Lines Matching defs:admin

41 import android.app.admin.DeviceAdminInfo;
42 import android.app.admin.DeviceAdminReceiver;
43 import android.app.admin.DevicePolicyManager;
44 import android.app.admin.IDevicePolicyManager;
147 * Whether or not device admin feature is supported. If it isn't return defaults for all
454 Slog.w(TAG, "Unknown admin tag: " + tag);
676 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who);
677 if (admin != null
678 && who.getPackageName().equals(admin.info.getActivityInfo().packageName)
679 && who.getClassName().equals(admin.info.getActivityInfo().name)) {
680 return admin;
691 ActiveAdmin admin = policy.mAdminMap.get(who);
692 if (admin == null) {
693 throw new SecurityException("No active admin " + who);
695 if (admin.getUid() != callingUid) {
699 if (!admin.info.usesPolicy(reqPolicy)) {
700 throw new SecurityException("Admin " + admin.info.getComponent()
702 + admin.info.getTagForPolicy(reqPolicy));
704 return admin;
708 ActiveAdmin admin = policy.mAdminList.get(i);
709 if (admin.getUid() == callingUid && admin.info.usesPolicy(reqPolicy)) {
710 return admin;
713 throw new SecurityException("No active admin owned by uid "
718 void sendAdminCommandLocked(ActiveAdmin admin, String action) {
719 sendAdminCommandLocked(admin, action, null);
722 void sendAdminCommandLocked(ActiveAdmin admin, String action, BroadcastReceiver result) {
724 intent.setComponent(admin.info.getComponent());
726 intent.putExtra("expiration", admin.passwordExpirationDate);
729 mContext.sendOrderedBroadcastAsUser(intent, admin.getUserHandle(),
741 ActiveAdmin admin = policy.mAdminList.get(i);
742 if (admin.info.usesPolicy(reqPolicy)) {
743 sendAdminCommandLocked(admin, action);
750 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle);
751 if (admin != null) {
752 sendAdminCommandLocked(admin,
758 int userHandle = admin.getUserHandle().getIdentifier();
760 boolean doProxyCleanup = admin.info.usesPolicy(
762 policy.mAdminList.remove(admin);
789 throw new IllegalArgumentException("Unknown admin: " + adminName);
795 Slog.w(TAG, "Bad device admin requested for user=" + userHandle + ": " + adminName, e);
798 Slog.w(TAG, "Bad device admin requested for user=" + userHandle + ": " + adminName, e);
827 out.startTag(null, "admin");
830 out.endTag(null, "admin");
918 if ("admin".equals(tag)) {
936 Slog.w(TAG, "Failed loading admin " + name, e);
1087 ActiveAdmin admin = policy.mAdminList.get(i);
1088 if (admin.info.usesPolicy(DeviceAdminInfo.USES_POLICY_EXPIRE_PASSWORD)
1089 && admin.passwordExpirationTimeout > 0L
1090 && admin.passwordExpirationDate > 0L
1091 && now >= admin.passwordExpirationDate - EXPIRATION_GRACE_PERIOD_MS) {
1092 sendAdminCommandLocked(admin, DeviceAdminReceiver.ACTION_PASSWORD_EXPIRING);
1157 * @param adminReceiver The admin to add
1158 * @param refreshing true = update an active admin, no error
1171 throw new IllegalArgumentException("Bad admin: " + adminReceiver);
1224 throw new SecurityException("No active admin " + adminReceiver);
1274 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle);
1275 if (admin == null) {
1278 if (admin.getUid() != Binder.getCallingUid()) {
1326 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
1327 return admin != null ? admin.passwordQuality : mode;
1332 ActiveAdmin admin = policy.mAdminList.get(i);
1333 if (mode < admin.passwordQuality) {
1334 mode = admin.passwordQuality;
1369 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
1370 return admin != null ? admin.minimumPasswordLength : length;
1375 ActiveAdmin admin = policy.mAdminList.get(i);
1376 if (length < admin.minimumPasswordLength) {
1377 length = admin.minimumPasswordLength;
1412 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
1413 return admin != null ? admin.passwordHistoryLength : length;
1418 ActiveAdmin admin = policy.mAdminList.get(i);
1419 if (length < admin.passwordHistoryLength) {
1420 length = admin.passwordHistoryLength;
1457 * Return a single admin's expiration cycle time, or the min of all cycle times.
1467 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
1468 return admin != null ? admin.passwordExpirationTimeout : 0L;
1475 ActiveAdmin admin = policy.mAdminList.get(i);
1476 if (timeout == 0L || (admin.passwordExpirationTimeout != 0L
1477 && timeout > admin.passwordExpirationTimeout)) {
1478 timeout = admin.passwordExpirationTimeout;
1486 * Return a single admin's expiration date/time, or the min (soonest) for all admins.
1491 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
1492 return admin != null ? admin.passwordExpirationDate : 0L;
1499 ActiveAdmin admin = policy.mAdminList.get(i);
1500 if (timeout == 0L || (admin.passwordExpirationDate != 0
1501 && timeout > admin.passwordExpirationDate)) {
1502 timeout = admin.passwordExpirationDate;
1545 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
1546 return admin != null ? admin.minimumPasswordUpperCase : length;
1552 ActiveAdmin admin = policy.mAdminList.get(i);
1553 if (length < admin.minimumPasswordUpperCase) {
1554 length = admin.minimumPasswordUpperCase;
1585 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
1586 return admin != null ? admin.minimumPasswordLowerCase : length;
1592 ActiveAdmin admin = policy.mAdminList.get(i);
1593 if (length < admin.minimumPasswordLowerCase) {
1594 length = admin.minimumPasswordLowerCase;
1628 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
1629 return admin != null ? admin.minimumPasswordLetters : length;
1635 ActiveAdmin admin = policy.mAdminList.get(i);
1636 if (length < admin.minimumPasswordLetters) {
1637 length = admin.minimumPasswordLetters;
1671 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
1672 return admin != null ? admin.minimumPasswordNumeric : length;
1678 ActiveAdmin admin = policy.mAdminList.get(i);
1679 if (length < admin.minimumPasswordNumeric) {
1680 length = admin.minimumPasswordNumeric;
1714 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
1715 return admin != null ? admin.minimumPasswordSymbols : length;
1721 ActiveAdmin admin = policy.mAdminList.get(i);
1722 if (length < admin.minimumPasswordSymbols) {
1723 length = admin.minimumPasswordSymbols;
1757 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
1758 return admin != null ? admin.minimumPasswordNonLetter : length;
1764 ActiveAdmin admin = policy.mAdminList.get(i);
1765 if (length < admin.minimumPasswordNonLetter) {
1766 length = admin.minimumPasswordNonLetter;
1780 // This API can only be called by an active device admin,
1803 // This API can only be called by an active device admin,
1817 // This API can only be called by an active device admin,
1840 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
1841 return admin != null ? admin.maximumFailedPasswordsForWipe : count;
1846 ActiveAdmin admin = policy.mAdminList.get(i);
1848 count = admin.maximumFailedPasswordsForWipe;
1849 } else if (admin.maximumFailedPasswordsForWipe != 0
1850 && count > admin.maximumFailedPasswordsForWipe) {
1851 count = admin.maximumFailedPasswordsForWipe;
1865 // This API can only be called by an active device admin,
2039 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
2040 return admin != null ? admin.maximumTimeToUnlock : time;
2046 ActiveAdmin admin = policy.mAdminList.get(i);
2048 time = admin.maximumTimeToUnlock;
2049 } else if (admin.maximumTimeToUnlock != 0
2050 && time > admin.maximumTimeToUnlock) {
2051 time = admin.maximumTimeToUnlock;
2063 // This API can only be called by an active device admin,
2187 // This API can only be called by an active device admin,
2228 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle);
2229 if (admin == null) {
2237 intent.setComponent(admin.info.getComponent());
2300 ActiveAdmin admin = policy.mAdminList.get(i);
2301 if (admin.info.usesPolicy(DeviceAdminInfo.USES_POLICY_EXPIRE_PASSWORD)) {
2302 long timeout = admin.passwordExpirationTimeout;
2304 admin.passwordExpirationDate = expiration;
2373 ActiveAdmin admin = getActiveAdminForCallerLocked(who,
2382 // Another admin already sets the global proxy
2395 admin.specifiesGlobalProxy = false;
2396 admin.globalProxySpec = null;
2397 admin.globalProxyExclusionList = null;
2400 admin.specifiesGlobalProxy = true;
2401 admin.globalProxySpec = proxySpec;
2402 admin.globalProxyExclusionList = exclusionList;
2427 // Device admin sets the global proxy
2433 // No device admin sets the global proxy.
2481 * Set the storage encryption request for a single admin. Returns the new total request
2510 // (1) Record the value for the admin so it's sticky
2535 * Get the current storage encryption request status for a given admin, or aggregate of all
2604 * Hook to low-levels: If needed, record the new admin setting for encryption.
2616 * Disables all device cameras according to the specified admin.
2638 * Gets whether or not all device cameras are disabled for a given admin, or disabled for any
2647 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
2648 return (admin != null) ? admin.disableCamera : false;
2655 ActiveAdmin admin = policy.mAdminList.get(i);
2656 if (admin.disableCamera) {
2687 * Gets the disabled state for features in keyguard for the given admin,
2697 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle);
2698 return (admin != null) ? admin.disabledKeyguardFeatures : 0;
2706 ActiveAdmin admin = policy.mAdminList.get(i);
2707 which |= admin.disabledKeyguardFeatures;