/frameworks/base/core/java/android/content/pm/permission/ |
RuntimePermissionPresentationInfo.aidl | 17 package android.content.pm.permission;
|
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/utils/ |
EventLogger.java | 17 package com.android.packageinstaller.permission.utils; 33 * For each permission there are four events. The events are in the order of 34 * #ALL_DANGEROUS_PERMISSIONS. The four events per permission are (in that order): "requested", 40 /** All dangerous permission names in the same order as the events in MetricsEvent */ 42 Manifest.permission.READ_CALENDAR, 43 Manifest.permission.WRITE_CALENDAR, 44 Manifest.permission.CAMERA, 45 Manifest.permission.READ_CONTACTS, 46 Manifest.permission.WRITE_CONTACTS, 47 Manifest.permission.GET_ACCOUNTS [all...] |
SafetyNetLogger.java | 17 package com.android.packageinstaller.permission.utils; 22 import com.android.packageinstaller.permission.model.AppPermissionGroup; 23 import com.android.packageinstaller.permission.model.Permission; 67 Permission permission = group.getPermissions().get(permissionNum); local 73 builder.append(permission.getName()).append('|'); 76 builder.append(permission.isGranted()).append('|'); 78 builder.append(permission.isGranted() && (permission.getAppOp() == nul [all...] |
/frameworks/base/core/java/android/os/ |
IPermissionController.aidl | 22 boolean checkPermission(String permission, int pid, int uid); 24 boolean isRuntimePermission(String permission);
|
/frameworks/native/services/nativeperms/android/os/ |
IPermissionController.aidl | 22 boolean checkPermission(String permission, int pid, int uid); 24 boolean isRuntimePermission(String permission);
|
/packages/apps/Contacts/src/com/android/contacts/activities/ |
RequestImportVCardPermissionsActivity.java | 19 import android.Manifest.permission; 29 permission.GET_ACCOUNTS, 30 permission.READ_CONTACTS, 31 permission.WRITE_CONTACTS, 33 permission.READ_EXTERNAL_STORAGE,
|
/cts/tests/tests/permission/src/android/permission/cts/ |
ServicePermissionTest.java | 17 package android.permission.cts; 29 * permission is only ever granted to the core system (typically 38 android.Manifest.permission.ACCOUNT_MANAGER, 39 android.Manifest.permission.BIND_ACCESSIBILITY_SERVICE, 40 android.Manifest.permission.BIND_AUTOFILL_SERVICE, 41 android.Manifest.permission.BIND_CHOOSER_TARGET_SERVICE, 42 android.Manifest.permission.BIND_CONDITION_PROVIDER_SERVICE, 43 // android.Manifest.permission.BIND_DEVICE_ADMIN, 44 android.Manifest.permission.BIND_DREAM_SERVICE, 45 android.Manifest.permission.BIND_INPUT_METHOD [all...] |
/packages/apps/Dialer/java/com/android/voicemail/ |
VoicemailPermissionHelper.java | 19 import android.Manifest.permission; 27 * Handles permission checking for the voicemail module. Currently "phone" and "sms" permissions are 34 permission.ADD_VOICEMAIL, 35 permission.WRITE_VOICEMAIL, 36 permission.READ_VOICEMAIL, 37 permission.READ_PHONE_STATE, 38 permission.SEND_SMS 49 /** Returns a list of permission that is missing for the voicemail module to operate. */ 53 for (String permission : VOICEMAIL_PERMISSIONS) { 54 if (context.checkSelfPermission(permission) != PackageManager.PERMISSION_GRANTED) [all...] |
/libcore/ojluni/src/main/java/java/security/ |
PermissionCollection.java | 38 public abstract void add(Permission permission); 40 public abstract boolean implies(Permission permission); 42 public abstract Enumeration<Permission> elements();
|
Permissions.java | 41 public void add(Permission permission) { } 43 public boolean implies(Permission permission) { return true; } 45 public Enumeration<Permission> elements() { return null; }
|
/developers/build/prebuilts/gradle/RuntimePermissions/kotlinApp/app/src/main/java/com/example/android/system/runtimepermissions/extensions/ |
AppCompatActivityExts.kt | 22 fun AppCompatActivity.isPermissionGranted(permission: String) = 23 ActivityCompat.checkSelfPermission(this, permission) == PackageManager.PERMISSION_GRANTED 25 fun AppCompatActivity.shouldShowPermissionRationale(permission: String) = 26 ActivityCompat.shouldShowRequestPermissionRationale(this, permission) 28 fun AppCompatActivity.requestPermission(permission: String, requestId: Int) = 29 ActivityCompat.requestPermissions(this, arrayOf(permission), requestId)
|
/developers/samples/android/system/RuntimePermissions/kotlinApp/app/src/main/java/com/example/android/system/runtimepermissions/extensions/ |
AppCompatActivityExts.kt | 22 fun AppCompatActivity.isPermissionGranted(permission: String) = 23 ActivityCompat.checkSelfPermission(this, permission) == PackageManager.PERMISSION_GRANTED 25 fun AppCompatActivity.shouldShowPermissionRationale(permission: String) = 26 ActivityCompat.shouldShowRequestPermissionRationale(this, permission) 28 fun AppCompatActivity.requestPermission(permission: String, requestId: Int) = 29 ActivityCompat.requestPermissions(this, arrayOf(permission), requestId)
|
/packages/providers/ContactsProvider/src/com/android/providers/contacts/ |
VoicemailPermissions.java | 38 return callerHasPermission(android.Manifest.permission.ADD_VOICEMAIL); 46 return callerHasPermission(android.Manifest.permission.READ_VOICEMAIL); 49 /** Determine if the calling process has the permission required to update and remove all 55 return callerHasPermission(android.Manifest.permission.WRITE_VOICEMAIL); 61 * @throws SecurityException if the caller does not have the voicemail source permission. 65 throw new SecurityException("The caller must have permission: " + 66 android.Manifest.permission.ADD_VOICEMAIL); 73 * @throws SecurityException if the caller does not have the voicemail source permission. 78 + "dialer, or have the system-only %s permission: ", 79 android.Manifest.permission.READ_VOICEMAIL)) [all...] |
/packages/apps/Dialer/java/com/android/dialer/util/ |
PermissionsUtil.java | 19 import static android.Manifest.permission.ACCESS_COARSE_LOCATION; 20 import static android.Manifest.permission.ACCESS_FINE_LOCATION; 21 import static android.Manifest.permission.ADD_VOICEMAIL; 22 import static android.Manifest.permission.CALL_PHONE; 23 import static android.Manifest.permission.MODIFY_PHONE_STATE; 24 import static android.Manifest.permission.READ_CALL_LOG; 25 import static android.Manifest.permission.READ_CONTACTS; 26 import static android.Manifest.permission.READ_PHONE_STATE; 27 import static android.Manifest.permission.READ_VOICEMAIL; 28 import static android.Manifest.permission.WRITE_CALL_LOG [all...] |
/libcore/ojluni/src/main/java/java/security/acl/ |
AclEntry.java | 83 * principal (e.g., a user or a group) will be denied the permission set 102 * Adds the specified permission to this ACL entry. Note: An entry can 105 * @param permission the permission to be associated with 108 * @return true if the permission was added, false if the 109 * permission was already part of this entry's permission set. 111 public boolean addPermission(Permission permission); 114 * Removes the specified permission from this ACL entry [all...] |
/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/model/ |
AppPermissionGroup.java | 17 package com.android.packageinstaller.permission.model; 33 import com.android.packageinstaller.permission.utils.ArrayUtils; 34 import com.android.packageinstaller.permission.utils.LocationUtils; 42 private static final String KILL_REASON_APP_OP_CHANGE = "Permission related app op changed"; 55 private final ArrayMap<String, Permission> mPermissions = new ArrayMap<>(); 145 // Don't allow toggling non-platform permission groups for legacy apps via app ops. 165 Permission permission = new Permission(requestedPermission, granted, local 167 group.addPermission(permission); 230 Permission permission = mPermissions.valueAt(i); local 241 Permission permission = mPermissions.valueAt(i); local 255 Permission permission = mPermissions.valueAt(i); local 309 Permission permission = mPermissions.valueAt(i); local 538 Permission permission = mPermissions.valueAt(i); local 556 Permission permission = mPermissions.valueAt(i); local 565 Permission permission = mPermissions.valueAt(i); local 576 Permission permission = mPermissions.valueAt(i); local 587 Permission permission = mPermissions.valueAt(i); local 598 Permission permission = mPermissions.valueAt(i); local 663 mPermissions.put(permission.getName(), permission); local [all...] |
/cts/hostsidetests/appsecurity/test-apps/UsePermissionApp23/src/com/android/cts/usepermission/ |
UsePermissionTest23.java | 35 * Runtime permission behavior tests for apps targeting API 23 63 // New permission model is denied by default 75 grantPermission(Manifest.permission.READ_EXTERNAL_STORAGE); 77 .checkSelfPermission(Manifest.permission.READ_EXTERNAL_STORAGE)); 79 .checkSelfPermission(Manifest.permission.WRITE_EXTERNAL_STORAGE)); 90 // Start out without permission 92 .checkSelfPermission(Manifest.permission.READ_EXTERNAL_STORAGE)); 94 .checkSelfPermission(Manifest.permission.WRITE_EXTERNAL_STORAGE)); 102 Manifest.permission.READ_EXTERNAL_STORAGE, 103 Manifest.permission.WRITE_EXTERNAL_STORAGE} [all...] |
/frameworks/native/libs/binder/ |
PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { 41 e.name = permission; 51 void PermissionCache::cache(const String16& permission, 55 ssize_t index = mPermissionNamesPool.indexOf(permission); 59 mPermissionNamesPool.add(permission); 60 e.name = permission; 63 // permission checks 77 bool PermissionCache::checkCallingPermission(const String16& permission) { 78 return PermissionCache::checkCallingPermission(permission, NULL, NULL); 82 const String16& permission, int32_t* outPid, int32_t* outUid) [all...] |
/system/netd/include/ |
Permission.h | 21 // the permission the app (UID) has been granted. When applied to a network, it's the permission an 22 // app must hold to be allowed to use the network. PERMISSION_NONE means "no special permission is 23 // held by the app" or "no special permission is required to use the network". 28 // android.permission.INTERNET framework permission. 31 // such as those that hold the android.permission.CHANGE_NETWORK_STATE framework permission. 34 // partition, those that hold the android.permission.CONNECTIVITY_INTERNAL framework permission an [all...] |
/frameworks/base/services/core/java/com/android/server/firewall/ |
SenderPermissionFilter.java | 31 private SenderPermissionFilter(String permission) { 32 mPermission = permission; 45 public static final FilterFactory FACTORY = new FilterFactory("sender-permission") { 49 String permission = parser.getAttributeValue(null, ATTR_NAME); 50 if (permission == null) { 51 throw new XmlPullParserException("Permission name must be specified.", 54 return new SenderPermissionFilter(permission);
|
/frameworks/native/libs/binder/include/binder/ |
PermissionCache.h | 31 * PermissionCache caches permission checks for a given uid. 33 * Currently the cache is not updated when there is a permission change, 51 // we pool all the permission names we see, as many permissions checks 57 // free the whole cache, but keep the permission name pool 61 const String16& permission, uid_t uid) const; 63 void cache(const String16& permission, uid_t uid, bool granted); 68 static bool checkCallingPermission(const String16& permission); 70 static bool checkCallingPermission(const String16& permission, 73 static bool checkPermission(const String16& permission,
|
/packages/apps/Contacts/src/com/android/contacts/util/ |
PermissionsUtil.java | 19 import android.Manifest.permission; 34 // Each permission in this list is a cherry-picked permission from a particular permission 35 // group. Granting a permission group enables access to all permissions in that group so we 36 // only need to check a single permission in each group. 39 public static final String PHONE = permission.CALL_PHONE; 40 public static final String CONTACTS = permission.READ_CONTACTS; 41 public static final String LOCATION = permission.ACCESS_FINE_LOCATION; 55 public static boolean hasPermission(Context context, String permission) { [all...] |
/packages/apps/Messaging/src/com/android/messaging/util/ |
OsUtil.java | 188 * Check if the app has the specified permission. If it does not, the app needs to use 191 * any permission is revoked. 192 * @param permission A permission from {@link android.Manifest.permission} 194 public static boolean hasPermission(final String permission) { 197 // user revokes the permission setting. However, PERMISSION_DENIED should not be 198 // cached as the process does not get killed if the user enables the permission setting. 199 if (!sPermissions.containsKey(permission) 200 || sPermissions.get(permission) == PackageManager.PERMISSION_DENIED) [all...] |
/system/netd/server/ |
PhysicalNetwork.cpp | 31 Permission permission, PhysicalNetwork::Delegate* delegate) { 32 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) { 36 if (int ret = delegate->addFallthrough(interface, permission)) { 43 Permission permission, 46 permission)) { 50 if (int ret = delegate->removeFallthrough(interface, permission)) { 68 Permission PhysicalNetwork::getPermission() const { 72 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission) [all...] |
/frameworks/base/tools/aapt2/java/ |
ManifestClassGenerator_test.cpp | 33 <permission android:name="android.permission.ACCESS_INTERNET" /> 34 <permission android:name="android.DO_DANGEROUS_THINGS" /> 35 <permission android:name="com.test.sample.permission.HUH" /> 36 <permission-group android:name="foo.bar.PERMISSION" /> 42 ASSERT_THAT(actual, HasSubstr("public static final class permission {")); 45 const size_t permission_start_pos = actual.find("public static final class permission {"); 50 // Make sure these permissions are in the permission class [all...] |