Searched defs:targetUserId (Results 1 - 25 of 32) sorted by relevance

12

/frameworks/base/packages/SystemUI/src/com/android/keyguard/
H A DKeyguardSecurityCallback.java23 * @param targetUserId a user that needs to be the foreground user at the dismissal completion.
25 void dismiss(boolean securityVerified, int targetUserId); argument
H A DViewMediatorCallback.java34 * @param targetUserId a user that needs to be the foreground user at the completion.
36 void keyguardDone(boolean strongAuth, int targetUserId); argument
54 * @param targetUserId a user that needs to be the foreground user at the completion.
56 void keyguardDonePending(boolean strongAuth, int targetUserId); argument
H A DKeyguardHostView.java188 * @param targetUserId a user that needs to be the foreground user at the dismissal completion.
191 public boolean dismiss(int targetUserId) { argument
192 return dismiss(false, targetUserId);
208 public boolean dismiss(boolean authenticated, int targetUserId) { argument
209 return mSecurityContainer.showNextSecurityScreenOrFinish(authenticated, targetUserId);
218 * @param targetUserId a user that needs to be the foreground user at the dismissal completion.
221 public void finish(boolean strongAuth, int targetUserId) { argument
232 mViewMediatorCallback.keyguardDonePending(strongAuth, targetUserId);
234 mViewMediatorCallback.keyguardDone(strongAuth, targetUserId);
H A DKeyguardSecurityContainer.java59 public boolean dismiss(boolean authenticated, int targetUserId); argument
66 * @param targetUserId a user that needs to be the foreground user at the finish completion.
68 public void finish(boolean strongAuth, int targetUserId); argument
315 * @param targetUserId a user that needs to be the foreground user at the finish (if called)
319 boolean showNextSecurityScreenOrFinish(boolean authenticated, int targetUserId) { argument
323 if (mUpdateMonitor.getUserCanSkipBouncer(targetUserId)) {
326 SecurityMode securityMode = mSecurityModel.getSecurityMode(targetUserId);
344 SecurityMode securityMode = mSecurityModel.getSecurityMode(targetUserId);
361 mSecurityCallback.finish(strongAuth, targetUserId);
461 public void dismiss(boolean securityVerified, int targetUserId) { }
507 dismiss(boolean authenticated, int targetUserId) argument
[all...]
/frameworks/base/core/java/com/android/internal/app/
H A DIntentForwarderActivity.java65 final int targetUserId;
69 targetUserId = getProfileParent();
72 targetUserId = getManagedProfile();
76 targetUserId = UserHandle.USER_NULL;
78 if (targetUserId == UserHandle.USER_NULL) {
85 final Intent newIntent = canForward(intentReceived, targetUserId);
100 targetUserId);
110 startActivityAsCaller(newIntent, null, false, targetUserId);
132 + callingUserId + " to user " + targetUserId);
141 Intent canForward(Intent incomingIntent, int targetUserId) { argument
[all...]
/frameworks/base/services/core/java/com/android/server/
H A DInputContentUriTokenHandler.java50 @UserIdInt int targetUserId) {
55 mTargetUserId = targetUserId;
48 InputContentUriTokenHandler(@onNull Uri contentUri, int sourceUid, @NonNull String targetPackage, @UserIdInt int sourceUserId, @UserIdInt int targetUserId) argument
/frameworks/base/services/core/java/com/android/server/wm/
H A DDragAndDropPermissionsHandler.java46 int sourceUserId, int targetUserId) {
51 mTargetUserId = targetUserId;
45 DragAndDropPermissionsHandler(ClipData clipData, int sourceUid, String targetPackage, int mode, int sourceUserId, int targetUserId) argument
/frameworks/base/services/core/java/com/android/server/job/
H A DGrantedUriPermissions.java65 int sourceUid, String targetPackage, int targetUserId, String tag) {
75 perms = grantUri(am, data, sourceUid, targetPackage, targetUserId, grantFlags, tag,
81 perms = grantClip(am, clip, sourceUid, targetPackage, targetUserId, grantFlags, tag,
89 int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag) {
95 perms = grantClip(am, clip, sourceUid, targetPackage, targetUserId, grantFlags,
102 int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag,
106 curPerms = grantItem(am, clip.getItemAt(i), sourceUid, targetPackage, targetUserId,
113 int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag,
123 uri, grantFlags, sourceUserId, targetUserId);
132 int sourceUid, String targetPackage, int targetUserId, in
64 createFromIntent(IActivityManager am, Intent intent, int sourceUid, String targetPackage, int targetUserId, String tag) argument
88 createFromClip(IActivityManager am, ClipData clip, int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag) argument
101 grantClip(IActivityManager am, ClipData clip, int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag, GrantedUriPermissions curPerms) argument
112 grantUri(IActivityManager am, Uri uri, int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag, GrantedUriPermissions curPerms) argument
131 grantItem(IActivityManager am, ClipData.Item item, int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag, GrantedUriPermissions curPerms) argument
[all...]
/frameworks/base/services/core/java/com/android/server/pm/
H A DCrossProfileIntentFilter.java34 private static final String ATTR_TARGET_USER_ID = "targetUserId";
46 CrossProfileIntentFilter(IntentFilter filter, String ownerPackage, int targetUserId, argument
49 mTargetUserId = targetUserId;
H A DLauncherAppsService.java234 * @return TRUE if the calling user can access {@code targetUserId}. FALSE if not *but
240 private boolean canAccessProfile(int targetUserId, String message) { argument
243 if (targetUserId == callingUserId) return true;
250 + targetUserId + " from " + callingUserId + " not allowed");
257 return mUserManagerInternal.isProfileAccessible(injectCallingUserId(), targetUserId,
462 int targetUserId) {
464 if (!canAccessProfile(targetUserId, "Cannot access shortcuts")) {
469 callingPackage, packageName, id, targetUserId);
474 String packageName, String id, int targetUserId) {
476 if (!canAccessProfile(targetUserId, "Canno
461 getShortcutIconResId(String callingPackage, String packageName, String id, int targetUserId) argument
473 getShortcutIconFd(String callingPackage, String packageName, String id, int targetUserId) argument
492 startShortcut(String callingPackage, String packageName, String shortcutId, Rect sourceBounds, Bundle startActivityOptions, int targetUserId) argument
[all...]
/frameworks/base/core/java/android/content/pm/
H A DResolveInfo.java152 public int targetUserId; field in class:ResolveInfo
350 targetUserId = UserHandle.USER_CURRENT;
369 targetUserId = orig.targetUserId;
392 if (targetUserId != UserHandle.USER_CURRENT) {
393 sb.append(" targetUserId=");
394 sb.append(targetUserId);
431 dest.writeInt(targetUserId);
479 targetUserId = source.readInt();
496 if (a.targetUserId !
[all...]
/frameworks/base/core/java/android/os/
H A DUserManagerInternal.java192 * Checks if the {@code callingUserId} and {@code targetUserId} are same or in same group
194 * {@code targetUserId} is enabled.
196 * @return TRUE if the {@code callingUserId} can access {@code targetUserId}. FALSE
202 public abstract boolean isProfileAccessible(int callingUserId, int targetUserId, argument
/frameworks/base/services/core/java/com/android/server/am/
H A DUriPermission.java49 final int targetUserId; field in class:UriPermission
91 this.targetUserId = UserHandle.getUserId(targetUid);
322 pw.print("targetUserId=" + targetUserId);
367 final int targetUserId; field in class:UriPermission.Snapshot
375 this.targetUserId = perm.targetUserId;
H A DActivityStartController.java229 * If {@code validateIncomingUser} is true, check {@code targetUserId} against the real calling
234 * ensures {@code targetUserId} is a real user ID and not a special user ID such as
237 int checkTargetUser(int targetUserId, boolean validateIncomingUser, argument
241 targetUserId, false, ALLOW_FULL_ONLY, reason, null);
243 mService.mUserController.ensureNotSpecialUser(targetUserId);
244 return targetUserId;
H A DUserController.java1102 void startUserInForeground(final int targetUserId) { argument
1103 boolean success = startUser(targetUserId, /* foreground */ true);
1199 boolean switchUser(final int targetUserId) { argument
1200 enforceShellRestriction(UserManager.DISALLOW_DEBUGGING_FEATURES, targetUserId);
1202 UserInfo targetUserInfo = getUserInfo(targetUserId);
1203 if (targetUserId == currentUserId) {
1204 Slog.i(TAG, "user #" + targetUserId + " is already the current user");
1208 Slog.w(TAG, "No user info for user #" + targetUserId);
1212 Slog.w(TAG, "Cannot switch to User #" + targetUserId + ": not supported");
1216 Slog.w(TAG, "Cannot switch to User #" + targetUserId
1802 isSameProfileGroup(int callingUserId, int targetUserId) argument
[all...]
/frameworks/base/services/core/java/com/android/server/fingerprint/
H A DAuthenticationClient.java89 IFingerprintServiceReceiver receiver, int targetUserId, int groupId, long opId,
92 super(context, halDeviceId, token, receiver, targetUserId, groupId, restricted, owner);
88 AuthenticationClient(Context context, long halDeviceId, IBinder token, IFingerprintServiceReceiver receiver, int targetUserId, int groupId, long opId, boolean restricted, String owner, Bundle bundle, IBiometricPromptReceiver dialogReceiver, IStatusBarService statusBarService) argument
/frameworks/base/services/core/java/com/android/server/clipboard/
H A DClipboardService.java529 int targetUserId) {
538 targetUserId);
547 int targetUserId) {
549 grantUriLocked(item.getUri(), sourceUid, targetPkg, targetUserId);
553 grantUriLocked(intent.getData(), sourceUid, targetPkg, targetUserId);
528 grantUriLocked(Uri uri, int sourceUid, String targetPkg, int targetUserId) argument
546 grantItemLocked(ClipData.Item item, int sourceUid, String targetPkg, int targetUserId) argument
/frameworks/base/core/java/android/app/
H A DActivityManagerInternal.java104 Intent intent, int targetUserId);
103 grantUriPermissionFromIntent(int callingUid, String targetPkg, Intent intent, int targetUserId) argument
H A DApplicationPackageManager.java2482 public void addCrossProfileIntentFilter(IntentFilter filter, int sourceUserId, int targetUserId, argument
2486 sourceUserId, targetUserId, flags);
/frameworks/base/services/tests/servicestests/src/com/android/server/am/
H A DRecentTasksTest.java801 private boolean arrayContainsUser(int[] userIds, int targetUserId) { argument
803 return Arrays.binarySearch(userIds, targetUserId) >= 0;
/frameworks/base/services/core/java/com/android/server/media/
H A DMediaSessionService.java1752 private int verifySessionsRequest2(int targetUserId, String callerPackageName, argument
1756 targetUserId, true /* allowAll */, true /* requireFull */, "getSessionTokens",
/frameworks/base/services/core/java/com/android/server/locksettings/
H A DLockSettingsService.java1947 private void removeKeystoreProfileKey(int targetUserId) { argument
1948 if (DEBUG) Slog.v(TAG, "Remove keystore profile key for user: " + targetUserId);
1952 keyStore.deleteEntry(LockPatternUtils.PROFILE_KEY_NAME_ENCRYPT + targetUserId);
1953 keyStore.deleteEntry(LockPatternUtils.PROFILE_KEY_NAME_DECRYPT + targetUserId);
1957 Slog.e(TAG, "Unable to remove keystore profile key for user:" + targetUserId, e);
/frameworks/base/services/tests/servicestests/src/com/android/server/backup/testutils/
H A DPackageManagerStub.java955 int targetUserId,
954 addCrossProfileIntentFilter(IntentFilter filter, int sourceUserId, int targetUserId, int flags) argument
/frameworks/base/test-mock/src/android/test/mock/
H A DMockPackageManager.java1107 public void addCrossProfileIntentFilter(IntentFilter filter, int sourceUserId, int targetUserId, argument
/frameworks/layoutlib/bridge/src/com/android/layoutlib/bridge/android/
H A DBridgePackageManager.java915 public void addCrossProfileIntentFilter(IntentFilter filter, int sourceUserId, int targetUserId, argument

Completed in 2300 milliseconds

12