History log of /frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
4dbb37ae95bdf60d230777c6a5e8d53b932e9d40 11-Aug-2015 Esteban Talavera <etalavera@google.com> Merge "Update setApplicationRestrictions documentation" into mnc-dev
6b8e06495b8bf7a9aeecb8f189fd174fcc457235 10-Aug-2015 Esteban Talavera <etalavera@google.com> Update setApplicationRestrictions documentation

From M we support nested Bundles in the input parameter

Bug: 23076454
Change-Id: I9c27d19ccfbc713ca757cbdde7ea9fbbc3839302
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
190a88d2ce6a08d0eb98d774b81e5ca6b82b45f8 06-Aug-2015 Alan Treadway <alantreadway@google.com> Merge "Update documentation of DevicePolicyManager intents." into mnc-dev
4582f8113d1f072087b57acbc915cc066f93917d 28-Jul-2015 Alan Treadway <alantreadway@google.com> Update documentation of DevicePolicyManager intents.

Add additional information about the intentions of result codes in
device-owner and profile-owner launch intents, in alignment with
changes made in http://ag/732321.

Bug: 21063241
Change-Id: I0e0a931739cee5f46e8fc7622fe1de49e26dcb0a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
41f2ccb9e40670e6da9aa3d4deb6bbd74fae91c4 05-Aug-2015 Rubin Xu <rubinxu@google.com> Update javadoc for EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE

Starting from M, this extra is also supported in NFC bump provisioning.

Bug: 22914251
Change-Id: I835d12918c5de4ff782245def6565eeb0f052934
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
0e3de6cacaffcfeda4d6353be61e2f1f9ed80705 30-Jul-2015 Dianne Hackborn <hackbod@google.com> Change MNC codename to just M.

Change-Id: I4281d200ff6560791c47cf9073ceea1cb509361e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
00799008832e11f06f9ddc0bf721799edee99f28 27-Jul-2015 Nicolas Prevot <nprevot@google.com> Send a public broadcast when the device owner is set.

Make it a protected broadcast.

BUG: 22623518
Change-Id: Ia36e8f0b80a6301d7d8e0461476842c78762b5e8
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
c088e30fd403b9843a00cc311e460734bd111c26 08-Jul-2015 Benjamin Franz <bfranz@google.com> Merge "Clarify javadoc of setPermissionPolicy" into mnc-dev
45dd6667e8d42c9df6957fba7e4df99b92b805ea 08-Jul-2015 Benjamin Franz <bfranz@google.com> Clarify javadoc of setPermissionPolicy

Bug: 22192363
Change-Id: I552eae1e84ce866d9873faacb5c261321351915a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
3c43095757a673166359553af5dc03159177ebd3 03-Jul-2015 Zoltan Szatmary-Ban <szatmz@google.com> Update javadoc on DPM.setGlobalSetting

Bug: 19967818
Change-Id: Id91c137f7b5200be8e8b581126a518f3b6be147e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
31659c253e62546c12f17c7f09b7f8df12758371 30-Jun-2015 Kenny Guy <kennyguy@google.com> Merge "Deprecate APIs for admin to create users." into mnc-dev
fef8cbd6a643a621a97f8e5616977e1fb65d9a5f 30-Jun-2015 Esteban Talavera <etalavera@google.com> Merge "Marking some globals from setGlobalSetting as not supported" into mnc-dev
656fa7f5d1ce9299cb63043de80f2b4db9bff497 29-Jun-2015 Esteban Talavera <etalavera@google.com> Marking some globals from setGlobalSetting as not supported

Those globals don't have the intended behaviour any more.

Bug: 19967818
Change-Id: I8c7891e59280f9deb88b1f0ffead3de07f4eca56
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
14f48e5a937b07c83f7e7a37d0319f84171b692d 29-Jun-2015 Kenny Guy <kennyguy@google.com> Deprecate APIs for admin to create users.

Bug: 21921868
Change-Id: I0a59c85f6a87928de3df72278d4b65355ff7270f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
43904fd5b7ea74f21859ec94291a70529611304c 29-Jun-2015 Kenny Guy <kennyguy@google.com> Merge "Revert "Deprecate APIs for admin to create users."" into mnc-dev
2703a13f11c27c36d1354e49fb70dd663cdf397c 29-Jun-2015 Kenny Guy <kennyguy@google.com> Revert "Deprecate APIs for admin to create users."

This reverts commit ea864c4d4d7ca390d3b67868fd2a640411bff020.

Change-Id: I827e6364b61eeb9e1b2d3205b5e93e10b1df4bfe
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
bee7245c69cd3d3c1404f35299c3867d1b8525f5 29-Jun-2015 Craig Lafayette <craiglafa@google.com> Merge "Hide MIME_TYPE_PROVISIONING_NFC_V2" into mnc-dev
01056b36622eafa657c95f9576ec2b4cacb741a4 29-Jun-2015 Kenny Guy <kennyguy@google.com> Merge "Deprecate APIs for admin to create users." into mnc-dev
3cc72bab488b7395347a3f30b40632d78d819b43 26-Jun-2015 Craig Lafayette <craiglafa@google.com> Hide MIME_TYPE_PROVISIONING_NFC_V2

Bug: 21918725
Change-Id: I33d67ff8f7b47ab53cff8a2664d342caf9d6e03f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
ea864c4d4d7ca390d3b67868fd2a640411bff020 22-Jun-2015 Kenny Guy <kennyguy@google.com> Deprecate APIs for admin to create users.

Bug: 21921868
Change-Id: I956d24a8394d95bf975581a3451ceabe01708a10
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
c200f44c46b7d6ddb104c0f09f2a4c679e218d0b 25-Jun-2015 Benjamin Franz <bfranz@google.com> Block assist when screenshots are disabled by policy

When a device or profile owner disables screen capture, we also want to
block context data being collected for the assist structure.

Bug: 21797707
Change-Id: Ib8716c6dd71d538a027c04e1e907c87e2afa0ac8
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
28b9570d0235eca305dc76c006a54c8a85cf5db8 24-Jun-2015 Esteban Talavera <etalavera@google.com> Reset permission policy to default when device owner goes away

Otherwise after the Device Owner is gone, runtime
permissions might still be auto granted/denied.
I understand that there are many other policies that
we don't reset after the device/profile owner goes
away (e.g. keyguard enabled/disabled). At least now
we have a single method when we could clear the
ones that we care about.

Bug: 21889278
Change-Id: I6997655e6ef6d474bd25ae1c323eca5b17944b16
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
0bf8f7cc3982164a9e11ea4a25ed930e466f1dd8 22-Jun-2015 Amith Yamasani <yamasani@google.com> Runtime permissions cannot be set on legacy apps by device policy

Clarify docs that runtime permissions can be granted or revoked by
a profile owner/device owner only for MNC apps and not legacy apps.

Check the targetSdkVersion and return false if legacy app.

Remove all policy flags from permissions when cleaning up
a device or profile owner.

Bug: 21835304
Bug: 21889278
Change-Id: I4271394737990983449048d112a1830f9d0f2d78
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
2c3c66a2cf06b4d081f539a1fa01b44780cc65dc 23-Jun-2015 Zoltan Szatmary-Ban <szatmz@google.com> Merge "Introduce Settings.Global.WIFI_DEVICE_OWNER_CONFIGS_LOCKDOWN" into mnc-dev
d66559f26da245d433b642d584ef290dc1fabfcc 22-Jun-2015 Julia Reynolds <juliacr@google.com> Merge "Hide device initializer methods/fields." into mnc-dev
b4c469095f12972ef04558961ddbdbdfe8305ccb 18-Jun-2015 Craig Lafayette <craiglafa@google.com> Merge "Remove FRP wipe support for device initializers" into mnc-dev
94e7bf6ed59f386019dcb563145b16e5102bed81 10-Jun-2015 Julia Reynolds <juliacr@google.com> Hide device initializer methods/fields.

Bug: 21605288
Change-Id: I4c861a053d585c16f8d05cbb3648ee5c82f6ca01
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
dd862aebda15a5b63c90b1b670373028b48172c4 16-Jun-2015 Rubin Xu <rubinxu@google.com> Merge "Deprecate SHA-1 in ManagedProvisioning (API doc change)" into mnc-dev
dbc86ad170e2c288f0154a264d12bd6dadf78c45 16-Jun-2015 Benjamin Franz <bfranz@google.com> Merge "Update documentation for PASSWORD_QUALITY_SOMETHING" into mnc-dev
c6a9653e0a4a8923116a01a5d690f5369ab63e43 16-Jun-2015 Benjamin Franz <bfranz@google.com> Update documentation for PASSWORD_QUALITY_SOMETHING

Add a mention that PASSWORD_QUALITY_SOMETHING includes patterns.

Bug: 20441473
Change-Id: I2608f36e338fb2bfbace80d49ee805841d59fa17
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
d92e75776cb19a7ab0f81819a113dd6323860bba 18-May-2015 Rubin Xu <rubinxu@google.com> Deprecate SHA-1 in ManagedProvisioning (API doc change)

Bug: 21153521
Change-Id: Ie4ee70063457260e147e6c00458f96ccc6a425e0
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
a4f9dc1cf0297dc93615e638fd490e4ef346a249 12-Jun-2015 Rubin Xu <rubinxu@google.com> Update doc of ACTION_PROVISION_MANAGED_DEVICE

It also supports an optional extra EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE

Bug: 21797182
Change-Id: Ie145e6a79dd7eebdbb4cc58e1baba761b9cc5bbf
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
5c82d2cc17df9774e677f6bab9cb52659fc2b56d 02-Jun-2015 Rubin Xu <rubinxu@google.com> Change references to APK Certificate to Signature

The fact that currently apk signature is certificates is just
implementation details.

Bug: 20820366

Change-Id: Icdd02cb51a550ea71ff83a84e2bdfcc21f8d43ed
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
09ad6bfe9619ff7a61209131f1f3182d53d840d0 02-Jun-2015 Craig Lafayette <craiglafa@google.com> Remove FRP wipe support for device initializers

- Remove ManagedProvisioning NFC parameter key from
DevicePolicyManager
- Remove wipeIfAllowed from PersistentDataBlockManager

Bug: 21558883
Change-Id: I59354b7bb1ef7e0b0346ff9a7d1654780231dff0
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
77b2d49abb38fafb91fb99ce603a92f189553cd7 11-Jun-2015 Craig Lafayette <craiglafa@google.com> Merge "Remove device initializer status messages" into mnc-dev
d168d184c02c33863b4eda56fae431437f609e2c 11-Jun-2015 Benjamin Franz <bfranz@google.com> Merge "Align the behaviour of different lock task modes" into mnc-dev
83881bdbdee14cc9726c89019490a0514686f314 10-Jun-2015 Robin Lee <rgl@google.com> Policy: make bulk CA uninstalls happen in service

Fewer round trips, only one point of contact for bugs to creep in.

Bug: 21650477
Change-Id: I1764faa753bd674ecb0d13149d778d99bd2ff4c4
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
cedd53adc3875fe1b4275afa35ec5c3ede7b6c39 09-Jun-2015 Julia Reynolds <juliacr@google.com> Remove the ability to set a preferred setup activity.

Bug: 21557327
Change-Id: I8c1809d25c5f5fcd186dfc0636d8ac47ed5fc903
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
469dd58baecb08d8f6daf559595362ada5fbe545 09-Jun-2015 Benjamin Franz <bfranz@google.com> Align the behaviour of different lock task modes

Currently lock task modes started by the activity flag
android:lockTaskMode behave differently from those started using
startLockTask(). With those changes lock tasks initiated by non-priv
apps cannot finish without calling into stopLockTask. Revoking the
whitelisting on a locked task will also kill that task, independently
of the way the lock task mode was started.

Bug: 21608206
Change-Id: I841abf1103855e2d7218a4a8ca9b43c105630dc9
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
4045d24971fea4f1506ac8f16d4deeb76ac415fe 27-May-2015 Zoltan Szatmary-Ban <szatmz@google.com> Introduce Settings.Global.WIFI_DEVICE_OWNER_CONFIGS_LOCKDOWN

This setting controls whether WiFi configurations created by a Device Owner app
should be locked down (that is, editable or removable only by the Device Owner).

Bug: 21427528
Change-Id: I0f8fb72bf9da1597e08d3dfc631d37b6b4178ff5
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
64bf7b2870b4fd38c859080441927f5a63196f5a 29-Apr-2015 Nicolas Prevot <nprevot@google.com> Make ACTION_PROVISION_MANAGED_DEVICE public.

Also remove the doc saying that factory reset is impossible if there
is a device owner: the device owner may not set the user restriciton
DISALLOW_FACTORY_RESET.

BUG:19889110

Change-Id: Iadc084a38e541061c0b0c95bfc95da73d48842d7
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
25e264507cc665e11d5f0cef1360408b3a2da07e 02-Jun-2015 Robin Lee <rgl@google.com> Device policy: consistent javadoc and annotations

Annotated all uses of the ComponentName parameter to methods in
DevicePolicyManager to indicate whether null is acceptable.

Deleted/fixed some inconsistent or poorly-worded documentation.

Bug: 21422939
Change-Id: Iadfa78c5170bf4899a9daaf93c3d4e9d8b170a45
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
240e64828f68064b2a1074a1dda1fc41fe19d711 02-Jun-2015 Craig Lafayette <craiglafa@google.com> Remove device initializer status messages

- Remove ManagedProvision Bluetooth extras from
DevicePolicyManager
- Remove ManagedProvisioning device initializer status
action and extras from DevicePolicyManager.
- Remove DIA status update protected-broadcast
and permission
- Remove DPM.sendDeviceInitializerStatus method

Bug: 21559093
Change-Id: Ibb651ebb2772ace6a16a5830f82f75465150e6e3
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
12e5fec238c6576c1fdec1a88d6696fc29426797 28-May-2015 Fyodor Kupolov <fkupolov@google.com> Merge "Fixed indentation in setProfileName method" into mnc-dev
78f1314a695838c0630da96f03af68a107816fa6 28-May-2015 Fyodor Kupolov <fkupolov@google.com> Fixed indentation in setProfileName method

Change-Id: I819bfd509b184b7952d8f9c466c9418353f890cb
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
184b3753de54241c67799089f5bc59a1ede4438a 22-May-2015 Amith Yamasani <yamasani@google.com> Add getPermissionGrantState method in device policy

This is to have a way to query what permission state was set by
the profile owner.

Bug: 21356830
Change-Id: Ie396e946b4285267c1d95f82b9d9765b43697d3c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
d8ecc5aee49874ac1f100f69be94906a3e99b951 20-May-2015 Svet Ganov <svetoslavganov@google.com> Allow DO/PO to go back to normal permission state.

We have APIs for a DO/PO to fix a permission in a granted or
denied state in which the user cannot manage this permission
through the UI. However, there is no way to go back to the
default state in which the user gets to choose the permission
grant state.

Change-Id: I2562a1d8b1385cd740b44812844ef14c895c2902
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
467eb0566ff1df320c9a9be3da0f44ee3d6bc9fa 13-May-2015 Kenny Guy <kennyguy@google.com> Merge "Allowing profile to set a subset of keyguard restrictions." into mnc-dev
396d944001f0b897b1689baa0bd7d3e04046b3ca 13-May-2015 Julia Reynolds <juliacr@google.com> Merge "Remove initiator name param." into mnc-dev
22fec2201f01222d61c84f536289fd1e8bb5a03f 13-May-2015 Nicolas Prevot <nprevot@google.com> Merge "Fix the doc for ACTION_MANAGED_PROFILE_PROVISIONED." into mnc-dev
ebe2d991602a20e051d94ec77300336383d1e7eb 13-May-2015 Nicolas Prevot <nprevot@google.com> Fix the doc for ACTION_MANAGED_PROFILE_PROVISIONED.

In the html doc, it showed up as (@see #ACTION_PROVISION_MANAGED_PROFILE).

Change-Id: I4b3eec26525c6bd87319296f4bb89d037dfc3d03
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
731051e36bb2d420a29cd889a38e02c88c930aad 11-May-2015 Julia Reynolds <juliacr@google.com> Remove initiator name param.

This won't be shown in the UI; it's not needed.
Bug: 20820224

Change-Id: I51ecd0a9151a49e26faf52e792a0b316a8facc8e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
0b7dd1e6c8422da0a21c1631244bec7a2af5085a 12-Mar-2015 Kenny Guy <kennyguy@google.com> Allowing profile to set a subset of keyguard restrictions.

Allow admins in managed profiles disable trust related
keyguard features (trust agents and finger prints) for the
parent user.
Allow admins in managed profiles to control whether notifications
from the profile are redacted on the keyguard.

Bug: 18581512
Change-Id: Ic2323671f63781630206cc2efcc8e27ee58c38e6
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
d86d58cd010b087d6d481062f84c894e0ced7bbc 05-May-2015 Rubin Xu <rubinxu@google.com> Tweak SystemUpdatePolicy according to API review.

Make SystemUpdatePolicy Parcelable; hide public constructor and
expose static builder methods.

Bug: 20820025
Change-Id: I594ba3c7e5514551134ba6c866b24498b66506bf
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
ed1ef7d4eb8934f6940a2e828ebd0e6878e1af89 09-May-2015 Craig Lafayette <craiglafa@google.com> Merge "DeviceInitializerStatus API review changes" into mnc-dev
4e401fa49875e083d18b46e0250be37ad565071c 07-May-2015 Craig Lafayette <craiglafa@google.com> DevicePolicyManager API review changes

Renamed DO_NOT_ASK_CREDENTIALS_ON_BOOT to
RESET_PASSWORD_DO_NOT_ASK_CREDENTIALS_ON_BOOT.

Bug: 20820907
Change-Id: I6455f9a6d370afbd5154505f402b409dba3b7918
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
9ef04bfb0711d54fc951ca79d38c4d14a0cc817a 06-May-2015 Craig Lafayette <craiglafa@google.com> DeviceInitializerStatus API review changes

- Remove DeviceInitializerStatus.is*Status()
- Remove DeviceInitializerStatus.FLAG_STATUS_RESERVED
- Rename STATUS_STATE_CONNECT_BLUETOOTH_PROXY to
STATUS_STATE_CONNECTING_BLUETOOTH_PROXY
- Rename STATUS_STATE_DISCONNECT_BLUETOOTH_PROXY to
STATUS_STATE_DISCONNECTING_BLUETOOTH_PROXY

Bug: 20819590
Change-Id: I276c5674a36726d3681dcc29e896ad39888d116d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
94fb2024b013522e95a880e02b73886fa7d01222 06-May-2015 Benjamin Franz <bfranz@google.com> Merge "Rename functions that disable status bar and keyguard" into mnc-dev
bece80645e2b2d84ea65aabfa7fc01d5ad633708 06-May-2015 Benjamin Franz <bfranz@google.com> Rename functions that disable status bar and keyguard

Rename the DevicePolicyManager functions setKeyguardEnabledState and
setStatusBarEnabledState to setKeyguardDisabled and
setStatusBarDisabled respectively.

Bug: 20820039
Change-Id: I06f6a19ac55b24e66e9f2cb340ead5d940cb2235
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
2f46d949e2e901eb4c0dcc3e8e3b8ddba2f24109 05-May-2015 Julia Reynolds <juliacr@google.com> Fixing docs.

Bug: 20823970
Bug: 20820224
Change-Id: If6b5c43ae5cf88bd5a09adc60c1204ba9e6ab459
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
ddd553f2aee4f3821a2f17636bb86d9fa5af9bd7 30-Apr-2015 Robin Lee <rgl@google.com> Device policy: use owner label instead of name

Managed provisioning does not currently set a meaningful profile owner
name. This changes to use the application label as returned by
PackageManager.getApplicationLabel which should be more descriptive.

Bug: 20679292
Change-Id: I5a0e87ef05b62879a73814e6d338e8b984b81c94
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
d49489b3af01c13d3b13af1cd04d53787185cc0a 28-Apr-2015 Amith Yamasani <yamasani@google.com> Permissions control via profile/device owner admin

Profile owners and Device owners can set policies for runtime
permissions. Blanket grant/deny policy can be set for a user.
They can also explicitly grant/revoke permissions for specific apps
which cannot be overridden by the user and will not be prompted.

[More implementation required in PackageManagerService and
PackageInstaller]

Bug: 20666663
Change-Id: I2c25c18c2a195db9023a17716d5896970848bb45
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
13c58bacc8f1ff35bb24ba19069bab8a41aabf68 20-Apr-2015 Julia Reynolds <juliacr@google.com> Allow device initializers to set a preferred setup activity.

This activity will launch by default on device reboot or user switch
during user initialization, even if there are higher priority 'home'
activities.

Bug: 20223050
Change-Id: I335aeb010a1ae5db07a4343d26e160c74bd299e1
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
2806374f9531490296547d4e884ce9163f4ac867 08-Jan-2015 Nicolas Prevot <nprevot@google.com> Restrict setting the profile/device owner with a signature-level permission.

Create the new permission MANAGE_PROFILE_OWNERS to restrict setting
the profile/device owner.

BUG:19838376

Change-Id: Ib55a2db85fcb6f34e3b88c398683bddb0ad66868
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
dc105cc91c63c27479d73a21702cd4ba0304acc4 15-Apr-2015 Rubin Xu <rubinxu@google.com> Enable system service to notify device owners about pending update

Create a DevicePolicyManager API which can be used by OTA subsystem
to tell device owners about pending updates. Device owners will get
a callback from its DeviceAdminReceiver when the update service sends
out such notifications.

Bug: 20213644
Change-Id: Ifcc755655e4f441980cf77d76175a046112ca9ae
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
4eb6a36922f5e98fe181c0326cc5721f0e7589ca 02-Apr-2015 Andrei Kapishnikov <kapishnikov@google.com> Introduced DO_NOT_ASK_CREDENTIALS_ON_BOOT flag

A new flag for DPM.resetPassword() method that specifies that the
device should be decrypted without asking for the password or pattern.

Bug 19250601

Related CL in Settings App: https://googleplex-android-review.git.corp.google.com/#/c/670206

Change-Id: I9ca3472dc18e66e618ff772dee16ca4a450e9997
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
97e2f7d5afebb107a8c2c65a094ae4426bbe701b 21-Apr-2015 Rubin Xu <rubinxu@google.com> Merge "Rename public OTA policy APIs in DevicePolicyManager"
5faad8e4cdf04211239f076b5d073e26d0ae3207 20-Apr-2015 Rubin Xu <rubinxu@google.com> Rename public OTA policy APIs in DevicePolicyManager

Use the term "SystemUpdate" instead of "OTA", in public
DevicePolicyManager APIs that handle OTA policies.

Bug: 19650524
Change-Id: Iebdaea91337d617147cb411b6f47e0f3fae8671c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
e94787a027763a6da7428639b0f5d00e23aa2196 20-Apr-2015 Sander Alewijnse <salewijnse@google.com> Merge "Add certificate checksum extras."
ea2ec97f37c649881f2be8a5cc40bf44080cc632 16-Mar-2015 Benjamin Franz <bfranz@google.com> Introduce device owner API to disable the status bar

Let the device owner disable the status bar to achieve multi-app single purpose
mode. When the status bar is disabled, quick settings, notifications and the
assist gesture are blocked.

Bug: 19533026
Change-Id: I72830798135136e5edc53e5e2221aebb9a7c7d57
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
e4f878cbe663a7b48f879d57ec003cebf0dcd1b6 14-Apr-2015 Sander Alewijnse <salewijnse@google.com> Add certificate checksum extras.

Bug:19984678
Change-Id: I4fc24ea98869b8331185f53e8aacacdb3775a53d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
e36087e5b6eeb92607f4ad5b3b1662bef9bafa4c 07-Apr-2015 Benjamin Franz <bfranz@google.com> Introduce device owner API to disable the keyguard

Let the device owner disable the keyguard to achieve undisturbed single
use mode with multiple apps. Calling this API has no effect if a
password
has been set for the calling user.

Bug: 19533026
Change-Id: I6b726b7f36efb669359e9da4b7e3db1f8031dad5
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
c9c9f7b40ec77217ce595fd152a505481326dc9a 14-Apr-2015 Rubin Xu <rubinxu@google.com> Merge "Add setOtaPolicy/getOtaPolicy API in DPMS"
0c606812c5102fd19eda4b3e1ffbc9e61fec6430 14-Apr-2015 Ricky Wai <rickywai@google.com> Merge "Add Bluetooth Contacts Sharing policy in DevicePolicyManager"
778ba135380cda90c4c9317c34e875c00e2743a3 31-Mar-2015 Ricky Wai <rickywai@google.com> Add Bluetooth Contacts Sharing policy in DevicePolicyManager

Bug: 19990979

Change-Id: Ide9adf66eec5721e50573c03956a1b63b7e8b18b
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
8027a4ffc285ba39df3a262abfff1cfdd6dd31db 10-Mar-2015 Rubin Xu <rubinxu@google.com> Add setOtaPolicy/getOtaPolicy API in DPMS

Allow device owners to set OTA policy for automatically accept/postpone
incoming OTA system updates. This class only provides the setting
and getting of OTA policy, the actual OTA subsystem should handle
and respect the policy stored here.

Bug: 19650524
Change-Id: I9b64949fab42097429b7da649039c13f42c10fd1
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
c06bbbfe7ac3c848384cb667b23c42ce26cc5d95 14-Apr-2015 Rubin Xu <rubinxu@google.com> Merge "Grant cert installer access to installKeyPair()"
dbe31a6616f2e8cb8436ea235149d076302fb793 02-Apr-2015 Craig Lafayette <craiglafa@google.com> Send device initializer status.

- Create method in DevicePolicyManager to send device
provisioning status to ManagedProvisioning.
- Define status updates used by ManagedProvisioning.

Bug: 20001077
Change-Id: Ia98fc765d1ebb2ba9680636ca15c2c870d160261
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
bc80a260cf9e1278f29bae22738ac6c03caa4ded 07-Apr-2015 Craig Lafayette <craiglafa@google.com> Merge "Add factory reset protection extras to DPM."
eaafdf72a410b445cee9fea274a57f31aec2509f 02-Apr-2015 Julia Reynolds <juliacr@google.com> Store the device initializer componentname in addition to package.

This removes ambiguity about which component in the initializer
package handles device initialization when setting up secondary users.
Bug: 19992262

Change-Id: I2e48168907725a56cd05d0b51c9f28b34fa28d1a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
acdc1839cf73c5ee1672f19f7098b81abdd4f0bc 02-Apr-2015 Rubin Xu <rubinxu@google.com> Grant cert installer access to installKeyPair()

Bug: 20041977
Change-Id: Id0dc0bce8461c71d7220c1802dcca82933805996
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
8e27c4ddaeb4414bd0e658553672fa9cc57a41d3 19-Mar-2015 Craig Lafayette <craiglafa@google.com> Add factory reset protection extras to DPM.

This extra will be sent to ManagedProvisioning via
an NFC bump and allow factory reset protection challenges
to be cleared.

Bug: 19792435
Change-Id: I82b0e35ec7af4372341c202c06b643d6395cc65c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
1040da1d4eb99fd2588e4c4d5b08b2e3fc0c7777 19-Mar-2015 Makoto Onuki <omakoto@google.com> Enterprise quick contact 1/2

Now openQuickContact goes thorough DPM. When a lookup URI is build with
a lookup key returned by the enterprise lookup APIs for a corp contact, the
lookup key will have a special prefix. In that case we go through DPM
and have it launch QC on the managed profile, if the policy allows.

For now we use the same DPM policy as enterprise-caller-id to disable this.

Design doc: go/cp2-mnc-enterprise-dd

Bug 19546108

Change-Id: I831a8190ae902ae3b1248cce6df02e3a48f602d2
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
4fd8d4ab2aafe8ed73080408223e8b20a953cfc4 30-Mar-2015 Makoto Onuki <omakoto@google.com> Revert "Enterprise quick contact 1/2"

This reverts commit 75a0882b946df6de4775c9e54ca023ff54f3f678.

Change-Id: Ibe332885824b228bf1b1147d141c9395554ff67f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
75a0882b946df6de4775c9e54ca023ff54f3f678 19-Mar-2015 Makoto Onuki <omakoto@google.com> Enterprise quick contact 1/2

Now openQuickContact goes thorough DPM. When a lookup URI is build with
a lookup key returned by the enterprise lookup APIs for a corp contact, the
lookup key will have a special prefix. In that case we go through DPM
and have it launch QC on the managed profile, if the policy allows.

For now we use the same DPM policy as enterprise-caller-id to disable this.

Design doc: go/cp2-mnc-enterprise-dd

Bug 19546108

Change-Id: I4840e7fad8a6a60249df07d993d26d03619650d4
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
6a38e43b8bc6b4329f5df9493f76a232eece0423 26-Mar-2015 Rubin Xu <rubinxu@google.com> Fix build breakage by ag/661236

Change-Id: Ia42440f238d76066f449dccc463b0485ab558c4d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
a55c27a79b01a7903c765618a174c2273804a249 26-Mar-2015 Rubin Xu <rubinxu@google.com> Merge "Change doc for device initializer agent extra's type."
44ef750bd4cefd5141616b7fb482bd62b35dd830 23-Mar-2015 Rubin Xu <rubinxu@google.com> Change doc for device initializer agent extra's type.

Change the DIA extra's type to ComponentName, making it consistent with
EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME.

Bug: 19891726
Change-Id: Ib41a9d22ff22e114cde80010fbc41db26f2b5f82
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
f1989002501f8133141deb7db34733b7c2e21167 25-Mar-2015 Amith Yamasani <yamasani@google.com> Merge "Fix documentation for ACTION_SET_PROFILE_OWNER"
814e9873bda63cbfbb792009a28af7eae851907c 23-Mar-2015 Amith Yamasani <yamasani@google.com> Fix documentation for ACTION_SET_PROFILE_OWNER

Does not require the mentioned permissions.

Bug: 19892754
Change-Id: I22f2563c4f50457dbeb22d734e96a99ef79adf2b
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
35e71f57b48ce7e0e5c14d1e14b0ed588148fdc8 16-Mar-2015 Andrei Kapishnikov <kapishnikov@google.com> Framework: Introduced new NFC provisioning mime-type application/com.android.managedprovisioning.v2

Related CL: https://googleplex-android-review.git.corp.google.com/657588
Bug: 19673809

Change-Id: I292f9a5b5c511c9102fb43fe938b0389af7fbc54
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
6fd1705fbc748a820cc1360acf8b6cd5999e3ea5 25-Mar-2015 Rubin Xu <rubinxu@google.com> Merge "Fix doc for package checksum in DevicePolicyManager."
1cef4196886b0cc1238111d396c1e3665a5fd2ae 24-Mar-2015 Craig Lafayette <craiglafa@google.com> Merge "Add Bluetooth connection extras to DPM."
e30ab114b1237ad88989a3d4acc608163e707451 24-Mar-2015 Rubin Xu <rubinxu@google.com> Fix doc for package checksum in DevicePolicyManager.

The checksum should be in the URL-safe base64 encoded form.

Bug: 19895519
Change-Id: I84523b796b980fb0ab8825c1ab9245489039564a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
97e473e1e19f4338f15395e5b371171fcd6e23ab 19-Mar-2015 Craig Lafayette <craiglafa@google.com> Add Bluetooth connection extras to DPM.

These extras will be used in ManagedProvisioning to allow
Bluetooth connections from provisioned devices.

Change-Id: I7118acd4ea71e2028a0c9f0c61031c78deef8908
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
151df5db5f7e7b5c094d818bac2c02328eb80b41 23-Mar-2015 Julia Reynolds <juliacr@google.com> Merge "DPM constants for specifying minimum version numbers for DO and DIA."
c173174a20510b0ceae8c4b698725c9f9a09573e 19-Mar-2015 Julia Reynolds <juliacr@google.com> DPM constants for specifying minimum version numbers for DO and DIA.

Bug: 19859261
Change-Id: Id2730dc33d433e21f3afab4f0c31c3371f368afc
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
ec32b56cc22658ecb549390fe0096fc6d7b5ac2a 03-Mar-2015 Rubin Xu <rubinxu@google.com> Add DelegatedCertInstaller API in DPMS

Allow device/profile owner to delegate certificate APIs to third-party
certificate installer apps.

Bug: 19551274
Change-Id: Iaf9abb5ecb1dc0975fa98ea14408fe392d52fbf4
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
ee1f24ff2985a32b473244cc464b3ca7854de189 16-Mar-2015 Robin Lee <rgl@google.com> Merge "Recognise insecure encryption with a new constant"
68cc42009e656b785420c531e39c131bbe6729cf 11-Mar-2015 Benjamin Franz <bfranz@google.com> Allow DO to set Settings.Global.STAY_ON_WHILE_PLUGGED_IN

Bug: 19704419
Change-Id: I3fc970eae8ef947775b6b565916bb245dea1b43b
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
ba4df962972ee271e204d157aa785cb7d0b5d968 10-Mar-2015 Rubin Xu <rubinxu@google.com> Merge "Document behavior change of isUninstallBlocked() since L MR1"
e1e6faad7b212d4042e74ca94f5428a346528ac0 10-Mar-2015 Rubin Xu <rubinxu@google.com> Document behavior change of isUninstallBlocked() since L MR1

Bug: 17914630
Change-Id: I39ee2775c104e4dca7ca583b83deef0aa0e4d1e3
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
e71a2be2ba148dc14b168127b93bb05141d7970e 09-Mar-2015 Adrian Roos <roosa@google.com> Merge "Revert "Remove TrustAgent whitelisting API""
1844025738e58d9556bf875233bfee9e9ff8e4fe 09-Mar-2015 Nicolas Prevot <nprevot@google.com> Add a new extra to specify the admin component for provisioning.

An app may have several device admins.
For this case, allow the caller to specify which one will become
an active device admin, and the profile owner (in the profile owner flow).

BUG:19348295
Change-Id: Ia5f995eed6c7f8933eb00d3250daa703ba6ee616
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
2482100fed93eac82f7d4b759bd1ec418b55be58 06-Mar-2015 Julia Reynolds <juliacr@google.com> Merge "Allow device and profile owners to set a user icon."
b37f5182052e7a3ab9e249a434367077c8d82400 05-Mar-2015 Adrian Roos <roosa@google.com> Revert "Remove TrustAgent whitelisting API"

This reverts commit bc4f2ccf6cfd1a512ad907eda2713ea3c4a1755e
and re-enables the API for MNC.

Bug: 19461292
Change-Id: I53b94bacb6a879fcc0598edfc0f3d44a9dd9e84c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
1c3754a35c434e4102c7ac3dceb887fa137b153b 05-Mar-2015 Julia Reynolds <juliacr@google.com> Add security check for clearDeviceInitializer in the service.

Bug: 19230954
Change-Id: I5c648492bef0d2b579b6f59b91afc890e3092d36
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
e925440a551b66a3d3121ec8badaf948d71d66a1 11-Feb-2015 Julia Reynolds <juliacr@google.com> DOs can clear the DI; rehide hasUserSetupCompleted.

Bug: 19230954
Change-Id: I97467229b23f3c9be1c3c4fff1c888a812f14a95
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
fca04ca0965d5e04dacc025b77f2b4881ee1afd8 17-Feb-2015 Julia Reynolds <juliacr@google.com> Allow device and profile owners to set a user icon.

Change-Id: I7c2bafb85cff3fa063af7a2f27b76c69172f0525
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
20118f18c11c01c7743b5646cc1a0039c2e90037 11-Feb-2015 Julia Reynolds <juliacr@google.com> Allow the device initializer to perform user setup tasks.

A device initializer is an application that is allowed to run
during user provisioning on device owner devices. During
device provisioning (or, user provisioning of the first user
of the device), a device initializer is granted device owner
permissions. During secondary user provisioning, a device
initializer is granted profile owner permissions. Once
provisioning is complete for a user, all elevated permissions
are removed from the device initializer and the device admin
component of the app is disabled.

Bug: 19230954
Change-Id: Ib6725fb3b09bb21e4198a5dc0b445ccebb40b27e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
2eedc9f96ad225bd4fb745215504f84ab88d8f67 03-Mar-2015 Joe Fernandez <joefernandez@google.com> resolved conflicts for merge of 5864f5ed to master

Change-Id: I6e413076af7fce85a5300abb2ba529c589dbc7e8
246a3a4a797edf5850073ec8f6b8aa997947d09b 03-Mar-2015 Joe Fernandez <joefernandez@google.com> am 14fcef3b: am c4418980: am a31378dc: Merge "Minor typo fixes in managed profile Javadoc reference pages." into lmp-docs

* commit '14fcef3bf02f46a057676d7a6d755daee735c4ea':
Minor typo fixes in managed profile Javadoc reference pages.
27f5337841f41dabbbf4db57e7091e54c4ab61a0 03-Mar-2015 Andrew Solovay <asolovay@google.com> Minor typo fixes in managed profile Javadoc reference pages.

See first comment for stage location.

bug: 19389235
Change-Id: I2e1d5169a77e3f4000e73f08d493953ce4eee78c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
08c7116ab9cd04ad6dd3c04aa1017237e7f409ac 28-Feb-2015 John Spurlock <jspurlock@google.com> Remove unused imports in frameworks/base.

Change-Id: I031443de83f93eb57a98863001826671b18f3b17
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
abc03c7ae8c9c628de319819a10ce2cbaedf1c86 26-Feb-2015 Nicolas Prevot <nprevot@google.com> Merge "Fail silently when changing BLUETOOTH_ON/WIFI_ON directly"
6cdb27e7324b43d5e907f2be1de46d8b4db02398 26-Feb-2015 Benjamin Franz <bfranz@google.com> Fix javadoc for setLockTaskPackages

Bug: 19523388
Change-Id: Idc6bdb6c7c37de2448eb2db84ab1685660639100
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
41916d492c38055928ae5ad1e0b815ff79dc4f5c 24-Feb-2015 Nicolas Prevot <nprevot@google.com> Fail silently when changing BLUETOOTH_ON/WIFI_ON directly

If the device owner tries to change BLUETOOTH_ON or WIFI_ON via
DevicePolicyManager.setGlobalSetting, fail silently.

There was not much point for the device owner to do it since it can
also change bluetooth/wifi state via normal bluetooth and wifi apis.

BUG:19311992

Change-Id: Ifba163800aa413865b8a2877cb21aacfa5cfc6c8
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
74160d8cdb2d6d63ebb9c904cb6b83271d96555c 25-Feb-2015 Jim Miller <jaggies@google.com> am b060f018: am 91aa1bdb: am 19847b07: am b46e4806: Merge "Remove TrustAgent whitelisting API" into lmp-mr1-dev

* commit 'b060f018effb27a79797e55f9eb6a592db2cb39a':
Remove TrustAgent whitelisting API
bc4f2ccf6cfd1a512ad907eda2713ea3c4a1755e 25-Feb-2015 Jim Miller <jaggies@google.com> Remove TrustAgent whitelisting API

Due to a bug caught late in the release, this API is broken
and should be removed from API 22 because it's too late for
a fix and there's no workaround.

Bug 19461292

Change-Id: Ib0757a4484b14afe7f83ae9527bb3f5f4834ee62
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
3795fb0a13bfa3c76113b1ecec383e8767824ee3 16-Feb-2015 Robin Lee <rgl@google.com> Recognise insecure encryption with a new constant

This is the default state on some devices which ship with encrypted key
storage set up already but no initial password.

Bug: 18048558
Change-Id: I055527fde21298bae2dbdca8c3a145f19b045aad
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
7f38aab7ab98e92fb37e4dd6c79df3799c456df5 20-Feb-2015 Ying Wang <wangying@google.com> Fix docs.

Change-Id: Iaa7f498dac5b87ee8f3cc6cfeabb04b51ce93245
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
db4bc57760aa74d50ac292c5b4c54e23a42473db 08-Jan-2015 Alexandra Gherghina <alexgherghina@google.com> New intent action for returning account migration result

Bug: 18551835
Change-Id: Ifc5dedf1753a7779793a8b056bac5f5733a2783d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
85bd63f461b117bf826003e671b3730255bbbe56 10-Feb-2015 Robin Lee <rgl@google.com> DevicePolicy: clarify wipeData docstring

Wiping secondary users or profiles does not cause a reboot.

Bug: 19294240
Change-Id: I59179b6d19061067326ea8ef1a730cc21f52ea53
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
d22517a7084fd3a56f22490b405c002086dc14ac 06-Feb-2015 Kenny Guy <kennyguy@google.com> am b6332fd2: am 70fb0ab4: am 8debf213: Merge "Fix mangled javadoc for setPermittedInputMethods." into lmp-mr1-dev
automerge: afca061

* commit 'afca06105c1344dade61ec5812bf605b11de0f1c':
Fix mangled javadoc for setPermittedInputMethods.
74a7024af08d8815ab3a76fe749216b58df88858 05-Feb-2015 Kenny Guy <kennyguy@google.com> Fix mangled javadoc for setPermittedInputMethods.

Fix java doc for setPermittedInputMethods.

Bug: 19276777
Change-Id: Iecd670b35cd675ff9dd4654c9876697801eb20ac
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
a9ec70ba17666e61bd003591376459aa56e1b3ec 02-Feb-2015 Julia Reynolds <juliacr@google.com> Add skip encryption constants for device owner provisioning.

Bug: 19228730
Change-Id: Id5022f2f669cf0dfc1b1523190da52c77238a02c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
bdc58c66af3440f963731cdcdf820d7108d9f98a 29-Jan-2015 Fyodor Kupolov <fkupolov@google.com> Removed userHandle from setXXX methods

User handle is now extracted from UID of the calling process.

Previously setXXX methods may not work properly, if userHandle parameter
was different from a user of the calling process. In practice, this wouldn't
have happened because setters were always called with a userHandle of the
caller process.

Bug:17202572
Change-Id: I1c08c54c975a04b8c54719a1e280ad3cfaff2e67
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
8abb6d5e9fb7a34cfb20f265af0885fc5b3b4adc 22-Jan-2015 Jim Miller <jaggies@google.com> am 0ac8dfa3: Merge "Clarify getTrustAgentConfiguration() documentation." into lmp-mr1-dev automerge: ffd1a49
automerge: 54dbd1f

* commit '54dbd1fd437862346f7cdacc484acd3e10501bfb':
Clarify getTrustAgentConfiguration() documentation.
b5db57a27d5147c8a46f1ba8a6016c3f95d52756 15-Jan-2015 Jim Miller <jaggies@google.com> Clarify getTrustAgentConfiguration() documentation.

Fixes bug 18983802

Change-Id: I2f6e208cdd4fac95d1d0228bec3de8199baafa57
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
568e54be71731bdbcd5338385eb6cc6a082c9456 15-Jan-2015 Jorim Jaggi <jjaggi@google.com> resolve merge conflicts of 87f5369 to master.

Change-Id: I5d1a7aaf48c4bf70f7181508aa46fbbcc2cf7086
2c1c5dd5ef75183101ec22d424b2d11f6b52b61b 12-Jan-2015 Nicolas Prevot <nprevot@google.com> Make documentation for cross-profile intent filters clearer.

Explain why FLAG_MANAGED_CAN_ACCESS_PARENT and FLAG_PARENT_CAN_ACCESS_MANAGED
have these names.
Also do not mention the disambiguation list since there is not always a
disambiguation list shown when resolving cross-profile intent filters.

BUG:18962528

Change-Id: Ibbb9505dcab7cf17d87435eff2cef3e745e95209
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
8add57224ffcf73705e507f1b73954e5de15eb88 23-Dec-2014 Esteban Talavera <etalavera@google.com> Remove deprecated version of setProfileOwner that takes packageName

The ComponentName equivalent should be used instead.

Bug: 17654371
Change-Id: I7001e86ab1709b824944148a3c44af5243dacb83
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
743a68fc5f62c645d442aa8b3c9ba7e7d9361785 17-Dec-2014 Nicolas Prevot <nprevot@google.com> am 237637e2: am f2bd50b2: Merge "Fix the doc of addCrossProfileIntentFilter." into lmp-mr1-dev automerge: 47cbcd7

* commit '237637e22ba9d98171f32d2302b9f532120729a9':
Fix the doc of addCrossProfileIntentFilter.
f2bd50b2ec0e5d7a25694170e0dc1363465fd24e 17-Dec-2014 Nicolas Prevot <nprevot@google.com> Merge "Fix the doc of addCrossProfileIntentFilter." into lmp-mr1-dev
fc7b4444629d9166e3fda7b28e96394356bcf56d 17-Dec-2014 Nicolas Prevot <nprevot@google.com> Fix the doc of addCrossProfileIntentFilter.

Mention that cross-profile-intent-filters only work for activity intents.

BUG:18776618

Change-Id: I209d1e38641b4ae84b682a2525e6ddae603a71f9
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
77779aa3a5eea2d275c82035b025df85b7702f07 09-Dec-2014 Fyodor Kupolov <fkupolov@google.com> am d483a85e: am fed2812d: am 22afe626: Merge "Added isRemovingAdmin method" into lmp-mr1-dev

* commit 'd483a85e69c3bb83b25473b93806e063b72c9315':
Added isRemovingAdmin method
96fb932666539e2b3be26ef91eb248a9ace5678e 02-Dec-2014 Fyodor Kupolov <fkupolov@google.com> Added isRemovingAdmin method

Added isRemovingAdmin method, so that clients can query if device
admin is currently being removed.

Bug: 17609838
Change-Id: I82547a9eeb228fcf8ac2a6e639ca1a75fa41d161
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
ef370c0ca08cfdae1b33edcdb121790bb4eb1844 02-Dec-2014 Paul Crowley <paulcrowley@google.com> am 05f23d97: am f57d9dcb: am fbeeac82: Merge "Add a tag to separate paragraphs in Javadoc" into lmp-mr1-dev

* commit '05f23d974bdfc5fb221f0bfa5bef4e9c915e52d9':
Add a tag to separate paragraphs in Javadoc
2934b266e507ddda7d64201be7850af4589b9c9e 02-Dec-2014 Paul Crowley <paulcrowley@google.com> Add a tag to separate paragraphs in Javadoc

Bug: 18571794
Change-Id: Icb9bdb87415d85cdbf790224e40abbf99a441456
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
5ff0e5fb6b339a7dea0cbc344e88673b7a99e593 26-Nov-2014 Paul Crowley <paulcrowley@google.com> am 0d122e26: am ba94fd5e: am 77e25331: Merge "Add flag for wiping factory reset protection data." into lmp-mr1-dev

* commit '0d122e265c52ef25dbad652378b3a5e51a86f041':
Add flag for wiping factory reset protection data.
a7e87acb2416d4212c84fb9c45353dbf6ee15e6a 18-Nov-2014 Paul Crowley <paulcrowley@google.com> Add flag for wiping factory reset protection data.

Bug: 18366448
Change-Id: If8904888a6bf8611d34647e6d65d2347d824dbb3
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
e1d84dd914ffe29fe821b814924b0a56506dc238 25-Nov-2014 Adrian Roos <roosa@google.com> am 9a4d0257: am 520d20c1: am 702d9e31: Merge "Fix DPM.resetPassword("")" into lmp-mr1-dev

* commit '9a4d0257beadf53c706afbcb4abc76c17a44ff00':
Fix DPM.resetPassword("")
702d9e31b1bcacff975a2b8e0d04160bbd6811ed 24-Nov-2014 Adrian Roos <roosa@google.com> Merge "Fix DPM.resetPassword("")" into lmp-mr1-dev
0d5ccb73785f83b9b74f04078e258cdc21eb4533 12-Sep-2014 Robin Lee <rgl@google.com> Ensure that private key is PKCS#8-encoded

getEncoded() is not requred to return a PKCS#8-encoded result.

Bug: 15065444
Change-Id: I1278ff9ffffe5887f149bae9288a174beed5f86a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
3a3d212a51974ccec6100c1e117225291edc83cc 29-Oct-2014 Amith Yamasani <yamasani@google.com> Different messages when wiping user and not device

There are 3 types of users
1. Primary - device will be wiped
2. Managed profile - profile will be removed
3. Secondary user - user will be removed

Show different messages for almost wipe and wipe in each
of these 3 cases.

Bug: 16843155
Change-Id: Icecfe520622773da9e45465bf2217e8ed38b266e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
f8f56bce428bb2b89d1d572ccd2d604761dbbce8 20-Nov-2014 Adrian Roos <roosa@google.com> Fix DPM.resetPassword("")

While we're at it, also fix some multi-user issues in
LockPatternUtils.

Bug: 17496766
Change-Id: I8e557ea640fa589817c8f8f818c91463585d5ea7
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
735f22850edcb5c2447c37cb96f048de8a742907 19-Nov-2014 Rubin Xu <rubinxu@google.com> Merge "Remove permission check in DevicePolicyManager.isUninstallBlocked()" into lmp-mr1-dev
a97855b784243c00b99dfcb6595164ab4a88d05c 07-Nov-2014 Rubin Xu <rubinxu@google.com> Remove permission check in DevicePolicyManager.isUninstallBlocked()

This is to allow Play to use this API to find out whether a package
is uninstallable due to profile or device owner policy's restriction.

Bug: 17914630
Change-Id: I4ce2963884ecdf3306805f36db80ed1ebf04d88f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
5a1442589f3fd3e1eca74e70ca666eb7b3a0f9b2 18-Nov-2014 Sander Alewijnse <salewijnse@google.com> Rename the dont_disable_system_apps constant.

Bug:18414080
Change-Id: Ief9c6ac4346ab0588514f89a659fcb09d10d6574
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
f39cec0b068abcf306eb91c304ed2eb76e60f8c0 14-Nov-2014 Sander Alewijnse <salewijnse@google.com> Merge "Add extra to enable device admins to skip removal of system apps." into lmp-mr1-dev
8c4115617833e83253a53fe855ea96bdb39fbe1d 12-Nov-2014 Sander Alewijnse <salewijnse@google.com> Add extra to enable device admins to skip removal of system apps.

Bug:17369849
Change-Id: Ibc1c0f480c436c7075725f79ffaaf92832c1154a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
6e33f0fbb57a8afc2184bd9a1798db8bd29e680a 13-Nov-2014 Alexandra Gherghina <alexgherghina@google.com> Merge "Add extra for account migration in the DevicePolicyMamager" into lmp-mr1-dev
aaf2f3e8954d3d5d01953ceb7c8f631db7412e13 13-Nov-2014 Alexandra Gherghina <alexgherghina@google.com> Add extra for account migration in the DevicePolicyMamager

This is in preparation for the implementation CL

Bug: 17716971
Change-Id: I3042b0781f48f3d9e84bfff899507b4b5ca156eb
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
52c39a16db077f5017ab20214e60a205e075f2d7 21-Oct-2014 Amith Yamasani <yamasani@google.com> Allow profile owners to set the unknown source setting

This allows work profile MDM to enable unknown sources
even if the user doesn't have UI for it. Installing an
app from an unknown source will still prompt the user
with the package installer dialog, so it's not like the
MDM can now quietly install apps from non-market sources.

Bug: 18316350

Change-Id: Ia8f4fe36f12a258aa888e085acc0b358925f4817
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
541afcd0b761769cc519bcb99c9cd4ebd7c0c42d 07-Nov-2014 Alexandra Gherghina <alexgherghina@google.com> Clarify documentation for DevicePolicyManager

Bug: 17634106
Change-Id: I93e4c10cb942bc8452043f81f460a5db6c3bd0a4
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
3eed90f39301089a1c16d6e2c0d027b187567cf0 07-Nov-2014 Sander Alewijnse <salewijnse@google.com> Merge "Added the restrictions pending application restrictions key." into lmp-mr1-dev
53d63dcd04da3c1d5187b29f6530c2dcac9d516c 07-Nov-2014 Sander Alewijnse <salewijnse@google.com> Added the restrictions pending application restrictions key.

Bug:17632522
Change-Id: If5a0d0ea1f479b0584fc0b1cff2a179d296d2904
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
e303bf443532c2ad756260133f00747bcff11e69 27-Aug-2014 Jim Miller <jaggies@google.com> Update TrustAgentService API after review

This change incorporates API council feedback and enables the
TrustAgent whitelisting API.

It also contains a minor cleanup of DPM's use of UserHandle
to eliminate unnecessary object creation.

Fixes bug 17008504

Change-Id: I63cc50169fde54b34406845818bcaf6aadc1a3db
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
112e053b9a07972d5ceddc3ad19c7252f3963071 29-Oct-2014 Sander Alewijnse <salewijnse@google.com> Change javadoc of setAccountManagementDisabled.

Method can also be called by device owner.

Bug:18166033
Change-Id: I38ab17bdfe9f0c4b33f5257d2f335afe16e84031
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
2c3886cb3463ff39c1986c5b85eba79748dd8c24 15-Oct-2014 Amith Yamasani <yamasani@google.com> Merge "Fix admin policies in managed profiles" into lmp-dev
242f4b125939276be866bb0a637b89bfbc5aa880 15-Oct-2014 Amith Yamasani <yamasani@google.com> Fix admin policies in managed profiles

Some of the admin policies are throwing security exceptions in
a managed profile without being documented correctly and others
shouldn't be throwing security exceptions.

Changed setCameraDisabled() to not throw an exception. It now just
prevents work profile apps from using the camera.

Changed wipeData() to allow passing in ERASE_EXTERNAL_STORAGE. In
secondary users/profiles, this is just going to remove the user, so
the flag is harmless.

Updated documentation for setKeyguardDisabledFeatures() and resetPassword()
to indicate that they cannot be called in a managed profile.

Bug: 17987913
Change-Id: I8060be4c2d32bdd4edb46ce543551fabb9c8c983
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
9797880808320e3a7bae1f59bc7e0c5a13189e5f 14-Oct-2014 Jeff Sharkey <jsharkey@android.com> Start cross profile intents as caller.

The system should always be using new startActivityAsCaller() when
starting activities on behalf of someone else, to ensure that
security checks are enforced as the original caller.

Bug: 17983737
Change-Id: Ic40816a797cfdb13c0adb48b86ed4ed7d6aae8eb
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
8d9f12161823f267179f46825734c188b6c75b09 19-Sep-2014 Amith Yamasani <yamasani@google.com> Merge "Allow primary user profile owner to set device restrictions" into lmp-dev
c34dc7cdeb5cae8ca4c731838aafe90ed4c9a2b8 18-Sep-2014 Amith Yamasani <yamasani@google.com> Allow primary user profile owner to set device restrictions

In addition to device owners, profile owners on the primary user
can also set user restrictions that are necessary to lock down the
user.

This is to enable the case of a profile owner registered after setup
wizard is completed, on the primary user.

Also make managed profile vs. profile wording consistent in the
DevicePolicyManager docs.

Bug: 17555025
Change-Id: Ib9d08b8af34a99b25e11757fa7dc83673a7deb32
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
d00cfc51fb5b6e067bf0cd31af670ad4b61d1a7d 18-Sep-2014 Kenny Guy <kennyguy@google.com> Remove suggested key names as its confusing.

Update java doc to not suggest package names
as it confused people into thinking it would
limit access to that package which isn't the
case.

Bug: 15177676
Change-Id: I0736976956d8bb604e5097326c8c4316b3007d64
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
2b338a27bef881cf751d1aeb6e42241e47e5e77b 12-Sep-2014 Sander Alewijnse <salewijnse@google.com> Rename email extra.

Bug:17389863
Change-Id: Ie001d71e92e212b83882529ed7c93303b64277c6
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
26408ccd8e852d947e58021792bfc3b315e5948d 08-Sep-2014 Bernhard Bauer <bauerb@google.com> Add DevicePolicyManager PrivateKey mgmt

Additional device policy API to install keypairs to the keychain
silently.

Bug: 15065444
Change-Id: Idc25774c9ab1a61080290bebd6f5c4f24e6ee2e0
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
d86734b4695a92359ed38d6053ed1ce16a470634 11-Sep-2014 Julia Reynolds <juliacr@google.com> Merge "Allow device owners to update LOCATION_MODE." into lmp-dev
df980618a309df46e8569d3b16a6ff4f286e24de 10-Sep-2014 Esteban Talavera <etalavera@google.com> Merge "Update string value for provisioning action and extra" into lmp-dev
e3da790f8c2a8d728ba8febc1334ff44883055d2 20-Aug-2014 Jessica Hummel <jhummel@google.com> Remove unused DEFAULT_MANAGED_PROFILE_NAME extra from DevicePolicyManager.

Change-Id: I6fe96df66a4a78cf2e2455d58bba13051d108fdf
bug:17152955
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
ef9c523848e76490270c3e954aab10369c56f602 08-Sep-2014 Esteban Talavera <etalavera@google.com> Update string value for provisioning action and extra

As per API review. This will be submitted in sync with a new version of DMAgent, as the string is hardcoded there.

Bug: 17389863
Change-Id: I3a3d7a9cf05bcb713da8690ceec6af02845a5ff1
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
86a967312a45b194f7d2a9745c62e65d8c2e03d3 08-Sep-2014 Nicolas Prevot <nprevot@google.com> Marking two flags as final.

Marking FLAG_PARENT_CAN_ACCESS_MANAGED and FLAG_MANAGED_CAN_ACCESS_PARENT
as final.

BUG:17387998

Change-Id: I1562b8638e7cce5706df4517493d1732f19ece8f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
37f0184d96ca066cb3f2e5aaf8a2ce7eda6ae946 05-Sep-2014 Esteban Talavera <etalavera@google.com> Changed value of EXTRAs to match constant name in code.

As per API review.

Bug: 17389863
Change-Id: I85df4453d3241745b5400a6805d8c8bb4f41e92a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
82735bcb1400cb5ab2da763a236a55927d87ab00 04-Sep-2014 Julia Reynolds <juliacr@google.com> Allow device owners to update LOCATION_MODE.

Bug: 17388933
Change-Id: If3267aa52c2611cf764a19bee019c312f6ebf5d1
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
aff9f4cb88c8f540bf6b22079107d9424ab63b22 04-Sep-2014 Sander Alewijnse <salewijnse@google.com> Rename email extra to email bundle key.

Bug:17197410
Change-Id: I321bc52cbb73a14869538700204ac7b5aefb3755
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
aa924b52e94ac5757ce0ae43f844684808387579 03-Sep-2014 Esteban Talavera <etalavera@google.com> Merge "Pass ComponentName to probing certificate methods" into lmp-dev
f1fe51b9140a855515e257ebb85e6cba88ea89e7 03-Sep-2014 Brian Carlstrom <bdc@google.com> Fix DevicePolicyManager javadoc

Bug: 17126717
Change-Id: Ib1d83a0e2003296ec1e17fa7c43e32c55b044df3
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
808f6ef2ac2127ea0ea14e71c9599355b631a617 28-Aug-2014 Esteban Talavera <etalavera@google.com> Pass ComponentName to probing certificate methods

Pass ComponentName and check whether that admin is a profile owner on DPM
get/has certificate methods (requested on the API review).

As per Change I55eec17e01489ab323f8a0e68b11592605a7b740, not keeping track of
which admins installed which certificates for now:

"Having per-admin CA certificates would be a fair bit of work. The only MDMs
we're opening this up to for now are Device and Profile Owners which 100%
manage the profile so will be the only admin.
It seems like if we keep track of "who installed which certs" it'll be a little
pointless because the answer will always be "the ProfileOwner" for every single
one."

Bug: 17005622
Change-Id: I45e9dac5236ab4ed235a341c208ac3cb6aba17da
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
90f14bf53e4c37d0d6d13fbecd48fb88dad06241 20-Aug-2014 Sander Alewijnse <salewijnse@google.com> Add the provisioning extra admin extras bundle.

Enables the MDM app running (as a regular app) in the primary user to pass
through a bundle of data with which to bootstrap the instance of itself
running as profile owner in the managed profile.

Bug:17126717
Change-Id: I28a368d13e33990b16dcd68436902e0a077d5f5d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
24ac55e658f955c330fff4bb143cfc6af37e40bf 27-Aug-2014 Selim Cinek <cinek@google.com> Added a warning when the profile has an owner

Also fixed a bug where a post in the QSFooter
was not always on the mainthread leading to a
crash.

Bug: 17066115
Change-Id: Iea9e1032973058ed5e63e70da4dc0bcf34fa59a3
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
729b2a6c2f330c10674bb3fc0c4f2eb57e3d0a43 27-Aug-2014 Esteban Talavera <etalavera@google.com> Renamed getUninstallBlocked to isUninstallBlocked

As per API review.

Bug: 17297103
Change-Id: Icb4ceded317b0df4deb0f5221512541a632e150b
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
e193455ee20dc6bb44740959d010a8e41f1e64df 27-Aug-2014 Jim Miller <jaggies@google.com> Merge "Hide trust agent whitelisting until new API is ready." into lmp-dev
b1474f4432097cf20c06b471b57359ddd16fe460 27-Aug-2014 Jim Miller <jaggies@google.com> Hide trust agent whitelisting until new API is ready.

Fixes bug 17008504

Change-Id: Ic93d52042e9b6d6f7d634f22aa04642f2da1af32
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
19d431f330bf1d89c92c0971dad5fa8f5950b16d 27-Aug-2014 Julia Reynolds <juliacr@google.com> Merge "Limit the settings profile/device owners can update." into lmp-dev
9ed66da8dfd15001cebe8f7ef453718f41f9904d 26-Aug-2014 Julia Reynolds <juliacr@google.com> Limit the settings profile/device owners can update.

Bug: 16351901
Change-Id: Id33a57ad651b5b7b58de0549eb90d5a1fe5c19c5
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
ebaf5c70e9889c99a74b7066b20b1c6ccd0da86a 27-Aug-2014 Sander Alewijnse <salewijnse@google.com> Merge "Provide lockdown of date/time device owners." into lmp-dev
d22a6677312d17d23da3b655a2e9b12533dfff76 27-Aug-2014 Jim Miller <jaggies@google.com> Merge "Limit grantTrust() duration to DevicePolicy-imposed limit." into lmp-dev
fbb28dfb9511679bc615c4424c21a901b2dba4cc 26-Aug-2014 Esteban Talavera <etalavera@google.com> Revert API constants to previous value to match hardcoded value in google3 apps

Revert value of DevicePolicyManager constants that were hardcoded in dmagent. See previous change I6f60a43fe23526cfe855d81015feb759cf643926.

Bug: 17275391,17005622
Change-Id: I606b010eb0399f7b34b59c99f96549949410bafc
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
0ced6272911f440843e9ff8e89b9fafdb49b243b 26-Aug-2014 Sander Alewijnse <salewijnse@google.com> Provide lockdown of date/time device owners.

Fixed two minor issues with the screencapture as well.
Updated documentation and added enforceCrossUserPermission.

Bug:16948504
Change-Id: I9a645dcf480a4a044879ba481bce964d06fe5153
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
76b9b8b0ca537bad6c4da388d77a9e5dee023856 23-Aug-2014 Jim Miller <jaggies@google.com> Limit grantTrust() duration to DevicePolicy-imposed limit.

Fixes bug 17046034

Change-Id: I5c512c2d05e7e0ed81eaf0dcafacc6f62a5c5937
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
d4efaac5d54cdb3735b032bb76a5639949f33216 15-Aug-2014 Jim Miller <jaggies@google.com> Update TrustAgentService API after review.

Also documents timebase on related DevicePolicyManager API.

Fixes bugs 16401527 and 17046034

Change-Id: I8ee6d0055ab6f52ec71630344d3232f7875d9c1d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
01e6a6fef1ebcbdf391629197d050c03b415c602 21-Aug-2014 Nicolas Prevot <nprevot@google.com> Merge "Marking the methods to get Profile/Device Owner with @SystemApi." into lmp-dev
465acf3f3f5111b58025d6272f2fd734c0c69390 06-Aug-2014 Nicolas Prevot <nprevot@google.com> Marking the methods to get Profile/Device Owner with @SystemApi.

BUG: 16860239

Change-Id: I60126a8112a57e836cae3bcd9b62ebf50385f5ec
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
e4be1bf2bed48afd234ea1f2558c60beffe3fa18 21-Aug-2014 Esteban Talavera <etalavera@google.com> Merge "Set last phrase for constant values of EXTRA_* fields to ALL_CAPS" into lmp-dev
5cef4fa9c189a43ca081d74319f6046e4eba6b8d 21-Aug-2014 Esteban Talavera <etalavera@google.com> Merge "Updated documentation for setScreenCaptureDisabled()" into lmp-dev
2df7d1ef51ebff5228e0cbd7e15a34fce7307390 21-Aug-2014 Esteban Talavera <etalavera@google.com> Merge "Rename PROVISIONING_NFC_MIME_TYPE to MIME_TYPE_PROVISIONING_NFC" into lmp-dev
d5c5c13c8505a27290a2540ff1f64c8753431cb1 20-Aug-2014 Esteban Talavera <etalavera@google.com> Rename get/setBlockUninstall() to get/setUninstallBlocked()

As requested in the API review

Bug: 17005622
Change-Id: I1332ad11e588ab3fa409f2a28222608936cb383e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
8c5c37364776266d9d91bb35094a9755707833f7 21-Aug-2014 Esteban Talavera <etalavera@google.com> Merge "Remove setApplicationsHidden" into lmp-dev
d469a0b9cef0cd68e666e64a8ea05c14be8299f0 20-Aug-2014 Esteban Talavera <etalavera@google.com> Set last phrase for constant values of EXTRA_* fields to ALL_CAPS

As requested in the API review.

Bug: 17005622,16486199
Change-Id: I6f60a43fe23526cfe855d81015feb759cf643926
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
1aee98fbf3937879c65c523396939ffa054d2fa0 21-Aug-2014 Esteban Talavera <etalavera@google.com> Updated documentation for setScreenCaptureDisabled()

As requested in the API review. Also, removed unused import.

Bug: 17005622
Change-Id: I0bc57411ec34119f64e28eaf27c32a67b45fd66f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
b9e468cb9d77abf57473436e29042e1b27d9f70b 21-Aug-2014 Kenny Guy <kennyguy@google.com> Merge "Add apis for whitelisting IMEs and accessibility services." into lmp-dev
115cd65d2a3417b506563e6b2d60c269d69efaef 21-Aug-2014 Esteban Talavera <etalavera@google.com> Remove setApplicationsHidden

As requested in the API review. This version (the one that takes an Intent) was used only in the DeviceAdminSample and some CTS tests.

Bug: 17005622
Change-Id: I9984b22836417ad4d025302f61bd91704e9345a4
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
fa80a4faa3ab32f61742b684e832126dae8468e7 20-Aug-2014 Kenny Guy <kennyguy@google.com> Add apis for whitelisting IMEs and accessibility services.

Adds apis for device / profile owners to white list
the accessibility and input methods a user can enable.

Bug: 14469005
Change-Id: I921888660d29a5370395db87adf75d4d106660c9
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
f057f06631e32471cd1ce8f34222251c0537a406 20-Aug-2014 Esteban Talavera <etalavera@google.com> Rename PROVISIONING_NFC_MIME_TYPE to MIME_TYPE_PROVISIONING_NFC

As requested in the API review. References to that field fixed on changes I123a5193d03b313160f934644b02be62b8394649 and Ibf1bb38f481e9e0dd898d662b18a1c54f201f830

Bug: 17005622
Change-Id: I08c53465d98678c06f65eeed5e7e9dcdce7bbcf0
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
38f836b972adac73c563692352b345cc09556364 20-Aug-2014 Amith Yamasani <yamasani@google.com> Add a hidden method to query profile owner name for a user

Bug: 17066115
Change-Id: I812a37ea2e7bb6da5aa4c31cb7e37934e5d698fa
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
d1d7c022c6f83e836acb74eed1a5a201e495bd85 20-Aug-2014 Amith Yamasani <yamasani@google.com> Rename restrictions API class and method

AbstractRestrictionsProvider -> android.service.restrictions.RestrictionsReceiver
requestPermission->onRequestPermission

Bug: 17006805
Change-Id: I03b1626d6abcd2ad739a55b60b54fdbf9810ceca
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
95d9ad0f79c900db9bca1745100f14d0ec9cc133 18-Aug-2014 Jason Monk <jmonk@google.com> Merge "Fixes to lock task API from API review" into lmp-dev
48aacba761527a529c2b668c8151c7f98ff70524 13-Aug-2014 Jason Monk <jmonk@google.com> Fixes to lock task API from API review

Adding ComponentNames and some splitting/renaming of broadcasts.

Bug: 17005622
Change-Id: I9ece3553310fb20b0c3c3e4032b408e86384363a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
7e67871174774973d416c6f25c9f23abad86d3fd 24-Jul-2014 Robin Lee <rgl@google.com> Clean up DevicePolicyManager CA certificate APIs

For consistency all CA-related methods now require the ComponentName
of a DeviceAdminReceiver as the first parameter. Updated javadoc for
this and added in some more detail about the methods in general as
well.

Created two new utility APIs,one to list all installed CAs and one to
remove all installed (user) CAs. Deleted old hasAnyCaCertsInstalled
method because it is now redundant.

@bug 16488006

Change-Id: I55eec17e01489ab323f8a0e68b11592605a7b740
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
976e8bd2017d0263216c62111454438cc0f130e3 17-Jul-2014 Svetoslav <svetoslavganov@google.com> Allow adding widgets from user profiles.

The goal of this change is to enable support for appwidget from
user profiles to the user main profile. A user profile is a user
which is associated as a child of the main user profile. For example,
a user may have a personal (parent) and corporate (child) profile.
The device policy should be able to control whether adding a widget
from a child profile and given packages is allowed. This change
assumes that all packages from managed profiles are white listed.
Another change will add the device policy changes.

Change-Id: I267260b55d74c48b112a29979a9f59eef7a8194e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
3f1ddf83a4faba3dec71ed7eebe1835f4685cf60 02-Jul-2014 Zoltan Szatmary-Ban <szatmz@google.com> Add AsUser versions of existing DevicePolicyManager methods

Some API methods on DevicePolicyManager call underlying IDevicePolicyManager methods
that can be parameterised with a user id. DPM however only exposed methods for the current user.
This CL makes it possible to call them with any user id by introducing hidden methods on
DevicePolicyManager.

Bug: 15558397
Change-Id: I1786a64fa7cf5f6590ddd04cbf4527bb159f8795
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
90af6d736550305a9201c57a5e055fb52c999dab 30-Jul-2014 Nicolas Prevot <nprevot@google.com> Fixing a NullPointerException in isProfileOwnerApp.

Fixing a NullPointerException in isProfileOwnerApp of DevicePolicyManager
if there is no profile owner.

BUG: 16673376
Change-Id: I912fcd38343d3c1893313e6335802d26014a2e9d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
bf3a9465483976dcd5692b619b47132c2b95f73e 28-Jul-2014 Amith Yamasani <yamasani@google.com> Set profile owner via an intent

priv apps can request to become a profile owner after setup has
completed. This will pop up a consent dialog (in Settings).

Also, clean up profile owner concept to be a component name.

Change-Id: I5e8532866e8018f61836c4e84fbbadb6150218ae
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
489d2dfc2931dcf51358fd51e4bee6901bff30ac 29-Jul-2014 Adrian Roos <roosa@google.com> Fix checkbuild

Change-Id: I9c3de31af792863b93a29ef81b50e2149b0a2184
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
a06d5ca1d96af3555ad4e384994e6321a0c5bb9c 28-Jul-2014 Adrian Roos <roosa@google.com> Make TrustAgentService a SystemApi

Bug: 16401527
Change-Id: I6d19281600bacac7c8a29afc07c39ca1d461d23c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
604e7558ef32098644b2f9456d7743a07ae789dc 19-Jul-2014 Jim Miller <jaggies@google.com> Add new DevicePolicyManager API to allow fine-grained TrustAgent management

This adds a new feature that allows a device admin to specify a
whitelist of features that are allowed for the given admin.

Change-Id: I83f853318efbcf72308532d0a997374f73fa9c10
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
ddbce3263270c3b66c377be2d9f388fc11b23483 28-Jul-2014 Nicolas Prevot <nprevot@google.com> Merge "Storing the app who sets a CrossProfileIntentFilter." into lmp-dev
3f7777fa4f1d392e18bad39edcd4539880c52ff9 24-Jul-2014 Nicolas Prevot <nprevot@google.com> Storing the app who sets a CrossProfileIntentFilter.

When we add a CrossProfileIntentFilter, we store the package and userId of the calling app
inside the CrossProfileIntentFilter.
When an app calls clearCrossProfileIntentFilters, we only remove the filters that the calling app
has set itself.

BUG: 16537557

Change-Id: I6e7bc859383ea66553d9f4230365df8ba27525f3
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
af9f8aed7d3955b0d1c75943290467f39c7a7681 28-Jul-2014 Sander Alewijnse <salewijnse@google.com> Merge "Add http cookie header key as a provisioning extra." into lmp-dev
681bce94df324ef84a804131691b6c33119197c4 24-Jul-2014 Sander Alewijnse <salewijnse@google.com> Add http cookie header key as a provisioning extra.

Change-Id: Id07ab52f265536b9790f4eb6ae314875e81a61d7
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
b5deda7382effe9b6dc5cc7d96d68f950c2fc88b 24-Jul-2014 Justin Morey <jmorey@google.com> Fix build

Change-Id: I8790b274864610b7e00d7ea12efe96b3b826301f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
80440cc853611e77268d8c67db2279c10b2e076e 24-Jul-2014 Justin Morey <jmorey@google.com> Expose setActiveProfileOwner() using @SystemApi

Change-Id: I1607fa90e76da495ede48f01ad250baae60108af
(cherry picked from commit 85db24136eefb01341760208541563aba05ce82e)
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
d2a1eec400128f39e1b223a720a88dbd395f3e6e 09-Jul-2014 Sander Alewijnse <salewijnse@google.com> Add Device Policy API to disable screen capture.

WindowManager will set secure flag on SurfaceControl for
all windows of a flagged user to prevent screen capture.
API is consistent with the camera disable API.

Change-Id: Ib180f67f1ad827b6f4aca2af615274256cce58f4
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
e5bcff624fb58b6f95be8ddff7f5b6b3bf5d19c7 20-Jul-2014 Amith Yamasani <yamasani@google.com> Rename setApplicationBlocked to setApplicationHidden

This corrects the expected behavior of the app state. Hidden apps
can be installed by the store to be brought out of hidden state.

Bug: 16191518
Change-Id: Id128ce971ceee99ba1dea14ba07ce03bd8d77335
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
570002ffd477271c3c9a8457fd67ed3711615daa 19-Jul-2014 Amith Yamasani <yamasani@google.com> Add a hidden API to expose cross profile caller id check

To be used by telephony/contacts.

Change-Id: If8e06c20a708ce5e8f7d717d8758c19a78efa46d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
06e345089a0425c6cd5a5596835113fb229b7d41 17-Jul-2014 Jim Miller <jaggies@google.com> Add DevicePolicyManager flag for fingerprint.

Change-Id: Icb3e4b98d97487179acefabc7a3b747d3d0fa23a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
c8fa3ae2ce238843496d7aa3f1c4042bb9bb98b4 17-Jul-2014 Adam Connors <adamconnors@google.com> Merge "Create DPM APIs for cross profile callerId" into lmp-dev
210fe21e95cfff98734f5b849b205cdcb0706948 17-Jul-2014 Adam Connors <adamconnors@google.com> Create DPM APIs for cross profile callerId

Contact information in the managed profile is shown
in the incoming call UI unless blocked using this API.

TODO: Actually plumb this into the caller-id logic.

Bug: 16301261
Change-Id: If03adc907d9558baa0a45a1833b857206b7bf96a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
999d394adee533c55fce38bd632ffd4f1af91362 03-Jul-2014 Alexandra Gherghina <alexgherghina@google.com> Ads per-user APIs to manage accounts through the AccountManager

Bug: 16056552
Bug: 14642886
Change-Id: I17ff6c2515285e63c84cecf2f861d10666c393c5
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
655be2a98ea6285fc33aec4b223e90c2620927f1 14-Jul-2014 Adam Connors <adamconnors@google.com> Revert "Remove enableSystemApp methods."

We need to go back to uninstalling system apps so we can
re-install non-default system applications through Play.

This reverts commit e3dbcd138c07f2d32ac84229d0a49052cc18d424.

Change-Id: I0a7af094614c4a10800971c82e10571f7312e079
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
c8c8425b51a4f68fae993e68b357679ca27d155d 14-Jul-2014 Amith Yamasani <yamasani@google.com> App restrictions schema and parser

Documented the restrictions schema in RestrictionsManager docs.
Added a parser to read the meta-data and XML file on the device.
Added more types and methods in RestrictionEntry to accomodate some
new types and construction modes.
Added a styleable for restriction attributes.

Slight tweak to permission response params.

Bug: 14582645
Change-Id: I193d1162741d110c100831cab33b48e2baf7426c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
f6e2fcc2eaf5e650237d3c6d79a2de49d2d4111e 10-Jul-2014 Amith Yamasani <yamasani@google.com> Improvements to Restrictions API

Convert restrictions provider to a service instead of a receiver.
Add a way to get pending responses from restrictions provider.
Add AbstractRestrictionsProvider.
Add a callback API for responses.

Removed some constants in RestrictionsManager.
Added new constants for errors and error codes.
Much improved javadocs.

Bug: 16176009

Change-Id: I838a50fabc80b94b632294b3a55cd5d8092acf55
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
582d9111d76632027fed7af10d05d4b44df16c0c 10-Jul-2014 Jason Monk <jmonk@google.com> Add API for device owner to switch users

Once verified that caller is device owner just calls through to
the activity manager and acts like that call.

Change-Id: I34023313cd6742b73d2105655ec6b631879aa37a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
85516d028b2dcc7ebc09f4a68085836aa26191d5 01-Feb-2014 Jim Miller <jaggies@google.com> Add new "pin complex" type to supported keyguard PINs

This adds a feature to allow DevicePolicyAdmins to prevent using
simple PINs, which are defined as those containing more than 3
repeated values. Examples include '1234', '2468', '1111', '9876', etc.

Bug 12081139

Change-Id: I4ebe1c76a48087dcd7c878e9bd79a4e3ee2a27fe
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
98acdc8007a0e168a018f90b4e03d4dd0b2ccc9b 05-Jul-2014 Nick Kralevich <nnk@google.com> am 3cdc06bb: am dbb32da8: am c9eff23b: Merge "Fix typo in DevicePolicyManager documentation"

* commit '3cdc06bb370a2f29d334e6916969e954875d51fe':
Fix typo in DevicePolicyManager documentation
c9eff23b443f26fb8c4873a6ecb61eded0564163 05-Jul-2014 Nick Kralevich <nnk@google.com> Merge "Fix typo in DevicePolicyManager documentation"
c13053bf1c05b980421611487ce67677c08db299 29-May-2014 Kenny Guy <kennyguy@google.com> Add package state to block uninstall.

Add package state to allow profile or device
owners to block uninstall of packages.
Add API to DevicePolicyManager to set/get the
state.

Bug: 14127299
Change-Id: I03528819850b42df7bafa7747bb9e4558d20c4e6
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
edb7ae704b7a37b3665bc96165ba8aa9ff86b375 26-Jun-2014 Jessica Hummel <jhummel@google.com> Remove unused action from DevicePolicyManager.

This is part of a simplification to cut out one communication with mdm apps.

Change-Id: I7d0067928c20387dca8fcc45a7bc48d9d158fa2c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
1c7c319bb89b9988bfd12afc3e8d89449fd163fc 26-Jun-2014 Jason Monk <jmonk@google.com> User restriction for disallowing window creation

Block any types of windows that could by used by apps to create
views on top of a locked app. This can be used by device admins
in conjunction with lock task mode.

Added a way for system (and priv apps) to bypass user restrictions
for specified op codes.

Bug: 15279535
Change-Id: I2381530ef6226a5bb32a99bb4030baafb39bf564
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
aba4f1b54a2b7b2aefc840dcb3b46459aa1bde23 01-Jul-2014 Amith Yamasani <yamasani@google.com> Add a method to set a profile owner and active admin at once

This can be used by system apps to register a profile owner during setup

Bug: 15922051
Change-Id: Iee1b5adeb47d7e40ab36df18e3a057d8ee430f46
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
a55fc9920117eabae7c0bb7339d8d9f5d3f5a9c1 30-Jun-2014 Jessica Hummel <jhummel@google.com> Merge "Provide api to set the managed profile name."
1333ea1ed7a95eb9e1be43c20a0c48e901654cac 23-Jun-2014 Jessica Hummel <jhummel@google.com> Provide api to set the managed profile name.

Instead of sending the profile name in the provisioning intent
the mdm should set the profile name after provisioning has completed.
This allows us to simplify the provisioning flow and the mdm can
change the name of the profile later on if required.

Change-Id: I821ef2300eae74e89872152ae1c89ac3ecbb82e7
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
1cc4ecc3e2c64ade5078581b039e1b068c6ed0ed 23-Jun-2014 Sander Alewijnse <salewijnse@google.com> Add public constants for Device Owner Provisioning.

Change-Id: I46dca4e31ab256273eb810f57083f31541815735
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
c5185f2bf1bf15ea0cfd72d30167fcbb1d61d437 24-Jun-2014 Jason Monk <jmonk@google.com> The profile owner shouldn't control lock task

Since managed profiles are started on bootup, the managed profile
would be allowed to set an app (possibly itself) as a lock task
app and then run itself on bootup and constantly control the
device. This privelege should be restricted to device owners.

Change-Id: I4a93aabd6054cbe75076ef0517fce03ffa74dc93
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
aab72f3b0ab740e12b4a2576a99852081529feb5 19-Jun-2014 Robin Lee <rgl@google.com> Merge "Revert "Revert "Publish DevicePolicyManager CA certificate APIs"""
306fe08ce2b06671336e67a87afaa0851f0105eb 19-Jun-2014 Robin Lee <rgl@google.com> Revert "Revert "Publish DevicePolicyManager CA certificate APIs""

This reverts commit 792b270dbdc980cfe04e8d461bf00a1f45b5e936.

Change-Id: I18c7e0eca39868230cd8e4f4bbeb3c44ff9e8b78
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
2b5e917026fe4e6dec8712ee24bdffee8d62ab33 18-Jun-2014 Robin Lee <rgl@google.com> Revert "Publish DevicePolicyManager CA certificate APIs"

This reverts commit 5260bf69946563dc47c17e7441b352adfce384c5.

Change-Id: I5e44fdac8a7375576b25171f58e31a1fa0e3c569
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
7ccf51dd796cc4c2bfcdf3d3a17b9987a4c8461d 18-Jun-2014 Jason Monk <jmonk@google.com> Merge "Change clearDeviceOwnerApp to take a package"
94d2cf9725ba21a60e28fc9dadb3b65bac873e12 18-Jun-2014 Jason Monk <jmonk@google.com> Change clearDeviceOwnerApp to take a package

If the caller is sharing uid, then the package from getPackage()
may not be the desired one. This also matches better with the
other device owner calls.

Change-Id: I14f2ec4bff0717273f626072dabad0d2c76068a5
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
d7b8621bde44857ebb07130693a00f5f777887d4 16-Jun-2014 Jason Monk <jmonk@google.com> Change lock-task DPM authorization to packages

Switch the DPM lock-task authorization to be controlled by a package
rather than a component.

Change-Id: Ife9bed068f31ff2449b4451ab69d3586a3f09d89
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
837304f6f6ae37dc475fa6e0e620f1c2321f2e11 11-Jun-2014 Robin Lee <rgl@google.com> Publish DevicePolicyManager CA certificate APIs

Exposes these methods:
- hasCaCertInstalled
- hasAnyCaCertsInstalled
- installCaCert
- uninstallCaCert

Allows device and profile owners to perform some certificate management
including querying for and enabling/disabling specific CA certificates.

Change-Id: I4aa8a1a8601b234e30acde99dfa382e04cb62495
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
0cc9c1e9d3d3121d961cf184de73578bc6708879 11-Jun-2014 Nicolas Prevot <nprevot@google.com> Merge "Changing the value of the user consent extra in DevicePolicyManager."
4e81913a66c98bfd9939376640b89015a23580a1 12-Jun-2014 Jason Monk <jmonk@google.com> Merge "Allow device owner to configure secondary users"
03978a40b3a4c268329ae733eff8dfffd92f6e09 10-Jun-2014 Jason Monk <jmonk@google.com> Allow device owner to configure secondary users

Currently the device owner can create secondary users, but unless
it is a system app it will not be installed and will not be able
to pass data easily from the code that creates the user and any
code running on that user.

This allows the device owner to install itself while creating a
user and start up a service to configure that user. createUser
takes an bundle so that the device owner can pass across any
initial setup data it needs to, this bundle will be sent to
the admin receiver in onEnable.

Change-Id: Ic1f8565dd2a7bd85363527cf68b0ecd4dc9c3636
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
fb8a98d3f30487b2ecb69693c5b82061490cf8ad 10-Jun-2014 Nicolas Prevot <nprevot@google.com> Changing the value of the user consent extra in DevicePolicyManager.

Renaming android.app.action.USER_HAS_CONSENTED to
android.app.action.ACTION_PROVISIONING_USER_HAS_CONSENTED

Change-Id: I65a3b8f1ec29a0bed5b61ff9e7587195e1c96cec
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
4a21b25fad62e4f19d13ba814263841c931f56ef 04-Jun-2014 Julia Reynolds <juliacr@google.com> Allow profile and device owners to change and get the master volume mute state.

Also protect muting master volume with op code OP_AUDIO_MASTER_VOLUME.
Bug: 13585918
Change-Id: I91fe7ee60cd291cca15966b3127c0bb8a4828f6a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
f89fa8337466be97e40c3ae3cc37704e3f666b5e 09-Jun-2014 Jessica Hummel <jhummel@google.com> Merge "Update documentation so it meets api requirements"
e8b8f99dde2aea3958d3169627e1fe2b02d8627b 09-Jun-2014 Nicolas Prevot <nprevot@google.com> Merge "Updating documentation for the flags of addCrossProfileIntentFilter"
9da603973bcde2fb4566d6cc1bcb0f764fd383f4 21-May-2014 Jessica Hummel <jhummel@google.com> Update documentation so it meets api requirements

Change-Id: Ice52dc3d5ecca77f81d3df1b43179c94aece6fef
bug:15023443
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
41d926e3e4dc5b6a7f21f56168d222df562a5ebd 09-Jun-2014 Nicolas Prevot <nprevot@google.com> Updating documentation for the flags of addCrossProfileIntentFilter

Change-Id: I32ed07aecdc8009cbb5708777da5085feabfd4ef
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
b0dced8173a9a930bc0ea2a7a669a907aaffd735 06-Jun-2014 Jason Monk <jmonk@google.com> Add an API to clear the device owner.

Only the device owner will be able to clear itself.

Change-Id: Ie3231467d92e8c5d22ec51256177793f34110432
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
03bc9918345a977e9c45796bf3bb5bf9a3b87d25 13-May-2014 Jason Monk <jmonk@google.com> Add device-owner based setting of global proxy.

Re-hide the setGlobalProxy on the ConnectivityManager as it requires
CONNECTIVITY_INTERNAL. Instead add a function to the DevicePolicyManager
to set the global proxy, that can only be called by the device owner.

Change-Id: I9ffb2cc4f30a6dc9b868d86f056e1fbd512d8dfc
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
07ac20bb2c763409cfc2f3b33ca692181fd1fb1a 27-May-2014 Nicolas Prevot <nprevot@google.com> Adding an extra and an action to notify the mdm to start the provisioning.

Adding EXTRA_PROVISIONING_EMAIL_ADDRESS and ACTION_START_PROVISIONING to DevicePolicyManager.

BUG: 15157562

Change-Id: Ic3ecc6b0a501e1df9a5f803a44347dd024a7a07c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
1b8737ee18f5d80adda41eafca6143a046a47a13 04-Jun-2014 Sander Alewijnse <salewijnse@google.com> Merge "Remove enableSystemApp() and enableSystemAppWithInten()."
3742ec394f2603af465dcaa5909916b1065243c3 27-May-2014 Nicolas Prevot <nprevot@google.com> Adding user consent extras to DevicePolicyManager.

Adding ACTION_PROVISIONING_USER_HAS_CONSENTED and EXTRA_PROVISIONING_TOKEN to DevicePolicyManager.
They can be used to tell ManagedProvisioning to skip user consent.

Change-Id: I5ef8ab2a14969bb29a2ee3dbdce5ca3225e0759a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
f20d640fa2b155a971ddfe0965fc803a73b5e53c 25-May-2014 Amith Yamasani <yamasani@google.com> Restrictions Manager

Mechanism to register a provider for requesting an
administrator to respond to permission requests.

Request format and response format constants.

Description of manifest template for static restrictions.
Int type introduced in RestrictionEntry.

Needs more javadoc and better description of manifest templates,
including specifying the XML attributes.

Change-Id: I5a654d364e98379fc60f73db2e06bf9a8310263d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
866896df168d1382732c97e49617ab2f2995d376 27-May-2014 Sander Alewijnse <salewijnse@google.com> Remove enableSystemApp() and enableSystemAppWithInten().

Use setApplicationBlocked() and setApplicationsBlocked() instead.

Change-Id: I3d323d704db0a45e936f63675821707b4fddc48b
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
8194899071e0a84c95ef10614bd1b9485b48f589 16-May-2014 Nicolas Prevot <nprevot@google.com> Rename code related to cross-profile intents.

For example, replace ForwardingIntentFilter by CrossProfileIntentFilter

Bug: 15023443

Change-Id: Iee8cdf578817ef9956bcdece803a49b0d07b67f7
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
1e958398232cb11935f5341d71df52c5455c620f 16-May-2014 Julia Reynolds <juliacr@google.com> Create deviceowner gated APIs for creating and removing users in devicepolicymanager.

This will allow DMAgent to manage users for EDU's cart model user case.
Bug: 15015887

Change-Id: I1eadf1701cb75fc4b50eb1a0df1525eff818286e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
37f4e44ae614987c5ed953a1829c7181bb775e1f 21-May-2014 Julia Reynolds <juliacr@google.com> Merge "Add Device/Profile Owner gated apis for setting/getting blocked packages."
966881e8951f9bb297689745dcaecfdc13432656 14-May-2014 Julia Reynolds <juliacr@google.com> Add Device/Profile Owner gated apis for setting/getting blocked packages.

DMAgent currently needs to live in /system/priv-app in order to
(among other things) set and get blocked packages. These APIs will
get us closer to being able to move DMAgent out of priv-app.
Bug: 14945334

Change-Id: I108e2013c67409dca554acf78e3a710745900706
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
da551653219092306fc7e1ce5743ab40683cee6f 14-May-2014 Julia Reynolds <juliacr@google.com> Allow device/profile owners to update settings.

Device owners can update Settings.Secure and Settings.Global settings.
Profile owners can update Settings.Secure settings.

DMAgent currently needs to live in /system/priv-app in order to
(among other things) update global and secure settings. This change will
get us closer to being able to move DMAgent out of priv-app.
Bug: 14965414

Change-Id: If2cc3a56de91bffde33b838ab8ecea2c32412803
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
57dacb7eb009130264972468cda2876e58999c2f 13-May-2014 Sander Alewijnse <salewijnse@google.com> Merge "Group account management methods and add some comments."
91da58ded2e7c0dd3d045244cc78eb0d788736a7 10-Apr-2014 Jessica Hummel <jhummel@google.com> Allow setting password restrictions from a managed profile.

A managed profile will now share password settings with its parent.

- the current password is always stored in the parent
- admins of profiles are notified if that password changes
- checks for password quality now take the requirements of admins on
the parent and its profiles into account

Todo:

- Currently KeyguardSecurityContainer wipes the whole device when
the maximum fails has been reached on any profile.
We need to limit the wipe to the profile for which the fails exceeded
the maximum number.
- Intents with ACTION_SET_NEW_PASSWORD need to be forwarded to the parent
of the profile when sent from a managed profile

Change-Id: I8532c59f753f8d9c61200f553f275214ad90276e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
511e0d8323d2d2ed341ba40b15bc646e134ac03b 24-Mar-2014 justinzhang <justinzhang@google.com> DevicePolicyManager Authentication for Lock Task

Here we let DevicePolicyManager keep a list of tasks that are
allowed to start the lock task mode. This list can only be set by
a device owner app. The ActivityManager will call
DevicePolicyManager to check whether a given task can start the
lock task mode or not.

Change-Id: I650fdae43fc35bf9fd63452283f4e2bbadd11551
Bug: 14611303
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
650c3341be05e268bb247e6a3f5b20afecf2e712 08-May-2014 Sander Alewijnse <salewijnse@google.com> Group account management methods and add some comments.

Change-Id: I994142b557d21fbf75fc500d5ed1da9eceef6599
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
5c02db60be02cc0c4798ea6d9c2b0e6cf972c158 07-May-2014 Sander Alewijnse <salewijnse@google.com> Add API to disable account management for certain types
of accounts.

The account types with disabled account management are stored in a
blacklist in the active admin object, editable by profile owners.

Change-Id: I57dc5f709ad79674fa28dd006969283585daea24
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
007bbc0ed332a5fb40fbca294870adf854c200dd 07-May-2014 Amith Yamasani <yamasani@google.com> Fix javadoc typo

Use @return, not @returns

Change-Id: I6c8fab2d236cf9c68c79090d3830bc3e01c8aa6f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
010cfd458121034075c7439020ffef4eedbcc0fc 16-Apr-2014 Adam Connors <adamconnors@google.com> Add enableSystemApp methods to DevicePolicyManager

These methods allow profile or device owners to enable
systems apps pre-installed in the primary user in the
managed profile. Apps can be specified by either package
name or intent.

Bug: 13587051

Change-Id: Ifcbc68c139308506b6c18cf3c0ea62b8026ff75f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
c79586ede6dcd6a167bc8360f058cb5cc655b33d 06-May-2014 Nicolas Prevot <nprevot@google.com> Cleaning code related to the forwarding intent filters.

Checking for INTERACT_ACROSS_USERS_FULL
Adding equivalent methods in the PackageManager

Change-Id: Iaa1328fa666613a78e67ca669ea045144275e895
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
3c4d9c56db5b24699956de0a5a841196185363cc 01-May-2014 Alexandra Gherghina <alexgherghina@google.com> Merge "Adds an enabled state in UserInfo instead of DevicePolicyManager"
df35d570ed25257c6782e632ab1bae5e1603855a 09-Apr-2014 Alexandra Gherghina <alexgherghina@google.com> Adds an enabled state in UserInfo instead of DevicePolicyManager

Bug: 14377459
Change-Id: Ib4ec43d87da96c3dddaf9b7ae1796f261863a182
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
10fa67c77e11699391e27975fc2d276a0b8c7cbb 24-Mar-2014 Nicolas Prevot <nprevot@google.com> Introduce forwarding intents across profiles.

The package manager service maintains, for some user ids, a list of forwarding intent filters.
A forwarding intent filter is an intent filter with a destination (a user id).
If an intent matches the forwarding intent filter, then activities in the destination can also respond to the intent.

When the package manager service is asked for components that resolve an intent:
If the intent matches the forwarding intent filter, and at least one activity in the destination user can respond to the intent:
The package manager service also returns the IntentForwarderActivity.
This activity will forward the intent to the destination.

Change-Id: Id8957de3e4a4fdbc1e0dea073eadb45e04ef985a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
df2258be5bd9df4f9a31c4389e8b07b996d26f0b 28-Apr-2014 Jim Miller <jaggies@google.com> Fix doc build.

We probably don't need to deprecate this constant. It can still be used
by partner devices if they choose to continue to support widgets.

Change-Id: Ie8c33446e0c5c32d96ed0670df1772adedf6a5de
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
66fbe3dc81f2786b2be9afa122038228a31e2cdb 26-Apr-2014 Jim Miller <jaggies@google.com> Merge "Add new DevicePolicyManager disable flags for keyguard."
50e62183d4aed2fb8e189196c1809e333e71dd89 24-Apr-2014 Jim Miller <jaggies@google.com> Add new DevicePolicyManager disable flags for keyguard.

- KEYGUARD_DISABLE_SECURE_NOTIFICATIONS
- KEYGUARD_DISABLE_UNREDACTED_NOTIFICATIONS
- KEYGUARD_DISABLE_TRUST_AGENTS

Change-Id: I4ed2b9cef78b497d87bb719c57fabdad94c18e82
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
be46532c9fbebf3ab6498c1b78013a33f620cd31 24-Apr-2014 Amith Yamasani <yamasani@google.com> Allow profile owners to set user restrictions

Pass the setting along to UserManager.

Fixes a security exception when fetching the profile's enabled state.

Change-Id: If71698cf32c52cce1158cf2027443a339bc58488
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
385124d8cee38dee00d4fac31e8fbe46fb30565b 03-Apr-2014 Alexandra Gherghina <alexgherghina@google.com> Modify getUserProfiles to return only enabled profiles:

Add a new enabled state for a managed profile.
Expose that as a new API on DevicePolicyManager.
Set the new state when enabling the profile.
Return only enabled profiles from the user manager.

Bug: 13755441
Bug: 13755091
Change-Id: I2907b182e19b3562592da688b3f68ef5f4088557
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
66e5d96cf9e689148b202787bdc269519c4b6f8f 09-Apr-2014 Robin Lee <rgl@google.com> Allow ProfileOwner apps to manage app restrictions

Simple wrapper around the UserManager.{get|set}ApplicationRestrictions
APIs. Also added a new Intent to signal to running apps that the set
of restrictions has changed since startup.

Change-Id: Ifd108108a73f87325b499d9de2e1b2aacc59b264
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
512675b07d1643f018e84d66e4ee8b641d3e191c 02-Apr-2014 Alexandra Gherghina <alexgherghina@google.com> Add new call to DevicePolicyManager to enable a profile.

Bug: 13755091
Change-Id: Idb6975431f842ededf78966c578b0533e6f186af
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
6d36b60bebe77b88e0aff6cefb027f8c6f4716be 04-Apr-2014 Jessica Hummel <jhummel@google.com> Allow setting the active admin across users.

This is required so that provisioning can call it from the primary user when it sets up the mdm on the managed profile.

Change-Id: I185af168754aa4aeae61f1d4522c1794681cb400
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
03dd22079cc43ae0a008e5080a45fe665d29a69c 13-Mar-2014 Jessica Hummel <jhummel@google.com> Standardize the provisioning intent action.

Change-Id: Iea7f8827cf4b52e2e97e8675687412108dd917e4
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
f72078bdc54d1ecd286c21d8460e522582d64627 06-Mar-2014 Jessica Hummel <jhummel@google.com> Move the provisioning intents to DevicePolicyManager.

Change-Id: Ibde867b193e64c1fda8d9c84b0d1be36a1592035
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
9070484e179b2215ea595c8f3f1f69dbc0dc149d 01-Mar-2014 Yuhao Zheng <yuhaozheng@google.com> Return detailed reason of invalid proxy settings

Make Proxy.validate() return valid/invalid int code, instead of throwing
exceptions. If invalid, detailed reason code is returned (currently for
Settings UI use).

bug: 13248097
Change-Id: Ic68d03f666f1cd63667afc311de7dc370d233901
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
875e2101d71afe7e4acf10b061c942fbf7294775 24-Feb-2014 Torne (Richard Coles) <torne@google.com> Fix missing # in method name in javadoc.

Fix doc generation.

Change-Id: I2e333a7224eeaff7a870fedc7f7a4eb113d1fe2f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
f475ca33d9232785710aaa438f17915029dfa83b 17-Feb-2014 Sander Alewijnse <salewijnse@google.com> Enables a profile owner or device owner to set and clear default intent handler activities.

Those intent handlers are persistent preferences. They will remain the default intent
handler even if the set of potential event handlers for the intent filter changes
and if the intent preferences are reset.

Change-Id: Id0cfae46f93c10d89e441f272096a205ec518dd0
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
661ec4710b30516a2c7a1101ba65ecac109af619 11-Feb-2014 Adam Connors <adamconnors@google.com> Change API for setProfileOwner to require userId

Previously the userId of the current process used but it
makes the provisioning process cleaner to be able to pass
it in explicitly.

Change-Id: I670c4cf3638f1340f6d0bf856c3e01045df8c29e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
776c555d954d9494069f786785877c08add27327 09-Jan-2014 Adam Connors <adamconnors@google.com> Extend DeviceOwner concept to accommodate ProfileOwners

ProfileOwners, like DeviceOwners, are Device Admins that have
additional priviledges. ProfileOwners however are scoped per
user.

Change-Id: I1e22c85878e0672121e6ebbe97fca38591f992b2
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
2450a0e669f2edf7e35a5db420bdd445aa9f73e7 20-Sep-2013 Paul Quei <paulquei@gmail.com> Fix typo in DevicePolicyManager documentation

Typo in DevicePolicyManager documentation
See: http://code.google.com/p/android/issues/detail?id=60235

Change-Id: Ic120297cfdc46ec49f870e0750ec831ba6362399
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
0469f41010d8001dba5e09606bb631b1d3313021 05-Sep-2013 Maggie Benthall <mbenthall@google.com> CA cert monitoring: add notifications and actions for dialog

In DevicePolicyManagementService, on boot and when certs are installed,
post notification to tell the user that their traffic may be
monitored.
Have QuickSettings use the MonitoringCertInfoActivity instead
of building the dialog itself.

Bug: 10633199

Change-Id: Ie4b97295a9fc25867c87872feccdb17f4bea071d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
da51e68e582ffa017543982297c831680d201a91 09-Aug-2013 Maggie Benthall <mbenthall@google.com> Add methods for managing CAs to DevicePolicyManager(Service)

Guard install/uninstall by enforcing that the caller have the new system-only permission MANAGE_CA_CERTIFICATES.
Also include API methods for asking whether there are any User CA certs
installed, or if one by a particular name is installed in the keystore.

CA certs will be installed via KeyChain into the TrustedCertificateStore.

Bug: 8232670

Change-Id: I17b47a452e72eb4fe556dc6db823a46c6e854be8
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
334c7e32d494baf3bf0ae371d6b5949c80368982 08-Aug-2013 Geoffrey Borggaard <geoffreyb@google.com> Add a name to the DeviceOwner

We will need to display the name of the device owner (the human
readable name of the institution) to the user.
"This device is managed by google.com"

Change-Id: Ic33b6530c19cb14a118245692697205de3911a58
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
3b458ad9ee5f2d6b7cf28a13bc29123cdf540763 19-Apr-2013 Amith Yamasani <yamasani@google.com> Improve API and documentation

API for querying accounts visible to a specific package.

Improve API and docs for device owner.

Bug: 8657158
Change-Id: I01b8701534f64b383391508a49ae93ed21f22ae0
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
71e6c697e54a43d357cc25d87a446d140f17396a 25-Mar-2013 Amith Yamasani <yamasani@google.com> Device Owner, a special kind of device admin

A Device Owner cannot be uninstalled and is available to all users. It must
be registered before the device_provisioned flag is set.

Device admins can be disabled until used, but visible to device policy
manager, so that users wont be bothered with update requests.

Opened up a few related APIs for use by a system-installed Device Owner.

Change-Id: I847b5fe68c0f724863f778a67602b5bddc79d8e5
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
40a419c2a5f83a00a2e6978ded4e8fcf634b7b46 08-Nov-2012 Jean-Baptiste Queru <jbq@google.com> Merge commit '58ed5d748c0b9b64845975ef5844ad313de7c3f6' into HEAD
58ed5d748c0b9b64845975ef5844ad313de7c3f6 07-Nov-2012 Kenny Root <kroot@google.com> am 768d9e1a: Merge "Correct executable bit for source files"

* commit '768d9e1a72ceee7d4a5f608776b87b62d6ce4a04':
Correct executable bit for source files
3a084af2e90849aaa8beb3a610189e3399c63ea0 07-Nov-2012 Kenny Root <kroot@google.com> Correct executable bit for source files

Many media files and source code files were marked as executable in Git.
Remove those.

Also a shell script and python script were not marked as executable.

Change-Id: Ieb51bafb46c895a21d2e83696f5a901ba752b2c5
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
3520774a91aee6fd59200aef4238efbdb580202a 02-Nov-2012 Jim Miller <jaggies@google.com> Update DevicePolicyManager documentation with new keyguard flags

Change-Id: Idb1fa306a5706ba5b9543d7dff5450a4af5c394f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
48b9b0d068844af9eb37c215484831c4d6b831b0 20-Sep-2012 Jim Miller <jaggies@google.com> Make DPM API for disabling keyguard widgets more generic

This change renames the widget-specific API to be more generic
to allow further disabling of keyguard-specific customizations
in the future. Currently only allows disabling widgets and the
secure camera but can now easily be extended to disable other
features we add.

Fixes bug: 7021368

Change-Id: I3934cc2e7c64e0c6d511efb86980fc38a849708d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
599dd7ce9adf8ca067cefb0b191a5ac20ec35a79 15-Sep-2012 Amith Yamasani <yamasani@google.com> DevicePolicyManager per user

Bug: 7136483

Store device policy information for each user and apply them when user switches.

Global proxy can only be controlled by owner.
Camera restriction applies to all users, if any one has an admin that disables it.
Storage encryption can only be controlled by owner, although other users can query the state.
Wipe data will only remove the user if non-zero, wipe the device, if zero.

Change-Id: I359be46c1bc3828fd13d4be3228f11495081c8f2
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
b8ec470617590fa2025db869e8e80dcce8eaec23 01-Sep-2012 Jim Miller <jaggies@google.com> Update DevicePolicyManager with ability to disable keyguard widgets

Change-Id: I5876e9e180b2a995aaa355fbbb2b67cebb86104d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
fd63c85742f4b12065418d48ae10be4bb12468f5 25-May-2012 Jean-Baptiste Queru <jbq@google.com> Merge "Wipe the user data out in any case."
f535cb04f08575d29118fab0342b1e6274091734 15-Feb-2012 Masanori Ogino <ogino.masanori@sharp.co.jp> Wipe the user data out in any case.

When the external storage is not mounted, the android system won't
wipe out the user data (i.e. "/data") if wipeData() is called with
the flag WIPE_EXTERNAL_STORAGE.

We think that the user data should be wiped out in any options and
also wipeData(int) method currently supports also for a external
storage. So we will also change the API reference comment.

If we should care about backward compatibility of this method behavior
with the option WIPE_EXTERNAL_STORAGE, then we would add an another
bitmask something like a ALWAYS_RESET.

Change-Id: Id7bf673c722bacc0480d32e46553b9a348513879
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
3aef8e1d1b2f0b87d470bcccf37ba4ebb6560c45 20-Dec-2011 Joe Fernandez <joefernandez@google.com> docs: Add developer guide cross-references, Project ACRE, round 4

Change-Id: I1b43414aaec8ea217b39a0d780c80a25409d0991
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
3e5d3fd7e172ee85a7bb67baa01acbc3549dfdb6 03-Sep-2011 Jim Miller <jaggies@google.com> Fix 5185505: Update DevicePolicyManager to support weak biometric security.

Change-Id: If0fa49908a10d8057b9398112d47eb968cc77060
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
2447edd85baac3225a12b868ef40f76cfdc6ec11 10-May-2011 Ben Komalo <benkomalo@google.com> New device policy to disable camera.

This introduces a new policy that a DeviceAdmin can use to disable _all_
cameras on the device. A separate CL will be made on the media side to
watch this policy bit and act accordingly.

Bug: 4185303
Change-Id: I700cfc4a8317bb74087ccae39346d74467fc58b2
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
50c294f21b3348010c3f91c5a998d54e1e45d2e4 08-Mar-2011 Andy Stadler <stadler@google.com> Clarify rules about encryption of emulated storage.

Bug: 3351426
Change-Id: I3a8fcd369862f3eab1781699108e29fe7ab474a0
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
91fd9a97727b6aa0b669b92bb0f7ef1db884dd26 17-Feb-2011 Jim Miller <jaggies@google.com> Merge "Fix 3197205: Minor edits to device policy admin strings and documentation"
6b85768058b065cc682757a366abc828c9ca727a 17-Feb-2011 Jim Miller <jaggies@google.com> Fix 3197205: Minor edits to device policy admin strings and documentation

Change-Id: I3788772c375b916752cd8a98ff5d3751448e4334
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
d26727273d16745ceddc2203121d29c3a9e7733c 16-Feb-2011 Andy Stadler <stadler@google.com> @hide DPM global proxy settings

They don't work as advertised, so remove from SDK.

Bug: 3460938

Change-Id: I87f80ebf38b228a4085630f1c2526c1d86b93dd7
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
22dbfda976aab9ae897eed0625e2e64ead32bbc4 17-Jan-2011 Andy Stadler <stadler@google.com> Add internal plumbing to DPM for encryption

* Add code to persist per-admin setting
* Add hooks for OS-level tie-in (is supported, get / set status)
* Add 3rd API call to get OS status (irrespective of admin settings)
* Remove "REQUESTED" status, no longer relevant with 3rd API
* Fixed bug that impacted global proxy settings
* Update api/11.xml to match current.xml

Bug: 3346770
Change-Id: I56bdf9a7894f6ca4842402c7b82ddb3caf4b37b9
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
7b0f8f08ac7b3ed5cf462b92283713b033d6a64a 12-Jan-2011 Andy Stadler <stadler@google.com> API changes to support encryption in DPM

* New uses-policies value
* Definitions for storage domain and encryption status
* API to get and set encryption status
* Intent to launch encryption changes
* Both new calls bottom out in the DPM service and are suitable for
a device that does not support encryption.

NOTE: Nobody should use ACTION_START_ENCRYPTION yet. It needs a receiver
to be built in Settings (different CL).

Change-Id: I2ae193bedbec59f6ba46c0ec7de12ecf321e5803
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
c25f70a440ef9468085b8d98c8416c7e8b116753 09-Dec-2010 Andy Stadler <stadler@google.com> API CHANGE - Add hasGrantedPolicy() API

* Allows an app to detect that it needs to have additional policies granted
* Add "refreshing" parameter to setActiveAdmin() to handle this case
* Minor cleanups to eliminate warnings (mostly for unused things)

Bug: 3253179
Change-Id: I4bf639bf560557130bf98e8cfb75f996fac416f1
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
1f35d487ba1a5208e66bc960f35f6e1d874fbd1e 20-Nov-2010 Andy Stadler <stadler@google.com> Fixes to DevicePolicyManager.setPasswordExpirationTimeout

* Fix permissions problem in DevicePolicyManager
* Allow short timeouts (primarily for testing)
* Remove unused debugging code

Bug: 3212583
Change-Id: I3770b1c6f090363e8e8d65db92839cd53de05c45
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
a4e28d181942018ba8759989799a28fa88764ce3 09-Nov-2010 Jim Miller <jaggies@google.com> Add password expiration support to DevicePolicyManager.

Change-Id: Ib2629ec547c123ac489d7f4cbd4e0a1d4aa07620
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
027610a76e67f39e3a435d68ec785a1cf09dcf9c 18-Oct-2010 Kenny Root <kroot@google.com> resolved conflicts for merge of 964eb438 to master

Change-Id: I0c54d6b88356d8734d7f51234b0114434414502e
424991704b5fb7a64f6cf0fcc3f4b1aabbf2a2e0 16-Oct-2010 Dianne Hackborn <hackbod@google.com> Implement issue #3094621 and #3094609 - wipe sd card

3094621: add "wipe sd card" option to factory data reset
3094609: collapse unmount/format into one command

Also since we have decided that it is important to consider
the Crespo storage as internal storage, DevicePolicyManager
gets a new API to be able to wipe it. (No big deal, since
all of the work for this is now done in the implementation
of the new UI.)

Change-Id: I32a77c410f710a87dcdcbf6586c09bd2e48a8807
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
8063589c6ca6ee3575befe8caf4f6c3e6b58b655 05-Aug-2010 Oscar Montemayor <oam@google.com> Removed extra parameter tag in JavaDocs

Change-Id: I0bc6f201d12a95a7c96b3fac90688d113a554d22
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
69238c6a37ae43c748ad9cd7613f2209149ee7da 03-Aug-2010 Oscar Montemayor <oam@google.com> Device Policy Manager changes to enable Global Proxy.

Change-Id: I8489df7d28e4c5312e10d5cecc8e2a182413a034
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
c857740f242169f2ca7fd42f0d1268661b399ad6 05-Jun-2010 Konstantin Lopyrev <klopyrev@google.com> Adding support for minimum number of non letter characters.

Change-Id: If54cb7209d65eef826d474d7e0dbbef63d2f2b47
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
1a0ce1cc6f6bda7ef7345b20860bc0c8cd3d8451 09-Jun-2010 Jim Miller <jaggies@google.com> am db603bb5: am 3b68548d: am 75b6a6b9: Merge "Fix 2737842: Disable KeguardManager API if device policy is enabled" into froyo
284b62e1b8c3419bfd02c6fea5ba0a68146c06f8 08-Jun-2010 Jim Miller <jaggies@google.com> Fix 2737842: Disable KeguardManager API if device policy is enabled

This change adds notification to find out when the device policy
has changed. When an admin adds or changes a policy, we get notified
and reset the state of keyguard to be enabled.

It also moves disabling keyguard into the TokenWatcher.acquired()
method to avoid disabling keyguard when a policy doesn't permit it.
This avoids reference counting issues in TokenWatcher and hence relieves
the ordering issue.

There is one remaining caveat. An application that uses KeyguardManager
to disable keyguard will need to disable keyguard again after any
policy change.

Tested:

Install and run app that disables keyguard with no admin. Result: keyguard is enabled/disabled as expected.
Enable admin and set quality = "something" after installing & running app. Result: keyguard is enabled.
Change admin password quality to "unspecified" and re-run app (per caveat). Result: keyguard is disabled.
Change admin password quality to "something" again. Result: keyguard is enabled.
Disable admin : Result: keyguard is enabled until app runs again (per caveat).

Added minor cosmetic changes after review.

Change-Id: I302f2b01446bf031f746b0f3e8b5fd7a6cc0e648
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
a15dcfaf2bc7cbd13b30db6766afe3bbaa01db97 25-May-2010 Konstantin Lopyrev <klopyrev@google.com> Fix 2677197: Adding minimum complex character support.

Change-Id: I520bc5f9aa924bf9b5585b2235a91cc96cb99c25
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
3255823de062e981f7bfc7994919207988697e45 21-May-2010 Konstantin Lopyrev <klopyrev@google.com> Fix 2673731: Adding support for password history to Device Admin.

Change-Id: If3240048813e32b2bae79fe5cb8a73aea20ec56c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
85f2c9ce5a0e074df2429a5d66e1754e368a0430 22-Mar-2010 Dianne Hackborn <hackbod@google.com> Fix issue #2530103: ActivePassword data in Device Policy Manager needs to be persisted

Also fixes how the quality vs. mode is handled to be more consistent, which also
required introducing a new "alphabetic" quality since it is possible for the user
to enter such a password.

The current password quality and length is stored in the DPM, since at boot it
couldn't figure this out from the stored password.

Change-Id: I519d9b76dd0b4431bcf42920c34dda38c9f1136e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
87bba1ee14279bb14a28d42e27c4ef66d9967bf8 27-Feb-2010 Dianne Hackborn <hackbod@google.com> Move DeviceAdmin APIs to android.app.admin.

Also add ability for admins to hide themselves when not in use,
a facility for admins to not allow other admins to reset
their password, and debug dumping.
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java