Lines Matching refs:mService

83     private final IDevicePolicyManager mService;
87 mService = IDevicePolicyManager.Stub.asInterface(
94 return me.mService != null ? me : null;
498 if (mService != null) {
500 return mService.isAdminActive(who, userId);
513 if (mService != null) {
515 return mService.isRemovingAdmin(who, userId);
538 if (mService != null) {
540 return mService.getActiveAdmins(userId);
554 if (mService != null) {
556 return mService.packageHasActiveAdmins(packageName, UserHandle.myUserId());
571 if (mService != null) {
573 mService.removeActiveAdmin(who, UserHandle.myUserId());
590 if (mService != null) {
592 return mService.hasGrantedPolicy(admin, usesPolicy, UserHandle.myUserId());
691 if (mService != null) {
693 mService.setPasswordQuality(admin, quality, UserHandle.myUserId());
712 if (mService != null) {
714 return mService.getPasswordQuality(admin, userHandle);
744 if (mService != null) {
746 mService.setPasswordMinimumLength(admin, length, UserHandle.myUserId());
765 if (mService != null) {
767 return mService.getPasswordMinimumLength(admin, userHandle);
798 if (mService != null) {
800 mService.setPasswordMinimumUpperCase(admin, length, UserHandle.myUserId());
826 if (mService != null) {
828 return mService.getPasswordMinimumUpperCase(admin, userHandle);
859 if (mService != null) {
861 mService.setPasswordMinimumLowerCase(admin, length, UserHandle.myUserId());
887 if (mService != null) {
889 return mService.getPasswordMinimumLowerCase(admin, userHandle);
919 if (mService != null) {
921 mService.setPasswordMinimumLetters(admin, length, UserHandle.myUserId());
945 if (mService != null) {
947 return mService.getPasswordMinimumLetters(admin, userHandle);
977 if (mService != null) {
979 mService.setPasswordMinimumNumeric(admin, length, UserHandle.myUserId());
1004 if (mService != null) {
1006 return mService.getPasswordMinimumNumeric(admin, userHandle);
1036 if (mService != null) {
1038 mService.setPasswordMinimumSymbols(admin, length, UserHandle.myUserId());
1062 if (mService != null) {
1064 return mService.getPasswordMinimumSymbols(admin, userHandle);
1094 if (mService != null) {
1096 mService.setPasswordMinimumNonLetter(admin, length, UserHandle.myUserId());
1121 if (mService != null) {
1123 return mService.getPasswordMinimumNonLetter(admin, userHandle);
1154 if (mService != null) {
1156 mService.setPasswordHistoryLength(admin, length, UserHandle.myUserId());
1186 if (mService != null) {
1188 mService.setPasswordExpirationTimeout(admin, timeout, UserHandle.myUserId());
1205 if (mService != null) {
1207 return mService.getPasswordExpirationTimeout(admin, UserHandle.myUserId());
1226 if (mService != null) {
1228 return mService.getPasswordExpiration(admin, UserHandle.myUserId());
1249 if (mService != null) {
1251 return mService.getPasswordHistoryLength(admin, userHandle);
1282 if (mService != null) {
1284 return mService.isActivePasswordSufficient(UserHandle.myUserId());
1301 if (mService != null) {
1303 return mService.getCurrentFailedPasswordAttempts(UserHandle.myUserId());
1331 if (mService != null) {
1333 mService.setMaximumFailedPasswordsForWipe(admin, num, UserHandle.myUserId());
1353 if (mService != null) {
1355 return mService.getMaximumFailedPasswordsForWipe(admin, userHandle);
1371 if (mService != null) {
1373 return mService.getProfileWithMinimumFailedPasswordsForWipe(userHandle);
1415 if (mService != null) {
1417 return mService.resetPassword(password, flags, UserHandle.myUserId());
1439 if (mService != null) {
1441 mService.setMaximumTimeToLock(admin, timeMs, UserHandle.myUserId());
1462 if (mService != null) {
1464 return mService.getMaximumTimeToLock(admin, userHandle);
1481 if (mService != null) {
1483 mService.lockNow();
1518 if (mService != null) {
1520 mService.wipeData(flags, UserHandle.myUserId());
1555 if (mService != null) {
1591 return mService.setGlobalProxy(admin, hostSpec, exclSpec, UserHandle.myUserId());
1616 if (mService != null) {
1618 mService.setRecommendedGlobalProxy(admin, proxyInfo);
1632 if (mService != null) {
1634 return mService.getGlobalProxyAdmin(UserHandle.myUserId());
1755 if (mService != null) {
1757 return mService.setStorageEncryption(admin, encrypt, UserHandle.myUserId());
1775 if (mService != null) {
1777 return mService.getStorageEncryption(admin, UserHandle.myUserId());
1807 if (mService != null) {
1809 return mService.getStorageEncryptionStatus(userHandle);
1827 if (mService != null) {
1829 return mService.installCaCert(admin, certBuffer);
1844 if (mService != null) {
1847 mService.uninstallCaCert(admin, alias);
1866 if (mService != null) {
1868 mService.enforceCanManageCaCerts(admin);
1891 if (mService != null) {
1894 mService.uninstallCaCert(admin, alias);
1909 if (mService != null) {
1911 mService.enforceCanManageCaCerts(admin);
1937 return mService.installKeyPair(who, privKey.getEncoded(), pemCert, alias);
1972 if (mService != null) {
1974 mService.setCameraDisabled(admin, disabled, UserHandle.myUserId());
1993 if (mService != null) {
1995 return mService.getCameraDisabled(admin, userHandle);
2016 if (mService != null) {
2018 mService.setScreenCaptureDisabled(admin, UserHandle.myUserId(), disabled);
2037 if (mService != null) {
2039 return mService.getScreenCaptureDisabled(admin, userHandle);
2060 if (mService != null) {
2062 mService.setAutoTimeRequired(admin, UserHandle.myUserId(), required);
2073 if (mService != null) {
2075 return mService.getAutoTimeRequired();
2101 if (mService != null) {
2103 mService.setKeyguardDisabledFeatures(admin, which, UserHandle.myUserId());
2124 if (mService != null) {
2126 return mService.getKeyguardDisabledFeatures(admin, userHandle);
2138 if (mService != null) {
2140 mService.setActiveAdmin(policyReceiver, refreshing, userHandle);
2186 if (mService != null) {
2188 mService.getRemoveWarning(admin, result, UserHandle.myUserId());
2200 if (mService != null) {
2202 mService.setActivePasswordState(quality, length, letters, uppercase, lowercase,
2214 if (mService != null) {
2216 mService.reportFailedPasswordAttempt(userHandle);
2227 if (mService != null) {
2229 mService.reportSuccessfulPasswordAttempt(userHandle);
2266 if (mService != null) {
2268 return mService.setDeviceOwner(packageName, ownerName);
2290 if (mService != null) {
2292 return mService.isDeviceOwner(packageName);
2318 if (mService != null) {
2320 mService.clearDeviceOwner(packageName);
2330 if (mService != null) {
2332 return mService.getDeviceOwner();
2342 if (mService != null) {
2344 return mService.getDeviceOwnerName();
2371 if (mService != null) {
2374 mService.setActiveAdmin(admin, false, myUserId);
2375 return mService.setProfileOwner(admin, ownerName, myUserId);
2395 if (mService != null) {
2397 mService.clearProfileOwner(admin);
2409 if (mService != null) {
2411 return mService.hasUserSetupCompleted();
2457 if (mService != null) {
2462 return mService.setProfileOwner(admin, ownerName, userHandle);
2480 if (mService != null) {
2482 mService.setProfileEnabled(admin);
2500 if (mService != null) {
2502 mService.setProfileName(who, profileName);
2518 if (mService != null) {
2520 ComponentName profileOwner = mService.getProfileOwner(
2547 if (mService != null) {
2549 return mService.getProfileOwner(userId);
2566 if (mService != null) {
2568 return mService.getProfileOwnerName(Process.myUserHandle().getIdentifier());
2587 if (mService != null) {
2589 return mService.getProfileOwnerName(userId);
2618 if (mService != null) {
2620 mService.addPersistentPreferredActivity(admin, filter, activity);
2639 if (mService != null) {
2641 mService.clearPackagePersistentPreferredActivities(admin, packageName);
2674 if (mService != null) {
2676 mService.setApplicationRestrictions(admin, packageName, settings);
2705 if (mService != null) {
2707 mService.setTrustAgentConfiguration(admin, target, configuration,
2738 if (mService != null) {
2740 return mService.getTrustAgentConfiguration(admin, agent, userHandle);
2759 if (mService != null) {
2761 mService.setCrossProfileCallerIdDisabled(who, disabled);
2778 if (mService != null) {
2780 return mService.getCrossProfileCallerIdDisabled(who);
2795 if (mService != null) {
2797 return mService.getCrossProfileCallerIdDisabledForUser(userHandle.getIdentifier());
2817 if (mService != null) {
2819 mService.addCrossProfileIntentFilter(admin, filter, flags);
2833 if (mService != null) {
2835 mService.clearCrossProfileIntentFilters(admin);
2865 if (mService != null) {
2867 return mService.setPermittedAccessibilityServices(admin, packageNames);
2885 if (mService != null) {
2887 return mService.getPermittedAccessibilityServices(admin);
2909 if (mService != null) {
2911 return mService.getPermittedAccessibilityServicesForUser(userId);
2943 if (mService != null) {
2945 return mService.setPermittedInputMethods(admin, packageNames);
2964 if (mService != null) {
2966 return mService.getPermittedInputMethods(admin);
2987 if (mService != null) {
2989 return mService.getPermittedInputMethodsForCurrentUser();
3010 return mService.createUser(admin, name);
3044 return mService.createAndInitializeUser(admin, name, ownerName, profileOwnerComponent,
3062 return mService.removeUser(admin, userHandle);
3080 return mService.switchUser(admin, userHandle);
3101 if (mService != null) {
3103 return mService.getApplicationRestrictions(admin, packageName);
3124 if (mService != null) {
3126 mService.setUserRestriction(admin, key, true);
3146 if (mService != null) {
3148 mService.setUserRestriction(admin, key, false);
3167 if (mService != null) {
3169 return mService.setApplicationHidden(admin, packageName, hidden);
3185 if (mService != null) {
3187 return mService.isApplicationHidden(admin, packageName);
3203 if (mService != null) {
3205 mService.enableSystemApp(admin, packageName);
3222 if (mService != null) {
3224 return mService.enableSystemAppWithIntent(admin, intent);
3249 if (mService != null) {
3251 mService.setAccountManagementDisabled(admin, accountType, disabled);
3277 if (mService != null) {
3279 return mService.getAccountTypesWithManagementDisabledAsUser(userId);
3304 if (mService != null) {
3306 mService.setLockTaskPackages(admin, packages);
3320 if (mService != null) {
3322 return mService.getLockTaskPackages(admin);
3336 if (mService != null) {
3338 return mService.isLockTaskPermitted(pkg);
3369 if (mService != null) {
3371 mService.setGlobalSetting(admin, setting, value);
3397 if (mService != null) {
3399 mService.setSecureSetting(admin, setting, value);
3417 if (mService != null) {
3419 mService.setRestrictionsProvider(admin, provider);
3433 if (mService != null) {
3435 mService.setMasterVolumeMuted(admin, on);
3449 if (mService != null) {
3451 return mService.isMasterVolumeMuted(admin);
3469 if (mService != null) {
3471 mService.setUninstallBlocked(admin, packageName, uninstallBlocked);
3488 if (mService != null) {
3490 return mService.isUninstallBlocked(admin, packageName);
3517 if (mService != null) {
3519 return mService.addCrossProfileWidgetProvider(admin, packageName);
3545 if (mService != null) {
3547 return mService.removeCrossProfileWidgetProvider(admin, packageName);
3566 if (mService != null) {
3568 List<String> providers = mService.getCrossProfileWidgetProviders(admin);