/frameworks/base/core/java/com/android/internal/app/ |
H A D | IntentForwarderActivity.java | 60 final int targetUserId; 65 targetUserId = getProfileParent(); 68 targetUserId = getManagedProfile(); 72 targetUserId = UserHandle.USER_NULL; 74 if (targetUserId == UserHandle.USER_NULL) { 87 if (canForward(newIntent, targetUserId)) { 98 newIntent, MATCH_DEFAULT_ONLY, targetUserId); 108 startActivityAsCaller(newIntent, null, false, targetUserId); 130 + callingUserId + " to user " + targetUserId); 135 boolean canForward(Intent intent, int targetUserId) { argument [all...] |
/frameworks/base/packages/SystemUI/src/com/android/keyguard/ |
H A D | KeyguardSecurityCallback.java | 23 * @param targetUserId a user that needs to be the foreground user at the dismissal completion. 25 void dismiss(boolean securityVerified, int targetUserId); argument
|
H A D | ViewMediatorCallback.java | 34 * @param targetUserId a user that needs to be the foreground user at the completion. 36 void keyguardDone(boolean strongAuth, int targetUserId); argument 54 * @param targetUserId a user that needs to be the foreground user at the completion. 56 void keyguardDonePending(boolean strongAuth, int targetUserId); argument
|
H A D | KeyguardHostView.java | 180 * @param targetUserId a user that needs to be the foreground user at the dismissal completion. 183 public boolean dismiss(int targetUserId) { argument 184 return dismiss(false, targetUserId); 210 public boolean dismiss(boolean authenticated, int targetUserId) { argument 211 return mSecurityContainer.showNextSecurityScreenOrFinish(authenticated, targetUserId); 220 * @param targetUserId a user that needs to be the foreground user at the dismissal completion. 223 public void finish(boolean strongAuth, int targetUserId) { argument 234 mViewMediatorCallback.keyguardDonePending(strongAuth, targetUserId); 236 mViewMediatorCallback.keyguardDone(strongAuth, targetUserId);
|
H A D | KeyguardSecurityContainer.java | 56 public boolean dismiss(boolean authenticated, int targetUserId); argument 63 * @param targetUserId a user that needs to be the foreground user at the finish completion. 65 public void finish(boolean strongAuth, int targetUserId); argument 316 * @param targetUserId a user that needs to be the foreground user at the finish (if called) 320 boolean showNextSecurityScreenOrFinish(boolean authenticated, int targetUserId) { argument 324 if (mUpdateMonitor.getUserCanSkipBouncer(targetUserId)) { 327 SecurityMode securityMode = mSecurityModel.getSecurityMode(targetUserId); 345 SecurityMode securityMode = mSecurityModel.getSecurityMode(targetUserId); 362 mSecurityCallback.finish(strongAuth, targetUserId); 458 public void dismiss(boolean securityVerified, int targetUserId) { } 503 dismiss(boolean authenticated, int targetUserId) argument [all...] |
/frameworks/base/services/core/java/com/android/server/ |
H A D | InputContentUriTokenHandler.java | 50 @UserIdInt int targetUserId) { 55 mTargetUserId = targetUserId; 48 InputContentUriTokenHandler(@onNull Uri contentUri, int sourceUid, @NonNull String targetPackage, @UserIdInt int sourceUserId, @UserIdInt int targetUserId) argument
|
H A D | LockSettingsService.java | 1685 private void removeKeystoreProfileKey(int targetUserId) { argument 1686 if (DEBUG) Slog.v(TAG, "Remove keystore profile key for user: " + targetUserId); 1690 keyStore.deleteEntry(LockPatternUtils.PROFILE_KEY_NAME_ENCRYPT + targetUserId); 1691 keyStore.deleteEntry(LockPatternUtils.PROFILE_KEY_NAME_DECRYPT + targetUserId); 1695 Slog.e(TAG, "Unable to remove keystore profile key for user:" + targetUserId, e);
|
/frameworks/base/services/core/java/com/android/server/wm/ |
H A D | DragAndDropPermissionsHandler.java | 46 int sourceUserId, int targetUserId) { 51 mTargetUserId = targetUserId; 45 DragAndDropPermissionsHandler(ClipData clipData, int sourceUid, String targetPackage, int mode, int sourceUserId, int targetUserId) argument
|
/frameworks/base/services/core/java/com/android/server/fingerprint/ |
H A D | AuthenticationClient.java | 45 IFingerprintServiceReceiver receiver, int targetUserId, int groupId, long opId, 47 super(context, halDeviceId, token, receiver, targetUserId, groupId, restricted, owner); 44 AuthenticationClient(Context context, long halDeviceId, IBinder token, IFingerprintServiceReceiver receiver, int targetUserId, int groupId, long opId, boolean restricted, String owner) argument
|
/frameworks/base/services/core/java/com/android/server/job/ |
H A D | GrantedUriPermissions.java | 64 int sourceUid, String targetPackage, int targetUserId, String tag) { 74 perms = grantUri(am, data, sourceUid, targetPackage, targetUserId, grantFlags, tag, 80 perms = grantClip(am, clip, sourceUid, targetPackage, targetUserId, grantFlags, tag, 88 int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag) { 94 perms = grantClip(am, clip, sourceUid, targetPackage, targetUserId, grantFlags, 101 int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag, 105 curPerms = grantItem(am, clip.getItemAt(i), sourceUid, targetPackage, targetUserId, 112 int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag, 122 uri, grantFlags, sourceUserId, targetUserId); 131 int sourceUid, String targetPackage, int targetUserId, in 63 createFromIntent(IActivityManager am, Intent intent, int sourceUid, String targetPackage, int targetUserId, String tag) argument 87 createFromClip(IActivityManager am, ClipData clip, int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag) argument 100 grantClip(IActivityManager am, ClipData clip, int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag, GrantedUriPermissions curPerms) argument 111 grantUri(IActivityManager am, Uri uri, int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag, GrantedUriPermissions curPerms) argument 130 grantItem(IActivityManager am, ClipData.Item item, int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag, GrantedUriPermissions curPerms) argument [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | CrossProfileIntentFilter.java | 34 private static final String ATTR_TARGET_USER_ID = "targetUserId"; 46 CrossProfileIntentFilter(IntentFilter filter, String ownerPackage, int targetUserId, argument 49 mTargetUserId = targetUserId;
|
H A D | LauncherAppsService.java | 229 * @return TRUE if the calling user can access {@code targetUserId}. FALSE if not *but 235 private boolean canAccessProfile(String callingPackage, int targetUserId, String message) { argument 238 if (targetUserId == callingUserId) return true; 245 + targetUserId + " from " + callingUserId); 249 UserInfo targetUserInfo = mUm.getUserInfo(targetUserId); 253 throw new SecurityException(message + " for unrelated profile " + targetUserId); 485 int targetUserId) { 487 if (!canAccessProfile(callingPackage, targetUserId, "Cannot access shortcuts")) { 490 if (!isUserEnabled(targetUserId)) { 495 callingPackage, packageName, id, targetUserId); 484 getShortcutIconResId(String callingPackage, String packageName, String id, int targetUserId) argument 499 getShortcutIconFd(String callingPackage, String packageName, String id, int targetUserId) argument 521 startShortcut(String callingPackage, String packageName, String shortcutId, Rect sourceBounds, Bundle startActivityOptions, int targetUserId) argument [all...] |
H A D | UserManagerService.java | 1098 public ParcelFileDescriptor getUserIcon(int targetUserId) { argument 1101 UserInfo targetUserInfo = getUserInfoNoChecks(targetUserId); 1103 Slog.w(LOG_TAG, "getUserIcon: unknown user #" + targetUserId); 1112 if ((callingUserId != targetUserId) && !sameGroup) {
|
H A D | PackageManagerService.java | 6782 * Returns if intent can be forwarded from the sourceUserId to the targetUserId 6786 int targetUserId) { 6794 if (matches.get(i).getTargetUserId() == targetUserId) return true; 6961 if (xpResolveInfo != null && isUserEnabled(xpResolveInfo.targetUserId)) { 7495 // Two {@link CrossProfileIntentFilter}s can have the same targetUserId and 7502 int targetUserId = filter.getTargetUserId(); 7507 if (!skipCurrentProfile && !alreadyTriedUserIds.get(targetUserId) 7514 alreadyTriedUserIds.put(targetUserId, true); 7528 int targetUserId = filter.getTargetUserId(); 7530 resolvedType, flags, targetUserId); 6785 canForwardTo(Intent intent, String resolvedType, int sourceUserId, int targetUserId) argument 7544 createForwardingResolveInfoUnchecked(IntentFilter filter, int sourceUserId, int targetUserId) argument 20902 addCrossProfileIntentFilter(IntentFilter intentFilter, String ownerPackage, int sourceUserId, int targetUserId, int flags) argument [all...] |
/frameworks/base/core/java/android/content/pm/ |
H A D | ResolveInfo.java | 152 public int targetUserId; field in class:ResolveInfo 316 targetUserId = UserHandle.USER_CURRENT; 335 targetUserId = orig.targetUserId; 358 if (targetUserId != UserHandle.USER_CURRENT) { 359 sb.append(" targetUserId="); 360 sb.append(targetUserId); 397 dest.writeInt(targetUserId); 445 targetUserId = source.readInt(); 462 if (a.targetUserId ! [all...] |
H A D | PackageManager.java | 5444 * by activities in the user with id targetUserId if they match the 5449 * @param targetUserId The target user id. 5455 int targetUserId, int flags); 5454 addCrossProfileIntentFilter(IntentFilter filter, int sourceUserId, int targetUserId, int flags) argument
|
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | UriPermission.java | 47 final int targetUserId; field in class:UriPermission 89 this.targetUserId = UserHandle.getUserId(targetUid); 319 pw.print("targetUserId=" + targetUserId); 364 final int targetUserId; field in class:UriPermission.Snapshot 372 this.targetUserId = perm.targetUserId;
|
H A D | UserController.java | 975 void startUserInForeground(final int targetUserId) { argument 976 boolean success = startUser(targetUserId, /* foreground */ true); 1288 int targetUserId = unsafeConvertIncomingUserLocked(userId); 1309 allow = isSameProfileGroup(callingUserId, targetUserId); 1317 targetUserId = callingUserId; 1342 if (!allowAll && targetUserId < 0) { 1344 "Call does not support special user #" + targetUserId); 1347 if (callingUid == Process.SHELL_UID && targetUserId >= UserHandle.USER_SYSTEM) { 1348 if (hasUserRestriction(UserManager.DISALLOW_DEBUGGING_FEATURES, targetUserId)) { 1350 + targetUserId 1531 setTargetUserIdLocked(int targetUserId) argument 1566 isSameProfileGroup(int callingUserId, int targetUserId) argument [all...] |
H A D | ActivityManagerService.java | 1089 private static final String ATTR_TARGET_USER_ID = "targetUserId"; 8798 final int modeFlags, UriPermissionOwner owner, int targetUserId) { 8805 targetUid = pm.getPackageUid(targetPkg, MATCH_DEBUG_TRIAGED_MISSING, targetUserId); 8836 String targetPkg, Intent intent, int mode, NeededUriGrants needed, int targetUserId) { 8867 targetUserId); 8874 + " on user " + targetUserId); 8906 callingUid, targetPkg, clipIntent, mode, needed, targetUserId); 8933 String targetPkg, Intent intent, UriPermissionOwner owner, int targetUserId) { 8935 intent, intent != null ? intent.getFlags() : 0, null, targetUserId); 9200 * @param targetUserId Th 8797 grantUriPermissionLocked(int callingUid, String targetPkg, GrantUri grantUri, final int modeFlags, UriPermissionOwner owner, int targetUserId) argument 8835 checkGrantUriPermissionFromIntentLocked(int callingUid, String targetPkg, Intent intent, int mode, NeededUriGrants needed, int targetUserId) argument 8932 grantUriPermissionFromIntentLocked(int callingUid, String targetPkg, Intent intent, UriPermissionOwner owner, int targetUserId) argument 9203 grantUriPermissionFromOwner(IBinder token, int fromUid, String targetPkg, Uri uri, final int modeFlags, int sourceUserId, int targetUserId) argument 23487 switchUser(final int targetUserId) argument 23722 grantUriPermissionFromIntent(int callingUid, String targetPkg, Intent intent, int targetUserId) argument [all...] |
/frameworks/base/core/java/android/app/ |
H A D | ActivityManagerInternal.java | 79 Intent intent, int targetUserId); 78 grantUriPermissionFromIntent(int callingUid, String targetPkg, Intent intent, int targetUserId) argument
|
H A D | ApplicationPackageManager.java | 2425 public void addCrossProfileIntentFilter(IntentFilter filter, int sourceUserId, int targetUserId, argument 2429 sourceUserId, targetUserId, flags);
|
/frameworks/base/test-runner/src/android/test/mock/ |
H A D | MockPackageManager.java | 1104 public void addCrossProfileIntentFilter(IntentFilter filter, int sourceUserId, int targetUserId, argument
|
/frameworks/base/tools/layoutlib/bridge/src/com/android/layoutlib/bridge/android/ |
H A D | BridgePackageManager.java | 911 public void addCrossProfileIntentFilter(IntentFilter filter, int sourceUserId, int targetUserId, argument
|
/frameworks/base/services/tests/servicestests/src/com/android/server/pm/ |
H A D | BaseShortcutManagerTest.java | 1771 protected List<ShortcutInfo> getShortcutAsLauncher(int targetUserId) { argument 1775 return mLauncherApps.getShortcuts(q, UserHandle.of(targetUserId));
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
H A D | DevicePolicyManagerService.java | 10569 @NonNull IServiceConnection connection, int flags, @UserIdInt int targetUserId) { 10581 Preconditions.checkArgument(mInjector.userHandleGetCallingUserId() != targetUserId, 10584 if (!getBindDeviceAdminTargetUsers(admin).contains(UserHandle.of(targetUserId))) { 10590 targetPackage = getOwnerPackageNameForUserLocked(targetUserId); 10597 createCrossUserServiceIntent(serviceIntent, targetPackage, targetUserId); 10608 targetUserId) != 0; 10941 @UserIdInt int targetUserId) throws RemoteException, SecurityException { 10946 targetUserId); 10949 + " or user " + targetUserId + " is not running"); 10566 bindDeviceAdminServiceAsUser( @onNull ComponentName admin, @NonNull IApplicationThread caller, @Nullable IBinder activtiyToken, @NonNull Intent serviceIntent, @NonNull IServiceConnection connection, int flags, @UserIdInt int targetUserId) argument 10939 createCrossUserServiceIntent( @onNull Intent rawIntent, @NonNull String expectedPackageName, @UserIdInt int targetUserId) argument
|