HomeSort by relevance Sort by last modified time
    Searched refs:permission (Results 1 - 25 of 1710) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /frameworks/base/core/java/android/content/pm/permission/
RuntimePermissionPresentationInfo.aidl 17 package android.content.pm.permission;
IRuntimePermissionPresenter.aidl 17 package android.content.pm.permission;
22 * Interface for communication with the permission presenter service.
  /packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/utils/
EventLogger.java 17 package com.android.packageinstaller.permission.utils;
33 * For each permission there are four events. The events are in the order of
34 * #ALL_DANGEROUS_PERMISSIONS. The four events per permission are (in that order): "requested",
40 /** All dangerous permission names in the same order as the events in MetricsEvent */
42 Manifest.permission.READ_CALENDAR,
43 Manifest.permission.WRITE_CALENDAR,
44 Manifest.permission.CAMERA,
45 Manifest.permission.READ_CONTACTS,
46 Manifest.permission.WRITE_CONTACTS,
47 Manifest.permission.GET_ACCOUNTS
    [all...]
SafetyNetLogger.java 17 package com.android.packageinstaller.permission.utils;
22 import com.android.packageinstaller.permission.model.AppPermissionGroup;
23 import com.android.packageinstaller.permission.model.Permission;
67 Permission permission = group.getPermissions().get(permissionNum); local
73 builder.append(permission.getName()).append('|');
76 builder.append(permission.isGranted()).append('|');
78 builder.append(permission.isGranted() && (permission.getAppOp() == nul
    [all...]
  /frameworks/base/core/java/android/os/
IPermissionController.aidl 22 boolean checkPermission(String permission, int pid, int uid);
24 boolean isRuntimePermission(String permission);
  /frameworks/native/services/nativeperms/android/os/
IPermissionController.aidl 22 boolean checkPermission(String permission, int pid, int uid);
24 boolean isRuntimePermission(String permission);
  /packages/apps/Contacts/src/com/android/contacts/activities/
RequestImportVCardPermissionsActivity.java 19 import android.Manifest.permission;
29 permission.GET_ACCOUNTS,
30 permission.READ_CONTACTS,
31 permission.WRITE_CONTACTS,
33 permission.READ_EXTERNAL_STORAGE,
  /packages/apps/Dialer/java/com/android/voicemail/
VoicemailPermissionHelper.java 19 import android.Manifest.permission;
27 * Handles permission checking for the voicemail module. Currently "phone" and "sms" permissions are
34 permission.ADD_VOICEMAIL,
35 permission.WRITE_VOICEMAIL,
36 permission.READ_VOICEMAIL,
37 permission.READ_PHONE_STATE,
38 permission.SEND_SMS
49 /** Returns a list of permission that is missing for the voicemail module to operate. */
53 for (String permission : VOICEMAIL_PERMISSIONS) {
54 if (context.checkSelfPermission(permission) != PackageManager.PERMISSION_GRANTED)
    [all...]
  /packages/apps/Dialer/java/com/android/dialer/util/
PermissionsUtil.java 19 import android.Manifest.permission;
36 return hasPermission(context, permission.CALL_PHONE);
40 return hasPermission(context, permission.READ_CONTACTS);
44 return hasPermission(context, permission.ACCESS_FINE_LOCATION);
48 return hasPermission(context, permission.CAMERA);
52 return hasPermission(context, permission.RECORD_AUDIO);
56 return hasPermission(context, permission.READ_CALL_LOG);
60 return hasPermission(context, permission.WRITE_CALL_LOG);
68 return hasPermission(context, permission.READ_VOICEMAIL);
72 return hasPermission(context, permission.WRITE_VOICEMAIL)
    [all...]
  /libcore/ojluni/src/main/java/java/security/
PermissionCollection.java 36 public abstract void add(Permission permission);
38 public abstract boolean implies(Permission permission);
40 public abstract Enumeration<Permission> elements();
Permissions.java 39 public void add(Permission permission) { }
41 public boolean implies(Permission permission) { return true; }
43 public Enumeration<Permission> elements() { return null; }
  /packages/providers/ContactsProvider/src/com/android/providers/contacts/
VoicemailPermissions.java 38 return callerHasPermission(android.Manifest.permission.ADD_VOICEMAIL);
46 return callerHasPermission(android.Manifest.permission.READ_VOICEMAIL);
49 /** Determine if the calling process has the permission required to update and remove all
55 return callerHasPermission(android.Manifest.permission.WRITE_VOICEMAIL);
61 * @throws SecurityException if the caller does not have the voicemail source permission.
65 throw new SecurityException("The caller must have permission: " +
66 android.Manifest.permission.ADD_VOICEMAIL);
73 * @throws SecurityException if the caller does not have the voicemail source permission.
78 + "dialer, or have the system-only %s permission: ",
79 android.Manifest.permission.READ_VOICEMAIL))
    [all...]
  /libcore/ojluni/src/main/java/java/security/acl/
AclEntry.java 83 * principal (e.g., a user or a group) will be denied the permission set
102 * Adds the specified permission to this ACL entry. Note: An entry can
105 * @param permission the permission to be associated with
108 * @return true if the permission was added, false if the
109 * permission was already part of this entry's permission set.
111 public boolean addPermission(Permission permission);
114 * Removes the specified permission from this ACL entry
    [all...]
  /cts/hostsidetests/appsecurity/test-apps/UsePermissionApp23/src/com/android/cts/usepermission/
UsePermissionTest23.java 35 * Runtime permission behavior tests for apps targeting API 23
63 // New permission model is denied by default
75 grantPermission(Manifest.permission.READ_EXTERNAL_STORAGE);
77 .checkSelfPermission(Manifest.permission.READ_EXTERNAL_STORAGE));
79 .checkSelfPermission(Manifest.permission.WRITE_EXTERNAL_STORAGE));
90 // Start out without permission
92 .checkSelfPermission(Manifest.permission.READ_EXTERNAL_STORAGE));
94 .checkSelfPermission(Manifest.permission.WRITE_EXTERNAL_STORAGE));
102 Manifest.permission.READ_EXTERNAL_STORAGE,
103 Manifest.permission.WRITE_EXTERNAL_STORAGE}
    [all...]
  /packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/model/
AppPermissionGroup.java 17 package com.android.packageinstaller.permission.model;
33 import com.android.packageinstaller.permission.utils.ArrayUtils;
34 import com.android.packageinstaller.permission.utils.LocationUtils;
42 private static final String KILL_REASON_APP_OP_CHANGE = "Permission related app op changed";
55 private final ArrayMap<String, Permission> mPermissions = new ArrayMap<>();
145 // Don't allow toggling non-platform permission groups for legacy apps via app ops.
165 Permission permission = new Permission(requestedPermission, granted, local
167 group.addPermission(permission);
230 Permission permission = mPermissions.valueAt(i); local
241 Permission permission = mPermissions.valueAt(i); local
255 Permission permission = mPermissions.valueAt(i); local
309 Permission permission = mPermissions.valueAt(i); local
531 Permission permission = mPermissions.valueAt(i); local
549 Permission permission = mPermissions.valueAt(i); local
558 Permission permission = mPermissions.valueAt(i); local
569 Permission permission = mPermissions.valueAt(i); local
580 Permission permission = mPermissions.valueAt(i); local
591 Permission permission = mPermissions.valueAt(i); local
656 mPermissions.put(permission.getName(), permission); local
    [all...]
  /frameworks/native/libs/binder/
PermissionCache.cpp 38 const String16& permission, uid_t uid) const {
41 e.name = permission;
51 void PermissionCache::cache(const String16& permission,
55 ssize_t index = mPermissionNamesPool.indexOf(permission);
59 mPermissionNamesPool.add(permission);
60 e.name = permission;
63 // permission checks
77 bool PermissionCache::checkCallingPermission(const String16& permission) {
78 return PermissionCache::checkCallingPermission(permission, NULL, NULL);
82 const String16& permission, int32_t* outPid, int32_t* outUid)
    [all...]
  /system/netd/include/
Permission.h 21 // the permission the app (UID) has been granted. When applied to a network, it's the permission an
22 // app must hold to be allowed to use the network. PERMISSION_NONE means "no special permission is
23 // held by the app" or "no special permission is required to use the network".
28 // android.permission.INTERNET framework permission.
31 // such as those that hold the android.permission.CHANGE_NETWORK_STATE framework permission.
34 // partition, those that hold the android.permission.CONNECTIVITY_INTERNAL framework permission an
    [all...]
  /frameworks/base/services/core/java/com/android/server/firewall/
SenderPermissionFilter.java 31 private SenderPermissionFilter(String permission) {
32 mPermission = permission;
45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") {
49 String permission = parser.getAttributeValue(null, ATTR_NAME);
50 if (permission == null) {
51 throw new XmlPullParserException("Permission name must be specified.",
54 return new SenderPermissionFilter(permission);
  /frameworks/native/libs/binder/include/binder/
PermissionCache.h 31 * PermissionCache caches permission checks for a given uid.
33 * Currently the cache is not updated when there is a permission change,
51 // we pool all the permission names we see, as many permissions checks
57 // free the whole cache, but keep the permission name pool
61 const String16& permission, uid_t uid) const;
63 void cache(const String16& permission, uid_t uid, bool granted);
68 static bool checkCallingPermission(const String16& permission);
70 static bool checkCallingPermission(const String16& permission,
73 static bool checkPermission(const String16& permission,
  /packages/apps/Contacts/src/com/android/contacts/util/
PermissionsUtil.java 19 import android.Manifest.permission;
34 // Each permission in this list is a cherry-picked permission from a particular permission
35 // group. Granting a permission group enables access to all permissions in that group so we
36 // only need to check a single permission in each group.
39 public static final String PHONE = permission.CALL_PHONE;
40 public static final String CONTACTS = permission.READ_CONTACTS;
41 public static final String LOCATION = permission.ACCESS_FINE_LOCATION;
55 public static boolean hasPermission(Context context, String permission) {
    [all...]
  /packages/apps/Messaging/src/com/android/messaging/util/
OsUtil.java 188 * Check if the app has the specified permission. If it does not, the app needs to use
191 * any permission is revoked.
192 * @param permission A permission from {@link android.Manifest.permission}
194 public static boolean hasPermission(final String permission) {
197 // user revokes the permission setting. However, PERMISSION_DENIED should not be
198 // cached as the process does not get killed if the user enables the permission setting.
199 if (!sPermissions.containsKey(permission)
200 || sPermissions.get(permission) == PackageManager.PERMISSION_DENIED)
    [all...]
  /system/netd/server/
PhysicalNetwork.cpp 31 Permission permission, PhysicalNetwork::Delegate* delegate) {
32 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) {
36 if (int ret = delegate->addFallthrough(interface, permission)) {
43 Permission permission,
46 permission)) {
50 if (int ret = delegate->removeFallthrough(interface, permission)) {
68 Permission PhysicalNetwork::getPermission() const {
72 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission)
    [all...]
  /cts/hostsidetests/appsecurity/test-apps/UsePermissionApp22/src/com/android/cts/usepermission/
UsePermissionTest22.java 40 * Runtime permission behavior tests for apps targeting API 22
50 // Legacy permission model is granted by default
52 context.checkPermission(android.Manifest.permission.READ_EXTERNAL_STORAGE,
55 context.checkPermission(android.Manifest.permission.WRITE_EXTERNAL_STORAGE,
69 // Revoke the permission
70 revokePermissions(new String[]{android.Manifest.permission.READ_EXTERNAL_STORAGE}, true);
78 // Legacy permission model appears granted, but storage looks and
81 context.checkPermission(android.Manifest.permission.READ_EXTERNAL_STORAGE,
84 context.checkPermission(android.Manifest.permission.WRITE_EXTERNAL_STORAGE,
104 .checkSelfPermission(Manifest.permission.SEND_SMS))
    [all...]
  /cts/hostsidetests/appsecurity/test-apps/UsePermissionApp24/src/com/android/cts/usepermission/
UsePermissionTest24.java 26 * Runtime permission behavior tests for apps targeting API 24
33 // Start out without permission
35 .checkSelfPermission(Manifest.permission.RECEIVE_SMS));
37 .checkSelfPermission(Manifest.permission.SEND_SMS));
39 String[] firstPermissions = new String[] {Manifest.permission.RECEIVE_SMS};
41 // Request only one permission and confirm
54 // Expect the permission is granted
58 // We should not have the other permission in the group
60 .checkSelfPermission(Manifest.permission.SEND_SMS));
62 String[] secondPermissions = new String[] {Manifest.permission.SEND_SMS}
    [all...]
  /frameworks/opt/chips/src/com/android/ex/chips/
ChipsUtil.java 29 * Listener that gets notified when we check whether we have permission.
32 void onPermissionCheck(String permission, boolean granted);
39 new String[] { Manifest.permission.READ_CONTACTS };
51 * <p>This is interesting for us because new permission model is introduced in M and we need to
59 * Returns {@link PackageManager#PERMISSION_GRANTED} if given permission is granted, or
62 public static int checkPermission(Context context, String permission) {
64 // TODO: Use "context.checkSelfPermission(permission)" once it's safe to move to M sdk
65 return context.checkPermission(permission, Process.myPid(), Process.myUid());
67 // Assume that we have permission before M.
80 for (String permission : REQUIRED_PERMISSIONS)
    [all...]

Completed in 870 milliseconds

1 2 3 4 5 6 7 8 91011>>