/frameworks/base/core/java/android/content/pm/permission/ |
RuntimePermissionPresentationInfo.aidl | 17 package android.content.pm.permission;
|
IRuntimePermissionPresenter.aidl | 17 package android.content.pm.permission; 22 * Interface for communication with the permission presenter service.
|
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/utils/ |
EventLogger.java | 17 package com.android.packageinstaller.permission.utils; 33 * For each permission there are four events. The events are in the order of 34 * #ALL_DANGEROUS_PERMISSIONS. The four events per permission are (in that order): "requested", 40 /** All dangerous permission names in the same order as the events in MetricsEvent */ 42 Manifest.permission.READ_CALENDAR, 43 Manifest.permission.WRITE_CALENDAR, 44 Manifest.permission.CAMERA, 45 Manifest.permission.READ_CONTACTS, 46 Manifest.permission.WRITE_CONTACTS, 47 Manifest.permission.GET_ACCOUNTS [all...] |
SafetyNetLogger.java | 17 package com.android.packageinstaller.permission.utils; 22 import com.android.packageinstaller.permission.model.AppPermissionGroup; 23 import com.android.packageinstaller.permission.model.Permission; 67 Permission permission = group.getPermissions().get(permissionNum); local 73 builder.append(permission.getName()).append('|'); 76 builder.append(permission.isGranted()).append('|'); 78 builder.append(permission.isGranted() && (permission.getAppOp() == nul [all...] |
/frameworks/base/core/java/android/os/ |
IPermissionController.aidl | 22 boolean checkPermission(String permission, int pid, int uid); 24 boolean isRuntimePermission(String permission);
|
/frameworks/native/services/nativeperms/android/os/ |
IPermissionController.aidl | 22 boolean checkPermission(String permission, int pid, int uid); 24 boolean isRuntimePermission(String permission);
|
/packages/apps/Contacts/src/com/android/contacts/activities/ |
RequestImportVCardPermissionsActivity.java | 19 import android.Manifest.permission; 29 permission.GET_ACCOUNTS, 30 permission.READ_CONTACTS, 31 permission.WRITE_CONTACTS, 33 permission.READ_EXTERNAL_STORAGE,
|
/packages/apps/Dialer/java/com/android/voicemail/ |
VoicemailPermissionHelper.java | 19 import android.Manifest.permission; 27 * Handles permission checking for the voicemail module. Currently "phone" and "sms" permissions are 34 permission.ADD_VOICEMAIL, 35 permission.WRITE_VOICEMAIL, 36 permission.READ_VOICEMAIL, 37 permission.READ_PHONE_STATE, 38 permission.SEND_SMS 49 /** Returns a list of permission that is missing for the voicemail module to operate. */ 53 for (String permission : VOICEMAIL_PERMISSIONS) { 54 if (context.checkSelfPermission(permission) != PackageManager.PERMISSION_GRANTED) [all...] |
/packages/apps/Dialer/java/com/android/dialer/util/ |
PermissionsUtil.java | 19 import android.Manifest.permission; 36 return hasPermission(context, permission.CALL_PHONE); 40 return hasPermission(context, permission.READ_CONTACTS); 44 return hasPermission(context, permission.ACCESS_FINE_LOCATION); 48 return hasPermission(context, permission.CAMERA); 52 return hasPermission(context, permission.RECORD_AUDIO); 56 return hasPermission(context, permission.READ_CALL_LOG); 60 return hasPermission(context, permission.WRITE_CALL_LOG); 68 return hasPermission(context, permission.READ_VOICEMAIL); 72 return hasPermission(context, permission.WRITE_VOICEMAIL) [all...] |
/libcore/ojluni/src/main/java/java/security/ |
PermissionCollection.java | 36 public abstract void add(Permission permission); 38 public abstract boolean implies(Permission permission); 40 public abstract Enumeration<Permission> elements();
|
Permissions.java | 39 public void add(Permission permission) { } 41 public boolean implies(Permission permission) { return true; } 43 public Enumeration<Permission> elements() { return null; }
|
/packages/providers/ContactsProvider/src/com/android/providers/contacts/ |
VoicemailPermissions.java | 38 return callerHasPermission(android.Manifest.permission.ADD_VOICEMAIL); 46 return callerHasPermission(android.Manifest.permission.READ_VOICEMAIL); 49 /** Determine if the calling process has the permission required to update and remove all 55 return callerHasPermission(android.Manifest.permission.WRITE_VOICEMAIL); 61 * @throws SecurityException if the caller does not have the voicemail source permission. 65 throw new SecurityException("The caller must have permission: " + 66 android.Manifest.permission.ADD_VOICEMAIL); 73 * @throws SecurityException if the caller does not have the voicemail source permission. 78 + "dialer, or have the system-only %s permission: ", 79 android.Manifest.permission.READ_VOICEMAIL)) [all...] |
/libcore/ojluni/src/main/java/java/security/acl/ |
AclEntry.java | 83 * principal (e.g., a user or a group) will be denied the permission set 102 * Adds the specified permission to this ACL entry. Note: An entry can 105 * @param permission the permission to be associated with 108 * @return true if the permission was added, false if the 109 * permission was already part of this entry's permission set. 111 public boolean addPermission(Permission permission); 114 * Removes the specified permission from this ACL entry [all...] |
/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp23/src/com/android/cts/usepermission/ |
UsePermissionTest23.java | 35 * Runtime permission behavior tests for apps targeting API 23 63 // New permission model is denied by default 75 grantPermission(Manifest.permission.READ_EXTERNAL_STORAGE); 77 .checkSelfPermission(Manifest.permission.READ_EXTERNAL_STORAGE)); 79 .checkSelfPermission(Manifest.permission.WRITE_EXTERNAL_STORAGE)); 90 // Start out without permission 92 .checkSelfPermission(Manifest.permission.READ_EXTERNAL_STORAGE)); 94 .checkSelfPermission(Manifest.permission.WRITE_EXTERNAL_STORAGE)); 102 Manifest.permission.READ_EXTERNAL_STORAGE, 103 Manifest.permission.WRITE_EXTERNAL_STORAGE} [all...] |
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/model/ |
AppPermissionGroup.java | 17 package com.android.packageinstaller.permission.model; 33 import com.android.packageinstaller.permission.utils.ArrayUtils; 34 import com.android.packageinstaller.permission.utils.LocationUtils; 42 private static final String KILL_REASON_APP_OP_CHANGE = "Permission related app op changed"; 55 private final ArrayMap<String, Permission> mPermissions = new ArrayMap<>(); 145 // Don't allow toggling non-platform permission groups for legacy apps via app ops. 165 Permission permission = new Permission(requestedPermission, granted, local 167 group.addPermission(permission); 230 Permission permission = mPermissions.valueAt(i); local 241 Permission permission = mPermissions.valueAt(i); local 255 Permission permission = mPermissions.valueAt(i); local 309 Permission permission = mPermissions.valueAt(i); local 531 Permission permission = mPermissions.valueAt(i); local 549 Permission permission = mPermissions.valueAt(i); local 558 Permission permission = mPermissions.valueAt(i); local 569 Permission permission = mPermissions.valueAt(i); local 580 Permission permission = mPermissions.valueAt(i); local 591 Permission permission = mPermissions.valueAt(i); local 656 mPermissions.put(permission.getName(), permission); local [all...] |
/frameworks/native/libs/binder/ |
PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_t* outPid, int32_t* outUid) [all...] |
/system/netd/include/ |
Permission.h | 21 // the permission the app (UID) has been granted. When applied to a network, it's the permission an 22 // app must hold to be allowed to use the network. PERMISSION_NONE means "no special permission is 23 // held by the app" or "no special permission is required to use the network". 28 // android.permission.INTERNET framework permission. 31 // such as those that hold the android.permission.CHANGE_NETWORK_STATE framework permission. 34 // partition, those that hold the android.permission.CONNECTIVITY_INTERNAL framework permission an [all...] |
/frameworks/base/services/core/java/com/android/server/firewall/ |
SenderPermissionFilter.java | 31 private SenderPermissionFilter(String permission) { 32 mPermission = permission; 45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") { 49 String permission = parser.getAttributeValue(null, ATTR_NAME); 50 if (permission == null) { 51 throw new XmlPullParserException("Permission name must be specified.", 54 return new SenderPermissionFilter(permission);
|
/frameworks/native/libs/binder/include/binder/ |
PermissionCache.h | 31 * PermissionCache caches permission checks for a given uid. 33 * Currently the cache is not updated when there is a permission change, 51 // we pool all the permission names we see, as many permissions checks 57 // free the whole cache, but keep the permission name pool 61 const String16& permission, uid_t uid) const; 63 void cache(const String16& permission, uid_t uid, bool granted); 68 static bool checkCallingPermission(const String16& permission); 70 static bool checkCallingPermission(const String16& permission, 73 static bool checkPermission(const String16& permission,
|
/packages/apps/Contacts/src/com/android/contacts/util/ |
PermissionsUtil.java | 19 import android.Manifest.permission; 34 // Each permission in this list is a cherry-picked permission from a particular permission 35 // group. Granting a permission group enables access to all permissions in that group so we 36 // only need to check a single permission in each group. 39 public static final String PHONE = permission.CALL_PHONE; 40 public static final String CONTACTS = permission.READ_CONTACTS; 41 public static final String LOCATION = permission.ACCESS_FINE_LOCATION; 55 public static boolean hasPermission(Context context, String permission) { [all...] |
/packages/apps/Messaging/src/com/android/messaging/util/ |
OsUtil.java | 188 * Check if the app has the specified permission. If it does not, the app needs to use 191 * any permission is revoked. 192 * @param permission A permission from {@link android.Manifest.permission} 194 public static boolean hasPermission(final String permission) { 197 // user revokes the permission setting. However, PERMISSION_DENIED should not be 198 // cached as the process does not get killed if the user enables the permission setting. 199 if (!sPermissions.containsKey(permission) 200 || sPermissions.get(permission) == PackageManager.PERMISSION_DENIED) [all...] |
/system/netd/server/ |
PhysicalNetwork.cpp | 31 Permission permission, PhysicalNetwork::Delegate* delegate) { 32 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) { 36 if (int ret = delegate->addFallthrough(interface, permission)) { 43 Permission permission, 46 permission)) { 50 if (int ret = delegate->removeFallthrough(interface, permission)) { 68 Permission PhysicalNetwork::getPermission() const { 72 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission) [all...] |
/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp22/src/com/android/cts/usepermission/ |
UsePermissionTest22.java | 40 * Runtime permission behavior tests for apps targeting API 22 50 // Legacy permission model is granted by default 52 context.checkPermission(android.Manifest.permission.READ_EXTERNAL_STORAGE, 55 context.checkPermission(android.Manifest.permission.WRITE_EXTERNAL_STORAGE, 69 // Revoke the permission 70 revokePermissions(new String[]{android.Manifest.permission.READ_EXTERNAL_STORAGE}, true); 78 // Legacy permission model appears granted, but storage looks and 81 context.checkPermission(android.Manifest.permission.READ_EXTERNAL_STORAGE, 84 context.checkPermission(android.Manifest.permission.WRITE_EXTERNAL_STORAGE, 104 .checkSelfPermission(Manifest.permission.SEND_SMS)) [all...] |
/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp24/src/com/android/cts/usepermission/ |
UsePermissionTest24.java | 26 * Runtime permission behavior tests for apps targeting API 24 33 // Start out without permission 35 .checkSelfPermission(Manifest.permission.RECEIVE_SMS)); 37 .checkSelfPermission(Manifest.permission.SEND_SMS)); 39 String[] firstPermissions = new String[] {Manifest.permission.RECEIVE_SMS}; 41 // Request only one permission and confirm 54 // Expect the permission is granted 58 // We should not have the other permission in the group 60 .checkSelfPermission(Manifest.permission.SEND_SMS)); 62 String[] secondPermissions = new String[] {Manifest.permission.SEND_SMS} [all...] |
/frameworks/opt/chips/src/com/android/ex/chips/ |
ChipsUtil.java | 29 * Listener that gets notified when we check whether we have permission. 32 void onPermissionCheck(String permission, boolean granted); 39 new String[] { Manifest.permission.READ_CONTACTS }; 51 * <p>This is interesting for us because new permission model is introduced in M and we need to 59 * Returns {@link PackageManager#PERMISSION_GRANTED} if given permission is granted, or 62 public static int checkPermission(Context context, String permission) { 64 // TODO: Use "context.checkSelfPermission(permission)" once it's safe to move to M sdk 65 return context.checkPermission(permission, Process.myPid(), Process.myUid()); 67 // Assume that we have permission before M. 80 for (String permission : REQUIRED_PERMISSIONS) [all...] |