Loading core/java/com/android/internal/widget/LockPatternUtils.java +2 −2 Original line number Diff line number Diff line Loading @@ -893,7 +893,7 @@ public class LockPatternUtils { */ public boolean isSeparateProfileChallengeEnabled(int userHandle) { UserInfo info = getUserManager().getUserInfo(userHandle); if (!info.isManagedProfile()) { if (info == null || !info.isManagedProfile()) { return false; } return getBoolean(SEPARATE_PROFILE_CHALLENGE_KEY, false, userHandle); Loading @@ -904,7 +904,7 @@ public class LockPatternUtils { */ public boolean isSeparateProfileChallengeAllowed(int userHandle) { UserInfo info = getUserManager().getUserInfo(userHandle); if (!info.isManagedProfile()) { if (info == null || !info.isManagedProfile()) { return false; } return getDevicePolicyManager().isSeparateProfileChallengeAllowed(userHandle); Loading services/core/java/com/android/server/trust/TrustManagerService.java +3 −3 Original line number Diff line number Diff line Loading @@ -675,12 +675,12 @@ public class TrustManagerService extends SystemService { public boolean isDeviceSecure(int userId) throws RemoteException { userId = ActivityManager.handleIncomingUser(getCallingPid(), getCallingUid(), userId, false /* allowAll */, true /* requireFull */, "isDeviceSecure", null); if (!mLockPatternUtils.isSeparateProfileChallengeEnabled(userId)) { userId = resolveProfileParent(userId); } long token = Binder.clearCallingIdentity(); try { if (!mLockPatternUtils.isSeparateProfileChallengeEnabled(userId)) { userId = resolveProfileParent(userId); } return mLockPatternUtils.isSecure(userId); } finally { Binder.restoreCallingIdentity(token); Loading Loading
core/java/com/android/internal/widget/LockPatternUtils.java +2 −2 Original line number Diff line number Diff line Loading @@ -893,7 +893,7 @@ public class LockPatternUtils { */ public boolean isSeparateProfileChallengeEnabled(int userHandle) { UserInfo info = getUserManager().getUserInfo(userHandle); if (!info.isManagedProfile()) { if (info == null || !info.isManagedProfile()) { return false; } return getBoolean(SEPARATE_PROFILE_CHALLENGE_KEY, false, userHandle); Loading @@ -904,7 +904,7 @@ public class LockPatternUtils { */ public boolean isSeparateProfileChallengeAllowed(int userHandle) { UserInfo info = getUserManager().getUserInfo(userHandle); if (!info.isManagedProfile()) { if (info == null || !info.isManagedProfile()) { return false; } return getDevicePolicyManager().isSeparateProfileChallengeAllowed(userHandle); Loading
services/core/java/com/android/server/trust/TrustManagerService.java +3 −3 Original line number Diff line number Diff line Loading @@ -675,12 +675,12 @@ public class TrustManagerService extends SystemService { public boolean isDeviceSecure(int userId) throws RemoteException { userId = ActivityManager.handleIncomingUser(getCallingPid(), getCallingUid(), userId, false /* allowAll */, true /* requireFull */, "isDeviceSecure", null); if (!mLockPatternUtils.isSeparateProfileChallengeEnabled(userId)) { userId = resolveProfileParent(userId); } long token = Binder.clearCallingIdentity(); try { if (!mLockPatternUtils.isSeparateProfileChallengeEnabled(userId)) { userId = resolveProfileParent(userId); } return mLockPatternUtils.isSecure(userId); } finally { Binder.restoreCallingIdentity(token); Loading