Lines Matching refs:mService

88     private final IDevicePolicyManager mService;
92 mService = IDevicePolicyManager.Stub.asInterface(
99 return me.mService != null ? me : null;
833 if (mService != null) {
835 return mService.isAdminActive(admin, userId);
848 if (mService != null) {
850 return mService.isRemovingAdmin(admin, userId);
873 if (mService != null) {
875 return mService.getActiveAdmins(userId);
889 if (mService != null) {
891 return mService.packageHasActiveAdmins(packageName, UserHandle.myUserId());
906 if (mService != null) {
908 mService.removeActiveAdmin(admin, UserHandle.myUserId());
925 if (mService != null) {
927 return mService.hasGrantedPolicy(admin, usesPolicy, UserHandle.myUserId());
1026 if (mService != null) {
1028 mService.setPasswordQuality(admin, quality);
1047 if (mService != null) {
1049 return mService.getPasswordQuality(admin, userHandle);
1079 if (mService != null) {
1081 mService.setPasswordMinimumLength(admin, length);
1100 if (mService != null) {
1102 return mService.getPasswordMinimumLength(admin, userHandle);
1133 if (mService != null) {
1135 mService.setPasswordMinimumUpperCase(admin, length);
1161 if (mService != null) {
1163 return mService.getPasswordMinimumUpperCase(admin, userHandle);
1194 if (mService != null) {
1196 mService.setPasswordMinimumLowerCase(admin, length);
1222 if (mService != null) {
1224 return mService.getPasswordMinimumLowerCase(admin, userHandle);
1254 if (mService != null) {
1256 mService.setPasswordMinimumLetters(admin, length);
1280 if (mService != null) {
1282 return mService.getPasswordMinimumLetters(admin, userHandle);
1312 if (mService != null) {
1314 mService.setPasswordMinimumNumeric(admin, length);
1339 if (mService != null) {
1341 return mService.getPasswordMinimumNumeric(admin, userHandle);
1371 if (mService != null) {
1373 mService.setPasswordMinimumSymbols(admin, length);
1397 if (mService != null) {
1399 return mService.getPasswordMinimumSymbols(admin, userHandle);
1429 if (mService != null) {
1431 mService.setPasswordMinimumNonLetter(admin, length);
1456 if (mService != null) {
1458 return mService.getPasswordMinimumNonLetter(admin, userHandle);
1489 if (mService != null) {
1491 mService.setPasswordHistoryLength(admin, length);
1521 if (mService != null) {
1523 mService.setPasswordExpirationTimeout(admin, timeout);
1540 if (mService != null) {
1542 return mService.getPasswordExpirationTimeout(admin, UserHandle.myUserId());
1561 if (mService != null) {
1563 return mService.getPasswordExpiration(admin, UserHandle.myUserId());
1584 if (mService != null) {
1586 return mService.getPasswordHistoryLength(admin, userHandle);
1617 if (mService != null) {
1619 return mService.isActivePasswordSufficient(UserHandle.myUserId());
1636 if (mService != null) {
1638 return mService.getCurrentFailedPasswordAttempts(UserHandle.myUserId());
1653 if (mService != null) {
1655 return mService.getDoNotAskCredentialsOnBoot();
1683 if (mService != null) {
1685 mService.setMaximumFailedPasswordsForWipe(admin, num);
1705 if (mService != null) {
1707 return mService.getMaximumFailedPasswordsForWipe(admin, userHandle);
1723 if (mService != null) {
1725 return mService.getProfileWithMinimumFailedPasswordsForWipe(userHandle);
1778 if (mService != null) {
1780 return mService.resetPassword(password, flags);
1802 if (mService != null) {
1804 mService.setMaximumTimeToLock(admin, timeMs);
1825 if (mService != null) {
1827 return mService.getMaximumTimeToLock(admin, userHandle);
1844 if (mService != null) {
1846 mService.lockNow();
1881 if (mService != null) {
1883 mService.wipeData(flags, UserHandle.myUserId());
1917 if (mService != null) {
1953 return mService.setGlobalProxy(admin, hostSpec, exclSpec);
1979 if (mService != null) {
1981 mService.setRecommendedGlobalProxy(admin, proxyInfo);
1995 if (mService != null) {
1997 return mService.getGlobalProxyAdmin(UserHandle.myUserId());
2125 if (mService != null) {
2127 return mService.setStorageEncryption(admin, encrypt);
2145 if (mService != null) {
2147 return mService.getStorageEncryption(admin, UserHandle.myUserId());
2180 if (mService != null) {
2182 return mService.getStorageEncryptionStatus(userHandle);
2201 if (mService != null) {
2203 return mService.installCaCert(admin, certBuffer);
2219 if (mService != null) {
2222 mService.uninstallCaCerts(admin, new String[] {alias});
2242 if (mService != null) {
2244 mService.enforceCanManageCaCerts(admin);
2268 if (mService != null) {
2270 mService.uninstallCaCerts(admin, new TrustedCertificateStore().userAliases()
2286 if (mService != null) {
2288 mService.enforceCanManageCaCerts(admin);
2317 return mService.installKeyPair(admin, pkcs8Key, pemCert, alias);
2355 if (mService != null) {
2357 mService.setCertInstallerPackage(admin, installerPackage);
2373 if (mService != null) {
2375 return mService.getCertInstallerPackage(admin);
2396 if (mService != null) {
2398 mService.setCameraDisabled(admin, disabled);
2417 if (mService != null) {
2419 return mService.getCameraDisabled(admin, userHandle);
2443 if (mService != null) {
2445 mService.setScreenCaptureDisabled(admin, disabled);
2464 if (mService != null) {
2466 return mService.getScreenCaptureDisabled(admin, userHandle);
2487 if (mService != null) {
2489 mService.setAutoTimeRequired(admin, required);
2500 if (mService != null) {
2502 return mService.getAutoTimeRequired();
2541 if (mService != null) {
2543 mService.setKeyguardDisabledFeatures(admin, which);
2564 if (mService != null) {
2566 return mService.getKeyguardDisabledFeatures(admin, userHandle);
2579 if (mService != null) {
2581 mService.setActiveAdmin(policyReceiver, refreshing, userHandle);
2627 if (mService != null) {
2629 mService.getRemoveWarning(admin, result, UserHandle.myUserId());
2641 if (mService != null) {
2643 mService.setActivePasswordState(quality, length, letters, uppercase, lowercase,
2655 if (mService != null) {
2657 mService.reportFailedPasswordAttempt(userHandle);
2668 if (mService != null) {
2670 mService.reportSuccessfulPasswordAttempt(userHandle);
2707 if (mService != null) {
2709 return mService.setDeviceOwner(packageName, ownerName);
2731 if (mService != null) {
2733 return mService.isDeviceOwner(packageName);
2759 if (mService != null) {
2761 mService.clearDeviceOwner(packageName);
2771 if (mService != null) {
2773 return mService.getDeviceOwner();
2783 if (mService != null) {
2785 return mService.getDeviceOwnerName();
2812 if (mService != null) {
2814 return mService.setDeviceInitializer(admin, initializer);
2831 if (mService != null) {
2833 return mService.isDeviceInitializer(packageName);
2850 if (mService != null) {
2852 mService.clearDeviceInitializer(admin);
2867 if (mService != null) {
2869 return mService.getDeviceInitializer();
2885 if (mService != null) {
2887 return mService.getDeviceInitializerComponent();
2913 if (mService != null) {
2915 return mService.setUserEnabled(admin);
2942 if (mService != null) {
2945 mService.setActiveAdmin(admin, false, myUserId);
2946 return mService.setProfileOwner(admin, ownerName, myUserId);
2966 if (mService != null) {
2968 mService.clearProfileOwner(admin);
2980 if (mService != null) {
2982 return mService.hasUserSetupCompleted();
3011 if (mService != null) {
3016 return mService.setProfileOwner(admin, ownerName, userHandle);
3034 if (mService != null) {
3036 mService.setProfileEnabled(admin);
3055 if (mService != null) {
3057 mService.setProfileName(admin, profileName);
3073 if (mService != null) {
3075 ComponentName profileOwner = mService.getProfileOwner(
3102 if (mService != null) {
3104 return mService.getProfileOwner(userId);
3121 if (mService != null) {
3123 return mService.getProfileOwnerName(Process.myUserHandle().getIdentifier());
3142 if (mService != null) {
3144 return mService.getProfileOwnerName(userId);
3173 if (mService != null) {
3175 mService.addPersistentPreferredActivity(admin, filter, activity);
3194 if (mService != null) {
3196 mService.clearPackagePersistentPreferredActivities(admin, packageName);
3234 if (mService != null) {
3236 mService.setApplicationRestrictions(admin, packageName, settings);
3264 if (mService != null) {
3266 mService.setTrustAgentConfiguration(admin, target, configuration);
3295 if (mService != null) {
3297 return mService.getTrustAgentConfiguration(admin, agent, userHandle);
3316 if (mService != null) {
3318 mService.setCrossProfileCallerIdDisabled(admin, disabled);
3335 if (mService != null) {
3337 return mService.getCrossProfileCallerIdDisabled(admin);
3352 if (mService != null) {
3354 return mService.getCrossProfileCallerIdDisabledForUser(userHandle.getIdentifier());
3368 if (mService != null) {
3370 mService.startManagedQuickContact(
3393 if (mService != null) {
3395 mService.setBluetoothContactSharingDisabled(admin, disabled);
3415 if (mService != null) {
3417 return mService.getBluetoothContactSharingDisabled(admin);
3434 if (mService != null) {
3436 return mService.getBluetoothContactSharingDisabledForUser(userHandle
3457 if (mService != null) {
3459 mService.addCrossProfileIntentFilter(admin, filter, flags);
3473 if (mService != null) {
3475 mService.clearCrossProfileIntentFilters(admin);
3505 if (mService != null) {
3507 return mService.setPermittedAccessibilityServices(admin, packageNames);
3525 if (mService != null) {
3527 return mService.getPermittedAccessibilityServices(admin);
3549 if (mService != null) {
3551 return mService.getPermittedAccessibilityServicesForUser(userId);
3583 if (mService != null) {
3585 return mService.setPermittedInputMethods(admin, packageNames);
3604 if (mService != null) {
3606 return mService.getPermittedInputMethods(admin);
3627 if (mService != null) {
3629 return mService.getPermittedInputMethodsForCurrentUser();
3654 return mService.createUser(admin, name);
3692 return mService.createAndInitializeUser(admin, name, ownerName, profileOwnerComponent,
3710 return mService.removeUser(admin, userHandle);
3728 return mService.switchUser(admin, userHandle);
3749 if (mService != null) {
3751 return mService.getApplicationRestrictions(admin, packageName);
3771 if (mService != null) {
3773 mService.setUserRestriction(admin, key, true);
3792 if (mService != null) {
3794 mService.setUserRestriction(admin, key, false);
3813 if (mService != null) {
3815 return mService.setApplicationHidden(admin, packageName, hidden);
3831 if (mService != null) {
3833 return mService.isApplicationHidden(admin, packageName);
3849 if (mService != null) {
3851 mService.enableSystemApp(admin, packageName);
3868 if (mService != null) {
3870 return mService.enableSystemAppWithIntent(admin, intent);
3895 if (mService != null) {
3897 mService.setAccountManagementDisabled(admin, accountType, disabled);
3923 if (mService != null) {
3925 return mService.getAccountTypesWithManagementDisabledAsUser(userId);
3954 if (mService != null) {
3956 mService.setLockTaskPackages(admin, packages);
3970 if (mService != null) {
3972 return mService.getLockTaskPackages(admin);
3986 if (mService != null) {
3988 return mService.isLockTaskPermitted(pkg);
4033 if (mService != null) {
4035 mService.setGlobalSetting(admin, setting, value);
4061 if (mService != null) {
4063 mService.setSecureSetting(admin, setting, value);
4082 if (mService != null) {
4084 mService.setRestrictionsProvider(admin, provider);
4098 if (mService != null) {
4100 mService.setMasterVolumeMuted(admin, on);
4114 if (mService != null) {
4116 return mService.isMasterVolumeMuted(admin);
4134 if (mService != null) {
4136 mService.setUninstallBlocked(admin, packageName, uninstallBlocked);
4158 if (mService != null) {
4160 return mService.isUninstallBlocked(admin, packageName);
4186 if (mService != null) {
4188 return mService.addCrossProfileWidgetProvider(admin, packageName);
4213 if (mService != null) {
4215 return mService.removeCrossProfileWidgetProvider(admin, packageName);
4234 if (mService != null) {
4236 List<String> providers = mService.getCrossProfileWidgetProviders(admin);
4255 mService.setUserIcon(admin, icon);
4273 if (mService != null) {
4275 mService.setSystemUpdatePolicy(admin, policy);
4288 if (mService != null) {
4290 return mService.getSystemUpdatePolicy();
4314 return mService.setKeyguardDisabled(admin, disabled);
4334 return mService.setStatusBarDisabled(admin, disabled);
4352 if (mService != null) {
4354 mService.notifyPendingSystemUpdate(updateReceivedTime);
4380 mService.setPermissionPolicy(admin, policy);
4394 return mService.getPermissionPolicy(admin);
4431 return mService.setPermissionGrantState(admin, packageName, permission, grantState);
4458 return mService.getPermissionGrantState(admin, packageName, permission);