/frameworks/base/tests/privapp-permissions/ |
D | Android.bp | 6 required: ["privapp-permissions-test.xml"], 10 name: "privapp-permissions-test.xml", 11 src: "system/privapp-permissions-test.xml", 12 sub_dir: "permissions", 21 required: ["vendorprivapp-permissions-test.xml"], 25 name: "vendorprivapp-permissions-test.xml", 26 src: "vendor/privapp-permissions-test.xml", 27 sub_dir: "permissions", 37 required: ["productprivapp-permissions-test.xml"], 41 name: "productprivapp-permissions-test.xml", [all …]
|
/frameworks/base/services/tests/uiservicestests/src/com/android/server/slice/ |
D | SlicePermissionManagerTest.java | 58 SlicePermissionManager permissions = new SlicePermissionManager(mContext, in testGrant() local 64 permissions.grantSliceAccess("my.pkg", 0, "provider.pkg", 0, uri); in testGrant() 66 assertTrue(permissions.hasPermission("my.pkg", 0, uri)); in testGrant() 79 SlicePermissionManager permissions = new SlicePermissionManager(mContext, in testBackup() local 82 permissions.grantFullAccess("com.android.mypkg", 10); in testBackup() 83 permissions.grantSliceAccess("com.android.otherpkg", 0, "com.android.lastpkg", 1, uri); in testBackup() 91 permissions.writeBackup(serializer); in testBackup() 98 permissions = new SlicePermissionManager(mContext, in testBackup() 100 permissions.readRestore(parser); in testBackup() 102 if (!permissions.hasFullAccess("com.android.mypkg", 10)) { in testBackup() [all …]
|
/frameworks/base/data/etc/ |
D | Android.bp | 12 // See the License for the specific language governing permissions and 34 sub_dir: "permissions", 39 name: "privapp-permissions-platform.xml", 40 sub_dir: "permissions", 41 src: "privapp-permissions-platform.xml", 47 sub_dir: "permissions", 55 sub_dir: "permissions", 63 sub_dir: "permissions", 71 sub_dir: "permissions", 79 sub_dir: "permissions", [all …]
|
D | CleanSpec.mk | 46 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/product/etc/permissions/com.android.carrierconf… 47 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/product/etc/permissions/com.android.carrierconfig.xml) 48 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/product/etc/permissions/com.android.emergency.x… 49 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/product/etc/permissions/com.android.emergency.xml) 50 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/product/etc/permissions/com.android.provision.x… 51 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/product/etc/permissions/com.android.provision.xml) 52 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/product/etc/permissions/com.android.settings.xm… 53 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/product/etc/permissions/com.android.settings.xml) 54 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/product/etc/permissions/com.android.launcher3.x… 55 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/product/etc/permissions/com.android.launcher3.xml) [all …]
|
/frameworks/base/data/etc/car/ |
D | Android.bp | 12 // See the License for the specific language governing permissions and 21 sub_dir: "permissions", 28 sub_dir: "permissions", 35 sub_dir: "permissions", 42 sub_dir: "permissions", 49 sub_dir: "permissions", 56 sub_dir: "permissions", 63 sub_dir: "permissions", 70 sub_dir: "permissions", 77 sub_dir: "permissions", [all …]
|
D | CleanSpec.mk | 46 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/system/product/etc/permissions/com.android.car.develop… 47 $(call add-clean-step, rm -rf $(PRODUCT_OUT)/product/etc/permissions/com.android.car.developeroptio…
|
/frameworks/base/core/java/android/net/ |
D | NetworkStack.java | 101 ArrayList<String> permissions = new ArrayList<String>(Arrays.asList(otherPermissions)); in checkNetworkStackPermissionOr() local 102 permissions.add(NETWORK_STACK); in checkNetworkStackPermissionOr() 103 permissions.add(PERMISSION_MAINLINE_NETWORK_STACK); in checkNetworkStackPermissionOr() 104 enforceAnyPermissionOf(context, permissions.toArray(new String[0])); in checkNetworkStackPermissionOr() 108 final @NonNull String... permissions) { in enforceAnyPermissionOf() argument 109 if (!checkAnyPermissionOf(context, permissions)) { in enforceAnyPermissionOf() 111 + String.join(", ", permissions) + "."); in enforceAnyPermissionOf() 116 final @NonNull String... permissions) { in checkAnyPermissionOf() argument 117 for (String permission : permissions) { in checkAnyPermissionOf()
|
/frameworks/base/core/java/android/bluetooth/ |
D | BluetoothGattDescriptor.java | 136 public BluetoothGattDescriptor(UUID uuid, int permissions) { in BluetoothGattDescriptor() argument 137 initDescriptor(null, uuid, 0, permissions); in BluetoothGattDescriptor() 149 int instance, int permissions) { in BluetoothGattDescriptor() argument 150 initDescriptor(characteristic, uuid, instance, permissions); in BluetoothGattDescriptor() 156 public BluetoothGattDescriptor(UUID uuid, int instance, int permissions) { in BluetoothGattDescriptor() argument 157 initDescriptor(null, uuid, instance, permissions); in BluetoothGattDescriptor() 161 int instance, int permissions) { in initDescriptor() argument 165 mPermissions = permissions; in initDescriptor()
|
D | BluetoothGattCharacteristic.java | 246 public BluetoothGattCharacteristic(UUID uuid, int properties, int permissions) { in BluetoothGattCharacteristic() argument 247 initCharacteristic(null, uuid, 0, properties, permissions); in BluetoothGattCharacteristic() 257 int properties, int permissions) { in BluetoothGattCharacteristic() argument 258 initCharacteristic(service, uuid, instanceId, properties, permissions); in BluetoothGattCharacteristic() 267 int properties, int permissions) { in BluetoothGattCharacteristic() argument 268 initCharacteristic(null, uuid, instanceId, properties, permissions); in BluetoothGattCharacteristic() 273 int properties, int permissions) { in initCharacteristic() argument 277 mPermissions = permissions; in initCharacteristic()
|
/frameworks/base/core/java/android/permissionpresenterservice/ |
D | RuntimePermissionPresenterService.java | 97 List<RuntimePermissionPresentationInfo> permissions = onGetAppPermissions(packageName); 98 if (permissions != null && !permissions.isEmpty()) { 100 result.putParcelableList(KEY_RESULT, permissions);
|
/frameworks/base/services/core/java/com/android/server/slice/ |
D | SliceShellCommand.java | 88 String[] permissions = b.getStringArray(SliceProvider.EXTRA_RESULT); in runGetPermissions() local 91 if (permissions != null && permissions.length != 0) { in runGetPermissions() 93 context.getPackageManager().getPackagesHoldingPermissions(permissions, 0); in runGetPermissions()
|
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/applications/ |
D | PermissionsSummaryHelper.java | 33 permController.getAppPermissions(pkg, permissions -> { in getPermissionSummary() 34 final int permissionCount = permissions.size(); in getPermissionSummary() 42 RuntimePermissionPresentationInfo permission = permissions.get(i); in getPermissionSummary()
|
/frameworks/opt/chips/src/com/android/ex/chips/ |
D | RecipientEntry.java | 104 String lookupKey, String[] permissions) { in RecipientEntry() argument 107 true /* shouldDisplayIcon */, isFirstLevel, isValid, lookupKey, permissions); in RecipientEntry() 113 boolean isFirstLevel, boolean isValid, String lookupKey, String[] permissions) { in RecipientEntry() argument 130 mPermissions = permissions; in RecipientEntry() 222 public static RecipientEntry constructPermissionEntry(String[] permissions) { in constructPermissionEntry() argument 236 permissions); in constructPermissionEntry()
|
/frameworks/base/services/core/xsd/ |
D | Android.bp | 2 name: "default-permissions", 3 srcs: ["default-permissions.xsd"],
|
/frameworks/base/core/java/android/permission/ |
D | PermissionControllerService.java | 221 ArrayList<String> permissions = in onBind() local 223 Preconditions.checkCollectionElementsNotNull(permissions, "permissions"); in onBind() 225 request.put(packageName, permissions); in onBind() 321 permissions -> { in onBind() 322 if (permissions != null && !permissions.isEmpty()) { in onBind() 325 permissions); in onBind()
|
/frameworks/base/tests/libs-permissions/ |
D | Android.bp | 13 sub_dir: "permissions", 28 sub_dir: "permissions",
|
/frameworks/base/services/core/java/com/android/server/connectivity/ |
D | PermissionMonitor.java | 461 int permissions = PERMISSION_NONE; in getNetdPermissionMask() local 463 permissions |= PERMISSION_INTERNET; in getNetdPermissionMask() 466 permissions |= PERMISSION_UPDATE_DEVICE_STATS; in getNetdPermissionMask() 468 return permissions; in getNetdPermissionMask() 606 void sendPackagePermissionsForUid(int uid, int permissions) { in sendPackagePermissionsForUid() argument 608 netdPermissionsAppIds.put(uid, permissions); in sendPackagePermissionsForUid() 633 int permissions = netdPermissionsAppIds.valueAt(i); in sendPackagePermissionsToNetd() local 634 switch(permissions) { in sendPackagePermissionsToNetd() 650 Log.e(TAG, "unknown permission type: " + permissions + "for uid: " in sendPackagePermissionsToNetd()
|
/frameworks/base/services/core/xsd/vts/ |
D | Android.bp | 13 // See the License for the specific language governing permissions and 35 ":default-permissions",
|
/frameworks/base/services/core/java/com/android/server/pm/permission/ |
D | DefaultPermissionGrantPolicy.java | 304 Set<String> permissions = new ArraySet<>(); in grantRuntimePermissionsForSystemPackage() local 311 permissions.add(permission); in grantRuntimePermissionsForSystemPackage() 314 if (!permissions.isEmpty()) { in grantRuntimePermissionsForSystemPackage() 315 grantRuntimePermissions(pkg, permissions, true /*systemFixed*/, userId); in grantRuntimePermissionsForSystemPackage() 760 ArrayList<String> packages, int userId, Set<String>... permissions) { in grantPermissionToEachSystemPackage() argument 764 grantPermissionsToSystemPackage(packages.get(i), userId, permissions); in grantPermissionToEachSystemPackage() local 978 private void grantRuntimePermissions(PackageInfo pkg, Set<String> permissions, in grantRuntimePermissions() argument 980 grantRuntimePermissions(pkg, permissions, systemFixed, false, in grantRuntimePermissions() 984 private void revokeRuntimePermissions(String packageName, Set<String> permissions, in revokeRuntimePermissions() argument 992 for (String permission : permissions) { in revokeRuntimePermissions() [all …]
|
/frameworks/base/core/tests/coretests/src/android/content/pm/ |
D | PackageParserTest.java | 426 assertEquals(1, p.permissions.size()); in checkPackageWithComponents() 429 packageName, PermissionInfo.PROTECTION_NORMAL, p.permissions.get(0)); in checkPackageWithComponents() 473 assertEquals(1, parent.permissions.size()); in testMultiPackageComponents() 475 PermissionInfo.PROTECTION_NORMAL, parent.permissions.get(0)); in testMultiPackageComponents() 483 assertEquals(0, firstChild.permissions.size()); // Child APKs cannot declare permissions. in testMultiPackageComponents() 491 assertEquals(0, secondChild.permissions.size()); // Child APKs cannot declare permissions. in testMultiPackageComponents()
|
/frameworks/opt/chips/sample/src/com/android/ex/chips/sample/ |
D | MainActivity.java | 64 RecipientEditTextView view, String[] permissions) { in onPermissionsRequestItemClicked() argument 65 requestPermissions(permissions, 0 /* requestCode */); in onPermissionsRequestItemClicked()
|
/frameworks/native/cmds/atrace/ |
D | atrace_userdebug.rc | 2 ## The default list of permissions is set in frameworks/native/cmds/atrace/atrace.rc 4 # Grant unix world read/write permissions to enable kernel tracepoints.
|
/frameworks/base/tests/net/java/com/android/server/connectivity/ |
D | PermissionMonitorTest.java | 146 String... permissions) { in hasRestrictedNetworkPermission() argument 150 addPermissions(uid, permissions); in hasRestrictedNetworkPermission() 185 private void addPermissions(int uid, String... permissions) { in addPermissions() argument 186 for (String permission : permissions) { in addPermissions() 289 String... permissions) throws Exception { in assertBackgroundPermission() argument 292 addPermissions(uid, permissions); in assertBackgroundPermission() 599 private PackageInfo setPackagePermissions(String packageName, int uid, String[] permissions) in setPackagePermissions() argument 604 addPermissions(uid, permissions); in setPackagePermissions() 608 private PackageInfo addPackage(String packageName, int uid, String[] permissions) in addPackage() argument 610 PackageInfo packageInfo = setPackagePermissions(packageName, uid, permissions); in addPackage()
|
/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/ |
D | DpmMockContext.java | 164 public final List<String> permissions = callerPermissions; field in DpmMockContext 243 List<String> permissions = binder.callingPermissions.get(binder.getCallingUid()); in enforceCallingOrSelfPermission() local 244 if (permissions == null) { in enforceCallingOrSelfPermission() 247 permissions = callerPermissions; in enforceCallingOrSelfPermission() 251 if (!permissions.contains(permission)) { in enforceCallingOrSelfPermission()
|
/frameworks/base/core/java/com/android/server/ |
D | SystemConfig.java | 1091 ArraySet<String> permissions = grantMap.get(packageName); in readPrivAppPermissions() local 1092 if (permissions == null) { in readPrivAppPermissions() 1093 permissions = new ArraySet<>(); in readPrivAppPermissions() 1106 permissions.add(permName); in readPrivAppPermissions() 1120 grantMap.put(packageName, permissions); in readPrivAppPermissions() 1134 ArrayMap<String, Boolean> permissions = mOemPermissions.get(packageName); in readOemPermissions() local 1135 if (permissions == null) { in readOemPermissions() 1136 permissions = new ArrayMap<>(); in readOemPermissions() 1148 permissions.put(permName, Boolean.TRUE); in readOemPermissions() 1156 permissions.put(permName, Boolean.FALSE); in readOemPermissions() [all …]
|