Home
last modified time | relevance | path

Searched refs:perms (Results 1 – 17 of 17) sorted by relevance

/frameworks/base/apex/jobscheduler/service/java/com/android/server/job/
DGrantedUriPermissions.java73 GrantedUriPermissions perms = null; in createFromIntent() local
77 perms = grantUri(data, sourceUid, targetPackage, targetUserId, grantFlags, tag, in createFromIntent()
78 perms); in createFromIntent()
83 perms = grantClip(clip, sourceUid, targetPackage, targetUserId, grantFlags, tag, in createFromIntent()
84 perms); in createFromIntent()
87 return perms; in createFromIntent()
95 GrantedUriPermissions perms = null; in createFromClip() local
97 perms = grantClip(clip, sourceUid, targetPackage, targetUserId, grantFlags, in createFromClip()
98 tag, perms); in createFromClip()
100 return perms; in createFromClip()
/frameworks/base/core/java/com/android/internal/pm/pkg/component/
DParsedProcessUtils.java46 private static ParseResult<Set<String>> parseDenyPermission(Set<String> perms, in parseDenyPermission() argument
54 perms = CollectionUtils.add(perms, perm); in parseDenyPermission()
60 return input.success(perms); in parseDenyPermission()
64 private static ParseResult<Set<String>> parseAllowPermission(Set<String> perms, Resources res, in parseAllowPermission() argument
72 perms = CollectionUtils.remove(perms, perm); in parseAllowPermission()
78 return input.success(perms); in parseAllowPermission()
82 …private static ParseResult<ParsedProcess> parseProcess(Set<String> perms, String[] separateProcess… in parseProcess() argument
88 if (perms != null) { in parseProcess()
89 proc.setDeniedPermissions(new ArraySet<>(perms)); in parseProcess()
/frameworks/base/services/core/java/com/android/server/uri/
DUriGrantsManagerService.java311 final ArrayMap<GrantUri, UriPermission> perms = mGrantedUriPermissions.get( in getUriPermissions() local
313 if (perms == null) { in getUriPermissions()
316 for (int j = 0; j < perms.size(); j++) { in getUriPermissions()
317 final UriPermission perm = perms.valueAt(j); in getUriPermissions()
327 final ArrayMap<GrantUri, UriPermission> perms = in getUriPermissions() local
329 for (int j = 0; j < perms.size(); j++) { in getUriPermissions()
330 final UriPermission perm = perms.valueAt(j); in getUriPermissions()
352 final ArrayMap<GrantUri, UriPermission> perms = mGrantedUriPermissions.valueAt(i); in getGrantedUriPermissions() local
353 for (int j = 0; j < perms.size(); j++) { in getGrantedUriPermissions()
354 final UriPermission perm = perms.valueAt(j); in getGrantedUriPermissions()
[all …]
/frameworks/base/services/core/java/com/android/server/am/
DAppPermissionTracker.java566 private @NonNull Pair[] parsePermissionConfig(@NonNull String[] perms) { in parsePermissionConfig() argument
567 final Pair[] result = new Pair[perms.length / 2]; in parsePermissionConfig()
568 for (int i = 0, j = 0; i < perms.length; i += 2, j++) { in parsePermissionConfig()
570 result[j] = Pair.create(TextUtils.isEmpty(perms[i]) ? null : perms[i], in parsePermissionConfig()
571 TextUtils.isEmpty(perms[i + 1]) ? OP_NONE : strOpToOp(perms[i + 1])); in parsePermissionConfig()
DBroadcastSkipPolicy.java672 private static boolean isSignaturePerm(String[] perms) { in isSignaturePerm() argument
673 if (perms == null) { in isSignaturePerm()
677 for (int i = perms.length-1; i >= 0; i--) { in isSignaturePerm()
679 PermissionInfo pi = pm.getPermissionInfo(perms[i], "android", 0); in isSignaturePerm()
/frameworks/base/apct-tests/perftests/core/src/android/util/
DXmlPerfTest.java258 int perms = 0; in read() local
283 perms++; in read()
292 assertEquals(packages * PERMS.length, perms); in read()
/frameworks/base/core/java/android/database/sqlite/
DSQLiteOpenHelper.java438 int perms = FileUtils.S_IRUSR | FileUtils.S_IWUSR | FileUtils.S_IRGRP | FileUtils.S_IWGRP; in setFilePermissionsForDb() local
439 FileUtils.setPermissions(dbPath, perms, -1, -1); in setFilePermissionsForDb()
/frameworks/base/core/java/android/permission/
DPermissionControllerService.java488 CollectionUtils.forEach(revoked, (pkg, perms) -> { in onBind()
490 Preconditions.checkCollectionElementsNotNull(perms, "permissions"); in onBind()
/frameworks/native/cmds/installd/
Dutils.cpp625 int create_dir_if_needed(const std::string& pathname, mode_t perms) { in create_dir_if_needed() argument
631 return mkdir(pathname.c_str(), perms); in create_dir_if_needed()
641 if (actual_perms != perms) { in create_dir_if_needed()
642 LOG(WARNING) << pathname << " permissions " << actual_perms << " expected " << perms; in create_dir_if_needed()
/frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/
DSettingsState.java1751 Set<PosixFilePermission> perms =
1753 perms.add(PosixFilePermission.OWNER_WRITE);
1754 perms.add(PosixFilePermission.OWNER_READ);
1755 perms.add(PosixFilePermission.GROUP_READ);
1756 perms.add(PosixFilePermission.OTHERS_READ);
1758 Files.setPosixFilePermissions(path, perms);
/frameworks/base/services/core/java/com/android/server/
DSystemConfig.java903 ArraySet<String> perms = mSystemPermissions.get(uid); in readPermissionsFromXml() local
904 if (perms == null) { in readPermissionsFromXml()
905 perms = new ArraySet<String>(); in readPermissionsFromXml()
906 mSystemPermissions.put(uid, perms); in readPermissionsFromXml()
908 perms.add(perm); in readPermissionsFromXml()
/frameworks/base/core/java/android/app/
DContextImpl.java3658 int perms = FileUtils.S_IRUSR|FileUtils.S_IWUSR in setFilePermissionsFromMode() local
3662 perms |= FileUtils.S_IROTH; in setFilePermissionsFromMode()
3665 perms |= FileUtils.S_IWOTH; in setFilePermissionsFromMode()
3669 + ", perms=0x" + Integer.toHexString(perms)); in setFilePermissionsFromMode()
3671 FileUtils.setPermissions(name, perms, -1, -1); in setFilePermissionsFromMode()
/frameworks/base/services/tests/PackageManagerServiceTests/server/src/com/android/server/pm/
DPackageManagerTests.java512 private void assertDirOwnerGroupPermsIfExists(String reason, int uid, int gid, int perms, in assertDirOwnerGroupPermsIfExists() argument
548 if ((stat.st_mode & ~S_IFMT) != perms) { in assertDirOwnerGroupPermsIfExists()
550 sb.append(Integer.toOctalString(perms)); in assertDirOwnerGroupPermsIfExists()
/frameworks/base/core/proto/android/os/
Dincident.proto197 // 1. incidentd can't execute `procrank` because it don't have DAC perms
/frameworks/base/services/core/java/com/android/server/pm/
DSettings.java5311 final List<ParsedPermission> perms = pkg.getPermissions();
5313 for (int i=0; i<perms.size(); i++) {
5314 ParsedPermission perm = perms.get(i);
5338 final Set<String> perms = pkg.getRequestedPermissions();
5340 for (String perm : perms) {
/frameworks/base/services/tests/uiservicestests/src/com/android/server/notification/
DNotificationManagerServiceTest.java10131 TestablePermissions perms = mContext.getTestablePermissions();
10132 perms.setPermission(android.Manifest.permission.INTERACT_ACROSS_USERS, PERMISSION_GRANTED);
/frameworks/base/tools/aapt2/integration-tests/CommandTests/
Dandroid-33.jarAndroidManifest.xml META-INF/ META-INF/MANIFEST.MF NOTICES/ NOTICES/libcore ...