/frameworks/base/services/tests/uiservicestests/src/com/android/server/notification/ |
H A D | SnoozeHelperTest.java | 297 UserHandle user, String groupKey, boolean groupSummary) { 309 pkg, pkg, id, tag, 0, 0, n, user, null, 314 UserHandle user) { 315 return getNotificationRecord(pkg, id, tag, user, null, false); 296 getNotificationRecord(String pkg, int id, String tag, UserHandle user, String groupKey, boolean groupSummary) argument 313 getNotificationRecord(String pkg, int id, String tag, UserHandle user) argument
|
/frameworks/wilhelm/src/android/ |
H A D | MediaPlayer_to_android.cpp | 29 static void player_handleMediaPlayerEventNotifications(int event, int data1, int data2, void* user) argument 38 if (NULL == user) { 42 CMediaPlayer* mp = (CMediaPlayer*) user; 53 "user=%p) from AVPlayer", u.c[3], u.c[2], u.c[1], u.c[0], event, data1, data2, user);
|
/frameworks/base/core/java/android/content/pm/ |
H A D | PackageManager.java | 402 * the returned info, regardless of the current user state. 406 * to match only runnable components based on the user state. For example, 407 * when a user is started but credentials have not been presented yet, the 408 * user is running "locked" and only {@link #MATCH_DIRECT_BOOT_AWARE} 409 * components are returned. Once the user credentials have been presented, 410 * the user is running "unlocked" and both {@link #MATCH_DIRECT_BOOT_AWARE} 419 * the returned info, regardless of the current user state. 423 * to match only runnable components based on the user state. For example, 424 * when a user is started but credentials have not been presented yet, the 425 * user i 3560 grantRuntimePermission(@onNull String packageName, @NonNull String permissionName, @NonNull UserHandle user) argument 3586 revokeRuntimePermission(@onNull String packageName, @NonNull String permissionName, @NonNull UserHandle user) argument 3604 getPermissionFlags(String permissionName, String packageName, @NonNull UserHandle user) argument 3624 updatePermissionFlags(String permissionName, String packageName, @PermissionFlags int flagMask, @PermissionFlags int flagValues, @NonNull UserHandle user) argument 4615 getUserBadgedIcon(Drawable icon, UserHandle user) argument 4641 getUserBadgedDrawableForDensity(Drawable drawable, UserHandle user, Rect badgeLocation, int badgeDensity) argument 4656 getUserBadgeForDensity(UserHandle user, int density) argument 4672 getUserBadgeForDensityNoBackground(UserHandle user, int density) argument 4685 getUserBadgedLabel(CharSequence label, UserHandle user) argument 5959 getInstallReason(String packageName, @NonNull UserHandle user) argument 6005 getInstantAppAndroidId(String packageName, @NonNull UserHandle user) argument [all...] |
/frameworks/base/core/java/android/app/ |
H A D | ActivityView.java | 173 * @param user The UserHandle of the user to start this activity for. 179 public void startActivity(@NonNull Intent intent, UserHandle user) { argument 181 getContext().startActivityAsUser(intent, options.toBundle(), user);
|
/frameworks/base/core/java/android/app/usage/ |
H A D | UsageStatsManager.java | 60 * use the API and the user of the device still needs to grant permission through the Settings 468 * <p>The standby state of an app can change at any time either due to a user interaction or a 470 * of time before the user has a need for it. 594 * is not the profile owner of this user. 615 * not the profile owner of this user. 704 * @param user The user for whom the package should be whitelisted. Passing in a user that is 710 public void whitelistAppTemporarily(String packageName, long duration, UserHandle user) { argument 712 mService.whitelistAppTemporarily(packageName, duration, user [all...] |
/frameworks/base/packages/SettingsLib/tests/integ/src/com/android/settingslib/users/ |
H A D | AppRestrictionsHelperTest.java | 75 final UserInfo user = new UserInfo( 77 when(mUm.getUserInfo(mTestUser.getIdentifier())).thenReturn(user);
|
/frameworks/base/services/tests/servicestests/src/com/android/server/pm/ |
H A D | ShortcutManagerTest6.java | 130 mEnabledActivityChecker = (comp, user) -> false; 137 mEnabledActivityChecker = (comp, user) -> true; 250 // Test it on a non-running user. 251 // Send ACTION_PREFERRED_ACTIVITY_CHANGED on user 10. 252 // But the user is not running, so will be ignored. 259 // Need to run the user again to access the internal status. 268 // Send it again after starting the user. 277 // Only user-10's cache is cleared.
|
/frameworks/base/core/java/android/service/notification/ |
H A D | ZenModeConfig.java | 107 private static final String ZEN_ATT_USER = "user"; 158 public int user = UserHandle.USER_SYSTEM; field in class:ZenModeConfig 176 user = source.readInt(); 204 dest.writeInt(user); 230 .append("user=").append(user) 253 if (user != to.user) { 254 d.addLine("user", user, t [all...] |
/frameworks/base/services/core/java/com/android/server/locksettings/ |
H A D | LockSettingsService.java | 149 * Keeps the lock pattern/password data and related settings for each user. Used by 203 // the user unlocks the account and credential-encrypted storage is available. 271 * @param managedUserId Managed profile user Id 276 if (DEBUG) Slog.v(TAG, "Check child profile lock for user: " + managedUserId); 297 // generated when the user unlocks for the first time. 314 // We store a private credential for the managed user that's unlocked by the primary 315 // account holder's credential. As such, the user will never be prompted to enter this 446 * If the account is credential-encrypted, show notification requesting the user to unlock the 450 final UserInfo user = mUserManager.getUserInfo(userId); 451 if (!user 472 showEncryptionNotificationForProfile(UserHandle user) argument 495 showEncryptionNotification(UserHandle user, CharSequence title, CharSequence message, CharSequence detail, PendingIntent intent) argument [all...] |
/frameworks/base/media/jni/soundpool/ |
H A D | SoundPool.cpp | 460 void SoundPool::setCallback(SoundPoolCallback* callback, void* user) argument 464 mUserData = user; 779 // as callback user data. This enables the detection of callbacks received from the old 871 void SoundChannel::callback(int event, void* user, void *info) argument 873 SoundChannel* channel = static_cast<SoundChannel*>((void *)((unsigned long)user & ~1)); 875 channel->process(event, info, (unsigned long)user & 1);
|
/frameworks/native/cmds/installd/ |
H A D | InstalldNativeService.cpp | 79 static constexpr const char* kXattrDefault = "user.default"; 420 // read-write-execute only for the app user. 657 for (auto user : users) { 658 if (destroy_app_current_profiles(packageName, user) != 0) { 711 for (auto user : get_known_users(uuid_)) { 712 ATRACE_BEGIN("fixup user"); 715 auto ce_path = create_data_user_ce_path(uuid_, user); 716 auto de_path = create_data_user_de_path(uuid_, user); 856 for (auto user : users) { 859 auto from_ce = create_data_user_ce_package_path(from_uuid, user, package_nam [all...] |
/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | PackageManagerService.java | 428 // user, but by default initialize to this. 705 * find updated user-installed versions. Keys are package name, values 764 * mapping from user id -> sequence number -> package name 770 * mapping from user id -> package name -> sequence number 1242 // for each user id, a map of <package name -> components within that package> 1397 // And we back up these user-adjusted states 1671 for (int user : users) { 1673 new PackageCleanItem(user, packageName, andCode)); 1770 final UserHandle user = args.getUser(); 1771 if (getDefaultVerificationResponse(user) 2288 scheduleWritePackageRestrictionsLocked(UserHandle user) argument 8549 scanPackageTracedLI(File scanFile, final int parseFlags, int scanFlags, long currentTime, UserHandle user) argument 8563 scanPackageLI(File scanFile, int parseFlags, int scanFlags, long currentTime, UserHandle user) argument 8594 scanPackageChildLI(PackageParser.Package pkg, final @ParseFlags int parseFlags, @ScanFlags int scanFlags, long currentTime, @Nullable UserHandle user) argument 8686 addForInitLI(PackageParser.Package pkg, @ParseFlags int parseFlags, @ScanFlags int scanFlags, long currentTime, @Nullable UserHandle user) argument 9906 scanPackageTracedLI(PackageParser.Package pkg, final @ParseFlags int parseFlags, @ScanFlags int scanFlags, long currentTime, @Nullable UserHandle user) argument 9991 @Nullable public final UserHandle user; field in class:PackageManagerService.ScanRequest 9994 ScanRequest( @onNull PackageParser.Package pkg, @Nullable SharedUserSetting sharedUserSetting, @Nullable PackageParser.Package oldPkg, @Nullable PackageSetting pkgSetting, @Nullable PackageSetting disabledPkgSetting, @Nullable PackageSetting originalPkgSetting, @Nullable String realPkgName, @ParseFlags int parseFlags, @ScanFlags int scanFlags, boolean isPlatformPackage, @Nullable UserHandle user) argument 10035 adjustScanFlags(@canFlags int scanFlags, PackageSetting pkgSetting, PackageSetting disabledPkgSetting, UserHandle user, PackageParser.Package pkg) argument 10102 scanPackageNewLI(@onNull PackageParser.Package pkg, final @ParseFlags int parseFlags, @ScanFlags int scanFlags, long currentTime, @Nullable UserHandle user) argument 11298 commitPackageSettings(PackageParser.Package pkg, @Nullable PackageParser.Package oldPkg, PackageSetting pkgSetting, UserHandle user, final @ScanFlags int scanFlags, boolean chatty) argument 13783 installStage(String packageName, File stagedDir, IPackageInstallObserver2 observer, PackageInstaller.SessionParams sessionParams, String installerPackageName, int installerUid, UserHandle user, PackageParser.SigningDetails signingDetails) argument 14461 broadcastPackageVerified(int verificationId, Uri packageUri, int verificationCode, UserHandle user) argument 14598 getDefaultVerificationResponse(UserHandle user) argument 15067 HandlerParams(UserHandle user) argument 15245 InstallParams(OriginInfo origin, MoveInfo move, IPackageInstallObserver2 observer, int installFlags, String installerPackageName, String volumeUuid, VerificationInfo verificationInfo, UserHandle user, String packageAbiOverride, String[] grantedPermissions, PackageParser.SigningDetails signingDetails, int installReason) argument 15684 final UserHandle user; field in class:PackageManagerService.InstallArgs 15698 InstallArgs(OriginInfo origin, MoveInfo move, IPackageInstallObserver2 observer, int installFlags, String installerPackageName, String volumeUuid, UserHandle user, String[] instructionSets, String abiOverride, String[] installGrantPermissions, String traceMethod, int traceCookie, PackageParser.SigningDetails signingDetails, int installReason) argument 16282 installNewPackageLIF(PackageParser.Package pkg, final @ParseFlags int parseFlags, final @ScanFlags int scanFlags, UserHandle user, String installerPackageName, String volumeUuid, PackageInstalledInfo res, int installReason) argument 16341 replacePackageLIF(PackageParser.Package pkg, final @ParseFlags int parseFlags, final @ScanFlags int scanFlags, UserHandle user, String installerPackageName, PackageInstalledInfo res, int installReason) argument 16549 replaceNonSystemPackageLIF(PackageParser.Package deletedPackage, PackageParser.Package pkg, final @ParseFlags int parseFlags, final @ScanFlags int scanFlags, UserHandle user, int[] allUsers, String installerPackageName, PackageInstalledInfo res, int installReason) argument 16693 replaceSystemPackageLIF(PackageParser.Package deletedPackage, PackageParser.Package pkg, final @ParseFlags int parseFlags, final @ScanFlags int scanFlags, UserHandle user, int[] allUsers, String installerPackageName, PackageInstalledInfo res, int installReason) argument 16902 updateSettingsLI(PackageParser.Package newPackage, String installerPackageName, int[] allUsers, PackageInstalledInfo res, UserHandle user, int installReason) argument 16918 updateSettingsInternalLI(PackageParser.Package pkg, String installerPackageName, int[] allUsers, int[] installedForUsers, PackageInstalledInfo res, UserHandle user, int installReason) argument 18854 deletePackageLIF(String packageName, UserHandle user, boolean deleteCodeAndResources, int[] allUserHandles, int flags, PackageRemovedInfo outInfo, boolean writeSettings, PackageParser.Package replacingPackage) argument 19021 markPackageUninstalledForUserLPw(PackageSetting ps, UserHandle user) argument 22833 movePackageInternal(final String packageName, final String volumeUuid, final int moveId, final int callingUid, UserHandle user) argument [all...] |
/frameworks/base/services/core/java/com/android/server/am/ |
H A D | ActiveServices.java | 236 * Information about services for a single user. 423 Slog.w(TAG, "Trying to start service with non-existent user! " + r.userId); 487 // This is an O+ app, but we might be here because the user has placed 608 "Not potential delay (user " + r.userId + " not started): " + r); 898 // This is when we will be okay to stop telling the user. 910 // care to tell the user about it when the screen comes back on, 931 if (DEBUG_FOREGROUND_SERVICE) Slog.d(TAG, "Updating foreground apps for user " 1104 // count the time it started being visible as now, to tell the user 1539 // otherwise we unbind because the user didn't approve. 2320 // Make sure that the user wh 3816 dumpUserHeaderLocked(int user) argument 3894 dumpUserRemainsLocked(int user) argument [all...] |
/frameworks/base/services/core/java/com/android/server/accounts/ |
H A D | AccountManagerService.java | 479 * TODO: Only allow accounts that were shared to be added by a limited user. 1095 * given user. Clears cached authenticators before validating. 1099 // Invalidate user-specific cache to make sure we catch any 1106 * given user. Clear cached authenticators before validating when requested. 1198 // Also delete from CE table if user is unlocked; if user is 1258 // to preserve user data if the app might otherwise be storing data. 1329 Slog.i(TAG, "Accounts " + accountsToRemove + " were previously deleted while user " 1434 Log.w(TAG, "User " + userId + " has shared accounts, but no parent user"); 1480 Log.w(TAG, "Password is not available - user " 5309 cancelNotification(NotificationId id, UserHandle user) argument 5313 cancelNotification(NotificationId id, String packageName, UserHandle user) argument 6075 getContextForUser(UserHandle user) argument [all...] |
/frameworks/base/services/core/java/com/android/server/trust/ |
H A D | TrustAgentWrapper.java | 311 if (DEBUG) Slog.d(TAG, "adding escrow token for user " + userId); 325 if (DEBUG) Slog.d(TAG, "checking the state of escrow token on user " + userId); 339 if (DEBUG) Slog.d(TAG, "removing escrow token on user " + userId); 353 if (DEBUG) Slog.d(TAG, "unlocking user " + userId); 408 Intent intent, UserHandle user) { 412 mUserId = user.getIdentifier(); 428 Context.BIND_AUTO_CREATE | Context.BIND_FOREGROUND_SERVICE, user); 407 TrustAgentWrapper(Context context, TrustManagerService trustManagerService, Intent intent, UserHandle user) argument
|
/frameworks/base/services/usage/java/com/android/server/usage/ |
H A D | UsageStatsService.java | 440 Slog.i(TAG, "Removing user " + userId + " and all data."); 602 idpw.printPair("user", userId); 838 "No permission to query usage stats for this user"); 862 "No permission to query usage stats for this user"); 1092 Slog.w(TAG, "Event report user selecting a null package"); 1310 public byte[] getBackupPayload(int user, String key) { argument 1311 // Check to ensure that only user 0's data is b/r for now 1313 if (user == UserHandle.USER_SYSTEM) { 1315 getUserDataAndInitializeIfNeededLocked(user, checkAndGetTimeLocked()); 1324 public void applyRestoredPayload(int user, Strin argument [all...] |
/frameworks/base/telephony/java/android/telephony/data/ |
H A D | ApnSetting.java | 571 int mmsPort, String user, String password, int authType, int mApnTypeBitmask, 585 .setUser(user) 1023 final String user = in.readString(); 1034 proxy, port, mmsc, mmsProxy, mmsPort, user, password, authType, apnTypesBitmask, 1298 * @param user the APN username to set for the APN 1300 public Builder setUser(String user) { argument 1301 this.mUser = user; 569 makeApnSetting(int id, String operatorNumeric, String entryName, String apnName, InetAddress proxy, int port, Uri mmsc, InetAddress mmsProxy, int mmsPort, String user, String password, int authType, int mApnTypeBitmask, int protocol, int roamingProtocol, boolean carrierEnabled, int networkTypeBitmask, int profileId, boolean modemCognitive, int maxConns, int waitTime, int maxConnsTime, int mtu, int mvnoType, String mvnoMatchData) argument
|
/frameworks/av/media/libstagefright/ |
H A D | AudioPlayer.cpp | 390 void AudioPlayer::AudioCallback(int event, void *user, void *info) { argument 391 static_cast<AudioPlayer *>(user)->AudioCallback(event, info);
|
H A D | AudioSource.cpp | 35 static void AudioRecordCallbackFunction(int event, void *user, void *info) { argument 36 AudioSource *source = (AudioSource *) user;
|
/frameworks/base/core/java/android/app/backup/ |
H A D | BackupManager.java | 396 public boolean isBackupServiceActive(UserHandle user) { argument 402 return sService.isBackupServiceActive(user.getIdentifier()); 482 * be {@code null} if the transport does not offer any user-facing configuration UI. 487 * may be {@code null} if the transport does not offer any user-facing data
|
/frameworks/base/core/java/android/appwidget/ |
H A D | AppWidgetManager.java | 71 * once the user has selected one.</td> 122 * <td>An optional handle to a user profile under which runs the provider 236 * An intent extra that contains the user handle of the profile under 449 * launcher app to present a custom preview to the user. 683 * behavior of the widget based on the state of the app (for e.g., if the user is logged in 744 * Gets the AppWidget providers for the given user profile. User profile can only 745 * be the current user or a profile of the current user. For example, the current 746 * user may have a corporate profile. In this case the parent user profil 994 bindAppWidgetIdIfAllowed(int appWidgetId, UserHandle user, ComponentName provider, Bundle options) argument [all...] |
/frameworks/base/core/proto/android/server/ |
H A D | alarmmanagerservice.proto | 62 // The current set of user whitelisted apps for device idle mode, meaning 70 // List of alarms per uid deferred due to user applied background restrictions 153 optional int32 user = 1;
|
/frameworks/base/keystore/java/android/security/ |
H A D | KeyChain.java | 73 * choosePrivateKeyAlias} to allow the user to select from a 77 * key is available or the user cancels the request. 86 * avoid prompting the user with {@link #choosePrivateKeyAlias 176 * <p>The user will be prompted for the password to load the key store. 196 * <li>trusted storage is reset (all user certs are cleared), 327 * which case the user will be able to install credentials from 350 * Launches an {@code Activity} for the user to select the alias 362 * highlight suggested choices to the user, although to cope with 363 * sometimes erroneous values provided by servers, the user may be 366 * <p>{@code host} and {@code port} may be used to give the user 728 bindAsUser(@onNull Context context, UserHandle user) argument [all...] |
/frameworks/base/packages/ExtServices/src/android/ext/services/notification/ |
H A D | Assistant.java | 291 private Adjustment createNegativeAdjustment(String packageName, String key, int user) { argument 296 getContext().getString(R.string.prompt_block_reason), user);
|
/frameworks/base/services/core/java/com/android/server/fingerprint/ |
H A D | FingerprintService.java | 186 final int user = intent.getIntExtra(KEY_LOCKOUT_RESET_USER, 0); 187 resetFailedAttemptsForUser(false /* clearAttemptCounter */, user); 318 for (UserInfo user : UserManager.get(mContext).getUsers(true /* excludeDying */)) { 319 int userId = getUserOrWorkProfileId(null, user.id); 332 * This method should be called upon connection to the daemon, and when user switches. 347 if (DEBUG) Slog.v(TAG, "Enumerating user(" + userId + ")"); 373 // All fingerprints in hardware for this user were enumerated 754 // Allow current user or profiles of the current user... 801 Slog.w(TAG,"Rejecting " + opPackageName + " ; not a current user o [all...] |