/frameworks/base/services/core/java/com/android/server/om/ |
OverlayManagerServiceImpl.java | 166 mSettings.remove(oi.packageName, oi.userId); 234 void onUserRemoved(final int userId) { 236 Slog.d(TAG, "onUserRemoved userId=" + userId); 238 mSettings.removeUser(userId); 241 void onTargetPackageAdded(@NonNull final String packageName, final int userId) { 243 Slog.d(TAG, "onTargetPackageAdded packageName=" + packageName + " userId=" + userId); 246 if (updateAllOverlaysForTarget(packageName, userId, 0)) { 247 mListener.onOverlaysChanged(packageName, userId); [all...] |
OverlayManagerService.java | 369 for (final int userId : userIds) { 371 final PackageInfo pi = mPackageManager.getPackageInfo(packageName, userId, 374 mPackageManager.cachePackageInfo(packageName, userId, pi); 376 mImpl.onOverlayPackageAdded(packageName, userId); 378 mImpl.onTargetPackageAdded(packageName, userId); 387 for (int userId : userIds) { 389 final PackageInfo pi = mPackageManager.getPackageInfo(packageName, userId, 392 mPackageManager.cachePackageInfo(packageName, userId, pi); 394 mImpl.onOverlayPackageChanged(packageName, userId); 396 mImpl.onTargetPackageChanged(packageName, userId); [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/pm/ |
UserManagerServiceIdRecyclingTest.java | 67 int userId = mUserManagerService.getNextAvailableId(); 68 assertEquals(i, userId); 69 mUserManagerService.putUserInfo(newUserInfo(userId)); 95 int userId = mUserManagerService.getNextAvailableId(); 96 assertTrue("Returned id should not be recent. Id=" + userId + ". Recents=" + queue, 97 queue.add(userId)); 101 mUserManagerService.putUserInfo(newUserInfo(userId)); 102 removeUser(userId); 106 private void removeUser(int userId) { 107 mUserManagerService.removeUserInfo(userId); [all...] |
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/task/ |
SetDevicePolicyTask.java | 68 public void run(int userId) { 72 mProvisioningParams.inferDeviceAdminComponentName(mUtils, mContext, userId); 76 setActiveAdmin(adminComponent, userId); 78 success = setProfileOwner(adminComponent, userId); 82 userId); 110 private void setActiveAdmin(ComponentName component, int userId) { 112 mDevicePolicyManager.setActiveAdmin(component, true, userId); 115 private boolean setDeviceOwner(ComponentName component, String owner, int userId) { 116 ProvisionLogger.logd("Setting " + component + " as device owner of user " + userId); 118 return mDevicePolicyManager.setDeviceOwner(component, owner, userId); [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
UserDataPreparer.java | 69 void prepareUserData(int userId, int userSerial, int flags) { 74 prepareUserDataLI(volumeUuid, userId, userSerial, flags, true); 79 private void prepareUserDataLI(String volumeUuid, int userId, int userSerial, int flags, 85 storage.prepareUserStorage(volumeUuid, userId, userSerial, flags); 88 enforceSerialNumber(getDataUserDeDirectory(volumeUuid, userId), userSerial); 90 enforceSerialNumber(getDataSystemDeDirectory(userId), userSerial); 94 enforceSerialNumber(getDataUserCeDirectory(volumeUuid, userId), userSerial); 96 enforceSerialNumber(getDataSystemCeDirectory(userId), userSerial); 100 mInstaller.createUserData(volumeUuid, userId, userSerial, flags); 104 (userId == UserHandle.USER_SYSTEM)) [all...] |
ProtectedPackages.java | 73 private synchronized boolean hasDeviceOwnerOrProfileOwner(int userId, String packageName) { 78 if ((mDeviceOwnerUserId == userId) 84 if (packageName.equals(mProfileOwnerPackages.get(userId))) { 91 public synchronized String getDeviceOwnerOrProfileOwnerPackage(int userId) { 92 if (mDeviceOwnerUserId == userId) { 95 return mProfileOwnerPackages.get(userId); 114 public boolean isPackageStateProtected(@UserIdInt int userId, String packageName) { 115 return hasDeviceOwnerOrProfileOwner(userId, packageName) 123 public boolean isPackageDataProtected(@UserIdInt int userId, String packageName) { 124 return hasDeviceOwnerOrProfileOwner(userId, packageName [all...] |
InstantAppRegistry.java | 123 * UserID -> TargetAppId -> InstantAppId 128 /** The set of all installed instant apps. UserID -> AppID */ 138 @UserIdInt int userId) { 145 byte[] pendingCookie = mCookiePersistence.getPendingPersistCookieLPr(pkg, userId); 149 File cookieFile = peekInstantCookieFile(packageName, userId); 161 @Nullable byte[] cookie, @UserIdInt int userId) { 178 mCookiePersistence.schedulePersistLPw(userId, pkg, cookie); 183 @NonNull String packageName, @NonNull File cookieFile, @UserIdInt int userId) { 185 File appDir = getInstantApplicationDir(packageName, userId); 208 @UserIdInt int userId) { [all...] |
/frameworks/base/core/java/android/app/ |
IWallpaperManager.aidl | 48 IWallpaperManagerCallback completion, int userId); 53 void setWallpaperComponentChecked(in ComponentName name, in String callingPackage, int userId); 64 out Bundle outParams, int userId); 69 int getWallpaperIdForUser(int which, int userId); 76 WallpaperInfo getWallpaperInfo(int userId); 81 void clearWallpaper(in String callingPackage, int which, int userId); 132 boolean isWallpaperBackupEligible(int which, int userId); 147 WallpaperColors getWallpaperColors(int which, int userId); 152 void registerWallpaperColorsCallback(IWallpaperManagerCallback cb, int userId); 157 void unregisterWallpaperColorsCallback(IWallpaperManagerCallback cb, int userId); [all...] |
/frameworks/base/core/java/android/app/usage/ |
IUsageStatsManager.aidl | 39 UsageEvents queryEventsForUser(long beginTime, long endTime, int userId, String callingPackage); 40 UsageEvents queryEventsForPackageForUser(long beginTime, long endTime, int userId, String pkg, String callingPackage); 41 void setAppInactive(String packageName, boolean inactive, int userId); 42 boolean isAppInactive(String packageName, int userId); 43 void whitelistAppTemporarily(String packageName, long duration, int userId); 45 void reportChooserSelection(String packageName, int userId, String contentType, 47 int getAppStandbyBucket(String packageName, String callingPackage, int userId); 48 void setAppStandbyBucket(String packageName, int bucket, int userId); 49 ParceledListSlice getAppStandbyBuckets(String callingPackage, int userId); 50 void setAppStandbyBuckets(in ParceledListSlice appBuckets, int userId); [all...] |
/packages/apps/Nfc/src/com/android/nfc/cardemulation/ |
CardEmulationManager.java | 149 public void onUserSwitched(int userId) { 151 mServiceCache.invalidateCache(userId); 152 mPreferredServices.onUserSwitched(userId); 156 mEnabledNfcFServices.onUserSwitched(userId); 158 mNfcFServicesCache.invalidateCache(userId); 190 public void onServicesUpdated(int userId, List<ApduServiceInfo> services) { 192 verifyDefaults(userId, services); 194 mAidCache.onServicesUpdated(userId, services); 200 public void onNfcFServicesUpdated(int userId, List<NfcFServiceInfo> services) { 202 mT3tIdentifiersCache.onServicesUpdated(userId, services) [all...] |
/frameworks/base/services/core/java/com/android/server/trust/ |
TrustManagerService.java | 182 int userId; 190 return component.equals(o.component) && userId == o.userId; 195 return component.hashCode() * 31 + userId; 206 public void updateTrust(int userId, int flags) { 207 boolean managed = aggregateIsTrustManaged(userId); 208 dispatchOnTrustManagedChanged(managed, userId); 209 if (mStrongAuthTracker.isTrustAllowedForUser(userId) 210 && isTrustUsuallyManagedInternal(userId) != managed) { 211 updateTrustUsuallyManaged(userId, managed) [all...] |
/platform_testing/libraries/system-helpers/user-helper/src/android/system/helpers/ |
UserHelper.java | 65 int userId = INVALID_USER_ID; 67 userId = Integer.parseInt(matcher.group(1)); 68 Log.i(TAG, String.format("User Name:%s User ID:%d", userName, userId)); 70 return userId; 75 * @return userid 82 int userId = INVALID_USER_ID; 84 userId = Integer.parseInt(matcher.group(1)); // 1 = id 2 = flag 85 Log.i(TAG, String.format("The userId is %d", userId)); 87 return userId; [all...] |
/frameworks/base/services/core/java/com/android/server/locksettings/ |
LockSettingsStrongAuth.java | 98 private void handleRequireStrongAuth(int strongAuthReason, int userId) { 99 if (userId == UserHandle.USER_ALL) { 105 handleRequireStrongAuthOneUser(strongAuthReason, userId); 109 private void handleRequireStrongAuthOneUser(int strongAuthReason, int userId) { 110 int oldValue = mStrongAuthForUser.get(userId, mDefaultStrongAuthFlags); 115 mStrongAuthForUser.put(userId, newValue); 116 notifyStrongAuthTrackers(newValue, userId); 120 private void handleRemoveUser(int userId) { 121 int index = mStrongAuthForUser.indexOfKey(userId); 124 notifyStrongAuthTrackers(mDefaultStrongAuthFlags, userId); [all...] |
SyntheticPasswordManager.java | 404 public void removeUser(int userId) { 405 for (long handle : mStorage.listSyntheticPasswordHandlesForUser(SP_BLOB_NAME, userId)) { 406 destroyWeaverSlot(handle, userId); 411 public int getCredentialType(long handle, int userId) { 412 byte[] passwordData = loadState(PASSWORD_DATA_NAME, handle, userId); 414 Log.w(TAG, "getCredentialType: encountered empty password data for user " + userId); 443 byte[] hash, String credential, int userId) throws RemoteException { 447 response = gatekeeper.enroll(userId, hash, credential.getBytes(), 450 Log.w(TAG, "Fail to migrate SID, assuming no SID, user " + userId); 451 clearSidForUser(userId); [all...] |
LockSettingsService.java | 250 protected void handleStrongAuthRequiredChanged(int strongAuthFlags, int userId) { 252 super.handleStrongAuthRequiredChanged(strongAuthFlags, userId); 257 public int getStrongAuthForUser(int userId) { 259 return super.getStrongAuthForUser(userId); 449 private void maybeShowEncryptionNotificationForUser(@UserIdInt int userId) { 450 final UserInfo user = mUserManager.getUserInfo(userId); 459 final boolean isSecure = isUserSecure(userId); 461 UserInfo parent = mUserManager.getProfileParent(userId); 526 public void onCleanupUser(int userId) { 527 hideEncryptionNotification(new UserHandle(userId)); [all...] |
/frameworks/base/core/java/android/app/trust/ |
TrustManager.java | 57 * @param userId The id for the user to be locked/unlocked. 61 public void setDeviceLockedForUser(int userId, boolean locked) { 63 mService.setDeviceLockedForUser(userId, locked); 70 * Reports that user {@param userId} has tried to unlock the device. 76 public void reportUnlockAttempt(boolean successful, int userId) { 78 mService.reportUnlockAttempt(successful, userId); 85 * Reports that user {@param userId} has entered a temporary device lockout. 96 public void reportUnlockLockout(int timeoutMs, int userId) { 98 mService.reportUnlockLockout(timeoutMs, userId); 105 * Reports that the list of enabled trust agents changed for user {@param userId} [all...] |
/frameworks/base/packages/SystemUI/src/com/android/keyguard/ |
KeyguardUpdateMonitorCallback.java | 112 public void onUserSwitching(int userId) { } 117 public void onUserSwitchComplete(int userId) { } 129 public void onUserInfoChanged(int userId) { } 203 public void onTrustChanged(int userId) { } 208 public void onTrustManagedChanged(int userId) { } 213 public void onTrustGrantedWithFlags(int flags, int userId) { } 230 * @param userId the user id for which the fingerprint was authenticated 232 public void onFingerprintAuthenticated(int userId) { } 252 public void onFaceUnlockStateChanged(boolean running, int userId) { } 263 public void onStrongAuthStateChanged(int userId) { } [all...] |
/frameworks/base/core/java/android/accounts/ |
AccountManagerInternal.java | 53 * @param userId Concrete user id for which to request. 57 @NonNull String packageName, @IntRange(from = 0) int userId, 79 * @param userId The user for which to backup. 82 public abstract byte[] backupAccountAccessPermissions(int userId); 87 * @param userId The user for which to restore. 89 public abstract void restoreAccountAccessPermissions(byte[] data, int userId);
|
/frameworks/base/services/core/java/com/android/server/net/ |
NetworkPolicyManagerInternal.java | 35 public abstract void resetUserState(int userId); 87 * @param userId the userId in which {@param packagesNames} are restricted. 90 Set<String> packageNames, int userId); 98 Set<String> packageNames, int userId);
|
/frameworks/base/services/core/java/com/android/server/vr/ |
VrManagerInternal.java | 40 * @param userId the user ID to check the package name for. 44 public abstract boolean isCurrentVrListener(String packageName, int userId); 54 * @param userId the user requesting the VrListenerService component. 59 int userId, int processId, @NonNull ComponentName calling); 77 public abstract int hasVrPackage(@NonNull ComponentName packageName, int userId);
|
/packages/apps/StorageManager/robotests/src/android/util/ |
IconDrawableFactory.java | 35 public Drawable getBadgedIcon(ApplicationInfo appInfo, int userId) { 36 return getBadgedIcon(appInfo, appInfo, userId); 39 public Drawable getBadgedIcon(PackageItemInfo itemInfo, ApplicationInfo appInfo, int userId) {
|
/packages/services/Telecomm/src/com/android/server/telecom/ |
DefaultDialerCache.java | 42 String getDefaultDialerApplication(Context context, int userId); 43 boolean setDefaultDialerApplication(Context context, String packageName, int userId); 53 public String getDefaultDialerApplication(Context context, int userId) { 54 return DefaultDialerManager.getDefaultDialerApplication(context, userId); 59 int userId) { 60 return DefaultDialerManager.setDefaultDialerApplication(context, packageName, userId); 166 public String getDefaultDialerApplication(int userId) { 167 if (userId == UserHandle.USER_CURRENT) { 168 userId = ActivityManager.getCurrentUser(); 171 if (userId < 0) [all...] |
/cts/hostsidetests/devicepolicy/src/com/android/cts/devicepolicy/ |
BaseDevicePolicyTest.java | 173 protected void installAppAsUser(String appFileName, int userId) throws FileNotFoundException, 175 installAppAsUser(appFileName, true, userId); 178 protected void installAppAsUser(String appFileName, boolean grantPermissions, int userId) 180 CLog.d("Installing app " + appFileName + " for user " + userId); 183 buildHelper.getTestFile(appFileName), true, grantPermissions, userId, "-t"); 184 assertNull("Failed to install " + appFileName + " for user " + userId + ": " + result, 188 protected void forceStopPackageForUser(String packageName, int userId) throws Exception { 190 executeShellCommand("am force-stop --user " + userId + " " + packageName); 200 protected void startUser(int userId) throws Exception { 201 getDevice().startUser(userId); [all...] |
/frameworks/base/core/java/android/view/autofill/ |
IAutoFillManager.aidl | 39 int addClient(in IAutoFillManagerClient client, int userId); 40 void removeClient(in IAutoFillManagerClient client, int userId); 42 in Rect bounds, in AutofillValue value, int userId, boolean hasCallback, int flags, 47 in AutofillValue value, int action, int flags, int userId); 49 in AutofillId autoFillId, in Rect bounds, in AutofillValue value, int userId, 52 void setAutofillFailure(int sessionId, in List<AutofillId> ids, int userId); 53 void finishSession(int sessionId, int userId); 54 void cancelSession(int sessionId, int userId); 55 void setAuthenticationResult(in Bundle data, int sessionId, int authenticationId, int userId); 56 void setHasCallback(int sessionId, int userId, boolean hasIt) [all...] |
/frameworks/base/core/java/android/content/pm/ |
InstantAppRequest.java | 38 public final int userId; 49 String resolvedType, String callingPackage, int userId, Bundle verificationBundle, 55 this.userId = userId;
|