Home | History | Annotate | Download | only in pm

Lines Matching defs:Package

17 package android.content.pm;
86 * Parser for package files (APKs) on disk. This supports apps packaged either
95 * <li>All APKs must have the exact same package name, version code, and signing
199 final Package owner;
210 ParsePackageItemArgs(Package _owner, String[] _outError,
229 ParseComponentArgs(Package _owner, String[] _outError,
242 * Lightweight parsed details about a single package.
254 * Path where this package was found on disk. For monolithic packages
327 /** If set to true, we will only allow package files that exactly match
328 * the DTD. Otherwise, we try to get as much from the package as we
366 public static PackageInfo generatePackageInfo(PackageParser.Package p,
376 * Generate and return the {@link PackageInfo} for a parsed package.
378 * @param p the parsed package.
381 public static PackageInfo generatePackageInfo(PackageParser.Package p,
390 * Returns true if the package is installed and not hidden, or if the caller
402 public static PackageInfo generatePackageInfo(PackageParser.Package p,
628 * Parse only lightweight details about the package at the given location.
629 * Automatically detects if the package is a monolithic style (single APK
633 * requiring identical package name and version codes, a single base APK,
670 // Assert that all package names and version codes are
678 "Inconsistent package " + lite.packageName + " in " + file
725 * Parse the package at the given location. Automatically detects if the
726 * package is a monolithic style (single APK file) or cluster style
730 * requiring identical package name and version codes, a single base APK,
734 * must be done separately in {@link #collectCertificates(Package, int)}.
738 public Package parsePackage(File packageFile, int flags) throws PackageParserException {
748 * single package. This also performs sanity checking, such as requiring
749 * identical package name and version codes, a single base APK, and unique
753 * must be done separately in {@link #collectCertificates(Package, int)}.
755 private Package parseClusterPackage(File packageDir, int flags) throws PackageParserException {
776 final Package pkg = parseBaseApk(baseApk, assets, flags);
801 * Parse the given APK file, treating it as as a single monolithic package.
804 * must be done separately in {@link #collectCertificates(Package, int)}.
811 public Package parseMonolithicPackage(File apkFile, int flags) throws PackageParserException {
822 final Package pkg = parseBaseApk(apkFile, assets, flags);
834 "Invalid package file: " + apkPath);
848 private Package parseBaseApk(File apkFile, AssetManager assets, int flags)
868 final Package pkg = parseBaseApk(res, parser, flags, outError);
889 private void parseSplitApk(Package pkg, int splitIndex, AssetManager assets, int flags)
933 private Package parseSplitApk(Package pkg, Resources res, XmlResourceParser parser, int flags,
1001 * APK. If it successfully scanned the package and found the
1004 public void collectManifestDigest(Package pkg) throws PackageParserException {
1025 * Collect certificates from all the APKs described in the given package,
1026 * populating {@link Package#mSignatures}. This also asserts that all APK
1029 public void collectCertificates(Package pkg, int flags) throws PackageParserException {
1043 private static void collectCertificates(Package pkg, File apkFile, int flags)
1055 "Package " + apkPath + " has no manifest");
1061 // If we're parsing an untrusted package, verify all contents
1082 "Package " + apkPath + " has no certificates at entry "
1097 INSTALL_PARSE_FAILED_INCONSISTENT_CERTIFICATES, "Package " + apkPath
1125 * file, including package name, split name, and install location.
1156 // TODO: factor signature related items out of Package object
1157 final Package tempPkg = new Package(null);
1220 final String packageName = attrs.getAttributeValue(null, "package");
1225 "Invalid manifest package: " + error);
1286 if (parser.getDepth() == searchDepth && "package-verifier".equals(parser.getName())) {
1326 private Package parseBaseApk(Resources res, XmlResourceParser parser, int flags,
1356 final Package pkg = new Package(pkgName);
1448 outError[0] = "<overlay> does not specify a target package";
1708 } else if (tagName.equals("original-package")) {
1889 private boolean parseUsesPermission(Package pkg, Resources res, XmlResourceParser parser,
1939 outError[0] = "Empty class name in package " + pkg;
1956 outError[0] = "Bad class name " + cls + " in package " + pkg;
1966 outError[0] = "Bad " + type + " name " + proc + " in package " + pkg
1973 outError[0] = "Invalid " + type + " name " + proc + " in package "
1981 outError[0] = "Invalid " + type + " name " + proc + " in package "
2019 private boolean parseKeySets(Package owner, Resources res,
2079 + " will not be added to the package's defined key-sets.");
2124 Slog.w(TAG, "Package" + owner.packageName + " AndroidManifext.xml "
2132 Slog.w(TAG, "Package" + owner.packageName + " AndroidManifext.xml "
2134 + " Not including in package's defined key-sets.");
2137 Slog.w(TAG, "Package" + owner.packageName + " AndroidManifext.xml "
2139 + " tags. Not including in package's defined key-sets.");
2150 Slog.w(TAG, "Package" + owner.packageName + " AndroidManifext.xml "
2157 private PermissionGroup parsePermissionGroup(Package owner, int flags, Resources res,
2201 private Permission parsePermission(Package owner, Resources res,
2271 private Permission parsePermissionTree(Package owner, Resources res,
2319 private Instrumentation parseInstrumentation(Package owner, Resources res,
2386 private boolean parseBaseApplication(Package owner, Resources res,
2729 } else if (tagName.equals("uses-package")) {
2760 private boolean parseSplitApplication(Package owner, Resources res, XmlPullParser parser,
2868 } else if (tagName.equals("uses-package")) {
2891 private boolean parsePackageItemInfo(Package owner, PackageItemInfo outInfo,
2932 private Activity parseActivity(Package owner, Resources res,
3207 Slog.w(TAG, "Problem in package " + mArchiveSourcePath + ":");
3237 private Activity parseActivityAlias(Package owner, Resources res,
3403 private Provider parseProvider(Package owner, Resources res,
3710 private Service parseService(Package owner, Resources res,
3944 Slog.i(TAG, "verifier package name was null; skipping");
4166 * Representation of a full package parsed from APK files on disk. A package
4169 public final static class Package {
4178 * Path where this package was found on disk. For monolithic packages
4194 // For now we only support one application per package.
4224 // The version code declared for this package.
4227 // The version name declared for this package.
4230 // The shared user id that this package wants to use.
4233 // The shared user label that this package wants to use.
4236 // Signatures that were read from the package.
4240 // For use by package manager service for quick lookup of
4244 // For use by package manager to keep track of where it needs to do dexopt.
4247 // For use by package manager to keep track of when a package was last used.
4253 // // Whether the package has been stopped.
4259 // Whether an operation is currently pending on this package
4285 * Digest suitable for comparing whether this package's manifest is the
4302 * The install time abi override for this package, if any.
4306 * the rest of the PackageManager where package scanning randomly pushes
4311 public Package(String packageName) {
4401 return "Package{"
4408 public final Package owner;
4416 public Component(Package _owner) {
4533 public Permission(Package _owner) {
4538 public Permission(Package _owner, PermissionInfo _info) {
4558 public PermissionGroup(Package _owner) {
4563 public PermissionGroup(Package _owner, PermissionGroupInfo _info) {
4580 private static boolean copyNeeded(int flags, Package p,
4610 public static ApplicationInfo generateApplicationInfo(Package p, int flags,
4642 public static ApplicationInfo generateApplicationInfo(Package p, int flags,