/frameworks/base/services/core/java/com/android/server/accounts/ |
AccountManagerService.java | 273 private final int userId; 312 UserAccounts(Context context, int userId, File preNDbFile, File deDbFile) { 313 this.userId = userId; 315 openHelper = DeDatabaseHelper.create(context, userId, preNDbFile, deDbFile); 419 final int userId = ActivityManager.getCurrentUser(); 420 final int uid = mPackageManager.getPackageUidAsUser(packageName, userId); 443 final int userId = UserHandle.getUserId(uid); 454 accounts = getAccountsAsUser(null, userId, "android"); 535 public void validateAccounts(int userId) { [all...] |
/frameworks/base/services/core/java/com/android/server/net/ |
NetworkPolicyManagerService.java | 501 private boolean addDefaultRestrictBackgroundWhitelistUidsUL(int userId) { 510 + " and user " + userId); 513 app = pm.getApplicationInfoAsUser(pkg, PackageManager.MATCH_SYSTEM_ONLY, userId); 524 final int uid = UserHandle.getUid(userId, app.uid); 527 Slog.d(TAG, "Adding uid " + uid + " (user " + userId + ") to default restricted " 533 + userId + ") to restrict background whitelist"); [all...] |
/frameworks/base/services/core/java/com/android/server/notification/ |
NotificationManagerService.java | 519 public void onClearAll(int callingUid, int callingPid, int userId) { 521 cancelAllLocked(callingUid, callingPid, userId, REASON_DELEGATE_CANCEL_ALL, null, 564 String pkg, String tag, int id, int userId) { 567 true, userId, REASON_DELEGATE_CANCEL, null); 595 int uid, int initialPid, String message, int userId) { 598 cancelNotification(callingUid, callingPid, pkg, tag, id, 0, 0, false, userId, [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
ShortcutService.java | 448 public String injectGetLocaleTagsForUser(@UserIdInt int userId) { 540 public void onUnlockUser(int userId) { 541 mService.handleUnlockUser(userId); 561 void handleUnlockUser(int userId) { 563 Slog.d(TAG, "handleUnlockUser: user=" + userId); 566 mUnlockedUsers.put(userId, true); 580 getUserShortcutsLocked(userId); 586 void handleCleanupUser(int userId) { 588 Slog.d(TAG, "handleCleanupUser: user=" + userId); 591 unloadUserLocked(userId); [all...] |
UserManagerService.java | 490 public String getUserAccount(int userId) { 493 return mUsers.get(userId).account; 498 public void setUserAccount(int userId, String accountName) { 503 final UserData userData = mUsers.get(userId); 505 Slog.e(LOG_TAG, "User not found for setting user account: u" + userId); 556 public List<UserInfo> getProfiles(int userId, boolean enabledOnly) { 558 if (userId != UserHandle.getCallingUserId()) { 559 checkManageOrCreateUsersPermission("getting profiles related to user " + userId); 566 return getProfilesLU(userId, enabledOnly, returnFullInfo); 574 public int[] getProfileIds(int userId, boolean enabledOnly) [all...] |
Settings.java | 466 void applyPendingPermissionGrantsLPw(String packageName, int userId) { 468 mRestoredUserGrants.get(userId); 489 perms.grantRuntimePermission(bp, userId); 491 perms.updatePermissionFlags(bp, userId, USER_RUNTIME_GRANT_MASK, grant.grantBits); 498 mRestoredUserGrants.remove(userId); 500 writeRuntimePermissionsForUserLPr(userId, false); 521 s.userId = newUserIdLPw(s); 522 Log.i(PackageManagerService.TAG, "New shared user " + name + ": id=" + s.userId); 523 // < 0 means we couldn't assign a userid; fall out and return 525 if (s.userId >= 0) [all...] |
/external/robolectric/v3/runtime/ |
shadows-core-3.1-SNAPSHOT-17.jar | |
shadows-core-3.1-SNAPSHOT-18.jar | |
shadows-core-3.1-SNAPSHOT-19.jar | |
android-all-4.4_r1-robolectric-1.jar | |
android-all-5.1.1_r9-robolectric-1.jar | |
android-all-5.0.0_r2-robolectric-1.jar | |
/prebuilts/devtools/tools/lib/ |
commons-compress-1.0.jar | |
commons-compress-1.8.1.jar | |
/prebuilts/tools/common/commons-compress/ |
commons-compress-1.0.jar | |
/prebuilts/tools/common/m2/repository/org/apache/commons/commons-compress/1.0/ |
commons-compress-1.0.jar | |
/prebuilts/tools/common/m2/repository/org/codehaus/plexus/plexus-io/1.0/ |
plexus-io-1.0.jar | |
/frameworks/base/services/accessibility/java/com/android/server/accessibility/ |
AccessibilityManagerService.java | 248 private UserState getUserStateLocked(int userId) { 249 UserState state = mUserStates.get(userId); 251 state = new UserState(userId); 252 mUserStates.put(userId, state); 286 final int userId = getChangingUserId(); 287 if (userId != mCurrentUserId) { 290 UserState userState = getUserStateLocked(userId); 309 final int userId = getChangingUserId(); 312 if (userId != mCurrentUserId) { 315 UserState userState = getUserStateLocked(userId); [all...] |
/frameworks/base/services/core/java/com/android/server/ |
ConnectivityService.java | [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
ActivityStackSupervisor.java | 300 * Maps the task identifier that activities are currently being started in to the userId of the 301 * task. Each time a new task is created, the entry for the userId of the task is incremented 374 /** Stack id of the front stack when user switched, indexed by userId. */ [all...] |
/frameworks/base/services/core/java/com/android/server/audio/ |
AudioService.java | [all...] |
/frameworks/base/core/java/android/app/ |
ActivityThread.java | 250 // These LoadedApk are only valid for the userId that we're running as. 269 final int userId; 271 public ProviderKey(String authority, int userId) { 273 this.userId = userId; 280 return Objects.equals(authority, other.authority) && userId == other.userId; 287 return ((authority != null) ? authority.hashCode() : 0) ^ userId; [all...] |
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
DevicePolicyManagerService.java | 502 int userId = intent.getIntExtra(Intent.EXTRA_USER_HANDLE, UserHandle.USER_ALL); 503 new MonitoringCertNotificationTask().execute(userId); [all...] |
/prebuilts/misc/common/android-support-test/runner/ |
runner-0.5-release-no-dep.jar | |
/prebuilts/tools/common/m2/repository/org/apache/commons/commons-compress/1.8.1/ |
commons-compress-1.8.1.jar | |