Lines Matching refs:mService

109     private final IDevicePolicyManager mService;
122 mService = service;
1551 if (mService != null) {
1553 return mService.isAdminActive(admin, userId);
1567 if (mService != null) {
1569 return mService.isRemovingAdmin(admin, userId);
1592 if (mService != null) {
1594 return mService.getActiveAdmins(userId);
1619 if (mService != null) {
1621 return mService.packageHasActiveAdmins(packageName, userId);
1643 if (mService != null) {
1645 mService.removeActiveAdmin(admin, myUserId());
1664 if (mService != null) {
1666 return mService.hasGrantedPolicy(admin, usesPolicy, myUserId());
1680 if (mService != null) {
1682 return mService.isSeparateProfileChallengeAllowed(userHandle);
1827 if (mService != null) {
1829 mService.setPasswordQuality(admin, quality, mParentInstance);
1854 if (mService != null) {
1856 return mService.getPasswordQuality(admin, userHandle, mParentInstance);
1891 if (mService != null) {
1893 mService.setPasswordMinimumLength(admin, length, mParentInstance);
1919 if (mService != null) {
1921 return mService.getPasswordMinimumLength(admin, userHandle, mParentInstance);
1954 if (mService != null) {
1956 mService.setPasswordMinimumUpperCase(admin, length, mParentInstance);
1988 if (mService != null) {
1990 return mService.getPasswordMinimumUpperCase(admin, userHandle, mParentInstance);
2023 if (mService != null) {
2025 mService.setPasswordMinimumLowerCase(admin, length, mParentInstance);
2057 if (mService != null) {
2059 return mService.getPasswordMinimumLowerCase(admin, userHandle, mParentInstance);
2092 if (mService != null) {
2094 mService.setPasswordMinimumLetters(admin, length, mParentInstance);
2125 if (mService != null) {
2127 return mService.getPasswordMinimumLetters(admin, userHandle, mParentInstance);
2160 if (mService != null) {
2162 mService.setPasswordMinimumNumeric(admin, length, mParentInstance);
2193 if (mService != null) {
2195 return mService.getPasswordMinimumNumeric(admin, userHandle, mParentInstance);
2228 if (mService != null) {
2230 mService.setPasswordMinimumSymbols(admin, length, mParentInstance);
2260 if (mService != null) {
2262 return mService.getPasswordMinimumSymbols(admin, userHandle, mParentInstance);
2295 if (mService != null) {
2297 mService.setPasswordMinimumNonLetter(admin, length, mParentInstance);
2328 if (mService != null) {
2330 return mService.getPasswordMinimumNonLetter(admin, userHandle, mParentInstance);
2364 if (mService != null) {
2366 mService.setPasswordHistoryLength(admin, length, mParentInstance);
2402 if (mService != null) {
2404 mService.setPasswordExpirationTimeout(admin, timeout, mParentInstance);
2426 if (mService != null) {
2428 return mService.getPasswordExpirationTimeout(admin, myUserId(), mParentInstance);
2450 if (mService != null) {
2452 return mService.getPasswordExpiration(admin, myUserId(), mParentInstance);
2479 if (mService != null) {
2481 return mService.getPasswordHistoryLength(admin, userHandle, mParentInstance);
2520 if (mService != null) {
2522 return mService.isActivePasswordSufficient(myUserId(), mParentInstance);
2541 if (mService != null) {
2543 return mService.isProfileActivePasswordSufficientForParent(userHandle);
2582 if (mService != null) {
2584 return mService.getCurrentFailedPasswordAttempts(userHandle, mParentInstance);
2599 if (mService != null) {
2601 return mService.getDoNotAskCredentialsOnBoot();
2634 if (mService != null) {
2636 mService.setMaximumFailedPasswordsForWipe(admin, num, mParentInstance);
2662 if (mService != null) {
2664 return mService.getMaximumFailedPasswordsForWipe(
2681 if (mService != null) {
2683 return mService.getProfileWithMinimumFailedPasswordsForWipe(
2752 if (mService != null) {
2754 return mService.resetPassword(password, flags);
2795 if (mService != null) {
2797 return mService.setResetPasswordToken(admin, token);
2813 if (mService != null) {
2815 return mService.clearResetPasswordToken(admin);
2832 if (mService != null) {
2834 return mService.isResetPasswordTokenActive(admin);
2875 if (mService != null) {
2877 return mService.resetPasswordWithToken(admin, password, token, flags);
2904 if (mService != null) {
2906 mService.setMaximumTimeToLock(admin, timeMs, mParentInstance);
2933 if (mService != null) {
2935 return mService.getMaximumTimeToLock(admin, userHandle, mParentInstance);
2950 if (mService != null) {
2952 return mService.getMaximumTimeToLockForUserAndProfiles(userHandle);
2995 if (mService != null) {
2997 mService.setRequiredStrongAuthTimeout(admin, timeoutMs, mParentInstance);
3023 if (mService != null) {
3025 return mService.getRequiredStrongAuthTimeout(admin, userId, mParentInstance);
3093 if (mService != null) {
3095 mService.lockNow(flags, mParentInstance);
3133 if (mService != null) {
3135 mService.wipeData(flags);
3170 if (mService != null) {
3206 return mService.setGlobalProxy(admin, hostSpec, exclSpec);
3233 if (mService != null) {
3235 mService.setRecommendedGlobalProxy(admin, proxyInfo);
3249 if (mService != null) {
3251 return mService.getGlobalProxyAdmin(myUserId());
3406 if (mService != null) {
3408 return mService.setStorageEncryption(admin, encrypt);
3427 if (mService != null) {
3429 return mService.getStorageEncryption(admin, myUserId());
3464 if (mService != null) {
3466 return mService.getStorageEncryptionStatus(mContext.getPackageName(), userHandle);
3485 if (mService != null) {
3487 return mService.approveCaCert(alias, userHandle, approval);
3501 if (mService != null) {
3503 return mService.isCaCertApproved(alias, userHandle);
3531 if (mService != null) {
3533 return mService.installCaCert(admin, mContext.getPackageName(), certBuffer);
3558 if (mService != null) {
3561 mService.uninstallCaCerts(admin, mContext.getPackageName(), new String[] {alias});
3584 if (mService != null) {
3586 mService.enforceCanManageCaCerts(admin, mContext.getPackageName());
3613 if (mService != null) {
3615 mService.uninstallCaCerts(admin, mContext.getPackageName(),
3634 if (mService != null) {
3636 mService.enforceCanManageCaCerts(admin, mContext.getPackageName());
3715 return mService.installKeyPair(admin, mContext.getPackageName(), pkcs8Key, pemCert,
3743 return mService.removeKeyPair(admin, mContext.getPackageName(), alias);
3787 if (mService != null) {
3789 mService.setCertInstallerPackage(admin, installerPackage);
3813 if (mService != null) {
3815 return mService.getCertInstallerPackage(admin);
3846 if (mService != null) {
3848 mService.setDelegatedScopes(admin, delegatePackage, scopes);
3871 if (mService != null) {
3873 return mService.getDelegatedScopes(admin, delegatedPackage);
3895 if (mService != null) {
3897 return mService.getDelegatePackages(admin, delegationScope);
3942 if (mService != null) {
3944 if (!mService.setAlwaysOnVpnPackage(admin, vpnPackage, lockdownEnabled)) {
3964 if (mService != null) {
3966 return mService.getAlwaysOnVpnPackage(admin);
3992 if (mService != null) {
3994 mService.setCameraDisabled(admin, disabled);
4014 if (mService != null) {
4016 return mService.getCameraDisabled(admin, userHandle);
4040 if (mService != null) {
4042 return mService.requestBugreport(admin);
4079 if (mService != null) {
4081 mService.setScreenCaptureDisabled(admin, disabled);
4101 if (mService != null) {
4103 return mService.getScreenCaptureDisabled(admin, userHandle);
4126 if (mService != null) {
4128 mService.setAutoTimeRequired(admin, required);
4140 if (mService != null) {
4142 return mService.getAutoTimeRequired();
4167 if (mService != null) {
4169 mService.setForceEphemeralUsers(admin, forceEphemeralUsers);
4183 if (mService != null) {
4185 return mService.getForceEphemeralUsers(admin);
4234 if (mService != null) {
4236 mService.setKeyguardDisabledFeatures(admin, which, mParentInstance);
4263 if (mService != null) {
4265 return mService.getKeyguardDisabledFeatures(admin, userHandle, mParentInstance);
4278 if (mService != null) {
4280 mService.setActiveAdmin(policyReceiver, refreshing, userHandle);
4298 if (mService != null) {
4300 mService.getRemoveWarning(admin, result, myUserId());
4311 if (mService != null) {
4313 mService.setActivePasswordState(metrics, userHandle);
4324 if (mService != null) {
4326 mService.reportPasswordChanged(userId);
4337 if (mService != null) {
4339 mService.reportFailedPasswordAttempt(userHandle);
4350 if (mService != null) {
4352 mService.reportSuccessfulPasswordAttempt(userHandle);
4363 if (mService != null) {
4365 mService.reportFailedFingerprintAttempt(userHandle);
4376 if (mService != null) {
4378 mService.reportSuccessfulFingerprintAttempt(userHandle);
4390 if (mService != null) {
4392 mService.reportKeyguardDismissed(userHandle);
4404 if (mService != null) {
4406 mService.reportKeyguardSecured(userHandle);
4457 if (mService != null) {
4459 return mService.setDeviceOwner(who, ownerName, userId);
4540 if (mService != null) {
4542 return mService.getDeviceOwnerComponent(callingUserOnly);
4559 if (mService != null) {
4561 return mService.getDeviceOwnerUserId();
4590 if (mService != null) {
4592 mService.clearDeviceOwner(packageName);
4628 return mService.hasDeviceOwner();
4644 if (mService != null) {
4646 return mService.getDeviceOwnerName();
4700 if (mService != null) {
4703 mService.setActiveAdmin(admin, false, myUserId);
4704 return mService.setProfileOwner(admin, ownerName, myUserId);
4732 if (mService != null) {
4734 mService.clearProfileOwner(admin);
4746 if (mService != null) {
4748 return mService.hasUserSetupCompleted();
4774 if (mService != null) {
4779 return mService.setProfileOwner(admin, ownerName, userHandle);
4806 if (mService != null) {
4808 mService.setDeviceOwnerLockScreenInfo(admin, info);
4820 if (mService != null) {
4822 return mService.getDeviceOwnerLockScreenInfo();
4857 if (mService != null) {
4859 return mService.setPackagesSuspended(admin, mContext.getPackageName(), packageNames,
4886 if (mService != null) {
4888 return mService.isPackageSuspended(admin, mContext.getPackageName(), packageName);
4908 if (mService != null) {
4910 mService.setProfileEnabled(admin);
4930 if (mService != null) {
4932 mService.setProfileName(admin, profileName);
4949 if (mService != null) {
4951 ComponentName profileOwner = mService.getProfileOwner(myUserId());
4979 if (mService != null) {
4981 return mService.getProfileOwner(userId);
4996 if (mService != null) {
4998 return mService.getProfileOwnerName(Process.myUserHandle().getIdentifier());
5017 if (mService != null) {
5019 return mService.getProfileOwnerName(userId);
5048 if (mService != null) {
5050 mService.addPersistentPreferredActivity(admin, filter, activity);
5071 if (mService != null) {
5073 mService.clearPackagePersistentPreferredActivities(admin, packageName);
5104 if (mService != null) {
5106 if (!mService.setApplicationRestrictionsManagingPackage(admin, packageName)) {
5133 if (mService != null) {
5135 return mService.getApplicationRestrictionsManagingPackage(admin);
5157 if (mService != null) {
5159 return mService.isCallerApplicationRestrictionsManagingPackage(
5208 if (mService != null) {
5210 mService.setApplicationRestrictions(admin, mContext.getPackageName(), packageName,
5249 if (mService != null) {
5251 mService.setTrustAgentConfiguration(admin, target, configuration, mParentInstance);
5284 if (mService != null) {
5286 return mService.getTrustAgentConfiguration(admin, agent, userHandle,
5308 if (mService != null) {
5310 mService.setCrossProfileCallerIdDisabled(admin, disabled);
5329 if (mService != null) {
5331 return mService.getCrossProfileCallerIdDisabled(admin);
5346 if (mService != null) {
5348 return mService.getCrossProfileCallerIdDisabledForUser(userHandle.getIdentifier());
5370 if (mService != null) {
5372 mService.setCrossProfileContactsSearchDisabled(admin, disabled);
5391 if (mService != null) {
5393 return mService.getCrossProfileContactsSearchDisabled(admin);
5409 if (mService != null) {
5411 return mService
5427 if (mService != null) {
5429 mService.startManagedQuickContact(actualLookupKey, actualContactId,
5462 if (mService != null) {
5464 mService.setBluetoothContactSharingDisabled(admin, disabled);
5485 if (mService != null) {
5487 return mService.getBluetoothContactSharingDisabled(admin);
5504 if (mService != null) {
5506 return mService.getBluetoothContactSharingDisabledForUser(userHandle
5529 if (mService != null) {
5531 mService.addCrossProfileIntentFilter(admin, filter, flags);
5548 if (mService != null) {
5550 mService.clearCrossProfileIntentFilters(admin);
5578 if (mService != null) {
5580 return mService.setPermittedAccessibilityServices(admin, packageNames);
5600 if (mService != null) {
5602 return mService.getPermittedAccessibilityServices(admin);
5622 if (mService != null) {
5624 return mService.isAccessibilityServicePermittedByAdmin(admin, packageName,
5648 if (mService != null) {
5650 return mService.getPermittedAccessibilityServicesForUser(userId);
5680 if (mService != null) {
5682 return mService.setPermittedInputMethods(admin, packageNames);
5703 if (mService != null) {
5705 return mService.getPermittedInputMethods(admin);
5725 if (mService != null) {
5727 return mService.isInputMethodPermittedByAdmin(admin, packageName, userHandle);
5749 if (mService != null) {
5751 return mService.getPermittedInputMethodsForCurrentUser();
5787 if (mService != null) {
5789 return mService.setPermittedCrossProfileNotificationListeners(admin, packageList);
5808 if (mService != null) {
5810 return mService.getPermittedCrossProfileNotificationListeners(admin);
5828 if (mService != null) {
5830 return mService.isNotificationListenerServicePermitted(packageName, userId);
5854 if (mService != null) {
5856 return mService.getKeepUninstalledPackages(admin, mContext.getPackageName());
5883 if (mService != null) {
5885 mService.setKeepUninstalledPackages(admin, mContext.getPackageName(), packageNames);
5992 return mService.createAndManageUser(admin, name, profileOwner, adminExtras, flags);
6010 return mService.removeUser(admin, userHandle);
6028 return mService.switchUser(admin, userHandle);
6058 if (mService != null) {
6060 return mService.getApplicationRestrictions(admin, mContext.getPackageName(),
6082 if (mService != null) {
6084 mService.setUserRestriction(admin, key, true);
6104 if (mService != null) {
6106 mService.setUserRestriction(admin, key, false);
6127 if (mService != null) {
6129 ret = mService.getUserRestrictions(admin);
6154 if (mService != null) {
6156 return mService.createAdminSupportIntent(restriction);
6183 if (mService != null) {
6185 return mService.setApplicationHidden(admin, mContext.getPackageName(), packageName,
6209 if (mService != null) {
6211 return mService.isApplicationHidden(admin, mContext.getPackageName(), packageName);
6233 if (mService != null) {
6235 mService.enableSystemApp(admin, mContext.getPackageName(), packageName);
6258 if (mService != null) {
6260 return mService.enableSystemAppWithIntent(admin, mContext.getPackageName(), intent);
6291 if (mService != null) {
6293 mService.setAccountManagementDisabled(admin, accountType, disabled);
6320 if (mService != null) {
6322 return mService.getAccountTypesWithManagementDisabledAsUser(userId);
6354 if (mService != null) {
6356 mService.setLockTaskPackages(admin, packages);
6372 if (mService != null) {
6374 return mService.getLockTaskPackages(admin);
6389 if (mService != null) {
6391 return mService.isLockTaskPermitted(pkg);
6438 if (mService != null) {
6440 mService.setGlobalSetting(admin, setting, value);
6479 if (mService != null) {
6481 mService.setSecureSetting(admin, setting, value);
6503 if (mService != null) {
6505 mService.setRestrictionsProvider(admin, provider);
6522 if (mService != null) {
6524 mService.setMasterVolumeMuted(admin, on);
6540 if (mService != null) {
6542 return mService.isMasterVolumeMuted(admin);
6566 if (mService != null) {
6568 mService.setUninstallBlocked(admin, mContext.getPackageName(), packageName,
6593 if (mService != null) {
6595 return mService.isUninstallBlocked(admin, packageName);
6621 if (mService != null) {
6623 return mService.addCrossProfileWidgetProvider(admin, packageName);
6649 if (mService != null) {
6651 return mService.removeCrossProfileWidgetProvider(admin, packageName);
6671 if (mService != null) {
6673 List<String> providers = mService.getCrossProfileWidgetProviders(admin);
6694 mService.setUserIcon(admin, icon);
6713 if (mService != null) {
6715 mService.setSystemUpdatePolicy(admin, policy);
6729 if (mService != null) {
6731 return mService.getSystemUpdatePolicy();
6756 return mService.setKeyguardDisabled(admin, disabled);
6775 return mService.setStatusBarDisabled(admin, disabled);
6799 if (mService != null) {
6801 mService.notifyPendingSystemUpdate(SystemUpdateInfo.of(updateReceivedTime));
6827 if (mService != null) {
6829 mService.notifyPendingSystemUpdate(SystemUpdateInfo.of(updateReceivedTime,
6848 return mService.getPendingSystemUpdate(admin);
6878 mService.setPermissionPolicy(admin, mContext.getPackageName(), policy);
6894 return mService.getPermissionPolicy(admin);
6934 return mService.setPermissionGrantState(admin, mContext.getPackageName(), packageName,
6969 return mService.getPermissionGrantState(admin, mContext.getPackageName(), packageName,
6988 return mService.isProvisioningAllowed(action, mContext.getPackageName());
7010 return mService.checkProvisioningPreCondition(action, packageName);
7026 return mService.isManagedProfile(admin);
7041 return mService.isSystemOnlyUser(admin);
7060 return mService.getWifiMacAddress(admin);
7077 mService.reboot(admin);
7103 if (mService != null) {
7105 mService.setShortSupportMessage(admin, message);
7122 if (mService != null) {
7124 return mService.getShortSupportMessage(admin);
7149 if (mService != null) {
7151 mService.setLongSupportMessage(admin, message);
7168 if (mService != null) {
7170 return mService.getLongSupportMessage(admin);
7189 if (mService != null) {
7191 return mService.getShortSupportMessageForUser(admin, userHandle);
7211 if (mService != null) {
7213 return mService.getLongSupportMessageForUser(admin, userHandle);
7271 if (!mService.isManagedProfile(admin)) {
7274 return new DevicePolicyManager(mContext, mService, true);
7300 mService.setSecurityLoggingEnabled(admin, enabled);
7319 return mService.isSecurityLoggingEnabled(admin);
7346 ParceledListSlice<SecurityEvent> list = mService.retrieveSecurityLogs(admin);
7371 return new DevicePolicyManager(mContext, mService, true);
7397 ParceledListSlice<SecurityEvent> list = mService.retrievePreRebootSecurityLogs(admin);
7425 mService.setOrganizationColor(admin, color);
7446 mService.setOrganizationColorForUser(color, userId);
7463 return mService.getOrganizationColor(admin);
7478 return mService.getOrganizationColorForUser(userHandle);
7499 mService.setOrganizationName(admin, title);
7516 return mService.getOrganizationName(admin);
7536 return mService.getDeviceOwnerOrganizationName();
7552 return mService.getOrganizationNameForUser(userHandle);
7567 if (mService != null) {
7569 return mService.getUserProvisioningState();
7585 if (mService != null) {
7587 mService.setUserProvisioningState(state, userHandle);
7615 mService.setAffiliationIds(admin, new ArrayList<>(ids));
7628 return new ArraySet<>(mService.getAffiliationIds(admin));
7646 return mService.isAffiliatedUser();
7661 return mService.isUninstallInQueue(packageName);
7673 mService.uninstallPackageWithActiveAdmins(packageName);
7691 mService.forceRemoveActiveAdmin(adminReceiver, userHandle);
7707 return mService.isDeviceProvisioned();
7727 mService.setDeviceProvisioningConfigApplied();
7748 return mService.isDeviceProvisioningConfigApplied();
7763 mService.forceUpdateUserSetupComplete();
7790 mService.setBackupServiceEnabled(admin, enabled);
7807 return mService.isBackupServiceEnabled(admin);
7859 mService.setNetworkLoggingEnabled(admin, enabled);
7877 return mService.isNetworkLoggingEnabled(admin);
7916 return mService.retrieveNetworkLogs(admin, batchToken);
7959 return mService.bindDeviceAdminServiceAsUser(admin,
7980 return mService.getBindDeviceAdminTargetUsers(admin);
8000 return mService.getLastSecurityLogRetrievalTime();
8019 return mService.getLastBugReportRequestTime();
8039 return mService.getLastNetworkLogRetrievalTime();
8058 return mService.isCurrentInputMethodSetByOwner();
8081 return mService.getOwnerInstalledCaCerts(user).getList();