCallingOrSelfPermission(String permission, String message) argument 365 enforceCallingPermission(String permission, String message) argument 374 enforcePermission(String permission, int pid, int uid, String message) argument [all...] |
/frameworks/base/services/core/java/com/android/server/firewall/ |
H A D | SenderPermissionFilter.java | 31 private SenderPermissionFilter(String permission) { argument 32 mPermission = permission; 45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") { 49 String permission = parser.getAttributeValue(null, ATTR_NAME); 50 if (permission == null) { 54 return new SenderPermissionFilter(permission);
|
/frameworks/base/tools/aapt2/java/ |
H A D | ManifestClassGenerator_test.cpp | 35 <permission android:name="android.permission.ACCESS_INTERNET" /> 36 <permission android:name="android.DO_DANGEROUS_THINGS" /> 37 <permission android:name="com.test.sample.permission.HUH" /> 38 <permission-group android:name="foo.bar.PERMISSION" /> 44 ASSERT_THAT(actual, HasSubstr("public static final class permission {")); 47 const size_t permission_start_pos = actual.find("public static final class permission {"); 52 // Make sure these permissions are in the permission class. 60 "public static final String ACCESS_INTERNET=\"android.permission [all...] |
/frameworks/opt/chips/src/com/android/ex/chips/ |
H A D | ChipsUtil.java | 29 * Listener that gets notified when we check whether we have permission. 32 void onPermissionCheck(String permission, boolean granted); argument 39 new String[] { Manifest.permission.READ_CONTACTS }; 51 * <p>This is interesting for us because new permission model is introduced in M and we need to 59 * Returns {@link PackageManager#PERMISSION_GRANTED} if given permission is granted, or 62 public static int checkPermission(Context context, String permission) { argument 64 // TODO: Use "context.checkSelfPermission(permission)" once it's safe to move to M sdk 65 return context.checkPermission(permission, Process.myPid(), Process.myUid()); 67 // Assume that we have permission before M. 80 for (String permission [all...] |
/frameworks/base/tests/testables/tests/src/android/testing/ |
H A D | TestablePermissionsTest.java | 22 import android.Manifest.permission; 45 mContext.getTestablePermissions().setPermission(permission.INTERACT_ACROSS_USERS, 47 mContext.getTestablePermissions().setPermission(permission.INTERACT_ACROSS_USERS_FULL, 50 mContext.checkPermission(permission.INTERACT_ACROSS_USERS, 0, 0)); 52 mContext.checkPermission(permission.INTERACT_ACROSS_USERS_FULL, 0, 0)); 66 mContext.getTestablePermissions().setPermission(permission.INTERACT_ACROSS_USERS, 68 mContext.enforceCallingOrSelfPermission(permission.INTERACT_ACROSS_USERS, ""); 73 mContext.getTestablePermissions().setPermission(permission.INTERACT_ACROSS_USERS, 75 mContext.enforceCallingOrSelfPermission(permission.INTERACT_ACROSS_USERS, "");
|
/frameworks/base/test-base/src/android/test/ |
H A D | AndroidTestCase.java | 88 * Asserts that launching a given activity is protected by a particular permission by 90 * is thrown that mentions the permission in its error message. 97 * @param permission The name of the permission. 100 String packageName, String className, String permission) { 107 fail("expected security exception for " + permission); 110 assertTrue("error message should contain " + permission + ".", 111 expected.getMessage().contains(permission)); 117 * Asserts that reading from the content uri requires a particular permission by querying the 118 * uri and ensuring a {@link SecurityException} is thrown mentioning the particular permission 99 assertActivityRequiresPermission( String packageName, String className, String permission) argument 123 assertReadingContentUriRequiresPermission(Uri uri, String permission) argument 142 assertWritingContentUriRequiresPermission(Uri uri, String permission) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ServiceInfo.java | 31 * Optional name of a permission required to be able to access this 32 * Service. From the "permission" attribute. 34 public String permission; field in class:ServiceInfo 85 permission = orig.permission; 96 pw.println(prefix + "permission=" + permission); 113 dest.writeString(permission); 129 permission = source.readString();
|
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/applications/ |
H A D | PermissionsSummaryHelper.java | 20 import android.content.pm.permission.RuntimePermissionPresentationInfo; 21 import android.content.pm.permission.RuntimePermissionPresenter; 46 RuntimePermissionPresentationInfo permission = permissions.get(i); 48 if (permission.isGranted()) { 49 if (permission.isStandard()) { 50 grantedStandardLabels.add(permission.getLabel());
|
/frameworks/base/core/java/android/service/persistentdata/ |
H A D | PersistentDataBlockManager.java | 119 @RequiresPermission(android.Manifest.permission.ACCESS_PDB_STATE) 148 @RequiresPermission(android.Manifest.permission.OEM_UNLOCK_STATE) 162 @RequiresPermission(android.Manifest.permission.OEM_UNLOCK_STATE) 177 android.Manifest.permission.READ_OEM_UNLOCK_STATE, 178 android.Manifest.permission.OEM_UNLOCK_STATE 196 android.Manifest.permission.READ_OEM_UNLOCK_STATE, 197 android.Manifest.permission.OEM_UNLOCK_STATE
|
/frameworks/base/core/java/android/app/ |
H A D | VrManager.java | 68 android.Manifest.permission.RESTRICTED_VR_ACCESS, 69 android.Manifest.permission.ACCESS_VR_STATE 97 android.Manifest.permission.RESTRICTED_VR_ACCESS, 98 android.Manifest.permission.ACCESS_VR_STATE 122 android.Manifest.permission.RESTRICTED_VR_ACCESS, 123 android.Manifest.permission.ACCESS_VR_STATE 139 android.Manifest.permission.RESTRICTED_VR_ACCESS, 140 android.Manifest.permission.ACCESS_VR_STATE 159 @RequiresPermission(android.Manifest.permission.RESTRICTED_VR_ACCESS) 177 @RequiresPermission(android.Manifest.permission [all...] |
/frameworks/base/core/java/android/content/ |
H A D | PermissionChecker.java | 31 * This class provides permission check APIs that verify both the 32 * permission and the associated app op for this permission if 35 * In the new permission model permissions with protection level 40 * permission revocations and would crash. Therefore, when the 41 * user disables a permission for a legacy app in the UI the 42 * platform disables the APIs guarded by this permission making 50 * permission model for which the user had disabled the "permission" 57 /** Permission result: The permission i 91 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, @Nullable String packageName) argument 129 checkSelfPermission(@onNull Context context, @NonNull String permission) argument 147 checkCallingPermission(@onNull Context context, @NonNull String permission, @Nullable String packageName) argument 166 checkCallingOrSelfPermission(@onNull Context context, @NonNull String permission) argument [all...] |
/frameworks/support/compat/src/main/java/androidx/core/content/ |
H A D | PermissionChecker.java | 36 * This class provides permission check APIs that verify both the 37 * permission and the associated app op for this permission if 40 * In the new permission model permissions with protection level 45 * permission revocations and would crash. Therefore, when the 46 * user disables a permission for a legacy app in the UI the 47 * platform disables the APIs guarded by this permission making 55 * permission model for which the user had disabled the "permission" 60 /** Permission result: The permission i 95 checkPermission(@onNull Context context, @NonNull String permission, int pid, int uid, @Nullable String packageName) argument 132 checkSelfPermission(@onNull Context context, @NonNull String permission) argument 150 checkCallingPermission(@onNull Context context, @NonNull String permission, @Nullable String packageName) argument 169 checkCallingOrSelfPermission(@onNull Context context, @NonNull String permission) argument [all...] |
/frameworks/native/include/binder/ |
H A D | PermissionCache.h | 33 * PermissionCache caches permission checks for a given uid. 35 * Currently the cache is not updated when there is a permission change, 53 // we pool all the permission names we see, as many permissions checks 59 // free the whole cache, but keep the permission name pool 63 const String16& permission, uid_t uid) const; 65 void cache(const String16& permission, uid_t uid, bool granted); 70 static bool checkCallingPermission(const String16& permission); 72 static bool checkCallingPermission(const String16& permission, 75 static bool checkPermission(const String16& permission,
|
/frameworks/native/libs/binder/include/binder/ |
H A D | PermissionCache.h | 33 * PermissionCache caches permission checks for a given uid. 35 * Currently the cache is not updated when there is a permission change, 53 // we pool all the permission names we see, as many permissions checks 59 // free the whole cache, but keep the permission name pool 63 const String16& permission, uid_t uid) const; 65 void cache(const String16& permission, uid_t uid, bool granted); 70 static bool checkCallingPermission(const String16& permission); 72 static bool checkCallingPermission(const String16& permission, 75 static bool checkPermission(const String16& permission,
|
/frameworks/base/core/java/android/security/keystore/recovery/ |
H A D | RecoveryController.java | 47 * <p>A system app with the {@code android.permission.RECOVER_KEYSTORE} permission may generate or 284 @RequiresPermission(android.Manifest.permission.RECOVER_KEYSTORE) 297 @RequiresPermission(android.Manifest.permission.RECOVER_KEYSTORE) 308 @RequiresPermission(android.Manifest.permission.RECOVER_KEYSTORE) 342 @RequiresPermission(android.Manifest.permission.RECOVER_KEYSTORE) 370 @RequiresPermission(android.Manifest.permission.RECOVER_KEYSTORE) 383 @RequiresPermission(android.Manifest.permission.RECOVER_KEYSTORE) 408 @RequiresPermission(android.Manifest.permission.RECOVER_KEYSTORE) 430 @RequiresPermission(android.Manifest.permission [all...] |
/frameworks/base/core/java/android/hardware/location/ |
H A D | GeofenceHardwareService.java | 80 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 81 "Location Hardware permission not granted to access hardware geofence"); 88 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 89 "Location Hardware permission not granted to access hardware geofence"); 99 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 100 "Location Hardware permission not granted to access hardware geofence"); 107 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 108 "Location Hardware permission not granted to access hardware geofence"); 116 mContext.enforceCallingPermission(Manifest.permission.LOCATION_HARDWARE, 117 "Location Hardware permission no [all...] |
/frameworks/rs/tests/java_api/CannyLive/src/com/android/example/cannylive/ |
H A D | MainActivity.java | 84 String []permission = {
85 Manifest.permission.CAMERA,
86 Manifest.permission.RECORD_AUDIO,
87 Manifest.permission.WRITE_EXTERNAL_STORAGE,
88 Manifest.permission.READ_EXTERNAL_STORAGE
91 boolean []permissionDenied = new boolean[permission.length];
92 for (int i = 0; i < permission.length; i++) {
93 String per = permission[i];
95 permission[i] );
108 permission[ [all...] |
/frameworks/base/core/java/android/net/ |
H A D | NetworkScoreManager.java | 19 import android.Manifest.permission; 41 * <li>Is granted the {@link permission#SCORE_NETWORKS} permission. 42 * <li>Is granted the {@link permission#ACCESS_COARSE_LOCATION} permission. 44 * protected by the {@link permission#BIND_NETWORK_RECOMMENDATION_SERVICE} 45 * permission. 229 * @throws SecurityException if the caller doesn't hold either {@link permission#SCORE_NETWORKS} 230 * or {@link permission#REQUEST_NETWORK_SCORES} permissions. 232 @RequiresPermission(anyOf = {android.Manifest.permission [all...] |
/frameworks/base/core/java/android/service/oemlock/ |
H A D | OemLockManager.java | 62 @RequiresPermission(android.Manifest.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE) 77 @RequiresPermission(android.Manifest.permission.MANAGE_CARRIER_OEM_UNLOCK_STATE) 96 @RequiresPermission(android.Manifest.permission.MANAGE_USER_OEM_UNLOCK_STATE) 111 @RequiresPermission(android.Manifest.permission.MANAGE_USER_OEM_UNLOCK_STATE)
|