/frameworks/base/core/java/android/content/pm/ |
D | ServiceInfo.java | 42 public String permission; field in ServiceInfo 169 value = Manifest.permission.FOREGROUND_SERVICE_DATA_SYNC, 184 value = Manifest.permission.FOREGROUND_SERVICE_MEDIA_PLAYBACK, 203 Manifest.permission.FOREGROUND_SERVICE_PHONE_CALL, 206 Manifest.permission.MANAGE_OWN_CALLS, 226 Manifest.permission.FOREGROUND_SERVICE_LOCATION, 229 Manifest.permission.ACCESS_COARSE_LOCATION, 230 Manifest.permission.ACCESS_FINE_LOCATION, 258 Manifest.permission.FOREGROUND_SERVICE_CONNECTED_DEVICE, 261 Manifest.permission.BLUETOOTH_ADVERTISE, [all …]
|
/frameworks/base/services/permission/java/com/android/server/permission/access/permission/ |
D | AppIdPermissionUpgrade.kt | 17 package com.android.server.permission.access.permission in <lambda>() 22 import com.android.server.permission.access.MutateStateScope in <lambda>() 23 import com.android.server.permission.access.immutable.* // ktlint-disable no-wildcard-imports in <lambda>() 24 import com.android.server.permission.access.util.andInv in <lambda>() 25 import com.android.server.permission.access.util.hasAnyBit in <lambda>() 26 import com.android.server.permission.access.util.hasBits in <lambda>() 106 Manifest.permission.ACCESS_BACKGROUND_LOCATION in in <lambda>() 112 getPermissionFlags(appId, userId, Manifest.permission.ACCESS_FINE_LOCATION) in <lambda>() 116 getPermissionFlags(appId, userId, Manifest.permission.ACCESS_COARSE_LOCATION) in <lambda>() 125 Manifest.permission.ACCESS_BACKGROUND_LOCATION in <lambda>() [all …]
|
D | AppIdPermissionPersistence.kt | 17 package com.android.server.permission.access.permission in <lambda>() 23 import com.android.server.permission.access.AccessState in <lambda>() 24 import com.android.server.permission.access.AppIdPermissionFlags in <lambda>() 25 import com.android.server.permission.access.MutableAccessState in <lambda>() 26 import com.android.server.permission.access.MutableAppIdPermissionFlags in <lambda>() 27 import com.android.server.permission.access.WriteMode in <lambda>() 28 import com.android.server.permission.access.collection.* // ktlint-disable no-wildcard-imports in <lambda>() 29 import com.android.server.permission.access.immutable.* // ktlint-disable no-wildcard-imports in <lambda>() 30 import com.android.server.permission.access.util.andInv in <lambda>() 31 import com.android.server.permission.access.util.attribute in <lambda>() [all …]
|
D | AppIdPermissionMigration.kt | 17 package com.android.server.permission.access.permission in <lambda>() 21 import com.android.server.permission.access.MutableAccessState in <lambda>() 22 import com.android.server.permission.access.immutable.* // ktlint-disable no-wildcard-imports in <lambda>() 23 import com.android.server.permission.access.util.PackageVersionMigration in <lambda>() 24 import com.android.server.pm.permission.PermissionMigrationHelper in <lambda>() 52 val permission = in <lambda>() constant 54 permissions[permission.name] = permission in <lambda>() 90 val permission = state.systemState.permissions[permissionName] in <lambda>() constant 91 if (permission == null) { in <lambda>() 100 migratePermissionFlags(permission, legacyPermissionState, appId, userId) in <lambda>() [all …]
|
D | DevicePermissionPersistence.kt | 17 package com.android.server.permission.access.permission in <lambda>() 22 import com.android.server.permission.access.AccessState in <lambda>() 23 import com.android.server.permission.access.DevicePermissionFlags in <lambda>() 24 import com.android.server.permission.access.MutableAccessState in <lambda>() 25 import com.android.server.permission.access.MutableAppIdDevicePermissionFlags in <lambda>() 26 import com.android.server.permission.access.MutableDevicePermissionFlags in <lambda>() 27 import com.android.server.permission.access.WriteMode in <lambda>() 28 import com.android.server.permission.access.immutable.IndexedMap in <lambda>() 29 import com.android.server.permission.access.immutable.MutableIndexedMap in <lambda>() 30 import com.android.server.permission.access.immutable.forEachIndexed in <lambda>() [all …]
|
D | AppIdPermissionPolicy.kt | 17 package com.android.server.permission.access.permission in <lambda>() 25 import android.permission.flags.Flags in <lambda>() 28 import com.android.internal.pm.permission.CompatibilityPermissionInfo in <lambda>() 31 import com.android.server.permission.access.AccessState in <lambda>() 32 import com.android.server.permission.access.GetStateScope in <lambda>() 33 import com.android.server.permission.access.MutableAccessState in <lambda>() 34 import com.android.server.permission.access.MutateStateScope in <lambda>() 35 import com.android.server.permission.access.PermissionUri in <lambda>() 36 import com.android.server.permission.access.SchemePolicy in <lambda>() 37 import com.android.server.permission.access.UidUri in <lambda>() [all …]
|
/frameworks/base/core/java/android/os/ |
D | PermissionEnforcer.java | 26 import android.permission.PermissionCheckerManager; 27 import android.permission.PermissionManager; 96 protected int checkPermission(@NonNull String permission, @NonNull AttributionSource source) { in checkPermission() argument 98 mContext, permission, PermissionChecker.PID_UNKNOWN, source, "" /* message */); in checkPermission() 103 protected int checkPermission(@NonNull String permission, int pid, int uid) { in checkPermission() argument 104 if (mContext.checkPermission(permission, pid, uid) == PackageManager.PERMISSION_GRANTED) { in checkPermission() 112 private static int permissionToOpCode(String permission) { in permissionToOpCode() argument 113 return AppOpsManager.permissionToOpCode(permission); in permissionToOpCode() 116 private static int permissionToOpCode$ravenwood(String permission) { in permissionToOpCode$ravenwood() argument 121 for (String permission : permissions) { in anyAppOps() [all …]
|
D | UserManager.java | 2142 @RequiresPermission(Manifest.permission.MANAGE_USERS) 2664 @RequiresPermission(anyOf = {android.Manifest.permission.MANAGE_USERS, 2665 android.Manifest.permission.INTERACT_ACROSS_USERS}) 2688 @RequiresPermission(anyOf = {android.Manifest.permission.MANAGE_USERS, 2689 android.Manifest.permission.INTERACT_ACROSS_USERS}) 2706 @RequiresPermission(anyOf = {android.Manifest.permission.MANAGE_USERS, 2707 android.Manifest.permission.INTERACT_ACROSS_USERS}) 2755 android.Manifest.permission.MANAGE_USERS, 2756 android.Manifest.permission.CREATE_USERS, 2757 android.Manifest.permission.QUERY_USERS}) [all …]
|
D | BatteryStatsManager.java | 175 @RequiresPermission(android.Manifest.permission.BATTERY_STATS) 187 @RequiresPermission(android.Manifest.permission.BATTERY_STATS) 199 @RequiresPermission(android.Manifest.permission.BATTERY_STATS) 214 @RequiresPermission(android.Manifest.permission.UPDATE_DEVICE_STATS) 226 @RequiresPermission(android.Manifest.permission.UPDATE_DEVICE_STATS) 238 @RequiresPermission(android.Manifest.permission.UPDATE_DEVICE_STATS) 253 @RequiresPermission(android.Manifest.permission.UPDATE_DEVICE_STATS) 268 @RequiresPermission(android.Manifest.permission.UPDATE_DEVICE_STATS) 282 @RequiresPermission(android.Manifest.permission.UPDATE_DEVICE_STATS) 297 @RequiresPermission(android.Manifest.permission.UPDATE_DEVICE_STATS) [all …]
|
/frameworks/base/tools/aapt2/java/ |
D | ManifestClassGenerator_test.cpp | 36 <permission android:name="android.permission.ACCESS_INTERNET" /> 37 <permission android:name="android.DO_DANGEROUS_THINGS" /> 38 <permission android:name="com.test.sample.permission.HUH" /> 39 <permission-group android:name="foo.bar.PERMISSION" /> 46 ASSERT_THAT(actual, HasSubstr("public static final class permission {")); 49 const size_t permission_start_pos = actual.find("public static final class permission {"); 84 <permission android:name="android.permission.ACCESS_INTERNET" /> 85 <!-- @deprecated This permission is for playing outside. --> 86 <permission android:name="android.permission.PLAY_OUTSIDE" /> 87 <!-- This is a private permission for system only! [all …]
|
/frameworks/base/core/java/android/hardware/radio/ |
D | RadioTuner.java | 59 @RequiresPermission(Manifest.permission.ACCESS_BROADCAST_RADIO) 82 @RequiresPermission(Manifest.permission.ACCESS_BROADCAST_RADIO) 104 @RequiresPermission(Manifest.permission.ACCESS_BROADCAST_RADIO) 129 @RequiresPermission(Manifest.permission.ACCESS_BROADCAST_RADIO) 139 @RequiresPermission(Manifest.permission.ACCESS_BROADCAST_RADIO) 166 @RequiresPermission(Manifest.permission.ACCESS_BROADCAST_RADIO) 196 @RequiresPermission(Manifest.permission.ACCESS_BROADCAST_RADIO) 224 @RequiresPermission(Manifest.permission.ACCESS_BROADCAST_RADIO) 256 @RequiresPermission(Manifest.permission.ACCESS_BROADCAST_RADIO) 272 @RequiresPermission(Manifest.permission.ACCESS_BROADCAST_RADIO) [all …]
|
/frameworks/base/tests/utils/testutils/java/android/os/test/ |
D | FakePermissionEnforcer.java | 19 import static android.permission.PermissionManager.PERMISSION_GRANTED; 20 import static android.permission.PermissionManager.PERMISSION_HARD_DENIED; 42 public void grant(String permission) { in grant() argument 43 mGranted.add(permission); in grant() 46 public void revoke(String permission) { in revoke() argument 47 mGranted.remove(permission); in revoke() 54 private boolean granted(String permission) { in granted() argument 55 return mGranted.contains(permission); in granted() 59 protected int checkPermission(@NonNull String permission, in checkPermission() argument 61 return granted(permission) ? PERMISSION_GRANTED : PERMISSION_HARD_DENIED; in checkPermission() [all …]
|
/frameworks/base/core/java/com/android/internal/pm/pkg/component/ |
D | ParsedPermissionUtils.java | 55 ParsedPermissionImpl permission = new ParsedPermissionImpl(); in parsePermission() local 61 permission, tag, pkg, sa, useRoundIcon, input, in parsePermission() 81 permission.setBackgroundPermission(sa.getNonResourceString( in parsePermission() 91 permission.setGroup(sa.getNonResourceString( in parsePermission() 111 permission.setKnownCerts(knownCerts); in parsePermission() 116 permission.setKnownCert(knownCert); in parsePermission() 119 if (permission.getKnownCerts().isEmpty()) { in parsePermission() 129 permission.setKnownCert(knownCert); in parsePermission() 134 if (!isRuntime(permission) || !"android".equals(permission.getPackageName())) { in parsePermission() 135 permission.setFlags(permission.getFlags() & ~PermissionInfo.FLAG_HARD_RESTRICTED); in parsePermission() [all …]
|
/frameworks/base/tools/aapt2/link/ |
D | FeatureFlagsFilter_test.cpp | 49 <permission android:name="FOO" /> 55 auto maybe_removed = root->FindChild({}, "permission"); 61 <permission android:name="FOO" android:featureFlag="flag" /> 67 auto maybe_removed = root->FindChild({}, "permission"); 74 <permission android:name="FOO" android:featureFlag="!flag" /> 80 auto maybe_removed = root->FindChild({}, "permission"); 87 <permission android:name="FOO" android:featureFlag="flag" /> 93 auto maybe_removed = root->FindChild({}, "permission"); 100 <permission android:name="FOO" android:featureFlag="!flag" 102 <permission android:name="FOO" android:featureFlag="flag" [all …]
|
/frameworks/base/core/java/android/content/ |
D | PermissionChecker.java | 24 import android.permission.IPermissionChecker; 25 import android.permission.PermissionCheckerManager; 26 import android.permission.PermissionCheckerManager.PermissionResult; 151 @NonNull String permission, int pid, int uid, @Nullable String packageName, in checkPermissionForDataDelivery() argument 153 return checkPermissionForDataDelivery(context, permission, pid, new AttributionSource(uid, in checkPermissionForDataDelivery() 194 @NonNull String permission, int pid, int uid, @Nullable String packageName, in checkPermissionForDataDelivery() argument 196 return checkPermissionForDataDelivery(context, permission, pid, uid, in checkPermissionForDataDelivery() 232 @NonNull String permission, int pid, @NonNull AttributionSource attributionSource, in checkPermissionForDataDeliveryFromDataSource() argument 234 return checkPermissionForDataDeliveryCommon(context, permission, attributionSource, in checkPermissionForDataDeliveryFromDataSource() 269 @NonNull String permission, int pid, @NonNull AttributionSource attributionSource, in checkPermissionForDataDelivery() argument [all …]
|
/frameworks/base/packages/SettingsLib/tests/robotests/testutils/com/android/settingslib/testutils/shadow/ |
D | ShadowPermissionChecker.java | 36 public static void setResult(String packageName, String permission, int result) { in setResult() argument 40 RESULTS.get(packageName).put(permission, result); in setResult() 46 String permission, in checkCallingPermissionForDataDelivery() argument 50 return RESULTS.containsKey(packageName) && RESULTS.get(packageName).containsKey(permission) in checkCallingPermissionForDataDelivery() 51 ? RESULTS.get(packageName).get(permission) in checkCallingPermissionForDataDelivery() 53 context, permission, packageName, attributionTag, message); in checkCallingPermissionForDataDelivery() 59 String permission, in checkPermissionForDataDelivery() argument 65 return RESULTS.containsKey(packageName) && RESULTS.get(packageName).containsKey(permission) in checkPermissionForDataDelivery() 66 ? RESULTS.get(packageName).get(permission) in checkPermissionForDataDelivery() 68 context, permission, pid, uid, packageName, attributionTag, message); in checkPermissionForDataDelivery() [all …]
|
/frameworks/native/libs/binder/ |
D | PermissionCache.cpp | 38 const String16& permission, uid_t uid) const { in check() argument 41 e.name = permission; in check() 51 void PermissionCache::cache(const String16& permission, in cache() argument 55 ssize_t index = mPermissionNamesPool.indexOf(permission); in cache() 59 mPermissionNamesPool.add(permission); in cache() 60 e.name = permission; in cache() 77 bool PermissionCache::checkCallingPermission(const String16& permission) { in checkCallingPermission() argument 78 return PermissionCache::checkCallingPermission(permission, nullptr, nullptr); in checkCallingPermission() 82 const String16& permission, int32_t* outPid, int32_t* outUid) { in checkCallingPermission() argument 88 return PermissionCache::checkPermission(permission, pid, uid); in checkCallingPermission() [all …]
|
/frameworks/base/services/core/java/com/android/server/pm/permission/ |
D | TEST_MAPPING | 10 "include-filter": "android.permission.cts.BackgroundPermissionsTest" 13 "include-filter": "android.permission.cts.SplitPermissionTest" 16 "include-filter": "android.permission.cts.PermissionFlagsTest" 19 "include-filter": "android.permission.cts.SharedUidPermissionsTest" 41 "include-filter": "android.permission.cts.PermissionMaxSdkVersionTest" 67 "include-filter": "android.permission.cts.PermissionUpdateListenerTest" 70 "include-filter": "android.permission.cts.BackgroundPermissionsTest" 73 "include-filter": "android.permission.cts.SplitPermissionTest" 76 "include-filter": "android.permission.cts.PermissionFlagsTest" 79 "include-filter": "android.permission.cts.SharedUidPermissionsTest" [all …]
|
/frameworks/base/tools/aapt2/integration-tests/DumpTest/ |
D | multiple_uses_sdk_expected.txt | 10 uses-permission: name='android.permission.WRITE_EXTERNAL_STORAGE' 11 uses-implied-permission: name='android.permission.WRITE_EXTERNAL_STORAGE' reason='targetSdkVersion … 12 uses-permission: name='android.permission.READ_PHONE_STATE' 13 uses-implied-permission: name='android.permission.READ_PHONE_STATE' reason='targetSdkVersion < 4' 14 uses-permission: name='android.permission.READ_EXTERNAL_STORAGE' 15 uses-implied-permission: name='android.permission.READ_EXTERNAL_STORAGE' reason='requested WRITE_EX…
|
D | components_permissions_expected.txt | 2 permission: minimal.FIRST_PERMISSION 3 uses-permission: name='android.permission.BIND_ACCESSIBILITY_SERVICE' maxSdkVersion='24' 4 uses-permission-sdk-23: name='android.permission.RECEIVE_SMS' 5 uses-permission: name='android.permission.WRITE_EXTERNAL_STORAGE'
|
/frameworks/base/tests/EnforcePermission/service-app/src/android/tests/enforcepermission/service/ |
D | TestService.java | 92 @EnforcePermission(android.Manifest.permission.INTERNET) 98 @EnforcePermission(android.Manifest.permission.VIBRATE) 104 @EnforcePermission(android.Manifest.permission.INTERNET) 112 @EnforcePermission(android.Manifest.permission.INTERNET) 120 @EnforcePermission(android.Manifest.permission.INTERNET) 128 @EnforcePermission(android.Manifest.permission.TURN_SCREEN_ON) 134 @EnforcePermission(android.Manifest.permission.READ_CONTACTS) 140 @EnforcePermission(android.Manifest.permission.READ_CALENDAR) 147 android.Manifest.permission.INTERNET, 148 android.Manifest.permission.VIBRATE}) [all …]
|
/frameworks/base/core/java/android/telephony/ |
D | TelephonyCallback.java | 148 @RequiresPermission(android.Manifest.permission.READ_PHONE_STATE) 162 @RequiresPermission(android.Manifest.permission.READ_PHONE_STATE) 178 @RequiresPermission(android.Manifest.permission.ACCESS_FINE_LOCATION) 246 Manifest.permission.READ_PHONE_STATE, 247 Manifest.permission.ACCESS_FINE_LOCATION 262 @RequiresPermission(android.Manifest.permission.READ_PRECISE_PHONE_STATE) 276 @RequiresPermission(android.Manifest.permission.READ_PRECISE_PHONE_STATE) 288 @RequiresPermission(android.Manifest.permission.READ_PRECISE_PHONE_STATE) 298 @RequiresPermission(Manifest.permission.READ_PRIVILEGED_PHONE_STATE) 308 @RequiresPermission(Manifest.permission.READ_PRIVILEGED_PHONE_STATE) [all …]
|
/frameworks/base/core/java/android/os/image/ |
D | DynamicSystemManager.java | 68 @RequiresPermission(android.Manifest.permission.MANAGE_DYNAMIC_SYSTEM) 84 @RequiresPermission(android.Manifest.permission.MANAGE_DYNAMIC_SYSTEM) 100 @RequiresPermission(android.Manifest.permission.MANAGE_DYNAMIC_SYSTEM) 115 @RequiresPermission(android.Manifest.permission.MANAGE_DYNAMIC_SYSTEM) 129 @RequiresPermission(android.Manifest.permission.MANAGE_DYNAMIC_SYSTEM) 147 @RequiresPermission(android.Manifest.permission.MANAGE_DYNAMIC_SYSTEM) 166 @RequiresPermission(android.Manifest.permission.MANAGE_DYNAMIC_SYSTEM) 178 @RequiresPermission(android.Manifest.permission.MANAGE_DYNAMIC_SYSTEM) 194 @RequiresPermission(android.Manifest.permission.MANAGE_DYNAMIC_SYSTEM) 211 @RequiresPermission(android.Manifest.permission.MANAGE_DYNAMIC_SYSTEM) [all …]
|
/frameworks/base/services/tests/uiservicestests/src/com/android/server/notification/ |
D | PermissionHelperTest.java | 45 import android.permission.IPermissionManager; 86 testPkgInfo.requestedPermissions = new String[]{ Manifest.permission.POST_NOTIFICATIONS }; in setUp() 117 new String[] {"something else", Manifest.permission.POST_NOTIFICATIONS}; in testGetAppsRequestingPermission() 123 second.requestedPermissions = new String[] {Manifest.permission.POST_NOTIFICATIONS}; in testGetAppsRequestingPermission() 143 final String permission = "correct"; in testHasRequestedPermission_otherPermission() local 153 assertThat(mPermissionHelper.hasRequestedPermission(permission, packageName, 0)).isFalse(); in testHasRequestedPermission_otherPermission() 159 final String permission = "correct"; in testHasRequestedPermission_noPermissions() local 168 assertThat(mPermissionHelper.hasRequestedPermission(permission, packageName, 0)).isFalse(); in testHasRequestedPermission_noPermissions() 173 final String permission = "correct"; in testHasRequestedPermission_singlePermissions() local 180 new String[]{permission}; in testHasRequestedPermission_singlePermissions() [all …]
|
/frameworks/base/services/permission/java/com/android/server/permission/access/appop/ |
D | BaseAppOpPersistence.kt | 17 package com.android.server.permission.access.appop in <lambda>() 22 import com.android.server.permission.access.AccessState in <lambda>() 23 import com.android.server.permission.access.MutableAccessState in <lambda>() 24 import com.android.server.permission.access.collection.* // ktlint-disable no-wildcard-imports in <lambda>() 25 import com.android.server.permission.access.immutable.* // ktlint-disable no-wildcard-imports in <lambda>() 26 import com.android.server.permission.access.util.attributeInt in <lambda>() 27 import com.android.server.permission.access.util.attributeInterned in <lambda>() 28 import com.android.server.permission.access.util.forEachTag in <lambda>() 29 import com.android.server.permission.access.util.getAttributeIntOrThrow in <lambda>() 30 import com.android.server.permission.access.util.getAttributeValueOrThrow in <lambda>() [all …]
|