/frameworks/base/services/core/java/com/android/server/pm/verify/domain/ |
D | DomainVerificationEnforcer.java | 133 @NonNull String packageName, @UserIdInt int targetUserId) throws SecurityException { in assertApprovedUserStateQuerent() argument 134 if (callingUserId != targetUserId) { in assertApprovedUserStateQuerent() 143 } else if (!mCallback.doesUserExist(targetUserId)) { in assertApprovedUserStateQuerent() 144 throw new SecurityException("User " + targetUserId + " does not exist"); in assertApprovedUserStateQuerent() 147 return !mCallback.filterAppAccess(packageName, callingUid, targetUserId); in assertApprovedUserStateQuerent() 154 @Nullable String packageName, @UserIdInt int targetUserId) throws SecurityException { in assertApprovedUserSelector() argument 155 if (callingUserId != targetUserId) { in assertApprovedUserSelector() 169 } else if (!mCallback.doesUserExist(targetUserId)) { in assertApprovedUserSelector() 170 throw new SecurityException("User " + targetUserId + " does not exist"); in assertApprovedUserSelector() 177 return !mCallback.filterAppAccess(packageName, callingUid, targetUserId); in assertApprovedUserSelector() [all …]
|
/frameworks/base/services/core/java/com/android/server/biometrics/sensors/ |
D | LoggableMonitor.java | 175 int targetUserId) { in logOnAcquired() argument 194 + ", User: " + targetUserId in logOnAcquired() 208 targetUserId, in logOnAcquired() 214 Utils.isDebugEnabled(context, targetUserId), in logOnAcquired() 218 protected final void logOnError(Context context, int error, int vendorCode, int targetUserId) { in logOnError() argument 228 + ", User: " + targetUserId in logOnError() 245 targetUserId, in logOnError() 251 Utils.isDebugEnabled(context, targetUserId), in logOnError() 257 boolean requireConfirmation, int targetUserId, boolean isBiometricPrompt) { in logOnAuthenticated() argument 281 + ", User: " + targetUserId in logOnAuthenticated() [all …]
|
/frameworks/base/apex/jobscheduler/service/java/com/android/server/job/ |
D | GrantedUriPermissions.java | 66 int sourceUid, String targetPackage, int targetUserId, String tag) { in createFromIntent() argument 76 perms = grantUri(data, sourceUid, targetPackage, targetUserId, grantFlags, tag, in createFromIntent() 82 perms = grantClip(clip, sourceUid, targetPackage, targetUserId, grantFlags, tag, in createFromIntent() 90 int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag) { in createFromClip() argument 96 perms = grantClip(clip, sourceUid, targetPackage, targetUserId, grantFlags, in createFromClip() 103 int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag, in grantClip() argument 107 curPerms = grantItem(clip.getItemAt(i), sourceUid, targetPackage, targetUserId, in grantClip() 114 int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag, in grantUri() argument 124 sourceUid, targetPackage, uri, grantFlags, sourceUserId, targetUserId); in grantUri() 133 int sourceUid, String targetPackage, int targetUserId, int grantFlags, String tag, in grantItem() argument [all …]
|
/frameworks/base/services/autofill/java/com/android/server/autofill/ |
D | AutofillUriGrantsManager.java | 77 @NonNull IBinder targetActivityToken, @UserIdInt int targetUserId, in grantUriPermissions() argument 85 + ", targetActivity=" + targetActivity + ", targetUserId=" + targetUserId in grantUriPermissions() 95 grantUriPermissions(uri, targetPkg, targetUserId, permissionOwner); in grantUriPermissions() 100 @UserIdInt int targetUserId, @NonNull IBinder permissionOwner) { in grantUriPermissions() argument 105 + ", targetPkg=" + targetPkg + ", targetUserId=" + targetUserId in grantUriPermissions() 118 targetUserId); in grantUriPermissions() 122 + ", targetPkg=" + targetPkg + ", targetUserId=" + targetUserId in grantUriPermissions()
|
/frameworks/base/core/java/com/android/internal/app/ |
D | IntentForwarderActivity.java | 103 final int targetUserId; in onCreate() local 107 targetUserId = getProfileParent(); in onCreate() 114 targetUserId = getManagedProfile(); in onCreate() 122 targetUserId = UserHandle.USER_NULL; in onCreate() 124 if (targetUserId == UserHandle.USER_NULL) { in onCreate() 135 final Intent newIntent = canForward(intentReceived, getUserId(), targetUserId, in onCreate() 140 + callingUserId + " to user " + targetUserId); in onCreate() 147 mInjector.resolveActivityAsUser(newIntent, MATCH_DEFAULT_ONLY, targetUserId); in onCreate() 152 callingUserId, targetUserId); in onCreate() 155 startActivityAsCaller(newIntent, targetUserId); in onCreate() [all …]
|
D | AbstractResolverComparator.java | 165 if (lhs.targetUserId != UserHandle.USER_CURRENT) { in compare() 166 return rhs.targetUserId != UserHandle.USER_CURRENT ? 0 : 1; in compare() 168 if (rhs.targetUserId != UserHandle.USER_CURRENT) { in compare()
|
/frameworks/base/services/core/java/com/android/server/uri/ |
D | UriPermissionOwner.java | 81 void removeUriPermission(GrantUri grantUri, int mode, String targetPgk, int targetUserId) { in removeUriPermission() argument 92 if (targetUserId != UserHandle.USER_ALL && targetUserId != perm.targetUserId) { in removeUriPermission() 113 if (targetUserId != UserHandle.USER_ALL && targetUserId != perm.targetUserId) { in removeUriPermission()
|
D | UriPermission.java | 49 final int targetUserId; field in UriPermission 91 this.targetUserId = UserHandle.getUserId(targetUid); in UriPermission() 321 pw.print("targetUserId=" + targetUserId); in dump() 366 final int targetUserId; field in UriPermission.Snapshot 374 this.targetUserId = perm.targetUserId; in Snapshot()
|
D | UriGrantsManagerService.java | 223 Uri uri, final int modeFlags, int sourceUserId, int targetUserId) { in grantUriPermissionFromOwner() argument 225 targetUserId); in grantUriPermissionFromOwner() 233 int sourceUserId, int targetUserId) { in grantUriPermissionFromOwnerUnlocked() argument 234 targetUserId = mAmInternal.handleIncomingUser(Binder.getCallingPid(), in grantUriPermissionFromOwnerUnlocked() 235 Binder.getCallingUid(), targetUserId, false, ALLOW_FULL_ONLY, in grantUriPermissionFromOwnerUnlocked() 257 modeFlags, owner, targetUserId); in grantUriPermissionFromOwnerUnlocked() 324 && perm.targetUserId == userId in getGrantedUriPermissions() 583 String targetPkg, Intent intent, int mode, NeededUriGrants needed, int targetUserId) { in checkGrantUriPermissionFromIntentUnlocked() argument 612 targetUserId); in checkGrantUriPermissionFromIntentUnlocked() 615 + " on user " + targetUserId); in checkGrantUriPermissionFromIntentUnlocked() [all …]
|
D | UriGrantsManagerInternal.java | 53 String targetPkg, int targetUserId); in checkGrantUriPermissionFromIntent() argument 121 int userId, @Nullable String targetPkg, int targetUserId); in revokeUriPermissionFromOwner() argument
|
/frameworks/base/core/java/android/content/pm/ |
D | ResolveInfo.java | 155 public int targetUserId; field in ResolveInfo 388 targetUserId = UserHandle.USER_CURRENT; in ResolveInfo() 397 targetUserId = UserHandle.USER_CURRENT; in ResolveInfo() 417 targetUserId = orig.targetUserId; in ResolveInfo() 440 if (targetUserId != UserHandle.USER_CURRENT) { in toString() 442 sb.append(targetUserId); in toString() 479 dest.writeInt(targetUserId); in writeToParcel() 528 targetUserId = source.readInt(); in ResolveInfo() 546 if (a.targetUserId != UserHandle.USER_CURRENT) { in compare() 549 if (b.targetUserId != UserHandle.USER_CURRENT) { in compare()
|
/frameworks/base/packages/SystemUI/src/com/android/keyguard/ |
D | KeyguardSecurityCallback.java | 25 void dismiss(boolean securityVerified, int targetUserId); in dismiss() argument 34 void dismiss(boolean securityVerified, int targetUserId, boolean bypassSecondaryLockScreen); in dismiss() argument
|
D | ViewMediatorCallback.java | 36 void keyguardDone(boolean strongAuth, int targetUserId); in keyguardDone() argument 56 void keyguardDonePending(boolean strongAuth, int targetUserId); in keyguardDonePending() argument
|
D | KeyguardHostViewController.java | 107 public boolean dismiss(boolean authenticated, int targetUserId, 110 authenticated, targetUserId, bypassSecondaryLockScreen); 133 public void finish(boolean strongAuth, int targetUserId) { 144 mViewMediatorCallback.keyguardDonePending(strongAuth, targetUserId); 146 mViewMediatorCallback.keyguardDone(strongAuth, targetUserId); 217 public boolean dismiss(int targetUserId) { in dismiss() argument 218 return mSecurityCallback.dismiss(false, targetUserId, false); in dismiss()
|
D | KeyguardSecurityContainerController.java | 283 public void dismiss(boolean authenticated, int targetUserId) { in dismiss() argument 284 mKeyguardSecurityCallback.dismiss(authenticated, targetUserId); in dismiss() 337 public boolean showNextSecurityScreenOrFinish(boolean authenticated, int targetUserId, in showNextSecurityScreenOrFinish() argument 345 if (mUpdateMonitor.getUserHasTrust(targetUserId)) { in showNextSecurityScreenOrFinish() 349 } else if (mUpdateMonitor.getUserUnlockedWithBiometric(targetUserId)) { in showNextSecurityScreenOrFinish() 354 SecurityMode securityMode = mSecurityModel.getSecurityMode(targetUserId); in showNextSecurityScreenOrFinish() 376 SecurityMode securityMode = mSecurityModel.getSecurityMode(targetUserId); in showNextSecurityScreenOrFinish() 397 mUpdateMonitor.getSecondaryLockscreenRequirement(targetUserId); in showNextSecurityScreenOrFinish() 411 mSecurityCallback.finish(strongAuth, targetUserId); in showNextSecurityScreenOrFinish()
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/keyguard/ |
D | WorkLockActivity.java | 138 final int targetUserId = getTargetUserId(); 139 final int userId = intent.getIntExtra(Intent.EXTRA_USER_HANDLE, targetUserId); 140 if (userId == targetUserId && !getKeyguardManager().isDeviceLocked(targetUserId)) {
|
/frameworks/base/services/core/java/com/android/server/pm/ |
D | CrossProfileIntentFilter.java | 66 CrossProfileIntentFilter(IntentFilter filter, String ownerPackage, int targetUserId, 69 mTargetUserId = targetUserId; 75 CrossProfileIntentFilter(WatchedIntentFilter filter, String ownerPackage, int targetUserId, 77 this(filter.mFilter, ownerPackage, targetUserId, flags);
|
D | LauncherAppsService.java | 351 private boolean canAccessProfile(int targetUserId, String message) { in canAccessProfile() argument 354 if (targetUserId == callingUserId) return true; in canAccessProfile() 365 + targetUserId + " from " + callingUserId + " not allowed"); in canAccessProfile() 372 return mUserManagerInternal.isProfileAccessible(injectCallingUserId(), targetUserId, in canAccessProfile() 928 int targetUserId) { in getShortcutIconResId() argument 930 if (!canAccessProfile(targetUserId, "Cannot access shortcuts")) { in getShortcutIconResId() 935 callingPackage, packageName, id, targetUserId); in getShortcutIconResId() 940 String packageName, String id, int targetUserId) { in getShortcutIconFd() argument 942 if (!canAccessProfile(targetUserId, "Cannot access shortcuts")) { in getShortcutIconFd() 947 callingPackage, packageName, id, targetUserId); in getShortcutIconFd() [all …]
|
/frameworks/base/services/tests/PackageManagerServiceTests/unit/src/com/android/server/pm/test/verify/domain/ |
D | DomainVerificationEnforcerTest.kt | 478 fun runTestCases(callingUserId: Int, targetUserId: Int, throws: Boolean) { in <lambda>() 481 runCrossUserMethod(allUids, target, callingUserId, targetUserId, throws) in <lambda>() 515 fun runTestCases(callingUserId: Int, targetUserId: Int, throws: Boolean) { in <lambda>() 518 runCrossUserMethod(allUids, target, callingUserId, targetUserId, throws) in <lambda>() 559 fun runTestCases(callingUserId: Int, targetUserId: Int, throws: Boolean) { in <lambda>() 564 runCrossUserMethod(allUids, target, callingUserId, targetUserId, throws, in <lambda>() 618 fun runTestCases(callingUserId: Int, targetUserId: Int, throws: Boolean) { in <lambda>() 621 runCrossUserMethod(allUids, target, callingUserId, targetUserId, throws, in <lambda>() 661 fun runTestCases(callingUserId: Int, targetUserId: Int, throws: Boolean) { in <lambda>() 664 runCrossUserMethod(allUids, target, callingUserId, targetUserId, throws, in <lambda>() [all …]
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
D | NetworkLoggingHandler.java | 119 NetworkLoggingHandler(Looper looper, DevicePolicyManagerService dpm, int targetUserId) { in NetworkLoggingHandler() argument 120 this(looper, dpm, 0 /* event id */, targetUserId); in NetworkLoggingHandler() 125 int targetUserId) { in NetworkLoggingHandler() argument 130 this.mTargetUserId = targetUserId; in NetworkLoggingHandler()
|
D | NetworkLogger.java | 106 NetworkLogger(DevicePolicyManagerService dpm, PackageManagerInternal pm, int targetUserId) { in NetworkLogger() argument 109 mTargetUserId = targetUserId; in NetworkLogger()
|
/frameworks/base/services/core/java/com/android/server/inputmethod/ |
D | InputContentUriTokenHandler.java | 52 @UserIdInt int targetUserId) { in InputContentUriTokenHandler() argument 57 mTargetUserId = targetUserId; in InputContentUriTokenHandler()
|
/frameworks/base/packages/SettingsLib/RestrictedLockUtils/src/com/android/settingslib/ |
D | RestrictedLockUtils.java | 89 int targetUserId = UserHandle.myUserId(); in sendShowAdminSupportDetailsIntent() local 93 targetUserId = admin.user.getIdentifier(); in sendShowAdminSupportDetailsIntent() 97 context.startActivityAsUser(intent, UserHandle.of(targetUserId)); in sendShowAdminSupportDetailsIntent()
|
/frameworks/base/services/core/java/com/android/server/wm/ |
D | DragAndDropPermissionsHandler.java | 53 String targetPackage, int mode, int sourceUserId, int targetUserId) { in DragAndDropPermissionsHandler() argument 59 mTargetUserId = targetUserId; in DragAndDropPermissionsHandler()
|
/frameworks/base/services/core/java/com/android/server/am/ |
D | UserController.java | 1621 void startUserInForeground(final int targetUserId) { 1622 boolean success = startUser(targetUserId, /* foreground */ true); 1714 boolean switchUser(final int targetUserId) { 1715 enforceShellRestriction(UserManager.DISALLOW_DEBUGGING_FEATURES, targetUserId); 1716 EventLog.writeEvent(EventLogTags.UC_SWITCH_USER, targetUserId); 1718 UserInfo targetUserInfo = getUserInfo(targetUserId); 1719 if (targetUserId == currentUserId) { 1720 Slogf.i(TAG, "user #" + targetUserId + " is already the current user"); 1724 Slogf.w(TAG, "No user info for user #" + targetUserId); 1728 Slogf.w(TAG, "Cannot switch to User #" + targetUserId + ": not supported"); [all …]
|