/frameworks/base/services/core/java/com/android/server/content/ |
ContentService.java | 139 * Map from userId to providerPackageName to [clientPackageName, uri] to 156 final int userId = intent.getIntExtra(Intent.EXTRA_USER_HANDLE, 159 invalidateCacheLocked(userId, packageName, null); 284 public String[] getPackages(String authority, int userId) { 285 return getSyncAdapterPackagesForAuthorityAsUser(authority, userId); 510 int userId = UserHandle.getCallingUserId(); 522 syncManager.scheduleSync(account, userId, uId, authority, extras, 560 public void syncAsUser(SyncRequest request, int userId) { 561 enforceCrossUserPermission(userId, "no permission to request sync as user: " + userId); [all...] |
SyncAdapterStateFetcher.java | 38 public int getStandbyBucket(int userId, String packageName) { 39 final Pair<Integer, String> key = Pair.create(userId, packageName); 50 final int value = usmi.getAppStandbyBucket(packageName, userId,
|
/frameworks/base/services/core/java/com/android/server/pm/ |
PackageManagerService.java | [all...] |
/cts/hostsidetests/devicepolicy/src/com/android/cts/devicepolicy/ |
DeviceAndProfileOwnerTestApi25.java | 100 protected void startSimpleActivityAsUser(int userId) throws Exception { 101 installAppAsUser(TEST_APP_APK, userId); 102 String command = "am start -W --user " + userId + " " + TEST_APP_PKG + "/"
|
DeviceAndProfileOwnerTest.java | [all...] |
/cts/hostsidetests/numberblocking/src/com/android/cts/numberblocking/hostside/ |
NumberBlockingTest.java | 150 private void installTestAppForUser(int userId) throws Exception { 151 LogUtil.CLog.logAndDisplay(Log.LogLevel.INFO, "Installing test app for user: " + userId); 155 testAppFile, true /*reinstall*/, userId); 169 private void runTestAsUser(String className, String methodName, int userId) throws Exception { 171 className, methodName, userId); 180 getDevice().runInstrumentationTestsAsUser(testRunner, userId, listener); 199 private void setTestAppAsDefaultSmsAppForUser(boolean setToSmsApp, int userId) 201 String command = String.format("appops set --user %d %s WRITE_SMS %s", userId, 208 private int getUserSerialNumber(int userId) throws DeviceNotAvailableException { 214 if (token.contains("UserInfo{" + userId + ":")) [all...] |
/frameworks/base/services/core/java/com/android/server/job/ |
JobSchedulerInternal.java | 48 public long baseHeartbeatForApp(String packageName, @UserIdInt int userId, int appBucket); 53 void noteJobStart(String packageName, int userId); 75 void reportAppUsage(String packageName, int userId);
|
/frameworks/base/services/core/java/com/android/server/notification/ |
NotificationDelegate.java | 25 void onClearAll(int callingUid, int callingPid, int userId); 31 String pkg, String tag, int id, int userId, String key, 36 int uid, int initialPid, String message, int userId);
|
/frameworks/base/services/core/java/com/android/server/pm/permission/ |
PermissionManagerInternal.java | 50 public void onGidsChanged(int appId, int userId) { 54 public void onPermissionGranted(int uid, int userId) { 58 public void onPermissionRevoked(int uid, int userId) { 72 public abstract boolean isPermissionsReviewRequired(PackageParser.Package pkg, int userId); 76 int callingUid, int userId, @Nullable PermissionCallback callback); 85 @NonNull String packageName, boolean overridePolicy, int callingUid, int userId, 127 @NonNull String packageName, int callingUid, int userId); 154 @NonNull String packageName, int flagMask, int flagValues, int callingUid, int userId, 161 int callingUid, int userId, @NonNull Collection<PackageParser.Package> packages, 165 int callingUid, int userId); [all...] |
/frameworks/base/services/usage/java/com/android/server/usage/ |
AppIdleHistory.java | 273 * @param userId 281 public AppUsageHistory reportUsage(String packageName, int userId, int newBucket, 283 ArrayMap<String, AppUsageHistory> userHistory = getUserHistory(userId); 288 private ArrayMap<String, AppUsageHistory> getUserHistory(int userId) { 289 ArrayMap<String, AppUsageHistory> userHistory = mIdleHistory.get(userId); 292 mIdleHistory.put(userId, userHistory); 293 readAppIdleTimes(userId, userHistory); 315 public void onUserRemoved(int userId) { 316 mIdleHistory.remove(userId); 319 public boolean isIdle(String packageName, int userId, long elapsedRealtime) [all...] |
/frameworks/base/telephony/java/com/android/internal/telephony/ |
SmsApplication.java | 172 * Returns the userId of the Context object, if called from a system app, 173 * otherwise it returns the caller's userId 212 int userId = getIncomingUserId(context); 215 return getApplicationCollectionInternal(context, userId); 222 Context context, int userId) { 228 userId); 254 userId); 274 userId); 294 userId); 310 packageManager.queryBroadcastReceiversAsUser(intent, 0, userId); [all...] |
/packages/apps/Settings/src/com/android/settings/applications/ |
InstalledAppCounter.java | 50 final int userId = UserHandle.getUserId(info.uid); 53 new UserHandle(userId)) != installReason) { 70 userId);
|
/packages/apps/Settings/src/com/android/settings/vpn2/ |
ManageablePreference.java | 30 * This class sets appropriate enabled state and user admin message when userId is set 51 public void setUserId(int userId) { 52 mUserId = userId; 53 checkRestrictionAndSetDisabled(UserManager.DISALLOW_CONFIG_VPN, userId);
|
/system/vold/ |
VoldNativeService.h | 40 binder::Status onUserAdded(int32_t userId, int32_t userSerial); 41 binder::Status onUserRemoved(int32_t userId); 42 binder::Status onUserStarted(int32_t userId); 43 binder::Status onUserStopped(int32_t userId); 101 binder::Status createUserKey(int32_t userId, int32_t userSerial, bool ephemeral); 102 binder::Status destroyUserKey(int32_t userId); 104 binder::Status addUserKeyAuth(int32_t userId, int32_t userSerial, 106 binder::Status fixateNewestUserKeyAuth(int32_t userId); 108 binder::Status unlockUserKey(int32_t userId, int32_t userSerial, 110 binder::Status lockUserKey(int32_t userId); [all...] |
/tools/tradefederation/core/src/com/android/tradefed/device/ |
TestDevice.java | 208 public String installPackageForUser(File packageFile, boolean reinstall, int userId, 217 args.add(Integer.toString(userId)); 226 boolean grantPermissions, int userId, String... extraArgs) 234 args.add(Integer.toString(userId)); [all...] |
/cts/hostsidetests/shortcuts/hostside/src/android/content/pm/cts/shortcuthost/ |
BaseShortcutManagerHostTest.java | 98 protected void clearShortcuts(String packageName, int userId) throws Exception { 100 getDevice().executeShellCommand("cmd shortcut clear-shortcuts --user " + userId 104 protected void installAppAsUser(String appFileName, int userId) throws FileNotFoundException, 106 CLog.i("Installing app " + appFileName + " for user " + userId); 109 buildHelper.getTestFile(appFileName), true, true, userId, "-t"); 110 assertNull("Failed to install " + appFileName + " for user " + userId + ": " + result, 120 String pkgName, @Nullable String testClassName, int userId) 122 runDeviceTestsAsUser(pkgName, testClassName, null /*testMethodName*/, userId); 127 String pkgName, @Nullable String testClassName, String testMethodName, int userId) 130 runDeviceTestsAsUser(pkgName, testClassName, testMethodName, userId, params) [all...] |
/frameworks/base/services/core/java/com/android/server/vr/ |
VrManagerService.java | 371 final int userId; 378 VrState(boolean enabled, boolean running2dInVr, ComponentName targetPackageName, int userId, 382 this.userId = userId; 390 VrState(boolean enabled, boolean running2dInVr, ComponentName targetPackageName, int userId, 394 this.userId = userId; 415 sb.append(userId); 669 int userId = mCurrentVrModeUser; 670 ArraySet<ComponentName> installed = mComponentObserver.getInstalled(userId); [all...] |
/cts/hostsidetests/multiuser/src/android/host/multiuser/ |
BaseMultiUserTest.java | 76 protected int createRestrictedProfile(int userId) 78 final String command = "pm create-user --profileOf " + userId + " --restricted " 97 * @return the userid of the created user 120 for (int userId : getDevice().listUsers()) { 121 if (!mFixedUsers.contains(userId)) { 122 getDevice().removeUser(userId);
|
/frameworks/base/core/java/android/accounts/ |
IAccountManager.aidl | 36 AuthenticatorDescription[] getAuthenticatorTypes(int userId); 40 Account[] getAccountsAsUser(String accountType, int userId, String opPackageName); 51 boolean expectActivityLaunch, int userId); 71 in Bundle options, int userId); 77 in Bundle options, boolean expectActivityLaunch, int userId); 83 Account[] getSharedAccountsAsUser(int userId); 84 boolean removeSharedAccountAsUser(in Account account, int userId); 85 void addSharedAccountsFromParentUser(int parentUserId, int userId, String opPackageName); 90 boolean renameSharedAccountAsUser(in Account accountToRename, String newName, int userId); 104 boolean expectActivityLaunch, in Bundle appInfo, int userId); [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/ |
LockSettingsServiceTestable.java | 123 protected void tieProfileLockToParent(int userId, String password) { 124 mStorage.writeChildProfileLock(userId, password.getBytes()); 128 protected String getDecryptedPasswordForTiedProfile(int userId) throws FileNotFoundException, 130 byte[] storedData = mStorage.readChildProfileLock(userId); 135 if (mGateKeeperService.getSecureUserId(userId) == 0) {
|
/packages/apps/Car/Settings/tests/robotests/src/com/android/car/settings/users/ |
EditUsernameFragmentTest.java | 104 int userId = 10; 105 createEditUsernameFragment(userId, "test_user"); 120 verify(mUserManager, never()).setUserName(userId, "new_user_name"); 123 private void createEditUsernameFragment(int userId, String userName) { 124 UserInfo testUser = new UserInfo(userId /* id */, userName, 0 /* flags */);
|
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/provisioning/ |
ProfileOwnerProvisioningController.java | 49 int userId, 51 this(context, params, userId, callback, new FinalizationController(context)); 58 int userId, 61 super(context, params, userId, callback, finalizationController); 62 mParentUserId = userId;
|
/packages/apps/Settings/src/com/android/settings/password/ |
ChooseLockGenericController.java | 41 public ChooseLockGenericController(Context context, int userId) { 44 userId, 46 ManagedLockPasswordProvider.get(context, userId)); 52 int userId, 56 mUserId = userId;
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
RecoverableKeyStoreManager.java | 178 int userId = UserHandle.getCallingUserId(); 189 String activeRootAlias = mDatabase.getActiveRootOfTrust(userId, uid); 197 long updatedRows = mDatabase.setActiveRootOfTrust(userId, uid, rootCertificateAlias); 214 Long oldSerial = mDatabase.getRecoveryServiceCertSerial(userId, uid, rootCertificateAlias); 243 long updatedCertPathRows = mDatabase.setRecoveryServiceCertPath(userId, uid, 246 long updatedCertSerialRows = mDatabase.setRecoveryServiceCertSerial(userId, uid, 255 if (mDatabase.getSnapshotVersion(userId, uid) != null) { 256 mDatabase.setShouldCreateSnapshot(userId, uid, true); 262 mDatabase.setCounterId(userId, uid, new SecureRandom().nextLong()); 351 int userId = UserHandle.getCallingUserId() [all...] |
/frameworks/base/services/core/java/com/android/server/slice/ |
SliceManagerService.java | 132 private void onUnlockUser(int userId) { 135 private void onStopUser(int userId) { 137 mPinnedSlicesByUri.values().removeIf(s -> getUserIdFromUri(s.getUri()) == userId); 151 int userId = ContentProvider.getUserIdFromUri(uri, callingUser); 152 if (userId == callingUser) { 222 int userId = UserHandle.getUserId(uid); 232 if (hasFullSliceAccess(pkg, userId)) { 235 if (mPermissions.hasPermission(pkg, userId, uri)) { 240 enforceOwner(pkg, uri, userId); 243 int providerUser = ContentProvider.getUserIdFromUri(uri, userId); [all...] |