/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
FakeStorageManager.java | 35 public void addUserKeyAuth(int userId, int serialNumber, byte[] token, byte[] secret) { 36 getUserAuth(userId).add(new Pair<>(token, secret)); 39 public void fixateNewestUserKeyAuth(int userId) { 40 ArrayList<Pair<byte[], byte[]>> auths = mAuth.get(userId); 46 private ArrayList<Pair<byte[], byte[]>> getUserAuth(int userId) { 47 if (!mAuth.containsKey(userId)) { 50 mAuth.put(userId, auths); 52 return mAuth.get(userId); 55 public byte[] getUserUnlockToken(int userId) { 56 ArrayList<Pair<byte[], byte[]>> auths = getUserAuth(userId); [all...] |
LockSettingsStorageTestable.java | 36 String getLockPatternFilename(int userId) { 38 super.getLockPatternFilename(userId)).getAbsolutePath(); 42 String getLockPasswordFilename(int userId) { 44 super.getLockPasswordFilename(userId)).getAbsolutePath(); 48 String getChildProfileLockFile(int userId) { 50 super.getChildProfileLockFile(userId)).getAbsolutePath(); 54 protected File getSyntheticPasswordDirectoryForUser(int userId) { 56 userId).getAbsolutePath());
|
/frameworks/base/core/java/android/content/pm/ |
PackageManagerInternal.java | 74 * @param userId The user id. 77 public String[] getPackages(int userId); 88 * @param userId The user id. 91 public String[] getPackages(String authority, int userId); 139 * @param userId The user for which to grant the permissions. 141 public abstract void grantDefaultPermissionsToDefaultSmsApp(String packageName, int userId); 146 * @param userId The user for which to grant the permissions. 148 public abstract void grantDefaultPermissionsToDefaultDialerApp(String packageName, int userId); 153 * @param userId The user for which to grant the permissions. 156 int userId); [all...] |
PackageCleanItem.java | 24 public final int userId; 28 public PackageCleanItem(int userId, String packageName, boolean andCode) { 29 this.userId = userId; 42 return userId == other.userId && packageName.equals(other.packageName) 53 result = 31 * result + userId; 64 dest.writeInt(userId); 81 userId = source.readInt();
|
IPackageManager.aidl | 64 void checkPackageStartable(String packageName, int userId); 65 boolean isPackageAvailable(String packageName, int userId); 66 PackageInfo getPackageInfo(String packageName, int flags, int userId); 68 int flags, int userId); 69 int getPackageUid(String packageName, int flags, int userId); 70 int[] getPackageGids(String packageName, int flags, int userId); 83 ApplicationInfo getApplicationInfo(String packageName, int flags ,int userId); 85 ActivityInfo getActivityInfo(in ComponentName className, int flags, int userId); 90 ActivityInfo getReceiverInfo(in ComponentName className, int flags, int userId); 92 ServiceInfo getServiceInfo(in ComponentName className, int flags, int userId); [all...] |
/frameworks/base/core/java/com/android/internal/widget/ |
LockPatternUtils.java | 185 public boolean isTrustUsuallyManaged(int userId) { 191 return getLockSettings().getBoolean(IS_TRUST_USUALLY_MANAGED, false, userId); 197 public void setTrustUsuallyManaged(boolean managed, int userId) { 199 getLockSettings().setBoolean(IS_TRUST_USUALLY_MANAGED, managed, userId); 205 public void userPresent(int userId) { 207 getLockSettings().userPresent(userId); 275 public int getRequestedMinimumPasswordLength(int userId) { 276 return getDevicePolicyManager().getPasswordMinimumLength(null, userId); 283 public int getRequestedPasswordQuality(int userId) { 284 return getDevicePolicyManager().getPasswordQuality(null, userId); [all...] |
ILockSettings.aidl | 33 void setBoolean(in String key, in boolean value, in int userId); 34 void setLong(in String key, in long value, in int userId); 35 void setString(in String key, in String value, in int userId); 36 boolean getBoolean(in String key, in boolean defaultValue, in int userId); 37 long getLong(in String key, in long defaultValue, in int userId); 38 String getString(in String key, in String defaultValue, in int userId); 39 void setLockCredential(in String credential, int type, in String savedCredential, int requestedQuality, int userId); 40 void resetKeyStore(int userId); 41 VerifyCredentialResponse checkCredential(in String credential, int type, int userId, 43 VerifyCredentialResponse verifyCredential(in String credential, int type, long challenge, int userId); [all...] |
/cts/hostsidetests/appsecurity/src/android/appsecurity/cts/ |
PackageVisibilityTest.java | 76 int userId = mUsers[1]; 77 assertTrue(userId > 0); 78 getDevice().startUser(userId); 79 installTestAppForUser(TEST_APK, userId); 95 assertFalse(isAppVisibleForUser(TINY_PKG, userId, MATCH_NORMAL)); 96 assertFalse(isAppVisibleForUser(TINY_PKG, userId, MATCH_UNINSTALLED)); 100 ".PackageAccessTest", "testPackageAccess_notInOtherUser", userId); 102 ".PackageAccessTest", "testPackageAccess_notInOtherUserUninstalled", userId); 105 ".PackageAccessTest", "testPackageAccess_getPackagesCantSeeTiny", userId); 110 installTestAppForUser(TINY_APK, userId); [all...] |
/frameworks/base/services/core/java/com/android/server/pm/permission/ |
PermissionsState.java | 173 public boolean isPermissionReviewRequired(int userId) { 174 return mPermissionReviewRequired != null && mPermissionReviewRequired.get(userId); 205 * @param userId The device user id. 210 public int grantRuntimePermission(BasePermission permission, int userId) { 211 enforceValidUserId(userId); 212 if (userId == UserHandle.USER_ALL) { 215 return grantPermission(permission, userId); 222 * @param userId The device user id. 227 public int revokeRuntimePermission(BasePermission permission, int userId) { 228 enforceValidUserId(userId); [all...] |
DefaultPermissionGrantPolicy.java | 200 public void onDefaultRuntimePermissionsGranted(int userId); 266 public void grantDefaultPermissions(int userId) { 267 grantPermissionsToSysComponentsAndPrivApps(userId); 268 grantDefaultSystemHandlerPermissions(userId); 269 grantDefaultPermissionExceptions(userId); 272 private void grantRuntimePermissionsForPackage(int userId, PackageParser.Package pkg) { 284 grantRuntimePermissions(pkg, permissions, true, userId); 288 private void grantAllRuntimePermissions(int userId) { 289 Log.i(TAG, "Granting all runtime permissions for user " + userId); 296 grantRuntimePermissionsForPackage(userId, pkg) [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/am/ |
ActivityManagerTest.java | 38 for(int userId : service.getRunningUserIds()) { 39 testTaskIdsForUser(userId); 43 private void testTaskIdsForUser(int userId) throws RemoteException { 45 100, 0, userId).getList(); 49 assertEquals("The task id " + taskId + " should not belong to user " + userId, 50 taskId / UserHandle.PER_USER_RANGE, userId);
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
WifiService.java | 49 public void onSwitchUser(int userId) { 50 mImpl.handleUserSwitch(userId); 54 public void onUnlockUser(int userId) { 55 mImpl.handleUserUnlock(userId); 59 public void onStopUser(int userId) { 60 mImpl.handleUserStop(userId);
|
/frameworks/base/services/core/java/com/android/server/pm/ |
PackageSettingBase.java | 273 private PackageUserState modifyUserState(int userId) { 274 PackageUserState state = userState.get(userId); 277 userState.put(userId, state); 282 public PackageUserState readUserState(int userId) { 283 PackageUserState state = userState.get(userId); 291 void setEnabled(int state, int userId, String callingPackage) { 292 PackageUserState st = modifyUserState(userId); 297 int getEnabled(int userId) { 298 return readUserState(userId).enabled; 301 String getLastDisabledAppCaller(int userId) { [all...] |
/frameworks/base/packages/SystemUI/src/com/android/keyguard/ |
KeyguardSecurityCallback.java | 40 * @param userId id of the user whose unlock attempt is recorded. 45 void reportUnlockAttempt(int userId, boolean success, int timeoutMs);
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/ |
ForegroundServiceController.java | 40 * @param userId 44 boolean isDungeonNeededForUser(int userId); 61 @Nullable String getStandardLayoutKey(int userId, String pkg); 67 boolean isSystemAlertWarningNeeded(int userId, String pkg); 78 @Nullable ArraySet<Integer> getAppOps(int userId, String packageName);
|
/frameworks/opt/net/ims/src/java/com/android/ims/internal/ |
ICall.java | 33 * @param userId the remote user identity 36 public boolean checkIfRemoteUserIsSame(String userId);
|
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/manageduser/ |
ManagedUserCreationController.java | 33 public ManagedUserCreationController(int userId, boolean leaveAllSystemAppsEnabled, 35 this(userId, leaveAllSystemAppsEnabled, new SystemAppsSnapshot(context)); 39 ManagedUserCreationController(int userId, boolean leaveAllSystemAppsEnabled, 41 mUserId = userId;
|
/cts/hostsidetests/media/common/android/media/cts/ |
MediaSessionTestHelperConstants.java | 80 * @param userId user id to send the command 86 public static String buildControlCommand(int userId, int flag) { 87 return "am start-foreground-service --user " + userId + " -a " + ACTION_CONTROL + " --ei "
|
/frameworks/base/core/java/android/app/ |
IWallpaperManagerCallback.aidl | 37 void onWallpaperColorsChanged(in WallpaperColors colors, int which, int userId);
|
/frameworks/base/core/java/android/companion/ |
ICompanionDeviceDiscoveryServiceCallback.aidl | 21 oneway void onDeviceSelected(String packageName, int userId, String deviceAddress);
|
/frameworks/base/core/java/android/database/ |
IContentObserver.aidl | 32 oneway void onChange(boolean selfUpdate, in Uri uri, int userId);
|
/frameworks/base/core/java/android/service/trust/ |
ITrustAgentServiceCallback.aidl | 31 void addEscrowToken(in byte[] token, int userId); 32 void isEscrowTokenActive(long handle, int userId); 33 void removeEscrowToken(long handle, int userId); 34 void unlockUserWithToken(long handle, in byte[] token, int userId);
|
/frameworks/base/services/core/java/com/android/server/locksettings/ |
LockSettingsStorage.java | 189 public void writeKeyValue(String key, String value, int userId) { 190 writeKeyValue(mOpenHelper.getWritableDatabase(), key, value, userId); 193 public void writeKeyValue(SQLiteDatabase db, String key, String value, int userId) { 196 cv.put(COLUMN_USERID, userId); 202 new String[] {key, Integer.toString(userId)}); 205 mCache.putKeyValue(key, value, userId); 212 public String readKeyValue(String key, String defaultValue, int userId) { 215 if (mCache.hasKeyValue(key, userId)) { 216 return mCache.peekKeyValue(key, defaultValue, userId); 226 new String[] { Integer.toString(userId), key } [all...] |
/packages/apps/Settings/tests/robotests/src/com/android/settings/testutils/shadow/ |
ShadowActivityManager.java | 33 public static void setCurrentUser(int userId) { 34 sCurrentUserId = userId;
|
/frameworks/base/core/java/android/view/accessibility/ |
IAccessibilityManager.aidl | 37 oneway void interrupt(int userId); 39 oneway void sendAccessibilityEvent(in AccessibilityEvent uiEvent, int userId); 41 long addClient(IAccessibilityManagerClient client, int userId); 43 List<AccessibilityServiceInfo> getInstalledAccessibilityServiceList(int userId); 45 List<AccessibilityServiceInfo> getEnabledAccessibilityServiceList(int feedbackType, int userId); 49 String packageName, int userId); 64 IBinder getWindowToken(int windowId, int userId);
|