blob: 89cd43003529b8234ce98b9e283ad9433a7c191a [file] [log] [blame]
/*
* Copyright (C) 2018 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package android.os.strictmode;
import android.content.Context;
/**
* Subclass of {@code Violation} that is used when a process accesses filesystem
* paths stored in credential protected storage areas while the user is locked.
* <p>
* When a user is locked, credential protected storage is unavailable, and files
* stored in these locations appear to not exist, which can result in subtle app
* bugs if they assume default behaviors or empty states. Instead, apps should
* store data needed while a user is locked under device protected storage
* areas.
*
* @see Context#createDeviceProtectedStorageContext()
*/
public final class CredentialProtectedWhileLockedViolation extends Violation {
/** @hide */
public CredentialProtectedWhileLockedViolation(String message) {
super(message);
}
}