• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2010 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 package android.app.admin;
18 
19 import android.annotation.ColorInt;
20 import android.annotation.IntDef;
21 import android.annotation.NonNull;
22 import android.annotation.Nullable;
23 import android.annotation.SdkConstant;
24 import android.annotation.SdkConstant.SdkConstantType;
25 import android.annotation.SystemApi;
26 import android.annotation.UserIdInt;
27 import android.app.Activity;
28 import android.app.admin.NetworkEvent;
29 import android.app.admin.SecurityLog.SecurityEvent;
30 import android.content.ComponentName;
31 import android.content.Context;
32 import android.content.Intent;
33 import android.content.IntentFilter;
34 import android.content.pm.PackageManager;
35 import android.content.pm.PackageManager.NameNotFoundException;
36 import android.content.pm.ParceledListSlice;
37 import android.content.pm.UserInfo;
38 import android.graphics.Bitmap;
39 import android.net.ProxyInfo;
40 import android.net.Uri;
41 import android.os.Bundle;
42 import android.os.PersistableBundle;
43 import android.os.Process;
44 import android.os.RemoteCallback;
45 import android.os.RemoteException;
46 import android.os.ServiceManager;
47 import android.os.UserHandle;
48 import android.os.UserManager;
49 import android.provider.ContactsContract.Directory;
50 import android.provider.Settings;
51 import android.security.Credentials;
52 import android.service.restrictions.RestrictionsReceiver;
53 import android.telephony.TelephonyManager;
54 import android.util.Log;
55 
56 import com.android.internal.annotations.VisibleForTesting;
57 import com.android.org.conscrypt.TrustedCertificateStore;
58 
59 import java.io.ByteArrayInputStream;
60 import java.io.IOException;
61 import java.lang.annotation.Retention;
62 import java.lang.annotation.RetentionPolicy;
63 import java.net.InetSocketAddress;
64 import java.net.Proxy;
65 import java.security.KeyFactory;
66 import java.security.NoSuchAlgorithmException;
67 import java.security.PrivateKey;
68 import java.security.cert.Certificate;
69 import java.security.cert.CertificateException;
70 import java.security.cert.CertificateFactory;
71 import java.security.cert.X509Certificate;
72 import java.security.spec.InvalidKeySpecException;
73 import java.security.spec.PKCS8EncodedKeySpec;
74 import java.util.ArrayList;
75 import java.util.Arrays;
76 import java.util.Collections;
77 import java.util.List;
78 import java.util.Set;
79 
80 /**
81  * Public interface for managing policies enforced on a device. Most clients of this class must be
82  * registered with the system as a <a href="{@docRoot}guide/topics/admin/device-admin.html">device
83  * administrator</a>. Additionally, a device administrator may be registered as either a profile or
84  * device owner. A given method is accessible to all device administrators unless the documentation
85  * for that method specifies that it is restricted to either device or profile owners. Any
86  * application calling an api may only pass as an argument a device administrator component it
87  * owns. Otherwise, a {@link SecurityException} will be thrown.
88  * <div class="special reference">
89  * <h3>Developer Guides</h3>
90  * <p>
91  * For more information about managing policies for device administration, read the <a href=
92  * "{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> developer
93  * guide. </div>
94  */
95 public class DevicePolicyManager {
96     private static String TAG = "DevicePolicyManager";
97 
98     private final Context mContext;
99     private final IDevicePolicyManager mService;
100     private final boolean mParentInstance;
101 
DevicePolicyManager(Context context, boolean parentInstance)102     private DevicePolicyManager(Context context, boolean parentInstance) {
103         this(context,
104                 IDevicePolicyManager.Stub.asInterface(
105                         ServiceManager.getService(Context.DEVICE_POLICY_SERVICE)),
106                 parentInstance);
107     }
108 
109     /** @hide */
110     @VisibleForTesting
DevicePolicyManager( Context context, IDevicePolicyManager service, boolean parentInstance)111     protected DevicePolicyManager(
112             Context context, IDevicePolicyManager service, boolean parentInstance) {
113         mContext = context;
114         mService = service;
115         mParentInstance = parentInstance;
116     }
117 
118     /** @hide */
create(Context context)119     public static DevicePolicyManager create(Context context) {
120         DevicePolicyManager me = new DevicePolicyManager(context, false);
121         return me.mService != null ? me : null;
122     }
123 
124     /** @hide test will override it. */
125     @VisibleForTesting
myUserId()126     protected int myUserId() {
127         return UserHandle.myUserId();
128     }
129 
130     /**
131      * Activity action: Starts the provisioning flow which sets up a managed profile.
132      *
133      * <p>A managed profile allows data separation for example for the usage of a
134      * device as a personal and corporate device. The user which provisioning is started from and
135      * the managed profile share a launcher.
136      *
137      * <p>This intent will typically be sent by a mobile device management application (MDM).
138      * Provisioning adds a managed profile and sets the MDM as the profile owner who has full
139      * control over the profile.
140      *
141      * <p>It is possible to check if provisioning is allowed or not by querying the method
142      * {@link #isProvisioningAllowed(String)}.
143      *
144      * <p>In version {@link android.os.Build.VERSION_CODES#LOLLIPOP}, this intent must contain the
145      * extra {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME}.
146      * As of {@link android.os.Build.VERSION_CODES#M}, it should contain the extra
147      * {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME} instead, although specifying only
148      * {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME} is still supported.
149      *
150      * <p>The intent may also contain the following extras:
151      * <ul>
152      * <li>{@link #EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE}, optional </li>
153      * <li>{@link #EXTRA_PROVISIONING_SKIP_ENCRYPTION}, optional, supported from
154      * {@link android.os.Build.VERSION_CODES#N}</li>
155      * <li>{@link #EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE}, optional</li>
156      * <li>{@link #EXTRA_PROVISIONING_LOGO_URI}, optional</li>
157      * <li>{@link #EXTRA_PROVISIONING_MAIN_COLOR}, optional</li>
158      * </ul>
159      *
160      * <p>When managed provisioning has completed, broadcasts are sent to the application specified
161      * in the provisioning intent. The
162      * {@link DeviceAdminReceiver#ACTION_PROFILE_PROVISIONING_COMPLETE} broadcast is sent in the
163      * managed profile and the {@link #ACTION_MANAGED_PROFILE_PROVISIONED} broadcast is sent in
164      * the primary profile.
165      *
166      * <p>If provisioning fails, the managedProfile is removed so the device returns to its
167      * previous state.
168      *
169      * <p>If launched with {@link android.app.Activity#startActivityForResult(Intent, int)} a
170      * result code of {@link android.app.Activity#RESULT_OK} implies that the synchronous part of
171      * the provisioning flow was successful, although this doesn't guarantee the full flow will
172      * succeed. Conversely a result code of {@link android.app.Activity#RESULT_CANCELED} implies
173      * that the user backed-out of provisioning, or some precondition for provisioning wasn't met.
174      */
175     @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
176     public static final String ACTION_PROVISION_MANAGED_PROFILE
177         = "android.app.action.PROVISION_MANAGED_PROFILE";
178 
179     /**
180      * Activity action: Starts the provisioning flow which sets up a managed user.
181      *
182      * <p>This intent will typically be sent by a mobile device management application (MDM).
183      * Provisioning configures the user as managed user and sets the MDM as the profile
184      * owner who has full control over the user. Provisioning can only happen before user setup has
185      * been completed. Use {@link #isProvisioningAllowed(String)} to check if provisioning is
186      * allowed.
187      *
188      * <p>The intent contains the following extras:
189      * <ul>
190      * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME}</li>
191      * <li>{@link #EXTRA_PROVISIONING_SKIP_ENCRYPTION}, optional</li>
192      * <li>{@link #EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE}, optional</li>
193      * <li>{@link #EXTRA_PROVISIONING_LOGO_URI}, optional</li>
194      * <li>{@link #EXTRA_PROVISIONING_MAIN_COLOR}, optional</li>
195      * </ul>
196      *
197      * <p>If provisioning fails, the device returns to its previous state.
198      *
199      * <p>If launched with {@link android.app.Activity#startActivityForResult(Intent, int)} a
200      * result code of {@link android.app.Activity#RESULT_OK} implies that the synchronous part of
201      * the provisioning flow was successful, although this doesn't guarantee the full flow will
202      * succeed. Conversely a result code of {@link android.app.Activity#RESULT_CANCELED} implies
203      * that the user backed-out of provisioning, or some precondition for provisioning wasn't met.
204      *
205      * @hide
206      */
207     @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
208     public static final String ACTION_PROVISION_MANAGED_USER
209         = "android.app.action.PROVISION_MANAGED_USER";
210 
211     /**
212      * Activity action: Starts the provisioning flow which sets up a managed device.
213      * Must be started with {@link android.app.Activity#startActivityForResult(Intent, int)}.
214      *
215      * <p> During device owner provisioning a device admin app is set as the owner of the device.
216      * A device owner has full control over the device. The device owner can not be modified by the
217      * user.
218      *
219      * <p> A typical use case would be a device that is owned by a company, but used by either an
220      * employee or client.
221      *
222      * <p> An intent with this action can be sent only on an unprovisioned device.
223      * It is possible to check if provisioning is allowed or not by querying the method
224      * {@link #isProvisioningAllowed(String)}.
225      *
226      * <p>The intent contains the following extras:
227      * <ul>
228      * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME}</li>
229      * <li>{@link #EXTRA_PROVISIONING_SKIP_ENCRYPTION}, optional</li>
230      * <li>{@link #EXTRA_PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED}, optional</li>
231      * <li>{@link #EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE}, optional</li>
232      * <li>{@link #EXTRA_PROVISIONING_LOGO_URI}, optional</li>
233      * <li>{@link #EXTRA_PROVISIONING_MAIN_COLOR}, optional</li>
234      * </ul>
235      *
236      * <p>When device owner provisioning has completed, an intent of the type
237      * {@link DeviceAdminReceiver#ACTION_PROFILE_PROVISIONING_COMPLETE} is broadcast to the
238      * device owner.
239      *
240      * <p>If provisioning fails, the device is factory reset.
241      *
242      * <p>A result code of {@link android.app.Activity#RESULT_OK} implies that the synchronous part
243      * of the provisioning flow was successful, although this doesn't guarantee the full flow will
244      * succeed. Conversely a result code of {@link android.app.Activity#RESULT_CANCELED} implies
245      * that the user backed-out of provisioning, or some precondition for provisioning wasn't met.
246      */
247     @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
248     public static final String ACTION_PROVISION_MANAGED_DEVICE
249         = "android.app.action.PROVISION_MANAGED_DEVICE";
250 
251     /**
252      * Activity action: Starts the provisioning flow which sets up a managed device.
253      *
254      * <p>During device owner provisioning, a device admin app is downloaded and set as the owner of
255      * the device. A device owner has full control over the device. The device owner can not be
256      * modified by the user and the only way of resetting the device is via factory reset.
257      *
258      * <p>A typical use case would be a device that is owned by a company, but used by either an
259      * employee or client.
260      *
261      * <p>The provisioning message should be sent to an unprovisioned device.
262      *
263      * <p>Unlike {@link #ACTION_PROVISION_MANAGED_DEVICE}, the provisioning message can only be sent
264      * by a privileged app with the permission
265      * {@link android.Manifest.permission#DISPATCH_PROVISIONING_MESSAGE}.
266      *
267      * <p>The provisioning intent contains the following properties:
268      * <ul>
269      * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME}</li>
270      * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION}, optional</li>
271      * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_COOKIE_HEADER}, optional</li>
272      * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM}, optional</li>
273      * <li>{@link #EXTRA_PROVISIONING_LOCAL_TIME} (convert to String), optional</li>
274      * <li>{@link #EXTRA_PROVISIONING_TIME_ZONE}, optional</li>
275      * <li>{@link #EXTRA_PROVISIONING_LOCALE}, optional</li>
276      * <li>{@link #EXTRA_PROVISIONING_WIFI_SSID}, optional</li>
277      * <li>{@link #EXTRA_PROVISIONING_WIFI_HIDDEN} (convert to String), optional</li>
278      * <li>{@link #EXTRA_PROVISIONING_WIFI_SECURITY_TYPE}, optional</li>
279      * <li>{@link #EXTRA_PROVISIONING_WIFI_PASSWORD}, optional</li>
280      * <li>{@link #EXTRA_PROVISIONING_WIFI_PROXY_HOST}, optional</li>
281      * <li>{@link #EXTRA_PROVISIONING_WIFI_PROXY_PORT} (convert to String), optional</li>
282      * <li>{@link #EXTRA_PROVISIONING_WIFI_PROXY_BYPASS}, optional</li>
283      * <li>{@link #EXTRA_PROVISIONING_WIFI_PAC_URL}, optional</li>
284      * <li>{@link #EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE}, optional</li></ul>
285      *
286      * @hide
287      */
288     @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
289     @SystemApi
290     public static final String ACTION_PROVISION_MANAGED_DEVICE_FROM_TRUSTED_SOURCE =
291             "android.app.action.PROVISION_MANAGED_DEVICE_FROM_TRUSTED_SOURCE";
292 
293     /**
294      * Activity action: Starts the provisioning flow which sets up a managed device.
295      * Must be started with {@link android.app.Activity#startActivityForResult(Intent, int)}.
296      *
297      * <p>NOTE: This is only supported on split system user devices, and puts the device into a
298      * management state that is distinct from that reached by
299      * {@link #ACTION_PROVISION_MANAGED_DEVICE} - specifically the device owner runs on the system
300      * user, and only has control over device-wide policies, not individual users and their data.
301      * The primary benefit is that multiple non-system users are supported when provisioning using
302      * this form of device management.
303      *
304      * <p>During device owner provisioning a device admin app is set as the owner of the device.
305      * A device owner has full control over the device. The device owner can not be modified by the
306      * user.
307      *
308      * <p>A typical use case would be a device that is owned by a company, but used by either an
309      * employee or client.
310      *
311      * <p>An intent with this action can be sent only on an unprovisioned device.
312      * It is possible to check if provisioning is allowed or not by querying the method
313      * {@link #isProvisioningAllowed(String)}.
314      *
315      * <p>The intent contains the following extras:
316      * <ul>
317      * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME}</li>
318      * <li>{@link #EXTRA_PROVISIONING_SKIP_ENCRYPTION}, optional</li>
319      * <li>{@link #EXTRA_PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED}, optional</li>
320      * <li>{@link #EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE}, optional</li>
321      * <li>{@link #EXTRA_PROVISIONING_LOGO_URI}, optional</li>
322      * <li>{@link #EXTRA_PROVISIONING_MAIN_COLOR}, optional</li>
323      * </ul>
324      *
325      * <p>When device owner provisioning has completed, an intent of the type
326      * {@link DeviceAdminReceiver#ACTION_PROFILE_PROVISIONING_COMPLETE} is broadcast to the
327      * device owner.
328      *
329      * <p>If provisioning fails, the device is factory reset.
330      *
331      * <p>A result code of {@link android.app.Activity#RESULT_OK} implies that the synchronous part
332      * of the provisioning flow was successful, although this doesn't guarantee the full flow will
333      * succeed. Conversely a result code of {@link android.app.Activity#RESULT_CANCELED} implies
334      * that the user backed-out of provisioning, or some precondition for provisioning wasn't met.
335      *
336      * @hide
337      */
338     @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
339     public static final String ACTION_PROVISION_MANAGED_SHAREABLE_DEVICE
340         = "android.app.action.PROVISION_MANAGED_SHAREABLE_DEVICE";
341 
342     /**
343      * Activity action: Finalizes management provisioning, should be used after user-setup
344      * has been completed and {@link #getUserProvisioningState()} returns one of:
345      * <ul>
346      * <li>{@link #STATE_USER_SETUP_INCOMPLETE}</li>
347      * <li>{@link #STATE_USER_SETUP_COMPLETE}</li>
348      * <li>{@link #STATE_USER_PROFILE_COMPLETE}</li>
349      * </ul>
350      *
351      * @hide
352      */
353     @SystemApi
354     @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
355     public static final String ACTION_PROVISION_FINALIZATION
356             = "android.app.action.PROVISION_FINALIZATION";
357 
358     /**
359      * Action: Bugreport sharing with device owner has been accepted by the user.
360      *
361      * @hide
362      */
363     public static final String ACTION_BUGREPORT_SHARING_ACCEPTED =
364             "com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED";
365 
366     /**
367      * Action: Bugreport sharing with device owner has been declined by the user.
368      *
369      * @hide
370      */
371     public static final String ACTION_BUGREPORT_SHARING_DECLINED =
372             "com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED";
373 
374     /**
375      * Action: Bugreport has been collected and is dispatched to {@link DevicePolicyManagerService}.
376      *
377      * @hide
378      */
379     public static final String ACTION_REMOTE_BUGREPORT_DISPATCH =
380             "android.intent.action.REMOTE_BUGREPORT_DISPATCH";
381 
382     /**
383      * Extra for shared bugreport's SHA-256 hash.
384      *
385      * @hide
386      */
387     public static final String EXTRA_REMOTE_BUGREPORT_HASH =
388             "android.intent.extra.REMOTE_BUGREPORT_HASH";
389 
390     /**
391      * Extra for remote bugreport notification shown type.
392      *
393      * @hide
394      */
395     public static final String EXTRA_BUGREPORT_NOTIFICATION_TYPE =
396             "android.app.extra.bugreport_notification_type";
397 
398     /**
399      * Notification type for a started remote bugreport flow.
400      *
401      * @hide
402      */
403     public static final int NOTIFICATION_BUGREPORT_STARTED = 1;
404 
405     /**
406      * Notification type for a bugreport that has already been accepted to be shared, but is still
407      * being taken.
408      *
409      * @hide
410      */
411     public static final int NOTIFICATION_BUGREPORT_ACCEPTED_NOT_FINISHED = 2;
412 
413     /**
414      * Notification type for a bugreport that has been taken and can be shared or declined.
415      *
416      * @hide
417      */
418     public static final int NOTIFICATION_BUGREPORT_FINISHED_NOT_ACCEPTED = 3;
419 
420     /**
421      * Default and maximum timeout in milliseconds after which unlocking with weak auth times out,
422      * i.e. the user has to use a strong authentication method like password, PIN or pattern.
423      *
424      * @hide
425      */
426     public static final long DEFAULT_STRONG_AUTH_TIMEOUT_MS = 72 * 60 * 60 * 1000; // 72h
427 
428     /**
429      * A {@link android.os.Parcelable} extra of type {@link android.os.PersistableBundle} that
430      * allows a mobile device management application or NFC programmer application which starts
431      * managed provisioning to pass data to the management application instance after provisioning.
432      * <p>
433      * If used with {@link #ACTION_PROVISION_MANAGED_PROFILE} it can be used by the application that
434      * sends the intent to pass data to itself on the newly created profile.
435      * If used with {@link #ACTION_PROVISION_MANAGED_DEVICE} it allows passing data to the same
436      * instance of the app on the primary user.
437      * Starting from {@link android.os.Build.VERSION_CODES#M}, if used with
438      * {@link #MIME_TYPE_PROVISIONING_NFC} as part of NFC managed device provisioning, the NFC
439      * message should contain a stringified {@link java.util.Properties} instance, whose string
440      * properties will be converted into a {@link android.os.PersistableBundle} and passed to the
441      * management application after provisioning.
442      *
443      * <p>
444      * In both cases the application receives the data in
445      * {@link DeviceAdminReceiver#onProfileProvisioningComplete} via an intent with the action
446      * {@link DeviceAdminReceiver#ACTION_PROFILE_PROVISIONING_COMPLETE}. The bundle is not changed
447      * during the managed provisioning.
448      */
449     public static final String EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE =
450             "android.app.extra.PROVISIONING_ADMIN_EXTRAS_BUNDLE";
451 
452     /**
453      * A String extra holding the package name of the mobile device management application that
454      * will be set as the profile owner or device owner.
455      *
456      * <p>If an application starts provisioning directly via an intent with action
457      * {@link #ACTION_PROVISION_MANAGED_PROFILE} this package has to match the package name of the
458      * application that started provisioning. The package will be set as profile owner in that case.
459      *
460      * <p>This package is set as device owner when device owner provisioning is started by an NFC
461      * message containing an NFC record with MIME type {@link #MIME_TYPE_PROVISIONING_NFC}.
462      *
463      * <p> When this extra is set, the application must have exactly one device admin receiver.
464      * This receiver will be set as the profile or device owner and active admin.
465      *
466      * @see DeviceAdminReceiver
467      * @deprecated Use {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME}. This extra is still
468      * supported, but only if there is only one device admin receiver in the package that requires
469      * the permission {@link android.Manifest.permission#BIND_DEVICE_ADMIN}.
470      */
471     @Deprecated
472     public static final String EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME
473         = "android.app.extra.PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME";
474 
475     /**
476      * A ComponentName extra indicating the device admin receiver of the mobile device management
477      * application that will be set as the profile owner or device owner and active admin.
478      *
479      * <p>If an application starts provisioning directly via an intent with action
480      * {@link #ACTION_PROVISION_MANAGED_PROFILE} or
481      * {@link #ACTION_PROVISION_MANAGED_DEVICE} the package name of this
482      * component has to match the package name of the application that started provisioning.
483      *
484      * <p>This component is set as device owner and active admin when device owner provisioning is
485      * started by an intent with action {@link #ACTION_PROVISION_MANAGED_DEVICE} or by an NFC
486      * message containing an NFC record with MIME type
487      * {@link #MIME_TYPE_PROVISIONING_NFC}. For the NFC record, the component name must be
488      * flattened to a string, via {@link ComponentName#flattenToShortString()}.
489      *
490      * @see DeviceAdminReceiver
491      */
492     public static final String EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME
493         = "android.app.extra.PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME";
494 
495     /**
496      * An {@link android.accounts.Account} extra holding the account to migrate during managed
497      * profile provisioning. If the account supplied is present in the primary user, it will be
498      * copied, along with its credentials to the managed profile and removed from the primary user.
499      *
500      * Use with {@link #ACTION_PROVISION_MANAGED_PROFILE}.
501      */
502 
503     public static final String EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE
504         = "android.app.extra.PROVISIONING_ACCOUNT_TO_MIGRATE";
505 
506     /**
507      * A String extra that, holds the email address of the account which a managed profile is
508      * created for. Used with {@link #ACTION_PROVISION_MANAGED_PROFILE} and
509      * {@link DeviceAdminReceiver#ACTION_PROFILE_PROVISIONING_COMPLETE}.
510      *
511      * <p> This extra is part of the {@link #EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE}.
512      *
513      * <p> If the {@link #ACTION_PROVISION_MANAGED_PROFILE} intent that starts managed provisioning
514      * contains this extra, it is forwarded in the
515      * {@link DeviceAdminReceiver#ACTION_PROFILE_PROVISIONING_COMPLETE} intent to the mobile
516      * device management application that was set as the profile owner during provisioning.
517      * It is usually used to avoid that the user has to enter their email address twice.
518      */
519     public static final String EXTRA_PROVISIONING_EMAIL_ADDRESS
520         = "android.app.extra.PROVISIONING_EMAIL_ADDRESS";
521 
522     /**
523      * A integer extra indicating the predominant color to show during the provisioning.
524      * Refer to {@link android.graphics.Color} for how the color is represented.
525      *
526      * <p>Use with {@link #ACTION_PROVISION_MANAGED_PROFILE} or
527      * {@link #ACTION_PROVISION_MANAGED_DEVICE}.
528      */
529     public static final String EXTRA_PROVISIONING_MAIN_COLOR =
530              "android.app.extra.PROVISIONING_MAIN_COLOR";
531 
532     /**
533      * A Boolean extra that can be used by the mobile device management application to skip the
534      * disabling of system apps during provisioning when set to {@code true}.
535      *
536      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} or an intent with action
537      * {@link #ACTION_PROVISION_MANAGED_DEVICE} that starts device owner provisioning.
538      */
539     public static final String EXTRA_PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED =
540             "android.app.extra.PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED";
541 
542     /**
543      * A String extra holding the time zone {@link android.app.AlarmManager} that the device
544      * will be set to.
545      *
546      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
547      * provisioning via an NFC bump.
548      */
549     public static final String EXTRA_PROVISIONING_TIME_ZONE
550         = "android.app.extra.PROVISIONING_TIME_ZONE";
551 
552     /**
553      * A Long extra holding the wall clock time (in milliseconds) to be set on the device's
554      * {@link android.app.AlarmManager}.
555      *
556      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
557      * provisioning via an NFC bump.
558      */
559     public static final String EXTRA_PROVISIONING_LOCAL_TIME
560         = "android.app.extra.PROVISIONING_LOCAL_TIME";
561 
562     /**
563      * A String extra holding the {@link java.util.Locale} that the device will be set to.
564      * Format: xx_yy, where xx is the language code, and yy the country code.
565      *
566      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
567      * provisioning via an NFC bump.
568      */
569     public static final String EXTRA_PROVISIONING_LOCALE
570         = "android.app.extra.PROVISIONING_LOCALE";
571 
572     /**
573      * A String extra holding the ssid of the wifi network that should be used during nfc device
574      * owner provisioning for downloading the mobile device management application.
575      *
576      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
577      * provisioning via an NFC bump.
578      */
579     public static final String EXTRA_PROVISIONING_WIFI_SSID
580         = "android.app.extra.PROVISIONING_WIFI_SSID";
581 
582     /**
583      * A boolean extra indicating whether the wifi network in {@link #EXTRA_PROVISIONING_WIFI_SSID}
584      * is hidden or not.
585      *
586      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
587      * provisioning via an NFC bump.
588      */
589     public static final String EXTRA_PROVISIONING_WIFI_HIDDEN
590         = "android.app.extra.PROVISIONING_WIFI_HIDDEN";
591 
592     /**
593      * A String extra indicating the security type of the wifi network in
594      * {@link #EXTRA_PROVISIONING_WIFI_SSID} and could be one of {@code NONE}, {@code WPA} or
595      * {@code WEP}.
596      *
597      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
598      * provisioning via an NFC bump.
599      */
600     public static final String EXTRA_PROVISIONING_WIFI_SECURITY_TYPE
601         = "android.app.extra.PROVISIONING_WIFI_SECURITY_TYPE";
602 
603     /**
604      * A String extra holding the password of the wifi network in
605      * {@link #EXTRA_PROVISIONING_WIFI_SSID}.
606      *
607      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
608      * provisioning via an NFC bump.
609      */
610     public static final String EXTRA_PROVISIONING_WIFI_PASSWORD
611         = "android.app.extra.PROVISIONING_WIFI_PASSWORD";
612 
613     /**
614      * A String extra holding the proxy host for the wifi network in
615      * {@link #EXTRA_PROVISIONING_WIFI_SSID}.
616      *
617      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
618      * provisioning via an NFC bump.
619      */
620     public static final String EXTRA_PROVISIONING_WIFI_PROXY_HOST
621         = "android.app.extra.PROVISIONING_WIFI_PROXY_HOST";
622 
623     /**
624      * An int extra holding the proxy port for the wifi network in
625      * {@link #EXTRA_PROVISIONING_WIFI_SSID}.
626      *
627      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
628      * provisioning via an NFC bump.
629      */
630     public static final String EXTRA_PROVISIONING_WIFI_PROXY_PORT
631         = "android.app.extra.PROVISIONING_WIFI_PROXY_PORT";
632 
633     /**
634      * A String extra holding the proxy bypass for the wifi network in
635      * {@link #EXTRA_PROVISIONING_WIFI_SSID}.
636      *
637      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
638      * provisioning via an NFC bump.
639      */
640     public static final String EXTRA_PROVISIONING_WIFI_PROXY_BYPASS
641         = "android.app.extra.PROVISIONING_WIFI_PROXY_BYPASS";
642 
643     /**
644      * A String extra holding the proxy auto-config (PAC) URL for the wifi network in
645      * {@link #EXTRA_PROVISIONING_WIFI_SSID}.
646      *
647      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
648      * provisioning via an NFC bump.
649      */
650     public static final String EXTRA_PROVISIONING_WIFI_PAC_URL
651         = "android.app.extra.PROVISIONING_WIFI_PAC_URL";
652 
653     /**
654      * A String extra holding a url that specifies the download location of the device admin
655      * package. When not provided it is assumed that the device admin package is already installed.
656      *
657      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
658      * provisioning via an NFC bump.
659      */
660     public static final String EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION
661         = "android.app.extra.PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION";
662 
663     /**
664      * An int extra holding a minimum required version code for the device admin package. If the
665      * device admin is already installed on the device, it will only be re-downloaded from
666      * {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION} if the version of the
667      * installed package is less than this version code.
668      *
669      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
670      * provisioning via an NFC bump.
671      */
672     public static final String EXTRA_PROVISIONING_DEVICE_ADMIN_MINIMUM_VERSION_CODE
673         = "android.app.extra.PROVISIONING_DEVICE_ADMIN_MINIMUM_VERSION_CODE";
674 
675     /**
676      * A String extra holding a http cookie header which should be used in the http request to the
677      * url specified in {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION}.
678      *
679      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
680      * provisioning via an NFC bump.
681      */
682     public static final String EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_COOKIE_HEADER
683         = "android.app.extra.PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_COOKIE_HEADER";
684 
685     /**
686      * A String extra holding the URL-safe base64 encoded SHA-256 or SHA-1 hash (see notes below) of
687      * the file at download location specified in
688      * {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION}.
689      *
690      * <p>Either this extra or {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_SIGNATURE_CHECKSUM} must be
691      * present. The provided checksum must match the checksum of the file at the download
692      * location. If the checksum doesn't match an error will be shown to the user and the user will
693      * be asked to factory reset the device.
694      *
695      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
696      * provisioning via an NFC bump.
697      *
698      * <p><strong>Note:</strong> for devices running {@link android.os.Build.VERSION_CODES#LOLLIPOP}
699      * and {@link android.os.Build.VERSION_CODES#LOLLIPOP_MR1} only SHA-1 hash is supported.
700      * Starting from {@link android.os.Build.VERSION_CODES#M}, this parameter accepts SHA-256 in
701      * addition to SHA-1. Support for SHA-1 is likely to be removed in future OS releases.
702      */
703     public static final String EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM
704         = "android.app.extra.PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM";
705 
706     /**
707      * A String extra holding the URL-safe base64 encoded SHA-256 checksum of any signature of the
708      * android package archive at the download location specified in {@link
709      * #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION}.
710      *
711      * <p>The signatures of an android package archive can be obtained using
712      * {@link android.content.pm.PackageManager#getPackageArchiveInfo} with flag
713      * {@link android.content.pm.PackageManager#GET_SIGNATURES}.
714      *
715      * <p>Either this extra or {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM} must be
716      * present. The provided checksum must match the checksum of any signature of the file at
717      * the download location. If the checksum does not match an error will be shown to the user and
718      * the user will be asked to factory reset the device.
719      *
720      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner
721      * provisioning via an NFC bump.
722      */
723     public static final String EXTRA_PROVISIONING_DEVICE_ADMIN_SIGNATURE_CHECKSUM
724         = "android.app.extra.PROVISIONING_DEVICE_ADMIN_SIGNATURE_CHECKSUM";
725 
726     /**
727      * Broadcast Action: This broadcast is sent to indicate that provisioning of a managed profile
728      * has completed successfully.
729      *
730      * <p>The broadcast is limited to the primary profile, to the app specified in the provisioning
731      * intent with action {@link #ACTION_PROVISION_MANAGED_PROFILE}.
732      *
733      * <p>This intent will contain the extra {@link #EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE} which
734      * corresponds to the account requested to be migrated at provisioning time, if any.
735      */
736     @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
737     public static final String ACTION_MANAGED_PROFILE_PROVISIONED
738         = "android.app.action.MANAGED_PROFILE_PROVISIONED";
739 
740     /**
741      * A boolean extra indicating whether device encryption can be skipped as part of device owner
742      * or managed profile provisioning.
743      *
744      * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} or an intent with action
745      * {@link #ACTION_PROVISION_MANAGED_DEVICE} that starts device owner provisioning.
746      *
747      * <p>From {@link android.os.Build.VERSION_CODES#N} onwards, this is also supported for an
748      * intent with action {@link #ACTION_PROVISION_MANAGED_PROFILE}.
749      */
750     public static final String EXTRA_PROVISIONING_SKIP_ENCRYPTION =
751              "android.app.extra.PROVISIONING_SKIP_ENCRYPTION";
752 
753     /**
754      * A {@link Uri} extra pointing to a logo image. This image will be shown during the
755      * provisioning. If this extra is not passed, a default image will be shown.
756      * <h5>The following URI schemes are accepted:</h5>
757      * <ul>
758      * <li>content ({@link android.content.ContentResolver#SCHEME_CONTENT})</li>
759      * <li>android.resource ({@link android.content.ContentResolver#SCHEME_ANDROID_RESOURCE})</li>
760      * </ul>
761      *
762      * <p> It is the responsability of the caller to provide an image with a reasonable
763      * pixed density for the device.
764      *
765      * <p> If a content: URI is passed, the intent should have the flag
766      * {@link Intent#FLAG_GRANT_READ_URI_PERMISSION} and the uri should be added to the
767      * {@link android.content.ClipData} of the intent too.
768      *
769      * <p>Use in an intent with action {@link #ACTION_PROVISION_MANAGED_PROFILE} or
770      * {@link #ACTION_PROVISION_MANAGED_DEVICE}
771      */
772     public static final String EXTRA_PROVISIONING_LOGO_URI =
773             "android.app.extra.PROVISIONING_LOGO_URI";
774 
775     /**
776      * A boolean extra indicating if user setup should be skipped, for when provisioning is started
777      * during setup-wizard.
778      *
779      * <p>If unspecified, defaults to {@code true} to match the behavior in
780      * {@link android.os.Build.VERSION_CODES#M} and earlier.
781      *
782      * <p>Use in an intent with action {@link #ACTION_PROVISION_MANAGED_DEVICE} or
783      * {@link #ACTION_PROVISION_MANAGED_USER}.
784      *
785      * @hide
786      */
787     public static final String EXTRA_PROVISIONING_SKIP_USER_SETUP =
788             "android.app.extra.PROVISIONING_SKIP_USER_SETUP";
789 
790     /**
791      * This MIME type is used for starting the device owner provisioning.
792      *
793      * <p>During device owner provisioning a device admin app is set as the owner of the device.
794      * A device owner has full control over the device. The device owner can not be modified by the
795      * user and the only way of resetting the device is if the device owner app calls a factory
796      * reset.
797      *
798      * <p> A typical use case would be a device that is owned by a company, but used by either an
799      * employee or client.
800      *
801      * <p> The NFC message must be sent to an unprovisioned device.
802      *
803      * <p>The NFC record must contain a serialized {@link java.util.Properties} object which
804      * contains the following properties:
805      * <ul>
806      * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME}</li>
807      * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION}, optional</li>
808      * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_COOKIE_HEADER}, optional</li>
809      * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM}, optional</li>
810      * <li>{@link #EXTRA_PROVISIONING_LOCAL_TIME} (convert to String), optional</li>
811      * <li>{@link #EXTRA_PROVISIONING_TIME_ZONE}, optional</li>
812      * <li>{@link #EXTRA_PROVISIONING_LOCALE}, optional</li>
813      * <li>{@link #EXTRA_PROVISIONING_WIFI_SSID}, optional</li>
814      * <li>{@link #EXTRA_PROVISIONING_WIFI_HIDDEN} (convert to String), optional</li>
815      * <li>{@link #EXTRA_PROVISIONING_WIFI_SECURITY_TYPE}, optional</li>
816      * <li>{@link #EXTRA_PROVISIONING_WIFI_PASSWORD}, optional</li>
817      * <li>{@link #EXTRA_PROVISIONING_WIFI_PROXY_HOST}, optional</li>
818      * <li>{@link #EXTRA_PROVISIONING_WIFI_PROXY_PORT} (convert to String), optional</li>
819      * <li>{@link #EXTRA_PROVISIONING_WIFI_PROXY_BYPASS}, optional</li>
820      * <li>{@link #EXTRA_PROVISIONING_WIFI_PAC_URL}, optional</li>
821      * <li>{@link #EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE}, optional, supported from
822      * {@link android.os.Build.VERSION_CODES#M} </li></ul>
823      *
824      * <p>
825      * As of {@link android.os.Build.VERSION_CODES#M}, the properties should contain
826      * {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME} instead of
827      * {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME}, (although specifying only
828      * {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME} is still supported).
829      */
830     public static final String MIME_TYPE_PROVISIONING_NFC
831         = "application/com.android.managedprovisioning";
832 
833     /**
834      * Activity action: ask the user to add a new device administrator to the system.
835      * The desired policy is the ComponentName of the policy in the
836      * {@link #EXTRA_DEVICE_ADMIN} extra field.  This will invoke a UI to
837      * bring the user through adding the device administrator to the system (or
838      * allowing them to reject it).
839      *
840      * <p>You can optionally include the {@link #EXTRA_ADD_EXPLANATION}
841      * field to provide the user with additional explanation (in addition
842      * to your component's description) about what is being added.
843      *
844      * <p>If your administrator is already active, this will ordinarily return immediately (without
845      * user intervention).  However, if your administrator has been updated and is requesting
846      * additional uses-policy flags, the user will be presented with the new list.  New policies
847      * will not be available to the updated administrator until the user has accepted the new list.
848      */
849     @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
850     public static final String ACTION_ADD_DEVICE_ADMIN
851             = "android.app.action.ADD_DEVICE_ADMIN";
852 
853     /**
854      * @hide
855      * Activity action: ask the user to add a new device administrator as the profile owner
856      * for this user. Only system apps can launch this intent.
857      *
858      * <p>The ComponentName of the profile owner admin is passed in the {@link #EXTRA_DEVICE_ADMIN}
859      * extra field. This will invoke a UI to bring the user through adding the profile owner admin
860      * to remotely control restrictions on the user.
861      *
862      * <p>The intent must be invoked via {@link Activity#startActivityForResult} to receive the
863      * result of whether or not the user approved the action. If approved, the result will
864      * be {@link Activity#RESULT_OK} and the component will be set as an active admin as well
865      * as a profile owner.
866      *
867      * <p>You can optionally include the {@link #EXTRA_ADD_EXPLANATION}
868      * field to provide the user with additional explanation (in addition
869      * to your component's description) about what is being added.
870      *
871      * <p>If there is already a profile owner active or the caller is not a system app, the
872      * operation will return a failure result.
873      */
874     @SystemApi
875     public static final String ACTION_SET_PROFILE_OWNER
876             = "android.app.action.SET_PROFILE_OWNER";
877 
878     /**
879      * @hide
880      * Name of the profile owner admin that controls the user.
881      */
882     @SystemApi
883     public static final String EXTRA_PROFILE_OWNER_NAME
884             = "android.app.extra.PROFILE_OWNER_NAME";
885 
886     /**
887      * Broadcast action: send when any policy admin changes a policy.
888      * This is generally used to find out when a new policy is in effect.
889      *
890      * @hide
891      */
892     public static final String ACTION_DEVICE_POLICY_MANAGER_STATE_CHANGED
893             = "android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED";
894 
895     /**
896      * Broadcast action: sent when the device owner is set or changed.
897      *
898      * This broadcast is sent only to the primary user.
899      * @see #ACTION_PROVISION_MANAGED_DEVICE
900      */
901     @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
902     public static final String ACTION_DEVICE_OWNER_CHANGED
903             = "android.app.action.DEVICE_OWNER_CHANGED";
904 
905     /**
906      * The ComponentName of the administrator component.
907      *
908      * @see #ACTION_ADD_DEVICE_ADMIN
909      */
910     public static final String EXTRA_DEVICE_ADMIN = "android.app.extra.DEVICE_ADMIN";
911 
912     /**
913      * An optional CharSequence providing additional explanation for why the
914      * admin is being added.
915      *
916      * @see #ACTION_ADD_DEVICE_ADMIN
917      */
918     public static final String EXTRA_ADD_EXPLANATION = "android.app.extra.ADD_EXPLANATION";
919 
920     /**
921      * Activity action: have the user enter a new password. This activity should
922      * be launched after using {@link #setPasswordQuality(ComponentName, int)},
923      * or {@link #setPasswordMinimumLength(ComponentName, int)} to have the user
924      * enter a new password that meets the current requirements. You can use
925      * {@link #isActivePasswordSufficient()} to determine whether you need to
926      * have the user select a new password in order to meet the current
927      * constraints. Upon being resumed from this activity, you can check the new
928      * password characteristics to see if they are sufficient.
929      *
930      * If the intent is launched from within a managed profile with a profile
931      * owner built against {@link android.os.Build.VERSION_CODES#M} or before,
932      * this will trigger entering a new password for the parent of the profile.
933      * For all other cases it will trigger entering a new password for the user
934      * or profile it is launched from.
935      *
936      * @see #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD
937      */
938     @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
939     public static final String ACTION_SET_NEW_PASSWORD
940             = "android.app.action.SET_NEW_PASSWORD";
941 
942     /**
943      * Activity action: have the user enter a new password for the parent profile.
944      * If the intent is launched from within a managed profile, this will trigger
945      * entering a new password for the parent of the profile. In all other cases
946      * the behaviour is identical to {@link #ACTION_SET_NEW_PASSWORD}.
947      */
948     @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
949     public static final String ACTION_SET_NEW_PARENT_PROFILE_PASSWORD
950             = "android.app.action.SET_NEW_PARENT_PROFILE_PASSWORD";
951 
952     /**
953      * Broadcast action: Tell the status bar to open the device monitoring dialog, e.g. when
954      * Network logging was enabled and the user tapped the notification.
955      * <p class="note">This is a protected intent that can only be sent by the system.</p>
956      * @hide
957      */
958     public static final String ACTION_SHOW_DEVICE_MONITORING_DIALOG
959             = "android.app.action.SHOW_DEVICE_MONITORING_DIALOG";
960 
961     /**
962      * Flag used by {@link #addCrossProfileIntentFilter} to allow activities in
963      * the parent profile to access intents sent from the managed profile.
964      * That is, when an app in the managed profile calls
965      * {@link Activity#startActivity(Intent)}, the intent can be resolved by a
966      * matching activity in the parent profile.
967      */
968     public static final int FLAG_PARENT_CAN_ACCESS_MANAGED = 0x0001;
969 
970     /**
971      * Flag used by {@link #addCrossProfileIntentFilter} to allow activities in
972      * the managed profile to access intents sent from the parent profile.
973      * That is, when an app in the parent profile calls
974      * {@link Activity#startActivity(Intent)}, the intent can be resolved by a
975      * matching activity in the managed profile.
976      */
977     public static final int FLAG_MANAGED_CAN_ACCESS_PARENT = 0x0002;
978 
979     /**
980      * Broadcast action: notify that a new local system update policy has been set by the device
981      * owner. The new policy can be retrieved by {@link #getSystemUpdatePolicy()}.
982      */
983     @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
984     public static final String ACTION_SYSTEM_UPDATE_POLICY_CHANGED
985             = "android.app.action.SYSTEM_UPDATE_POLICY_CHANGED";
986 
987     /**
988      * Permission policy to prompt user for new permission requests for runtime permissions.
989      * Already granted or denied permissions are not affected by this.
990      */
991     public static final int PERMISSION_POLICY_PROMPT = 0;
992 
993     /**
994      * Permission policy to always grant new permission requests for runtime permissions.
995      * Already granted or denied permissions are not affected by this.
996      */
997     public static final int PERMISSION_POLICY_AUTO_GRANT = 1;
998 
999     /**
1000      * Permission policy to always deny new permission requests for runtime permissions.
1001      * Already granted or denied permissions are not affected by this.
1002      */
1003     public static final int PERMISSION_POLICY_AUTO_DENY = 2;
1004 
1005     /**
1006      * Runtime permission state: The user can manage the permission
1007      * through the UI.
1008      */
1009     public static final int PERMISSION_GRANT_STATE_DEFAULT = 0;
1010 
1011     /**
1012      * Runtime permission state: The permission is granted to the app
1013      * and the user cannot manage the permission through the UI.
1014      */
1015     public static final int PERMISSION_GRANT_STATE_GRANTED = 1;
1016 
1017     /**
1018      * Runtime permission state: The permission is denied to the app
1019      * and the user cannot manage the permission through the UI.
1020      */
1021     public static final int PERMISSION_GRANT_STATE_DENIED = 2;
1022 
1023     /**
1024      * No management for current user in-effect. This is the default.
1025      * @hide
1026      */
1027     @SystemApi
1028     public static final int STATE_USER_UNMANAGED = 0;
1029 
1030     /**
1031      * Management partially setup, user setup needs to be completed.
1032      * @hide
1033      */
1034     @SystemApi
1035     public static final int STATE_USER_SETUP_INCOMPLETE = 1;
1036 
1037     /**
1038      * Management partially setup, user setup completed.
1039      * @hide
1040      */
1041     @SystemApi
1042     public static final int STATE_USER_SETUP_COMPLETE = 2;
1043 
1044     /**
1045      * Management setup and active on current user.
1046      * @hide
1047      */
1048     @SystemApi
1049     public static final int STATE_USER_SETUP_FINALIZED = 3;
1050 
1051     /**
1052      * Management partially setup on a managed profile.
1053      * @hide
1054      */
1055     @SystemApi
1056     public static final int STATE_USER_PROFILE_COMPLETE = 4;
1057 
1058     /**
1059      * @hide
1060      */
1061     @IntDef({STATE_USER_UNMANAGED, STATE_USER_SETUP_INCOMPLETE, STATE_USER_SETUP_COMPLETE,
1062             STATE_USER_SETUP_FINALIZED, STATE_USER_PROFILE_COMPLETE})
1063     @Retention(RetentionPolicy.SOURCE)
1064     public @interface UserProvisioningState {}
1065 
1066     /**
1067      * Return true if the given administrator component is currently active (enabled) in the system.
1068      *
1069      * @param admin The administrator component to check for.
1070      * @return {@code true} if {@code admin} is currently enabled in the system, {@code false}
1071      *         otherwise
1072      */
isAdminActive(@onNull ComponentName admin)1073     public boolean isAdminActive(@NonNull ComponentName admin) {
1074         return isAdminActiveAsUser(admin, myUserId());
1075     }
1076 
1077     /**
1078      * @see #isAdminActive(ComponentName)
1079      * @hide
1080      */
isAdminActiveAsUser(@onNull ComponentName admin, int userId)1081     public boolean isAdminActiveAsUser(@NonNull ComponentName admin, int userId) {
1082         if (mService != null) {
1083             try {
1084                 return mService.isAdminActive(admin, userId);
1085             } catch (RemoteException e) {
1086                 throw e.rethrowFromSystemServer();
1087             }
1088         }
1089         return false;
1090     }
1091     /**
1092      * Return true if the given administrator component is currently being removed
1093      * for the user.
1094      * @hide
1095      */
isRemovingAdmin(@onNull ComponentName admin, int userId)1096     public boolean isRemovingAdmin(@NonNull ComponentName admin, int userId) {
1097         if (mService != null) {
1098             try {
1099                 return mService.isRemovingAdmin(admin, userId);
1100             } catch (RemoteException e) {
1101                 throw e.rethrowFromSystemServer();
1102             }
1103         }
1104         return false;
1105     }
1106 
1107 
1108     /**
1109      * Return a list of all currently active device administrators' component
1110      * names.  If there are no administrators {@code null} may be
1111      * returned.
1112      */
getActiveAdmins()1113     public List<ComponentName> getActiveAdmins() {
1114         throwIfParentInstance("getActiveAdmins");
1115         return getActiveAdminsAsUser(myUserId());
1116     }
1117 
1118     /**
1119      * @see #getActiveAdmins()
1120      * @hide
1121      */
getActiveAdminsAsUser(int userId)1122     public List<ComponentName> getActiveAdminsAsUser(int userId) {
1123         if (mService != null) {
1124             try {
1125                 return mService.getActiveAdmins(userId);
1126             } catch (RemoteException e) {
1127                 throw e.rethrowFromSystemServer();
1128             }
1129         }
1130         return null;
1131     }
1132 
1133     /**
1134      * Used by package administration code to determine if a package can be stopped
1135      * or uninstalled.
1136      * @hide
1137      */
packageHasActiveAdmins(String packageName)1138     public boolean packageHasActiveAdmins(String packageName) {
1139         return packageHasActiveAdmins(packageName, myUserId());
1140     }
1141 
1142     /**
1143      * Used by package administration code to determine if a package can be stopped
1144      * or uninstalled.
1145      * @hide
1146      */
packageHasActiveAdmins(String packageName, int userId)1147     public boolean packageHasActiveAdmins(String packageName, int userId) {
1148         if (mService != null) {
1149             try {
1150                 return mService.packageHasActiveAdmins(packageName, userId);
1151             } catch (RemoteException e) {
1152                 throw e.rethrowFromSystemServer();
1153             }
1154         }
1155         return false;
1156     }
1157 
1158     /**
1159      * Remove a current administration component.  This can only be called
1160      * by the application that owns the administration component; if you
1161      * try to remove someone else's component, a security exception will be
1162      * thrown.
1163      *
1164      * <p>Note that the operation is not synchronous and the admin might still be active (as
1165      * indicated by {@link #getActiveAdmins()}) by the time this method returns.
1166      *
1167      * @param admin The administration compononent to remove.
1168      * @throws SecurityException if the caller is not in the owner application of {@code admin}.
1169      */
removeActiveAdmin(@onNull ComponentName admin)1170     public void removeActiveAdmin(@NonNull ComponentName admin) {
1171         throwIfParentInstance("removeActiveAdmin");
1172         if (mService != null) {
1173             try {
1174                 mService.removeActiveAdmin(admin, myUserId());
1175             } catch (RemoteException e) {
1176                 throw e.rethrowFromSystemServer();
1177             }
1178         }
1179     }
1180 
1181     /**
1182      * Returns true if an administrator has been granted a particular device policy. This can be
1183      * used to check whether the administrator was activated under an earlier set of policies, but
1184      * requires additional policies after an upgrade.
1185      *
1186      * @param admin Which {@link DeviceAdminReceiver} this request is associated with. Must be an
1187      *            active administrator, or an exception will be thrown.
1188      * @param usesPolicy Which uses-policy to check, as defined in {@link DeviceAdminInfo}.
1189      * @throws SecurityException if {@code admin} is not an active administrator.
1190      */
hasGrantedPolicy(@onNull ComponentName admin, int usesPolicy)1191     public boolean hasGrantedPolicy(@NonNull ComponentName admin, int usesPolicy) {
1192         throwIfParentInstance("hasGrantedPolicy");
1193         if (mService != null) {
1194             try {
1195                 return mService.hasGrantedPolicy(admin, usesPolicy, myUserId());
1196             } catch (RemoteException e) {
1197                 throw e.rethrowFromSystemServer();
1198             }
1199         }
1200         return false;
1201     }
1202 
1203     /**
1204      * Returns true if the Profile Challenge is available to use for the given profile user.
1205      *
1206      * @hide
1207      */
isSeparateProfileChallengeAllowed(int userHandle)1208     public boolean isSeparateProfileChallengeAllowed(int userHandle) {
1209         if (mService != null) {
1210             try {
1211                 return mService.isSeparateProfileChallengeAllowed(userHandle);
1212             } catch (RemoteException e) {
1213                 throw e.rethrowFromSystemServer();
1214             }
1215         }
1216         return false;
1217     }
1218 
1219     /**
1220      * Constant for {@link #setPasswordQuality}: the policy has no requirements
1221      * for the password.  Note that quality constants are ordered so that higher
1222      * values are more restrictive.
1223      */
1224     public static final int PASSWORD_QUALITY_UNSPECIFIED = 0;
1225 
1226     /**
1227      * Constant for {@link #setPasswordQuality}: the policy allows for low-security biometric
1228      * recognition technology.  This implies technologies that can recognize the identity of
1229      * an individual to about a 3 digit PIN (false detection is less than 1 in 1,000).
1230      * Note that quality constants are ordered so that higher values are more restrictive.
1231      */
1232     public static final int PASSWORD_QUALITY_BIOMETRIC_WEAK = 0x8000;
1233 
1234     /**
1235      * Constant for {@link #setPasswordQuality}: the policy requires some kind
1236      * of password or pattern, but doesn't care what it is. Note that quality constants
1237      * are ordered so that higher values are more restrictive.
1238      */
1239     public static final int PASSWORD_QUALITY_SOMETHING = 0x10000;
1240 
1241     /**
1242      * Constant for {@link #setPasswordQuality}: the user must have entered a
1243      * password containing at least numeric characters.  Note that quality
1244      * constants are ordered so that higher values are more restrictive.
1245      */
1246     public static final int PASSWORD_QUALITY_NUMERIC = 0x20000;
1247 
1248     /**
1249      * Constant for {@link #setPasswordQuality}: the user must have entered a
1250      * password containing at least numeric characters with no repeating (4444)
1251      * or ordered (1234, 4321, 2468) sequences.  Note that quality
1252      * constants are ordered so that higher values are more restrictive.
1253      */
1254     public static final int PASSWORD_QUALITY_NUMERIC_COMPLEX = 0x30000;
1255 
1256     /**
1257      * Constant for {@link #setPasswordQuality}: the user must have entered a
1258      * password containing at least alphabetic (or other symbol) characters.
1259      * Note that quality constants are ordered so that higher values are more
1260      * restrictive.
1261      */
1262     public static final int PASSWORD_QUALITY_ALPHABETIC = 0x40000;
1263 
1264     /**
1265      * Constant for {@link #setPasswordQuality}: the user must have entered a
1266      * password containing at least <em>both></em> numeric <em>and</em>
1267      * alphabetic (or other symbol) characters.  Note that quality constants are
1268      * ordered so that higher values are more restrictive.
1269      */
1270     public static final int PASSWORD_QUALITY_ALPHANUMERIC = 0x50000;
1271 
1272     /**
1273      * Constant for {@link #setPasswordQuality}: the user must have entered a
1274      * password containing at least a letter, a numerical digit and a special
1275      * symbol, by default. With this password quality, passwords can be
1276      * restricted to contain various sets of characters, like at least an
1277      * uppercase letter, etc. These are specified using various methods,
1278      * like {@link #setPasswordMinimumLowerCase(ComponentName, int)}. Note
1279      * that quality constants are ordered so that higher values are more
1280      * restrictive.
1281      */
1282     public static final int PASSWORD_QUALITY_COMPLEX = 0x60000;
1283 
1284     /**
1285      * Constant for {@link #setPasswordQuality}: the user is not allowed to
1286      * modify password. In case this password quality is set, the password is
1287      * managed by a profile owner. The profile owner can set any password,
1288      * as if {@link #PASSWORD_QUALITY_UNSPECIFIED} is used. Note
1289      * that quality constants are ordered so that higher values are more
1290      * restrictive. The value of {@link #PASSWORD_QUALITY_MANAGED} is
1291      * the highest.
1292      * @hide
1293      */
1294     public static final int PASSWORD_QUALITY_MANAGED = 0x80000;
1295 
1296     /**
1297      * @hide
1298      *
1299      * adb shell dpm set-{device,profile}-owner will normally not allow installing an owner to
1300      * a user with accounts.  {@link #ACCOUNT_FEATURE_DEVICE_OR_PROFILE_OWNER_ALLOWED}
1301      * and {@link #ACCOUNT_FEATURE_DEVICE_OR_PROFILE_OWNER_DISALLOWED} are the account features
1302      * used by authenticator to exempt their accounts from this:
1303      *
1304      * <ul>
1305      *     <li>Non-test-only DO/PO still can't be installed when there are accounts.
1306      *     <p>In order to make an apk test-only, add android:testOnly="true" to the
1307      *     &lt;application&gt; tag in the manifest.
1308      *
1309      *     <li>Test-only DO/PO can be installed even when there are accounts, as long as all the
1310      *     accounts have the {@link #ACCOUNT_FEATURE_DEVICE_OR_PROFILE_OWNER_ALLOWED} feature.
1311      *     Some authenticators claim to have any features, so to detect it, we also check
1312      *     {@link #ACCOUNT_FEATURE_DEVICE_OR_PROFILE_OWNER_DISALLOWED} and disallow installing
1313      *     if any of the accounts have it.
1314      * </ul>
1315      */
1316     public static final String ACCOUNT_FEATURE_DEVICE_OR_PROFILE_OWNER_ALLOWED =
1317             "android.account.DEVICE_OR_PROFILE_OWNER_ALLOWED";
1318 
1319     /** @hide See {@link #ACCOUNT_FEATURE_DEVICE_OR_PROFILE_OWNER_ALLOWED} */
1320     public static final String ACCOUNT_FEATURE_DEVICE_OR_PROFILE_OWNER_DISALLOWED =
1321             "android.account.DEVICE_OR_PROFILE_OWNER_DISALLOWED";
1322 
1323     /**
1324      * Called by an application that is administering the device to set the password restrictions it
1325      * is imposing. After setting this, the user will not be able to enter a new password that is
1326      * not at least as restrictive as what has been set. Note that the current password will remain
1327      * until the user has set a new one, so the change does not take place immediately. To prompt
1328      * the user for a new password, use {@link #ACTION_SET_NEW_PASSWORD} or
1329      * {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after calling this method.
1330      * <p>
1331      * Quality constants are ordered so that higher values are more restrictive; thus the highest
1332      * requested quality constant (between the policy set here, the user's preference, and any other
1333      * considerations) is the one that is in effect.
1334      * <p>
1335      * The calling device admin must have requested
1336      * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has
1337      * not, a security exception will be thrown.
1338      * <p>
1339      * This method can be called on the {@link DevicePolicyManager} instance returned by
1340      * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent
1341      * profile.
1342      *
1343      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
1344      * @param quality The new desired quality. One of {@link #PASSWORD_QUALITY_UNSPECIFIED},
1345      *            {@link #PASSWORD_QUALITY_SOMETHING}, {@link #PASSWORD_QUALITY_NUMERIC},
1346      *            {@link #PASSWORD_QUALITY_NUMERIC_COMPLEX}, {@link #PASSWORD_QUALITY_ALPHABETIC},
1347      *            {@link #PASSWORD_QUALITY_ALPHANUMERIC} or {@link #PASSWORD_QUALITY_COMPLEX}.
1348      * @throws SecurityException if {@code admin} is not an active administrator or if {@code admin}
1349      *             does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD}
1350      */
setPasswordQuality(@onNull ComponentName admin, int quality)1351     public void setPasswordQuality(@NonNull ComponentName admin, int quality) {
1352         if (mService != null) {
1353             try {
1354                 mService.setPasswordQuality(admin, quality, mParentInstance);
1355             } catch (RemoteException e) {
1356                 throw e.rethrowFromSystemServer();
1357             }
1358         }
1359     }
1360 
1361     /**
1362      * Retrieve the current minimum password quality for a particular admin or all admins that set
1363      * restrictions on this user and its participating profiles. Restrictions on profiles that have
1364      * a separate challenge are not taken into account.
1365      *
1366      * <p>This method can be called on the {@link DevicePolicyManager} instance
1367      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
1368      * restrictions on the parent profile.
1369      *
1370      * @param admin The name of the admin component to check, or {@code null} to aggregate
1371      * all admins.
1372      */
getPasswordQuality(@ullable ComponentName admin)1373     public int getPasswordQuality(@Nullable ComponentName admin) {
1374         return getPasswordQuality(admin, myUserId());
1375     }
1376 
1377     /** @hide per-user version */
getPasswordQuality(@ullable ComponentName admin, int userHandle)1378     public int getPasswordQuality(@Nullable ComponentName admin, int userHandle) {
1379         if (mService != null) {
1380             try {
1381                 return mService.getPasswordQuality(admin, userHandle, mParentInstance);
1382             } catch (RemoteException e) {
1383                 throw e.rethrowFromSystemServer();
1384             }
1385         }
1386         return PASSWORD_QUALITY_UNSPECIFIED;
1387     }
1388 
1389     /**
1390      * Called by an application that is administering the device to set the minimum allowed password
1391      * length. After setting this, the user will not be able to enter a new password that is not at
1392      * least as restrictive as what has been set. Note that the current password will remain until
1393      * the user has set a new one, so the change does not take place immediately. To prompt the user
1394      * for a new password, use {@link #ACTION_SET_NEW_PASSWORD} or
1395      * {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after setting this value. This constraint is
1396      * only imposed if the administrator has also requested either {@link #PASSWORD_QUALITY_NUMERIC}
1397      * , {@link #PASSWORD_QUALITY_NUMERIC_COMPLEX}, {@link #PASSWORD_QUALITY_ALPHABETIC},
1398      * {@link #PASSWORD_QUALITY_ALPHANUMERIC}, or {@link #PASSWORD_QUALITY_COMPLEX} with
1399      * {@link #setPasswordQuality}.
1400      * <p>
1401      * The calling device admin must have requested
1402      * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has
1403      * not, a security exception will be thrown.
1404      * <p>
1405      * This method can be called on the {@link DevicePolicyManager} instance returned by
1406      * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent
1407      * profile.
1408      *
1409      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
1410      * @param length The new desired minimum password length. A value of 0 means there is no
1411      *            restriction.
1412      * @throws SecurityException if {@code admin} is not an active administrator or {@code admin}
1413      *             does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD}
1414      */
setPasswordMinimumLength(@onNull ComponentName admin, int length)1415     public void setPasswordMinimumLength(@NonNull ComponentName admin, int length) {
1416         if (mService != null) {
1417             try {
1418                 mService.setPasswordMinimumLength(admin, length, mParentInstance);
1419             } catch (RemoteException e) {
1420                 throw e.rethrowFromSystemServer();
1421             }
1422         }
1423     }
1424 
1425     /**
1426      * Retrieve the current minimum password length for a particular admin or all admins that set
1427      * restrictions on this user and its participating profiles. Restrictions on profiles that have
1428      * a separate challenge are not taken into account.
1429      *
1430      * <p>This method can be called on the {@link DevicePolicyManager} instance
1431      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
1432      * restrictions on the parent profile.
1433      *
1434      * user and its profiles or a particular one.
1435      * @param admin The name of the admin component to check, or {@code null} to aggregate
1436      * all admins.
1437      */
getPasswordMinimumLength(@ullable ComponentName admin)1438     public int getPasswordMinimumLength(@Nullable ComponentName admin) {
1439         return getPasswordMinimumLength(admin, myUserId());
1440     }
1441 
1442     /** @hide per-user version */
getPasswordMinimumLength(@ullable ComponentName admin, int userHandle)1443     public int getPasswordMinimumLength(@Nullable ComponentName admin, int userHandle) {
1444         if (mService != null) {
1445             try {
1446                 return mService.getPasswordMinimumLength(admin, userHandle, mParentInstance);
1447             } catch (RemoteException e) {
1448                 throw e.rethrowFromSystemServer();
1449             }
1450         }
1451         return 0;
1452     }
1453 
1454     /**
1455      * Called by an application that is administering the device to set the minimum number of upper
1456      * case letters required in the password. After setting this, the user will not be able to enter
1457      * a new password that is not at least as restrictive as what has been set. Note that the
1458      * current password will remain until the user has set a new one, so the change does not take
1459      * place immediately. To prompt the user for a new password, use
1460      * {@link #ACTION_SET_NEW_PASSWORD} or {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after
1461      * setting this value. This constraint is only imposed if the administrator has also requested
1462      * {@link #PASSWORD_QUALITY_COMPLEX} with {@link #setPasswordQuality}. The default value is 0.
1463      * <p>
1464      * The calling device admin must have requested
1465      * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has
1466      * not, a security exception will be thrown.
1467      * <p>
1468      * This method can be called on the {@link DevicePolicyManager} instance returned by
1469      * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent
1470      * profile.
1471      *
1472      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
1473      * @param length The new desired minimum number of upper case letters required in the password.
1474      *            A value of 0 means there is no restriction.
1475      * @throws SecurityException if {@code admin} is not an active administrator or {@code admin}
1476      *             does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD}
1477      */
setPasswordMinimumUpperCase(@onNull ComponentName admin, int length)1478     public void setPasswordMinimumUpperCase(@NonNull ComponentName admin, int length) {
1479         if (mService != null) {
1480             try {
1481                 mService.setPasswordMinimumUpperCase(admin, length, mParentInstance);
1482             } catch (RemoteException e) {
1483                 throw e.rethrowFromSystemServer();
1484             }
1485         }
1486     }
1487 
1488     /**
1489      * Retrieve the current number of upper case letters required in the password
1490      * for a particular admin or all admins that set restrictions on this user and
1491      * its participating profiles. Restrictions on profiles that have a separate challenge
1492      * are not taken into account.
1493      * This is the same value as set by
1494      * {@link #setPasswordMinimumUpperCase(ComponentName, int)}
1495      * and only applies when the password quality is
1496      * {@link #PASSWORD_QUALITY_COMPLEX}.
1497      *
1498      * <p>This method can be called on the {@link DevicePolicyManager} instance
1499      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
1500      * restrictions on the parent profile.
1501      *
1502      * @param admin The name of the admin component to check, or {@code null} to
1503      *            aggregate all admins.
1504      * @return The minimum number of upper case letters required in the
1505      *         password.
1506      */
getPasswordMinimumUpperCase(@ullable ComponentName admin)1507     public int getPasswordMinimumUpperCase(@Nullable ComponentName admin) {
1508         return getPasswordMinimumUpperCase(admin, myUserId());
1509     }
1510 
1511     /** @hide per-user version */
getPasswordMinimumUpperCase(@ullable ComponentName admin, int userHandle)1512     public int getPasswordMinimumUpperCase(@Nullable ComponentName admin, int userHandle) {
1513         if (mService != null) {
1514             try {
1515                 return mService.getPasswordMinimumUpperCase(admin, userHandle, mParentInstance);
1516             } catch (RemoteException e) {
1517                 throw e.rethrowFromSystemServer();
1518             }
1519         }
1520         return 0;
1521     }
1522 
1523     /**
1524      * Called by an application that is administering the device to set the minimum number of lower
1525      * case letters required in the password. After setting this, the user will not be able to enter
1526      * a new password that is not at least as restrictive as what has been set. Note that the
1527      * current password will remain until the user has set a new one, so the change does not take
1528      * place immediately. To prompt the user for a new password, use
1529      * {@link #ACTION_SET_NEW_PASSWORD} or {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after
1530      * setting this value. This constraint is only imposed if the administrator has also requested
1531      * {@link #PASSWORD_QUALITY_COMPLEX} with {@link #setPasswordQuality}. The default value is 0.
1532      * <p>
1533      * The calling device admin must have requested
1534      * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has
1535      * not, a security exception will be thrown.
1536      * <p>
1537      * This method can be called on the {@link DevicePolicyManager} instance returned by
1538      * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent
1539      * profile.
1540      *
1541      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
1542      * @param length The new desired minimum number of lower case letters required in the password.
1543      *            A value of 0 means there is no restriction.
1544      * @throws SecurityException if {@code admin} is not an active administrator or {@code admin}
1545      *             does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD}
1546      */
setPasswordMinimumLowerCase(@onNull ComponentName admin, int length)1547     public void setPasswordMinimumLowerCase(@NonNull ComponentName admin, int length) {
1548         if (mService != null) {
1549             try {
1550                 mService.setPasswordMinimumLowerCase(admin, length, mParentInstance);
1551             } catch (RemoteException e) {
1552                 throw e.rethrowFromSystemServer();
1553             }
1554         }
1555     }
1556 
1557     /**
1558      * Retrieve the current number of lower case letters required in the password
1559      * for a particular admin or all admins that set restrictions on this user
1560      * and its participating profiles. Restrictions on profiles that have
1561      * a separate challenge are not taken into account.
1562      * This is the same value as set by
1563      * {@link #setPasswordMinimumLowerCase(ComponentName, int)}
1564      * and only applies when the password quality is
1565      * {@link #PASSWORD_QUALITY_COMPLEX}.
1566      *
1567      * <p>This method can be called on the {@link DevicePolicyManager} instance
1568      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
1569      * restrictions on the parent profile.
1570      *
1571      * @param admin The name of the admin component to check, or {@code null} to
1572      *            aggregate all admins.
1573      * @return The minimum number of lower case letters required in the
1574      *         password.
1575      */
getPasswordMinimumLowerCase(@ullable ComponentName admin)1576     public int getPasswordMinimumLowerCase(@Nullable ComponentName admin) {
1577         return getPasswordMinimumLowerCase(admin, myUserId());
1578     }
1579 
1580     /** @hide per-user version */
getPasswordMinimumLowerCase(@ullable ComponentName admin, int userHandle)1581     public int getPasswordMinimumLowerCase(@Nullable ComponentName admin, int userHandle) {
1582         if (mService != null) {
1583             try {
1584                 return mService.getPasswordMinimumLowerCase(admin, userHandle, mParentInstance);
1585             } catch (RemoteException e) {
1586                 throw e.rethrowFromSystemServer();
1587             }
1588         }
1589         return 0;
1590     }
1591 
1592     /**
1593      * Called by an application that is administering the device to set the minimum number of
1594      * letters required in the password. After setting this, the user will not be able to enter a
1595      * new password that is not at least as restrictive as what has been set. Note that the current
1596      * password will remain until the user has set a new one, so the change does not take place
1597      * immediately. To prompt the user for a new password, use {@link #ACTION_SET_NEW_PASSWORD} or
1598      * {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after setting this value. This constraint is
1599      * only imposed if the administrator has also requested {@link #PASSWORD_QUALITY_COMPLEX} with
1600      * {@link #setPasswordQuality}. The default value is 1.
1601      * <p>
1602      * The calling device admin must have requested
1603      * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has
1604      * not, a security exception will be thrown.
1605      * <p>
1606      * This method can be called on the {@link DevicePolicyManager} instance returned by
1607      * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent
1608      * profile.
1609      *
1610      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
1611      * @param length The new desired minimum number of letters required in the password. A value of
1612      *            0 means there is no restriction.
1613      * @throws SecurityException if {@code admin} is not an active administrator or {@code admin}
1614      *             does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD}
1615      */
setPasswordMinimumLetters(@onNull ComponentName admin, int length)1616     public void setPasswordMinimumLetters(@NonNull ComponentName admin, int length) {
1617         if (mService != null) {
1618             try {
1619                 mService.setPasswordMinimumLetters(admin, length, mParentInstance);
1620             } catch (RemoteException e) {
1621                 throw e.rethrowFromSystemServer();
1622             }
1623         }
1624     }
1625 
1626     /**
1627      * Retrieve the current number of letters required in the password
1628      * for a particular admin or all admins that set restrictions on this user
1629      * and its participating profiles. Restrictions on profiles that have
1630      * a separate challenge are not taken into account.
1631      * This is the same value as set by
1632      * {@link #setPasswordMinimumLetters(ComponentName, int)}
1633      * and only applies when the password quality is
1634      * {@link #PASSWORD_QUALITY_COMPLEX}.
1635      *
1636      * <p>This method can be called on the {@link DevicePolicyManager} instance
1637      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
1638      * restrictions on the parent profile.
1639      *
1640      * @param admin The name of the admin component to check, or {@code null} to
1641      *            aggregate all admins.
1642      * @return The minimum number of letters required in the password.
1643      */
getPasswordMinimumLetters(@ullable ComponentName admin)1644     public int getPasswordMinimumLetters(@Nullable ComponentName admin) {
1645         return getPasswordMinimumLetters(admin, myUserId());
1646     }
1647 
1648     /** @hide per-user version */
getPasswordMinimumLetters(@ullable ComponentName admin, int userHandle)1649     public int getPasswordMinimumLetters(@Nullable ComponentName admin, int userHandle) {
1650         if (mService != null) {
1651             try {
1652                 return mService.getPasswordMinimumLetters(admin, userHandle, mParentInstance);
1653             } catch (RemoteException e) {
1654                 throw e.rethrowFromSystemServer();
1655             }
1656         }
1657         return 0;
1658     }
1659 
1660     /**
1661      * Called by an application that is administering the device to set the minimum number of
1662      * numerical digits required in the password. After setting this, the user will not be able to
1663      * enter a new password that is not at least as restrictive as what has been set. Note that the
1664      * current password will remain until the user has set a new one, so the change does not take
1665      * place immediately. To prompt the user for a new password, use
1666      * {@link #ACTION_SET_NEW_PASSWORD} or {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after
1667      * setting this value. This constraint is only imposed if the administrator has also requested
1668      * {@link #PASSWORD_QUALITY_COMPLEX} with {@link #setPasswordQuality}. The default value is 1.
1669      * <p>
1670      * The calling device admin must have requested
1671      * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has
1672      * not, a security exception will be thrown.
1673      * <p>
1674      * This method can be called on the {@link DevicePolicyManager} instance returned by
1675      * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent
1676      * profile.
1677      *
1678      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
1679      * @param length The new desired minimum number of numerical digits required in the password. A
1680      *            value of 0 means there is no restriction.
1681      * @throws SecurityException if {@code admin} is not an active administrator or {@code admin}
1682      *             does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD}
1683      */
setPasswordMinimumNumeric(@onNull ComponentName admin, int length)1684     public void setPasswordMinimumNumeric(@NonNull ComponentName admin, int length) {
1685         if (mService != null) {
1686             try {
1687                 mService.setPasswordMinimumNumeric(admin, length, mParentInstance);
1688             } catch (RemoteException e) {
1689                 throw e.rethrowFromSystemServer();
1690             }
1691         }
1692     }
1693 
1694     /**
1695      * Retrieve the current number of numerical digits required in the password
1696      * for a particular admin or all admins that set restrictions on this user
1697      * and its participating profiles. Restrictions on profiles that have
1698      * a separate challenge are not taken into account.
1699      * This is the same value as set by
1700      * {@link #setPasswordMinimumNumeric(ComponentName, int)}
1701      * and only applies when the password quality is
1702      * {@link #PASSWORD_QUALITY_COMPLEX}.
1703      *
1704      * <p>This method can be called on the {@link DevicePolicyManager} instance
1705      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
1706      * restrictions on the parent profile.
1707      *
1708      * @param admin The name of the admin component to check, or {@code null} to
1709      *            aggregate all admins.
1710      * @return The minimum number of numerical digits required in the password.
1711      */
getPasswordMinimumNumeric(@ullable ComponentName admin)1712     public int getPasswordMinimumNumeric(@Nullable ComponentName admin) {
1713         return getPasswordMinimumNumeric(admin, myUserId());
1714     }
1715 
1716     /** @hide per-user version */
getPasswordMinimumNumeric(@ullable ComponentName admin, int userHandle)1717     public int getPasswordMinimumNumeric(@Nullable ComponentName admin, int userHandle) {
1718         if (mService != null) {
1719             try {
1720                 return mService.getPasswordMinimumNumeric(admin, userHandle, mParentInstance);
1721             } catch (RemoteException e) {
1722                 throw e.rethrowFromSystemServer();
1723             }
1724         }
1725         return 0;
1726     }
1727 
1728     /**
1729      * Called by an application that is administering the device to set the minimum number of
1730      * symbols required in the password. After setting this, the user will not be able to enter a
1731      * new password that is not at least as restrictive as what has been set. Note that the current
1732      * password will remain until the user has set a new one, so the change does not take place
1733      * immediately. To prompt the user for a new password, use {@link #ACTION_SET_NEW_PASSWORD} or
1734      * {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after setting this value. This constraint is
1735      * only imposed if the administrator has also requested {@link #PASSWORD_QUALITY_COMPLEX} with
1736      * {@link #setPasswordQuality}. The default value is 1.
1737      * <p>
1738      * The calling device admin must have requested
1739      * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has
1740      * not, a security exception will be thrown.
1741      * <p>
1742      * This method can be called on the {@link DevicePolicyManager} instance returned by
1743      * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent
1744      * profile.
1745      *
1746      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
1747      * @param length The new desired minimum number of symbols required in the password. A value of
1748      *            0 means there is no restriction.
1749      * @throws SecurityException if {@code admin} is not an active administrator or {@code admin}
1750      *             does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD}
1751      */
setPasswordMinimumSymbols(@onNull ComponentName admin, int length)1752     public void setPasswordMinimumSymbols(@NonNull ComponentName admin, int length) {
1753         if (mService != null) {
1754             try {
1755                 mService.setPasswordMinimumSymbols(admin, length, mParentInstance);
1756             } catch (RemoteException e) {
1757                 throw e.rethrowFromSystemServer();
1758             }
1759         }
1760     }
1761 
1762     /**
1763      * Retrieve the current number of symbols required in the password
1764      * for a particular admin or all admins that set restrictions on this user
1765      * and its participating profiles. Restrictions on profiles that have
1766      * a separate challenge are not taken into account. This is the same value as
1767      * set by {@link #setPasswordMinimumSymbols(ComponentName, int)}
1768      * and only applies when the password quality is
1769      * {@link #PASSWORD_QUALITY_COMPLEX}.
1770      *
1771      * <p>This method can be called on the {@link DevicePolicyManager} instance
1772      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
1773      * restrictions on the parent profile.
1774      *
1775      * @param admin The name of the admin component to check, or {@code null} to
1776      *            aggregate all admins.
1777      * @return The minimum number of symbols required in the password.
1778      */
getPasswordMinimumSymbols(@ullable ComponentName admin)1779     public int getPasswordMinimumSymbols(@Nullable ComponentName admin) {
1780         return getPasswordMinimumSymbols(admin, myUserId());
1781     }
1782 
1783     /** @hide per-user version */
getPasswordMinimumSymbols(@ullable ComponentName admin, int userHandle)1784     public int getPasswordMinimumSymbols(@Nullable ComponentName admin, int userHandle) {
1785         if (mService != null) {
1786             try {
1787                 return mService.getPasswordMinimumSymbols(admin, userHandle, mParentInstance);
1788             } catch (RemoteException e) {
1789                 throw e.rethrowFromSystemServer();
1790             }
1791         }
1792         return 0;
1793     }
1794 
1795     /**
1796      * Called by an application that is administering the device to set the minimum number of
1797      * non-letter characters (numerical digits or symbols) required in the password. After setting
1798      * this, the user will not be able to enter a new password that is not at least as restrictive
1799      * as what has been set. Note that the current password will remain until the user has set a new
1800      * one, so the change does not take place immediately. To prompt the user for a new password,
1801      * use {@link #ACTION_SET_NEW_PASSWORD} or {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after
1802      * setting this value. This constraint is only imposed if the administrator has also requested
1803      * {@link #PASSWORD_QUALITY_COMPLEX} with {@link #setPasswordQuality}. The default value is 0.
1804      * <p>
1805      * The calling device admin must have requested
1806      * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has
1807      * not, a security exception will be thrown.
1808      * <p>
1809      * This method can be called on the {@link DevicePolicyManager} instance returned by
1810      * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent
1811      * profile.
1812      *
1813      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
1814      * @param length The new desired minimum number of letters required in the password. A value of
1815      *            0 means there is no restriction.
1816      * @throws SecurityException if {@code admin} is not an active administrator or {@code admin}
1817      *             does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD}
1818      */
setPasswordMinimumNonLetter(@onNull ComponentName admin, int length)1819     public void setPasswordMinimumNonLetter(@NonNull ComponentName admin, int length) {
1820         if (mService != null) {
1821             try {
1822                 mService.setPasswordMinimumNonLetter(admin, length, mParentInstance);
1823             } catch (RemoteException e) {
1824                 throw e.rethrowFromSystemServer();
1825             }
1826         }
1827     }
1828 
1829     /**
1830      * Retrieve the current number of non-letter characters required in the password
1831      * for a particular admin or all admins that set restrictions on this user
1832      * and its participating profiles. Restrictions on profiles that have
1833      * a separate challenge are not taken into account.
1834      * This is the same value as set by
1835      * {@link #setPasswordMinimumNonLetter(ComponentName, int)}
1836      * and only applies when the password quality is
1837      * {@link #PASSWORD_QUALITY_COMPLEX}.
1838      *
1839      * <p>This method can be called on the {@link DevicePolicyManager} instance
1840      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
1841      * restrictions on the parent profile.
1842      *
1843      * @param admin The name of the admin component to check, or {@code null} to
1844      *            aggregate all admins.
1845      * @return The minimum number of letters required in the password.
1846      */
getPasswordMinimumNonLetter(@ullable ComponentName admin)1847     public int getPasswordMinimumNonLetter(@Nullable ComponentName admin) {
1848         return getPasswordMinimumNonLetter(admin, myUserId());
1849     }
1850 
1851     /** @hide per-user version */
getPasswordMinimumNonLetter(@ullable ComponentName admin, int userHandle)1852     public int getPasswordMinimumNonLetter(@Nullable ComponentName admin, int userHandle) {
1853         if (mService != null) {
1854             try {
1855                 return mService.getPasswordMinimumNonLetter(admin, userHandle, mParentInstance);
1856             } catch (RemoteException e) {
1857                 throw e.rethrowFromSystemServer();
1858             }
1859         }
1860         return 0;
1861     }
1862 
1863     /**
1864      * Called by an application that is administering the device to set the length of the password
1865      * history. After setting this, the user will not be able to enter a new password that is the
1866      * same as any password in the history. Note that the current password will remain until the
1867      * user has set a new one, so the change does not take place immediately. To prompt the user for
1868      * a new password, use {@link #ACTION_SET_NEW_PASSWORD} or
1869      * {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after setting this value. This constraint is
1870      * only imposed if the administrator has also requested either {@link #PASSWORD_QUALITY_NUMERIC}
1871      * , {@link #PASSWORD_QUALITY_NUMERIC_COMPLEX} {@link #PASSWORD_QUALITY_ALPHABETIC}, or
1872      * {@link #PASSWORD_QUALITY_ALPHANUMERIC} with {@link #setPasswordQuality}.
1873      * <p>
1874      * The calling device admin must have requested
1875      * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has
1876      * not, a security exception will be thrown.
1877      * <p>
1878      * This method can be called on the {@link DevicePolicyManager} instance returned by
1879      * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent
1880      * profile.
1881      *
1882      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
1883      * @param length The new desired length of password history. A value of 0 means there is no
1884      *            restriction.
1885      * @throws SecurityException if {@code admin} is not an active administrator or {@code admin}
1886      *             does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD}
1887      */
setPasswordHistoryLength(@onNull ComponentName admin, int length)1888     public void setPasswordHistoryLength(@NonNull ComponentName admin, int length) {
1889         if (mService != null) {
1890             try {
1891                 mService.setPasswordHistoryLength(admin, length, mParentInstance);
1892             } catch (RemoteException e) {
1893                 throw e.rethrowFromSystemServer();
1894             }
1895         }
1896     }
1897 
1898     /**
1899      * Called by a device admin to set the password expiration timeout. Calling this method will
1900      * restart the countdown for password expiration for the given admin, as will changing the
1901      * device password (for all admins).
1902      * <p>
1903      * The provided timeout is the time delta in ms and will be added to the current time. For
1904      * example, to have the password expire 5 days from now, timeout would be 5 * 86400 * 1000 =
1905      * 432000000 ms for timeout.
1906      * <p>
1907      * To disable password expiration, a value of 0 may be used for timeout.
1908      * <p>
1909      * The calling device admin must have requested
1910      * {@link DeviceAdminInfo#USES_POLICY_EXPIRE_PASSWORD} to be able to call this method; if it has
1911      * not, a security exception will be thrown.
1912      * <p>
1913      * Note that setting the password will automatically reset the expiration time for all active
1914      * admins. Active admins do not need to explicitly call this method in that case.
1915      * <p>
1916      * This method can be called on the {@link DevicePolicyManager} instance returned by
1917      * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent
1918      * profile.
1919      *
1920      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
1921      * @param timeout The limit (in ms) that a password can remain in effect. A value of 0 means
1922      *            there is no restriction (unlimited).
1923      * @throws SecurityException if {@code admin} is not an active administrator or {@code admin}
1924      *             does not use {@link DeviceAdminInfo#USES_POLICY_EXPIRE_PASSWORD}
1925      */
setPasswordExpirationTimeout(@onNull ComponentName admin, long timeout)1926     public void setPasswordExpirationTimeout(@NonNull ComponentName admin, long timeout) {
1927         if (mService != null) {
1928             try {
1929                 mService.setPasswordExpirationTimeout(admin, timeout, mParentInstance);
1930             } catch (RemoteException e) {
1931                 throw e.rethrowFromSystemServer();
1932             }
1933         }
1934     }
1935 
1936     /**
1937      * Get the password expiration timeout for the given admin. The expiration timeout is the
1938      * recurring expiration timeout provided in the call to
1939      * {@link #setPasswordExpirationTimeout(ComponentName, long)} for the given admin or the
1940      * aggregate of all participating policy administrators if {@code admin} is null. Admins that
1941      * have set restrictions on profiles that have a separate challenge are not taken into account.
1942      *
1943      * <p>This method can be called on the {@link DevicePolicyManager} instance
1944      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
1945      * restrictions on the parent profile.
1946      *
1947      * @param admin The name of the admin component to check, or {@code null} to aggregate all admins.
1948      * @return The timeout for the given admin or the minimum of all timeouts
1949      */
getPasswordExpirationTimeout(@ullable ComponentName admin)1950     public long getPasswordExpirationTimeout(@Nullable ComponentName admin) {
1951         if (mService != null) {
1952             try {
1953                 return mService.getPasswordExpirationTimeout(admin, myUserId(), mParentInstance);
1954             } catch (RemoteException e) {
1955                 throw e.rethrowFromSystemServer();
1956             }
1957         }
1958         return 0;
1959     }
1960 
1961     /**
1962      * Get the current password expiration time for a particular admin or all admins that set
1963      * restrictions on this user and its participating profiles. Restrictions on profiles that have
1964      * a separate challenge are not taken into account. If admin is {@code null}, then a composite
1965      * of all expiration times is returned - which will be the minimum of all of them.
1966      *
1967      * <p>This method can be called on the {@link DevicePolicyManager} instance
1968      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
1969      * the password expiration for the parent profile.
1970      *
1971      * @param admin The name of the admin component to check, or {@code null} to aggregate all admins.
1972      * @return The password expiration time, in milliseconds since epoch.
1973      */
getPasswordExpiration(@ullable ComponentName admin)1974     public long getPasswordExpiration(@Nullable ComponentName admin) {
1975         if (mService != null) {
1976             try {
1977                 return mService.getPasswordExpiration(admin, myUserId(), mParentInstance);
1978             } catch (RemoteException e) {
1979                 throw e.rethrowFromSystemServer();
1980             }
1981         }
1982         return 0;
1983     }
1984 
1985     /**
1986      * Retrieve the current password history length for a particular admin or all admins that
1987      * set restrictions on this user and its participating profiles. Restrictions on profiles that
1988      * have a separate challenge are not taken into account.
1989      *
1990      * <p>This method can be called on the {@link DevicePolicyManager} instance
1991      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
1992      * restrictions on the parent profile.
1993      *
1994      * @param admin The name of the admin component to check, or {@code null} to aggregate
1995      * all admins.
1996      * @return The length of the password history
1997      */
getPasswordHistoryLength(@ullable ComponentName admin)1998     public int getPasswordHistoryLength(@Nullable ComponentName admin) {
1999         return getPasswordHistoryLength(admin, myUserId());
2000     }
2001 
2002     /** @hide per-user version */
getPasswordHistoryLength(@ullable ComponentName admin, int userHandle)2003     public int getPasswordHistoryLength(@Nullable ComponentName admin, int userHandle) {
2004         if (mService != null) {
2005             try {
2006                 return mService.getPasswordHistoryLength(admin, userHandle, mParentInstance);
2007             } catch (RemoteException e) {
2008                 throw e.rethrowFromSystemServer();
2009             }
2010         }
2011         return 0;
2012     }
2013 
2014     /**
2015      * Return the maximum password length that the device supports for a
2016      * particular password quality.
2017      * @param quality The quality being interrogated.
2018      * @return Returns the maximum length that the user can enter.
2019      */
getPasswordMaximumLength(int quality)2020     public int getPasswordMaximumLength(int quality) {
2021         // Kind-of arbitrary.
2022         return 16;
2023     }
2024 
2025     /**
2026      * Determine whether the current password the user has set is sufficient to meet the policy
2027      * requirements (e.g. quality, minimum length) that have been requested by the admins of this
2028      * user and its participating profiles. Restrictions on profiles that have a separate challenge
2029      * are not taken into account. If the user has a password, it must have been entered in order to
2030      * perform this check.
2031      * <p>
2032      * The calling device admin must have requested
2033      * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has
2034      * not, a security exception will be thrown.
2035      * <p>
2036      * This method can be called on the {@link DevicePolicyManager} instance returned by
2037      * {@link #getParentProfileInstance(ComponentName)} in order to determine if the password set on
2038      * the parent profile is sufficient.
2039      *
2040      * @return Returns true if the password meets the current requirements, else false.
2041      * @throws SecurityException if the calling application does not own an active administrator
2042      *             that uses {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD}
2043      * @throws IllegalStateException if the user has a password but has not entered it yet.
2044      */
isActivePasswordSufficient()2045     public boolean isActivePasswordSufficient() {
2046         if (mService != null) {
2047             try {
2048                 return mService.isActivePasswordSufficient(myUserId(), mParentInstance);
2049             } catch (RemoteException e) {
2050                 throw e.rethrowFromSystemServer();
2051             }
2052         }
2053         return false;
2054     }
2055 
2056     /**
2057      * Determine whether the current profile password the user has set is sufficient
2058      * to meet the policy requirements (e.g. quality, minimum length) that have been
2059      * requested by the admins of the parent user and its profiles.
2060      *
2061      * @param userHandle the userId of the profile to check the password for.
2062      * @return Returns true if the password would meet the current requirements, else false.
2063      * @throws SecurityException if {@code userHandle} is not a managed profile.
2064      * @hide
2065      */
isProfileActivePasswordSufficientForParent(int userHandle)2066     public boolean isProfileActivePasswordSufficientForParent(int userHandle) {
2067         if (mService != null) {
2068             try {
2069                 return mService.isProfileActivePasswordSufficientForParent(userHandle);
2070             } catch (RemoteException e) {
2071                 throw e.rethrowFromSystemServer();
2072             }
2073         }
2074         return false;
2075     }
2076 
2077     /**
2078      * Retrieve the number of times the user has failed at entering a password since that last
2079      * successful password entry.
2080      * <p>
2081      * This method can be called on the {@link DevicePolicyManager} instance returned by
2082      * {@link #getParentProfileInstance(ComponentName)} in order to retrieve the number of failed
2083      * password attemts for the parent user.
2084      * <p>
2085      * The calling device admin must have requested {@link DeviceAdminInfo#USES_POLICY_WATCH_LOGIN}
2086      * to be able to call this method; if it has not, a security exception will be thrown.
2087      *
2088      * @return The number of times user has entered an incorrect password since the last correct
2089      *         password entry.
2090      * @throws SecurityException if the calling application does not own an active administrator
2091      *             that uses {@link DeviceAdminInfo#USES_POLICY_WATCH_LOGIN}
2092      */
getCurrentFailedPasswordAttempts()2093     public int getCurrentFailedPasswordAttempts() {
2094         return getCurrentFailedPasswordAttempts(myUserId());
2095     }
2096 
2097     /**
2098      * Retrieve the number of times the given user has failed at entering a
2099      * password since that last successful password entry.
2100      *
2101      * <p>The calling device admin must have requested
2102      * {@link DeviceAdminInfo#USES_POLICY_WATCH_LOGIN} to be able to call this method; if it has
2103      * not and it is not the system uid, a security exception will be thrown.
2104      *
2105      * @hide
2106      */
getCurrentFailedPasswordAttempts(int userHandle)2107     public int getCurrentFailedPasswordAttempts(int userHandle) {
2108         if (mService != null) {
2109             try {
2110                 return mService.getCurrentFailedPasswordAttempts(userHandle, mParentInstance);
2111             } catch (RemoteException e) {
2112                 throw e.rethrowFromSystemServer();
2113             }
2114         }
2115         return -1;
2116     }
2117 
2118     /**
2119      * Queries whether {@link #RESET_PASSWORD_DO_NOT_ASK_CREDENTIALS_ON_BOOT} flag is set.
2120      *
2121      * @return true if RESET_PASSWORD_DO_NOT_ASK_CREDENTIALS_ON_BOOT flag is set.
2122      * @hide
2123      */
getDoNotAskCredentialsOnBoot()2124     public boolean getDoNotAskCredentialsOnBoot() {
2125         if (mService != null) {
2126             try {
2127                 return mService.getDoNotAskCredentialsOnBoot();
2128             } catch (RemoteException e) {
2129                 throw e.rethrowFromSystemServer();
2130             }
2131         }
2132         return false;
2133     }
2134 
2135     /**
2136      * Setting this to a value greater than zero enables a built-in policy that will perform a
2137      * device or profile wipe after too many incorrect device-unlock passwords have been entered.
2138      * This built-in policy combines watching for failed passwords and wiping the device, and
2139      * requires that you request both {@link DeviceAdminInfo#USES_POLICY_WATCH_LOGIN} and
2140      * {@link DeviceAdminInfo#USES_POLICY_WIPE_DATA}}.
2141      * <p>
2142      * To implement any other policy (e.g. wiping data for a particular application only, erasing or
2143      * revoking credentials, or reporting the failure to a server), you should implement
2144      * {@link DeviceAdminReceiver#onPasswordFailed(Context, android.content.Intent)} instead. Do not
2145      * use this API, because if the maximum count is reached, the device or profile will be wiped
2146      * immediately, and your callback will not be invoked.
2147      * <p>
2148      * This method can be called on the {@link DevicePolicyManager} instance returned by
2149      * {@link #getParentProfileInstance(ComponentName)} in order to set a value on the parent
2150      * profile.
2151      *
2152      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
2153      * @param num The number of failed password attempts at which point the device or profile will
2154      *            be wiped.
2155      * @throws SecurityException if {@code admin} is not an active administrator or does not use
2156      *             both {@link DeviceAdminInfo#USES_POLICY_WATCH_LOGIN} and
2157      *             {@link DeviceAdminInfo#USES_POLICY_WIPE_DATA}.
2158      */
setMaximumFailedPasswordsForWipe(@onNull ComponentName admin, int num)2159     public void setMaximumFailedPasswordsForWipe(@NonNull ComponentName admin, int num) {
2160         if (mService != null) {
2161             try {
2162                 mService.setMaximumFailedPasswordsForWipe(admin, num, mParentInstance);
2163             } catch (RemoteException e) {
2164                 throw e.rethrowFromSystemServer();
2165             }
2166         }
2167     }
2168 
2169     /**
2170      * Retrieve the current maximum number of login attempts that are allowed before the device
2171      * or profile is wiped, for a particular admin or all admins that set restrictions on this user
2172      * and its participating profiles. Restrictions on profiles that have a separate challenge are
2173      * not taken into account.
2174      *
2175      * <p>This method can be called on the {@link DevicePolicyManager} instance
2176      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
2177      * the value for the parent profile.
2178      *
2179      * @param admin The name of the admin component to check, or {@code null} to aggregate
2180      * all admins.
2181      */
getMaximumFailedPasswordsForWipe(@ullable ComponentName admin)2182     public int getMaximumFailedPasswordsForWipe(@Nullable ComponentName admin) {
2183         return getMaximumFailedPasswordsForWipe(admin, myUserId());
2184     }
2185 
2186     /** @hide per-user version */
getMaximumFailedPasswordsForWipe(@ullable ComponentName admin, int userHandle)2187     public int getMaximumFailedPasswordsForWipe(@Nullable ComponentName admin, int userHandle) {
2188         if (mService != null) {
2189             try {
2190                 return mService.getMaximumFailedPasswordsForWipe(
2191                         admin, userHandle, mParentInstance);
2192             } catch (RemoteException e) {
2193                 throw e.rethrowFromSystemServer();
2194             }
2195         }
2196         return 0;
2197     }
2198 
2199     /**
2200      * Returns the profile with the smallest maximum failed passwords for wipe,
2201      * for the given user. So for primary user, it might return the primary or
2202      * a managed profile. For a secondary user, it would be the same as the
2203      * user passed in.
2204      * @hide Used only by Keyguard
2205      */
getProfileWithMinimumFailedPasswordsForWipe(int userHandle)2206     public int getProfileWithMinimumFailedPasswordsForWipe(int userHandle) {
2207         if (mService != null) {
2208             try {
2209                 return mService.getProfileWithMinimumFailedPasswordsForWipe(
2210                         userHandle, mParentInstance);
2211             } catch (RemoteException e) {
2212                 throw e.rethrowFromSystemServer();
2213             }
2214         }
2215         return UserHandle.USER_NULL;
2216     }
2217 
2218     /**
2219      * Flag for {@link #resetPassword}: don't allow other admins to change
2220      * the password again until the user has entered it.
2221      */
2222     public static final int RESET_PASSWORD_REQUIRE_ENTRY = 0x0001;
2223 
2224     /**
2225      * Flag for {@link #resetPassword}: don't ask for user credentials on device boot.
2226      * If the flag is set, the device can be booted without asking for user password.
2227      * The absence of this flag does not change the current boot requirements. This flag
2228      * can be set by the device owner only. If the app is not the device owner, the flag
2229      * is ignored. Once the flag is set, it cannot be reverted back without resetting the
2230      * device to factory defaults.
2231      */
2232     public static final int RESET_PASSWORD_DO_NOT_ASK_CREDENTIALS_ON_BOOT = 0x0002;
2233 
2234     /**
2235      * Force a new device unlock password (the password needed to access the entire device, not for
2236      * individual accounts) on the user. This takes effect immediately.
2237      * <p>
2238      * <em>Note: This API has been limited as of {@link android.os.Build.VERSION_CODES#N} for
2239      * device admins that are not device owner and not profile owner.
2240      * The password can now only be changed if there is currently no password set.  Device owner
2241      * and profile owner can still do this when user is unlocked and does not have a managed
2242      * profile.</em>
2243      * <p>
2244      * The given password must be sufficient for the current password quality and length constraints
2245      * as returned by {@link #getPasswordQuality(ComponentName)} and
2246      * {@link #getPasswordMinimumLength(ComponentName)}; if it does not meet these constraints, then
2247      * it will be rejected and false returned. Note that the password may be a stronger quality
2248      * (containing alphanumeric characters when the requested quality is only numeric), in which
2249      * case the currently active quality will be increased to match.
2250      * <p>
2251      * Calling with a null or empty password will clear any existing PIN, pattern or password if the
2252      * current password constraints allow it. <em>Note: This will not work in
2253      * {@link android.os.Build.VERSION_CODES#N} and later for managed profiles, or for device admins
2254      * that are not device owner or profile owner.  Once set, the password cannot be changed to null
2255      * or empty except by these admins.</em>
2256      * <p>
2257      * The calling device admin must have requested
2258      * {@link DeviceAdminInfo#USES_POLICY_RESET_PASSWORD} to be able to call this method; if it has
2259      * not, a security exception will be thrown.
2260      *
2261      * @param password The new password for the user. Null or empty clears the password.
2262      * @param flags May be 0 or combination of {@link #RESET_PASSWORD_REQUIRE_ENTRY} and
2263      *            {@link #RESET_PASSWORD_DO_NOT_ASK_CREDENTIALS_ON_BOOT}.
2264      * @return Returns true if the password was applied, or false if it is not acceptable for the
2265      *         current constraints or if the user has not been decrypted yet.
2266      * @throws SecurityException if the calling application does not own an active administrator
2267      *             that uses {@link DeviceAdminInfo#USES_POLICY_RESET_PASSWORD}
2268      * @throws IllegalStateException if the calling user is locked or has a managed profile.
2269      * @throws IllegalArgumentException if the password does not meet system requirements.
2270      */
resetPassword(String password, int flags)2271     public boolean resetPassword(String password, int flags) {
2272         throwIfParentInstance("resetPassword");
2273         if (mService != null) {
2274             try {
2275                 return mService.resetPassword(password, flags);
2276             } catch (RemoteException e) {
2277                 throw e.rethrowFromSystemServer();
2278             }
2279         }
2280         return false;
2281     }
2282 
2283     /**
2284      * Called by an application that is administering the device to set the maximum time for user
2285      * activity until the device will lock. This limits the length that the user can set. It takes
2286      * effect immediately.
2287      * <p>
2288      * The calling device admin must have requested {@link DeviceAdminInfo#USES_POLICY_FORCE_LOCK}
2289      * to be able to call this method; if it has not, a security exception will be thrown.
2290      * <p>
2291      * This method can be called on the {@link DevicePolicyManager} instance returned by
2292      * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent
2293      * profile.
2294      *
2295      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
2296      * @param timeMs The new desired maximum time to lock in milliseconds. A value of 0 means there
2297      *            is no restriction.
2298      * @throws SecurityException if {@code admin} is not an active administrator or it does not use
2299      *             {@link DeviceAdminInfo#USES_POLICY_FORCE_LOCK}
2300      */
setMaximumTimeToLock(@onNull ComponentName admin, long timeMs)2301     public void setMaximumTimeToLock(@NonNull ComponentName admin, long timeMs) {
2302         if (mService != null) {
2303             try {
2304                 mService.setMaximumTimeToLock(admin, timeMs, mParentInstance);
2305             } catch (RemoteException e) {
2306                 throw e.rethrowFromSystemServer();
2307             }
2308         }
2309     }
2310 
2311     /**
2312      * Retrieve the current maximum time to unlock for a particular admin or all admins that set
2313      * restrictions on this user and its participating profiles. Restrictions on profiles that have
2314      * a separate challenge are not taken into account.
2315      *
2316      * <p>This method can be called on the {@link DevicePolicyManager} instance
2317      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
2318      * restrictions on the parent profile.
2319      *
2320      * @param admin The name of the admin component to check, or {@code null} to aggregate
2321      * all admins.
2322      * @return time in milliseconds for the given admin or the minimum value (strictest) of
2323      * all admins if admin is null. Returns 0 if there are no restrictions.
2324      */
getMaximumTimeToLock(@ullable ComponentName admin)2325     public long getMaximumTimeToLock(@Nullable ComponentName admin) {
2326         return getMaximumTimeToLock(admin, myUserId());
2327     }
2328 
2329     /** @hide per-user version */
getMaximumTimeToLock(@ullable ComponentName admin, int userHandle)2330     public long getMaximumTimeToLock(@Nullable ComponentName admin, int userHandle) {
2331         if (mService != null) {
2332             try {
2333                 return mService.getMaximumTimeToLock(admin, userHandle, mParentInstance);
2334             } catch (RemoteException e) {
2335                 throw e.rethrowFromSystemServer();
2336             }
2337         }
2338         return 0;
2339     }
2340 
2341     /**
2342      * Returns maximum time to lock that applied by all profiles in this user. We do this because we
2343      * do not have a separate timeout to lock for work challenge only.
2344      *
2345      * @hide
2346      */
getMaximumTimeToLockForUserAndProfiles(int userHandle)2347     public long getMaximumTimeToLockForUserAndProfiles(int userHandle) {
2348         if (mService != null) {
2349             try {
2350                 return mService.getMaximumTimeToLockForUserAndProfiles(userHandle);
2351             } catch (RemoteException e) {
2352                 throw e.rethrowFromSystemServer();
2353             }
2354         }
2355         return 0;
2356     }
2357 
2358     /**
2359      * Called by a device/profile owner to set the timeout after which unlocking with secondary, non
2360      * strong auth (e.g. fingerprint, trust agents) times out, i.e. the user has to use a strong
2361      * authentication method like password, pin or pattern.
2362      *
2363      * <p>This timeout is used internally to reset the timer to require strong auth again after
2364      * specified timeout each time it has been successfully used.
2365      *
2366      * <p>Fingerprint can also be disabled altogether using {@link #KEYGUARD_DISABLE_FINGERPRINT}.
2367      *
2368      * <p>Trust agents can also be disabled altogether using {@link #KEYGUARD_DISABLE_TRUST_AGENTS}.
2369      *
2370      * <p>The calling device admin must be a device or profile owner. If it is not,
2371      * a {@link SecurityException} will be thrown.
2372      *
2373      * <p>The calling device admin can verify the value it has set by calling
2374      * {@link #getRequiredStrongAuthTimeout(ComponentName)} and passing in its instance.
2375      *
2376      * <p>This method can be called on the {@link DevicePolicyManager} instance returned by
2377      * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent
2378      * profile.
2379      *
2380      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
2381      * @param timeoutMs The new timeout, after which the user will have to unlock with strong
2382      *         authentication method. A value of 0 means the admin is not participating in
2383      *         controlling the timeout.
2384      *         The minimum and maximum timeouts are platform-defined and are typically 1 hour and
2385      *         72 hours, respectively. Though discouraged, the admin may choose to require strong
2386      *         auth at all times using {@link #KEYGUARD_DISABLE_FINGERPRINT} and/or
2387      *         {@link #KEYGUARD_DISABLE_TRUST_AGENTS}.
2388      *
2389      * @throws SecurityException if {@code admin} is not a device or profile owner.
2390      *
2391      * @hide
2392      */
setRequiredStrongAuthTimeout(@onNull ComponentName admin, long timeoutMs)2393     public void setRequiredStrongAuthTimeout(@NonNull ComponentName admin,
2394             long timeoutMs) {
2395         if (mService != null) {
2396             try {
2397                 mService.setRequiredStrongAuthTimeout(admin, timeoutMs, mParentInstance);
2398             } catch (RemoteException e) {
2399                 throw e.rethrowFromSystemServer();
2400             }
2401         }
2402     }
2403 
2404     /**
2405      * Determine for how long the user will be able to use secondary, non strong auth for
2406      * authentication, since last strong method authentication (password, pin or pattern) was used.
2407      * After the returned timeout the user is required to use strong authentication method.
2408      *
2409      * <p>This method can be called on the {@link DevicePolicyManager} instance
2410      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
2411      * restrictions on the parent profile.
2412      *
2413      * @param admin The name of the admin component to check, or {@code null} to aggregate
2414      *         accross all participating admins.
2415      * @return The timeout or 0 if not configured for the provided admin.
2416      *
2417      * @hide
2418      */
getRequiredStrongAuthTimeout(@ullable ComponentName admin)2419     public long getRequiredStrongAuthTimeout(@Nullable ComponentName admin) {
2420         return getRequiredStrongAuthTimeout(admin, myUserId());
2421     }
2422 
2423     /** @hide per-user version */
getRequiredStrongAuthTimeout(@ullable ComponentName admin, @UserIdInt int userId)2424     public long getRequiredStrongAuthTimeout(@Nullable ComponentName admin, @UserIdInt int userId) {
2425         if (mService != null) {
2426             try {
2427                 return mService.getRequiredStrongAuthTimeout(admin, userId, mParentInstance);
2428             } catch (RemoteException e) {
2429                 throw e.rethrowFromSystemServer();
2430             }
2431         }
2432         return DEFAULT_STRONG_AUTH_TIMEOUT_MS;
2433     }
2434 
2435     /**
2436      * Make the device lock immediately, as if the lock screen timeout has expired at the point of
2437      * this call.
2438      * <p>
2439      * The calling device admin must have requested {@link DeviceAdminInfo#USES_POLICY_FORCE_LOCK}
2440      * to be able to call this method; if it has not, a security exception will be thrown.
2441      * <p>
2442      * This method can be called on the {@link DevicePolicyManager} instance returned by
2443      * {@link #getParentProfileInstance(ComponentName)} in order to lock the parent profile.
2444      *
2445      * @throws SecurityException if the calling application does not own an active administrator
2446      *             that uses {@link DeviceAdminInfo#USES_POLICY_FORCE_LOCK}
2447      */
lockNow()2448     public void lockNow() {
2449         if (mService != null) {
2450             try {
2451                 mService.lockNow(mParentInstance);
2452             } catch (RemoteException e) {
2453                 throw e.rethrowFromSystemServer();
2454             }
2455         }
2456     }
2457 
2458     /**
2459      * Flag for {@link #wipeData(int)}: also erase the device's external
2460      * storage (such as SD cards).
2461      */
2462     public static final int WIPE_EXTERNAL_STORAGE = 0x0001;
2463 
2464     /**
2465      * Flag for {@link #wipeData(int)}: also erase the factory reset protection
2466      * data.
2467      *
2468      * <p>This flag may only be set by device owner admins; if it is set by
2469      * other admins a {@link SecurityException} will be thrown.
2470      */
2471     public static final int WIPE_RESET_PROTECTION_DATA = 0x0002;
2472 
2473     /**
2474      * Ask the user data be wiped. Wiping the primary user will cause the device to reboot, erasing
2475      * all user data while next booting up.
2476      * <p>
2477      * The calling device admin must have requested {@link DeviceAdminInfo#USES_POLICY_WIPE_DATA} to
2478      * be able to call this method; if it has not, a security exception will be thrown.
2479      *
2480      * @param flags Bit mask of additional options: currently supported flags are
2481      *            {@link #WIPE_EXTERNAL_STORAGE} and {@link #WIPE_RESET_PROTECTION_DATA}.
2482      * @throws SecurityException if the calling application does not own an active administrator
2483      *             that uses {@link DeviceAdminInfo#USES_POLICY_WIPE_DATA}
2484      */
wipeData(int flags)2485     public void wipeData(int flags) {
2486         throwIfParentInstance("wipeData");
2487         if (mService != null) {
2488             try {
2489                 mService.wipeData(flags);
2490             } catch (RemoteException e) {
2491                 throw e.rethrowFromSystemServer();
2492             }
2493         }
2494     }
2495 
2496     /**
2497      * Called by an application that is administering the device to set the
2498      * global proxy and exclusion list.
2499      * <p>
2500      * The calling device admin must have requested
2501      * {@link DeviceAdminInfo#USES_POLICY_SETS_GLOBAL_PROXY} to be able to call
2502      * this method; if it has not, a security exception will be thrown.
2503      * Only the first device admin can set the proxy. If a second admin attempts
2504      * to set the proxy, the {@link ComponentName} of the admin originally setting the
2505      * proxy will be returned. If successful in setting the proxy, {@code null} will
2506      * be returned.
2507      * The method can be called repeatedly by the device admin alrady setting the
2508      * proxy to update the proxy and exclusion list.
2509      *
2510      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
2511      * @param proxySpec the global proxy desired. Must be an HTTP Proxy.
2512      *            Pass Proxy.NO_PROXY to reset the proxy.
2513      * @param exclusionList a list of domains to be excluded from the global proxy.
2514      * @return {@code null} if the proxy was successfully set, or otherwise a {@link ComponentName}
2515      *            of the device admin that sets the proxy.
2516      * @hide
2517      */
setGlobalProxy(@onNull ComponentName admin, Proxy proxySpec, List<String> exclusionList )2518     public ComponentName setGlobalProxy(@NonNull ComponentName admin, Proxy proxySpec,
2519             List<String> exclusionList ) {
2520         throwIfParentInstance("setGlobalProxy");
2521         if (proxySpec == null) {
2522             throw new NullPointerException();
2523         }
2524         if (mService != null) {
2525             try {
2526                 String hostSpec;
2527                 String exclSpec;
2528                 if (proxySpec.equals(Proxy.NO_PROXY)) {
2529                     hostSpec = null;
2530                     exclSpec = null;
2531                 } else {
2532                     if (!proxySpec.type().equals(Proxy.Type.HTTP)) {
2533                         throw new IllegalArgumentException();
2534                     }
2535                     InetSocketAddress sa = (InetSocketAddress)proxySpec.address();
2536                     String hostName = sa.getHostName();
2537                     int port = sa.getPort();
2538                     StringBuilder hostBuilder = new StringBuilder();
2539                     hostSpec = hostBuilder.append(hostName)
2540                         .append(":").append(Integer.toString(port)).toString();
2541                     if (exclusionList == null) {
2542                         exclSpec = "";
2543                     } else {
2544                         StringBuilder listBuilder = new StringBuilder();
2545                         boolean firstDomain = true;
2546                         for (String exclDomain : exclusionList) {
2547                             if (!firstDomain) {
2548                                 listBuilder = listBuilder.append(",");
2549                             } else {
2550                                 firstDomain = false;
2551                             }
2552                             listBuilder = listBuilder.append(exclDomain.trim());
2553                         }
2554                         exclSpec = listBuilder.toString();
2555                     }
2556                     if (android.net.Proxy.validate(hostName, Integer.toString(port), exclSpec)
2557                             != android.net.Proxy.PROXY_VALID)
2558                         throw new IllegalArgumentException();
2559                 }
2560                 return mService.setGlobalProxy(admin, hostSpec, exclSpec);
2561             } catch (RemoteException e) {
2562                 throw e.rethrowFromSystemServer();
2563             }
2564         }
2565         return null;
2566     }
2567 
2568     /**
2569      * Set a network-independent global HTTP proxy. This is not normally what you want for typical
2570      * HTTP proxies - they are generally network dependent. However if you're doing something
2571      * unusual like general internal filtering this may be useful. On a private network where the
2572      * proxy is not accessible, you may break HTTP using this.
2573      * <p>
2574      * This method requires the caller to be the device owner.
2575      * <p>
2576      * This proxy is only a recommendation and it is possible that some apps will ignore it.
2577      *
2578      * @see ProxyInfo
2579      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
2580      * @param proxyInfo The a {@link ProxyInfo} object defining the new global HTTP proxy. A
2581      *            {@code null} value will clear the global HTTP proxy.
2582      * @throws SecurityException if {@code admin} is not the device owner.
2583      */
setRecommendedGlobalProxy(@onNull ComponentName admin, @Nullable ProxyInfo proxyInfo)2584     public void setRecommendedGlobalProxy(@NonNull ComponentName admin, @Nullable ProxyInfo
2585             proxyInfo) {
2586         throwIfParentInstance("setRecommendedGlobalProxy");
2587         if (mService != null) {
2588             try {
2589                 mService.setRecommendedGlobalProxy(admin, proxyInfo);
2590             } catch (RemoteException e) {
2591                 throw e.rethrowFromSystemServer();
2592             }
2593         }
2594     }
2595 
2596     /**
2597      * Returns the component name setting the global proxy.
2598      * @return ComponentName object of the device admin that set the global proxy, or {@code null}
2599      *         if no admin has set the proxy.
2600      * @hide
2601      */
getGlobalProxyAdmin()2602     public ComponentName getGlobalProxyAdmin() {
2603         if (mService != null) {
2604             try {
2605                 return mService.getGlobalProxyAdmin(myUserId());
2606             } catch (RemoteException e) {
2607                 throw e.rethrowFromSystemServer();
2608             }
2609         }
2610         return null;
2611     }
2612 
2613     /**
2614      * Result code for {@link #setStorageEncryption} and {@link #getStorageEncryptionStatus}:
2615      * indicating that encryption is not supported.
2616      */
2617     public static final int ENCRYPTION_STATUS_UNSUPPORTED = 0;
2618 
2619     /**
2620      * Result code for {@link #setStorageEncryption} and {@link #getStorageEncryptionStatus}:
2621      * indicating that encryption is supported, but is not currently active.
2622      */
2623     public static final int ENCRYPTION_STATUS_INACTIVE = 1;
2624 
2625     /**
2626      * Result code for {@link #getStorageEncryptionStatus}:
2627      * indicating that encryption is not currently active, but is currently
2628      * being activated.  This is only reported by devices that support
2629      * encryption of data and only when the storage is currently
2630      * undergoing a process of becoming encrypted.  A device that must reboot and/or wipe data
2631      * to become encrypted will never return this value.
2632      */
2633     public static final int ENCRYPTION_STATUS_ACTIVATING = 2;
2634 
2635     /**
2636      * Result code for {@link #setStorageEncryption} and {@link #getStorageEncryptionStatus}:
2637      * indicating that encryption is active.
2638      * <p>
2639      * Also see {@link #ENCRYPTION_STATUS_ACTIVE_PER_USER}.
2640      */
2641     public static final int ENCRYPTION_STATUS_ACTIVE = 3;
2642 
2643     /**
2644      * Result code for {@link #getStorageEncryptionStatus}:
2645      * indicating that encryption is active, but an encryption key has not
2646      * been set by the user.
2647      */
2648     public static final int ENCRYPTION_STATUS_ACTIVE_DEFAULT_KEY = 4;
2649 
2650     /**
2651      * Result code for {@link #getStorageEncryptionStatus}:
2652      * indicating that encryption is active and the encryption key is tied to the user or profile.
2653      * <p>
2654      * This value is only returned to apps targeting API level 24 and above. For apps targeting
2655      * earlier API levels, {@link #ENCRYPTION_STATUS_ACTIVE} is returned, even if the
2656      * encryption key is specific to the user or profile.
2657      */
2658     public static final int ENCRYPTION_STATUS_ACTIVE_PER_USER = 5;
2659 
2660     /**
2661      * Activity action: begin the process of encrypting data on the device.  This activity should
2662      * be launched after using {@link #setStorageEncryption} to request encryption be activated.
2663      * After resuming from this activity, use {@link #getStorageEncryption}
2664      * to check encryption status.  However, on some devices this activity may never return, as
2665      * it may trigger a reboot and in some cases a complete data wipe of the device.
2666      */
2667     @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
2668     public static final String ACTION_START_ENCRYPTION
2669             = "android.app.action.START_ENCRYPTION";
2670     /**
2671      * Widgets are enabled in keyguard
2672      */
2673     public static final int KEYGUARD_DISABLE_FEATURES_NONE = 0;
2674 
2675     /**
2676      * Disable all keyguard widgets. Has no effect.
2677      */
2678     public static final int KEYGUARD_DISABLE_WIDGETS_ALL = 1 << 0;
2679 
2680     /**
2681      * Disable the camera on secure keyguard screens (e.g. PIN/Pattern/Password)
2682      */
2683     public static final int KEYGUARD_DISABLE_SECURE_CAMERA = 1 << 1;
2684 
2685     /**
2686      * Disable showing all notifications on secure keyguard screens (e.g. PIN/Pattern/Password)
2687      */
2688     public static final int KEYGUARD_DISABLE_SECURE_NOTIFICATIONS = 1 << 2;
2689 
2690     /**
2691      * Only allow redacted notifications on secure keyguard screens (e.g. PIN/Pattern/Password)
2692      */
2693     public static final int KEYGUARD_DISABLE_UNREDACTED_NOTIFICATIONS = 1 << 3;
2694 
2695     /**
2696      * Ignore trust agent state on secure keyguard screens
2697      * (e.g. PIN/Pattern/Password).
2698      */
2699     public static final int KEYGUARD_DISABLE_TRUST_AGENTS = 1 << 4;
2700 
2701     /**
2702      * Disable fingerprint sensor on keyguard secure screens (e.g. PIN/Pattern/Password).
2703      */
2704     public static final int KEYGUARD_DISABLE_FINGERPRINT = 1 << 5;
2705 
2706     /**
2707      * Disable text entry into notifications on secure keyguard screens (e.g. PIN/Pattern/Password).
2708      */
2709     public static final int KEYGUARD_DISABLE_REMOTE_INPUT = 1 << 6;
2710 
2711     /**
2712      * Disable all current and future keyguard customizations.
2713      */
2714     public static final int KEYGUARD_DISABLE_FEATURES_ALL = 0x7fffffff;
2715 
2716     /**
2717      * Called by an application that is administering the device to request that the storage system
2718      * be encrypted.
2719      * <p>
2720      * When multiple device administrators attempt to control device encryption, the most secure,
2721      * supported setting will always be used. If any device administrator requests device
2722      * encryption, it will be enabled; Conversely, if a device administrator attempts to disable
2723      * device encryption while another device administrator has enabled it, the call to disable will
2724      * fail (most commonly returning {@link #ENCRYPTION_STATUS_ACTIVE}).
2725      * <p>
2726      * This policy controls encryption of the secure (application data) storage area. Data written
2727      * to other storage areas may or may not be encrypted, and this policy does not require or
2728      * control the encryption of any other storage areas. There is one exception: If
2729      * {@link android.os.Environment#isExternalStorageEmulated()} is {@code true}, then the
2730      * directory returned by {@link android.os.Environment#getExternalStorageDirectory()} must be
2731      * written to disk within the encrypted storage area.
2732      * <p>
2733      * Important Note: On some devices, it is possible to encrypt storage without requiring the user
2734      * to create a device PIN or Password. In this case, the storage is encrypted, but the
2735      * encryption key may not be fully secured. For maximum security, the administrator should also
2736      * require (and check for) a pattern, PIN, or password.
2737      *
2738      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
2739      * @param encrypt true to request encryption, false to release any previous request
2740      * @return the new request status (for all active admins) - will be one of
2741      *         {@link #ENCRYPTION_STATUS_UNSUPPORTED}, {@link #ENCRYPTION_STATUS_INACTIVE}, or
2742      *         {@link #ENCRYPTION_STATUS_ACTIVE}. This is the value of the requests; Use
2743      *         {@link #getStorageEncryptionStatus()} to query the actual device state.
2744      * @throws SecurityException if {@code admin} is not an active administrator or does not use
2745      *             {@link DeviceAdminInfo#USES_ENCRYPTED_STORAGE}
2746      */
setStorageEncryption(@onNull ComponentName admin, boolean encrypt)2747     public int setStorageEncryption(@NonNull ComponentName admin, boolean encrypt) {
2748         throwIfParentInstance("setStorageEncryption");
2749         if (mService != null) {
2750             try {
2751                 return mService.setStorageEncryption(admin, encrypt);
2752             } catch (RemoteException e) {
2753                 throw e.rethrowFromSystemServer();
2754             }
2755         }
2756         return ENCRYPTION_STATUS_UNSUPPORTED;
2757     }
2758 
2759     /**
2760      * Called by an application that is administering the device to
2761      * determine the requested setting for secure storage.
2762      *
2763      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.  If null,
2764      * this will return the requested encryption setting as an aggregate of all active
2765      * administrators.
2766      * @return true if the admin(s) are requesting encryption, false if not.
2767      */
getStorageEncryption(@ullable ComponentName admin)2768     public boolean getStorageEncryption(@Nullable ComponentName admin) {
2769         throwIfParentInstance("getStorageEncryption");
2770         if (mService != null) {
2771             try {
2772                 return mService.getStorageEncryption(admin, myUserId());
2773             } catch (RemoteException e) {
2774                 throw e.rethrowFromSystemServer();
2775             }
2776         }
2777         return false;
2778     }
2779 
2780     /**
2781      * Called by an application that is administering the device to
2782      * determine the current encryption status of the device.
2783      * <p>
2784      * Depending on the returned status code, the caller may proceed in different
2785      * ways.  If the result is {@link #ENCRYPTION_STATUS_UNSUPPORTED}, the
2786      * storage system does not support encryption.  If the
2787      * result is {@link #ENCRYPTION_STATUS_INACTIVE}, use {@link
2788      * #ACTION_START_ENCRYPTION} to begin the process of encrypting or decrypting the
2789      * storage.  If the result is {@link #ENCRYPTION_STATUS_ACTIVE_DEFAULT_KEY}, the
2790      * storage system has enabled encryption but no password is set so further action
2791      * may be required.  If the result is {@link #ENCRYPTION_STATUS_ACTIVATING},
2792      * {@link #ENCRYPTION_STATUS_ACTIVE} or {@link #ENCRYPTION_STATUS_ACTIVE_PER_USER},
2793      * no further action is required.
2794      *
2795      * @return current status of encryption. The value will be one of
2796      * {@link #ENCRYPTION_STATUS_UNSUPPORTED}, {@link #ENCRYPTION_STATUS_INACTIVE},
2797      * {@link #ENCRYPTION_STATUS_ACTIVATING}, {@link #ENCRYPTION_STATUS_ACTIVE_DEFAULT_KEY},
2798      * {@link #ENCRYPTION_STATUS_ACTIVE}, or {@link #ENCRYPTION_STATUS_ACTIVE_PER_USER}.
2799      */
getStorageEncryptionStatus()2800     public int getStorageEncryptionStatus() {
2801         throwIfParentInstance("getStorageEncryptionStatus");
2802         return getStorageEncryptionStatus(myUserId());
2803     }
2804 
2805     /** @hide per-user version */
getStorageEncryptionStatus(int userHandle)2806     public int getStorageEncryptionStatus(int userHandle) {
2807         if (mService != null) {
2808             try {
2809                 return mService.getStorageEncryptionStatus(mContext.getPackageName(), userHandle);
2810             } catch (RemoteException e) {
2811                 throw e.rethrowFromSystemServer();
2812             }
2813         }
2814         return ENCRYPTION_STATUS_UNSUPPORTED;
2815     }
2816 
2817     /**
2818      * Mark a CA certificate as approved by the device user. This means that they have been notified
2819      * of the installation, were made aware of the risks, viewed the certificate and still wanted to
2820      * keep the certificate on the device.
2821      *
2822      * Calling with {@param approval} as {@code true} will cancel any ongoing warnings related to
2823      * this certificate.
2824      *
2825      * @hide
2826      */
approveCaCert(String alias, int userHandle, boolean approval)2827     public boolean approveCaCert(String alias, int userHandle, boolean approval) {
2828         if (mService != null) {
2829             try {
2830                 return mService.approveCaCert(alias, userHandle, approval);
2831             } catch (RemoteException e) {
2832                 throw e.rethrowFromSystemServer();
2833             }
2834         }
2835         return false;
2836     }
2837 
2838     /**
2839      * Check whether a CA certificate has been approved by the device user.
2840      *
2841      * @hide
2842      */
isCaCertApproved(String alias, int userHandle)2843     public boolean isCaCertApproved(String alias, int userHandle) {
2844         if (mService != null) {
2845             try {
2846                 return mService.isCaCertApproved(alias, userHandle);
2847             } catch (RemoteException e) {
2848                 throw e.rethrowFromSystemServer();
2849             }
2850         }
2851         return false;
2852     }
2853 
2854     /**
2855      * Installs the given certificate as a user CA.
2856      *
2857      * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or
2858      *              {@code null} if calling from a delegated certificate installer.
2859      * @param certBuffer encoded form of the certificate to install.
2860      *
2861      * @return false if the certBuffer cannot be parsed or installation is
2862      *         interrupted, true otherwise.
2863      * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile
2864      *         owner.
2865      */
installCaCert(@ullable ComponentName admin, byte[] certBuffer)2866     public boolean installCaCert(@Nullable ComponentName admin, byte[] certBuffer) {
2867         throwIfParentInstance("installCaCert");
2868         if (mService != null) {
2869             try {
2870                 return mService.installCaCert(admin, certBuffer);
2871             } catch (RemoteException e) {
2872                 throw e.rethrowFromSystemServer();
2873             }
2874         }
2875         return false;
2876     }
2877 
2878     /**
2879      * Uninstalls the given certificate from trusted user CAs, if present.
2880      *
2881      * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or
2882      *              {@code null} if calling from a delegated certificate installer.
2883      * @param certBuffer encoded form of the certificate to remove.
2884      * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile
2885      *         owner.
2886      */
uninstallCaCert(@ullable ComponentName admin, byte[] certBuffer)2887     public void uninstallCaCert(@Nullable ComponentName admin, byte[] certBuffer) {
2888         throwIfParentInstance("uninstallCaCert");
2889         if (mService != null) {
2890             try {
2891                 final String alias = getCaCertAlias(certBuffer);
2892                 mService.uninstallCaCerts(admin, new String[] {alias});
2893             } catch (CertificateException e) {
2894                 Log.w(TAG, "Unable to parse certificate", e);
2895             } catch (RemoteException e) {
2896                 throw e.rethrowFromSystemServer();
2897             }
2898         }
2899     }
2900 
2901     /**
2902      * Returns all CA certificates that are currently trusted, excluding system CA certificates.
2903      * If a user has installed any certificates by other means than device policy these will be
2904      * included too.
2905      *
2906      * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or
2907      *              {@code null} if calling from a delegated certificate installer.
2908      * @return a List of byte[] arrays, each encoding one user CA certificate.
2909      * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile
2910      *         owner.
2911      */
getInstalledCaCerts(@ullable ComponentName admin)2912     public List<byte[]> getInstalledCaCerts(@Nullable ComponentName admin) {
2913         List<byte[]> certs = new ArrayList<byte[]>();
2914         throwIfParentInstance("getInstalledCaCerts");
2915         if (mService != null) {
2916             try {
2917                 mService.enforceCanManageCaCerts(admin);
2918                 final TrustedCertificateStore certStore = new TrustedCertificateStore();
2919                 for (String alias : certStore.userAliases()) {
2920                     try {
2921                         certs.add(certStore.getCertificate(alias).getEncoded());
2922                     } catch (CertificateException ce) {
2923                         Log.w(TAG, "Could not encode certificate: " + alias, ce);
2924                     }
2925                 }
2926             } catch (RemoteException re) {
2927                 throw re.rethrowFromSystemServer();
2928             }
2929         }
2930         return certs;
2931     }
2932 
2933     /**
2934      * Uninstalls all custom trusted CA certificates from the profile. Certificates installed by
2935      * means other than device policy will also be removed, except for system CA certificates.
2936      *
2937      * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or
2938      *              {@code null} if calling from a delegated certificate installer.
2939      * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile
2940      *         owner.
2941      */
uninstallAllUserCaCerts(@ullable ComponentName admin)2942     public void uninstallAllUserCaCerts(@Nullable ComponentName admin) {
2943         throwIfParentInstance("uninstallAllUserCaCerts");
2944         if (mService != null) {
2945             try {
2946                 mService.uninstallCaCerts(admin, new TrustedCertificateStore().userAliases()
2947                         .toArray(new String[0]));
2948             } catch (RemoteException re) {
2949                 throw re.rethrowFromSystemServer();
2950             }
2951         }
2952     }
2953 
2954     /**
2955      * Returns whether this certificate is installed as a trusted CA.
2956      *
2957      * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or
2958      *              {@code null} if calling from a delegated certificate installer.
2959      * @param certBuffer encoded form of the certificate to look up.
2960      * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile
2961      *         owner.
2962      */
hasCaCertInstalled(@ullable ComponentName admin, byte[] certBuffer)2963     public boolean hasCaCertInstalled(@Nullable ComponentName admin, byte[] certBuffer) {
2964         throwIfParentInstance("hasCaCertInstalled");
2965         if (mService != null) {
2966             try {
2967                 mService.enforceCanManageCaCerts(admin);
2968                 return getCaCertAlias(certBuffer) != null;
2969             } catch (RemoteException re) {
2970                 throw re.rethrowFromSystemServer();
2971             } catch (CertificateException ce) {
2972                 Log.w(TAG, "Could not parse certificate", ce);
2973             }
2974         }
2975         return false;
2976     }
2977 
2978     /**
2979      * Called by a device or profile owner, or delegated certificate installer, to install a
2980      * certificate and corresponding private key. All apps within the profile will be able to access
2981      * the certificate and use the private key, given direct user approval.
2982      *
2983      * <p>Access to the installed credentials will not be granted to the caller of this API without
2984      * direct user approval. This is for security - should a certificate installer become
2985      * compromised, certificates it had already installed will be protected.
2986      *
2987      * <p>If the installer must have access to the credentials, call
2988      * {@link #installKeyPair(ComponentName, PrivateKey, Certificate[], String, boolean)} instead.
2989      *
2990      * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or
2991      *            {@code null} if calling from a delegated certificate installer.
2992      * @param privKey The private key to install.
2993      * @param cert The certificate to install.
2994      * @param alias The private key alias under which to install the certificate. If a certificate
2995      * with that alias already exists, it will be overwritten.
2996      * @return {@code true} if the keys were installed, {@code false} otherwise.
2997      * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile
2998      *         owner.
2999      */
installKeyPair(@ullable ComponentName admin, @NonNull PrivateKey privKey, @NonNull Certificate cert, @NonNull String alias)3000     public boolean installKeyPair(@Nullable ComponentName admin, @NonNull PrivateKey privKey,
3001             @NonNull Certificate cert, @NonNull String alias) {
3002         return installKeyPair(admin, privKey, new Certificate[] {cert}, alias, false);
3003     }
3004 
3005     /**
3006      * Called by a device or profile owner, or delegated certificate installer, to install a
3007      * certificate chain and corresponding private key for the leaf certificate. All apps within the
3008      * profile will be able to access the certificate chain and use the private key, given direct
3009      * user approval.
3010      *
3011      * <p>The caller of this API may grant itself access to the certificate and private key
3012      * immediately, without user approval. It is a best practice not to request this unless strictly
3013      * necessary since it opens up additional security vulnerabilities.
3014      *
3015      * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or
3016      *        {@code null} if calling from a delegated certificate installer.
3017      * @param privKey The private key to install.
3018      * @param certs The certificate chain to install. The chain should start with the leaf
3019      *        certificate and include the chain of trust in order. This will be returned by
3020      *        {@link android.security.KeyChain#getCertificateChain}.
3021      * @param alias The private key alias under which to install the certificate. If a certificate
3022      *        with that alias already exists, it will be overwritten.
3023      * @param requestAccess {@code true} to request that the calling app be granted access to the
3024      *        credentials immediately. Otherwise, access to the credentials will be gated by user
3025      *        approval.
3026      * @return {@code true} if the keys were installed, {@code false} otherwise.
3027      * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile
3028      *         owner.
3029      * @see android.security.KeyChain#getCertificateChain
3030      */
installKeyPair(@ullable ComponentName admin, @NonNull PrivateKey privKey, @NonNull Certificate[] certs, @NonNull String alias, boolean requestAccess)3031     public boolean installKeyPair(@Nullable ComponentName admin, @NonNull PrivateKey privKey,
3032             @NonNull Certificate[] certs, @NonNull String alias, boolean requestAccess) {
3033         throwIfParentInstance("installKeyPair");
3034         try {
3035             final byte[] pemCert = Credentials.convertToPem(certs[0]);
3036             byte[] pemChain = null;
3037             if (certs.length > 1) {
3038                 pemChain = Credentials.convertToPem(Arrays.copyOfRange(certs, 1, certs.length));
3039             }
3040             final byte[] pkcs8Key = KeyFactory.getInstance(privKey.getAlgorithm())
3041                     .getKeySpec(privKey, PKCS8EncodedKeySpec.class).getEncoded();
3042             return mService.installKeyPair(admin, pkcs8Key, pemCert, pemChain, alias,
3043                     requestAccess);
3044         } catch (RemoteException e) {
3045             throw e.rethrowFromSystemServer();
3046         } catch (NoSuchAlgorithmException | InvalidKeySpecException e) {
3047             Log.w(TAG, "Failed to obtain private key material", e);
3048         } catch (CertificateException | IOException e) {
3049             Log.w(TAG, "Could not pem-encode certificate", e);
3050         }
3051         return false;
3052     }
3053 
3054     /**
3055      * Called by a device or profile owner, or delegated certificate installer, to remove a
3056      * certificate and private key pair installed under a given alias.
3057      *
3058      * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or
3059      *        {@code null} if calling from a delegated certificate installer.
3060      * @param alias The private key alias under which the certificate is installed.
3061      * @return {@code true} if the private key alias no longer exists, {@code false} otherwise.
3062      * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile
3063      *         owner.
3064      */
removeKeyPair(@ullable ComponentName admin, @NonNull String alias)3065     public boolean removeKeyPair(@Nullable ComponentName admin, @NonNull String alias) {
3066         throwIfParentInstance("removeKeyPair");
3067         try {
3068             return mService.removeKeyPair(admin, alias);
3069         } catch (RemoteException e) {
3070             throw e.rethrowFromSystemServer();
3071         }
3072     }
3073 
3074     /**
3075      * @return the alias of a given CA certificate in the certificate store, or {@code null} if it
3076      * doesn't exist.
3077      */
getCaCertAlias(byte[] certBuffer)3078     private static String getCaCertAlias(byte[] certBuffer) throws CertificateException {
3079         final CertificateFactory certFactory = CertificateFactory.getInstance("X.509");
3080         final X509Certificate cert = (X509Certificate) certFactory.generateCertificate(
3081                               new ByteArrayInputStream(certBuffer));
3082         return new TrustedCertificateStore().getCertificateAlias(cert);
3083     }
3084 
3085     /**
3086      * Called by a profile owner or device owner to grant access to privileged certificate
3087      * manipulation APIs to a third-party certificate installer app. Granted APIs include
3088      * {@link #getInstalledCaCerts}, {@link #hasCaCertInstalled}, {@link #installCaCert},
3089      * {@link #uninstallCaCert}, {@link #uninstallAllUserCaCerts} and {@link #installKeyPair}.
3090      * <p>
3091      * Delegated certificate installer is a per-user state. The delegated access is persistent until
3092      * it is later cleared by calling this method with a null value or uninstallling the certificate
3093      * installer.
3094      * <p>
3095      * <b>Note:</b>Starting from {@link android.os.Build.VERSION_CODES#N}, if the caller
3096      * application's target SDK version is {@link android.os.Build.VERSION_CODES#N} or newer, the
3097      * supplied certificate installer package must be installed when calling this API, otherwise an
3098      * {@link IllegalArgumentException} will be thrown.
3099      *
3100      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
3101      * @param installerPackage The package name of the certificate installer which will be given
3102      *            access. If {@code null} is given the current package will be cleared.
3103      * @throws SecurityException if {@code admin} is not a device or a profile owner.
3104      */
setCertInstallerPackage(@onNull ComponentName admin, @Nullable String installerPackage)3105     public void setCertInstallerPackage(@NonNull ComponentName admin, @Nullable String
3106             installerPackage) throws SecurityException {
3107         throwIfParentInstance("setCertInstallerPackage");
3108         if (mService != null) {
3109             try {
3110                 mService.setCertInstallerPackage(admin, installerPackage);
3111             } catch (RemoteException e) {
3112                 throw e.rethrowFromSystemServer();
3113             }
3114         }
3115     }
3116 
3117     /**
3118      * Called by a profile owner or device owner to retrieve the certificate installer for the user.
3119      * null if none is set.
3120      *
3121      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
3122      * @return The package name of the current delegated certificate installer, or {@code null} if
3123      *         none is set.
3124      * @throws SecurityException if {@code admin} is not a device or a profile owner.
3125      */
getCertInstallerPackage(@onNull ComponentName admin)3126     public String getCertInstallerPackage(@NonNull ComponentName admin) throws SecurityException {
3127         throwIfParentInstance("getCertInstallerPackage");
3128         if (mService != null) {
3129             try {
3130                 return mService.getCertInstallerPackage(admin);
3131             } catch (RemoteException e) {
3132                 throw e.rethrowFromSystemServer();
3133             }
3134         }
3135         return null;
3136     }
3137 
3138     /**
3139      * Called by a device or profile owner to configure an always-on VPN connection through a
3140      * specific application for the current user.
3141      *
3142      * @deprecated this version only exists for compability with previous developer preview builds.
3143      *             TODO: delete once there are no longer any live references.
3144      * @hide
3145      */
setAlwaysOnVpnPackage(@onNull ComponentName admin, @Nullable String vpnPackage)3146     public void setAlwaysOnVpnPackage(@NonNull ComponentName admin, @Nullable String vpnPackage)
3147             throws NameNotFoundException, UnsupportedOperationException {
3148         setAlwaysOnVpnPackage(admin, vpnPackage, /* lockdownEnabled */ true);
3149     }
3150 
3151     /**
3152      * Called by a device or profile owner to configure an always-on VPN connection through a
3153      * specific application for the current user. This connection is automatically granted and
3154      * persisted after a reboot.
3155      * <p>
3156      * The designated package should declare a {@link android.net.VpnService} in its manifest
3157      * guarded by {@link android.Manifest.permission#BIND_VPN_SERVICE}, otherwise the call will
3158      * fail.
3159      *
3160      * @param vpnPackage The package name for an installed VPN app on the device, or {@code null} to
3161      *        remove an existing always-on VPN configuration.
3162      * @param lockdownEnabled {@code true} to disallow networking when the VPN is not connected or
3163      *        {@code false} otherwise. This carries the risk that any failure of the VPN provider
3164      *        could break networking for all apps. This has no effect when clearing.
3165      * @throws SecurityException if {@code admin} is not a device or a profile owner.
3166      * @throws NameNotFoundException if {@code vpnPackage} is not installed.
3167      * @throws UnsupportedOperationException if {@code vpnPackage} exists but does not support being
3168      *         set as always-on, or if always-on VPN is not available.
3169      */
setAlwaysOnVpnPackage(@onNull ComponentName admin, @Nullable String vpnPackage, boolean lockdownEnabled)3170     public void setAlwaysOnVpnPackage(@NonNull ComponentName admin, @Nullable String vpnPackage,
3171             boolean lockdownEnabled)
3172             throws NameNotFoundException, UnsupportedOperationException {
3173         throwIfParentInstance("setAlwaysOnVpnPackage");
3174         if (mService != null) {
3175             try {
3176                 if (!mService.setAlwaysOnVpnPackage(admin, vpnPackage, lockdownEnabled)) {
3177                     throw new NameNotFoundException(vpnPackage);
3178                 }
3179             } catch (RemoteException e) {
3180                 throw e.rethrowFromSystemServer();
3181             }
3182         }
3183     }
3184 
3185     /**
3186      * Called by a device or profile owner to read the name of the package administering an
3187      * always-on VPN connection for the current user. If there is no such package, or the always-on
3188      * VPN is provided by the system instead of by an application, {@code null} will be returned.
3189      *
3190      * @return Package name of VPN controller responsible for always-on VPN, or {@code null} if none
3191      *         is set.
3192      * @throws SecurityException if {@code admin} is not a device or a profile owner.
3193      */
getAlwaysOnVpnPackage(@onNull ComponentName admin)3194     public String getAlwaysOnVpnPackage(@NonNull ComponentName admin) {
3195         throwIfParentInstance("getAlwaysOnVpnPackage");
3196         if (mService != null) {
3197             try {
3198                 return mService.getAlwaysOnVpnPackage(admin);
3199             } catch (RemoteException e) {
3200                 throw e.rethrowFromSystemServer();
3201             }
3202         }
3203         return null;
3204     }
3205 
3206     /**
3207      * Called by an application that is administering the device to disable all cameras on the
3208      * device, for this user. After setting this, no applications running as this user will be able
3209      * to access any cameras on the device.
3210      * <p>
3211      * If the caller is device owner, then the restriction will be applied to all users.
3212      * <p>
3213      * The calling device admin must have requested
3214      * {@link DeviceAdminInfo#USES_POLICY_DISABLE_CAMERA} to be able to call this method; if it has
3215      * not, a security exception will be thrown.
3216      *
3217      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
3218      * @param disabled Whether or not the camera should be disabled.
3219      * @throws SecurityException if {@code admin} is not an active administrator or does not use
3220      *             {@link DeviceAdminInfo#USES_POLICY_DISABLE_CAMERA}.
3221      */
setCameraDisabled(@onNull ComponentName admin, boolean disabled)3222     public void setCameraDisabled(@NonNull ComponentName admin, boolean disabled) {
3223         throwIfParentInstance("setCameraDisabled");
3224         if (mService != null) {
3225             try {
3226                 mService.setCameraDisabled(admin, disabled);
3227             } catch (RemoteException e) {
3228                 throw e.rethrowFromSystemServer();
3229             }
3230         }
3231     }
3232 
3233     /**
3234      * Determine whether or not the device's cameras have been disabled for this user,
3235      * either by the calling admin, if specified, or all admins.
3236      * @param admin The name of the admin component to check, or {@code null} to check whether any admins
3237      * have disabled the camera
3238      */
getCameraDisabled(@ullable ComponentName admin)3239     public boolean getCameraDisabled(@Nullable ComponentName admin) {
3240         throwIfParentInstance("getCameraDisabled");
3241         return getCameraDisabled(admin, myUserId());
3242     }
3243 
3244     /** @hide per-user version */
getCameraDisabled(@ullable ComponentName admin, int userHandle)3245     public boolean getCameraDisabled(@Nullable ComponentName admin, int userHandle) {
3246         if (mService != null) {
3247             try {
3248                 return mService.getCameraDisabled(admin, userHandle);
3249             } catch (RemoteException e) {
3250                 throw e.rethrowFromSystemServer();
3251             }
3252         }
3253         return false;
3254     }
3255 
3256     /**
3257      * Called by a device owner to request a bugreport.
3258      * <p>
3259      * There must be only one user on the device, managed by the device owner. Otherwise a
3260      * {@link SecurityException} will be thrown.
3261      *
3262      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
3263      * @return {@code true} if the bugreport collection started successfully, or {@code false} if it
3264      *         wasn't triggered because a previous bugreport operation is still active (either the
3265      *         bugreport is still running or waiting for the user to share or decline)
3266      * @throws SecurityException if {@code admin} is not a device owner, or if there are users other
3267      *             than the one managed by the device owner.
3268      */
requestBugreport(@onNull ComponentName admin)3269     public boolean requestBugreport(@NonNull ComponentName admin) {
3270         throwIfParentInstance("requestBugreport");
3271         if (mService != null) {
3272             try {
3273                 return mService.requestBugreport(admin);
3274             } catch (RemoteException e) {
3275                 throw e.rethrowFromSystemServer();
3276             }
3277         }
3278         return false;
3279     }
3280 
3281     /**
3282      * Determine whether or not creating a guest user has been disabled for the device
3283      *
3284      * @hide
3285      */
getGuestUserDisabled(@ullable ComponentName admin)3286     public boolean getGuestUserDisabled(@Nullable ComponentName admin) {
3287         // Currently guest users can always be created if multi-user is enabled
3288         // TODO introduce a policy for guest user creation
3289         return false;
3290     }
3291 
3292     /**
3293      * Called by a device/profile owner to set whether the screen capture is disabled. Disabling
3294      * screen capture also prevents the content from being shown on display devices that do not have
3295      * a secure video output. See {@link android.view.Display#FLAG_SECURE} for more details about
3296      * secure surfaces and secure displays.
3297      * <p>
3298      * The calling device admin must be a device or profile owner. If it is not, a security
3299      * exception will be thrown.
3300      * <p>
3301      * From version {@link android.os.Build.VERSION_CODES#M} disabling screen capture also blocks
3302      * assist requests for all activities of the relevant user.
3303      *
3304      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
3305      * @param disabled Whether screen capture is disabled or not.
3306      * @throws SecurityException if {@code admin} is not a device or profile owner.
3307      */
setScreenCaptureDisabled(@onNull ComponentName admin, boolean disabled)3308     public void setScreenCaptureDisabled(@NonNull ComponentName admin, boolean disabled) {
3309         throwIfParentInstance("setScreenCaptureDisabled");
3310         if (mService != null) {
3311             try {
3312                 mService.setScreenCaptureDisabled(admin, disabled);
3313             } catch (RemoteException e) {
3314                 throw e.rethrowFromSystemServer();
3315             }
3316         }
3317     }
3318 
3319     /**
3320      * Determine whether or not screen capture has been disabled by the calling
3321      * admin, if specified, or all admins.
3322      * @param admin The name of the admin component to check, or {@code null} to check whether any admins
3323      * have disabled screen capture.
3324      */
getScreenCaptureDisabled(@ullable ComponentName admin)3325     public boolean getScreenCaptureDisabled(@Nullable ComponentName admin) {
3326         throwIfParentInstance("getScreenCaptureDisabled");
3327         return getScreenCaptureDisabled(admin, myUserId());
3328     }
3329 
3330     /** @hide per-user version */
getScreenCaptureDisabled(@ullable ComponentName admin, int userHandle)3331     public boolean getScreenCaptureDisabled(@Nullable ComponentName admin, int userHandle) {
3332         if (mService != null) {
3333             try {
3334                 return mService.getScreenCaptureDisabled(admin, userHandle);
3335             } catch (RemoteException e) {
3336                 throw e.rethrowFromSystemServer();
3337             }
3338         }
3339         return false;
3340     }
3341 
3342     /**
3343      * Called by a device owner to set whether auto time is required. If auto time is required the
3344      * user cannot set the date and time, but has to use network date and time.
3345      * <p>
3346      * Note: if auto time is required the user can still manually set the time zone.
3347      * <p>
3348      * The calling device admin must be a device owner. If it is not, a security exception will be
3349      * thrown.
3350      *
3351      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
3352      * @param required Whether auto time is set required or not.
3353      * @throws SecurityException if {@code admin} is not a device owner.
3354      */
setAutoTimeRequired(@onNull ComponentName admin, boolean required)3355     public void setAutoTimeRequired(@NonNull ComponentName admin, boolean required) {
3356         throwIfParentInstance("setAutoTimeRequired");
3357         if (mService != null) {
3358             try {
3359                 mService.setAutoTimeRequired(admin, required);
3360             } catch (RemoteException e) {
3361                 throw e.rethrowFromSystemServer();
3362             }
3363         }
3364     }
3365 
3366     /**
3367      * @return true if auto time is required.
3368      */
getAutoTimeRequired()3369     public boolean getAutoTimeRequired() {
3370         throwIfParentInstance("getAutoTimeRequired");
3371         if (mService != null) {
3372             try {
3373                 return mService.getAutoTimeRequired();
3374             } catch (RemoteException e) {
3375                 throw e.rethrowFromSystemServer();
3376             }
3377         }
3378         return false;
3379     }
3380 
3381     /**
3382      * Called by a device owner to set whether all users created on the device should be ephemeral.
3383      * <p>
3384      * The system user is exempt from this policy - it is never ephemeral.
3385      * <p>
3386      * The calling device admin must be the device owner. If it is not, a security exception will be
3387      * thrown.
3388      *
3389      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
3390      * @param forceEphemeralUsers If true, all the existing users will be deleted and all
3391      *            subsequently created users will be ephemeral.
3392      * @throws SecurityException if {@code admin} is not a device owner.
3393      * @hide
3394      */
setForceEphemeralUsers( @onNull ComponentName admin, boolean forceEphemeralUsers)3395     public void setForceEphemeralUsers(
3396             @NonNull ComponentName admin, boolean forceEphemeralUsers) {
3397         throwIfParentInstance("setForceEphemeralUsers");
3398         if (mService != null) {
3399             try {
3400                 mService.setForceEphemeralUsers(admin, forceEphemeralUsers);
3401             } catch (RemoteException e) {
3402                 throw e.rethrowFromSystemServer();
3403             }
3404         }
3405     }
3406 
3407     /**
3408      * @return true if all users are created ephemeral.
3409      * @throws SecurityException if {@code admin} is not a device owner.
3410      * @hide
3411      */
getForceEphemeralUsers(@onNull ComponentName admin)3412     public boolean getForceEphemeralUsers(@NonNull ComponentName admin) {
3413         throwIfParentInstance("getForceEphemeralUsers");
3414         if (mService != null) {
3415             try {
3416                 return mService.getForceEphemeralUsers(admin);
3417             } catch (RemoteException e) {
3418                 throw e.rethrowFromSystemServer();
3419             }
3420         }
3421         return false;
3422     }
3423 
3424     /**
3425      * Called by an application that is administering the device to disable keyguard customizations,
3426      * such as widgets. After setting this, keyguard features will be disabled according to the
3427      * provided feature list.
3428      * <p>
3429      * The calling device admin must have requested
3430      * {@link DeviceAdminInfo#USES_POLICY_DISABLE_KEYGUARD_FEATURES} to be able to call this method;
3431      * if it has not, a security exception will be thrown.
3432      * <p>
3433      * Calling this from a managed profile before version {@link android.os.Build.VERSION_CODES#M}
3434      * will throw a security exception. From version {@link android.os.Build.VERSION_CODES#M} the
3435      * profile owner of a managed profile can set:
3436      * <ul>
3437      * <li>{@link #KEYGUARD_DISABLE_TRUST_AGENTS}, which affects the parent user, but only if there
3438      * is no separate challenge set on the managed profile.
3439      * <li>{@link #KEYGUARD_DISABLE_FINGERPRINT} which affects the managed profile challenge if
3440      * there is one, or the parent user otherwise.
3441      * <li>{@link #KEYGUARD_DISABLE_UNREDACTED_NOTIFICATIONS} which affects notifications generated
3442      * by applications in the managed profile.
3443      * </ul>
3444      * {@link #KEYGUARD_DISABLE_TRUST_AGENTS} and {@link #KEYGUARD_DISABLE_FINGERPRINT} can also be
3445      * set on the {@link DevicePolicyManager} instance returned by
3446      * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent
3447      * profile.
3448      * <p>
3449      * Requests to disable other features on a managed profile will be ignored.
3450      * <p>
3451      * The admin can check which features have been disabled by calling
3452      * {@link #getKeyguardDisabledFeatures(ComponentName)}
3453      *
3454      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
3455      * @param which {@link #KEYGUARD_DISABLE_FEATURES_NONE} (default),
3456      *            {@link #KEYGUARD_DISABLE_WIDGETS_ALL}, {@link #KEYGUARD_DISABLE_SECURE_CAMERA},
3457      *            {@link #KEYGUARD_DISABLE_SECURE_NOTIFICATIONS},
3458      *            {@link #KEYGUARD_DISABLE_TRUST_AGENTS},
3459      *            {@link #KEYGUARD_DISABLE_UNREDACTED_NOTIFICATIONS},
3460      *            {@link #KEYGUARD_DISABLE_FINGERPRINT}, {@link #KEYGUARD_DISABLE_FEATURES_ALL}
3461      * @throws SecurityException if {@code admin} is not an active administrator or does not user
3462      *             {@link DeviceAdminInfo#USES_POLICY_DISABLE_KEYGUARD_FEATURES}
3463      */
setKeyguardDisabledFeatures(@onNull ComponentName admin, int which)3464     public void setKeyguardDisabledFeatures(@NonNull ComponentName admin, int which) {
3465         if (mService != null) {
3466             try {
3467                 mService.setKeyguardDisabledFeatures(admin, which, mParentInstance);
3468             } catch (RemoteException e) {
3469                 throw e.rethrowFromSystemServer();
3470             }
3471         }
3472     }
3473 
3474     /**
3475      * Determine whether or not features have been disabled in keyguard either by the calling
3476      * admin, if specified, or all admins that set restrictions on this user and its participating
3477      * profiles. Restrictions on profiles that have a separate challenge are not taken into account.
3478      *
3479      * <p>This method can be called on the {@link DevicePolicyManager} instance
3480      * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve
3481      * restrictions on the parent profile.
3482      *
3483      * @param admin The name of the admin component to check, or {@code null} to check whether any
3484      * admins have disabled features in keyguard.
3485      * @return bitfield of flags. See {@link #setKeyguardDisabledFeatures(ComponentName, int)}
3486      * for a list.
3487      */
getKeyguardDisabledFeatures(@ullable ComponentName admin)3488     public int getKeyguardDisabledFeatures(@Nullable ComponentName admin) {
3489         return getKeyguardDisabledFeatures(admin, myUserId());
3490     }
3491 
3492     /** @hide per-user version */
getKeyguardDisabledFeatures(@ullable ComponentName admin, int userHandle)3493     public int getKeyguardDisabledFeatures(@Nullable ComponentName admin, int userHandle) {
3494         if (mService != null) {
3495             try {
3496                 return mService.getKeyguardDisabledFeatures(admin, userHandle, mParentInstance);
3497             } catch (RemoteException e) {
3498                 throw e.rethrowFromSystemServer();
3499             }
3500         }
3501         return KEYGUARD_DISABLE_FEATURES_NONE;
3502     }
3503 
3504     /**
3505      * @hide
3506      */
setActiveAdmin(@onNull ComponentName policyReceiver, boolean refreshing, int userHandle)3507     public void setActiveAdmin(@NonNull ComponentName policyReceiver, boolean refreshing,
3508             int userHandle) {
3509         if (mService != null) {
3510             try {
3511                 mService.setActiveAdmin(policyReceiver, refreshing, userHandle);
3512             } catch (RemoteException e) {
3513                 throw e.rethrowFromSystemServer();
3514             }
3515         }
3516     }
3517 
3518     /**
3519      * @hide
3520      */
setActiveAdmin(@onNull ComponentName policyReceiver, boolean refreshing)3521     public void setActiveAdmin(@NonNull ComponentName policyReceiver, boolean refreshing) {
3522         setActiveAdmin(policyReceiver, refreshing, myUserId());
3523     }
3524 
3525     /**
3526      * @hide
3527      */
getRemoveWarning(@ullable ComponentName admin, RemoteCallback result)3528     public void getRemoveWarning(@Nullable ComponentName admin, RemoteCallback result) {
3529         if (mService != null) {
3530             try {
3531                 mService.getRemoveWarning(admin, result, myUserId());
3532             } catch (RemoteException e) {
3533                 throw e.rethrowFromSystemServer();
3534             }
3535         }
3536     }
3537 
3538     /**
3539      * @hide
3540      */
setActivePasswordState(int quality, int length, int letters, int uppercase, int lowercase, int numbers, int symbols, int nonletter, int userHandle)3541     public void setActivePasswordState(int quality, int length, int letters, int uppercase,
3542             int lowercase, int numbers, int symbols, int nonletter, int userHandle) {
3543         if (mService != null) {
3544             try {
3545                 mService.setActivePasswordState(quality, length, letters, uppercase, lowercase,
3546                         numbers, symbols, nonletter, userHandle);
3547             } catch (RemoteException e) {
3548                 throw e.rethrowFromSystemServer();
3549             }
3550         }
3551     }
3552 
3553     /**
3554      * @hide
3555      */
reportPasswordChanged(int userId)3556     public void reportPasswordChanged(int userId) {
3557         if (mService != null) {
3558             try {
3559                 mService.reportPasswordChanged(userId);
3560             } catch (RemoteException e) {
3561                 throw e.rethrowFromSystemServer();
3562             }
3563         }
3564     }
3565 
3566     /**
3567      * @hide
3568      */
reportFailedPasswordAttempt(int userHandle)3569     public void reportFailedPasswordAttempt(int userHandle) {
3570         if (mService != null) {
3571             try {
3572                 mService.reportFailedPasswordAttempt(userHandle);
3573             } catch (RemoteException e) {
3574                 throw e.rethrowFromSystemServer();
3575             }
3576         }
3577     }
3578 
3579     /**
3580      * @hide
3581      */
reportSuccessfulPasswordAttempt(int userHandle)3582     public void reportSuccessfulPasswordAttempt(int userHandle) {
3583         if (mService != null) {
3584             try {
3585                 mService.reportSuccessfulPasswordAttempt(userHandle);
3586             } catch (RemoteException e) {
3587                 throw e.rethrowFromSystemServer();
3588             }
3589         }
3590     }
3591 
3592     /**
3593      * @hide
3594      */
reportFailedFingerprintAttempt(int userHandle)3595     public void reportFailedFingerprintAttempt(int userHandle) {
3596         if (mService != null) {
3597             try {
3598                 mService.reportFailedFingerprintAttempt(userHandle);
3599             } catch (RemoteException e) {
3600                 throw e.rethrowFromSystemServer();
3601             }
3602         }
3603     }
3604 
3605     /**
3606      * @hide
3607      */
reportSuccessfulFingerprintAttempt(int userHandle)3608     public void reportSuccessfulFingerprintAttempt(int userHandle) {
3609         if (mService != null) {
3610             try {
3611                 mService.reportSuccessfulFingerprintAttempt(userHandle);
3612             } catch (RemoteException e) {
3613                 throw e.rethrowFromSystemServer();
3614             }
3615         }
3616     }
3617 
3618     /**
3619      * Should be called when keyguard has been dismissed.
3620      * @hide
3621      */
reportKeyguardDismissed(int userHandle)3622     public void reportKeyguardDismissed(int userHandle) {
3623         if (mService != null) {
3624             try {
3625                 mService.reportKeyguardDismissed(userHandle);
3626             } catch (RemoteException e) {
3627                 throw e.rethrowFromSystemServer();
3628             }
3629         }
3630     }
3631 
3632     /**
3633      * Should be called when keyguard view has been shown to the user.
3634      * @hide
3635      */
reportKeyguardSecured(int userHandle)3636     public void reportKeyguardSecured(int userHandle) {
3637         if (mService != null) {
3638             try {
3639                 mService.reportKeyguardSecured(userHandle);
3640             } catch (RemoteException e) {
3641                 throw e.rethrowFromSystemServer();
3642             }
3643         }
3644     }
3645 
3646     /**
3647      * @hide
3648      * Sets the given package as the device owner.
3649      * Same as {@link #setDeviceOwner(ComponentName, String)} but without setting a device owner name.
3650      * @param who the component name to be registered as device owner.
3651      * @return whether the package was successfully registered as the device owner.
3652      * @throws IllegalArgumentException if the package name is null or invalid
3653      * @throws IllegalStateException If the preconditions mentioned are not met.
3654      */
setDeviceOwner(ComponentName who)3655     public boolean setDeviceOwner(ComponentName who) {
3656         return setDeviceOwner(who, null);
3657     }
3658 
3659     /**
3660      * @hide
3661      */
setDeviceOwner(ComponentName who, int userId)3662     public boolean setDeviceOwner(ComponentName who, int userId)  {
3663         return setDeviceOwner(who, null, userId);
3664     }
3665 
3666     /**
3667      * @hide
3668      */
setDeviceOwner(ComponentName who, String ownerName)3669     public boolean setDeviceOwner(ComponentName who, String ownerName) {
3670         return setDeviceOwner(who, ownerName, UserHandle.USER_SYSTEM);
3671     }
3672 
3673     /**
3674      * @hide
3675      * Sets the given package as the device owner. The package must already be installed. There
3676      * must not already be a device owner.
3677      * Only apps with the MANAGE_PROFILE_AND_DEVICE_OWNERS permission and the shell uid can call
3678      * this method.
3679      * Calling this after the setup phase of the primary user has completed is allowed only if
3680      * the caller is the shell uid, and there are no additional users and no accounts.
3681      * @param who the component name to be registered as device owner.
3682      * @param ownerName the human readable name of the institution that owns this device.
3683      * @param userId ID of the user on which the device owner runs.
3684      * @return whether the package was successfully registered as the device owner.
3685      * @throws IllegalArgumentException if the package name is null or invalid
3686      * @throws IllegalStateException If the preconditions mentioned are not met.
3687      */
setDeviceOwner(ComponentName who, String ownerName, int userId)3688     public boolean setDeviceOwner(ComponentName who, String ownerName, int userId)
3689             throws IllegalArgumentException, IllegalStateException {
3690         if (mService != null) {
3691             try {
3692                 return mService.setDeviceOwner(who, ownerName, userId);
3693             } catch (RemoteException re) {
3694                 throw re.rethrowFromSystemServer();
3695             }
3696         }
3697         return false;
3698     }
3699 
3700     /**
3701      * Used to determine if a particular package has been registered as a Device Owner app.
3702      * A device owner app is a special device admin that cannot be deactivated by the user, once
3703      * activated as a device admin. It also cannot be uninstalled. To check whether a particular
3704      * package is currently registered as the device owner app, pass in the package name from
3705      * {@link Context#getPackageName()} to this method.<p/>This is useful for device
3706      * admin apps that want to check whether they are also registered as the device owner app. The
3707      * exact mechanism by which a device admin app is registered as a device owner app is defined by
3708      * the setup process.
3709      * @param packageName the package name of the app, to compare with the registered device owner
3710      * app, if any.
3711      * @return whether or not the package is registered as the device owner app.
3712      */
isDeviceOwnerApp(String packageName)3713     public boolean isDeviceOwnerApp(String packageName) {
3714         throwIfParentInstance("isDeviceOwnerApp");
3715         return isDeviceOwnerAppOnCallingUser(packageName);
3716     }
3717 
3718     /**
3719      * @return true if a package is registered as device owner, only when it's running on the
3720      * calling user.
3721      *
3722      * <p>Same as {@link #isDeviceOwnerApp}, but bundled code should use it for clarity.
3723      * @hide
3724      */
isDeviceOwnerAppOnCallingUser(String packageName)3725     public boolean isDeviceOwnerAppOnCallingUser(String packageName) {
3726         return isDeviceOwnerAppOnAnyUserInner(packageName, /* callingUserOnly =*/ true);
3727     }
3728 
3729     /**
3730      * @return true if a package is registered as device owner, even if it's running on a different
3731      * user.
3732      *
3733      * <p>Requires the MANAGE_USERS permission.
3734      *
3735      * @hide
3736      */
isDeviceOwnerAppOnAnyUser(String packageName)3737     public boolean isDeviceOwnerAppOnAnyUser(String packageName) {
3738         return isDeviceOwnerAppOnAnyUserInner(packageName, /* callingUserOnly =*/ false);
3739     }
3740 
3741     /**
3742      * @return device owner component name, only when it's running on the calling user.
3743      *
3744      * @hide
3745      */
getDeviceOwnerComponentOnCallingUser()3746     public ComponentName getDeviceOwnerComponentOnCallingUser() {
3747         return getDeviceOwnerComponentInner(/* callingUserOnly =*/ true);
3748     }
3749 
3750     /**
3751      * @return device owner component name, even if it's running on a different user.
3752      *
3753      * <p>Requires the MANAGE_USERS permission.
3754      *
3755      * @hide
3756      */
getDeviceOwnerComponentOnAnyUser()3757     public ComponentName getDeviceOwnerComponentOnAnyUser() {
3758         return getDeviceOwnerComponentInner(/* callingUserOnly =*/ false);
3759     }
3760 
isDeviceOwnerAppOnAnyUserInner(String packageName, boolean callingUserOnly)3761     private boolean isDeviceOwnerAppOnAnyUserInner(String packageName, boolean callingUserOnly) {
3762         if (packageName == null) {
3763             return false;
3764         }
3765         final ComponentName deviceOwner = getDeviceOwnerComponentInner(callingUserOnly);
3766         if (deviceOwner == null) {
3767             return false;
3768         }
3769         return packageName.equals(deviceOwner.getPackageName());
3770     }
3771 
getDeviceOwnerComponentInner(boolean callingUserOnly)3772     private ComponentName getDeviceOwnerComponentInner(boolean callingUserOnly) {
3773         if (mService != null) {
3774             try {
3775                 return mService.getDeviceOwnerComponent(callingUserOnly);
3776             } catch (RemoteException re) {
3777                 throw re.rethrowFromSystemServer();
3778             }
3779         }
3780         return null;
3781     }
3782 
3783     /**
3784      * @return ID of the user who runs device owner, or {@link UserHandle#USER_NULL} if there's
3785      * no device owner.
3786      *
3787      * <p>Requires the MANAGE_USERS permission.
3788      *
3789      * @hide
3790      */
getDeviceOwnerUserId()3791     public int getDeviceOwnerUserId() {
3792         if (mService != null) {
3793             try {
3794                 return mService.getDeviceOwnerUserId();
3795             } catch (RemoteException re) {
3796                 throw re.rethrowFromSystemServer();
3797             }
3798         }
3799         return UserHandle.USER_NULL;
3800     }
3801 
3802     /**
3803      * Clears the current device owner. The caller must be the device owner. This function should be
3804      * used cautiously as once it is called it cannot be undone. The device owner can only be set as
3805      * a part of device setup before setup completes.
3806      *
3807      * @param packageName The package name of the device owner.
3808      * @throws SecurityException if the caller is not in {@code packageName} or {@code packageName}
3809      *             does not own the current device owner component.
3810      */
clearDeviceOwnerApp(String packageName)3811     public void clearDeviceOwnerApp(String packageName) {
3812         throwIfParentInstance("clearDeviceOwnerApp");
3813         if (mService != null) {
3814             try {
3815                 mService.clearDeviceOwner(packageName);
3816             } catch (RemoteException re) {
3817                 throw re.rethrowFromSystemServer();
3818             }
3819         }
3820     }
3821 
3822     /**
3823      * Returns the device owner package name, only if it's running on the calling user.
3824      *
3825      * <p>Bundled components should use {@code getDeviceOwnerComponentOnCallingUser()} for clarity.
3826      *
3827      * @hide
3828      */
3829     @SystemApi
getDeviceOwner()3830     public String getDeviceOwner() {
3831         throwIfParentInstance("getDeviceOwner");
3832         final ComponentName name = getDeviceOwnerComponentOnCallingUser();
3833         return name != null ? name.getPackageName() : null;
3834     }
3835 
3836     /**
3837      * @return true if the device is managed by any device owner.
3838      *
3839      * <p>Requires the MANAGE_USERS permission.
3840      *
3841      * @hide
3842      */
isDeviceManaged()3843     public boolean isDeviceManaged() {
3844         return getDeviceOwnerComponentOnAnyUser() != null;
3845     }
3846 
3847     /**
3848      * Returns the device owner name.  Note this method *will* return the device owner
3849      * name when it's running on a different user.
3850      *
3851      * <p>Requires the MANAGE_USERS permission.
3852      *
3853      * @hide
3854      */
3855     @SystemApi
getDeviceOwnerNameOnAnyUser()3856     public String getDeviceOwnerNameOnAnyUser() {
3857         throwIfParentInstance("getDeviceOwnerNameOnAnyUser");
3858         if (mService != null) {
3859             try {
3860                 return mService.getDeviceOwnerName();
3861             } catch (RemoteException re) {
3862                 throw re.rethrowFromSystemServer();
3863             }
3864         }
3865         return null;
3866     }
3867 
3868     /**
3869      * @hide
3870      * @deprecated Do not use
3871      * @removed
3872      */
3873     @Deprecated
3874     @SystemApi
getDeviceInitializerApp()3875     public String getDeviceInitializerApp() {
3876         return null;
3877     }
3878 
3879     /**
3880      * @hide
3881      * @deprecated Do not use
3882      * @removed
3883      */
3884     @Deprecated
3885     @SystemApi
getDeviceInitializerComponent()3886     public ComponentName getDeviceInitializerComponent() {
3887         return null;
3888     }
3889 
3890     /**
3891      * @hide
3892      * @deprecated Use #ACTION_SET_PROFILE_OWNER
3893      * Sets the given component as an active admin and registers the package as the profile
3894      * owner for this user. The package must already be installed and there shouldn't be
3895      * an existing profile owner registered for this user. Also, this method must be called
3896      * before the user setup has been completed.
3897      * <p>
3898      * This method can only be called by system apps that hold MANAGE_USERS permission and
3899      * MANAGE_DEVICE_ADMINS permission.
3900      * @param admin The component to register as an active admin and profile owner.
3901      * @param ownerName The user-visible name of the entity that is managing this user.
3902      * @return whether the admin was successfully registered as the profile owner.
3903      * @throws IllegalArgumentException if packageName is null, the package isn't installed, or
3904      *         the user has already been set up.
3905      */
3906     @SystemApi
setActiveProfileOwner(@onNull ComponentName admin, @Deprecated String ownerName)3907     public boolean setActiveProfileOwner(@NonNull ComponentName admin, @Deprecated String ownerName)
3908             throws IllegalArgumentException {
3909         throwIfParentInstance("setActiveProfileOwner");
3910         if (mService != null) {
3911             try {
3912                 final int myUserId = myUserId();
3913                 mService.setActiveAdmin(admin, false, myUserId);
3914                 return mService.setProfileOwner(admin, ownerName, myUserId);
3915             } catch (RemoteException re) {
3916                 throw re.rethrowFromSystemServer();
3917             }
3918         }
3919         return false;
3920     }
3921 
3922     /**
3923      * Clears the active profile owner and removes all user restrictions. The caller must be from
3924      * the same package as the active profile owner for this user, otherwise a SecurityException
3925      * will be thrown.
3926      * <p>
3927      * This doesn't work for managed profile owners.
3928      *
3929      * @param admin The component to remove as the profile owner.
3930      * @throws SecurityException if {@code admin} is not an active profile owner.
3931      */
clearProfileOwner(@onNull ComponentName admin)3932     public void clearProfileOwner(@NonNull ComponentName admin) {
3933         throwIfParentInstance("clearProfileOwner");
3934         if (mService != null) {
3935             try {
3936                 mService.clearProfileOwner(admin);
3937             } catch (RemoteException re) {
3938                 throw re.rethrowFromSystemServer();
3939             }
3940         }
3941     }
3942 
3943     /**
3944      * @hide
3945      * Checks whether the user was already setup.
3946      */
hasUserSetupCompleted()3947     public boolean hasUserSetupCompleted() {
3948         if (mService != null) {
3949             try {
3950                 return mService.hasUserSetupCompleted();
3951             } catch (RemoteException re) {
3952                 throw re.rethrowFromSystemServer();
3953             }
3954         }
3955         return true;
3956     }
3957 
3958     /**
3959      * @hide
3960      * Sets the given component as the profile owner of the given user profile. The package must
3961      * already be installed. There must not already be a profile owner for this user.
3962      * Only apps with the MANAGE_PROFILE_AND_DEVICE_OWNERS permission and the shell uid can call
3963      * this method.
3964      * Calling this after the setup phase of the specified user has completed is allowed only if:
3965      * - the caller is SYSTEM_UID.
3966      * - or the caller is the shell uid, and there are no accounts on the specified user.
3967      * @param admin the component name to be registered as profile owner.
3968      * @param ownerName the human readable name of the organisation associated with this DPM.
3969      * @param userHandle the userId to set the profile owner for.
3970      * @return whether the component was successfully registered as the profile owner.
3971      * @throws IllegalArgumentException if admin is null, the package isn't installed, or the
3972      * preconditions mentioned are not met.
3973      */
setProfileOwner(@onNull ComponentName admin, @Deprecated String ownerName, int userHandle)3974     public boolean setProfileOwner(@NonNull ComponentName admin, @Deprecated String ownerName,
3975             int userHandle) throws IllegalArgumentException {
3976         if (mService != null) {
3977             try {
3978                 if (ownerName == null) {
3979                     ownerName = "";
3980                 }
3981                 return mService.setProfileOwner(admin, ownerName, userHandle);
3982             } catch (RemoteException re) {
3983                 throw re.rethrowFromSystemServer();
3984             }
3985         }
3986         return false;
3987     }
3988 
3989     /**
3990      * Sets the device owner information to be shown on the lock screen.
3991      * <p>
3992      * If the device owner information is {@code null} or empty then the device owner info is
3993      * cleared and the user owner info is shown on the lock screen if it is set.
3994      * <p>
3995      * If the device owner information contains only whitespaces then the message on the lock screen
3996      * will be blank and the user will not be allowed to change it.
3997      * <p>
3998      * If the device owner information needs to be localized, it is the responsibility of the
3999      * {@link DeviceAdminReceiver} to listen to the {@link Intent#ACTION_LOCALE_CHANGED} broadcast
4000      * and set a new version of this string accordingly.
4001      *
4002      * @param admin The name of the admin component to check.
4003      * @param info Device owner information which will be displayed instead of the user owner info.
4004      * @throws SecurityException if {@code admin} is not a device owner.
4005      */
setDeviceOwnerLockScreenInfo(@onNull ComponentName admin, CharSequence info)4006     public void setDeviceOwnerLockScreenInfo(@NonNull ComponentName admin, CharSequence info) {
4007         throwIfParentInstance("setDeviceOwnerLockScreenInfo");
4008         if (mService != null) {
4009             try {
4010                 mService.setDeviceOwnerLockScreenInfo(admin, info);
4011             } catch (RemoteException re) {
4012                 throw re.rethrowFromSystemServer();
4013             }
4014         }
4015     }
4016 
4017     /**
4018      * @return The device owner information. If it is not set returns {@code null}.
4019      */
getDeviceOwnerLockScreenInfo()4020     public CharSequence getDeviceOwnerLockScreenInfo() {
4021         throwIfParentInstance("getDeviceOwnerLockScreenInfo");
4022         if (mService != null) {
4023             try {
4024                 return mService.getDeviceOwnerLockScreenInfo();
4025             } catch (RemoteException re) {
4026                 throw re.rethrowFromSystemServer();
4027             }
4028         }
4029         return null;
4030     }
4031 
4032     /**
4033      * Called by device or profile owners to suspend packages for this user.
4034      * <p>
4035      * A suspended package will not be able to start activities. Its notifications will be hidden,
4036      * it will not show up in recents, will not be able to show toasts or dialogs or ring the
4037      * device.
4038      * <p>
4039      * The package must already be installed. If the package is uninstalled while suspended the
4040      * package will no longer be suspended. The admin can block this by using
4041      * {@link #setUninstallBlocked}.
4042      *
4043      * @param admin The name of the admin component to check.
4044      * @param packageNames The package names to suspend or unsuspend.
4045      * @param suspended If set to {@code true} than the packages will be suspended, if set to
4046      *            {@code false} the packages will be unsuspended.
4047      * @return an array of package names for which the suspended status is not set as requested in
4048      *         this method.
4049      * @throws SecurityException if {@code admin} is not a device or profile owner.
4050      */
setPackagesSuspended(@onNull ComponentName admin, String[] packageNames, boolean suspended)4051     public String[] setPackagesSuspended(@NonNull ComponentName admin, String[] packageNames,
4052             boolean suspended) {
4053         throwIfParentInstance("setPackagesSuspended");
4054         if (mService != null) {
4055             try {
4056                 return mService.setPackagesSuspended(admin, packageNames, suspended);
4057             } catch (RemoteException re) {
4058                 throw re.rethrowFromSystemServer();
4059             }
4060         }
4061         return packageNames;
4062     }
4063 
4064     /**
4065      * Called by device or profile owners to determine if a package is suspended.
4066      *
4067      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4068      * @param packageName The name of the package to retrieve the suspended status of.
4069      * @return {@code true} if the package is suspended or {@code false} if the package is not
4070      *         suspended, could not be found or an error occurred.
4071      * @throws SecurityException if {@code admin} is not a device or profile owner.
4072      * @throws NameNotFoundException if the package could not be found.
4073      */
isPackageSuspended(@onNull ComponentName admin, String packageName)4074     public boolean isPackageSuspended(@NonNull ComponentName admin, String packageName)
4075             throws NameNotFoundException {
4076         throwIfParentInstance("isPackageSuspended");
4077         if (mService != null) {
4078             try {
4079                 return mService.isPackageSuspended(admin, packageName);
4080             } catch (RemoteException e) {
4081                 throw e.rethrowFromSystemServer();
4082             } catch (IllegalArgumentException ex) {
4083                 throw new NameNotFoundException(packageName);
4084             }
4085         }
4086         return false;
4087     }
4088 
4089     /**
4090      * Sets the enabled state of the profile. A profile should be enabled only once it is ready to
4091      * be used. Only the profile owner can call this.
4092      *
4093      * @see #isProfileOwnerApp
4094      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4095      * @throws SecurityException if {@code admin} is not a profile owner.
4096      */
setProfileEnabled(@onNull ComponentName admin)4097     public void setProfileEnabled(@NonNull ComponentName admin) {
4098         throwIfParentInstance("setProfileEnabled");
4099         if (mService != null) {
4100             try {
4101                 mService.setProfileEnabled(admin);
4102             } catch (RemoteException e) {
4103                 throw e.rethrowFromSystemServer();
4104             }
4105         }
4106     }
4107 
4108     /**
4109      * Sets the name of the profile. In the device owner case it sets the name of the user which it
4110      * is called from. Only a profile owner or device owner can call this. If this is never called
4111      * by the profile or device owner, the name will be set to default values.
4112      *
4113      * @see #isProfileOwnerApp
4114      * @see #isDeviceOwnerApp
4115      * @param admin Which {@link DeviceAdminReceiver} this request is associate with.
4116      * @param profileName The name of the profile.
4117      * @throws SecurityException if {@code admin} is not a device or profile owner.
4118      */
setProfileName(@onNull ComponentName admin, String profileName)4119     public void setProfileName(@NonNull ComponentName admin, String profileName) {
4120         throwIfParentInstance("setProfileName");
4121         if (mService != null) {
4122             try {
4123                 mService.setProfileName(admin, profileName);
4124             } catch (RemoteException e) {
4125                 throw e.rethrowFromSystemServer();
4126             }
4127         }
4128     }
4129 
4130     /**
4131      * Used to determine if a particular package is registered as the profile owner for the
4132      * user. A profile owner is a special device admin that has additional privileges
4133      * within the profile.
4134      *
4135      * @param packageName The package name of the app to compare with the registered profile owner.
4136      * @return Whether or not the package is registered as the profile owner.
4137      */
isProfileOwnerApp(String packageName)4138     public boolean isProfileOwnerApp(String packageName) {
4139         throwIfParentInstance("isProfileOwnerApp");
4140         if (mService != null) {
4141             try {
4142                 ComponentName profileOwner = mService.getProfileOwner(myUserId());
4143                 return profileOwner != null
4144                         && profileOwner.getPackageName().equals(packageName);
4145             } catch (RemoteException re) {
4146                 throw re.rethrowFromSystemServer();
4147             }
4148         }
4149         return false;
4150     }
4151 
4152     /**
4153      * @hide
4154      * @return the packageName of the owner of the given user profile or {@code null} if no profile
4155      * owner has been set for that user.
4156      * @throws IllegalArgumentException if the userId is invalid.
4157      */
4158     @SystemApi
getProfileOwner()4159     public ComponentName getProfileOwner() throws IllegalArgumentException {
4160         throwIfParentInstance("getProfileOwner");
4161         return getProfileOwnerAsUser(Process.myUserHandle().getIdentifier());
4162     }
4163 
4164     /**
4165      * @see #getProfileOwner()
4166      * @hide
4167      */
getProfileOwnerAsUser(final int userId)4168     public ComponentName getProfileOwnerAsUser(final int userId) throws IllegalArgumentException {
4169         if (mService != null) {
4170             try {
4171                 return mService.getProfileOwner(userId);
4172             } catch (RemoteException re) {
4173                 throw re.rethrowFromSystemServer();
4174             }
4175         }
4176         return null;
4177     }
4178 
4179     /**
4180      * @hide
4181      * @return the human readable name of the organisation associated with this DPM or {@code null}
4182      *         if one is not set.
4183      * @throws IllegalArgumentException if the userId is invalid.
4184      */
getProfileOwnerName()4185     public String getProfileOwnerName() throws IllegalArgumentException {
4186         if (mService != null) {
4187             try {
4188                 return mService.getProfileOwnerName(Process.myUserHandle().getIdentifier());
4189             } catch (RemoteException re) {
4190                 throw re.rethrowFromSystemServer();
4191             }
4192         }
4193         return null;
4194     }
4195 
4196     /**
4197      * @hide
4198      * @param userId The user for whom to fetch the profile owner name, if any.
4199      * @return the human readable name of the organisation associated with this profile owner or
4200      *         null if one is not set.
4201      * @throws IllegalArgumentException if the userId is invalid.
4202      */
4203     @SystemApi
getProfileOwnerNameAsUser(int userId)4204     public String getProfileOwnerNameAsUser(int userId) throws IllegalArgumentException {
4205         throwIfParentInstance("getProfileOwnerNameAsUser");
4206         if (mService != null) {
4207             try {
4208                 return mService.getProfileOwnerName(userId);
4209             } catch (RemoteException re) {
4210                 throw re.rethrowFromSystemServer();
4211             }
4212         }
4213         return null;
4214     }
4215 
4216     /**
4217      * Called by a profile owner or device owner to add a default intent handler activity for
4218      * intents that match a certain intent filter. This activity will remain the default intent
4219      * handler even if the set of potential event handlers for the intent filter changes and if the
4220      * intent preferences are reset.
4221      * <p>
4222      * The default disambiguation mechanism takes over if the activity is not installed (anymore).
4223      * When the activity is (re)installed, it is automatically reset as default intent handler for
4224      * the filter.
4225      * <p>
4226      * The calling device admin must be a profile owner or device owner. If it is not, a security
4227      * exception will be thrown.
4228      *
4229      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4230      * @param filter The IntentFilter for which a default handler is added.
4231      * @param activity The Activity that is added as default intent handler.
4232      * @throws SecurityException if {@code admin} is not a device or profile owner.
4233      */
addPersistentPreferredActivity(@onNull ComponentName admin, IntentFilter filter, @NonNull ComponentName activity)4234     public void addPersistentPreferredActivity(@NonNull ComponentName admin, IntentFilter filter,
4235             @NonNull ComponentName activity) {
4236         throwIfParentInstance("addPersistentPreferredActivity");
4237         if (mService != null) {
4238             try {
4239                 mService.addPersistentPreferredActivity(admin, filter, activity);
4240             } catch (RemoteException e) {
4241                 throw e.rethrowFromSystemServer();
4242             }
4243         }
4244     }
4245 
4246     /**
4247      * Called by a profile owner or device owner to remove all persistent intent handler preferences
4248      * associated with the given package that were set by {@link #addPersistentPreferredActivity}.
4249      * <p>
4250      * The calling device admin must be a profile owner. If it is not, a security exception will be
4251      * thrown.
4252      *
4253      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4254      * @param packageName The name of the package for which preferences are removed.
4255      * @throws SecurityException if {@code admin} is not a device or profile owner.
4256      */
clearPackagePersistentPreferredActivities(@onNull ComponentName admin, String packageName)4257     public void clearPackagePersistentPreferredActivities(@NonNull ComponentName admin,
4258             String packageName) {
4259         throwIfParentInstance("clearPackagePersistentPreferredActivities");
4260         if (mService != null) {
4261             try {
4262                 mService.clearPackagePersistentPreferredActivities(admin, packageName);
4263             } catch (RemoteException e) {
4264                 throw e.rethrowFromSystemServer();
4265             }
4266         }
4267     }
4268 
4269     /**
4270      * Called by a profile owner or device owner to grant permission to a package to manage
4271      * application restrictions for the calling user via {@link #setApplicationRestrictions} and
4272      * {@link #getApplicationRestrictions}.
4273      * <p>
4274      * This permission is persistent until it is later cleared by calling this method with a
4275      * {@code null} value or uninstalling the managing package.
4276      * <p>
4277      * The supplied application restriction managing package must be installed when calling this
4278      * API, otherwise an {@link NameNotFoundException} will be thrown.
4279      *
4280      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4281      * @param packageName The package name which will be given access to application restrictions
4282      *            APIs. If {@code null} is given the current package will be cleared.
4283      * @throws SecurityException if {@code admin} is not a device or profile owner.
4284      * @throws NameNotFoundException if {@code packageName} is not found
4285      */
setApplicationRestrictionsManagingPackage(@onNull ComponentName admin, @Nullable String packageName)4286     public void setApplicationRestrictionsManagingPackage(@NonNull ComponentName admin,
4287             @Nullable String packageName) throws NameNotFoundException {
4288         throwIfParentInstance("setApplicationRestrictionsManagingPackage");
4289         if (mService != null) {
4290             try {
4291                 if (!mService.setApplicationRestrictionsManagingPackage(admin, packageName)) {
4292                     throw new NameNotFoundException(packageName);
4293                 }
4294             } catch (RemoteException e) {
4295                 throw e.rethrowFromSystemServer();
4296             }
4297         }
4298     }
4299 
4300     /**
4301      * Called by a profile owner or device owner to retrieve the application restrictions managing
4302      * package for the current user, or {@code null} if none is set.
4303      *
4304      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4305      * @return The package name allowed to manage application restrictions on the current user, or
4306      *         {@code null} if none is set.
4307      * @throws SecurityException if {@code admin} is not a device or profile owner.
4308      */
getApplicationRestrictionsManagingPackage(@onNull ComponentName admin)4309     public String getApplicationRestrictionsManagingPackage(@NonNull ComponentName admin) {
4310         throwIfParentInstance("getApplicationRestrictionsManagingPackage");
4311         if (mService != null) {
4312             try {
4313                 return mService.getApplicationRestrictionsManagingPackage(admin);
4314             } catch (RemoteException e) {
4315                 throw e.rethrowFromSystemServer();
4316             }
4317         }
4318         return null;
4319     }
4320 
4321     /**
4322      * Called by any application to find out whether it has been granted permission via
4323      * {@link #setApplicationRestrictionsManagingPackage} to manage application restrictions
4324      * for the calling user.
4325      *
4326      * <p>This is done by comparing the calling Linux uid with the uid of the package specified by
4327      * that method.
4328      */
isCallerApplicationRestrictionsManagingPackage()4329     public boolean isCallerApplicationRestrictionsManagingPackage() {
4330         throwIfParentInstance("isCallerApplicationRestrictionsManagingPackage");
4331         if (mService != null) {
4332             try {
4333                 return mService.isCallerApplicationRestrictionsManagingPackage();
4334             } catch (RemoteException e) {
4335                 throw e.rethrowFromSystemServer();
4336             }
4337         }
4338         return false;
4339     }
4340 
4341     /**
4342      * Sets the application restrictions for a given target application running in the calling user.
4343      * <p>
4344      * The caller must be a profile or device owner on that user, or the package allowed to manage
4345      * application restrictions via {@link #setApplicationRestrictionsManagingPackage}; otherwise a
4346      * security exception will be thrown.
4347      * <p>
4348      * The provided {@link Bundle} consists of key-value pairs, where the types of values may be:
4349      * <ul>
4350      * <li>{@code boolean}
4351      * <li>{@code int}
4352      * <li>{@code String} or {@code String[]}
4353      * <li>From {@link android.os.Build.VERSION_CODES#M}, {@code Bundle} or {@code Bundle[]}
4354      * </ul>
4355      * <p>
4356      * If the restrictions are not available yet, but may be applied in the near future, the caller
4357      * can notify the target application of that by adding
4358      * {@link UserManager#KEY_RESTRICTIONS_PENDING} to the settings parameter.
4359      * <p>
4360      * The application restrictions are only made visible to the target application via
4361      * {@link UserManager#getApplicationRestrictions(String)}, in addition to the profile or device
4362      * owner, and the application restrictions managing package via
4363      * {@link #getApplicationRestrictions}.
4364      *
4365      * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or
4366      *            {@code null} if called by the application restrictions managing package.
4367      * @param packageName The name of the package to update restricted settings for.
4368      * @param settings A {@link Bundle} to be parsed by the receiving application, conveying a new
4369      *            set of active restrictions.
4370      * @throws SecurityException if {@code admin} is not a device or profile owner.
4371      * @see #setApplicationRestrictionsManagingPackage
4372      * @see UserManager#KEY_RESTRICTIONS_PENDING
4373      */
setApplicationRestrictions(@ullable ComponentName admin, String packageName, Bundle settings)4374     public void setApplicationRestrictions(@Nullable ComponentName admin, String packageName,
4375             Bundle settings) {
4376         throwIfParentInstance("setApplicationRestrictions");
4377         if (mService != null) {
4378             try {
4379                 mService.setApplicationRestrictions(admin, packageName, settings);
4380             } catch (RemoteException e) {
4381                 throw e.rethrowFromSystemServer();
4382             }
4383         }
4384     }
4385 
4386     /**
4387      * Sets a list of configuration features to enable for a TrustAgent component. This is meant to
4388      * be used in conjunction with {@link #KEYGUARD_DISABLE_TRUST_AGENTS}, which disables all trust
4389      * agents but those enabled by this function call. If flag
4390      * {@link #KEYGUARD_DISABLE_TRUST_AGENTS} is not set, then this call has no effect.
4391      * <p>
4392      * The calling device admin must have requested
4393      * {@link DeviceAdminInfo#USES_POLICY_DISABLE_KEYGUARD_FEATURES} to be able to call this method;
4394      * if not, a security exception will be thrown.
4395      * <p>
4396      * This method can be called on the {@link DevicePolicyManager} instance returned by
4397      * {@link #getParentProfileInstance(ComponentName)} in order to set the configuration for
4398      * the parent profile.
4399      *
4400      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4401      * @param target Component name of the agent to be enabled.
4402      * @param configuration TrustAgent-specific feature bundle. If null for any admin, agent will be
4403      *            strictly disabled according to the state of the
4404      *            {@link #KEYGUARD_DISABLE_TRUST_AGENTS} flag.
4405      *            <p>
4406      *            If {@link #KEYGUARD_DISABLE_TRUST_AGENTS} is set and options is not null for all
4407      *            admins, then it's up to the TrustAgent itself to aggregate the values from all
4408      *            device admins.
4409      *            <p>
4410      *            Consult documentation for the specific TrustAgent to determine legal options
4411      *            parameters.
4412      * @throws SecurityException if {@code admin} is not an active administrator or does not use
4413      *             {@link DeviceAdminInfo#USES_POLICY_DISABLE_KEYGUARD_FEATURES}
4414      */
setTrustAgentConfiguration(@onNull ComponentName admin, @NonNull ComponentName target, PersistableBundle configuration)4415     public void setTrustAgentConfiguration(@NonNull ComponentName admin,
4416             @NonNull ComponentName target, PersistableBundle configuration) {
4417         if (mService != null) {
4418             try {
4419                 mService.setTrustAgentConfiguration(admin, target, configuration, mParentInstance);
4420             } catch (RemoteException e) {
4421                 throw e.rethrowFromSystemServer();
4422             }
4423         }
4424     }
4425 
4426     /**
4427      * Gets configuration for the given trust agent based on aggregating all calls to
4428      * {@link #setTrustAgentConfiguration(ComponentName, ComponentName, PersistableBundle)} for
4429      * all device admins.
4430      * <p>
4431      * This method can be called on the {@link DevicePolicyManager} instance returned by
4432      * {@link #getParentProfileInstance(ComponentName)} in order to retrieve the configuration set
4433      * on the parent profile.
4434      *
4435      * @param admin Which {@link DeviceAdminReceiver} this request is associated with. If null,
4436      * this function returns a list of configurations for all admins that declare
4437      * {@link #KEYGUARD_DISABLE_TRUST_AGENTS}. If any admin declares
4438      * {@link #KEYGUARD_DISABLE_TRUST_AGENTS} but doesn't call
4439      * {@link #setTrustAgentConfiguration(ComponentName, ComponentName, PersistableBundle)}
4440      * for this {@param agent} or calls it with a null configuration, null is returned.
4441      * @param agent Which component to get enabled features for.
4442      * @return configuration for the given trust agent.
4443      */
getTrustAgentConfiguration(@ullable ComponentName admin, @NonNull ComponentName agent)4444     public List<PersistableBundle> getTrustAgentConfiguration(@Nullable ComponentName admin,
4445             @NonNull ComponentName agent) {
4446         return getTrustAgentConfiguration(admin, agent, myUserId());
4447     }
4448 
4449     /** @hide per-user version */
getTrustAgentConfiguration(@ullable ComponentName admin, @NonNull ComponentName agent, int userHandle)4450     public List<PersistableBundle> getTrustAgentConfiguration(@Nullable ComponentName admin,
4451             @NonNull ComponentName agent, int userHandle) {
4452         if (mService != null) {
4453             try {
4454                 return mService.getTrustAgentConfiguration(admin, agent, userHandle,
4455                         mParentInstance);
4456             } catch (RemoteException e) {
4457                 throw e.rethrowFromSystemServer();
4458             }
4459         }
4460         return new ArrayList<PersistableBundle>(); // empty list
4461     }
4462 
4463     /**
4464      * Called by a profile owner of a managed profile to set whether caller-Id information from the
4465      * managed profile will be shown in the parent profile, for incoming calls.
4466      * <p>
4467      * The calling device admin must be a profile owner. If it is not, a security exception will be
4468      * thrown.
4469      *
4470      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4471      * @param disabled If true caller-Id information in the managed profile is not displayed.
4472      * @throws SecurityException if {@code admin} is not a device or profile owner.
4473      */
setCrossProfileCallerIdDisabled(@onNull ComponentName admin, boolean disabled)4474     public void setCrossProfileCallerIdDisabled(@NonNull ComponentName admin, boolean disabled) {
4475         throwIfParentInstance("setCrossProfileCallerIdDisabled");
4476         if (mService != null) {
4477             try {
4478                 mService.setCrossProfileCallerIdDisabled(admin, disabled);
4479             } catch (RemoteException e) {
4480                 throw e.rethrowFromSystemServer();
4481             }
4482         }
4483     }
4484 
4485     /**
4486      * Called by a profile owner of a managed profile to determine whether or not caller-Id
4487      * information has been disabled.
4488      * <p>
4489      * The calling device admin must be a profile owner. If it is not, a security exception will be
4490      * thrown.
4491      *
4492      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4493      * @throws SecurityException if {@code admin} is not a device or profile owner.
4494      */
getCrossProfileCallerIdDisabled(@onNull ComponentName admin)4495     public boolean getCrossProfileCallerIdDisabled(@NonNull ComponentName admin) {
4496         throwIfParentInstance("getCrossProfileCallerIdDisabled");
4497         if (mService != null) {
4498             try {
4499                 return mService.getCrossProfileCallerIdDisabled(admin);
4500             } catch (RemoteException e) {
4501                 throw e.rethrowFromSystemServer();
4502             }
4503         }
4504         return false;
4505     }
4506 
4507     /**
4508      * Determine whether or not caller-Id information has been disabled.
4509      *
4510      * @param userHandle The user for whom to check the caller-id permission
4511      * @hide
4512      */
getCrossProfileCallerIdDisabled(UserHandle userHandle)4513     public boolean getCrossProfileCallerIdDisabled(UserHandle userHandle) {
4514         if (mService != null) {
4515             try {
4516                 return mService.getCrossProfileCallerIdDisabledForUser(userHandle.getIdentifier());
4517             } catch (RemoteException e) {
4518                 throw e.rethrowFromSystemServer();
4519             }
4520         }
4521         return false;
4522     }
4523 
4524     /**
4525      * Called by a profile owner of a managed profile to set whether contacts search from the
4526      * managed profile will be shown in the parent profile, for incoming calls.
4527      * <p>
4528      * The calling device admin must be a profile owner. If it is not, a security exception will be
4529      * thrown.
4530      *
4531      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4532      * @param disabled If true contacts search in the managed profile is not displayed.
4533      * @throws SecurityException if {@code admin} is not a device or profile owner.
4534      */
setCrossProfileContactsSearchDisabled(@onNull ComponentName admin, boolean disabled)4535     public void setCrossProfileContactsSearchDisabled(@NonNull ComponentName admin,
4536             boolean disabled) {
4537         throwIfParentInstance("setCrossProfileContactsSearchDisabled");
4538         if (mService != null) {
4539             try {
4540                 mService.setCrossProfileContactsSearchDisabled(admin, disabled);
4541             } catch (RemoteException e) {
4542                 throw e.rethrowFromSystemServer();
4543             }
4544         }
4545     }
4546 
4547     /**
4548      * Called by a profile owner of a managed profile to determine whether or not contacts search
4549      * has been disabled.
4550      * <p>
4551      * The calling device admin must be a profile owner. If it is not, a security exception will be
4552      * thrown.
4553      *
4554      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4555      * @throws SecurityException if {@code admin} is not a device or profile owner.
4556      */
getCrossProfileContactsSearchDisabled(@onNull ComponentName admin)4557     public boolean getCrossProfileContactsSearchDisabled(@NonNull ComponentName admin) {
4558         throwIfParentInstance("getCrossProfileContactsSearchDisabled");
4559         if (mService != null) {
4560             try {
4561                 return mService.getCrossProfileContactsSearchDisabled(admin);
4562             } catch (RemoteException e) {
4563                 throw e.rethrowFromSystemServer();
4564             }
4565         }
4566         return false;
4567     }
4568 
4569 
4570     /**
4571      * Determine whether or not contacts search has been disabled.
4572      *
4573      * @param userHandle The user for whom to check the contacts search permission
4574      * @hide
4575      */
getCrossProfileContactsSearchDisabled(@onNull UserHandle userHandle)4576     public boolean getCrossProfileContactsSearchDisabled(@NonNull UserHandle userHandle) {
4577         if (mService != null) {
4578             try {
4579                 return mService
4580                         .getCrossProfileContactsSearchDisabledForUser(userHandle.getIdentifier());
4581             } catch (RemoteException e) {
4582                 throw e.rethrowFromSystemServer();
4583             }
4584         }
4585         return false;
4586     }
4587 
4588     /**
4589      * Start Quick Contact on the managed profile for the user, if the policy allows.
4590      *
4591      * @hide
4592      */
startManagedQuickContact(String actualLookupKey, long actualContactId, boolean isContactIdIgnored, long directoryId, Intent originalIntent)4593     public void startManagedQuickContact(String actualLookupKey, long actualContactId,
4594             boolean isContactIdIgnored, long directoryId, Intent originalIntent) {
4595         if (mService != null) {
4596             try {
4597                 mService.startManagedQuickContact(actualLookupKey, actualContactId,
4598                         isContactIdIgnored, directoryId, originalIntent);
4599             } catch (RemoteException e) {
4600                 throw e.rethrowFromSystemServer();
4601             }
4602         }
4603     }
4604 
4605     /**
4606      * Start Quick Contact on the managed profile for the user, if the policy allows.
4607      * @hide
4608      */
startManagedQuickContact(String actualLookupKey, long actualContactId, Intent originalIntent)4609     public void startManagedQuickContact(String actualLookupKey, long actualContactId,
4610             Intent originalIntent) {
4611         startManagedQuickContact(actualLookupKey, actualContactId, false, Directory.DEFAULT,
4612                 originalIntent);
4613     }
4614 
4615     /**
4616      * Called by a profile owner of a managed profile to set whether bluetooth devices can access
4617      * enterprise contacts.
4618      * <p>
4619      * The calling device admin must be a profile owner. If it is not, a security exception will be
4620      * thrown.
4621      * <p>
4622      * This API works on managed profile only.
4623      *
4624      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4625      * @param disabled If true, bluetooth devices cannot access enterprise contacts.
4626      * @throws SecurityException if {@code admin} is not a device or profile owner.
4627      */
setBluetoothContactSharingDisabled(@onNull ComponentName admin, boolean disabled)4628     public void setBluetoothContactSharingDisabled(@NonNull ComponentName admin, boolean disabled) {
4629         throwIfParentInstance("setBluetoothContactSharingDisabled");
4630         if (mService != null) {
4631             try {
4632                 mService.setBluetoothContactSharingDisabled(admin, disabled);
4633             } catch (RemoteException e) {
4634                 throw e.rethrowFromSystemServer();
4635             }
4636         }
4637     }
4638 
4639     /**
4640      * Called by a profile owner of a managed profile to determine whether or not Bluetooth devices
4641      * cannot access enterprise contacts.
4642      * <p>
4643      * The calling device admin must be a profile owner. If it is not, a security exception will be
4644      * thrown.
4645      * <p>
4646      * This API works on managed profile only.
4647      *
4648      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4649      * @throws SecurityException if {@code admin} is not a device or profile owner.
4650      */
getBluetoothContactSharingDisabled(@onNull ComponentName admin)4651     public boolean getBluetoothContactSharingDisabled(@NonNull ComponentName admin) {
4652         throwIfParentInstance("getBluetoothContactSharingDisabled");
4653         if (mService != null) {
4654             try {
4655                 return mService.getBluetoothContactSharingDisabled(admin);
4656             } catch (RemoteException e) {
4657                 throw e.rethrowFromSystemServer();
4658             }
4659         }
4660         return true;
4661     }
4662 
4663     /**
4664      * Determine whether or not Bluetooth devices cannot access contacts.
4665      * <p>
4666      * This API works on managed profile UserHandle only.
4667      *
4668      * @param userHandle The user for whom to check the caller-id permission
4669      * @hide
4670      */
getBluetoothContactSharingDisabled(UserHandle userHandle)4671     public boolean getBluetoothContactSharingDisabled(UserHandle userHandle) {
4672         if (mService != null) {
4673             try {
4674                 return mService.getBluetoothContactSharingDisabledForUser(userHandle
4675                         .getIdentifier());
4676             } catch (RemoteException e) {
4677                 throw e.rethrowFromSystemServer();
4678             }
4679         }
4680         return true;
4681     }
4682 
4683     /**
4684      * Called by the profile owner of a managed profile so that some intents sent in the managed
4685      * profile can also be resolved in the parent, or vice versa. Only activity intents are
4686      * supported.
4687      *
4688      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4689      * @param filter The {@link IntentFilter} the intent has to match to be also resolved in the
4690      *            other profile
4691      * @param flags {@link DevicePolicyManager#FLAG_MANAGED_CAN_ACCESS_PARENT} and
4692      *            {@link DevicePolicyManager#FLAG_PARENT_CAN_ACCESS_MANAGED} are supported.
4693      * @throws SecurityException if {@code admin} is not a device or profile owner.
4694      */
addCrossProfileIntentFilter(@onNull ComponentName admin, IntentFilter filter, int flags)4695     public void addCrossProfileIntentFilter(@NonNull ComponentName admin, IntentFilter filter, int flags) {
4696         throwIfParentInstance("addCrossProfileIntentFilter");
4697         if (mService != null) {
4698             try {
4699                 mService.addCrossProfileIntentFilter(admin, filter, flags);
4700             } catch (RemoteException e) {
4701                 throw e.rethrowFromSystemServer();
4702             }
4703         }
4704     }
4705 
4706     /**
4707      * Called by a profile owner of a managed profile to remove the cross-profile intent filters
4708      * that go from the managed profile to the parent, or from the parent to the managed profile.
4709      * Only removes those that have been set by the profile owner.
4710      *
4711      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4712      * @throws SecurityException if {@code admin} is not a device or profile owner.
4713      */
clearCrossProfileIntentFilters(@onNull ComponentName admin)4714     public void clearCrossProfileIntentFilters(@NonNull ComponentName admin) {
4715         throwIfParentInstance("clearCrossProfileIntentFilters");
4716         if (mService != null) {
4717             try {
4718                 mService.clearCrossProfileIntentFilters(admin);
4719             } catch (RemoteException e) {
4720                 throw e.rethrowFromSystemServer();
4721             }
4722         }
4723     }
4724 
4725     /**
4726      * Called by a profile or device owner to set the permitted accessibility services. When set by
4727      * a device owner or profile owner the restriction applies to all profiles of the user the
4728      * device owner or profile owner is an admin for. By default the user can use any accessiblity
4729      * service. When zero or more packages have been added, accessiblity services that are not in
4730      * the list and not part of the system can not be enabled by the user.
4731      * <p>
4732      * Calling with a null value for the list disables the restriction so that all services can be
4733      * used, calling with an empty list only allows the builtin system's services.
4734      * <p>
4735      * System accesibility services are always available to the user the list can't modify this.
4736      *
4737      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4738      * @param packageNames List of accessibility service package names.
4739      * @return true if setting the restriction succeeded. It fail if there is one or more non-system
4740      *         accessibility services enabled, that are not in the list.
4741      * @throws SecurityException if {@code admin} is not a device or profile owner.
4742      */
setPermittedAccessibilityServices(@onNull ComponentName admin, List<String> packageNames)4743     public boolean setPermittedAccessibilityServices(@NonNull ComponentName admin,
4744             List<String> packageNames) {
4745         throwIfParentInstance("setPermittedAccessibilityServices");
4746         if (mService != null) {
4747             try {
4748                 return mService.setPermittedAccessibilityServices(admin, packageNames);
4749             } catch (RemoteException e) {
4750                 throw e.rethrowFromSystemServer();
4751             }
4752         }
4753         return false;
4754     }
4755 
4756     /**
4757      * Returns the list of permitted accessibility services set by this device or profile owner.
4758      * <p>
4759      * An empty list means no accessibility services except system services are allowed. Null means
4760      * all accessibility services are allowed.
4761      *
4762      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4763      * @return List of accessiblity service package names.
4764      * @throws SecurityException if {@code admin} is not a device or profile owner.
4765      */
getPermittedAccessibilityServices(@onNull ComponentName admin)4766     public List<String> getPermittedAccessibilityServices(@NonNull ComponentName admin) {
4767         throwIfParentInstance("getPermittedAccessibilityServices");
4768         if (mService != null) {
4769             try {
4770                 return mService.getPermittedAccessibilityServices(admin);
4771             } catch (RemoteException e) {
4772                 throw e.rethrowFromSystemServer();
4773             }
4774         }
4775         return null;
4776     }
4777 
4778     /**
4779      * Called by the system to check if a specific accessibility service is disabled by admin.
4780      *
4781      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4782      * @param packageName Accessibility service package name that needs to be checked.
4783      * @param userHandle user id the admin is running as.
4784      * @return true if the accessibility service is permitted, otherwise false.
4785      *
4786      * @hide
4787      */
isAccessibilityServicePermittedByAdmin(@onNull ComponentName admin, @NonNull String packageName, int userHandle)4788     public boolean isAccessibilityServicePermittedByAdmin(@NonNull ComponentName admin,
4789             @NonNull String packageName, int userHandle) {
4790         if (mService != null) {
4791             try {
4792                 return mService.isAccessibilityServicePermittedByAdmin(admin, packageName,
4793                         userHandle);
4794             } catch (RemoteException e) {
4795                 throw e.rethrowFromSystemServer();
4796             }
4797         }
4798         return false;
4799     }
4800 
4801     /**
4802      * Returns the list of accessibility services permitted by the device or profiles
4803      * owners of this user.
4804      *
4805      * <p>Null means all accessibility services are allowed, if a non-null list is returned
4806      * it will contain the intersection of the permitted lists for any device or profile
4807      * owners that apply to this user. It will also include any system accessibility services.
4808      *
4809      * @param userId which user to check for.
4810      * @return List of accessiblity service package names.
4811      * @hide
4812      */
4813      @SystemApi
getPermittedAccessibilityServices(int userId)4814      public List<String> getPermittedAccessibilityServices(int userId) {
4815         throwIfParentInstance("getPermittedAccessibilityServices");
4816         if (mService != null) {
4817             try {
4818                 return mService.getPermittedAccessibilityServicesForUser(userId);
4819             } catch (RemoteException e) {
4820                 throw e.rethrowFromSystemServer();
4821             }
4822         }
4823         return null;
4824      }
4825 
4826     /**
4827      * Called by a profile or device owner to set the permitted input methods services. When set by
4828      * a device owner or profile owner the restriction applies to all profiles of the user the
4829      * device owner or profile owner is an admin for. By default the user can use any input method.
4830      * When zero or more packages have been added, input method that are not in the list and not
4831      * part of the system can not be enabled by the user. This method will fail if it is called for
4832      * a admin that is not for the foreground user or a profile of the foreground user.
4833      * <p>
4834      * Calling with a null value for the list disables the restriction so that all input methods can
4835      * be used, calling with an empty list disables all but the system's own input methods.
4836      * <p>
4837      * System input methods are always available to the user this method can't modify this.
4838      *
4839      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4840      * @param packageNames List of input method package names.
4841      * @return true if setting the restriction succeeded. It will fail if there are one or more
4842      *         non-system input methods currently enabled that are not in the packageNames list.
4843      * @throws SecurityException if {@code admin} is not a device or profile owner.
4844      */
setPermittedInputMethods(@onNull ComponentName admin, List<String> packageNames)4845     public boolean setPermittedInputMethods(@NonNull ComponentName admin, List<String> packageNames) {
4846         throwIfParentInstance("setPermittedInputMethods");
4847         if (mService != null) {
4848             try {
4849                 return mService.setPermittedInputMethods(admin, packageNames);
4850             } catch (RemoteException e) {
4851                 throw e.rethrowFromSystemServer();
4852             }
4853         }
4854         return false;
4855     }
4856 
4857 
4858     /**
4859      * Returns the list of permitted input methods set by this device or profile owner.
4860      * <p>
4861      * An empty list means no input methods except system input methods are allowed. Null means all
4862      * input methods are allowed.
4863      *
4864      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4865      * @return List of input method package names.
4866      * @throws SecurityException if {@code admin} is not a device or profile owner.
4867      */
getPermittedInputMethods(@onNull ComponentName admin)4868     public List<String> getPermittedInputMethods(@NonNull ComponentName admin) {
4869         throwIfParentInstance("getPermittedInputMethods");
4870         if (mService != null) {
4871             try {
4872                 return mService.getPermittedInputMethods(admin);
4873             } catch (RemoteException e) {
4874                 throw e.rethrowFromSystemServer();
4875             }
4876         }
4877         return null;
4878     }
4879 
4880     /**
4881      * Called by the system to check if a specific input method is disabled by admin.
4882      *
4883      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4884      * @param packageName Input method package name that needs to be checked.
4885      * @param userHandle user id the admin is running as.
4886      * @return true if the input method is permitted, otherwise false.
4887      *
4888      * @hide
4889      */
isInputMethodPermittedByAdmin(@onNull ComponentName admin, @NonNull String packageName, int userHandle)4890     public boolean isInputMethodPermittedByAdmin(@NonNull ComponentName admin,
4891             @NonNull String packageName, int userHandle) {
4892         if (mService != null) {
4893             try {
4894                 return mService.isInputMethodPermittedByAdmin(admin, packageName, userHandle);
4895             } catch (RemoteException e) {
4896                 throw e.rethrowFromSystemServer();
4897             }
4898         }
4899         return false;
4900     }
4901 
4902     /**
4903      * Returns the list of input methods permitted by the device or profiles
4904      * owners of the current user.  (*Not* calling user, due to a limitation in InputMethodManager.)
4905      *
4906      * <p>Null means all input methods are allowed, if a non-null list is returned
4907      * it will contain the intersection of the permitted lists for any device or profile
4908      * owners that apply to this user. It will also include any system input methods.
4909      *
4910      * @return List of input method package names.
4911      * @hide
4912      */
4913     @SystemApi
getPermittedInputMethodsForCurrentUser()4914     public List<String> getPermittedInputMethodsForCurrentUser() {
4915         throwIfParentInstance("getPermittedInputMethodsForCurrentUser");
4916         if (mService != null) {
4917             try {
4918                 return mService.getPermittedInputMethodsForCurrentUser();
4919             } catch (RemoteException e) {
4920                 throw e.rethrowFromSystemServer();
4921             }
4922         }
4923         return null;
4924     }
4925 
4926     /**
4927      * Called by a device owner to get the list of apps to keep around as APKs even if no user has
4928      * currently installed it.
4929      *
4930      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4931      *
4932      * @return List of package names to keep cached.
4933      * @hide
4934      */
getKeepUninstalledPackages(@onNull ComponentName admin)4935     public List<String> getKeepUninstalledPackages(@NonNull ComponentName admin) {
4936         throwIfParentInstance("getKeepUninstalledPackages");
4937         if (mService != null) {
4938             try {
4939                 return mService.getKeepUninstalledPackages(admin);
4940             } catch (RemoteException e) {
4941                 throw e.rethrowFromSystemServer();
4942             }
4943         }
4944         return null;
4945     }
4946 
4947     /**
4948      * Called by a device owner to set a list of apps to keep around as APKs even if no user has
4949      * currently installed it.
4950      *
4951      * <p>Please note that setting this policy does not imply that specified apps will be
4952      * automatically pre-cached.</p>
4953      *
4954      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4955      * @param packageNames List of package names to keep cached.
4956      * @throws SecurityException if {@code admin} is not a device owner.
4957      * @hide
4958      */
setKeepUninstalledPackages(@onNull ComponentName admin, @NonNull List<String> packageNames)4959     public void setKeepUninstalledPackages(@NonNull ComponentName admin,
4960             @NonNull List<String> packageNames) {
4961         throwIfParentInstance("setKeepUninstalledPackages");
4962         if (mService != null) {
4963             try {
4964                 mService.setKeepUninstalledPackages(admin, packageNames);
4965             } catch (RemoteException e) {
4966                 throw e.rethrowFromSystemServer();
4967             }
4968         }
4969     }
4970 
4971     /**
4972      * Called by a device owner to create a user with the specified name. The UserHandle returned
4973      * by this method should not be persisted as user handles are recycled as users are removed and
4974      * created. If you need to persist an identifier for this user, use
4975      * {@link UserManager#getSerialNumberForUser}.
4976      *
4977      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
4978      * @param name the user's name
4979      * @see UserHandle
4980      * @return the {@link android.os.UserHandle} object for the created user, or {@code null} if the
4981      *         user could not be created.
4982      *
4983      * @deprecated From {@link android.os.Build.VERSION_CODES#M}
4984      * @removed From {@link android.os.Build.VERSION_CODES#N}
4985      */
4986     @Deprecated
createUser(@onNull ComponentName admin, String name)4987     public UserHandle createUser(@NonNull ComponentName admin, String name) {
4988         return null;
4989     }
4990 
4991     /**
4992      * Called by a device owner to create a user with the specified name. The UserHandle returned
4993      * by this method should not be persisted as user handles are recycled as users are removed and
4994      * created. If you need to persist an identifier for this user, use
4995      * {@link UserManager#getSerialNumberForUser}.  The new user will be started in the background
4996      * immediately.
4997      *
4998      * <p> profileOwnerComponent is the {@link DeviceAdminReceiver} to be the profile owner as well
4999      * as registered as an active admin on the new user.  The profile owner package will be
5000      * installed on the new user if it already is installed on the device.
5001      *
5002      * <p>If the optionalInitializeData is not null, then the extras will be passed to the
5003      * profileOwnerComponent when onEnable is called.
5004      *
5005      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5006      * @param name the user's name
5007      * @param ownerName the human readable name of the organisation associated with this DPM.
5008      * @param profileOwnerComponent The {@link DeviceAdminReceiver} that will be an active admin on
5009      *      the user.
5010      * @param adminExtras Extras that will be passed to onEnable of the admin receiver
5011      *      on the new user.
5012      * @see UserHandle
5013      * @return the {@link android.os.UserHandle} object for the created user, or {@code null} if the
5014      *         user could not be created.
5015      *
5016      * @deprecated From {@link android.os.Build.VERSION_CODES#M}
5017      * @removed From {@link android.os.Build.VERSION_CODES#N}
5018      */
5019     @Deprecated
createAndInitializeUser(@onNull ComponentName admin, String name, String ownerName, @NonNull ComponentName profileOwnerComponent, Bundle adminExtras)5020     public UserHandle createAndInitializeUser(@NonNull ComponentName admin, String name,
5021             String ownerName, @NonNull ComponentName profileOwnerComponent, Bundle adminExtras) {
5022         return null;
5023     }
5024 
5025     /**
5026       * Flag used by {@link #createAndManageUser} to skip setup wizard after creating a new user.
5027       */
5028     public static final int SKIP_SETUP_WIZARD = 0x0001;
5029 
5030     /**
5031      * Flag used by {@link #createAndManageUser} to specify that the user should be created
5032      * ephemeral.
5033      * @hide
5034      */
5035     public static final int MAKE_USER_EPHEMERAL = 0x0002;
5036 
5037     /**
5038      * Called by a device owner to create a user with the specified name and a given component of
5039      * the calling package as profile owner. The UserHandle returned by this method should not be
5040      * persisted as user handles are recycled as users are removed and created. If you need to
5041      * persist an identifier for this user, use {@link UserManager#getSerialNumberForUser}. The new
5042      * user will not be started in the background.
5043      * <p>
5044      * admin is the {@link DeviceAdminReceiver} which is the device owner. profileOwner is also a
5045      * DeviceAdminReceiver in the same package as admin, and will become the profile owner and will
5046      * be registered as an active admin on the new user. The profile owner package will be installed
5047      * on the new user.
5048      * <p>
5049      * If the adminExtras are not null, they will be stored on the device until the user is started
5050      * for the first time. Then the extras will be passed to the admin when onEnable is called.
5051      *
5052      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5053      * @param name The user's name.
5054      * @param profileOwner Which {@link DeviceAdminReceiver} will be profile owner. Has to be in the
5055      *            same package as admin, otherwise no user is created and an
5056      *            IllegalArgumentException is thrown.
5057      * @param adminExtras Extras that will be passed to onEnable of the admin receiver on the new
5058      *            user.
5059      * @param flags {@link #SKIP_SETUP_WIZARD} is supported.
5060      * @see UserHandle
5061      * @return the {@link android.os.UserHandle} object for the created user, or {@code null} if the
5062      *         user could not be created.
5063      * @throws SecurityException if {@code admin} is not a device owner.
5064      */
createAndManageUser(@onNull ComponentName admin, @NonNull String name, @NonNull ComponentName profileOwner, @Nullable PersistableBundle adminExtras, int flags)5065     public UserHandle createAndManageUser(@NonNull ComponentName admin, @NonNull String name,
5066             @NonNull ComponentName profileOwner, @Nullable PersistableBundle adminExtras,
5067             int flags) {
5068         throwIfParentInstance("createAndManageUser");
5069         try {
5070             return mService.createAndManageUser(admin, name, profileOwner, adminExtras, flags);
5071         } catch (RemoteException re) {
5072             throw re.rethrowFromSystemServer();
5073         }
5074     }
5075 
5076     /**
5077      * Called by a device owner to remove a user and all associated data. The primary user can not
5078      * be removed.
5079      *
5080      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5081      * @param userHandle the user to remove.
5082      * @return {@code true} if the user was removed, {@code false} otherwise.
5083      * @throws SecurityException if {@code admin} is not a device owner.
5084      */
removeUser(@onNull ComponentName admin, UserHandle userHandle)5085     public boolean removeUser(@NonNull ComponentName admin, UserHandle userHandle) {
5086         throwIfParentInstance("removeUser");
5087         try {
5088             return mService.removeUser(admin, userHandle);
5089         } catch (RemoteException re) {
5090             throw re.rethrowFromSystemServer();
5091         }
5092     }
5093 
5094     /**
5095      * Called by a device owner to switch the specified user to the foreground.
5096      *
5097      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5098      * @param userHandle the user to switch to; null will switch to primary.
5099      * @return {@code true} if the switch was successful, {@code false} otherwise.
5100      * @throws SecurityException if {@code admin} is not a device owner.
5101      * @see Intent#ACTION_USER_FOREGROUND
5102      */
switchUser(@onNull ComponentName admin, @Nullable UserHandle userHandle)5103     public boolean switchUser(@NonNull ComponentName admin, @Nullable UserHandle userHandle) {
5104         throwIfParentInstance("switchUser");
5105         try {
5106             return mService.switchUser(admin, userHandle);
5107         } catch (RemoteException re) {
5108             throw re.rethrowFromSystemServer();
5109         }
5110     }
5111 
5112     /**
5113      * Retrieves the application restrictions for a given target application running in the calling
5114      * user.
5115      * <p>
5116      * The caller must be a profile or device owner on that user, or the package allowed to manage
5117      * application restrictions via {@link #setApplicationRestrictionsManagingPackage}; otherwise a
5118      * security exception will be thrown.
5119      *
5120      * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or
5121      *            {@code null} if called by the application restrictions managing package.
5122      * @param packageName The name of the package to fetch restricted settings of.
5123      * @return {@link Bundle} of settings corresponding to what was set last time
5124      *         {@link DevicePolicyManager#setApplicationRestrictions} was called, or an empty
5125      *         {@link Bundle} if no restrictions have been set.
5126      * @throws SecurityException if {@code admin} is not a device or profile owner.
5127      * @see {@link #setApplicationRestrictionsManagingPackage}
5128      */
getApplicationRestrictions(@ullable ComponentName admin, String packageName)5129     public Bundle getApplicationRestrictions(@Nullable ComponentName admin, String packageName) {
5130         throwIfParentInstance("getApplicationRestrictions");
5131         if (mService != null) {
5132             try {
5133                 return mService.getApplicationRestrictions(admin, packageName);
5134             } catch (RemoteException e) {
5135                 throw e.rethrowFromSystemServer();
5136             }
5137         }
5138         return null;
5139     }
5140 
5141     /**
5142      * Called by a profile or device owner to set a user restriction specified by the key.
5143      * <p>
5144      * The calling device admin must be a profile or device owner; if it is not, a security
5145      * exception will be thrown.
5146      *
5147      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5148      * @param key The key of the restriction. See the constants in {@link android.os.UserManager}
5149      *            for the list of keys.
5150      * @throws SecurityException if {@code admin} is not a device or profile owner.
5151      */
addUserRestriction(@onNull ComponentName admin, String key)5152     public void addUserRestriction(@NonNull ComponentName admin, String key) {
5153         throwIfParentInstance("addUserRestriction");
5154         if (mService != null) {
5155             try {
5156                 mService.setUserRestriction(admin, key, true);
5157             } catch (RemoteException e) {
5158                 throw e.rethrowFromSystemServer();
5159             }
5160         }
5161     }
5162 
5163     /**
5164      * Called by a profile or device owner to clear a user restriction specified by the key.
5165      * <p>
5166      * The calling device admin must be a profile or device owner; if it is not, a security
5167      * exception will be thrown.
5168      *
5169      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5170      * @param key The key of the restriction. See the constants in {@link android.os.UserManager}
5171      *            for the list of keys.
5172      * @throws SecurityException if {@code admin} is not a device or profile owner.
5173      */
clearUserRestriction(@onNull ComponentName admin, String key)5174     public void clearUserRestriction(@NonNull ComponentName admin, String key) {
5175         throwIfParentInstance("clearUserRestriction");
5176         if (mService != null) {
5177             try {
5178                 mService.setUserRestriction(admin, key, false);
5179             } catch (RemoteException e) {
5180                 throw e.rethrowFromSystemServer();
5181             }
5182         }
5183     }
5184 
5185     /**
5186      * Called by a profile or device owner to get user restrictions set with
5187      * {@link #addUserRestriction(ComponentName, String)}.
5188      * <p>
5189      * The target user may have more restrictions set by the system or other device owner / profile
5190      * owner. To get all the user restrictions currently set, use
5191      * {@link UserManager#getUserRestrictions()}.
5192      *
5193      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5194      * @throws SecurityException if {@code admin} is not a device or profile owner.
5195      */
getUserRestrictions(@onNull ComponentName admin)5196     public Bundle getUserRestrictions(@NonNull ComponentName admin) {
5197         throwIfParentInstance("getUserRestrictions");
5198         Bundle ret = null;
5199         if (mService != null) {
5200             try {
5201                 ret = mService.getUserRestrictions(admin);
5202             } catch (RemoteException e) {
5203                 throw e.rethrowFromSystemServer();
5204             }
5205         }
5206         return ret == null ? new Bundle() : ret;
5207     }
5208 
5209     /**
5210      * Called by profile or device owners to hide or unhide packages. When a package is hidden it is
5211      * unavailable for use, but the data and actual package file remain.
5212      *
5213      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5214      * @param packageName The name of the package to hide or unhide.
5215      * @param hidden {@code true} if the package should be hidden, {@code false} if it should be
5216      *            unhidden.
5217      * @return boolean Whether the hidden setting of the package was successfully updated.
5218      * @throws SecurityException if {@code admin} is not a device or profile owner.
5219      */
setApplicationHidden(@onNull ComponentName admin, String packageName, boolean hidden)5220     public boolean setApplicationHidden(@NonNull ComponentName admin, String packageName,
5221             boolean hidden) {
5222         throwIfParentInstance("setApplicationHidden");
5223         if (mService != null) {
5224             try {
5225                 return mService.setApplicationHidden(admin, packageName, hidden);
5226             } catch (RemoteException e) {
5227                 throw e.rethrowFromSystemServer();
5228             }
5229         }
5230         return false;
5231     }
5232 
5233     /**
5234      * Called by profile or device owners to determine if a package is hidden.
5235      *
5236      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5237      * @param packageName The name of the package to retrieve the hidden status of.
5238      * @return boolean {@code true} if the package is hidden, {@code false} otherwise.
5239      * @throws SecurityException if {@code admin} is not a device or profile owner.
5240      */
isApplicationHidden(@onNull ComponentName admin, String packageName)5241     public boolean isApplicationHidden(@NonNull ComponentName admin, String packageName) {
5242         throwIfParentInstance("isApplicationHidden");
5243         if (mService != null) {
5244             try {
5245                 return mService.isApplicationHidden(admin, packageName);
5246             } catch (RemoteException e) {
5247                 throw e.rethrowFromSystemServer();
5248             }
5249         }
5250         return false;
5251     }
5252 
5253     /**
5254      * Called by profile or device owners to re-enable a system app that was disabled by default
5255      * when the user was initialized.
5256      *
5257      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5258      * @param packageName The package to be re-enabled in the calling profile.
5259      * @throws SecurityException if {@code admin} is not a device or profile owner.
5260      */
enableSystemApp(@onNull ComponentName admin, String packageName)5261     public void enableSystemApp(@NonNull ComponentName admin, String packageName) {
5262         throwIfParentInstance("enableSystemApp");
5263         if (mService != null) {
5264             try {
5265                 mService.enableSystemApp(admin, packageName);
5266             } catch (RemoteException e) {
5267                 throw e.rethrowFromSystemServer();
5268             }
5269         }
5270     }
5271 
5272     /**
5273      * Called by profile or device owners to re-enable system apps by intent that were disabled by
5274      * default when the user was initialized.
5275      *
5276      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5277      * @param intent An intent matching the app(s) to be installed. All apps that resolve for this
5278      *            intent will be re-enabled in the calling profile.
5279      * @return int The number of activities that matched the intent and were installed.
5280      * @throws SecurityException if {@code admin} is not a device or profile owner.
5281      */
enableSystemApp(@onNull ComponentName admin, Intent intent)5282     public int enableSystemApp(@NonNull ComponentName admin, Intent intent) {
5283         throwIfParentInstance("enableSystemApp");
5284         if (mService != null) {
5285             try {
5286                 return mService.enableSystemAppWithIntent(admin, intent);
5287             } catch (RemoteException e) {
5288                 throw e.rethrowFromSystemServer();
5289             }
5290         }
5291         return 0;
5292     }
5293 
5294     /**
5295      * Called by a device owner or profile owner to disable account management for a specific type
5296      * of account.
5297      * <p>
5298      * The calling device admin must be a device owner or profile owner. If it is not, a security
5299      * exception will be thrown.
5300      * <p>
5301      * When account management is disabled for an account type, adding or removing an account of
5302      * that type will not be possible.
5303      * <p>
5304      * From {@link android.os.Build.VERSION_CODES#N} the profile or device owner can still use
5305      * {@link android.accounts.AccountManager} APIs to add or remove accounts when account
5306      * management for a specific type is disabled.
5307      *
5308      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5309      * @param accountType For which account management is disabled or enabled.
5310      * @param disabled The boolean indicating that account management will be disabled (true) or
5311      *            enabled (false).
5312      * @throws SecurityException if {@code admin} is not a device or profile owner.
5313      */
setAccountManagementDisabled(@onNull ComponentName admin, String accountType, boolean disabled)5314     public void setAccountManagementDisabled(@NonNull ComponentName admin, String accountType,
5315             boolean disabled) {
5316         throwIfParentInstance("setAccountManagementDisabled");
5317         if (mService != null) {
5318             try {
5319                 mService.setAccountManagementDisabled(admin, accountType, disabled);
5320             } catch (RemoteException e) {
5321                 throw e.rethrowFromSystemServer();
5322             }
5323         }
5324     }
5325 
5326     /**
5327      * Gets the array of accounts for which account management is disabled by the profile owner.
5328      *
5329      * <p> Account management can be disabled/enabled by calling
5330      * {@link #setAccountManagementDisabled}.
5331      *
5332      * @return a list of account types for which account management has been disabled.
5333      *
5334      * @see #setAccountManagementDisabled
5335      */
getAccountTypesWithManagementDisabled()5336     public String[] getAccountTypesWithManagementDisabled() {
5337         throwIfParentInstance("getAccountTypesWithManagementDisabled");
5338         return getAccountTypesWithManagementDisabledAsUser(myUserId());
5339     }
5340 
5341     /**
5342      * @see #getAccountTypesWithManagementDisabled()
5343      * @hide
5344      */
getAccountTypesWithManagementDisabledAsUser(int userId)5345     public String[] getAccountTypesWithManagementDisabledAsUser(int userId) {
5346         if (mService != null) {
5347             try {
5348                 return mService.getAccountTypesWithManagementDisabledAsUser(userId);
5349             } catch (RemoteException e) {
5350                 throw e.rethrowFromSystemServer();
5351             }
5352         }
5353 
5354         return null;
5355     }
5356 
5357     /**
5358      * Sets which packages may enter lock task mode.
5359      * <p>
5360      * Any packages that shares uid with an allowed package will also be allowed to activate lock
5361      * task. From {@link android.os.Build.VERSION_CODES#M} removing packages from the lock task
5362      * package list results in locked tasks belonging to those packages to be finished. This
5363      * function can only be called by the device owner.
5364      *
5365      * @param packages The list of packages allowed to enter lock task mode
5366      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5367      * @throws SecurityException if {@code admin} is not a device owner.
5368      * @see Activity#startLockTask()
5369      * @see DeviceAdminReceiver#onLockTaskModeEntering(Context, Intent, String)
5370      * @see DeviceAdminReceiver#onLockTaskModeExiting(Context, Intent)
5371      * @see UserManager#DISALLOW_CREATE_WINDOWS
5372      */
setLockTaskPackages(@onNull ComponentName admin, String[] packages)5373     public void setLockTaskPackages(@NonNull ComponentName admin, String[] packages)
5374             throws SecurityException {
5375         throwIfParentInstance("setLockTaskPackages");
5376         if (mService != null) {
5377             try {
5378                 mService.setLockTaskPackages(admin, packages);
5379             } catch (RemoteException e) {
5380                 throw e.rethrowFromSystemServer();
5381             }
5382         }
5383     }
5384 
5385     /**
5386      * This function returns the list of packages allowed to start the lock task mode.
5387      *
5388      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5389      * @hide
5390      */
getLockTaskPackages(@onNull ComponentName admin)5391     public String[] getLockTaskPackages(@NonNull ComponentName admin) {
5392         throwIfParentInstance("getLockTaskPackages");
5393         if (mService != null) {
5394             try {
5395                 return mService.getLockTaskPackages(admin);
5396             } catch (RemoteException e) {
5397                 throw e.rethrowFromSystemServer();
5398             }
5399         }
5400         return null;
5401     }
5402 
5403     /**
5404      * This function lets the caller know whether the given component is allowed to start the
5405      * lock task mode.
5406      * @param pkg The package to check
5407      */
isLockTaskPermitted(String pkg)5408     public boolean isLockTaskPermitted(String pkg) {
5409         throwIfParentInstance("isLockTaskPermitted");
5410         if (mService != null) {
5411             try {
5412                 return mService.isLockTaskPermitted(pkg);
5413             } catch (RemoteException e) {
5414                 throw e.rethrowFromSystemServer();
5415             }
5416         }
5417         return false;
5418     }
5419 
5420     /**
5421      * Called by device owners to update {@link Settings.Global} settings. Validation that the value
5422      * of the setting is in the correct form for the setting type should be performed by the caller.
5423      * <p>
5424      * The settings that can be updated with this method are:
5425      * <ul>
5426      * <li>{@link Settings.Global#ADB_ENABLED}</li>
5427      * <li>{@link Settings.Global#AUTO_TIME}</li>
5428      * <li>{@link Settings.Global#AUTO_TIME_ZONE}</li>
5429      * <li>{@link Settings.Global#DATA_ROAMING}</li>
5430      * <li>{@link Settings.Global#USB_MASS_STORAGE_ENABLED}</li>
5431      * <li>{@link Settings.Global#WIFI_SLEEP_POLICY}</li>
5432      * <li>{@link Settings.Global#STAY_ON_WHILE_PLUGGED_IN} This setting is only available from
5433      * {@link android.os.Build.VERSION_CODES#M} onwards and can only be set if
5434      * {@link #setMaximumTimeToLock} is not used to set a timeout.</li>
5435      * <li>{@link Settings.Global#WIFI_DEVICE_OWNER_CONFIGS_LOCKDOWN}</li> This setting is only
5436      * available from {@link android.os.Build.VERSION_CODES#M} onwards.</li>
5437      * </ul>
5438      * <p>
5439      * Changing the following settings has no effect as of {@link android.os.Build.VERSION_CODES#M}:
5440      * <ul>
5441      * <li>{@link Settings.Global#BLUETOOTH_ON}. Use
5442      * {@link android.bluetooth.BluetoothAdapter#enable()} and
5443      * {@link android.bluetooth.BluetoothAdapter#disable()} instead.</li>
5444      * <li>{@link Settings.Global#DEVELOPMENT_SETTINGS_ENABLED}</li>
5445      * <li>{@link Settings.Global#MODE_RINGER}. Use
5446      * {@link android.media.AudioManager#setRingerMode(int)} instead.</li>
5447      * <li>{@link Settings.Global#NETWORK_PREFERENCE}</li>
5448      * <li>{@link Settings.Global#WIFI_ON}. Use
5449      * {@link android.net.wifi.WifiManager#setWifiEnabled(boolean)} instead.</li>
5450      * </ul>
5451      *
5452      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5453      * @param setting The name of the setting to update.
5454      * @param value The value to update the setting to.
5455      * @throws SecurityException if {@code admin} is not a device owner.
5456      */
setGlobalSetting(@onNull ComponentName admin, String setting, String value)5457     public void setGlobalSetting(@NonNull ComponentName admin, String setting, String value) {
5458         throwIfParentInstance("setGlobalSetting");
5459         if (mService != null) {
5460             try {
5461                 mService.setGlobalSetting(admin, setting, value);
5462             } catch (RemoteException e) {
5463                 throw e.rethrowFromSystemServer();
5464             }
5465         }
5466     }
5467 
5468     /**
5469      * Called by profile or device owners to update {@link Settings.Secure} settings. Validation
5470      * that the value of the setting is in the correct form for the setting type should be performed
5471      * by the caller.
5472      * <p>
5473      * The settings that can be updated by a profile or device owner with this method are:
5474      * <ul>
5475      * <li>{@link Settings.Secure#DEFAULT_INPUT_METHOD}</li>
5476      * <li>{@link Settings.Secure#INSTALL_NON_MARKET_APPS}</li>
5477      * <li>{@link Settings.Secure#SKIP_FIRST_USE_HINTS}</li>
5478      * </ul>
5479      * <p>
5480      * A device owner can additionally update the following settings:
5481      * <ul>
5482      * <li>{@link Settings.Secure#LOCATION_MODE}</li>
5483      * </ul>
5484      *
5485      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5486      * @param setting The name of the setting to update.
5487      * @param value The value to update the setting to.
5488      * @throws SecurityException if {@code admin} is not a device or profile owner.
5489      */
setSecureSetting(@onNull ComponentName admin, String setting, String value)5490     public void setSecureSetting(@NonNull ComponentName admin, String setting, String value) {
5491         throwIfParentInstance("setSecureSetting");
5492         if (mService != null) {
5493             try {
5494                 mService.setSecureSetting(admin, setting, value);
5495             } catch (RemoteException e) {
5496                 throw e.rethrowFromSystemServer();
5497             }
5498         }
5499     }
5500 
5501     /**
5502      * Designates a specific service component as the provider for making permission requests of a
5503      * local or remote administrator of the user.
5504      * <p/>
5505      * Only a profile owner can designate the restrictions provider.
5506      *
5507      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5508      * @param provider The component name of the service that implements
5509      *            {@link RestrictionsReceiver}. If this param is null, it removes the restrictions
5510      *            provider previously assigned.
5511      * @throws SecurityException if {@code admin} is not a device or profile owner.
5512      */
setRestrictionsProvider(@onNull ComponentName admin, @Nullable ComponentName provider)5513     public void setRestrictionsProvider(@NonNull ComponentName admin,
5514             @Nullable ComponentName provider) {
5515         throwIfParentInstance("setRestrictionsProvider");
5516         if (mService != null) {
5517             try {
5518                 mService.setRestrictionsProvider(admin, provider);
5519             } catch (RemoteException re) {
5520                 throw re.rethrowFromSystemServer();
5521             }
5522         }
5523     }
5524 
5525     /**
5526      * Called by profile or device owners to set the master volume mute on or off.
5527      *
5528      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5529      * @param on {@code true} to mute master volume, {@code false} to turn mute off.
5530      * @throws SecurityException if {@code admin} is not a device or profile owner.
5531      */
setMasterVolumeMuted(@onNull ComponentName admin, boolean on)5532     public void setMasterVolumeMuted(@NonNull ComponentName admin, boolean on) {
5533         throwIfParentInstance("setMasterVolumeMuted");
5534         if (mService != null) {
5535             try {
5536                 mService.setMasterVolumeMuted(admin, on);
5537             } catch (RemoteException re) {
5538                 throw re.rethrowFromSystemServer();
5539             }
5540         }
5541     }
5542 
5543     /**
5544      * Called by profile or device owners to check whether the master volume mute is on or off.
5545      *
5546      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5547      * @return {@code true} if master volume is muted, {@code false} if it's not.
5548      * @throws SecurityException if {@code admin} is not a device or profile owner.
5549      */
isMasterVolumeMuted(@onNull ComponentName admin)5550     public boolean isMasterVolumeMuted(@NonNull ComponentName admin) {
5551         throwIfParentInstance("isMasterVolumeMuted");
5552         if (mService != null) {
5553             try {
5554                 return mService.isMasterVolumeMuted(admin);
5555             } catch (RemoteException re) {
5556                 throw re.rethrowFromSystemServer();
5557             }
5558         }
5559         return false;
5560     }
5561 
5562     /**
5563      * Called by profile or device owners to change whether a user can uninstall a package.
5564      *
5565      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5566      * @param packageName package to change.
5567      * @param uninstallBlocked true if the user shouldn't be able to uninstall the package.
5568      * @throws SecurityException if {@code admin} is not a device or profile owner.
5569      */
setUninstallBlocked(@onNull ComponentName admin, String packageName, boolean uninstallBlocked)5570     public void setUninstallBlocked(@NonNull ComponentName admin, String packageName,
5571             boolean uninstallBlocked) {
5572         throwIfParentInstance("setUninstallBlocked");
5573         if (mService != null) {
5574             try {
5575                 mService.setUninstallBlocked(admin, packageName, uninstallBlocked);
5576             } catch (RemoteException re) {
5577                 throw re.rethrowFromSystemServer();
5578             }
5579         }
5580     }
5581 
5582     /**
5583      * Check whether the user has been blocked by device policy from uninstalling a package.
5584      * Requires the caller to be the profile owner if checking a specific admin's policy.
5585      * <p>
5586      * <strong>Note:</strong> Starting from {@link android.os.Build.VERSION_CODES#LOLLIPOP_MR1}, the
5587      * behavior of this API is changed such that passing {@code null} as the {@code admin} parameter
5588      * will return if any admin has blocked the uninstallation. Before L MR1, passing {@code null}
5589      * will cause a NullPointerException to be raised.
5590      *
5591      * @param admin The name of the admin component whose blocking policy will be checked, or
5592      *            {@code null} to check whether any admin has blocked the uninstallation.
5593      * @param packageName package to check.
5594      * @return true if uninstallation is blocked.
5595      * @throws SecurityException if {@code admin} is not a device or profile owner.
5596      */
isUninstallBlocked(@ullable ComponentName admin, String packageName)5597     public boolean isUninstallBlocked(@Nullable ComponentName admin, String packageName) {
5598         throwIfParentInstance("isUninstallBlocked");
5599         if (mService != null) {
5600             try {
5601                 return mService.isUninstallBlocked(admin, packageName);
5602             } catch (RemoteException re) {
5603                 throw re.rethrowFromSystemServer();
5604             }
5605         }
5606         return false;
5607     }
5608 
5609     /**
5610      * Called by the profile owner of a managed profile to enable widget providers from a given
5611      * package to be available in the parent profile. As a result the user will be able to add
5612      * widgets from the white-listed package running under the profile to a widget host which runs
5613      * under the parent profile, for example the home screen. Note that a package may have zero or
5614      * more provider components, where each component provides a different widget type.
5615      * <p>
5616      * <strong>Note:</strong> By default no widget provider package is white-listed.
5617      *
5618      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5619      * @param packageName The package from which widget providers are white-listed.
5620      * @return Whether the package was added.
5621      * @throws SecurityException if {@code admin} is not a profile owner.
5622      * @see #removeCrossProfileWidgetProvider(android.content.ComponentName, String)
5623      * @see #getCrossProfileWidgetProviders(android.content.ComponentName)
5624      */
addCrossProfileWidgetProvider(@onNull ComponentName admin, String packageName)5625     public boolean addCrossProfileWidgetProvider(@NonNull ComponentName admin, String packageName) {
5626         throwIfParentInstance("addCrossProfileWidgetProvider");
5627         if (mService != null) {
5628             try {
5629                 return mService.addCrossProfileWidgetProvider(admin, packageName);
5630             } catch (RemoteException re) {
5631                 throw re.rethrowFromSystemServer();
5632             }
5633         }
5634         return false;
5635     }
5636 
5637     /**
5638      * Called by the profile owner of a managed profile to disable widget providers from a given
5639      * package to be available in the parent profile. For this method to take effect the package
5640      * should have been added via
5641      * {@link #addCrossProfileWidgetProvider( android.content.ComponentName, String)}.
5642      * <p>
5643      * <strong>Note:</strong> By default no widget provider package is white-listed.
5644      *
5645      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5646      * @param packageName The package from which widget providers are no longer white-listed.
5647      * @return Whether the package was removed.
5648      * @throws SecurityException if {@code admin} is not a profile owner.
5649      * @see #addCrossProfileWidgetProvider(android.content.ComponentName, String)
5650      * @see #getCrossProfileWidgetProviders(android.content.ComponentName)
5651      */
removeCrossProfileWidgetProvider( @onNull ComponentName admin, String packageName)5652     public boolean removeCrossProfileWidgetProvider(
5653             @NonNull ComponentName admin, String packageName) {
5654         throwIfParentInstance("removeCrossProfileWidgetProvider");
5655         if (mService != null) {
5656             try {
5657                 return mService.removeCrossProfileWidgetProvider(admin, packageName);
5658             } catch (RemoteException re) {
5659                 throw re.rethrowFromSystemServer();
5660             }
5661         }
5662         return false;
5663     }
5664 
5665     /**
5666      * Called by the profile owner of a managed profile to query providers from which packages are
5667      * available in the parent profile.
5668      *
5669      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5670      * @return The white-listed package list.
5671      * @see #addCrossProfileWidgetProvider(android.content.ComponentName, String)
5672      * @see #removeCrossProfileWidgetProvider(android.content.ComponentName, String)
5673      * @throws SecurityException if {@code admin} is not a profile owner.
5674      */
getCrossProfileWidgetProviders(@onNull ComponentName admin)5675     public List<String> getCrossProfileWidgetProviders(@NonNull ComponentName admin) {
5676         throwIfParentInstance("getCrossProfileWidgetProviders");
5677         if (mService != null) {
5678             try {
5679                 List<String> providers = mService.getCrossProfileWidgetProviders(admin);
5680                 if (providers != null) {
5681                     return providers;
5682                 }
5683             } catch (RemoteException re) {
5684                 throw re.rethrowFromSystemServer();
5685             }
5686         }
5687         return Collections.emptyList();
5688     }
5689 
5690     /**
5691      * Called by profile or device owners to set the user's photo.
5692      *
5693      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5694      * @param icon the bitmap to set as the photo.
5695      * @throws SecurityException if {@code admin} is not a device or profile owner.
5696      */
setUserIcon(@onNull ComponentName admin, Bitmap icon)5697     public void setUserIcon(@NonNull ComponentName admin, Bitmap icon) {
5698         throwIfParentInstance("setUserIcon");
5699         try {
5700             mService.setUserIcon(admin, icon);
5701         } catch (RemoteException re) {
5702             throw re.rethrowFromSystemServer();
5703         }
5704     }
5705 
5706     /**
5707      * Called by device owners to set a local system update policy. When a new policy is set,
5708      * {@link #ACTION_SYSTEM_UPDATE_POLICY_CHANGED} is broadcasted.
5709      *
5710      * @param admin Which {@link DeviceAdminReceiver} this request is associated with. All
5711      *            components in the device owner package can set system update policies and the most
5712      *            recent policy takes effect.
5713      * @param policy the new policy, or {@code null} to clear the current policy.
5714      * @throws SecurityException if {@code admin} is not a device owner.
5715      * @see SystemUpdatePolicy
5716      */
setSystemUpdatePolicy(@onNull ComponentName admin, SystemUpdatePolicy policy)5717     public void setSystemUpdatePolicy(@NonNull ComponentName admin, SystemUpdatePolicy policy) {
5718         throwIfParentInstance("setSystemUpdatePolicy");
5719         if (mService != null) {
5720             try {
5721                 mService.setSystemUpdatePolicy(admin, policy);
5722             } catch (RemoteException re) {
5723                 throw re.rethrowFromSystemServer();
5724             }
5725         }
5726     }
5727 
5728     /**
5729      * Retrieve a local system update policy set previously by {@link #setSystemUpdatePolicy}.
5730      *
5731      * @return The current policy object, or {@code null} if no policy is set.
5732      */
getSystemUpdatePolicy()5733     public SystemUpdatePolicy getSystemUpdatePolicy() {
5734         throwIfParentInstance("getSystemUpdatePolicy");
5735         if (mService != null) {
5736             try {
5737                 return mService.getSystemUpdatePolicy();
5738             } catch (RemoteException re) {
5739                 throw re.rethrowFromSystemServer();
5740             }
5741         }
5742         return null;
5743     }
5744 
5745     /**
5746      * Called by a device owner to disable the keyguard altogether.
5747      * <p>
5748      * Setting the keyguard to disabled has the same effect as choosing "None" as the screen lock
5749      * type. However, this call has no effect if a password, pin or pattern is currently set. If a
5750      * password, pin or pattern is set after the keyguard was disabled, the keyguard stops being
5751      * disabled.
5752      *
5753      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5754      * @param disabled {@code true} disables the keyguard, {@code false} reenables it.
5755      * @return {@code false} if attempting to disable the keyguard while a lock password was in
5756      *         place. {@code true} otherwise.
5757      * @throws SecurityException if {@code admin} is not a device owner.
5758      */
setKeyguardDisabled(@onNull ComponentName admin, boolean disabled)5759     public boolean setKeyguardDisabled(@NonNull ComponentName admin, boolean disabled) {
5760         throwIfParentInstance("setKeyguardDisabled");
5761         try {
5762             return mService.setKeyguardDisabled(admin, disabled);
5763         } catch (RemoteException re) {
5764             throw re.rethrowFromSystemServer();
5765         }
5766     }
5767 
5768     /**
5769      * Called by device owner to disable the status bar. Disabling the status bar blocks
5770      * notifications, quick settings and other screen overlays that allow escaping from a single use
5771      * device.
5772      *
5773      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
5774      * @param disabled {@code true} disables the status bar, {@code false} reenables it.
5775      * @return {@code false} if attempting to disable the status bar failed. {@code true} otherwise.
5776      * @throws SecurityException if {@code admin} is not a device owner.
5777      */
setStatusBarDisabled(@onNull ComponentName admin, boolean disabled)5778     public boolean setStatusBarDisabled(@NonNull ComponentName admin, boolean disabled) {
5779         throwIfParentInstance("setStatusBarDisabled");
5780         try {
5781             return mService.setStatusBarDisabled(admin, disabled);
5782         } catch (RemoteException re) {
5783             throw re.rethrowFromSystemServer();
5784         }
5785     }
5786 
5787     /**
5788      * Callable by the system update service to notify device owners about pending updates.
5789      * The caller must hold {@link android.Manifest.permission#NOTIFY_PENDING_SYSTEM_UPDATE}
5790      * permission.
5791      *
5792      * @param updateReceivedTime The time as given by {@link System#currentTimeMillis()} indicating
5793      *        when the current pending update was first available. -1 if no update is available.
5794      * @hide
5795      */
5796     @SystemApi
notifyPendingSystemUpdate(long updateReceivedTime)5797     public void notifyPendingSystemUpdate(long updateReceivedTime) {
5798         throwIfParentInstance("notifyPendingSystemUpdate");
5799         if (mService != null) {
5800             try {
5801                 mService.notifyPendingSystemUpdate(updateReceivedTime);
5802             } catch (RemoteException re) {
5803                 throw re.rethrowFromSystemServer();
5804             }
5805         }
5806     }
5807 
5808     /**
5809      * Called by profile or device owners to set the default response for future runtime permission
5810      * requests by applications. The policy can allow for normal operation which prompts the user to
5811      * grant a permission, or can allow automatic granting or denying of runtime permission requests
5812      * by an application. This also applies to new permissions declared by app updates. When a
5813      * permission is denied or granted this way, the effect is equivalent to setting the permission
5814      * grant state via {@link #setPermissionGrantState}.
5815      * <p/>
5816      * As this policy only acts on runtime permission requests, it only applies to applications
5817      * built with a {@code targetSdkVersion} of {@link android.os.Build.VERSION_CODES#M} or later.
5818      *
5819      * @param admin Which profile or device owner this request is associated with.
5820      * @param policy One of the policy constants {@link #PERMISSION_POLICY_PROMPT},
5821      *            {@link #PERMISSION_POLICY_AUTO_GRANT} and {@link #PERMISSION_POLICY_AUTO_DENY}.
5822      * @throws SecurityException if {@code admin} is not a device or profile owner.
5823      * @see #setPermissionGrantState
5824      */
setPermissionPolicy(@onNull ComponentName admin, int policy)5825     public void setPermissionPolicy(@NonNull ComponentName admin, int policy) {
5826         throwIfParentInstance("setPermissionPolicy");
5827         try {
5828             mService.setPermissionPolicy(admin, policy);
5829         } catch (RemoteException re) {
5830             throw re.rethrowFromSystemServer();
5831         }
5832     }
5833 
5834     /**
5835      * Returns the current runtime permission policy set by the device or profile owner. The
5836      * default is {@link #PERMISSION_POLICY_PROMPT}.
5837      * @param admin Which profile or device owner this request is associated with.
5838      * @return the current policy for future permission requests.
5839      */
getPermissionPolicy(ComponentName admin)5840     public int getPermissionPolicy(ComponentName admin) {
5841         throwIfParentInstance("getPermissionPolicy");
5842         try {
5843             return mService.getPermissionPolicy(admin);
5844         } catch (RemoteException re) {
5845             throw re.rethrowFromSystemServer();
5846         }
5847     }
5848 
5849     /**
5850      * Sets the grant state of a runtime permission for a specific application. The state can be
5851      * {@link #PERMISSION_GRANT_STATE_DEFAULT default} in which a user can manage it through the UI,
5852      * {@link #PERMISSION_GRANT_STATE_DENIED denied}, in which the permission is denied and the user
5853      * cannot manage it through the UI, and {@link #PERMISSION_GRANT_STATE_GRANTED granted} in which
5854      * the permission is granted and the user cannot manage it through the UI. This might affect all
5855      * permissions in a group that the runtime permission belongs to. This method can only be called
5856      * by a profile or device owner.
5857      * <p/>
5858      * Setting the grant state to {@link #PERMISSION_GRANT_STATE_DEFAULT default} does not revoke
5859      * the permission. It retains the previous grant, if any.
5860      * <p/>
5861      * Permissions can be granted or revoked only for applications built with a
5862      * {@code targetSdkVersion} of {@link android.os.Build.VERSION_CODES#M} or later.
5863      *
5864      * @param admin Which profile or device owner this request is associated with.
5865      * @param packageName The application to grant or revoke a permission to.
5866      * @param permission The permission to grant or revoke.
5867      * @param grantState The permission grant state which is one of
5868      *            {@link #PERMISSION_GRANT_STATE_DENIED}, {@link #PERMISSION_GRANT_STATE_DEFAULT},
5869      *            {@link #PERMISSION_GRANT_STATE_GRANTED},
5870      * @return whether the permission was successfully granted or revoked.
5871      * @throws SecurityException if {@code admin} is not a device or profile owner.
5872      * @see #PERMISSION_GRANT_STATE_DENIED
5873      * @see #PERMISSION_GRANT_STATE_DEFAULT
5874      * @see #PERMISSION_GRANT_STATE_GRANTED
5875      */
setPermissionGrantState(@onNull ComponentName admin, String packageName, String permission, int grantState)5876     public boolean setPermissionGrantState(@NonNull ComponentName admin, String packageName,
5877             String permission, int grantState) {
5878         throwIfParentInstance("setPermissionGrantState");
5879         try {
5880             return mService.setPermissionGrantState(admin, packageName, permission, grantState);
5881         } catch (RemoteException re) {
5882             throw re.rethrowFromSystemServer();
5883         }
5884     }
5885 
5886     /**
5887      * Returns the current grant state of a runtime permission for a specific application.
5888      *
5889      * @param admin Which profile or device owner this request is associated with.
5890      * @param packageName The application to check the grant state for.
5891      * @param permission The permission to check for.
5892      * @return the current grant state specified by device policy. If the profile or device owner
5893      *         has not set a grant state, the return value is
5894      *         {@link #PERMISSION_GRANT_STATE_DEFAULT}. This does not indicate whether or not the
5895      *         permission is currently granted for the package.
5896      *         <p/>
5897      *         If a grant state was set by the profile or device owner, then the return value will
5898      *         be one of {@link #PERMISSION_GRANT_STATE_DENIED} or
5899      *         {@link #PERMISSION_GRANT_STATE_GRANTED}, which indicates if the permission is
5900      *         currently denied or granted.
5901      * @throws SecurityException if {@code admin} is not a device or profile owner.
5902      * @see #setPermissionGrantState(ComponentName, String, String, int)
5903      * @see PackageManager#checkPermission(String, String)
5904      */
getPermissionGrantState(@onNull ComponentName admin, String packageName, String permission)5905     public int getPermissionGrantState(@NonNull ComponentName admin, String packageName,
5906             String permission) {
5907         throwIfParentInstance("getPermissionGrantState");
5908         try {
5909             return mService.getPermissionGrantState(admin, packageName, permission);
5910         } catch (RemoteException re) {
5911             throw re.rethrowFromSystemServer();
5912         }
5913     }
5914 
5915     /**
5916      * Returns if provisioning a managed profile or device is possible or not.
5917      * @param action One of {@link #ACTION_PROVISION_MANAGED_DEVICE},
5918      * {@link #ACTION_PROVISION_MANAGED_PROFILE}.
5919      * @return if provisioning a managed profile or device is possible or not.
5920      * @throws IllegalArgumentException if the supplied action is not valid.
5921      */
isProvisioningAllowed(String action)5922     public boolean isProvisioningAllowed(String action) {
5923         throwIfParentInstance("isProvisioningAllowed");
5924         try {
5925             return mService.isProvisioningAllowed(action);
5926         } catch (RemoteException re) {
5927             throw re.rethrowFromSystemServer();
5928         }
5929     }
5930 
5931     /**
5932      * Return if this user is a managed profile of another user. An admin can become the profile
5933      * owner of a managed profile with {@link #ACTION_PROVISION_MANAGED_PROFILE} and of a managed
5934      * user with {@link #createAndManageUser}
5935      * @param admin Which profile owner this request is associated with.
5936      * @return if this user is a managed profile of another user.
5937      */
isManagedProfile(@onNull ComponentName admin)5938     public boolean isManagedProfile(@NonNull ComponentName admin) {
5939         throwIfParentInstance("isManagedProfile");
5940         try {
5941             return mService.isManagedProfile(admin);
5942         } catch (RemoteException re) {
5943             throw re.rethrowFromSystemServer();
5944         }
5945     }
5946 
5947     /**
5948      * @hide
5949      * Return if this user is a system-only user. An admin can manage a device from a system only
5950      * user by calling {@link #ACTION_PROVISION_MANAGED_SHAREABLE_DEVICE}.
5951      * @param admin Which device owner this request is associated with.
5952      * @return if this user is a system-only user.
5953      */
isSystemOnlyUser(@onNull ComponentName admin)5954     public boolean isSystemOnlyUser(@NonNull ComponentName admin) {
5955         try {
5956             return mService.isSystemOnlyUser(admin);
5957         } catch (RemoteException re) {
5958             throw re.rethrowFromSystemServer();
5959         }
5960     }
5961 
5962     /**
5963      * Called by device owner to get the MAC address of the Wi-Fi device.
5964      *
5965      * @param admin Which device owner this request is associated with.
5966      * @return the MAC address of the Wi-Fi device, or null when the information is not available.
5967      *         (For example, Wi-Fi hasn't been enabled, or the device doesn't support Wi-Fi.)
5968      *         <p>
5969      *         The address will be in the {@code XX:XX:XX:XX:XX:XX} format.
5970      * @throws SecurityException if {@code admin} is not a device owner.
5971      */
getWifiMacAddress(@onNull ComponentName admin)5972     public String getWifiMacAddress(@NonNull ComponentName admin) {
5973         throwIfParentInstance("getWifiMacAddress");
5974         try {
5975             return mService.getWifiMacAddress(admin);
5976         } catch (RemoteException re) {
5977             throw re.rethrowFromSystemServer();
5978         }
5979     }
5980 
5981     /**
5982      * Called by device owner to reboot the device. If there is an ongoing call on the device,
5983      * throws an {@link IllegalStateException}.
5984      * @param admin Which device owner the request is associated with.
5985      * @throws IllegalStateException if device has an ongoing call.
5986      * @throws SecurityException if {@code admin} is not a device owner.
5987      * @see TelephonyManager#CALL_STATE_IDLE
5988      */
reboot(@onNull ComponentName admin)5989     public void reboot(@NonNull ComponentName admin) {
5990         throwIfParentInstance("reboot");
5991         try {
5992             mService.reboot(admin);
5993         } catch (RemoteException re) {
5994             throw re.rethrowFromSystemServer();
5995         }
5996     }
5997 
5998     /**
5999      * Called by a device admin to set the short support message. This will be displayed to the user
6000      * in settings screens where funtionality has been disabled by the admin. The message should be
6001      * limited to a short statement such as "This setting is disabled by your administrator. Contact
6002      * someone@example.com for support." If the message is longer than 200 characters it may be
6003      * truncated.
6004      * <p>
6005      * If the short support message needs to be localized, it is the responsibility of the
6006      * {@link DeviceAdminReceiver} to listen to the {@link Intent#ACTION_LOCALE_CHANGED} broadcast
6007      * and set a new version of this string accordingly.
6008      *
6009      * @see #setLongSupportMessage
6010      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
6011      * @param message Short message to be displayed to the user in settings or null to clear the
6012      *            existing message.
6013      * @throws SecurityException if {@code admin} is not an active administrator.
6014      */
setShortSupportMessage(@onNull ComponentName admin, @Nullable CharSequence message)6015     public void setShortSupportMessage(@NonNull ComponentName admin,
6016             @Nullable CharSequence message) {
6017         throwIfParentInstance("setShortSupportMessage");
6018         if (mService != null) {
6019             try {
6020                 mService.setShortSupportMessage(admin, message);
6021             } catch (RemoteException e) {
6022                 throw e.rethrowFromSystemServer();
6023             }
6024         }
6025     }
6026 
6027     /**
6028      * Called by a device admin to get the short support message.
6029      *
6030      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
6031      * @return The message set by {@link #setShortSupportMessage(ComponentName, CharSequence)} or
6032      *         null if no message has been set.
6033      * @throws SecurityException if {@code admin} is not an active administrator.
6034      */
getShortSupportMessage(@onNull ComponentName admin)6035     public CharSequence getShortSupportMessage(@NonNull ComponentName admin) {
6036         throwIfParentInstance("getShortSupportMessage");
6037         if (mService != null) {
6038             try {
6039                 return mService.getShortSupportMessage(admin);
6040             } catch (RemoteException e) {
6041                 throw e.rethrowFromSystemServer();
6042             }
6043         }
6044         return null;
6045     }
6046 
6047     /**
6048      * Called by a device admin to set the long support message. This will be displayed to the user
6049      * in the device administators settings screen.
6050      * <p>
6051      * If the long support message needs to be localized, it is the responsibility of the
6052      * {@link DeviceAdminReceiver} to listen to the {@link Intent#ACTION_LOCALE_CHANGED} broadcast
6053      * and set a new version of this string accordingly.
6054      *
6055      * @see #setShortSupportMessage
6056      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
6057      * @param message Long message to be displayed to the user in settings or null to clear the
6058      *            existing message.
6059      * @throws SecurityException if {@code admin} is not an active administrator.
6060      */
setLongSupportMessage(@onNull ComponentName admin, @Nullable CharSequence message)6061     public void setLongSupportMessage(@NonNull ComponentName admin,
6062             @Nullable CharSequence message) {
6063         throwIfParentInstance("setLongSupportMessage");
6064         if (mService != null) {
6065             try {
6066                 mService.setLongSupportMessage(admin, message);
6067             } catch (RemoteException e) {
6068                 throw e.rethrowFromSystemServer();
6069             }
6070         }
6071     }
6072 
6073     /**
6074      * Called by a device admin to get the long support message.
6075      *
6076      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
6077      * @return The message set by {@link #setLongSupportMessage(ComponentName, CharSequence)} or
6078      *         null if no message has been set.
6079      * @throws SecurityException if {@code admin} is not an active administrator.
6080      */
getLongSupportMessage(@onNull ComponentName admin)6081     public CharSequence getLongSupportMessage(@NonNull ComponentName admin) {
6082         throwIfParentInstance("getLongSupportMessage");
6083         if (mService != null) {
6084             try {
6085                 return mService.getLongSupportMessage(admin);
6086             } catch (RemoteException e) {
6087                 throw e.rethrowFromSystemServer();
6088             }
6089         }
6090         return null;
6091     }
6092 
6093     /**
6094      * Called by the system to get the short support message.
6095      *
6096      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
6097      * @param userHandle user id the admin is running as.
6098      * @return The message set by {@link #setShortSupportMessage(ComponentName, CharSequence)}
6099      *
6100      * @hide
6101      */
getShortSupportMessageForUser(@onNull ComponentName admin, int userHandle)6102     public CharSequence getShortSupportMessageForUser(@NonNull ComponentName admin,
6103             int userHandle) {
6104         if (mService != null) {
6105             try {
6106                 return mService.getShortSupportMessageForUser(admin, userHandle);
6107             } catch (RemoteException e) {
6108                 throw e.rethrowFromSystemServer();
6109             }
6110         }
6111         return null;
6112     }
6113 
6114 
6115     /**
6116      * Called by the system to get the long support message.
6117      *
6118      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
6119      * @param userHandle user id the admin is running as.
6120      * @return The message set by {@link #setLongSupportMessage(ComponentName, CharSequence)}
6121      *
6122      * @hide
6123      */
getLongSupportMessageForUser(@onNull ComponentName admin, int userHandle)6124     public CharSequence getLongSupportMessageForUser(@NonNull ComponentName admin, int userHandle) {
6125         if (mService != null) {
6126             try {
6127                 return mService.getLongSupportMessageForUser(admin, userHandle);
6128             } catch (RemoteException e) {
6129                 throw e.rethrowFromSystemServer();
6130             }
6131         }
6132         return null;
6133     }
6134 
6135     /**
6136      * Called by the profile owner of a managed profile to obtain a {@link DevicePolicyManager}
6137      * whose calls act on the parent profile.
6138      *
6139      * <p>The following methods are supported for the parent instance, all other methods will
6140      * throw a SecurityException when called on the parent instance:
6141      * <ul>
6142      * <li>{@link #getPasswordQuality}</li>
6143      * <li>{@link #setPasswordQuality}</li>
6144      * <li>{@link #getPasswordMinimumLength}</li>
6145      * <li>{@link #setPasswordMinimumLength}</li>
6146      * <li>{@link #getPasswordMinimumUpperCase}</li>
6147      * <li>{@link #setPasswordMinimumUpperCase}</li>
6148      * <li>{@link #getPasswordMinimumLowerCase}</li>
6149      * <li>{@link #setPasswordMinimumLowerCase}</li>
6150      * <li>{@link #getPasswordMinimumLetters}</li>
6151      * <li>{@link #setPasswordMinimumLetters}</li>
6152      * <li>{@link #getPasswordMinimumNumeric}</li>
6153      * <li>{@link #setPasswordMinimumNumeric}</li>
6154      * <li>{@link #getPasswordMinimumSymbols}</li>
6155      * <li>{@link #setPasswordMinimumSymbols}</li>
6156      * <li>{@link #getPasswordMinimumNonLetter}</li>
6157      * <li>{@link #setPasswordMinimumNonLetter}</li>
6158      * <li>{@link #getPasswordHistoryLength}</li>
6159      * <li>{@link #setPasswordHistoryLength}</li>
6160      * <li>{@link #getPasswordExpirationTimeout}</li>
6161      * <li>{@link #setPasswordExpirationTimeout}</li>
6162      * <li>{@link #getPasswordExpiration}</li>
6163      * <li>{@link #isActivePasswordSufficient}</li>
6164      * <li>{@link #getCurrentFailedPasswordAttempts}</li>
6165      * <li>{@link #getMaximumFailedPasswordsForWipe}</li>
6166      * <li>{@link #setMaximumFailedPasswordsForWipe}</li>
6167      * <li>{@link #getMaximumTimeToLock}</li>
6168      * <li>{@link #setMaximumTimeToLock}</li>
6169      * <li>{@link #lockNow}</li>
6170      * <li>{@link #getKeyguardDisabledFeatures}</li>
6171      * <li>{@link #setKeyguardDisabledFeatures}</li>
6172      * <li>{@link #getTrustAgentConfiguration}</li>
6173      * <li>{@link #setTrustAgentConfiguration}</li>
6174      * </ul>
6175      *
6176      * @return a new instance of {@link DevicePolicyManager} that acts on the parent profile.
6177      * @throws SecurityException if {@code admin} is not a profile owner.
6178      */
getParentProfileInstance(@onNull ComponentName admin)6179     public DevicePolicyManager getParentProfileInstance(@NonNull ComponentName admin) {
6180         throwIfParentInstance("getParentProfileInstance");
6181         try {
6182             if (!mService.isManagedProfile(admin)) {
6183                 throw new SecurityException("The current user does not have a parent profile.");
6184             }
6185             return new DevicePolicyManager(mContext, true);
6186         } catch (RemoteException e) {
6187             throw e.rethrowFromSystemServer();
6188         }
6189     }
6190 
6191     /**
6192      * Called by device owner to control the security logging feature. Logging can only be
6193      * enabled on single user devices where the sole user is managed by the device owner.
6194      *
6195      * <p> Security logs contain various information intended for security auditing purposes.
6196      * See {@link SecurityEvent} for details.
6197      *
6198      * <p>There must be only one user on the device, managed by the device owner.
6199      * Otherwise a {@link SecurityException} will be thrown.
6200      *
6201      * @param admin Which device owner this request is associated with.
6202      * @param enabled whether security logging should be enabled or not.
6203      * @throws SecurityException if {@code admin} is not a device owner.
6204      * @see #retrieveSecurityLogs
6205      */
setSecurityLoggingEnabled(@onNull ComponentName admin, boolean enabled)6206     public void setSecurityLoggingEnabled(@NonNull ComponentName admin, boolean enabled) {
6207         throwIfParentInstance("setSecurityLoggingEnabled");
6208         try {
6209             mService.setSecurityLoggingEnabled(admin, enabled);
6210         } catch (RemoteException re) {
6211             throw re.rethrowFromSystemServer();
6212         }
6213     }
6214 
6215     /**
6216      * Return whether security logging is enabled or not by the device owner.
6217      *
6218      * <p>Can only be called by the device owner, otherwise a {@link SecurityException} will be
6219      * thrown.
6220      *
6221      * @param admin Which device owner this request is associated with.
6222      * @return {@code true} if security logging is enabled by device owner, {@code false} otherwise.
6223      * @throws SecurityException if {@code admin} is not a device owner.
6224      */
isSecurityLoggingEnabled(@onNull ComponentName admin)6225     public boolean isSecurityLoggingEnabled(@NonNull ComponentName admin) {
6226         throwIfParentInstance("isSecurityLoggingEnabled");
6227         try {
6228             return mService.isSecurityLoggingEnabled(admin);
6229         } catch (RemoteException re) {
6230             throw re.rethrowFromSystemServer();
6231         }
6232     }
6233 
6234     /**
6235      * Called by device owner to retrieve all new security logging entries since the last call to
6236      * this API after device boots.
6237      *
6238      * <p> Access to the logs is rate limited and it will only return new logs after the device
6239      * owner has been notified via {@link DeviceAdminReceiver#onSecurityLogsAvailable}.
6240      *
6241      * <p>There must be only one user on the device, managed by the device owner.
6242      * Otherwise a {@link SecurityException} will be thrown.
6243      *
6244      * @param admin Which device owner this request is associated with.
6245      * @return the new batch of security logs which is a list of {@link SecurityEvent},
6246      * or {@code null} if rate limitation is exceeded or if logging is currently disabled.
6247      * @throws SecurityException if {@code admin} is not a device owner.
6248      */
retrieveSecurityLogs(@onNull ComponentName admin)6249     public List<SecurityEvent> retrieveSecurityLogs(@NonNull ComponentName admin) {
6250         throwIfParentInstance("retrieveSecurityLogs");
6251         try {
6252             ParceledListSlice<SecurityEvent> list = mService.retrieveSecurityLogs(admin);
6253             if (list != null) {
6254                 return list.getList();
6255             } else {
6256                 // Rate limit exceeded.
6257                 return null;
6258             }
6259         } catch (RemoteException re) {
6260             throw re.rethrowFromSystemServer();
6261         }
6262     }
6263 
6264     /**
6265      * Called by the system to obtain a {@link DevicePolicyManager} whose calls act on the parent
6266      * profile.
6267      *
6268      * @hide
6269      */
getParentProfileInstance(UserInfo uInfo)6270     public DevicePolicyManager getParentProfileInstance(UserInfo uInfo) {
6271         mContext.checkSelfPermission(
6272                 android.Manifest.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS);
6273         if (!uInfo.isManagedProfile()) {
6274             throw new SecurityException("The user " + uInfo.id
6275                     + " does not have a parent profile.");
6276         }
6277         return new DevicePolicyManager(mContext, true);
6278     }
6279 
6280     /**
6281      * Called by device owners to retrieve device logs from before the device's last reboot.
6282      * <p>
6283      * <strong> This API is not supported on all devices. Calling this API on unsupported devices
6284      * will result in {@code null} being returned. The device logs are retrieved from a RAM region
6285      * which is not guaranteed to be corruption-free during power cycles, as a result be cautious
6286      * about data corruption when parsing. </strong>
6287      * <p>
6288      * There must be only one user on the device, managed by the device owner. Otherwise a
6289      * {@link SecurityException} will be thrown.
6290      *
6291      * @param admin Which device owner this request is associated with.
6292      * @return Device logs from before the latest reboot of the system, or {@code null} if this API
6293      *         is not supported on the device.
6294      * @throws SecurityException if {@code admin} is not a device owner.
6295      */
retrievePreRebootSecurityLogs(@onNull ComponentName admin)6296     public List<SecurityEvent> retrievePreRebootSecurityLogs(@NonNull ComponentName admin) {
6297         throwIfParentInstance("retrievePreRebootSecurityLogs");
6298         try {
6299             ParceledListSlice<SecurityEvent> list = mService.retrievePreRebootSecurityLogs(admin);
6300             if (list != null) {
6301                 return list.getList();
6302             } else {
6303                 return null;
6304             }
6305         } catch (RemoteException re) {
6306             throw re.rethrowFromSystemServer();
6307         }
6308     }
6309 
6310     /**
6311      * Called by a profile owner of a managed profile to set the color used for customization. This
6312      * color is used as background color of the confirm credentials screen for that user. The
6313      * default color is teal (#00796B).
6314      * <p>
6315      * The confirm credentials screen can be created using
6316      * {@link android.app.KeyguardManager#createConfirmDeviceCredentialIntent}.
6317      *
6318      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
6319      * @param color The 24bit (0xRRGGBB) representation of the color to be used.
6320      * @throws SecurityException if {@code admin} is not a profile owner.
6321      */
setOrganizationColor(@onNull ComponentName admin, int color)6322     public void setOrganizationColor(@NonNull ComponentName admin, int color) {
6323         throwIfParentInstance("setOrganizationColor");
6324         try {
6325             // always enforce alpha channel to have 100% opacity
6326             color |= 0xFF000000;
6327             mService.setOrganizationColor(admin, color);
6328         } catch (RemoteException re) {
6329             throw re.rethrowFromSystemServer();
6330         }
6331     }
6332 
6333     /**
6334      * @hide
6335      *
6336      * Sets the color used for customization.
6337      *
6338      * @param color The 24bit (0xRRGGBB) representation of the color to be used.
6339      * @param userId which user to set the color to.
6340      * @RequiresPermission(allOf = {
6341      *       Manifest.permission.MANAGE_USERS,
6342      *       Manifest.permission.INTERACT_ACROSS_USERS_FULL})
6343      */
setOrganizationColorForUser(@olorInt int color, @UserIdInt int userId)6344     public void setOrganizationColorForUser(@ColorInt int color, @UserIdInt int userId) {
6345         try {
6346             // always enforce alpha channel to have 100% opacity
6347             color |= 0xFF000000;
6348             mService.setOrganizationColorForUser(color, userId);
6349         } catch (RemoteException re) {
6350             throw re.rethrowFromSystemServer();
6351         }
6352     }
6353 
6354     /**
6355      * Called by a profile owner of a managed profile to retrieve the color used for customization.
6356      * This color is used as background color of the confirm credentials screen for that user.
6357      *
6358      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
6359      * @return The 24bit (0xRRGGBB) representation of the color to be used.
6360      * @throws SecurityException if {@code admin} is not a profile owner.
6361      */
getOrganizationColor(@onNull ComponentName admin)6362     public @ColorInt int getOrganizationColor(@NonNull ComponentName admin) {
6363         throwIfParentInstance("getOrganizationColor");
6364         try {
6365             return mService.getOrganizationColor(admin);
6366         } catch (RemoteException re) {
6367             throw re.rethrowFromSystemServer();
6368         }
6369     }
6370 
6371     /**
6372      * @hide
6373      * Retrieve the customization color for a given user.
6374      *
6375      * @param userHandle The user id of the user we're interested in.
6376      * @return The 24bit (0xRRGGBB) representation of the color to be used.
6377      */
getOrganizationColorForUser(int userHandle)6378     public @ColorInt int getOrganizationColorForUser(int userHandle) {
6379         try {
6380             return mService.getOrganizationColorForUser(userHandle);
6381         } catch (RemoteException re) {
6382             throw re.rethrowFromSystemServer();
6383         }
6384     }
6385 
6386     /**
6387      * Called by a profile owner of a managed profile to set the name of the organization under
6388      * management.
6389      * <p>
6390      * If the organization name needs to be localized, it is the responsibility of the
6391      * {@link DeviceAdminReceiver} to listen to the {@link Intent#ACTION_LOCALE_CHANGED} broadcast
6392      * and set a new version of this string accordingly.
6393      *
6394      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
6395      * @param title The organization name or {@code null} to clear a previously set name.
6396      * @throws SecurityException if {@code admin} is not a profile owner.
6397      */
setOrganizationName(@onNull ComponentName admin, @Nullable CharSequence title)6398     public void setOrganizationName(@NonNull ComponentName admin, @Nullable CharSequence title) {
6399         throwIfParentInstance("setOrganizationName");
6400         try {
6401             mService.setOrganizationName(admin, title);
6402         } catch (RemoteException re) {
6403             throw re.rethrowFromSystemServer();
6404         }
6405     }
6406 
6407     /**
6408      * Called by a profile owner of a managed profile to retrieve the name of the organization under
6409      * management.
6410      *
6411      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
6412      * @return The organization name or {@code null} if none is set.
6413      * @throws SecurityException if {@code admin} is not a profile owner.
6414      */
getOrganizationName(@onNull ComponentName admin)6415     public CharSequence getOrganizationName(@NonNull ComponentName admin) {
6416         throwIfParentInstance("getOrganizationName");
6417         try {
6418             return mService.getOrganizationName(admin);
6419         } catch (RemoteException re) {
6420             throw re.rethrowFromSystemServer();
6421         }
6422     }
6423 
6424     /**
6425      * Retrieve the default title message used in the confirm credentials screen for a given user.
6426      *
6427      * @param userHandle The user id of the user we're interested in.
6428      * @return The organization name or {@code null} if none is set.
6429      *
6430      * @hide
6431      */
getOrganizationNameForUser(int userHandle)6432     public CharSequence getOrganizationNameForUser(int userHandle) {
6433         try {
6434             return mService.getOrganizationNameForUser(userHandle);
6435         } catch (RemoteException re) {
6436             throw re.rethrowFromSystemServer();
6437         }
6438     }
6439 
6440     /**
6441      * @return the {@link UserProvisioningState} for the current user - for unmanaged users will
6442      *         return {@link #STATE_USER_UNMANAGED}
6443      * @hide
6444      */
6445     @SystemApi
6446     @UserProvisioningState
getUserProvisioningState()6447     public int getUserProvisioningState() {
6448         throwIfParentInstance("getUserProvisioningState");
6449         if (mService != null) {
6450             try {
6451                 return mService.getUserProvisioningState();
6452             } catch (RemoteException e) {
6453                 throw e.rethrowFromSystemServer();
6454             }
6455         }
6456         return STATE_USER_UNMANAGED;
6457     }
6458 
6459     /**
6460      * Set the {@link UserProvisioningState} for the supplied user, if they are managed.
6461      *
6462      * @param state to store
6463      * @param userHandle for user
6464      * @hide
6465      */
setUserProvisioningState(@serProvisioningState int state, int userHandle)6466     public void setUserProvisioningState(@UserProvisioningState int state, int userHandle) {
6467         if (mService != null) {
6468             try {
6469                 mService.setUserProvisioningState(state, userHandle);
6470             } catch (RemoteException e) {
6471                 throw e.rethrowFromSystemServer();
6472             }
6473         }
6474     }
6475 
6476     /**
6477      * @hide
6478      * Indicates the entity that controls the device or profile owner. A user/profile is considered
6479      * affiliated if it is managed by the same entity as the device.
6480      *
6481      * <p> By definition, the user that the device owner runs on is always affiliated. Any other
6482      * user/profile is considered affiliated if the following conditions are both met:
6483      * <ul>
6484      * <li>The device owner and the user's/profile's profile owner have called this method,
6485      *   specifying a set of opaque affiliation ids each. If the sets specified by the device owner
6486      *   and a profile owner intersect, they must have come from the same source, which means that
6487      *   the device owner and profile owner are controlled by the same entity.</li>
6488      * <li>The device owner's and profile owner's package names are the same.</li>
6489      * </ul>
6490      *
6491      * @param admin Which profile or device owner this request is associated with.
6492      * @param ids A set of opaque affiliation ids.
6493      */
setAffiliationIds(@onNull ComponentName admin, Set<String> ids)6494     public void setAffiliationIds(@NonNull ComponentName admin, Set<String> ids) {
6495         throwIfParentInstance("setAffiliationIds");
6496         try {
6497             mService.setAffiliationIds(admin, new ArrayList<String>(ids));
6498         } catch (RemoteException e) {
6499             throw e.rethrowFromSystemServer();
6500         }
6501     }
6502 
6503     /**
6504      * @hide
6505      * Returns whether this user/profile is affiliated with the device. See
6506      * {@link #setAffiliationIds} for the definition of affiliation.
6507      *
6508      * @return whether this user/profile is affiliated with the device.
6509      */
isAffiliatedUser()6510     public boolean isAffiliatedUser() {
6511         throwIfParentInstance("isAffiliatedUser");
6512         try {
6513             return mService != null && mService.isAffiliatedUser();
6514         } catch (RemoteException e) {
6515             throw e.rethrowFromSystemServer();
6516         }
6517     }
6518 
6519     /**
6520      * @hide
6521      * Returns whether the uninstall for {@code packageName} for the current user is in queue
6522      * to be started
6523      * @param packageName the package to check for
6524      * @return whether the uninstall intent for {@code packageName} is pending
6525      */
isUninstallInQueue(String packageName)6526     public boolean isUninstallInQueue(String packageName) {
6527         try {
6528             return mService.isUninstallInQueue(packageName);
6529         } catch (RemoteException re) {
6530             throw re.rethrowFromSystemServer();
6531         }
6532     }
6533 
6534     /**
6535      * @hide
6536      * @param packageName the package containing active DAs to be uninstalled
6537      */
uninstallPackageWithActiveAdmins(String packageName)6538     public void uninstallPackageWithActiveAdmins(String packageName) {
6539         try {
6540             mService.uninstallPackageWithActiveAdmins(packageName);
6541         } catch (RemoteException re) {
6542             throw re.rethrowFromSystemServer();
6543         }
6544     }
6545 
6546     /**
6547      * @hide
6548      * Remove a test admin synchronously without sending it a broadcast about being removed.
6549      * If the admin is a profile owner or device owner it will still be removed.
6550      *
6551      * @param userHandle user id to remove the admin for.
6552      * @param admin The administration compononent to remove.
6553      * @throws SecurityException if the caller is not shell / root or the admin package
6554      *         isn't a test application see {@link ApplicationInfo#FLAG_TEST_APP}.
6555      */
forceRemoveActiveAdmin(ComponentName adminReceiver, int userHandle)6556     public void forceRemoveActiveAdmin(ComponentName adminReceiver, int userHandle) {
6557         try {
6558             mService.forceRemoveActiveAdmin(adminReceiver, userHandle);
6559         } catch (RemoteException re) {
6560             throw re.rethrowFromSystemServer();
6561         }
6562     }
6563 
6564     /**
6565      * @hide
6566      * @return whether {@link android.provider.Settings.Global#DEVICE_PROVISIONED} has ever been set
6567      * to 1.
6568      */
isDeviceProvisioned()6569     public boolean isDeviceProvisioned() {
6570         try {
6571             return mService.isDeviceProvisioned();
6572         } catch (RemoteException re) {
6573             throw re.rethrowFromSystemServer();
6574         }
6575     }
6576 
6577     /**
6578      * @hide
6579      * Writes that the provisioning configuration has been applied.
6580      */
setDeviceProvisioningConfigApplied()6581     public void setDeviceProvisioningConfigApplied() {
6582         try {
6583             mService.setDeviceProvisioningConfigApplied();
6584         } catch (RemoteException re) {
6585             throw re.rethrowFromSystemServer();
6586         }
6587     }
6588 
6589     /**
6590      * @hide
6591      * @return whether the provisioning configuration has been applied.
6592      */
isDeviceProvisioningConfigApplied()6593     public boolean isDeviceProvisioningConfigApplied() {
6594         try {
6595             return mService.isDeviceProvisioningConfigApplied();
6596         } catch (RemoteException re) {
6597             throw re.rethrowFromSystemServer();
6598         }
6599     }
6600 
throwIfParentInstance(String functionName)6601     private void throwIfParentInstance(String functionName) {
6602         if (mParentInstance) {
6603             throw new SecurityException(functionName + " cannot be called on the parent instance");
6604         }
6605     }
6606 
6607     /**
6608      * @hide
6609      * Enable backup service.
6610      * <p>This includes all backup and restore mechanisms.
6611      * Setting this to {@code false} will make backup service no-op or return empty results.
6612      *
6613      * <p>There must be only one user on the device, managed by the device owner.
6614      * Otherwise a {@link SecurityException} will be thrown.
6615      *
6616      * <p>Backup service is off by default when device owner is present.
6617      */
setBackupServiceEnabled(@onNull ComponentName admin, boolean enabled)6618     public void setBackupServiceEnabled(@NonNull ComponentName admin, boolean enabled) {
6619         try {
6620             mService.setBackupServiceEnabled(admin, enabled);
6621         } catch (RemoteException re) {
6622             throw re.rethrowFromSystemServer();
6623         }
6624     }
6625 
6626     /**
6627      * @hide
6628      * @return {@code true} if backup service is enabled, {@code false} otherwise.
6629      */
isBackupServiceEnabled(@onNull ComponentName admin)6630     public boolean isBackupServiceEnabled(@NonNull ComponentName admin) {
6631         try {
6632             return mService.isBackupServiceEnabled(admin);
6633         } catch (RemoteException re) {
6634             throw re.rethrowFromSystemServer();
6635         }
6636     }
6637 
6638     /**
6639      * Called by a device owner to control the network logging feature. Logging can only be
6640      * enabled on single user devices where the sole user is managed by the device owner. If a new
6641      * user is added on the device, logging is disabled.
6642      *
6643      * <p> Network logs contain DNS lookup and connect() library call events.
6644      *
6645      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
6646      * @param enabled whether network logging should be enabled or not.
6647      * @throws {@link SecurityException} if {@code admin} is not a device owner.
6648      * @see #retrieveNetworkLogs
6649      *
6650      * @hide
6651      */
setNetworkLoggingEnabled(@onNull ComponentName admin, boolean enabled)6652     public void setNetworkLoggingEnabled(@NonNull ComponentName admin, boolean enabled) {
6653         throwIfParentInstance("setNetworkLoggingEnabled");
6654         try {
6655             mService.setNetworkLoggingEnabled(admin, enabled);
6656         } catch (RemoteException re) {
6657             throw re.rethrowFromSystemServer();
6658         }
6659     }
6660 
6661     /**
6662      * Return whether network logging is enabled by a device owner.
6663      *
6664      * @param admin Which {@link DeviceAdminReceiver} this request is associated with. Can only
6665      * be {@code null} if the caller has MANAGE_USERS permission.
6666      * @return {@code true} if network logging is enabled by device owner, {@code false} otherwise.
6667      * @throws {@link SecurityException} if {@code admin} is not a device owner and caller has
6668      * no MANAGE_USERS permission
6669      *
6670      * @hide
6671      */
isNetworkLoggingEnabled(@ullable ComponentName admin)6672     public boolean isNetworkLoggingEnabled(@Nullable ComponentName admin) {
6673         throwIfParentInstance("isNetworkLoggingEnabled");
6674         try {
6675             return mService.isNetworkLoggingEnabled(admin);
6676         } catch (RemoteException re) {
6677             throw re.rethrowFromSystemServer();
6678         }
6679     }
6680 
6681     /**
6682      * Called by device owner to retrieve the most recent batch of network logging events.
6683      * A device owner has to provide a batchToken provided as part of
6684      * {@link DeviceAdminReceiver#onNetworkLogsAvailable} callback. If the token doesn't match the
6685      * token of the most recent available batch of logs, {@code null} will be returned.
6686      *
6687      * <p> {@link NetworkEvent} can be one of {@link DnsEvent} or {@link ConnectEvent}.
6688      *
6689      * <p> The list of network events is sorted chronologically, and contains at most 1200 events.
6690      *
6691      * <p> Access to the logs is rate limited and this method will only return a new batch of logs
6692      * after the device device owner has been notified via
6693      * {@link DeviceAdminReceiver#onNetworkLogsAvailable}.
6694      *
6695      * @param admin Which {@link DeviceAdminReceiver} this request is associated with.
6696      * @param batchToken A token of the batch to retrieve
6697      * @return A new batch of network logs which is a list of {@link NetworkEvent}. Returns
6698      *        {@code null} if the batch represented by batchToken is no longer available or if
6699      *        logging is disabled.
6700      * @throws {@link SecurityException} if {@code admin} is not a device owner.
6701      * @see DeviceAdminReceiver#onNetworkLogsAvailable
6702      *
6703      * @hide
6704      */
retrieveNetworkLogs(@onNull ComponentName admin, long batchToken)6705     public @Nullable List<NetworkEvent> retrieveNetworkLogs(@NonNull ComponentName admin,
6706             long batchToken) {
6707         throwIfParentInstance("retrieveNetworkLogs");
6708         try {
6709             return mService.retrieveNetworkLogs(admin, batchToken);
6710         } catch (RemoteException re) {
6711             throw re.rethrowFromSystemServer();
6712         }
6713     }
6714 }
6715