HomeSort by relevance Sort by last modified time
    Searched refs:permission (Results 1 - 25 of 1852) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /frameworks/base/core/java/android/content/pm/permission/
RuntimePermissionPresentationInfo.aidl 17 package android.content.pm.permission;
  /packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/utils/
EventLogger.java 17 package com.android.packageinstaller.permission.utils;
33 * For each permission there are four events. The events are in the order of
34 * #ALL_DANGEROUS_PERMISSIONS. The four events per permission are (in that order): "requested",
40 /** All dangerous permission names in the same order as the events in MetricsEvent */
42 Manifest.permission.READ_CALENDAR,
43 Manifest.permission.WRITE_CALENDAR,
44 Manifest.permission.CAMERA,
45 Manifest.permission.READ_CONTACTS,
46 Manifest.permission.WRITE_CONTACTS,
47 Manifest.permission.GET_ACCOUNTS
    [all...]
SafetyNetLogger.java 17 package com.android.packageinstaller.permission.utils;
22 import com.android.packageinstaller.permission.model.AppPermissionGroup;
23 import com.android.packageinstaller.permission.model.Permission;
67 Permission permission = group.getPermissions().get(permissionNum); local
73 builder.append(permission.getName()).append('|');
76 builder.append(permission.isGranted()).append('|');
78 builder.append(permission.isGranted() && (permission.getAppOp() == nul
    [all...]
  /frameworks/base/core/java/android/os/
IPermissionController.aidl 22 boolean checkPermission(String permission, int pid, int uid);
24 boolean isRuntimePermission(String permission);
  /frameworks/native/services/nativeperms/android/os/
IPermissionController.aidl 22 boolean checkPermission(String permission, int pid, int uid);
24 boolean isRuntimePermission(String permission);
  /packages/apps/Contacts/src/com/android/contacts/activities/
RequestImportVCardPermissionsActivity.java 19 import android.Manifest.permission;
29 permission.GET_ACCOUNTS,
30 permission.READ_CONTACTS,
31 permission.WRITE_CONTACTS,
33 permission.READ_EXTERNAL_STORAGE,
  /cts/tests/tests/permission/src/android/permission/cts/
ServicePermissionTest.java 17 package android.permission.cts;
29 * permission is only ever granted to the core system (typically
38 android.Manifest.permission.ACCOUNT_MANAGER,
39 android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE,
40 android.Manifest.permission.BIND_AUTOFILL_SERVICE,
41 android.Manifest.permission.BIND_CHOOSER_TARGET_SERVICE,
42 android.Manifest.permission.BIND_CONDITION_PROVIDER_SERVICE,
43 // android.Manifest.permission.BIND_DEVICE_ADMIN,
44 android.Manifest.permission.BIND_DREAM_SERVICE,
45 android.Manifest.permission.BIND_INPUT_METHOD
    [all...]
  /packages/apps/Dialer/java/com/android/voicemail/
VoicemailPermissionHelper.java 19 import android.Manifest.permission;
27 * Handles permission checking for the voicemail module. Currently "phone" and "sms" permissions are
34 permission.ADD_VOICEMAIL,
35 permission.WRITE_VOICEMAIL,
36 permission.READ_VOICEMAIL,
37 permission.READ_PHONE_STATE,
38 permission.SEND_SMS
49 /** Returns a list of permission that is missing for the voicemail module to operate. */
53 for (String permission : VOICEMAIL_PERMISSIONS) {
54 if (context.checkSelfPermission(permission) != PackageManager.PERMISSION_GRANTED)
    [all...]
  /libcore/ojluni/src/main/java/java/security/
PermissionCollection.java 38 public abstract void add(Permission permission);
40 public abstract boolean implies(Permission permission);
42 public abstract Enumeration<Permission> elements();
Permissions.java 41 public void add(Permission permission) { }
43 public boolean implies(Permission permission) { return true; }
45 public Enumeration<Permission> elements() { return null; }
  /developers/build/prebuilts/gradle/RuntimePermissions/kotlinApp/app/src/main/java/com/example/android/system/runtimepermissions/extensions/
AppCompatActivityExts.kt 22 fun AppCompatActivity.isPermissionGranted(permission: String) =
23 ActivityCompat.checkSelfPermission(this, permission) == PackageManager.PERMISSION_GRANTED
25 fun AppCompatActivity.shouldShowPermissionRationale(permission: String) =
26 ActivityCompat.shouldShowRequestPermissionRationale(this, permission)
28 fun AppCompatActivity.requestPermission(permission: String, requestId: Int) =
29 ActivityCompat.requestPermissions(this, arrayOf(permission), requestId)
  /developers/samples/android/system/RuntimePermissions/kotlinApp/app/src/main/java/com/example/android/system/runtimepermissions/extensions/
AppCompatActivityExts.kt 22 fun AppCompatActivity.isPermissionGranted(permission: String) =
23 ActivityCompat.checkSelfPermission(this, permission) == PackageManager.PERMISSION_GRANTED
25 fun AppCompatActivity.shouldShowPermissionRationale(permission: String) =
26 ActivityCompat.shouldShowRequestPermissionRationale(this, permission)
28 fun AppCompatActivity.requestPermission(permission: String, requestId: Int) =
29 ActivityCompat.requestPermissions(this, arrayOf(permission), requestId)
  /packages/providers/ContactsProvider/src/com/android/providers/contacts/
VoicemailPermissions.java 38 return callerHasPermission(android.Manifest.permission.ADD_VOICEMAIL);
46 return callerHasPermission(android.Manifest.permission.READ_VOICEMAIL);
49 /** Determine if the calling process has the permission required to update and remove all
55 return callerHasPermission(android.Manifest.permission.WRITE_VOICEMAIL);
61 * @throws SecurityException if the caller does not have the voicemail source permission.
65 throw new SecurityException("The caller must have permission: " +
66 android.Manifest.permission.ADD_VOICEMAIL);
73 * @throws SecurityException if the caller does not have the voicemail source permission.
78 + "dialer, or have the system-only %s permission: ",
79 android.Manifest.permission.READ_VOICEMAIL))
    [all...]
  /packages/apps/Dialer/java/com/android/dialer/util/
PermissionsUtil.java 19 import static android.Manifest.permission.ACCESS_COARSE_LOCATION;
20 import static android.Manifest.permission.ACCESS_FINE_LOCATION;
21 import static android.Manifest.permission.ADD_VOICEMAIL;
22 import static android.Manifest.permission.CALL_PHONE;
23 import static android.Manifest.permission.MODIFY_PHONE_STATE;
24 import static android.Manifest.permission.READ_CALL_LOG;
25 import static android.Manifest.permission.READ_CONTACTS;
26 import static android.Manifest.permission.READ_PHONE_STATE;
27 import static android.Manifest.permission.READ_VOICEMAIL;
28 import static android.Manifest.permission.WRITE_CALL_LOG
    [all...]
  /libcore/ojluni/src/main/java/java/security/acl/
AclEntry.java 83 * principal (e.g., a user or a group) will be denied the permission set
102 * Adds the specified permission to this ACL entry. Note: An entry can
105 * @param permission the permission to be associated with
108 * @return true if the permission was added, false if the
109 * permission was already part of this entry's permission set.
111 public boolean addPermission(Permission permission);
114 * Removes the specified permission from this ACL entry
    [all...]
  /packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/model/
AppPermissionGroup.java 17 package com.android.packageinstaller.permission.model;
33 import com.android.packageinstaller.permission.utils.ArrayUtils;
34 import com.android.packageinstaller.permission.utils.LocationUtils;
42 private static final String KILL_REASON_APP_OP_CHANGE = "Permission related app op changed";
55 private final ArrayMap<String, Permission> mPermissions = new ArrayMap<>();
145 // Don't allow toggling non-platform permission groups for legacy apps via app ops.
165 Permission permission = new Permission(requestedPermission, granted, local
167 group.addPermission(permission);
230 Permission permission = mPermissions.valueAt(i); local
241 Permission permission = mPermissions.valueAt(i); local
255 Permission permission = mPermissions.valueAt(i); local
309 Permission permission = mPermissions.valueAt(i); local
538 Permission permission = mPermissions.valueAt(i); local
556 Permission permission = mPermissions.valueAt(i); local
565 Permission permission = mPermissions.valueAt(i); local
576 Permission permission = mPermissions.valueAt(i); local
587 Permission permission = mPermissions.valueAt(i); local
598 Permission permission = mPermissions.valueAt(i); local
663 mPermissions.put(permission.getName(), permission); local
    [all...]
  /cts/hostsidetests/appsecurity/test-apps/UsePermissionApp23/src/com/android/cts/usepermission/
UsePermissionTest23.java 35 * Runtime permission behavior tests for apps targeting API 23
63 // New permission model is denied by default
75 grantPermission(Manifest.permission.READ_EXTERNAL_STORAGE);
77 .checkSelfPermission(Manifest.permission.READ_EXTERNAL_STORAGE));
79 .checkSelfPermission(Manifest.permission.WRITE_EXTERNAL_STORAGE));
90 // Start out without permission
92 .checkSelfPermission(Manifest.permission.READ_EXTERNAL_STORAGE));
94 .checkSelfPermission(Manifest.permission.WRITE_EXTERNAL_STORAGE));
102 Manifest.permission.READ_EXTERNAL_STORAGE,
103 Manifest.permission.WRITE_EXTERNAL_STORAGE}
    [all...]
  /frameworks/native/libs/binder/
PermissionCache.cpp 38 const String16& permission, uid_t uid) const {
41 e.name = permission;
51 void PermissionCache::cache(const String16& permission,
55 ssize_t index = mPermissionNamesPool.indexOf(permission);
59 mPermissionNamesPool.add(permission);
60 e.name = permission;
63 // permission checks
77 bool PermissionCache::checkCallingPermission(const String16& permission) {
78 return PermissionCache::checkCallingPermission(permission, NULL, NULL);
82 const String16& permission, int32_t* outPid, int32_t* outUid)
    [all...]
  /system/netd/include/
Permission.h 21 // the permission the app (UID) has been granted. When applied to a network, it's the permission an
22 // app must hold to be allowed to use the network. PERMISSION_NONE means "no special permission is
23 // held by the app" or "no special permission is required to use the network".
28 // android.permission.INTERNET framework permission.
31 // such as those that hold the android.permission.CHANGE_NETWORK_STATE framework permission.
34 // partition, those that hold the android.permission.CONNECTIVITY_INTERNAL framework permission an
    [all...]
  /frameworks/base/services/core/java/com/android/server/firewall/
SenderPermissionFilter.java 31 private SenderPermissionFilter(String permission) {
32 mPermission = permission;
45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") {
49 String permission = parser.getAttributeValue(null, ATTR_NAME);
50 if (permission == null) {
51 throw new XmlPullParserException("Permission name must be specified.",
54 return new SenderPermissionFilter(permission);
  /frameworks/native/libs/binder/include/binder/
PermissionCache.h 31 * PermissionCache caches permission checks for a given uid.
33 * Currently the cache is not updated when there is a permission change,
51 // we pool all the permission names we see, as many permissions checks
57 // free the whole cache, but keep the permission name pool
61 const String16& permission, uid_t uid) const;
63 void cache(const String16& permission, uid_t uid, bool granted);
68 static bool checkCallingPermission(const String16& permission);
70 static bool checkCallingPermission(const String16& permission,
73 static bool checkPermission(const String16& permission,
  /packages/apps/Contacts/src/com/android/contacts/util/
PermissionsUtil.java 19 import android.Manifest.permission;
34 // Each permission in this list is a cherry-picked permission from a particular permission
35 // group. Granting a permission group enables access to all permissions in that group so we
36 // only need to check a single permission in each group.
39 public static final String PHONE = permission.CALL_PHONE;
40 public static final String CONTACTS = permission.READ_CONTACTS;
41 public static final String LOCATION = permission.ACCESS_FINE_LOCATION;
55 public static boolean hasPermission(Context context, String permission) {
    [all...]
  /packages/apps/Messaging/src/com/android/messaging/util/
OsUtil.java 188 * Check if the app has the specified permission. If it does not, the app needs to use
191 * any permission is revoked.
192 * @param permission A permission from {@link android.Manifest.permission}
194 public static boolean hasPermission(final String permission) {
197 // user revokes the permission setting. However, PERMISSION_DENIED should not be
198 // cached as the process does not get killed if the user enables the permission setting.
199 if (!sPermissions.containsKey(permission)
200 || sPermissions.get(permission) == PackageManager.PERMISSION_DENIED)
    [all...]
  /system/netd/server/
PhysicalNetwork.cpp 31 Permission permission, PhysicalNetwork::Delegate* delegate) {
32 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) {
36 if (int ret = delegate->addFallthrough(interface, permission)) {
43 Permission permission,
46 permission)) {
50 if (int ret = delegate->removeFallthrough(interface, permission)) {
68 Permission PhysicalNetwork::getPermission() const {
72 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission)
    [all...]
  /frameworks/base/tools/aapt2/java/
ManifestClassGenerator_test.cpp 33 <permission android:name="android.permission.ACCESS_INTERNET" />
34 <permission android:name="android.DO_DANGEROUS_THINGS" />
35 <permission android:name="com.test.sample.permission.HUH" />
36 <permission-group android:name="foo.bar.PERMISSION" />
42 ASSERT_THAT(actual, HasSubstr("public static final class permission {"));
45 const size_t permission_start_pos = actual.find("public static final class permission {");
50 // Make sure these permissions are in the permission class
    [all...]

Completed in 1145 milliseconds

1 2 3 4 5 6 7 8 91011>>