/frameworks/base/apex/jobscheduler/service/java/com/android/server/job/ |
D | GrantedUriPermissions.java | 73 GrantedUriPermissions perms = null; in createFromIntent() local 77 perms = grantUri(data, sourceUid, targetPackage, targetUserId, grantFlags, tag, in createFromIntent() 78 perms); in createFromIntent() 83 perms = grantClip(clip, sourceUid, targetPackage, targetUserId, grantFlags, tag, in createFromIntent() 84 perms); in createFromIntent() 87 return perms; in createFromIntent() 95 GrantedUriPermissions perms = null; in createFromClip() local 97 perms = grantClip(clip, sourceUid, targetPackage, targetUserId, grantFlags, in createFromClip() 98 tag, perms); in createFromClip() 100 return perms; in createFromClip()
|
/frameworks/base/core/java/com/android/internal/pm/pkg/component/ |
D | ParsedProcessUtils.java | 46 private static ParseResult<Set<String>> parseDenyPermission(Set<String> perms, in parseDenyPermission() argument 54 perms = CollectionUtils.add(perms, perm); in parseDenyPermission() 60 return input.success(perms); in parseDenyPermission() 64 private static ParseResult<Set<String>> parseAllowPermission(Set<String> perms, Resources res, in parseAllowPermission() argument 72 perms = CollectionUtils.remove(perms, perm); in parseAllowPermission() 78 return input.success(perms); in parseAllowPermission() 82 …private static ParseResult<ParsedProcess> parseProcess(Set<String> perms, String[] separateProcess… in parseProcess() argument 88 if (perms != null) { in parseProcess() 89 proc.setDeniedPermissions(new ArraySet<>(perms)); in parseProcess()
|
/frameworks/base/services/core/java/com/android/server/uri/ |
D | UriGrantsManagerService.java | 311 final ArrayMap<GrantUri, UriPermission> perms = mGrantedUriPermissions.get( in getUriPermissions() local 313 if (perms == null) { in getUriPermissions() 316 for (int j = 0; j < perms.size(); j++) { in getUriPermissions() 317 final UriPermission perm = perms.valueAt(j); in getUriPermissions() 327 final ArrayMap<GrantUri, UriPermission> perms = in getUriPermissions() local 329 for (int j = 0; j < perms.size(); j++) { in getUriPermissions() 330 final UriPermission perm = perms.valueAt(j); in getUriPermissions() 352 final ArrayMap<GrantUri, UriPermission> perms = mGrantedUriPermissions.valueAt(i); in getGrantedUriPermissions() local 353 for (int j = 0; j < perms.size(); j++) { in getGrantedUriPermissions() 354 final UriPermission perm = perms.valueAt(j); in getGrantedUriPermissions() [all …]
|
/frameworks/base/services/core/java/com/android/server/am/ |
D | AppPermissionTracker.java | 566 private @NonNull Pair[] parsePermissionConfig(@NonNull String[] perms) { in parsePermissionConfig() argument 567 final Pair[] result = new Pair[perms.length / 2]; in parsePermissionConfig() 568 for (int i = 0, j = 0; i < perms.length; i += 2, j++) { in parsePermissionConfig() 570 result[j] = Pair.create(TextUtils.isEmpty(perms[i]) ? null : perms[i], in parsePermissionConfig() 571 TextUtils.isEmpty(perms[i + 1]) ? OP_NONE : strOpToOp(perms[i + 1])); in parsePermissionConfig()
|
D | BroadcastSkipPolicy.java | 672 private static boolean isSignaturePerm(String[] perms) { in isSignaturePerm() argument 673 if (perms == null) { in isSignaturePerm() 677 for (int i = perms.length-1; i >= 0; i--) { in isSignaturePerm() 679 PermissionInfo pi = pm.getPermissionInfo(perms[i], "android", 0); in isSignaturePerm()
|
/frameworks/base/apct-tests/perftests/core/src/android/util/ |
D | XmlPerfTest.java | 258 int perms = 0; in read() local 283 perms++; in read() 292 assertEquals(packages * PERMS.length, perms); in read()
|
/frameworks/base/core/java/android/database/sqlite/ |
D | SQLiteOpenHelper.java | 438 int perms = FileUtils.S_IRUSR | FileUtils.S_IWUSR | FileUtils.S_IRGRP | FileUtils.S_IWGRP; in setFilePermissionsForDb() local 439 FileUtils.setPermissions(dbPath, perms, -1, -1); in setFilePermissionsForDb()
|
/frameworks/base/core/java/android/permission/ |
D | PermissionControllerService.java | 488 CollectionUtils.forEach(revoked, (pkg, perms) -> { in onBind() 490 Preconditions.checkCollectionElementsNotNull(perms, "permissions"); in onBind()
|
/frameworks/native/cmds/installd/ |
D | utils.cpp | 625 int create_dir_if_needed(const std::string& pathname, mode_t perms) { in create_dir_if_needed() argument 631 return mkdir(pathname.c_str(), perms); in create_dir_if_needed() 641 if (actual_perms != perms) { in create_dir_if_needed() 642 LOG(WARNING) << pathname << " permissions " << actual_perms << " expected " << perms; in create_dir_if_needed()
|
/frameworks/base/packages/SettingsProvider/src/com/android/providers/settings/ |
D | SettingsState.java | 1751 Set<PosixFilePermission> perms = 1753 perms.add(PosixFilePermission.OWNER_WRITE); 1754 perms.add(PosixFilePermission.OWNER_READ); 1755 perms.add(PosixFilePermission.GROUP_READ); 1756 perms.add(PosixFilePermission.OTHERS_READ); 1758 Files.setPosixFilePermissions(path, perms);
|
/frameworks/base/services/core/java/com/android/server/ |
D | SystemConfig.java | 903 ArraySet<String> perms = mSystemPermissions.get(uid); in readPermissionsFromXml() local 904 if (perms == null) { in readPermissionsFromXml() 905 perms = new ArraySet<String>(); in readPermissionsFromXml() 906 mSystemPermissions.put(uid, perms); in readPermissionsFromXml() 908 perms.add(perm); in readPermissionsFromXml()
|
/frameworks/base/core/java/android/app/ |
D | ContextImpl.java | 3658 int perms = FileUtils.S_IRUSR|FileUtils.S_IWUSR in setFilePermissionsFromMode() local 3662 perms |= FileUtils.S_IROTH; in setFilePermissionsFromMode() 3665 perms |= FileUtils.S_IWOTH; in setFilePermissionsFromMode() 3669 + ", perms=0x" + Integer.toHexString(perms)); in setFilePermissionsFromMode() 3671 FileUtils.setPermissions(name, perms, -1, -1); in setFilePermissionsFromMode()
|
/frameworks/base/services/tests/PackageManagerServiceTests/server/src/com/android/server/pm/ |
D | PackageManagerTests.java | 512 private void assertDirOwnerGroupPermsIfExists(String reason, int uid, int gid, int perms, in assertDirOwnerGroupPermsIfExists() argument 548 if ((stat.st_mode & ~S_IFMT) != perms) { in assertDirOwnerGroupPermsIfExists() 550 sb.append(Integer.toOctalString(perms)); in assertDirOwnerGroupPermsIfExists()
|
/frameworks/base/core/proto/android/os/ |
D | incident.proto | 197 // 1. incidentd can't execute `procrank` because it don't have DAC perms
|
/frameworks/base/services/core/java/com/android/server/pm/ |
D | Settings.java | 5311 final List<ParsedPermission> perms = pkg.getPermissions(); 5313 for (int i=0; i<perms.size(); i++) { 5314 ParsedPermission perm = perms.get(i); 5338 final Set<String> perms = pkg.getRequestedPermissions(); 5340 for (String perm : perms) {
|
/frameworks/base/services/tests/uiservicestests/src/com/android/server/notification/ |
D | NotificationManagerServiceTest.java | 10131 TestablePermissions perms = mContext.getTestablePermissions(); 10132 perms.setPermission(android.Manifest.permission.INTERACT_ACROSS_USERS, PERMISSION_GRANTED);
|
/frameworks/base/tools/aapt2/integration-tests/CommandTests/ |
D | android-33.jar | AndroidManifest.xml
META-INF/
META-INF/MANIFEST.MF
NOTICES/
NOTICES/libcore ... |