1 /* 2 * Copyright (C) 2010 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 package android.app.admin; 18 19 import android.annotation.ColorInt; 20 import android.annotation.IntDef; 21 import android.annotation.NonNull; 22 import android.annotation.Nullable; 23 import android.annotation.SdkConstant; 24 import android.annotation.SdkConstant.SdkConstantType; 25 import android.annotation.SystemApi; 26 import android.annotation.UserIdInt; 27 import android.app.Activity; 28 import android.app.admin.NetworkEvent; 29 import android.app.admin.SecurityLog.SecurityEvent; 30 import android.content.ComponentName; 31 import android.content.Context; 32 import android.content.Intent; 33 import android.content.IntentFilter; 34 import android.content.pm.PackageManager; 35 import android.content.pm.PackageManager.NameNotFoundException; 36 import android.content.pm.ParceledListSlice; 37 import android.content.pm.UserInfo; 38 import android.graphics.Bitmap; 39 import android.net.ProxyInfo; 40 import android.net.Uri; 41 import android.os.Bundle; 42 import android.os.PersistableBundle; 43 import android.os.Process; 44 import android.os.RemoteCallback; 45 import android.os.RemoteException; 46 import android.os.ServiceManager; 47 import android.os.UserHandle; 48 import android.os.UserManager; 49 import android.provider.ContactsContract.Directory; 50 import android.provider.Settings; 51 import android.security.Credentials; 52 import android.service.restrictions.RestrictionsReceiver; 53 import android.telephony.TelephonyManager; 54 import android.util.Log; 55 56 import com.android.internal.annotations.VisibleForTesting; 57 import com.android.org.conscrypt.TrustedCertificateStore; 58 59 import java.io.ByteArrayInputStream; 60 import java.io.IOException; 61 import java.lang.annotation.Retention; 62 import java.lang.annotation.RetentionPolicy; 63 import java.net.InetSocketAddress; 64 import java.net.Proxy; 65 import java.security.KeyFactory; 66 import java.security.NoSuchAlgorithmException; 67 import java.security.PrivateKey; 68 import java.security.cert.Certificate; 69 import java.security.cert.CertificateException; 70 import java.security.cert.CertificateFactory; 71 import java.security.cert.X509Certificate; 72 import java.security.spec.InvalidKeySpecException; 73 import java.security.spec.PKCS8EncodedKeySpec; 74 import java.util.ArrayList; 75 import java.util.Arrays; 76 import java.util.Collections; 77 import java.util.List; 78 import java.util.Set; 79 80 /** 81 * Public interface for managing policies enforced on a device. Most clients of this class must be 82 * registered with the system as a <a href="{@docRoot}guide/topics/admin/device-admin.html">device 83 * administrator</a>. Additionally, a device administrator may be registered as either a profile or 84 * device owner. A given method is accessible to all device administrators unless the documentation 85 * for that method specifies that it is restricted to either device or profile owners. Any 86 * application calling an api may only pass as an argument a device administrator component it 87 * owns. Otherwise, a {@link SecurityException} will be thrown. 88 * <div class="special reference"> 89 * <h3>Developer Guides</h3> 90 * <p> 91 * For more information about managing policies for device administration, read the <a href= 92 * "{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> developer 93 * guide. </div> 94 */ 95 public class DevicePolicyManager { 96 private static String TAG = "DevicePolicyManager"; 97 98 private final Context mContext; 99 private final IDevicePolicyManager mService; 100 private final boolean mParentInstance; 101 DevicePolicyManager(Context context, boolean parentInstance)102 private DevicePolicyManager(Context context, boolean parentInstance) { 103 this(context, 104 IDevicePolicyManager.Stub.asInterface( 105 ServiceManager.getService(Context.DEVICE_POLICY_SERVICE)), 106 parentInstance); 107 } 108 109 /** @hide */ 110 @VisibleForTesting DevicePolicyManager( Context context, IDevicePolicyManager service, boolean parentInstance)111 protected DevicePolicyManager( 112 Context context, IDevicePolicyManager service, boolean parentInstance) { 113 mContext = context; 114 mService = service; 115 mParentInstance = parentInstance; 116 } 117 118 /** @hide */ create(Context context)119 public static DevicePolicyManager create(Context context) { 120 DevicePolicyManager me = new DevicePolicyManager(context, false); 121 return me.mService != null ? me : null; 122 } 123 124 /** @hide test will override it. */ 125 @VisibleForTesting myUserId()126 protected int myUserId() { 127 return UserHandle.myUserId(); 128 } 129 130 /** 131 * Activity action: Starts the provisioning flow which sets up a managed profile. 132 * 133 * <p>A managed profile allows data separation for example for the usage of a 134 * device as a personal and corporate device. The user which provisioning is started from and 135 * the managed profile share a launcher. 136 * 137 * <p>This intent will typically be sent by a mobile device management application (MDM). 138 * Provisioning adds a managed profile and sets the MDM as the profile owner who has full 139 * control over the profile. 140 * 141 * <p>It is possible to check if provisioning is allowed or not by querying the method 142 * {@link #isProvisioningAllowed(String)}. 143 * 144 * <p>In version {@link android.os.Build.VERSION_CODES#LOLLIPOP}, this intent must contain the 145 * extra {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME}. 146 * As of {@link android.os.Build.VERSION_CODES#M}, it should contain the extra 147 * {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME} instead, although specifying only 148 * {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME} is still supported. 149 * 150 * <p>The intent may also contain the following extras: 151 * <ul> 152 * <li>{@link #EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE}, optional </li> 153 * <li>{@link #EXTRA_PROVISIONING_SKIP_ENCRYPTION}, optional, supported from 154 * {@link android.os.Build.VERSION_CODES#N}</li> 155 * <li>{@link #EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE}, optional</li> 156 * <li>{@link #EXTRA_PROVISIONING_LOGO_URI}, optional</li> 157 * <li>{@link #EXTRA_PROVISIONING_MAIN_COLOR}, optional</li> 158 * </ul> 159 * 160 * <p>When managed provisioning has completed, broadcasts are sent to the application specified 161 * in the provisioning intent. The 162 * {@link DeviceAdminReceiver#ACTION_PROFILE_PROVISIONING_COMPLETE} broadcast is sent in the 163 * managed profile and the {@link #ACTION_MANAGED_PROFILE_PROVISIONED} broadcast is sent in 164 * the primary profile. 165 * 166 * <p>If provisioning fails, the managedProfile is removed so the device returns to its 167 * previous state. 168 * 169 * <p>If launched with {@link android.app.Activity#startActivityForResult(Intent, int)} a 170 * result code of {@link android.app.Activity#RESULT_OK} implies that the synchronous part of 171 * the provisioning flow was successful, although this doesn't guarantee the full flow will 172 * succeed. Conversely a result code of {@link android.app.Activity#RESULT_CANCELED} implies 173 * that the user backed-out of provisioning, or some precondition for provisioning wasn't met. 174 */ 175 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION) 176 public static final String ACTION_PROVISION_MANAGED_PROFILE 177 = "android.app.action.PROVISION_MANAGED_PROFILE"; 178 179 /** 180 * Activity action: Starts the provisioning flow which sets up a managed user. 181 * 182 * <p>This intent will typically be sent by a mobile device management application (MDM). 183 * Provisioning configures the user as managed user and sets the MDM as the profile 184 * owner who has full control over the user. Provisioning can only happen before user setup has 185 * been completed. Use {@link #isProvisioningAllowed(String)} to check if provisioning is 186 * allowed. 187 * 188 * <p>The intent contains the following extras: 189 * <ul> 190 * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME}</li> 191 * <li>{@link #EXTRA_PROVISIONING_SKIP_ENCRYPTION}, optional</li> 192 * <li>{@link #EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE}, optional</li> 193 * <li>{@link #EXTRA_PROVISIONING_LOGO_URI}, optional</li> 194 * <li>{@link #EXTRA_PROVISIONING_MAIN_COLOR}, optional</li> 195 * </ul> 196 * 197 * <p>If provisioning fails, the device returns to its previous state. 198 * 199 * <p>If launched with {@link android.app.Activity#startActivityForResult(Intent, int)} a 200 * result code of {@link android.app.Activity#RESULT_OK} implies that the synchronous part of 201 * the provisioning flow was successful, although this doesn't guarantee the full flow will 202 * succeed. Conversely a result code of {@link android.app.Activity#RESULT_CANCELED} implies 203 * that the user backed-out of provisioning, or some precondition for provisioning wasn't met. 204 * 205 * @hide 206 */ 207 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION) 208 public static final String ACTION_PROVISION_MANAGED_USER 209 = "android.app.action.PROVISION_MANAGED_USER"; 210 211 /** 212 * Activity action: Starts the provisioning flow which sets up a managed device. 213 * Must be started with {@link android.app.Activity#startActivityForResult(Intent, int)}. 214 * 215 * <p> During device owner provisioning a device admin app is set as the owner of the device. 216 * A device owner has full control over the device. The device owner can not be modified by the 217 * user. 218 * 219 * <p> A typical use case would be a device that is owned by a company, but used by either an 220 * employee or client. 221 * 222 * <p> An intent with this action can be sent only on an unprovisioned device. 223 * It is possible to check if provisioning is allowed or not by querying the method 224 * {@link #isProvisioningAllowed(String)}. 225 * 226 * <p>The intent contains the following extras: 227 * <ul> 228 * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME}</li> 229 * <li>{@link #EXTRA_PROVISIONING_SKIP_ENCRYPTION}, optional</li> 230 * <li>{@link #EXTRA_PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED}, optional</li> 231 * <li>{@link #EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE}, optional</li> 232 * <li>{@link #EXTRA_PROVISIONING_LOGO_URI}, optional</li> 233 * <li>{@link #EXTRA_PROVISIONING_MAIN_COLOR}, optional</li> 234 * </ul> 235 * 236 * <p>When device owner provisioning has completed, an intent of the type 237 * {@link DeviceAdminReceiver#ACTION_PROFILE_PROVISIONING_COMPLETE} is broadcast to the 238 * device owner. 239 * 240 * <p>If provisioning fails, the device is factory reset. 241 * 242 * <p>A result code of {@link android.app.Activity#RESULT_OK} implies that the synchronous part 243 * of the provisioning flow was successful, although this doesn't guarantee the full flow will 244 * succeed. Conversely a result code of {@link android.app.Activity#RESULT_CANCELED} implies 245 * that the user backed-out of provisioning, or some precondition for provisioning wasn't met. 246 */ 247 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION) 248 public static final String ACTION_PROVISION_MANAGED_DEVICE 249 = "android.app.action.PROVISION_MANAGED_DEVICE"; 250 251 /** 252 * Activity action: Starts the provisioning flow which sets up a managed device. 253 * 254 * <p>During device owner provisioning, a device admin app is downloaded and set as the owner of 255 * the device. A device owner has full control over the device. The device owner can not be 256 * modified by the user and the only way of resetting the device is via factory reset. 257 * 258 * <p>A typical use case would be a device that is owned by a company, but used by either an 259 * employee or client. 260 * 261 * <p>The provisioning message should be sent to an unprovisioned device. 262 * 263 * <p>Unlike {@link #ACTION_PROVISION_MANAGED_DEVICE}, the provisioning message can only be sent 264 * by a privileged app with the permission 265 * {@link android.Manifest.permission#DISPATCH_PROVISIONING_MESSAGE}. 266 * 267 * <p>The provisioning intent contains the following properties: 268 * <ul> 269 * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME}</li> 270 * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION}, optional</li> 271 * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_COOKIE_HEADER}, optional</li> 272 * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM}, optional</li> 273 * <li>{@link #EXTRA_PROVISIONING_LOCAL_TIME} (convert to String), optional</li> 274 * <li>{@link #EXTRA_PROVISIONING_TIME_ZONE}, optional</li> 275 * <li>{@link #EXTRA_PROVISIONING_LOCALE}, optional</li> 276 * <li>{@link #EXTRA_PROVISIONING_WIFI_SSID}, optional</li> 277 * <li>{@link #EXTRA_PROVISIONING_WIFI_HIDDEN} (convert to String), optional</li> 278 * <li>{@link #EXTRA_PROVISIONING_WIFI_SECURITY_TYPE}, optional</li> 279 * <li>{@link #EXTRA_PROVISIONING_WIFI_PASSWORD}, optional</li> 280 * <li>{@link #EXTRA_PROVISIONING_WIFI_PROXY_HOST}, optional</li> 281 * <li>{@link #EXTRA_PROVISIONING_WIFI_PROXY_PORT} (convert to String), optional</li> 282 * <li>{@link #EXTRA_PROVISIONING_WIFI_PROXY_BYPASS}, optional</li> 283 * <li>{@link #EXTRA_PROVISIONING_WIFI_PAC_URL}, optional</li> 284 * <li>{@link #EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE}, optional</li></ul> 285 * 286 * @hide 287 */ 288 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION) 289 @SystemApi 290 public static final String ACTION_PROVISION_MANAGED_DEVICE_FROM_TRUSTED_SOURCE = 291 "android.app.action.PROVISION_MANAGED_DEVICE_FROM_TRUSTED_SOURCE"; 292 293 /** 294 * Activity action: Starts the provisioning flow which sets up a managed device. 295 * Must be started with {@link android.app.Activity#startActivityForResult(Intent, int)}. 296 * 297 * <p>NOTE: This is only supported on split system user devices, and puts the device into a 298 * management state that is distinct from that reached by 299 * {@link #ACTION_PROVISION_MANAGED_DEVICE} - specifically the device owner runs on the system 300 * user, and only has control over device-wide policies, not individual users and their data. 301 * The primary benefit is that multiple non-system users are supported when provisioning using 302 * this form of device management. 303 * 304 * <p>During device owner provisioning a device admin app is set as the owner of the device. 305 * A device owner has full control over the device. The device owner can not be modified by the 306 * user. 307 * 308 * <p>A typical use case would be a device that is owned by a company, but used by either an 309 * employee or client. 310 * 311 * <p>An intent with this action can be sent only on an unprovisioned device. 312 * It is possible to check if provisioning is allowed or not by querying the method 313 * {@link #isProvisioningAllowed(String)}. 314 * 315 * <p>The intent contains the following extras: 316 * <ul> 317 * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME}</li> 318 * <li>{@link #EXTRA_PROVISIONING_SKIP_ENCRYPTION}, optional</li> 319 * <li>{@link #EXTRA_PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED}, optional</li> 320 * <li>{@link #EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE}, optional</li> 321 * <li>{@link #EXTRA_PROVISIONING_LOGO_URI}, optional</li> 322 * <li>{@link #EXTRA_PROVISIONING_MAIN_COLOR}, optional</li> 323 * </ul> 324 * 325 * <p>When device owner provisioning has completed, an intent of the type 326 * {@link DeviceAdminReceiver#ACTION_PROFILE_PROVISIONING_COMPLETE} is broadcast to the 327 * device owner. 328 * 329 * <p>If provisioning fails, the device is factory reset. 330 * 331 * <p>A result code of {@link android.app.Activity#RESULT_OK} implies that the synchronous part 332 * of the provisioning flow was successful, although this doesn't guarantee the full flow will 333 * succeed. Conversely a result code of {@link android.app.Activity#RESULT_CANCELED} implies 334 * that the user backed-out of provisioning, or some precondition for provisioning wasn't met. 335 * 336 * @hide 337 */ 338 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION) 339 public static final String ACTION_PROVISION_MANAGED_SHAREABLE_DEVICE 340 = "android.app.action.PROVISION_MANAGED_SHAREABLE_DEVICE"; 341 342 /** 343 * Activity action: Finalizes management provisioning, should be used after user-setup 344 * has been completed and {@link #getUserProvisioningState()} returns one of: 345 * <ul> 346 * <li>{@link #STATE_USER_SETUP_INCOMPLETE}</li> 347 * <li>{@link #STATE_USER_SETUP_COMPLETE}</li> 348 * <li>{@link #STATE_USER_PROFILE_COMPLETE}</li> 349 * </ul> 350 * 351 * @hide 352 */ 353 @SystemApi 354 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION) 355 public static final String ACTION_PROVISION_FINALIZATION 356 = "android.app.action.PROVISION_FINALIZATION"; 357 358 /** 359 * Action: Bugreport sharing with device owner has been accepted by the user. 360 * 361 * @hide 362 */ 363 public static final String ACTION_BUGREPORT_SHARING_ACCEPTED = 364 "com.android.server.action.REMOTE_BUGREPORT_SHARING_ACCEPTED"; 365 366 /** 367 * Action: Bugreport sharing with device owner has been declined by the user. 368 * 369 * @hide 370 */ 371 public static final String ACTION_BUGREPORT_SHARING_DECLINED = 372 "com.android.server.action.REMOTE_BUGREPORT_SHARING_DECLINED"; 373 374 /** 375 * Action: Bugreport has been collected and is dispatched to {@link DevicePolicyManagerService}. 376 * 377 * @hide 378 */ 379 public static final String ACTION_REMOTE_BUGREPORT_DISPATCH = 380 "android.intent.action.REMOTE_BUGREPORT_DISPATCH"; 381 382 /** 383 * Extra for shared bugreport's SHA-256 hash. 384 * 385 * @hide 386 */ 387 public static final String EXTRA_REMOTE_BUGREPORT_HASH = 388 "android.intent.extra.REMOTE_BUGREPORT_HASH"; 389 390 /** 391 * Extra for remote bugreport notification shown type. 392 * 393 * @hide 394 */ 395 public static final String EXTRA_BUGREPORT_NOTIFICATION_TYPE = 396 "android.app.extra.bugreport_notification_type"; 397 398 /** 399 * Notification type for a started remote bugreport flow. 400 * 401 * @hide 402 */ 403 public static final int NOTIFICATION_BUGREPORT_STARTED = 1; 404 405 /** 406 * Notification type for a bugreport that has already been accepted to be shared, but is still 407 * being taken. 408 * 409 * @hide 410 */ 411 public static final int NOTIFICATION_BUGREPORT_ACCEPTED_NOT_FINISHED = 2; 412 413 /** 414 * Notification type for a bugreport that has been taken and can be shared or declined. 415 * 416 * @hide 417 */ 418 public static final int NOTIFICATION_BUGREPORT_FINISHED_NOT_ACCEPTED = 3; 419 420 /** 421 * Default and maximum timeout in milliseconds after which unlocking with weak auth times out, 422 * i.e. the user has to use a strong authentication method like password, PIN or pattern. 423 * 424 * @hide 425 */ 426 public static final long DEFAULT_STRONG_AUTH_TIMEOUT_MS = 72 * 60 * 60 * 1000; // 72h 427 428 /** 429 * A {@link android.os.Parcelable} extra of type {@link android.os.PersistableBundle} that 430 * allows a mobile device management application or NFC programmer application which starts 431 * managed provisioning to pass data to the management application instance after provisioning. 432 * <p> 433 * If used with {@link #ACTION_PROVISION_MANAGED_PROFILE} it can be used by the application that 434 * sends the intent to pass data to itself on the newly created profile. 435 * If used with {@link #ACTION_PROVISION_MANAGED_DEVICE} it allows passing data to the same 436 * instance of the app on the primary user. 437 * Starting from {@link android.os.Build.VERSION_CODES#M}, if used with 438 * {@link #MIME_TYPE_PROVISIONING_NFC} as part of NFC managed device provisioning, the NFC 439 * message should contain a stringified {@link java.util.Properties} instance, whose string 440 * properties will be converted into a {@link android.os.PersistableBundle} and passed to the 441 * management application after provisioning. 442 * 443 * <p> 444 * In both cases the application receives the data in 445 * {@link DeviceAdminReceiver#onProfileProvisioningComplete} via an intent with the action 446 * {@link DeviceAdminReceiver#ACTION_PROFILE_PROVISIONING_COMPLETE}. The bundle is not changed 447 * during the managed provisioning. 448 */ 449 public static final String EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE = 450 "android.app.extra.PROVISIONING_ADMIN_EXTRAS_BUNDLE"; 451 452 /** 453 * A String extra holding the package name of the mobile device management application that 454 * will be set as the profile owner or device owner. 455 * 456 * <p>If an application starts provisioning directly via an intent with action 457 * {@link #ACTION_PROVISION_MANAGED_PROFILE} this package has to match the package name of the 458 * application that started provisioning. The package will be set as profile owner in that case. 459 * 460 * <p>This package is set as device owner when device owner provisioning is started by an NFC 461 * message containing an NFC record with MIME type {@link #MIME_TYPE_PROVISIONING_NFC}. 462 * 463 * <p> When this extra is set, the application must have exactly one device admin receiver. 464 * This receiver will be set as the profile or device owner and active admin. 465 * 466 * @see DeviceAdminReceiver 467 * @deprecated Use {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME}. This extra is still 468 * supported, but only if there is only one device admin receiver in the package that requires 469 * the permission {@link android.Manifest.permission#BIND_DEVICE_ADMIN}. 470 */ 471 @Deprecated 472 public static final String EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME 473 = "android.app.extra.PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME"; 474 475 /** 476 * A ComponentName extra indicating the device admin receiver of the mobile device management 477 * application that will be set as the profile owner or device owner and active admin. 478 * 479 * <p>If an application starts provisioning directly via an intent with action 480 * {@link #ACTION_PROVISION_MANAGED_PROFILE} or 481 * {@link #ACTION_PROVISION_MANAGED_DEVICE} the package name of this 482 * component has to match the package name of the application that started provisioning. 483 * 484 * <p>This component is set as device owner and active admin when device owner provisioning is 485 * started by an intent with action {@link #ACTION_PROVISION_MANAGED_DEVICE} or by an NFC 486 * message containing an NFC record with MIME type 487 * {@link #MIME_TYPE_PROVISIONING_NFC}. For the NFC record, the component name must be 488 * flattened to a string, via {@link ComponentName#flattenToShortString()}. 489 * 490 * @see DeviceAdminReceiver 491 */ 492 public static final String EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME 493 = "android.app.extra.PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME"; 494 495 /** 496 * An {@link android.accounts.Account} extra holding the account to migrate during managed 497 * profile provisioning. If the account supplied is present in the primary user, it will be 498 * copied, along with its credentials to the managed profile and removed from the primary user. 499 * 500 * Use with {@link #ACTION_PROVISION_MANAGED_PROFILE}. 501 */ 502 503 public static final String EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE 504 = "android.app.extra.PROVISIONING_ACCOUNT_TO_MIGRATE"; 505 506 /** 507 * A String extra that, holds the email address of the account which a managed profile is 508 * created for. Used with {@link #ACTION_PROVISION_MANAGED_PROFILE} and 509 * {@link DeviceAdminReceiver#ACTION_PROFILE_PROVISIONING_COMPLETE}. 510 * 511 * <p> This extra is part of the {@link #EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE}. 512 * 513 * <p> If the {@link #ACTION_PROVISION_MANAGED_PROFILE} intent that starts managed provisioning 514 * contains this extra, it is forwarded in the 515 * {@link DeviceAdminReceiver#ACTION_PROFILE_PROVISIONING_COMPLETE} intent to the mobile 516 * device management application that was set as the profile owner during provisioning. 517 * It is usually used to avoid that the user has to enter their email address twice. 518 */ 519 public static final String EXTRA_PROVISIONING_EMAIL_ADDRESS 520 = "android.app.extra.PROVISIONING_EMAIL_ADDRESS"; 521 522 /** 523 * A integer extra indicating the predominant color to show during the provisioning. 524 * Refer to {@link android.graphics.Color} for how the color is represented. 525 * 526 * <p>Use with {@link #ACTION_PROVISION_MANAGED_PROFILE} or 527 * {@link #ACTION_PROVISION_MANAGED_DEVICE}. 528 */ 529 public static final String EXTRA_PROVISIONING_MAIN_COLOR = 530 "android.app.extra.PROVISIONING_MAIN_COLOR"; 531 532 /** 533 * A Boolean extra that can be used by the mobile device management application to skip the 534 * disabling of system apps during provisioning when set to {@code true}. 535 * 536 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} or an intent with action 537 * {@link #ACTION_PROVISION_MANAGED_DEVICE} that starts device owner provisioning. 538 */ 539 public static final String EXTRA_PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED = 540 "android.app.extra.PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED"; 541 542 /** 543 * A String extra holding the time zone {@link android.app.AlarmManager} that the device 544 * will be set to. 545 * 546 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 547 * provisioning via an NFC bump. 548 */ 549 public static final String EXTRA_PROVISIONING_TIME_ZONE 550 = "android.app.extra.PROVISIONING_TIME_ZONE"; 551 552 /** 553 * A Long extra holding the wall clock time (in milliseconds) to be set on the device's 554 * {@link android.app.AlarmManager}. 555 * 556 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 557 * provisioning via an NFC bump. 558 */ 559 public static final String EXTRA_PROVISIONING_LOCAL_TIME 560 = "android.app.extra.PROVISIONING_LOCAL_TIME"; 561 562 /** 563 * A String extra holding the {@link java.util.Locale} that the device will be set to. 564 * Format: xx_yy, where xx is the language code, and yy the country code. 565 * 566 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 567 * provisioning via an NFC bump. 568 */ 569 public static final String EXTRA_PROVISIONING_LOCALE 570 = "android.app.extra.PROVISIONING_LOCALE"; 571 572 /** 573 * A String extra holding the ssid of the wifi network that should be used during nfc device 574 * owner provisioning for downloading the mobile device management application. 575 * 576 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 577 * provisioning via an NFC bump. 578 */ 579 public static final String EXTRA_PROVISIONING_WIFI_SSID 580 = "android.app.extra.PROVISIONING_WIFI_SSID"; 581 582 /** 583 * A boolean extra indicating whether the wifi network in {@link #EXTRA_PROVISIONING_WIFI_SSID} 584 * is hidden or not. 585 * 586 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 587 * provisioning via an NFC bump. 588 */ 589 public static final String EXTRA_PROVISIONING_WIFI_HIDDEN 590 = "android.app.extra.PROVISIONING_WIFI_HIDDEN"; 591 592 /** 593 * A String extra indicating the security type of the wifi network in 594 * {@link #EXTRA_PROVISIONING_WIFI_SSID} and could be one of {@code NONE}, {@code WPA} or 595 * {@code WEP}. 596 * 597 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 598 * provisioning via an NFC bump. 599 */ 600 public static final String EXTRA_PROVISIONING_WIFI_SECURITY_TYPE 601 = "android.app.extra.PROVISIONING_WIFI_SECURITY_TYPE"; 602 603 /** 604 * A String extra holding the password of the wifi network in 605 * {@link #EXTRA_PROVISIONING_WIFI_SSID}. 606 * 607 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 608 * provisioning via an NFC bump. 609 */ 610 public static final String EXTRA_PROVISIONING_WIFI_PASSWORD 611 = "android.app.extra.PROVISIONING_WIFI_PASSWORD"; 612 613 /** 614 * A String extra holding the proxy host for the wifi network in 615 * {@link #EXTRA_PROVISIONING_WIFI_SSID}. 616 * 617 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 618 * provisioning via an NFC bump. 619 */ 620 public static final String EXTRA_PROVISIONING_WIFI_PROXY_HOST 621 = "android.app.extra.PROVISIONING_WIFI_PROXY_HOST"; 622 623 /** 624 * An int extra holding the proxy port for the wifi network in 625 * {@link #EXTRA_PROVISIONING_WIFI_SSID}. 626 * 627 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 628 * provisioning via an NFC bump. 629 */ 630 public static final String EXTRA_PROVISIONING_WIFI_PROXY_PORT 631 = "android.app.extra.PROVISIONING_WIFI_PROXY_PORT"; 632 633 /** 634 * A String extra holding the proxy bypass for the wifi network in 635 * {@link #EXTRA_PROVISIONING_WIFI_SSID}. 636 * 637 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 638 * provisioning via an NFC bump. 639 */ 640 public static final String EXTRA_PROVISIONING_WIFI_PROXY_BYPASS 641 = "android.app.extra.PROVISIONING_WIFI_PROXY_BYPASS"; 642 643 /** 644 * A String extra holding the proxy auto-config (PAC) URL for the wifi network in 645 * {@link #EXTRA_PROVISIONING_WIFI_SSID}. 646 * 647 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 648 * provisioning via an NFC bump. 649 */ 650 public static final String EXTRA_PROVISIONING_WIFI_PAC_URL 651 = "android.app.extra.PROVISIONING_WIFI_PAC_URL"; 652 653 /** 654 * A String extra holding a url that specifies the download location of the device admin 655 * package. When not provided it is assumed that the device admin package is already installed. 656 * 657 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 658 * provisioning via an NFC bump. 659 */ 660 public static final String EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION 661 = "android.app.extra.PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION"; 662 663 /** 664 * An int extra holding a minimum required version code for the device admin package. If the 665 * device admin is already installed on the device, it will only be re-downloaded from 666 * {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION} if the version of the 667 * installed package is less than this version code. 668 * 669 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 670 * provisioning via an NFC bump. 671 */ 672 public static final String EXTRA_PROVISIONING_DEVICE_ADMIN_MINIMUM_VERSION_CODE 673 = "android.app.extra.PROVISIONING_DEVICE_ADMIN_MINIMUM_VERSION_CODE"; 674 675 /** 676 * A String extra holding a http cookie header which should be used in the http request to the 677 * url specified in {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION}. 678 * 679 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 680 * provisioning via an NFC bump. 681 */ 682 public static final String EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_COOKIE_HEADER 683 = "android.app.extra.PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_COOKIE_HEADER"; 684 685 /** 686 * A String extra holding the URL-safe base64 encoded SHA-256 or SHA-1 hash (see notes below) of 687 * the file at download location specified in 688 * {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION}. 689 * 690 * <p>Either this extra or {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_SIGNATURE_CHECKSUM} must be 691 * present. The provided checksum must match the checksum of the file at the download 692 * location. If the checksum doesn't match an error will be shown to the user and the user will 693 * be asked to factory reset the device. 694 * 695 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 696 * provisioning via an NFC bump. 697 * 698 * <p><strong>Note:</strong> for devices running {@link android.os.Build.VERSION_CODES#LOLLIPOP} 699 * and {@link android.os.Build.VERSION_CODES#LOLLIPOP_MR1} only SHA-1 hash is supported. 700 * Starting from {@link android.os.Build.VERSION_CODES#M}, this parameter accepts SHA-256 in 701 * addition to SHA-1. Support for SHA-1 is likely to be removed in future OS releases. 702 */ 703 public static final String EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM 704 = "android.app.extra.PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM"; 705 706 /** 707 * A String extra holding the URL-safe base64 encoded SHA-256 checksum of any signature of the 708 * android package archive at the download location specified in {@link 709 * #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION}. 710 * 711 * <p>The signatures of an android package archive can be obtained using 712 * {@link android.content.pm.PackageManager#getPackageArchiveInfo} with flag 713 * {@link android.content.pm.PackageManager#GET_SIGNATURES}. 714 * 715 * <p>Either this extra or {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM} must be 716 * present. The provided checksum must match the checksum of any signature of the file at 717 * the download location. If the checksum does not match an error will be shown to the user and 718 * the user will be asked to factory reset the device. 719 * 720 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} that starts device owner 721 * provisioning via an NFC bump. 722 */ 723 public static final String EXTRA_PROVISIONING_DEVICE_ADMIN_SIGNATURE_CHECKSUM 724 = "android.app.extra.PROVISIONING_DEVICE_ADMIN_SIGNATURE_CHECKSUM"; 725 726 /** 727 * Broadcast Action: This broadcast is sent to indicate that provisioning of a managed profile 728 * has completed successfully. 729 * 730 * <p>The broadcast is limited to the primary profile, to the app specified in the provisioning 731 * intent with action {@link #ACTION_PROVISION_MANAGED_PROFILE}. 732 * 733 * <p>This intent will contain the extra {@link #EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE} which 734 * corresponds to the account requested to be migrated at provisioning time, if any. 735 */ 736 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION) 737 public static final String ACTION_MANAGED_PROFILE_PROVISIONED 738 = "android.app.action.MANAGED_PROFILE_PROVISIONED"; 739 740 /** 741 * A boolean extra indicating whether device encryption can be skipped as part of device owner 742 * or managed profile provisioning. 743 * 744 * <p>Use in an NFC record with {@link #MIME_TYPE_PROVISIONING_NFC} or an intent with action 745 * {@link #ACTION_PROVISION_MANAGED_DEVICE} that starts device owner provisioning. 746 * 747 * <p>From {@link android.os.Build.VERSION_CODES#N} onwards, this is also supported for an 748 * intent with action {@link #ACTION_PROVISION_MANAGED_PROFILE}. 749 */ 750 public static final String EXTRA_PROVISIONING_SKIP_ENCRYPTION = 751 "android.app.extra.PROVISIONING_SKIP_ENCRYPTION"; 752 753 /** 754 * A {@link Uri} extra pointing to a logo image. This image will be shown during the 755 * provisioning. If this extra is not passed, a default image will be shown. 756 * <h5>The following URI schemes are accepted:</h5> 757 * <ul> 758 * <li>content ({@link android.content.ContentResolver#SCHEME_CONTENT})</li> 759 * <li>android.resource ({@link android.content.ContentResolver#SCHEME_ANDROID_RESOURCE})</li> 760 * </ul> 761 * 762 * <p> It is the responsability of the caller to provide an image with a reasonable 763 * pixed density for the device. 764 * 765 * <p> If a content: URI is passed, the intent should have the flag 766 * {@link Intent#FLAG_GRANT_READ_URI_PERMISSION} and the uri should be added to the 767 * {@link android.content.ClipData} of the intent too. 768 * 769 * <p>Use in an intent with action {@link #ACTION_PROVISION_MANAGED_PROFILE} or 770 * {@link #ACTION_PROVISION_MANAGED_DEVICE} 771 */ 772 public static final String EXTRA_PROVISIONING_LOGO_URI = 773 "android.app.extra.PROVISIONING_LOGO_URI"; 774 775 /** 776 * A boolean extra indicating if user setup should be skipped, for when provisioning is started 777 * during setup-wizard. 778 * 779 * <p>If unspecified, defaults to {@code true} to match the behavior in 780 * {@link android.os.Build.VERSION_CODES#M} and earlier. 781 * 782 * <p>Use in an intent with action {@link #ACTION_PROVISION_MANAGED_DEVICE} or 783 * {@link #ACTION_PROVISION_MANAGED_USER}. 784 * 785 * @hide 786 */ 787 public static final String EXTRA_PROVISIONING_SKIP_USER_SETUP = 788 "android.app.extra.PROVISIONING_SKIP_USER_SETUP"; 789 790 /** 791 * This MIME type is used for starting the device owner provisioning. 792 * 793 * <p>During device owner provisioning a device admin app is set as the owner of the device. 794 * A device owner has full control over the device. The device owner can not be modified by the 795 * user and the only way of resetting the device is if the device owner app calls a factory 796 * reset. 797 * 798 * <p> A typical use case would be a device that is owned by a company, but used by either an 799 * employee or client. 800 * 801 * <p> The NFC message must be sent to an unprovisioned device. 802 * 803 * <p>The NFC record must contain a serialized {@link java.util.Properties} object which 804 * contains the following properties: 805 * <ul> 806 * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME}</li> 807 * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION}, optional</li> 808 * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_COOKIE_HEADER}, optional</li> 809 * <li>{@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM}, optional</li> 810 * <li>{@link #EXTRA_PROVISIONING_LOCAL_TIME} (convert to String), optional</li> 811 * <li>{@link #EXTRA_PROVISIONING_TIME_ZONE}, optional</li> 812 * <li>{@link #EXTRA_PROVISIONING_LOCALE}, optional</li> 813 * <li>{@link #EXTRA_PROVISIONING_WIFI_SSID}, optional</li> 814 * <li>{@link #EXTRA_PROVISIONING_WIFI_HIDDEN} (convert to String), optional</li> 815 * <li>{@link #EXTRA_PROVISIONING_WIFI_SECURITY_TYPE}, optional</li> 816 * <li>{@link #EXTRA_PROVISIONING_WIFI_PASSWORD}, optional</li> 817 * <li>{@link #EXTRA_PROVISIONING_WIFI_PROXY_HOST}, optional</li> 818 * <li>{@link #EXTRA_PROVISIONING_WIFI_PROXY_PORT} (convert to String), optional</li> 819 * <li>{@link #EXTRA_PROVISIONING_WIFI_PROXY_BYPASS}, optional</li> 820 * <li>{@link #EXTRA_PROVISIONING_WIFI_PAC_URL}, optional</li> 821 * <li>{@link #EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE}, optional, supported from 822 * {@link android.os.Build.VERSION_CODES#M} </li></ul> 823 * 824 * <p> 825 * As of {@link android.os.Build.VERSION_CODES#M}, the properties should contain 826 * {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME} instead of 827 * {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME}, (although specifying only 828 * {@link #EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME} is still supported). 829 */ 830 public static final String MIME_TYPE_PROVISIONING_NFC 831 = "application/com.android.managedprovisioning"; 832 833 /** 834 * Activity action: ask the user to add a new device administrator to the system. 835 * The desired policy is the ComponentName of the policy in the 836 * {@link #EXTRA_DEVICE_ADMIN} extra field. This will invoke a UI to 837 * bring the user through adding the device administrator to the system (or 838 * allowing them to reject it). 839 * 840 * <p>You can optionally include the {@link #EXTRA_ADD_EXPLANATION} 841 * field to provide the user with additional explanation (in addition 842 * to your component's description) about what is being added. 843 * 844 * <p>If your administrator is already active, this will ordinarily return immediately (without 845 * user intervention). However, if your administrator has been updated and is requesting 846 * additional uses-policy flags, the user will be presented with the new list. New policies 847 * will not be available to the updated administrator until the user has accepted the new list. 848 */ 849 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION) 850 public static final String ACTION_ADD_DEVICE_ADMIN 851 = "android.app.action.ADD_DEVICE_ADMIN"; 852 853 /** 854 * @hide 855 * Activity action: ask the user to add a new device administrator as the profile owner 856 * for this user. Only system apps can launch this intent. 857 * 858 * <p>The ComponentName of the profile owner admin is passed in the {@link #EXTRA_DEVICE_ADMIN} 859 * extra field. This will invoke a UI to bring the user through adding the profile owner admin 860 * to remotely control restrictions on the user. 861 * 862 * <p>The intent must be invoked via {@link Activity#startActivityForResult} to receive the 863 * result of whether or not the user approved the action. If approved, the result will 864 * be {@link Activity#RESULT_OK} and the component will be set as an active admin as well 865 * as a profile owner. 866 * 867 * <p>You can optionally include the {@link #EXTRA_ADD_EXPLANATION} 868 * field to provide the user with additional explanation (in addition 869 * to your component's description) about what is being added. 870 * 871 * <p>If there is already a profile owner active or the caller is not a system app, the 872 * operation will return a failure result. 873 */ 874 @SystemApi 875 public static final String ACTION_SET_PROFILE_OWNER 876 = "android.app.action.SET_PROFILE_OWNER"; 877 878 /** 879 * @hide 880 * Name of the profile owner admin that controls the user. 881 */ 882 @SystemApi 883 public static final String EXTRA_PROFILE_OWNER_NAME 884 = "android.app.extra.PROFILE_OWNER_NAME"; 885 886 /** 887 * Broadcast action: send when any policy admin changes a policy. 888 * This is generally used to find out when a new policy is in effect. 889 * 890 * @hide 891 */ 892 public static final String ACTION_DEVICE_POLICY_MANAGER_STATE_CHANGED 893 = "android.app.action.DEVICE_POLICY_MANAGER_STATE_CHANGED"; 894 895 /** 896 * Broadcast action: sent when the device owner is set or changed. 897 * 898 * This broadcast is sent only to the primary user. 899 * @see #ACTION_PROVISION_MANAGED_DEVICE 900 */ 901 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION) 902 public static final String ACTION_DEVICE_OWNER_CHANGED 903 = "android.app.action.DEVICE_OWNER_CHANGED"; 904 905 /** 906 * The ComponentName of the administrator component. 907 * 908 * @see #ACTION_ADD_DEVICE_ADMIN 909 */ 910 public static final String EXTRA_DEVICE_ADMIN = "android.app.extra.DEVICE_ADMIN"; 911 912 /** 913 * An optional CharSequence providing additional explanation for why the 914 * admin is being added. 915 * 916 * @see #ACTION_ADD_DEVICE_ADMIN 917 */ 918 public static final String EXTRA_ADD_EXPLANATION = "android.app.extra.ADD_EXPLANATION"; 919 920 /** 921 * Activity action: have the user enter a new password. This activity should 922 * be launched after using {@link #setPasswordQuality(ComponentName, int)}, 923 * or {@link #setPasswordMinimumLength(ComponentName, int)} to have the user 924 * enter a new password that meets the current requirements. You can use 925 * {@link #isActivePasswordSufficient()} to determine whether you need to 926 * have the user select a new password in order to meet the current 927 * constraints. Upon being resumed from this activity, you can check the new 928 * password characteristics to see if they are sufficient. 929 * 930 * If the intent is launched from within a managed profile with a profile 931 * owner built against {@link android.os.Build.VERSION_CODES#M} or before, 932 * this will trigger entering a new password for the parent of the profile. 933 * For all other cases it will trigger entering a new password for the user 934 * or profile it is launched from. 935 * 936 * @see #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD 937 */ 938 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION) 939 public static final String ACTION_SET_NEW_PASSWORD 940 = "android.app.action.SET_NEW_PASSWORD"; 941 942 /** 943 * Activity action: have the user enter a new password for the parent profile. 944 * If the intent is launched from within a managed profile, this will trigger 945 * entering a new password for the parent of the profile. In all other cases 946 * the behaviour is identical to {@link #ACTION_SET_NEW_PASSWORD}. 947 */ 948 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION) 949 public static final String ACTION_SET_NEW_PARENT_PROFILE_PASSWORD 950 = "android.app.action.SET_NEW_PARENT_PROFILE_PASSWORD"; 951 952 /** 953 * Broadcast action: Tell the status bar to open the device monitoring dialog, e.g. when 954 * Network logging was enabled and the user tapped the notification. 955 * <p class="note">This is a protected intent that can only be sent by the system.</p> 956 * @hide 957 */ 958 public static final String ACTION_SHOW_DEVICE_MONITORING_DIALOG 959 = "android.app.action.SHOW_DEVICE_MONITORING_DIALOG"; 960 961 /** 962 * Flag used by {@link #addCrossProfileIntentFilter} to allow activities in 963 * the parent profile to access intents sent from the managed profile. 964 * That is, when an app in the managed profile calls 965 * {@link Activity#startActivity(Intent)}, the intent can be resolved by a 966 * matching activity in the parent profile. 967 */ 968 public static final int FLAG_PARENT_CAN_ACCESS_MANAGED = 0x0001; 969 970 /** 971 * Flag used by {@link #addCrossProfileIntentFilter} to allow activities in 972 * the managed profile to access intents sent from the parent profile. 973 * That is, when an app in the parent profile calls 974 * {@link Activity#startActivity(Intent)}, the intent can be resolved by a 975 * matching activity in the managed profile. 976 */ 977 public static final int FLAG_MANAGED_CAN_ACCESS_PARENT = 0x0002; 978 979 /** 980 * Broadcast action: notify that a new local system update policy has been set by the device 981 * owner. The new policy can be retrieved by {@link #getSystemUpdatePolicy()}. 982 */ 983 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION) 984 public static final String ACTION_SYSTEM_UPDATE_POLICY_CHANGED 985 = "android.app.action.SYSTEM_UPDATE_POLICY_CHANGED"; 986 987 /** 988 * Permission policy to prompt user for new permission requests for runtime permissions. 989 * Already granted or denied permissions are not affected by this. 990 */ 991 public static final int PERMISSION_POLICY_PROMPT = 0; 992 993 /** 994 * Permission policy to always grant new permission requests for runtime permissions. 995 * Already granted or denied permissions are not affected by this. 996 */ 997 public static final int PERMISSION_POLICY_AUTO_GRANT = 1; 998 999 /** 1000 * Permission policy to always deny new permission requests for runtime permissions. 1001 * Already granted or denied permissions are not affected by this. 1002 */ 1003 public static final int PERMISSION_POLICY_AUTO_DENY = 2; 1004 1005 /** 1006 * Runtime permission state: The user can manage the permission 1007 * through the UI. 1008 */ 1009 public static final int PERMISSION_GRANT_STATE_DEFAULT = 0; 1010 1011 /** 1012 * Runtime permission state: The permission is granted to the app 1013 * and the user cannot manage the permission through the UI. 1014 */ 1015 public static final int PERMISSION_GRANT_STATE_GRANTED = 1; 1016 1017 /** 1018 * Runtime permission state: The permission is denied to the app 1019 * and the user cannot manage the permission through the UI. 1020 */ 1021 public static final int PERMISSION_GRANT_STATE_DENIED = 2; 1022 1023 /** 1024 * No management for current user in-effect. This is the default. 1025 * @hide 1026 */ 1027 @SystemApi 1028 public static final int STATE_USER_UNMANAGED = 0; 1029 1030 /** 1031 * Management partially setup, user setup needs to be completed. 1032 * @hide 1033 */ 1034 @SystemApi 1035 public static final int STATE_USER_SETUP_INCOMPLETE = 1; 1036 1037 /** 1038 * Management partially setup, user setup completed. 1039 * @hide 1040 */ 1041 @SystemApi 1042 public static final int STATE_USER_SETUP_COMPLETE = 2; 1043 1044 /** 1045 * Management setup and active on current user. 1046 * @hide 1047 */ 1048 @SystemApi 1049 public static final int STATE_USER_SETUP_FINALIZED = 3; 1050 1051 /** 1052 * Management partially setup on a managed profile. 1053 * @hide 1054 */ 1055 @SystemApi 1056 public static final int STATE_USER_PROFILE_COMPLETE = 4; 1057 1058 /** 1059 * @hide 1060 */ 1061 @IntDef({STATE_USER_UNMANAGED, STATE_USER_SETUP_INCOMPLETE, STATE_USER_SETUP_COMPLETE, 1062 STATE_USER_SETUP_FINALIZED, STATE_USER_PROFILE_COMPLETE}) 1063 @Retention(RetentionPolicy.SOURCE) 1064 public @interface UserProvisioningState {} 1065 1066 /** 1067 * Return true if the given administrator component is currently active (enabled) in the system. 1068 * 1069 * @param admin The administrator component to check for. 1070 * @return {@code true} if {@code admin} is currently enabled in the system, {@code false} 1071 * otherwise 1072 */ isAdminActive(@onNull ComponentName admin)1073 public boolean isAdminActive(@NonNull ComponentName admin) { 1074 return isAdminActiveAsUser(admin, myUserId()); 1075 } 1076 1077 /** 1078 * @see #isAdminActive(ComponentName) 1079 * @hide 1080 */ isAdminActiveAsUser(@onNull ComponentName admin, int userId)1081 public boolean isAdminActiveAsUser(@NonNull ComponentName admin, int userId) { 1082 if (mService != null) { 1083 try { 1084 return mService.isAdminActive(admin, userId); 1085 } catch (RemoteException e) { 1086 throw e.rethrowFromSystemServer(); 1087 } 1088 } 1089 return false; 1090 } 1091 /** 1092 * Return true if the given administrator component is currently being removed 1093 * for the user. 1094 * @hide 1095 */ isRemovingAdmin(@onNull ComponentName admin, int userId)1096 public boolean isRemovingAdmin(@NonNull ComponentName admin, int userId) { 1097 if (mService != null) { 1098 try { 1099 return mService.isRemovingAdmin(admin, userId); 1100 } catch (RemoteException e) { 1101 throw e.rethrowFromSystemServer(); 1102 } 1103 } 1104 return false; 1105 } 1106 1107 1108 /** 1109 * Return a list of all currently active device administrators' component 1110 * names. If there are no administrators {@code null} may be 1111 * returned. 1112 */ getActiveAdmins()1113 public List<ComponentName> getActiveAdmins() { 1114 throwIfParentInstance("getActiveAdmins"); 1115 return getActiveAdminsAsUser(myUserId()); 1116 } 1117 1118 /** 1119 * @see #getActiveAdmins() 1120 * @hide 1121 */ getActiveAdminsAsUser(int userId)1122 public List<ComponentName> getActiveAdminsAsUser(int userId) { 1123 if (mService != null) { 1124 try { 1125 return mService.getActiveAdmins(userId); 1126 } catch (RemoteException e) { 1127 throw e.rethrowFromSystemServer(); 1128 } 1129 } 1130 return null; 1131 } 1132 1133 /** 1134 * Used by package administration code to determine if a package can be stopped 1135 * or uninstalled. 1136 * @hide 1137 */ packageHasActiveAdmins(String packageName)1138 public boolean packageHasActiveAdmins(String packageName) { 1139 return packageHasActiveAdmins(packageName, myUserId()); 1140 } 1141 1142 /** 1143 * Used by package administration code to determine if a package can be stopped 1144 * or uninstalled. 1145 * @hide 1146 */ packageHasActiveAdmins(String packageName, int userId)1147 public boolean packageHasActiveAdmins(String packageName, int userId) { 1148 if (mService != null) { 1149 try { 1150 return mService.packageHasActiveAdmins(packageName, userId); 1151 } catch (RemoteException e) { 1152 throw e.rethrowFromSystemServer(); 1153 } 1154 } 1155 return false; 1156 } 1157 1158 /** 1159 * Remove a current administration component. This can only be called 1160 * by the application that owns the administration component; if you 1161 * try to remove someone else's component, a security exception will be 1162 * thrown. 1163 * 1164 * <p>Note that the operation is not synchronous and the admin might still be active (as 1165 * indicated by {@link #getActiveAdmins()}) by the time this method returns. 1166 * 1167 * @param admin The administration compononent to remove. 1168 * @throws SecurityException if the caller is not in the owner application of {@code admin}. 1169 */ removeActiveAdmin(@onNull ComponentName admin)1170 public void removeActiveAdmin(@NonNull ComponentName admin) { 1171 throwIfParentInstance("removeActiveAdmin"); 1172 if (mService != null) { 1173 try { 1174 mService.removeActiveAdmin(admin, myUserId()); 1175 } catch (RemoteException e) { 1176 throw e.rethrowFromSystemServer(); 1177 } 1178 } 1179 } 1180 1181 /** 1182 * Returns true if an administrator has been granted a particular device policy. This can be 1183 * used to check whether the administrator was activated under an earlier set of policies, but 1184 * requires additional policies after an upgrade. 1185 * 1186 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. Must be an 1187 * active administrator, or an exception will be thrown. 1188 * @param usesPolicy Which uses-policy to check, as defined in {@link DeviceAdminInfo}. 1189 * @throws SecurityException if {@code admin} is not an active administrator. 1190 */ hasGrantedPolicy(@onNull ComponentName admin, int usesPolicy)1191 public boolean hasGrantedPolicy(@NonNull ComponentName admin, int usesPolicy) { 1192 throwIfParentInstance("hasGrantedPolicy"); 1193 if (mService != null) { 1194 try { 1195 return mService.hasGrantedPolicy(admin, usesPolicy, myUserId()); 1196 } catch (RemoteException e) { 1197 throw e.rethrowFromSystemServer(); 1198 } 1199 } 1200 return false; 1201 } 1202 1203 /** 1204 * Returns true if the Profile Challenge is available to use for the given profile user. 1205 * 1206 * @hide 1207 */ isSeparateProfileChallengeAllowed(int userHandle)1208 public boolean isSeparateProfileChallengeAllowed(int userHandle) { 1209 if (mService != null) { 1210 try { 1211 return mService.isSeparateProfileChallengeAllowed(userHandle); 1212 } catch (RemoteException e) { 1213 throw e.rethrowFromSystemServer(); 1214 } 1215 } 1216 return false; 1217 } 1218 1219 /** 1220 * Constant for {@link #setPasswordQuality}: the policy has no requirements 1221 * for the password. Note that quality constants are ordered so that higher 1222 * values are more restrictive. 1223 */ 1224 public static final int PASSWORD_QUALITY_UNSPECIFIED = 0; 1225 1226 /** 1227 * Constant for {@link #setPasswordQuality}: the policy allows for low-security biometric 1228 * recognition technology. This implies technologies that can recognize the identity of 1229 * an individual to about a 3 digit PIN (false detection is less than 1 in 1,000). 1230 * Note that quality constants are ordered so that higher values are more restrictive. 1231 */ 1232 public static final int PASSWORD_QUALITY_BIOMETRIC_WEAK = 0x8000; 1233 1234 /** 1235 * Constant for {@link #setPasswordQuality}: the policy requires some kind 1236 * of password or pattern, but doesn't care what it is. Note that quality constants 1237 * are ordered so that higher values are more restrictive. 1238 */ 1239 public static final int PASSWORD_QUALITY_SOMETHING = 0x10000; 1240 1241 /** 1242 * Constant for {@link #setPasswordQuality}: the user must have entered a 1243 * password containing at least numeric characters. Note that quality 1244 * constants are ordered so that higher values are more restrictive. 1245 */ 1246 public static final int PASSWORD_QUALITY_NUMERIC = 0x20000; 1247 1248 /** 1249 * Constant for {@link #setPasswordQuality}: the user must have entered a 1250 * password containing at least numeric characters with no repeating (4444) 1251 * or ordered (1234, 4321, 2468) sequences. Note that quality 1252 * constants are ordered so that higher values are more restrictive. 1253 */ 1254 public static final int PASSWORD_QUALITY_NUMERIC_COMPLEX = 0x30000; 1255 1256 /** 1257 * Constant for {@link #setPasswordQuality}: the user must have entered a 1258 * password containing at least alphabetic (or other symbol) characters. 1259 * Note that quality constants are ordered so that higher values are more 1260 * restrictive. 1261 */ 1262 public static final int PASSWORD_QUALITY_ALPHABETIC = 0x40000; 1263 1264 /** 1265 * Constant for {@link #setPasswordQuality}: the user must have entered a 1266 * password containing at least <em>both></em> numeric <em>and</em> 1267 * alphabetic (or other symbol) characters. Note that quality constants are 1268 * ordered so that higher values are more restrictive. 1269 */ 1270 public static final int PASSWORD_QUALITY_ALPHANUMERIC = 0x50000; 1271 1272 /** 1273 * Constant for {@link #setPasswordQuality}: the user must have entered a 1274 * password containing at least a letter, a numerical digit and a special 1275 * symbol, by default. With this password quality, passwords can be 1276 * restricted to contain various sets of characters, like at least an 1277 * uppercase letter, etc. These are specified using various methods, 1278 * like {@link #setPasswordMinimumLowerCase(ComponentName, int)}. Note 1279 * that quality constants are ordered so that higher values are more 1280 * restrictive. 1281 */ 1282 public static final int PASSWORD_QUALITY_COMPLEX = 0x60000; 1283 1284 /** 1285 * Constant for {@link #setPasswordQuality}: the user is not allowed to 1286 * modify password. In case this password quality is set, the password is 1287 * managed by a profile owner. The profile owner can set any password, 1288 * as if {@link #PASSWORD_QUALITY_UNSPECIFIED} is used. Note 1289 * that quality constants are ordered so that higher values are more 1290 * restrictive. The value of {@link #PASSWORD_QUALITY_MANAGED} is 1291 * the highest. 1292 * @hide 1293 */ 1294 public static final int PASSWORD_QUALITY_MANAGED = 0x80000; 1295 1296 /** 1297 * @hide 1298 * 1299 * adb shell dpm set-{device,profile}-owner will normally not allow installing an owner to 1300 * a user with accounts. {@link #ACCOUNT_FEATURE_DEVICE_OR_PROFILE_OWNER_ALLOWED} 1301 * and {@link #ACCOUNT_FEATURE_DEVICE_OR_PROFILE_OWNER_DISALLOWED} are the account features 1302 * used by authenticator to exempt their accounts from this: 1303 * 1304 * <ul> 1305 * <li>Non-test-only DO/PO still can't be installed when there are accounts. 1306 * <p>In order to make an apk test-only, add android:testOnly="true" to the 1307 * <application> tag in the manifest. 1308 * 1309 * <li>Test-only DO/PO can be installed even when there are accounts, as long as all the 1310 * accounts have the {@link #ACCOUNT_FEATURE_DEVICE_OR_PROFILE_OWNER_ALLOWED} feature. 1311 * Some authenticators claim to have any features, so to detect it, we also check 1312 * {@link #ACCOUNT_FEATURE_DEVICE_OR_PROFILE_OWNER_DISALLOWED} and disallow installing 1313 * if any of the accounts have it. 1314 * </ul> 1315 */ 1316 public static final String ACCOUNT_FEATURE_DEVICE_OR_PROFILE_OWNER_ALLOWED = 1317 "android.account.DEVICE_OR_PROFILE_OWNER_ALLOWED"; 1318 1319 /** @hide See {@link #ACCOUNT_FEATURE_DEVICE_OR_PROFILE_OWNER_ALLOWED} */ 1320 public static final String ACCOUNT_FEATURE_DEVICE_OR_PROFILE_OWNER_DISALLOWED = 1321 "android.account.DEVICE_OR_PROFILE_OWNER_DISALLOWED"; 1322 1323 /** 1324 * Called by an application that is administering the device to set the password restrictions it 1325 * is imposing. After setting this, the user will not be able to enter a new password that is 1326 * not at least as restrictive as what has been set. Note that the current password will remain 1327 * until the user has set a new one, so the change does not take place immediately. To prompt 1328 * the user for a new password, use {@link #ACTION_SET_NEW_PASSWORD} or 1329 * {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after calling this method. 1330 * <p> 1331 * Quality constants are ordered so that higher values are more restrictive; thus the highest 1332 * requested quality constant (between the policy set here, the user's preference, and any other 1333 * considerations) is the one that is in effect. 1334 * <p> 1335 * The calling device admin must have requested 1336 * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has 1337 * not, a security exception will be thrown. 1338 * <p> 1339 * This method can be called on the {@link DevicePolicyManager} instance returned by 1340 * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent 1341 * profile. 1342 * 1343 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 1344 * @param quality The new desired quality. One of {@link #PASSWORD_QUALITY_UNSPECIFIED}, 1345 * {@link #PASSWORD_QUALITY_SOMETHING}, {@link #PASSWORD_QUALITY_NUMERIC}, 1346 * {@link #PASSWORD_QUALITY_NUMERIC_COMPLEX}, {@link #PASSWORD_QUALITY_ALPHABETIC}, 1347 * {@link #PASSWORD_QUALITY_ALPHANUMERIC} or {@link #PASSWORD_QUALITY_COMPLEX}. 1348 * @throws SecurityException if {@code admin} is not an active administrator or if {@code admin} 1349 * does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} 1350 */ setPasswordQuality(@onNull ComponentName admin, int quality)1351 public void setPasswordQuality(@NonNull ComponentName admin, int quality) { 1352 if (mService != null) { 1353 try { 1354 mService.setPasswordQuality(admin, quality, mParentInstance); 1355 } catch (RemoteException e) { 1356 throw e.rethrowFromSystemServer(); 1357 } 1358 } 1359 } 1360 1361 /** 1362 * Retrieve the current minimum password quality for a particular admin or all admins that set 1363 * restrictions on this user and its participating profiles. Restrictions on profiles that have 1364 * a separate challenge are not taken into account. 1365 * 1366 * <p>This method can be called on the {@link DevicePolicyManager} instance 1367 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 1368 * restrictions on the parent profile. 1369 * 1370 * @param admin The name of the admin component to check, or {@code null} to aggregate 1371 * all admins. 1372 */ getPasswordQuality(@ullable ComponentName admin)1373 public int getPasswordQuality(@Nullable ComponentName admin) { 1374 return getPasswordQuality(admin, myUserId()); 1375 } 1376 1377 /** @hide per-user version */ getPasswordQuality(@ullable ComponentName admin, int userHandle)1378 public int getPasswordQuality(@Nullable ComponentName admin, int userHandle) { 1379 if (mService != null) { 1380 try { 1381 return mService.getPasswordQuality(admin, userHandle, mParentInstance); 1382 } catch (RemoteException e) { 1383 throw e.rethrowFromSystemServer(); 1384 } 1385 } 1386 return PASSWORD_QUALITY_UNSPECIFIED; 1387 } 1388 1389 /** 1390 * Called by an application that is administering the device to set the minimum allowed password 1391 * length. After setting this, the user will not be able to enter a new password that is not at 1392 * least as restrictive as what has been set. Note that the current password will remain until 1393 * the user has set a new one, so the change does not take place immediately. To prompt the user 1394 * for a new password, use {@link #ACTION_SET_NEW_PASSWORD} or 1395 * {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after setting this value. This constraint is 1396 * only imposed if the administrator has also requested either {@link #PASSWORD_QUALITY_NUMERIC} 1397 * , {@link #PASSWORD_QUALITY_NUMERIC_COMPLEX}, {@link #PASSWORD_QUALITY_ALPHABETIC}, 1398 * {@link #PASSWORD_QUALITY_ALPHANUMERIC}, or {@link #PASSWORD_QUALITY_COMPLEX} with 1399 * {@link #setPasswordQuality}. 1400 * <p> 1401 * The calling device admin must have requested 1402 * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has 1403 * not, a security exception will be thrown. 1404 * <p> 1405 * This method can be called on the {@link DevicePolicyManager} instance returned by 1406 * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent 1407 * profile. 1408 * 1409 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 1410 * @param length The new desired minimum password length. A value of 0 means there is no 1411 * restriction. 1412 * @throws SecurityException if {@code admin} is not an active administrator or {@code admin} 1413 * does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} 1414 */ setPasswordMinimumLength(@onNull ComponentName admin, int length)1415 public void setPasswordMinimumLength(@NonNull ComponentName admin, int length) { 1416 if (mService != null) { 1417 try { 1418 mService.setPasswordMinimumLength(admin, length, mParentInstance); 1419 } catch (RemoteException e) { 1420 throw e.rethrowFromSystemServer(); 1421 } 1422 } 1423 } 1424 1425 /** 1426 * Retrieve the current minimum password length for a particular admin or all admins that set 1427 * restrictions on this user and its participating profiles. Restrictions on profiles that have 1428 * a separate challenge are not taken into account. 1429 * 1430 * <p>This method can be called on the {@link DevicePolicyManager} instance 1431 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 1432 * restrictions on the parent profile. 1433 * 1434 * user and its profiles or a particular one. 1435 * @param admin The name of the admin component to check, or {@code null} to aggregate 1436 * all admins. 1437 */ getPasswordMinimumLength(@ullable ComponentName admin)1438 public int getPasswordMinimumLength(@Nullable ComponentName admin) { 1439 return getPasswordMinimumLength(admin, myUserId()); 1440 } 1441 1442 /** @hide per-user version */ getPasswordMinimumLength(@ullable ComponentName admin, int userHandle)1443 public int getPasswordMinimumLength(@Nullable ComponentName admin, int userHandle) { 1444 if (mService != null) { 1445 try { 1446 return mService.getPasswordMinimumLength(admin, userHandle, mParentInstance); 1447 } catch (RemoteException e) { 1448 throw e.rethrowFromSystemServer(); 1449 } 1450 } 1451 return 0; 1452 } 1453 1454 /** 1455 * Called by an application that is administering the device to set the minimum number of upper 1456 * case letters required in the password. After setting this, the user will not be able to enter 1457 * a new password that is not at least as restrictive as what has been set. Note that the 1458 * current password will remain until the user has set a new one, so the change does not take 1459 * place immediately. To prompt the user for a new password, use 1460 * {@link #ACTION_SET_NEW_PASSWORD} or {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after 1461 * setting this value. This constraint is only imposed if the administrator has also requested 1462 * {@link #PASSWORD_QUALITY_COMPLEX} with {@link #setPasswordQuality}. The default value is 0. 1463 * <p> 1464 * The calling device admin must have requested 1465 * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has 1466 * not, a security exception will be thrown. 1467 * <p> 1468 * This method can be called on the {@link DevicePolicyManager} instance returned by 1469 * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent 1470 * profile. 1471 * 1472 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 1473 * @param length The new desired minimum number of upper case letters required in the password. 1474 * A value of 0 means there is no restriction. 1475 * @throws SecurityException if {@code admin} is not an active administrator or {@code admin} 1476 * does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} 1477 */ setPasswordMinimumUpperCase(@onNull ComponentName admin, int length)1478 public void setPasswordMinimumUpperCase(@NonNull ComponentName admin, int length) { 1479 if (mService != null) { 1480 try { 1481 mService.setPasswordMinimumUpperCase(admin, length, mParentInstance); 1482 } catch (RemoteException e) { 1483 throw e.rethrowFromSystemServer(); 1484 } 1485 } 1486 } 1487 1488 /** 1489 * Retrieve the current number of upper case letters required in the password 1490 * for a particular admin or all admins that set restrictions on this user and 1491 * its participating profiles. Restrictions on profiles that have a separate challenge 1492 * are not taken into account. 1493 * This is the same value as set by 1494 * {@link #setPasswordMinimumUpperCase(ComponentName, int)} 1495 * and only applies when the password quality is 1496 * {@link #PASSWORD_QUALITY_COMPLEX}. 1497 * 1498 * <p>This method can be called on the {@link DevicePolicyManager} instance 1499 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 1500 * restrictions on the parent profile. 1501 * 1502 * @param admin The name of the admin component to check, or {@code null} to 1503 * aggregate all admins. 1504 * @return The minimum number of upper case letters required in the 1505 * password. 1506 */ getPasswordMinimumUpperCase(@ullable ComponentName admin)1507 public int getPasswordMinimumUpperCase(@Nullable ComponentName admin) { 1508 return getPasswordMinimumUpperCase(admin, myUserId()); 1509 } 1510 1511 /** @hide per-user version */ getPasswordMinimumUpperCase(@ullable ComponentName admin, int userHandle)1512 public int getPasswordMinimumUpperCase(@Nullable ComponentName admin, int userHandle) { 1513 if (mService != null) { 1514 try { 1515 return mService.getPasswordMinimumUpperCase(admin, userHandle, mParentInstance); 1516 } catch (RemoteException e) { 1517 throw e.rethrowFromSystemServer(); 1518 } 1519 } 1520 return 0; 1521 } 1522 1523 /** 1524 * Called by an application that is administering the device to set the minimum number of lower 1525 * case letters required in the password. After setting this, the user will not be able to enter 1526 * a new password that is not at least as restrictive as what has been set. Note that the 1527 * current password will remain until the user has set a new one, so the change does not take 1528 * place immediately. To prompt the user for a new password, use 1529 * {@link #ACTION_SET_NEW_PASSWORD} or {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after 1530 * setting this value. This constraint is only imposed if the administrator has also requested 1531 * {@link #PASSWORD_QUALITY_COMPLEX} with {@link #setPasswordQuality}. The default value is 0. 1532 * <p> 1533 * The calling device admin must have requested 1534 * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has 1535 * not, a security exception will be thrown. 1536 * <p> 1537 * This method can be called on the {@link DevicePolicyManager} instance returned by 1538 * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent 1539 * profile. 1540 * 1541 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 1542 * @param length The new desired minimum number of lower case letters required in the password. 1543 * A value of 0 means there is no restriction. 1544 * @throws SecurityException if {@code admin} is not an active administrator or {@code admin} 1545 * does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} 1546 */ setPasswordMinimumLowerCase(@onNull ComponentName admin, int length)1547 public void setPasswordMinimumLowerCase(@NonNull ComponentName admin, int length) { 1548 if (mService != null) { 1549 try { 1550 mService.setPasswordMinimumLowerCase(admin, length, mParentInstance); 1551 } catch (RemoteException e) { 1552 throw e.rethrowFromSystemServer(); 1553 } 1554 } 1555 } 1556 1557 /** 1558 * Retrieve the current number of lower case letters required in the password 1559 * for a particular admin or all admins that set restrictions on this user 1560 * and its participating profiles. Restrictions on profiles that have 1561 * a separate challenge are not taken into account. 1562 * This is the same value as set by 1563 * {@link #setPasswordMinimumLowerCase(ComponentName, int)} 1564 * and only applies when the password quality is 1565 * {@link #PASSWORD_QUALITY_COMPLEX}. 1566 * 1567 * <p>This method can be called on the {@link DevicePolicyManager} instance 1568 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 1569 * restrictions on the parent profile. 1570 * 1571 * @param admin The name of the admin component to check, or {@code null} to 1572 * aggregate all admins. 1573 * @return The minimum number of lower case letters required in the 1574 * password. 1575 */ getPasswordMinimumLowerCase(@ullable ComponentName admin)1576 public int getPasswordMinimumLowerCase(@Nullable ComponentName admin) { 1577 return getPasswordMinimumLowerCase(admin, myUserId()); 1578 } 1579 1580 /** @hide per-user version */ getPasswordMinimumLowerCase(@ullable ComponentName admin, int userHandle)1581 public int getPasswordMinimumLowerCase(@Nullable ComponentName admin, int userHandle) { 1582 if (mService != null) { 1583 try { 1584 return mService.getPasswordMinimumLowerCase(admin, userHandle, mParentInstance); 1585 } catch (RemoteException e) { 1586 throw e.rethrowFromSystemServer(); 1587 } 1588 } 1589 return 0; 1590 } 1591 1592 /** 1593 * Called by an application that is administering the device to set the minimum number of 1594 * letters required in the password. After setting this, the user will not be able to enter a 1595 * new password that is not at least as restrictive as what has been set. Note that the current 1596 * password will remain until the user has set a new one, so the change does not take place 1597 * immediately. To prompt the user for a new password, use {@link #ACTION_SET_NEW_PASSWORD} or 1598 * {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after setting this value. This constraint is 1599 * only imposed if the administrator has also requested {@link #PASSWORD_QUALITY_COMPLEX} with 1600 * {@link #setPasswordQuality}. The default value is 1. 1601 * <p> 1602 * The calling device admin must have requested 1603 * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has 1604 * not, a security exception will be thrown. 1605 * <p> 1606 * This method can be called on the {@link DevicePolicyManager} instance returned by 1607 * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent 1608 * profile. 1609 * 1610 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 1611 * @param length The new desired minimum number of letters required in the password. A value of 1612 * 0 means there is no restriction. 1613 * @throws SecurityException if {@code admin} is not an active administrator or {@code admin} 1614 * does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} 1615 */ setPasswordMinimumLetters(@onNull ComponentName admin, int length)1616 public void setPasswordMinimumLetters(@NonNull ComponentName admin, int length) { 1617 if (mService != null) { 1618 try { 1619 mService.setPasswordMinimumLetters(admin, length, mParentInstance); 1620 } catch (RemoteException e) { 1621 throw e.rethrowFromSystemServer(); 1622 } 1623 } 1624 } 1625 1626 /** 1627 * Retrieve the current number of letters required in the password 1628 * for a particular admin or all admins that set restrictions on this user 1629 * and its participating profiles. Restrictions on profiles that have 1630 * a separate challenge are not taken into account. 1631 * This is the same value as set by 1632 * {@link #setPasswordMinimumLetters(ComponentName, int)} 1633 * and only applies when the password quality is 1634 * {@link #PASSWORD_QUALITY_COMPLEX}. 1635 * 1636 * <p>This method can be called on the {@link DevicePolicyManager} instance 1637 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 1638 * restrictions on the parent profile. 1639 * 1640 * @param admin The name of the admin component to check, or {@code null} to 1641 * aggregate all admins. 1642 * @return The minimum number of letters required in the password. 1643 */ getPasswordMinimumLetters(@ullable ComponentName admin)1644 public int getPasswordMinimumLetters(@Nullable ComponentName admin) { 1645 return getPasswordMinimumLetters(admin, myUserId()); 1646 } 1647 1648 /** @hide per-user version */ getPasswordMinimumLetters(@ullable ComponentName admin, int userHandle)1649 public int getPasswordMinimumLetters(@Nullable ComponentName admin, int userHandle) { 1650 if (mService != null) { 1651 try { 1652 return mService.getPasswordMinimumLetters(admin, userHandle, mParentInstance); 1653 } catch (RemoteException e) { 1654 throw e.rethrowFromSystemServer(); 1655 } 1656 } 1657 return 0; 1658 } 1659 1660 /** 1661 * Called by an application that is administering the device to set the minimum number of 1662 * numerical digits required in the password. After setting this, the user will not be able to 1663 * enter a new password that is not at least as restrictive as what has been set. Note that the 1664 * current password will remain until the user has set a new one, so the change does not take 1665 * place immediately. To prompt the user for a new password, use 1666 * {@link #ACTION_SET_NEW_PASSWORD} or {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after 1667 * setting this value. This constraint is only imposed if the administrator has also requested 1668 * {@link #PASSWORD_QUALITY_COMPLEX} with {@link #setPasswordQuality}. The default value is 1. 1669 * <p> 1670 * The calling device admin must have requested 1671 * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has 1672 * not, a security exception will be thrown. 1673 * <p> 1674 * This method can be called on the {@link DevicePolicyManager} instance returned by 1675 * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent 1676 * profile. 1677 * 1678 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 1679 * @param length The new desired minimum number of numerical digits required in the password. A 1680 * value of 0 means there is no restriction. 1681 * @throws SecurityException if {@code admin} is not an active administrator or {@code admin} 1682 * does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} 1683 */ setPasswordMinimumNumeric(@onNull ComponentName admin, int length)1684 public void setPasswordMinimumNumeric(@NonNull ComponentName admin, int length) { 1685 if (mService != null) { 1686 try { 1687 mService.setPasswordMinimumNumeric(admin, length, mParentInstance); 1688 } catch (RemoteException e) { 1689 throw e.rethrowFromSystemServer(); 1690 } 1691 } 1692 } 1693 1694 /** 1695 * Retrieve the current number of numerical digits required in the password 1696 * for a particular admin or all admins that set restrictions on this user 1697 * and its participating profiles. Restrictions on profiles that have 1698 * a separate challenge are not taken into account. 1699 * This is the same value as set by 1700 * {@link #setPasswordMinimumNumeric(ComponentName, int)} 1701 * and only applies when the password quality is 1702 * {@link #PASSWORD_QUALITY_COMPLEX}. 1703 * 1704 * <p>This method can be called on the {@link DevicePolicyManager} instance 1705 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 1706 * restrictions on the parent profile. 1707 * 1708 * @param admin The name of the admin component to check, or {@code null} to 1709 * aggregate all admins. 1710 * @return The minimum number of numerical digits required in the password. 1711 */ getPasswordMinimumNumeric(@ullable ComponentName admin)1712 public int getPasswordMinimumNumeric(@Nullable ComponentName admin) { 1713 return getPasswordMinimumNumeric(admin, myUserId()); 1714 } 1715 1716 /** @hide per-user version */ getPasswordMinimumNumeric(@ullable ComponentName admin, int userHandle)1717 public int getPasswordMinimumNumeric(@Nullable ComponentName admin, int userHandle) { 1718 if (mService != null) { 1719 try { 1720 return mService.getPasswordMinimumNumeric(admin, userHandle, mParentInstance); 1721 } catch (RemoteException e) { 1722 throw e.rethrowFromSystemServer(); 1723 } 1724 } 1725 return 0; 1726 } 1727 1728 /** 1729 * Called by an application that is administering the device to set the minimum number of 1730 * symbols required in the password. After setting this, the user will not be able to enter a 1731 * new password that is not at least as restrictive as what has been set. Note that the current 1732 * password will remain until the user has set a new one, so the change does not take place 1733 * immediately. To prompt the user for a new password, use {@link #ACTION_SET_NEW_PASSWORD} or 1734 * {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after setting this value. This constraint is 1735 * only imposed if the administrator has also requested {@link #PASSWORD_QUALITY_COMPLEX} with 1736 * {@link #setPasswordQuality}. The default value is 1. 1737 * <p> 1738 * The calling device admin must have requested 1739 * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has 1740 * not, a security exception will be thrown. 1741 * <p> 1742 * This method can be called on the {@link DevicePolicyManager} instance returned by 1743 * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent 1744 * profile. 1745 * 1746 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 1747 * @param length The new desired minimum number of symbols required in the password. A value of 1748 * 0 means there is no restriction. 1749 * @throws SecurityException if {@code admin} is not an active administrator or {@code admin} 1750 * does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} 1751 */ setPasswordMinimumSymbols(@onNull ComponentName admin, int length)1752 public void setPasswordMinimumSymbols(@NonNull ComponentName admin, int length) { 1753 if (mService != null) { 1754 try { 1755 mService.setPasswordMinimumSymbols(admin, length, mParentInstance); 1756 } catch (RemoteException e) { 1757 throw e.rethrowFromSystemServer(); 1758 } 1759 } 1760 } 1761 1762 /** 1763 * Retrieve the current number of symbols required in the password 1764 * for a particular admin or all admins that set restrictions on this user 1765 * and its participating profiles. Restrictions on profiles that have 1766 * a separate challenge are not taken into account. This is the same value as 1767 * set by {@link #setPasswordMinimumSymbols(ComponentName, int)} 1768 * and only applies when the password quality is 1769 * {@link #PASSWORD_QUALITY_COMPLEX}. 1770 * 1771 * <p>This method can be called on the {@link DevicePolicyManager} instance 1772 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 1773 * restrictions on the parent profile. 1774 * 1775 * @param admin The name of the admin component to check, or {@code null} to 1776 * aggregate all admins. 1777 * @return The minimum number of symbols required in the password. 1778 */ getPasswordMinimumSymbols(@ullable ComponentName admin)1779 public int getPasswordMinimumSymbols(@Nullable ComponentName admin) { 1780 return getPasswordMinimumSymbols(admin, myUserId()); 1781 } 1782 1783 /** @hide per-user version */ getPasswordMinimumSymbols(@ullable ComponentName admin, int userHandle)1784 public int getPasswordMinimumSymbols(@Nullable ComponentName admin, int userHandle) { 1785 if (mService != null) { 1786 try { 1787 return mService.getPasswordMinimumSymbols(admin, userHandle, mParentInstance); 1788 } catch (RemoteException e) { 1789 throw e.rethrowFromSystemServer(); 1790 } 1791 } 1792 return 0; 1793 } 1794 1795 /** 1796 * Called by an application that is administering the device to set the minimum number of 1797 * non-letter characters (numerical digits or symbols) required in the password. After setting 1798 * this, the user will not be able to enter a new password that is not at least as restrictive 1799 * as what has been set. Note that the current password will remain until the user has set a new 1800 * one, so the change does not take place immediately. To prompt the user for a new password, 1801 * use {@link #ACTION_SET_NEW_PASSWORD} or {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after 1802 * setting this value. This constraint is only imposed if the administrator has also requested 1803 * {@link #PASSWORD_QUALITY_COMPLEX} with {@link #setPasswordQuality}. The default value is 0. 1804 * <p> 1805 * The calling device admin must have requested 1806 * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has 1807 * not, a security exception will be thrown. 1808 * <p> 1809 * This method can be called on the {@link DevicePolicyManager} instance returned by 1810 * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent 1811 * profile. 1812 * 1813 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 1814 * @param length The new desired minimum number of letters required in the password. A value of 1815 * 0 means there is no restriction. 1816 * @throws SecurityException if {@code admin} is not an active administrator or {@code admin} 1817 * does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} 1818 */ setPasswordMinimumNonLetter(@onNull ComponentName admin, int length)1819 public void setPasswordMinimumNonLetter(@NonNull ComponentName admin, int length) { 1820 if (mService != null) { 1821 try { 1822 mService.setPasswordMinimumNonLetter(admin, length, mParentInstance); 1823 } catch (RemoteException e) { 1824 throw e.rethrowFromSystemServer(); 1825 } 1826 } 1827 } 1828 1829 /** 1830 * Retrieve the current number of non-letter characters required in the password 1831 * for a particular admin or all admins that set restrictions on this user 1832 * and its participating profiles. Restrictions on profiles that have 1833 * a separate challenge are not taken into account. 1834 * This is the same value as set by 1835 * {@link #setPasswordMinimumNonLetter(ComponentName, int)} 1836 * and only applies when the password quality is 1837 * {@link #PASSWORD_QUALITY_COMPLEX}. 1838 * 1839 * <p>This method can be called on the {@link DevicePolicyManager} instance 1840 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 1841 * restrictions on the parent profile. 1842 * 1843 * @param admin The name of the admin component to check, or {@code null} to 1844 * aggregate all admins. 1845 * @return The minimum number of letters required in the password. 1846 */ getPasswordMinimumNonLetter(@ullable ComponentName admin)1847 public int getPasswordMinimumNonLetter(@Nullable ComponentName admin) { 1848 return getPasswordMinimumNonLetter(admin, myUserId()); 1849 } 1850 1851 /** @hide per-user version */ getPasswordMinimumNonLetter(@ullable ComponentName admin, int userHandle)1852 public int getPasswordMinimumNonLetter(@Nullable ComponentName admin, int userHandle) { 1853 if (mService != null) { 1854 try { 1855 return mService.getPasswordMinimumNonLetter(admin, userHandle, mParentInstance); 1856 } catch (RemoteException e) { 1857 throw e.rethrowFromSystemServer(); 1858 } 1859 } 1860 return 0; 1861 } 1862 1863 /** 1864 * Called by an application that is administering the device to set the length of the password 1865 * history. After setting this, the user will not be able to enter a new password that is the 1866 * same as any password in the history. Note that the current password will remain until the 1867 * user has set a new one, so the change does not take place immediately. To prompt the user for 1868 * a new password, use {@link #ACTION_SET_NEW_PASSWORD} or 1869 * {@link #ACTION_SET_NEW_PARENT_PROFILE_PASSWORD} after setting this value. This constraint is 1870 * only imposed if the administrator has also requested either {@link #PASSWORD_QUALITY_NUMERIC} 1871 * , {@link #PASSWORD_QUALITY_NUMERIC_COMPLEX} {@link #PASSWORD_QUALITY_ALPHABETIC}, or 1872 * {@link #PASSWORD_QUALITY_ALPHANUMERIC} with {@link #setPasswordQuality}. 1873 * <p> 1874 * The calling device admin must have requested 1875 * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has 1876 * not, a security exception will be thrown. 1877 * <p> 1878 * This method can be called on the {@link DevicePolicyManager} instance returned by 1879 * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent 1880 * profile. 1881 * 1882 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 1883 * @param length The new desired length of password history. A value of 0 means there is no 1884 * restriction. 1885 * @throws SecurityException if {@code admin} is not an active administrator or {@code admin} 1886 * does not use {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} 1887 */ setPasswordHistoryLength(@onNull ComponentName admin, int length)1888 public void setPasswordHistoryLength(@NonNull ComponentName admin, int length) { 1889 if (mService != null) { 1890 try { 1891 mService.setPasswordHistoryLength(admin, length, mParentInstance); 1892 } catch (RemoteException e) { 1893 throw e.rethrowFromSystemServer(); 1894 } 1895 } 1896 } 1897 1898 /** 1899 * Called by a device admin to set the password expiration timeout. Calling this method will 1900 * restart the countdown for password expiration for the given admin, as will changing the 1901 * device password (for all admins). 1902 * <p> 1903 * The provided timeout is the time delta in ms and will be added to the current time. For 1904 * example, to have the password expire 5 days from now, timeout would be 5 * 86400 * 1000 = 1905 * 432000000 ms for timeout. 1906 * <p> 1907 * To disable password expiration, a value of 0 may be used for timeout. 1908 * <p> 1909 * The calling device admin must have requested 1910 * {@link DeviceAdminInfo#USES_POLICY_EXPIRE_PASSWORD} to be able to call this method; if it has 1911 * not, a security exception will be thrown. 1912 * <p> 1913 * Note that setting the password will automatically reset the expiration time for all active 1914 * admins. Active admins do not need to explicitly call this method in that case. 1915 * <p> 1916 * This method can be called on the {@link DevicePolicyManager} instance returned by 1917 * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent 1918 * profile. 1919 * 1920 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 1921 * @param timeout The limit (in ms) that a password can remain in effect. A value of 0 means 1922 * there is no restriction (unlimited). 1923 * @throws SecurityException if {@code admin} is not an active administrator or {@code admin} 1924 * does not use {@link DeviceAdminInfo#USES_POLICY_EXPIRE_PASSWORD} 1925 */ setPasswordExpirationTimeout(@onNull ComponentName admin, long timeout)1926 public void setPasswordExpirationTimeout(@NonNull ComponentName admin, long timeout) { 1927 if (mService != null) { 1928 try { 1929 mService.setPasswordExpirationTimeout(admin, timeout, mParentInstance); 1930 } catch (RemoteException e) { 1931 throw e.rethrowFromSystemServer(); 1932 } 1933 } 1934 } 1935 1936 /** 1937 * Get the password expiration timeout for the given admin. The expiration timeout is the 1938 * recurring expiration timeout provided in the call to 1939 * {@link #setPasswordExpirationTimeout(ComponentName, long)} for the given admin or the 1940 * aggregate of all participating policy administrators if {@code admin} is null. Admins that 1941 * have set restrictions on profiles that have a separate challenge are not taken into account. 1942 * 1943 * <p>This method can be called on the {@link DevicePolicyManager} instance 1944 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 1945 * restrictions on the parent profile. 1946 * 1947 * @param admin The name of the admin component to check, or {@code null} to aggregate all admins. 1948 * @return The timeout for the given admin or the minimum of all timeouts 1949 */ getPasswordExpirationTimeout(@ullable ComponentName admin)1950 public long getPasswordExpirationTimeout(@Nullable ComponentName admin) { 1951 if (mService != null) { 1952 try { 1953 return mService.getPasswordExpirationTimeout(admin, myUserId(), mParentInstance); 1954 } catch (RemoteException e) { 1955 throw e.rethrowFromSystemServer(); 1956 } 1957 } 1958 return 0; 1959 } 1960 1961 /** 1962 * Get the current password expiration time for a particular admin or all admins that set 1963 * restrictions on this user and its participating profiles. Restrictions on profiles that have 1964 * a separate challenge are not taken into account. If admin is {@code null}, then a composite 1965 * of all expiration times is returned - which will be the minimum of all of them. 1966 * 1967 * <p>This method can be called on the {@link DevicePolicyManager} instance 1968 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 1969 * the password expiration for the parent profile. 1970 * 1971 * @param admin The name of the admin component to check, or {@code null} to aggregate all admins. 1972 * @return The password expiration time, in milliseconds since epoch. 1973 */ getPasswordExpiration(@ullable ComponentName admin)1974 public long getPasswordExpiration(@Nullable ComponentName admin) { 1975 if (mService != null) { 1976 try { 1977 return mService.getPasswordExpiration(admin, myUserId(), mParentInstance); 1978 } catch (RemoteException e) { 1979 throw e.rethrowFromSystemServer(); 1980 } 1981 } 1982 return 0; 1983 } 1984 1985 /** 1986 * Retrieve the current password history length for a particular admin or all admins that 1987 * set restrictions on this user and its participating profiles. Restrictions on profiles that 1988 * have a separate challenge are not taken into account. 1989 * 1990 * <p>This method can be called on the {@link DevicePolicyManager} instance 1991 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 1992 * restrictions on the parent profile. 1993 * 1994 * @param admin The name of the admin component to check, or {@code null} to aggregate 1995 * all admins. 1996 * @return The length of the password history 1997 */ getPasswordHistoryLength(@ullable ComponentName admin)1998 public int getPasswordHistoryLength(@Nullable ComponentName admin) { 1999 return getPasswordHistoryLength(admin, myUserId()); 2000 } 2001 2002 /** @hide per-user version */ getPasswordHistoryLength(@ullable ComponentName admin, int userHandle)2003 public int getPasswordHistoryLength(@Nullable ComponentName admin, int userHandle) { 2004 if (mService != null) { 2005 try { 2006 return mService.getPasswordHistoryLength(admin, userHandle, mParentInstance); 2007 } catch (RemoteException e) { 2008 throw e.rethrowFromSystemServer(); 2009 } 2010 } 2011 return 0; 2012 } 2013 2014 /** 2015 * Return the maximum password length that the device supports for a 2016 * particular password quality. 2017 * @param quality The quality being interrogated. 2018 * @return Returns the maximum length that the user can enter. 2019 */ getPasswordMaximumLength(int quality)2020 public int getPasswordMaximumLength(int quality) { 2021 // Kind-of arbitrary. 2022 return 16; 2023 } 2024 2025 /** 2026 * Determine whether the current password the user has set is sufficient to meet the policy 2027 * requirements (e.g. quality, minimum length) that have been requested by the admins of this 2028 * user and its participating profiles. Restrictions on profiles that have a separate challenge 2029 * are not taken into account. If the user has a password, it must have been entered in order to 2030 * perform this check. 2031 * <p> 2032 * The calling device admin must have requested 2033 * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to be able to call this method; if it has 2034 * not, a security exception will be thrown. 2035 * <p> 2036 * This method can be called on the {@link DevicePolicyManager} instance returned by 2037 * {@link #getParentProfileInstance(ComponentName)} in order to determine if the password set on 2038 * the parent profile is sufficient. 2039 * 2040 * @return Returns true if the password meets the current requirements, else false. 2041 * @throws SecurityException if the calling application does not own an active administrator 2042 * that uses {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} 2043 * @throws IllegalStateException if the user has a password but has not entered it yet. 2044 */ isActivePasswordSufficient()2045 public boolean isActivePasswordSufficient() { 2046 if (mService != null) { 2047 try { 2048 return mService.isActivePasswordSufficient(myUserId(), mParentInstance); 2049 } catch (RemoteException e) { 2050 throw e.rethrowFromSystemServer(); 2051 } 2052 } 2053 return false; 2054 } 2055 2056 /** 2057 * Determine whether the current profile password the user has set is sufficient 2058 * to meet the policy requirements (e.g. quality, minimum length) that have been 2059 * requested by the admins of the parent user and its profiles. 2060 * 2061 * @param userHandle the userId of the profile to check the password for. 2062 * @return Returns true if the password would meet the current requirements, else false. 2063 * @throws SecurityException if {@code userHandle} is not a managed profile. 2064 * @hide 2065 */ isProfileActivePasswordSufficientForParent(int userHandle)2066 public boolean isProfileActivePasswordSufficientForParent(int userHandle) { 2067 if (mService != null) { 2068 try { 2069 return mService.isProfileActivePasswordSufficientForParent(userHandle); 2070 } catch (RemoteException e) { 2071 throw e.rethrowFromSystemServer(); 2072 } 2073 } 2074 return false; 2075 } 2076 2077 /** 2078 * Retrieve the number of times the user has failed at entering a password since that last 2079 * successful password entry. 2080 * <p> 2081 * This method can be called on the {@link DevicePolicyManager} instance returned by 2082 * {@link #getParentProfileInstance(ComponentName)} in order to retrieve the number of failed 2083 * password attemts for the parent user. 2084 * <p> 2085 * The calling device admin must have requested {@link DeviceAdminInfo#USES_POLICY_WATCH_LOGIN} 2086 * to be able to call this method; if it has not, a security exception will be thrown. 2087 * 2088 * @return The number of times user has entered an incorrect password since the last correct 2089 * password entry. 2090 * @throws SecurityException if the calling application does not own an active administrator 2091 * that uses {@link DeviceAdminInfo#USES_POLICY_WATCH_LOGIN} 2092 */ getCurrentFailedPasswordAttempts()2093 public int getCurrentFailedPasswordAttempts() { 2094 return getCurrentFailedPasswordAttempts(myUserId()); 2095 } 2096 2097 /** 2098 * Retrieve the number of times the given user has failed at entering a 2099 * password since that last successful password entry. 2100 * 2101 * <p>The calling device admin must have requested 2102 * {@link DeviceAdminInfo#USES_POLICY_WATCH_LOGIN} to be able to call this method; if it has 2103 * not and it is not the system uid, a security exception will be thrown. 2104 * 2105 * @hide 2106 */ getCurrentFailedPasswordAttempts(int userHandle)2107 public int getCurrentFailedPasswordAttempts(int userHandle) { 2108 if (mService != null) { 2109 try { 2110 return mService.getCurrentFailedPasswordAttempts(userHandle, mParentInstance); 2111 } catch (RemoteException e) { 2112 throw e.rethrowFromSystemServer(); 2113 } 2114 } 2115 return -1; 2116 } 2117 2118 /** 2119 * Queries whether {@link #RESET_PASSWORD_DO_NOT_ASK_CREDENTIALS_ON_BOOT} flag is set. 2120 * 2121 * @return true if RESET_PASSWORD_DO_NOT_ASK_CREDENTIALS_ON_BOOT flag is set. 2122 * @hide 2123 */ getDoNotAskCredentialsOnBoot()2124 public boolean getDoNotAskCredentialsOnBoot() { 2125 if (mService != null) { 2126 try { 2127 return mService.getDoNotAskCredentialsOnBoot(); 2128 } catch (RemoteException e) { 2129 throw e.rethrowFromSystemServer(); 2130 } 2131 } 2132 return false; 2133 } 2134 2135 /** 2136 * Setting this to a value greater than zero enables a built-in policy that will perform a 2137 * device or profile wipe after too many incorrect device-unlock passwords have been entered. 2138 * This built-in policy combines watching for failed passwords and wiping the device, and 2139 * requires that you request both {@link DeviceAdminInfo#USES_POLICY_WATCH_LOGIN} and 2140 * {@link DeviceAdminInfo#USES_POLICY_WIPE_DATA}}. 2141 * <p> 2142 * To implement any other policy (e.g. wiping data for a particular application only, erasing or 2143 * revoking credentials, or reporting the failure to a server), you should implement 2144 * {@link DeviceAdminReceiver#onPasswordFailed(Context, android.content.Intent)} instead. Do not 2145 * use this API, because if the maximum count is reached, the device or profile will be wiped 2146 * immediately, and your callback will not be invoked. 2147 * <p> 2148 * This method can be called on the {@link DevicePolicyManager} instance returned by 2149 * {@link #getParentProfileInstance(ComponentName)} in order to set a value on the parent 2150 * profile. 2151 * 2152 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 2153 * @param num The number of failed password attempts at which point the device or profile will 2154 * be wiped. 2155 * @throws SecurityException if {@code admin} is not an active administrator or does not use 2156 * both {@link DeviceAdminInfo#USES_POLICY_WATCH_LOGIN} and 2157 * {@link DeviceAdminInfo#USES_POLICY_WIPE_DATA}. 2158 */ setMaximumFailedPasswordsForWipe(@onNull ComponentName admin, int num)2159 public void setMaximumFailedPasswordsForWipe(@NonNull ComponentName admin, int num) { 2160 if (mService != null) { 2161 try { 2162 mService.setMaximumFailedPasswordsForWipe(admin, num, mParentInstance); 2163 } catch (RemoteException e) { 2164 throw e.rethrowFromSystemServer(); 2165 } 2166 } 2167 } 2168 2169 /** 2170 * Retrieve the current maximum number of login attempts that are allowed before the device 2171 * or profile is wiped, for a particular admin or all admins that set restrictions on this user 2172 * and its participating profiles. Restrictions on profiles that have a separate challenge are 2173 * not taken into account. 2174 * 2175 * <p>This method can be called on the {@link DevicePolicyManager} instance 2176 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 2177 * the value for the parent profile. 2178 * 2179 * @param admin The name of the admin component to check, or {@code null} to aggregate 2180 * all admins. 2181 */ getMaximumFailedPasswordsForWipe(@ullable ComponentName admin)2182 public int getMaximumFailedPasswordsForWipe(@Nullable ComponentName admin) { 2183 return getMaximumFailedPasswordsForWipe(admin, myUserId()); 2184 } 2185 2186 /** @hide per-user version */ getMaximumFailedPasswordsForWipe(@ullable ComponentName admin, int userHandle)2187 public int getMaximumFailedPasswordsForWipe(@Nullable ComponentName admin, int userHandle) { 2188 if (mService != null) { 2189 try { 2190 return mService.getMaximumFailedPasswordsForWipe( 2191 admin, userHandle, mParentInstance); 2192 } catch (RemoteException e) { 2193 throw e.rethrowFromSystemServer(); 2194 } 2195 } 2196 return 0; 2197 } 2198 2199 /** 2200 * Returns the profile with the smallest maximum failed passwords for wipe, 2201 * for the given user. So for primary user, it might return the primary or 2202 * a managed profile. For a secondary user, it would be the same as the 2203 * user passed in. 2204 * @hide Used only by Keyguard 2205 */ getProfileWithMinimumFailedPasswordsForWipe(int userHandle)2206 public int getProfileWithMinimumFailedPasswordsForWipe(int userHandle) { 2207 if (mService != null) { 2208 try { 2209 return mService.getProfileWithMinimumFailedPasswordsForWipe( 2210 userHandle, mParentInstance); 2211 } catch (RemoteException e) { 2212 throw e.rethrowFromSystemServer(); 2213 } 2214 } 2215 return UserHandle.USER_NULL; 2216 } 2217 2218 /** 2219 * Flag for {@link #resetPassword}: don't allow other admins to change 2220 * the password again until the user has entered it. 2221 */ 2222 public static final int RESET_PASSWORD_REQUIRE_ENTRY = 0x0001; 2223 2224 /** 2225 * Flag for {@link #resetPassword}: don't ask for user credentials on device boot. 2226 * If the flag is set, the device can be booted without asking for user password. 2227 * The absence of this flag does not change the current boot requirements. This flag 2228 * can be set by the device owner only. If the app is not the device owner, the flag 2229 * is ignored. Once the flag is set, it cannot be reverted back without resetting the 2230 * device to factory defaults. 2231 */ 2232 public static final int RESET_PASSWORD_DO_NOT_ASK_CREDENTIALS_ON_BOOT = 0x0002; 2233 2234 /** 2235 * Force a new device unlock password (the password needed to access the entire device, not for 2236 * individual accounts) on the user. This takes effect immediately. 2237 * <p> 2238 * <em>Note: This API has been limited as of {@link android.os.Build.VERSION_CODES#N} for 2239 * device admins that are not device owner and not profile owner. 2240 * The password can now only be changed if there is currently no password set. Device owner 2241 * and profile owner can still do this when user is unlocked and does not have a managed 2242 * profile.</em> 2243 * <p> 2244 * The given password must be sufficient for the current password quality and length constraints 2245 * as returned by {@link #getPasswordQuality(ComponentName)} and 2246 * {@link #getPasswordMinimumLength(ComponentName)}; if it does not meet these constraints, then 2247 * it will be rejected and false returned. Note that the password may be a stronger quality 2248 * (containing alphanumeric characters when the requested quality is only numeric), in which 2249 * case the currently active quality will be increased to match. 2250 * <p> 2251 * Calling with a null or empty password will clear any existing PIN, pattern or password if the 2252 * current password constraints allow it. <em>Note: This will not work in 2253 * {@link android.os.Build.VERSION_CODES#N} and later for managed profiles, or for device admins 2254 * that are not device owner or profile owner. Once set, the password cannot be changed to null 2255 * or empty except by these admins.</em> 2256 * <p> 2257 * The calling device admin must have requested 2258 * {@link DeviceAdminInfo#USES_POLICY_RESET_PASSWORD} to be able to call this method; if it has 2259 * not, a security exception will be thrown. 2260 * 2261 * @param password The new password for the user. Null or empty clears the password. 2262 * @param flags May be 0 or combination of {@link #RESET_PASSWORD_REQUIRE_ENTRY} and 2263 * {@link #RESET_PASSWORD_DO_NOT_ASK_CREDENTIALS_ON_BOOT}. 2264 * @return Returns true if the password was applied, or false if it is not acceptable for the 2265 * current constraints or if the user has not been decrypted yet. 2266 * @throws SecurityException if the calling application does not own an active administrator 2267 * that uses {@link DeviceAdminInfo#USES_POLICY_RESET_PASSWORD} 2268 * @throws IllegalStateException if the calling user is locked or has a managed profile. 2269 * @throws IllegalArgumentException if the password does not meet system requirements. 2270 */ resetPassword(String password, int flags)2271 public boolean resetPassword(String password, int flags) { 2272 throwIfParentInstance("resetPassword"); 2273 if (mService != null) { 2274 try { 2275 return mService.resetPassword(password, flags); 2276 } catch (RemoteException e) { 2277 throw e.rethrowFromSystemServer(); 2278 } 2279 } 2280 return false; 2281 } 2282 2283 /** 2284 * Called by an application that is administering the device to set the maximum time for user 2285 * activity until the device will lock. This limits the length that the user can set. It takes 2286 * effect immediately. 2287 * <p> 2288 * The calling device admin must have requested {@link DeviceAdminInfo#USES_POLICY_FORCE_LOCK} 2289 * to be able to call this method; if it has not, a security exception will be thrown. 2290 * <p> 2291 * This method can be called on the {@link DevicePolicyManager} instance returned by 2292 * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent 2293 * profile. 2294 * 2295 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 2296 * @param timeMs The new desired maximum time to lock in milliseconds. A value of 0 means there 2297 * is no restriction. 2298 * @throws SecurityException if {@code admin} is not an active administrator or it does not use 2299 * {@link DeviceAdminInfo#USES_POLICY_FORCE_LOCK} 2300 */ setMaximumTimeToLock(@onNull ComponentName admin, long timeMs)2301 public void setMaximumTimeToLock(@NonNull ComponentName admin, long timeMs) { 2302 if (mService != null) { 2303 try { 2304 mService.setMaximumTimeToLock(admin, timeMs, mParentInstance); 2305 } catch (RemoteException e) { 2306 throw e.rethrowFromSystemServer(); 2307 } 2308 } 2309 } 2310 2311 /** 2312 * Retrieve the current maximum time to unlock for a particular admin or all admins that set 2313 * restrictions on this user and its participating profiles. Restrictions on profiles that have 2314 * a separate challenge are not taken into account. 2315 * 2316 * <p>This method can be called on the {@link DevicePolicyManager} instance 2317 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 2318 * restrictions on the parent profile. 2319 * 2320 * @param admin The name of the admin component to check, or {@code null} to aggregate 2321 * all admins. 2322 * @return time in milliseconds for the given admin or the minimum value (strictest) of 2323 * all admins if admin is null. Returns 0 if there are no restrictions. 2324 */ getMaximumTimeToLock(@ullable ComponentName admin)2325 public long getMaximumTimeToLock(@Nullable ComponentName admin) { 2326 return getMaximumTimeToLock(admin, myUserId()); 2327 } 2328 2329 /** @hide per-user version */ getMaximumTimeToLock(@ullable ComponentName admin, int userHandle)2330 public long getMaximumTimeToLock(@Nullable ComponentName admin, int userHandle) { 2331 if (mService != null) { 2332 try { 2333 return mService.getMaximumTimeToLock(admin, userHandle, mParentInstance); 2334 } catch (RemoteException e) { 2335 throw e.rethrowFromSystemServer(); 2336 } 2337 } 2338 return 0; 2339 } 2340 2341 /** 2342 * Returns maximum time to lock that applied by all profiles in this user. We do this because we 2343 * do not have a separate timeout to lock for work challenge only. 2344 * 2345 * @hide 2346 */ getMaximumTimeToLockForUserAndProfiles(int userHandle)2347 public long getMaximumTimeToLockForUserAndProfiles(int userHandle) { 2348 if (mService != null) { 2349 try { 2350 return mService.getMaximumTimeToLockForUserAndProfiles(userHandle); 2351 } catch (RemoteException e) { 2352 throw e.rethrowFromSystemServer(); 2353 } 2354 } 2355 return 0; 2356 } 2357 2358 /** 2359 * Called by a device/profile owner to set the timeout after which unlocking with secondary, non 2360 * strong auth (e.g. fingerprint, trust agents) times out, i.e. the user has to use a strong 2361 * authentication method like password, pin or pattern. 2362 * 2363 * <p>This timeout is used internally to reset the timer to require strong auth again after 2364 * specified timeout each time it has been successfully used. 2365 * 2366 * <p>Fingerprint can also be disabled altogether using {@link #KEYGUARD_DISABLE_FINGERPRINT}. 2367 * 2368 * <p>Trust agents can also be disabled altogether using {@link #KEYGUARD_DISABLE_TRUST_AGENTS}. 2369 * 2370 * <p>The calling device admin must be a device or profile owner. If it is not, 2371 * a {@link SecurityException} will be thrown. 2372 * 2373 * <p>The calling device admin can verify the value it has set by calling 2374 * {@link #getRequiredStrongAuthTimeout(ComponentName)} and passing in its instance. 2375 * 2376 * <p>This method can be called on the {@link DevicePolicyManager} instance returned by 2377 * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent 2378 * profile. 2379 * 2380 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 2381 * @param timeoutMs The new timeout, after which the user will have to unlock with strong 2382 * authentication method. A value of 0 means the admin is not participating in 2383 * controlling the timeout. 2384 * The minimum and maximum timeouts are platform-defined and are typically 1 hour and 2385 * 72 hours, respectively. Though discouraged, the admin may choose to require strong 2386 * auth at all times using {@link #KEYGUARD_DISABLE_FINGERPRINT} and/or 2387 * {@link #KEYGUARD_DISABLE_TRUST_AGENTS}. 2388 * 2389 * @throws SecurityException if {@code admin} is not a device or profile owner. 2390 * 2391 * @hide 2392 */ setRequiredStrongAuthTimeout(@onNull ComponentName admin, long timeoutMs)2393 public void setRequiredStrongAuthTimeout(@NonNull ComponentName admin, 2394 long timeoutMs) { 2395 if (mService != null) { 2396 try { 2397 mService.setRequiredStrongAuthTimeout(admin, timeoutMs, mParentInstance); 2398 } catch (RemoteException e) { 2399 throw e.rethrowFromSystemServer(); 2400 } 2401 } 2402 } 2403 2404 /** 2405 * Determine for how long the user will be able to use secondary, non strong auth for 2406 * authentication, since last strong method authentication (password, pin or pattern) was used. 2407 * After the returned timeout the user is required to use strong authentication method. 2408 * 2409 * <p>This method can be called on the {@link DevicePolicyManager} instance 2410 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 2411 * restrictions on the parent profile. 2412 * 2413 * @param admin The name of the admin component to check, or {@code null} to aggregate 2414 * accross all participating admins. 2415 * @return The timeout or 0 if not configured for the provided admin. 2416 * 2417 * @hide 2418 */ getRequiredStrongAuthTimeout(@ullable ComponentName admin)2419 public long getRequiredStrongAuthTimeout(@Nullable ComponentName admin) { 2420 return getRequiredStrongAuthTimeout(admin, myUserId()); 2421 } 2422 2423 /** @hide per-user version */ getRequiredStrongAuthTimeout(@ullable ComponentName admin, @UserIdInt int userId)2424 public long getRequiredStrongAuthTimeout(@Nullable ComponentName admin, @UserIdInt int userId) { 2425 if (mService != null) { 2426 try { 2427 return mService.getRequiredStrongAuthTimeout(admin, userId, mParentInstance); 2428 } catch (RemoteException e) { 2429 throw e.rethrowFromSystemServer(); 2430 } 2431 } 2432 return DEFAULT_STRONG_AUTH_TIMEOUT_MS; 2433 } 2434 2435 /** 2436 * Make the device lock immediately, as if the lock screen timeout has expired at the point of 2437 * this call. 2438 * <p> 2439 * The calling device admin must have requested {@link DeviceAdminInfo#USES_POLICY_FORCE_LOCK} 2440 * to be able to call this method; if it has not, a security exception will be thrown. 2441 * <p> 2442 * This method can be called on the {@link DevicePolicyManager} instance returned by 2443 * {@link #getParentProfileInstance(ComponentName)} in order to lock the parent profile. 2444 * 2445 * @throws SecurityException if the calling application does not own an active administrator 2446 * that uses {@link DeviceAdminInfo#USES_POLICY_FORCE_LOCK} 2447 */ lockNow()2448 public void lockNow() { 2449 if (mService != null) { 2450 try { 2451 mService.lockNow(mParentInstance); 2452 } catch (RemoteException e) { 2453 throw e.rethrowFromSystemServer(); 2454 } 2455 } 2456 } 2457 2458 /** 2459 * Flag for {@link #wipeData(int)}: also erase the device's external 2460 * storage (such as SD cards). 2461 */ 2462 public static final int WIPE_EXTERNAL_STORAGE = 0x0001; 2463 2464 /** 2465 * Flag for {@link #wipeData(int)}: also erase the factory reset protection 2466 * data. 2467 * 2468 * <p>This flag may only be set by device owner admins; if it is set by 2469 * other admins a {@link SecurityException} will be thrown. 2470 */ 2471 public static final int WIPE_RESET_PROTECTION_DATA = 0x0002; 2472 2473 /** 2474 * Ask the user data be wiped. Wiping the primary user will cause the device to reboot, erasing 2475 * all user data while next booting up. 2476 * <p> 2477 * The calling device admin must have requested {@link DeviceAdminInfo#USES_POLICY_WIPE_DATA} to 2478 * be able to call this method; if it has not, a security exception will be thrown. 2479 * 2480 * @param flags Bit mask of additional options: currently supported flags are 2481 * {@link #WIPE_EXTERNAL_STORAGE} and {@link #WIPE_RESET_PROTECTION_DATA}. 2482 * @throws SecurityException if the calling application does not own an active administrator 2483 * that uses {@link DeviceAdminInfo#USES_POLICY_WIPE_DATA} 2484 */ wipeData(int flags)2485 public void wipeData(int flags) { 2486 throwIfParentInstance("wipeData"); 2487 if (mService != null) { 2488 try { 2489 mService.wipeData(flags); 2490 } catch (RemoteException e) { 2491 throw e.rethrowFromSystemServer(); 2492 } 2493 } 2494 } 2495 2496 /** 2497 * Called by an application that is administering the device to set the 2498 * global proxy and exclusion list. 2499 * <p> 2500 * The calling device admin must have requested 2501 * {@link DeviceAdminInfo#USES_POLICY_SETS_GLOBAL_PROXY} to be able to call 2502 * this method; if it has not, a security exception will be thrown. 2503 * Only the first device admin can set the proxy. If a second admin attempts 2504 * to set the proxy, the {@link ComponentName} of the admin originally setting the 2505 * proxy will be returned. If successful in setting the proxy, {@code null} will 2506 * be returned. 2507 * The method can be called repeatedly by the device admin alrady setting the 2508 * proxy to update the proxy and exclusion list. 2509 * 2510 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 2511 * @param proxySpec the global proxy desired. Must be an HTTP Proxy. 2512 * Pass Proxy.NO_PROXY to reset the proxy. 2513 * @param exclusionList a list of domains to be excluded from the global proxy. 2514 * @return {@code null} if the proxy was successfully set, or otherwise a {@link ComponentName} 2515 * of the device admin that sets the proxy. 2516 * @hide 2517 */ setGlobalProxy(@onNull ComponentName admin, Proxy proxySpec, List<String> exclusionList )2518 public ComponentName setGlobalProxy(@NonNull ComponentName admin, Proxy proxySpec, 2519 List<String> exclusionList ) { 2520 throwIfParentInstance("setGlobalProxy"); 2521 if (proxySpec == null) { 2522 throw new NullPointerException(); 2523 } 2524 if (mService != null) { 2525 try { 2526 String hostSpec; 2527 String exclSpec; 2528 if (proxySpec.equals(Proxy.NO_PROXY)) { 2529 hostSpec = null; 2530 exclSpec = null; 2531 } else { 2532 if (!proxySpec.type().equals(Proxy.Type.HTTP)) { 2533 throw new IllegalArgumentException(); 2534 } 2535 InetSocketAddress sa = (InetSocketAddress)proxySpec.address(); 2536 String hostName = sa.getHostName(); 2537 int port = sa.getPort(); 2538 StringBuilder hostBuilder = new StringBuilder(); 2539 hostSpec = hostBuilder.append(hostName) 2540 .append(":").append(Integer.toString(port)).toString(); 2541 if (exclusionList == null) { 2542 exclSpec = ""; 2543 } else { 2544 StringBuilder listBuilder = new StringBuilder(); 2545 boolean firstDomain = true; 2546 for (String exclDomain : exclusionList) { 2547 if (!firstDomain) { 2548 listBuilder = listBuilder.append(","); 2549 } else { 2550 firstDomain = false; 2551 } 2552 listBuilder = listBuilder.append(exclDomain.trim()); 2553 } 2554 exclSpec = listBuilder.toString(); 2555 } 2556 if (android.net.Proxy.validate(hostName, Integer.toString(port), exclSpec) 2557 != android.net.Proxy.PROXY_VALID) 2558 throw new IllegalArgumentException(); 2559 } 2560 return mService.setGlobalProxy(admin, hostSpec, exclSpec); 2561 } catch (RemoteException e) { 2562 throw e.rethrowFromSystemServer(); 2563 } 2564 } 2565 return null; 2566 } 2567 2568 /** 2569 * Set a network-independent global HTTP proxy. This is not normally what you want for typical 2570 * HTTP proxies - they are generally network dependent. However if you're doing something 2571 * unusual like general internal filtering this may be useful. On a private network where the 2572 * proxy is not accessible, you may break HTTP using this. 2573 * <p> 2574 * This method requires the caller to be the device owner. 2575 * <p> 2576 * This proxy is only a recommendation and it is possible that some apps will ignore it. 2577 * 2578 * @see ProxyInfo 2579 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 2580 * @param proxyInfo The a {@link ProxyInfo} object defining the new global HTTP proxy. A 2581 * {@code null} value will clear the global HTTP proxy. 2582 * @throws SecurityException if {@code admin} is not the device owner. 2583 */ setRecommendedGlobalProxy(@onNull ComponentName admin, @Nullable ProxyInfo proxyInfo)2584 public void setRecommendedGlobalProxy(@NonNull ComponentName admin, @Nullable ProxyInfo 2585 proxyInfo) { 2586 throwIfParentInstance("setRecommendedGlobalProxy"); 2587 if (mService != null) { 2588 try { 2589 mService.setRecommendedGlobalProxy(admin, proxyInfo); 2590 } catch (RemoteException e) { 2591 throw e.rethrowFromSystemServer(); 2592 } 2593 } 2594 } 2595 2596 /** 2597 * Returns the component name setting the global proxy. 2598 * @return ComponentName object of the device admin that set the global proxy, or {@code null} 2599 * if no admin has set the proxy. 2600 * @hide 2601 */ getGlobalProxyAdmin()2602 public ComponentName getGlobalProxyAdmin() { 2603 if (mService != null) { 2604 try { 2605 return mService.getGlobalProxyAdmin(myUserId()); 2606 } catch (RemoteException e) { 2607 throw e.rethrowFromSystemServer(); 2608 } 2609 } 2610 return null; 2611 } 2612 2613 /** 2614 * Result code for {@link #setStorageEncryption} and {@link #getStorageEncryptionStatus}: 2615 * indicating that encryption is not supported. 2616 */ 2617 public static final int ENCRYPTION_STATUS_UNSUPPORTED = 0; 2618 2619 /** 2620 * Result code for {@link #setStorageEncryption} and {@link #getStorageEncryptionStatus}: 2621 * indicating that encryption is supported, but is not currently active. 2622 */ 2623 public static final int ENCRYPTION_STATUS_INACTIVE = 1; 2624 2625 /** 2626 * Result code for {@link #getStorageEncryptionStatus}: 2627 * indicating that encryption is not currently active, but is currently 2628 * being activated. This is only reported by devices that support 2629 * encryption of data and only when the storage is currently 2630 * undergoing a process of becoming encrypted. A device that must reboot and/or wipe data 2631 * to become encrypted will never return this value. 2632 */ 2633 public static final int ENCRYPTION_STATUS_ACTIVATING = 2; 2634 2635 /** 2636 * Result code for {@link #setStorageEncryption} and {@link #getStorageEncryptionStatus}: 2637 * indicating that encryption is active. 2638 * <p> 2639 * Also see {@link #ENCRYPTION_STATUS_ACTIVE_PER_USER}. 2640 */ 2641 public static final int ENCRYPTION_STATUS_ACTIVE = 3; 2642 2643 /** 2644 * Result code for {@link #getStorageEncryptionStatus}: 2645 * indicating that encryption is active, but an encryption key has not 2646 * been set by the user. 2647 */ 2648 public static final int ENCRYPTION_STATUS_ACTIVE_DEFAULT_KEY = 4; 2649 2650 /** 2651 * Result code for {@link #getStorageEncryptionStatus}: 2652 * indicating that encryption is active and the encryption key is tied to the user or profile. 2653 * <p> 2654 * This value is only returned to apps targeting API level 24 and above. For apps targeting 2655 * earlier API levels, {@link #ENCRYPTION_STATUS_ACTIVE} is returned, even if the 2656 * encryption key is specific to the user or profile. 2657 */ 2658 public static final int ENCRYPTION_STATUS_ACTIVE_PER_USER = 5; 2659 2660 /** 2661 * Activity action: begin the process of encrypting data on the device. This activity should 2662 * be launched after using {@link #setStorageEncryption} to request encryption be activated. 2663 * After resuming from this activity, use {@link #getStorageEncryption} 2664 * to check encryption status. However, on some devices this activity may never return, as 2665 * it may trigger a reboot and in some cases a complete data wipe of the device. 2666 */ 2667 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION) 2668 public static final String ACTION_START_ENCRYPTION 2669 = "android.app.action.START_ENCRYPTION"; 2670 /** 2671 * Widgets are enabled in keyguard 2672 */ 2673 public static final int KEYGUARD_DISABLE_FEATURES_NONE = 0; 2674 2675 /** 2676 * Disable all keyguard widgets. Has no effect. 2677 */ 2678 public static final int KEYGUARD_DISABLE_WIDGETS_ALL = 1 << 0; 2679 2680 /** 2681 * Disable the camera on secure keyguard screens (e.g. PIN/Pattern/Password) 2682 */ 2683 public static final int KEYGUARD_DISABLE_SECURE_CAMERA = 1 << 1; 2684 2685 /** 2686 * Disable showing all notifications on secure keyguard screens (e.g. PIN/Pattern/Password) 2687 */ 2688 public static final int KEYGUARD_DISABLE_SECURE_NOTIFICATIONS = 1 << 2; 2689 2690 /** 2691 * Only allow redacted notifications on secure keyguard screens (e.g. PIN/Pattern/Password) 2692 */ 2693 public static final int KEYGUARD_DISABLE_UNREDACTED_NOTIFICATIONS = 1 << 3; 2694 2695 /** 2696 * Ignore trust agent state on secure keyguard screens 2697 * (e.g. PIN/Pattern/Password). 2698 */ 2699 public static final int KEYGUARD_DISABLE_TRUST_AGENTS = 1 << 4; 2700 2701 /** 2702 * Disable fingerprint sensor on keyguard secure screens (e.g. PIN/Pattern/Password). 2703 */ 2704 public static final int KEYGUARD_DISABLE_FINGERPRINT = 1 << 5; 2705 2706 /** 2707 * Disable text entry into notifications on secure keyguard screens (e.g. PIN/Pattern/Password). 2708 */ 2709 public static final int KEYGUARD_DISABLE_REMOTE_INPUT = 1 << 6; 2710 2711 /** 2712 * Disable all current and future keyguard customizations. 2713 */ 2714 public static final int KEYGUARD_DISABLE_FEATURES_ALL = 0x7fffffff; 2715 2716 /** 2717 * Called by an application that is administering the device to request that the storage system 2718 * be encrypted. 2719 * <p> 2720 * When multiple device administrators attempt to control device encryption, the most secure, 2721 * supported setting will always be used. If any device administrator requests device 2722 * encryption, it will be enabled; Conversely, if a device administrator attempts to disable 2723 * device encryption while another device administrator has enabled it, the call to disable will 2724 * fail (most commonly returning {@link #ENCRYPTION_STATUS_ACTIVE}). 2725 * <p> 2726 * This policy controls encryption of the secure (application data) storage area. Data written 2727 * to other storage areas may or may not be encrypted, and this policy does not require or 2728 * control the encryption of any other storage areas. There is one exception: If 2729 * {@link android.os.Environment#isExternalStorageEmulated()} is {@code true}, then the 2730 * directory returned by {@link android.os.Environment#getExternalStorageDirectory()} must be 2731 * written to disk within the encrypted storage area. 2732 * <p> 2733 * Important Note: On some devices, it is possible to encrypt storage without requiring the user 2734 * to create a device PIN or Password. In this case, the storage is encrypted, but the 2735 * encryption key may not be fully secured. For maximum security, the administrator should also 2736 * require (and check for) a pattern, PIN, or password. 2737 * 2738 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 2739 * @param encrypt true to request encryption, false to release any previous request 2740 * @return the new request status (for all active admins) - will be one of 2741 * {@link #ENCRYPTION_STATUS_UNSUPPORTED}, {@link #ENCRYPTION_STATUS_INACTIVE}, or 2742 * {@link #ENCRYPTION_STATUS_ACTIVE}. This is the value of the requests; Use 2743 * {@link #getStorageEncryptionStatus()} to query the actual device state. 2744 * @throws SecurityException if {@code admin} is not an active administrator or does not use 2745 * {@link DeviceAdminInfo#USES_ENCRYPTED_STORAGE} 2746 */ setStorageEncryption(@onNull ComponentName admin, boolean encrypt)2747 public int setStorageEncryption(@NonNull ComponentName admin, boolean encrypt) { 2748 throwIfParentInstance("setStorageEncryption"); 2749 if (mService != null) { 2750 try { 2751 return mService.setStorageEncryption(admin, encrypt); 2752 } catch (RemoteException e) { 2753 throw e.rethrowFromSystemServer(); 2754 } 2755 } 2756 return ENCRYPTION_STATUS_UNSUPPORTED; 2757 } 2758 2759 /** 2760 * Called by an application that is administering the device to 2761 * determine the requested setting for secure storage. 2762 * 2763 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. If null, 2764 * this will return the requested encryption setting as an aggregate of all active 2765 * administrators. 2766 * @return true if the admin(s) are requesting encryption, false if not. 2767 */ getStorageEncryption(@ullable ComponentName admin)2768 public boolean getStorageEncryption(@Nullable ComponentName admin) { 2769 throwIfParentInstance("getStorageEncryption"); 2770 if (mService != null) { 2771 try { 2772 return mService.getStorageEncryption(admin, myUserId()); 2773 } catch (RemoteException e) { 2774 throw e.rethrowFromSystemServer(); 2775 } 2776 } 2777 return false; 2778 } 2779 2780 /** 2781 * Called by an application that is administering the device to 2782 * determine the current encryption status of the device. 2783 * <p> 2784 * Depending on the returned status code, the caller may proceed in different 2785 * ways. If the result is {@link #ENCRYPTION_STATUS_UNSUPPORTED}, the 2786 * storage system does not support encryption. If the 2787 * result is {@link #ENCRYPTION_STATUS_INACTIVE}, use {@link 2788 * #ACTION_START_ENCRYPTION} to begin the process of encrypting or decrypting the 2789 * storage. If the result is {@link #ENCRYPTION_STATUS_ACTIVE_DEFAULT_KEY}, the 2790 * storage system has enabled encryption but no password is set so further action 2791 * may be required. If the result is {@link #ENCRYPTION_STATUS_ACTIVATING}, 2792 * {@link #ENCRYPTION_STATUS_ACTIVE} or {@link #ENCRYPTION_STATUS_ACTIVE_PER_USER}, 2793 * no further action is required. 2794 * 2795 * @return current status of encryption. The value will be one of 2796 * {@link #ENCRYPTION_STATUS_UNSUPPORTED}, {@link #ENCRYPTION_STATUS_INACTIVE}, 2797 * {@link #ENCRYPTION_STATUS_ACTIVATING}, {@link #ENCRYPTION_STATUS_ACTIVE_DEFAULT_KEY}, 2798 * {@link #ENCRYPTION_STATUS_ACTIVE}, or {@link #ENCRYPTION_STATUS_ACTIVE_PER_USER}. 2799 */ getStorageEncryptionStatus()2800 public int getStorageEncryptionStatus() { 2801 throwIfParentInstance("getStorageEncryptionStatus"); 2802 return getStorageEncryptionStatus(myUserId()); 2803 } 2804 2805 /** @hide per-user version */ getStorageEncryptionStatus(int userHandle)2806 public int getStorageEncryptionStatus(int userHandle) { 2807 if (mService != null) { 2808 try { 2809 return mService.getStorageEncryptionStatus(mContext.getPackageName(), userHandle); 2810 } catch (RemoteException e) { 2811 throw e.rethrowFromSystemServer(); 2812 } 2813 } 2814 return ENCRYPTION_STATUS_UNSUPPORTED; 2815 } 2816 2817 /** 2818 * Mark a CA certificate as approved by the device user. This means that they have been notified 2819 * of the installation, were made aware of the risks, viewed the certificate and still wanted to 2820 * keep the certificate on the device. 2821 * 2822 * Calling with {@param approval} as {@code true} will cancel any ongoing warnings related to 2823 * this certificate. 2824 * 2825 * @hide 2826 */ approveCaCert(String alias, int userHandle, boolean approval)2827 public boolean approveCaCert(String alias, int userHandle, boolean approval) { 2828 if (mService != null) { 2829 try { 2830 return mService.approveCaCert(alias, userHandle, approval); 2831 } catch (RemoteException e) { 2832 throw e.rethrowFromSystemServer(); 2833 } 2834 } 2835 return false; 2836 } 2837 2838 /** 2839 * Check whether a CA certificate has been approved by the device user. 2840 * 2841 * @hide 2842 */ isCaCertApproved(String alias, int userHandle)2843 public boolean isCaCertApproved(String alias, int userHandle) { 2844 if (mService != null) { 2845 try { 2846 return mService.isCaCertApproved(alias, userHandle); 2847 } catch (RemoteException e) { 2848 throw e.rethrowFromSystemServer(); 2849 } 2850 } 2851 return false; 2852 } 2853 2854 /** 2855 * Installs the given certificate as a user CA. 2856 * 2857 * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or 2858 * {@code null} if calling from a delegated certificate installer. 2859 * @param certBuffer encoded form of the certificate to install. 2860 * 2861 * @return false if the certBuffer cannot be parsed or installation is 2862 * interrupted, true otherwise. 2863 * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile 2864 * owner. 2865 */ installCaCert(@ullable ComponentName admin, byte[] certBuffer)2866 public boolean installCaCert(@Nullable ComponentName admin, byte[] certBuffer) { 2867 throwIfParentInstance("installCaCert"); 2868 if (mService != null) { 2869 try { 2870 return mService.installCaCert(admin, certBuffer); 2871 } catch (RemoteException e) { 2872 throw e.rethrowFromSystemServer(); 2873 } 2874 } 2875 return false; 2876 } 2877 2878 /** 2879 * Uninstalls the given certificate from trusted user CAs, if present. 2880 * 2881 * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or 2882 * {@code null} if calling from a delegated certificate installer. 2883 * @param certBuffer encoded form of the certificate to remove. 2884 * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile 2885 * owner. 2886 */ uninstallCaCert(@ullable ComponentName admin, byte[] certBuffer)2887 public void uninstallCaCert(@Nullable ComponentName admin, byte[] certBuffer) { 2888 throwIfParentInstance("uninstallCaCert"); 2889 if (mService != null) { 2890 try { 2891 final String alias = getCaCertAlias(certBuffer); 2892 mService.uninstallCaCerts(admin, new String[] {alias}); 2893 } catch (CertificateException e) { 2894 Log.w(TAG, "Unable to parse certificate", e); 2895 } catch (RemoteException e) { 2896 throw e.rethrowFromSystemServer(); 2897 } 2898 } 2899 } 2900 2901 /** 2902 * Returns all CA certificates that are currently trusted, excluding system CA certificates. 2903 * If a user has installed any certificates by other means than device policy these will be 2904 * included too. 2905 * 2906 * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or 2907 * {@code null} if calling from a delegated certificate installer. 2908 * @return a List of byte[] arrays, each encoding one user CA certificate. 2909 * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile 2910 * owner. 2911 */ getInstalledCaCerts(@ullable ComponentName admin)2912 public List<byte[]> getInstalledCaCerts(@Nullable ComponentName admin) { 2913 List<byte[]> certs = new ArrayList<byte[]>(); 2914 throwIfParentInstance("getInstalledCaCerts"); 2915 if (mService != null) { 2916 try { 2917 mService.enforceCanManageCaCerts(admin); 2918 final TrustedCertificateStore certStore = new TrustedCertificateStore(); 2919 for (String alias : certStore.userAliases()) { 2920 try { 2921 certs.add(certStore.getCertificate(alias).getEncoded()); 2922 } catch (CertificateException ce) { 2923 Log.w(TAG, "Could not encode certificate: " + alias, ce); 2924 } 2925 } 2926 } catch (RemoteException re) { 2927 throw re.rethrowFromSystemServer(); 2928 } 2929 } 2930 return certs; 2931 } 2932 2933 /** 2934 * Uninstalls all custom trusted CA certificates from the profile. Certificates installed by 2935 * means other than device policy will also be removed, except for system CA certificates. 2936 * 2937 * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or 2938 * {@code null} if calling from a delegated certificate installer. 2939 * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile 2940 * owner. 2941 */ uninstallAllUserCaCerts(@ullable ComponentName admin)2942 public void uninstallAllUserCaCerts(@Nullable ComponentName admin) { 2943 throwIfParentInstance("uninstallAllUserCaCerts"); 2944 if (mService != null) { 2945 try { 2946 mService.uninstallCaCerts(admin, new TrustedCertificateStore().userAliases() 2947 .toArray(new String[0])); 2948 } catch (RemoteException re) { 2949 throw re.rethrowFromSystemServer(); 2950 } 2951 } 2952 } 2953 2954 /** 2955 * Returns whether this certificate is installed as a trusted CA. 2956 * 2957 * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or 2958 * {@code null} if calling from a delegated certificate installer. 2959 * @param certBuffer encoded form of the certificate to look up. 2960 * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile 2961 * owner. 2962 */ hasCaCertInstalled(@ullable ComponentName admin, byte[] certBuffer)2963 public boolean hasCaCertInstalled(@Nullable ComponentName admin, byte[] certBuffer) { 2964 throwIfParentInstance("hasCaCertInstalled"); 2965 if (mService != null) { 2966 try { 2967 mService.enforceCanManageCaCerts(admin); 2968 return getCaCertAlias(certBuffer) != null; 2969 } catch (RemoteException re) { 2970 throw re.rethrowFromSystemServer(); 2971 } catch (CertificateException ce) { 2972 Log.w(TAG, "Could not parse certificate", ce); 2973 } 2974 } 2975 return false; 2976 } 2977 2978 /** 2979 * Called by a device or profile owner, or delegated certificate installer, to install a 2980 * certificate and corresponding private key. All apps within the profile will be able to access 2981 * the certificate and use the private key, given direct user approval. 2982 * 2983 * <p>Access to the installed credentials will not be granted to the caller of this API without 2984 * direct user approval. This is for security - should a certificate installer become 2985 * compromised, certificates it had already installed will be protected. 2986 * 2987 * <p>If the installer must have access to the credentials, call 2988 * {@link #installKeyPair(ComponentName, PrivateKey, Certificate[], String, boolean)} instead. 2989 * 2990 * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or 2991 * {@code null} if calling from a delegated certificate installer. 2992 * @param privKey The private key to install. 2993 * @param cert The certificate to install. 2994 * @param alias The private key alias under which to install the certificate. If a certificate 2995 * with that alias already exists, it will be overwritten. 2996 * @return {@code true} if the keys were installed, {@code false} otherwise. 2997 * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile 2998 * owner. 2999 */ installKeyPair(@ullable ComponentName admin, @NonNull PrivateKey privKey, @NonNull Certificate cert, @NonNull String alias)3000 public boolean installKeyPair(@Nullable ComponentName admin, @NonNull PrivateKey privKey, 3001 @NonNull Certificate cert, @NonNull String alias) { 3002 return installKeyPair(admin, privKey, new Certificate[] {cert}, alias, false); 3003 } 3004 3005 /** 3006 * Called by a device or profile owner, or delegated certificate installer, to install a 3007 * certificate chain and corresponding private key for the leaf certificate. All apps within the 3008 * profile will be able to access the certificate chain and use the private key, given direct 3009 * user approval. 3010 * 3011 * <p>The caller of this API may grant itself access to the certificate and private key 3012 * immediately, without user approval. It is a best practice not to request this unless strictly 3013 * necessary since it opens up additional security vulnerabilities. 3014 * 3015 * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or 3016 * {@code null} if calling from a delegated certificate installer. 3017 * @param privKey The private key to install. 3018 * @param certs The certificate chain to install. The chain should start with the leaf 3019 * certificate and include the chain of trust in order. This will be returned by 3020 * {@link android.security.KeyChain#getCertificateChain}. 3021 * @param alias The private key alias under which to install the certificate. If a certificate 3022 * with that alias already exists, it will be overwritten. 3023 * @param requestAccess {@code true} to request that the calling app be granted access to the 3024 * credentials immediately. Otherwise, access to the credentials will be gated by user 3025 * approval. 3026 * @return {@code true} if the keys were installed, {@code false} otherwise. 3027 * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile 3028 * owner. 3029 * @see android.security.KeyChain#getCertificateChain 3030 */ installKeyPair(@ullable ComponentName admin, @NonNull PrivateKey privKey, @NonNull Certificate[] certs, @NonNull String alias, boolean requestAccess)3031 public boolean installKeyPair(@Nullable ComponentName admin, @NonNull PrivateKey privKey, 3032 @NonNull Certificate[] certs, @NonNull String alias, boolean requestAccess) { 3033 throwIfParentInstance("installKeyPair"); 3034 try { 3035 final byte[] pemCert = Credentials.convertToPem(certs[0]); 3036 byte[] pemChain = null; 3037 if (certs.length > 1) { 3038 pemChain = Credentials.convertToPem(Arrays.copyOfRange(certs, 1, certs.length)); 3039 } 3040 final byte[] pkcs8Key = KeyFactory.getInstance(privKey.getAlgorithm()) 3041 .getKeySpec(privKey, PKCS8EncodedKeySpec.class).getEncoded(); 3042 return mService.installKeyPair(admin, pkcs8Key, pemCert, pemChain, alias, 3043 requestAccess); 3044 } catch (RemoteException e) { 3045 throw e.rethrowFromSystemServer(); 3046 } catch (NoSuchAlgorithmException | InvalidKeySpecException e) { 3047 Log.w(TAG, "Failed to obtain private key material", e); 3048 } catch (CertificateException | IOException e) { 3049 Log.w(TAG, "Could not pem-encode certificate", e); 3050 } 3051 return false; 3052 } 3053 3054 /** 3055 * Called by a device or profile owner, or delegated certificate installer, to remove a 3056 * certificate and private key pair installed under a given alias. 3057 * 3058 * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or 3059 * {@code null} if calling from a delegated certificate installer. 3060 * @param alias The private key alias under which the certificate is installed. 3061 * @return {@code true} if the private key alias no longer exists, {@code false} otherwise. 3062 * @throws SecurityException if {@code admin} is not {@code null} and not a device or profile 3063 * owner. 3064 */ removeKeyPair(@ullable ComponentName admin, @NonNull String alias)3065 public boolean removeKeyPair(@Nullable ComponentName admin, @NonNull String alias) { 3066 throwIfParentInstance("removeKeyPair"); 3067 try { 3068 return mService.removeKeyPair(admin, alias); 3069 } catch (RemoteException e) { 3070 throw e.rethrowFromSystemServer(); 3071 } 3072 } 3073 3074 /** 3075 * @return the alias of a given CA certificate in the certificate store, or {@code null} if it 3076 * doesn't exist. 3077 */ getCaCertAlias(byte[] certBuffer)3078 private static String getCaCertAlias(byte[] certBuffer) throws CertificateException { 3079 final CertificateFactory certFactory = CertificateFactory.getInstance("X.509"); 3080 final X509Certificate cert = (X509Certificate) certFactory.generateCertificate( 3081 new ByteArrayInputStream(certBuffer)); 3082 return new TrustedCertificateStore().getCertificateAlias(cert); 3083 } 3084 3085 /** 3086 * Called by a profile owner or device owner to grant access to privileged certificate 3087 * manipulation APIs to a third-party certificate installer app. Granted APIs include 3088 * {@link #getInstalledCaCerts}, {@link #hasCaCertInstalled}, {@link #installCaCert}, 3089 * {@link #uninstallCaCert}, {@link #uninstallAllUserCaCerts} and {@link #installKeyPair}. 3090 * <p> 3091 * Delegated certificate installer is a per-user state. The delegated access is persistent until 3092 * it is later cleared by calling this method with a null value or uninstallling the certificate 3093 * installer. 3094 * <p> 3095 * <b>Note:</b>Starting from {@link android.os.Build.VERSION_CODES#N}, if the caller 3096 * application's target SDK version is {@link android.os.Build.VERSION_CODES#N} or newer, the 3097 * supplied certificate installer package must be installed when calling this API, otherwise an 3098 * {@link IllegalArgumentException} will be thrown. 3099 * 3100 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 3101 * @param installerPackage The package name of the certificate installer which will be given 3102 * access. If {@code null} is given the current package will be cleared. 3103 * @throws SecurityException if {@code admin} is not a device or a profile owner. 3104 */ setCertInstallerPackage(@onNull ComponentName admin, @Nullable String installerPackage)3105 public void setCertInstallerPackage(@NonNull ComponentName admin, @Nullable String 3106 installerPackage) throws SecurityException { 3107 throwIfParentInstance("setCertInstallerPackage"); 3108 if (mService != null) { 3109 try { 3110 mService.setCertInstallerPackage(admin, installerPackage); 3111 } catch (RemoteException e) { 3112 throw e.rethrowFromSystemServer(); 3113 } 3114 } 3115 } 3116 3117 /** 3118 * Called by a profile owner or device owner to retrieve the certificate installer for the user. 3119 * null if none is set. 3120 * 3121 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 3122 * @return The package name of the current delegated certificate installer, or {@code null} if 3123 * none is set. 3124 * @throws SecurityException if {@code admin} is not a device or a profile owner. 3125 */ getCertInstallerPackage(@onNull ComponentName admin)3126 public String getCertInstallerPackage(@NonNull ComponentName admin) throws SecurityException { 3127 throwIfParentInstance("getCertInstallerPackage"); 3128 if (mService != null) { 3129 try { 3130 return mService.getCertInstallerPackage(admin); 3131 } catch (RemoteException e) { 3132 throw e.rethrowFromSystemServer(); 3133 } 3134 } 3135 return null; 3136 } 3137 3138 /** 3139 * Called by a device or profile owner to configure an always-on VPN connection through a 3140 * specific application for the current user. 3141 * 3142 * @deprecated this version only exists for compability with previous developer preview builds. 3143 * TODO: delete once there are no longer any live references. 3144 * @hide 3145 */ setAlwaysOnVpnPackage(@onNull ComponentName admin, @Nullable String vpnPackage)3146 public void setAlwaysOnVpnPackage(@NonNull ComponentName admin, @Nullable String vpnPackage) 3147 throws NameNotFoundException, UnsupportedOperationException { 3148 setAlwaysOnVpnPackage(admin, vpnPackage, /* lockdownEnabled */ true); 3149 } 3150 3151 /** 3152 * Called by a device or profile owner to configure an always-on VPN connection through a 3153 * specific application for the current user. This connection is automatically granted and 3154 * persisted after a reboot. 3155 * <p> 3156 * The designated package should declare a {@link android.net.VpnService} in its manifest 3157 * guarded by {@link android.Manifest.permission#BIND_VPN_SERVICE}, otherwise the call will 3158 * fail. 3159 * 3160 * @param vpnPackage The package name for an installed VPN app on the device, or {@code null} to 3161 * remove an existing always-on VPN configuration. 3162 * @param lockdownEnabled {@code true} to disallow networking when the VPN is not connected or 3163 * {@code false} otherwise. This carries the risk that any failure of the VPN provider 3164 * could break networking for all apps. This has no effect when clearing. 3165 * @throws SecurityException if {@code admin} is not a device or a profile owner. 3166 * @throws NameNotFoundException if {@code vpnPackage} is not installed. 3167 * @throws UnsupportedOperationException if {@code vpnPackage} exists but does not support being 3168 * set as always-on, or if always-on VPN is not available. 3169 */ setAlwaysOnVpnPackage(@onNull ComponentName admin, @Nullable String vpnPackage, boolean lockdownEnabled)3170 public void setAlwaysOnVpnPackage(@NonNull ComponentName admin, @Nullable String vpnPackage, 3171 boolean lockdownEnabled) 3172 throws NameNotFoundException, UnsupportedOperationException { 3173 throwIfParentInstance("setAlwaysOnVpnPackage"); 3174 if (mService != null) { 3175 try { 3176 if (!mService.setAlwaysOnVpnPackage(admin, vpnPackage, lockdownEnabled)) { 3177 throw new NameNotFoundException(vpnPackage); 3178 } 3179 } catch (RemoteException e) { 3180 throw e.rethrowFromSystemServer(); 3181 } 3182 } 3183 } 3184 3185 /** 3186 * Called by a device or profile owner to read the name of the package administering an 3187 * always-on VPN connection for the current user. If there is no such package, or the always-on 3188 * VPN is provided by the system instead of by an application, {@code null} will be returned. 3189 * 3190 * @return Package name of VPN controller responsible for always-on VPN, or {@code null} if none 3191 * is set. 3192 * @throws SecurityException if {@code admin} is not a device or a profile owner. 3193 */ getAlwaysOnVpnPackage(@onNull ComponentName admin)3194 public String getAlwaysOnVpnPackage(@NonNull ComponentName admin) { 3195 throwIfParentInstance("getAlwaysOnVpnPackage"); 3196 if (mService != null) { 3197 try { 3198 return mService.getAlwaysOnVpnPackage(admin); 3199 } catch (RemoteException e) { 3200 throw e.rethrowFromSystemServer(); 3201 } 3202 } 3203 return null; 3204 } 3205 3206 /** 3207 * Called by an application that is administering the device to disable all cameras on the 3208 * device, for this user. After setting this, no applications running as this user will be able 3209 * to access any cameras on the device. 3210 * <p> 3211 * If the caller is device owner, then the restriction will be applied to all users. 3212 * <p> 3213 * The calling device admin must have requested 3214 * {@link DeviceAdminInfo#USES_POLICY_DISABLE_CAMERA} to be able to call this method; if it has 3215 * not, a security exception will be thrown. 3216 * 3217 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 3218 * @param disabled Whether or not the camera should be disabled. 3219 * @throws SecurityException if {@code admin} is not an active administrator or does not use 3220 * {@link DeviceAdminInfo#USES_POLICY_DISABLE_CAMERA}. 3221 */ setCameraDisabled(@onNull ComponentName admin, boolean disabled)3222 public void setCameraDisabled(@NonNull ComponentName admin, boolean disabled) { 3223 throwIfParentInstance("setCameraDisabled"); 3224 if (mService != null) { 3225 try { 3226 mService.setCameraDisabled(admin, disabled); 3227 } catch (RemoteException e) { 3228 throw e.rethrowFromSystemServer(); 3229 } 3230 } 3231 } 3232 3233 /** 3234 * Determine whether or not the device's cameras have been disabled for this user, 3235 * either by the calling admin, if specified, or all admins. 3236 * @param admin The name of the admin component to check, or {@code null} to check whether any admins 3237 * have disabled the camera 3238 */ getCameraDisabled(@ullable ComponentName admin)3239 public boolean getCameraDisabled(@Nullable ComponentName admin) { 3240 throwIfParentInstance("getCameraDisabled"); 3241 return getCameraDisabled(admin, myUserId()); 3242 } 3243 3244 /** @hide per-user version */ getCameraDisabled(@ullable ComponentName admin, int userHandle)3245 public boolean getCameraDisabled(@Nullable ComponentName admin, int userHandle) { 3246 if (mService != null) { 3247 try { 3248 return mService.getCameraDisabled(admin, userHandle); 3249 } catch (RemoteException e) { 3250 throw e.rethrowFromSystemServer(); 3251 } 3252 } 3253 return false; 3254 } 3255 3256 /** 3257 * Called by a device owner to request a bugreport. 3258 * <p> 3259 * There must be only one user on the device, managed by the device owner. Otherwise a 3260 * {@link SecurityException} will be thrown. 3261 * 3262 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 3263 * @return {@code true} if the bugreport collection started successfully, or {@code false} if it 3264 * wasn't triggered because a previous bugreport operation is still active (either the 3265 * bugreport is still running or waiting for the user to share or decline) 3266 * @throws SecurityException if {@code admin} is not a device owner, or if there are users other 3267 * than the one managed by the device owner. 3268 */ requestBugreport(@onNull ComponentName admin)3269 public boolean requestBugreport(@NonNull ComponentName admin) { 3270 throwIfParentInstance("requestBugreport"); 3271 if (mService != null) { 3272 try { 3273 return mService.requestBugreport(admin); 3274 } catch (RemoteException e) { 3275 throw e.rethrowFromSystemServer(); 3276 } 3277 } 3278 return false; 3279 } 3280 3281 /** 3282 * Determine whether or not creating a guest user has been disabled for the device 3283 * 3284 * @hide 3285 */ getGuestUserDisabled(@ullable ComponentName admin)3286 public boolean getGuestUserDisabled(@Nullable ComponentName admin) { 3287 // Currently guest users can always be created if multi-user is enabled 3288 // TODO introduce a policy for guest user creation 3289 return false; 3290 } 3291 3292 /** 3293 * Called by a device/profile owner to set whether the screen capture is disabled. Disabling 3294 * screen capture also prevents the content from being shown on display devices that do not have 3295 * a secure video output. See {@link android.view.Display#FLAG_SECURE} for more details about 3296 * secure surfaces and secure displays. 3297 * <p> 3298 * The calling device admin must be a device or profile owner. If it is not, a security 3299 * exception will be thrown. 3300 * <p> 3301 * From version {@link android.os.Build.VERSION_CODES#M} disabling screen capture also blocks 3302 * assist requests for all activities of the relevant user. 3303 * 3304 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 3305 * @param disabled Whether screen capture is disabled or not. 3306 * @throws SecurityException if {@code admin} is not a device or profile owner. 3307 */ setScreenCaptureDisabled(@onNull ComponentName admin, boolean disabled)3308 public void setScreenCaptureDisabled(@NonNull ComponentName admin, boolean disabled) { 3309 throwIfParentInstance("setScreenCaptureDisabled"); 3310 if (mService != null) { 3311 try { 3312 mService.setScreenCaptureDisabled(admin, disabled); 3313 } catch (RemoteException e) { 3314 throw e.rethrowFromSystemServer(); 3315 } 3316 } 3317 } 3318 3319 /** 3320 * Determine whether or not screen capture has been disabled by the calling 3321 * admin, if specified, or all admins. 3322 * @param admin The name of the admin component to check, or {@code null} to check whether any admins 3323 * have disabled screen capture. 3324 */ getScreenCaptureDisabled(@ullable ComponentName admin)3325 public boolean getScreenCaptureDisabled(@Nullable ComponentName admin) { 3326 throwIfParentInstance("getScreenCaptureDisabled"); 3327 return getScreenCaptureDisabled(admin, myUserId()); 3328 } 3329 3330 /** @hide per-user version */ getScreenCaptureDisabled(@ullable ComponentName admin, int userHandle)3331 public boolean getScreenCaptureDisabled(@Nullable ComponentName admin, int userHandle) { 3332 if (mService != null) { 3333 try { 3334 return mService.getScreenCaptureDisabled(admin, userHandle); 3335 } catch (RemoteException e) { 3336 throw e.rethrowFromSystemServer(); 3337 } 3338 } 3339 return false; 3340 } 3341 3342 /** 3343 * Called by a device owner to set whether auto time is required. If auto time is required the 3344 * user cannot set the date and time, but has to use network date and time. 3345 * <p> 3346 * Note: if auto time is required the user can still manually set the time zone. 3347 * <p> 3348 * The calling device admin must be a device owner. If it is not, a security exception will be 3349 * thrown. 3350 * 3351 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 3352 * @param required Whether auto time is set required or not. 3353 * @throws SecurityException if {@code admin} is not a device owner. 3354 */ setAutoTimeRequired(@onNull ComponentName admin, boolean required)3355 public void setAutoTimeRequired(@NonNull ComponentName admin, boolean required) { 3356 throwIfParentInstance("setAutoTimeRequired"); 3357 if (mService != null) { 3358 try { 3359 mService.setAutoTimeRequired(admin, required); 3360 } catch (RemoteException e) { 3361 throw e.rethrowFromSystemServer(); 3362 } 3363 } 3364 } 3365 3366 /** 3367 * @return true if auto time is required. 3368 */ getAutoTimeRequired()3369 public boolean getAutoTimeRequired() { 3370 throwIfParentInstance("getAutoTimeRequired"); 3371 if (mService != null) { 3372 try { 3373 return mService.getAutoTimeRequired(); 3374 } catch (RemoteException e) { 3375 throw e.rethrowFromSystemServer(); 3376 } 3377 } 3378 return false; 3379 } 3380 3381 /** 3382 * Called by a device owner to set whether all users created on the device should be ephemeral. 3383 * <p> 3384 * The system user is exempt from this policy - it is never ephemeral. 3385 * <p> 3386 * The calling device admin must be the device owner. If it is not, a security exception will be 3387 * thrown. 3388 * 3389 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 3390 * @param forceEphemeralUsers If true, all the existing users will be deleted and all 3391 * subsequently created users will be ephemeral. 3392 * @throws SecurityException if {@code admin} is not a device owner. 3393 * @hide 3394 */ setForceEphemeralUsers( @onNull ComponentName admin, boolean forceEphemeralUsers)3395 public void setForceEphemeralUsers( 3396 @NonNull ComponentName admin, boolean forceEphemeralUsers) { 3397 throwIfParentInstance("setForceEphemeralUsers"); 3398 if (mService != null) { 3399 try { 3400 mService.setForceEphemeralUsers(admin, forceEphemeralUsers); 3401 } catch (RemoteException e) { 3402 throw e.rethrowFromSystemServer(); 3403 } 3404 } 3405 } 3406 3407 /** 3408 * @return true if all users are created ephemeral. 3409 * @throws SecurityException if {@code admin} is not a device owner. 3410 * @hide 3411 */ getForceEphemeralUsers(@onNull ComponentName admin)3412 public boolean getForceEphemeralUsers(@NonNull ComponentName admin) { 3413 throwIfParentInstance("getForceEphemeralUsers"); 3414 if (mService != null) { 3415 try { 3416 return mService.getForceEphemeralUsers(admin); 3417 } catch (RemoteException e) { 3418 throw e.rethrowFromSystemServer(); 3419 } 3420 } 3421 return false; 3422 } 3423 3424 /** 3425 * Called by an application that is administering the device to disable keyguard customizations, 3426 * such as widgets. After setting this, keyguard features will be disabled according to the 3427 * provided feature list. 3428 * <p> 3429 * The calling device admin must have requested 3430 * {@link DeviceAdminInfo#USES_POLICY_DISABLE_KEYGUARD_FEATURES} to be able to call this method; 3431 * if it has not, a security exception will be thrown. 3432 * <p> 3433 * Calling this from a managed profile before version {@link android.os.Build.VERSION_CODES#M} 3434 * will throw a security exception. From version {@link android.os.Build.VERSION_CODES#M} the 3435 * profile owner of a managed profile can set: 3436 * <ul> 3437 * <li>{@link #KEYGUARD_DISABLE_TRUST_AGENTS}, which affects the parent user, but only if there 3438 * is no separate challenge set on the managed profile. 3439 * <li>{@link #KEYGUARD_DISABLE_FINGERPRINT} which affects the managed profile challenge if 3440 * there is one, or the parent user otherwise. 3441 * <li>{@link #KEYGUARD_DISABLE_UNREDACTED_NOTIFICATIONS} which affects notifications generated 3442 * by applications in the managed profile. 3443 * </ul> 3444 * {@link #KEYGUARD_DISABLE_TRUST_AGENTS} and {@link #KEYGUARD_DISABLE_FINGERPRINT} can also be 3445 * set on the {@link DevicePolicyManager} instance returned by 3446 * {@link #getParentProfileInstance(ComponentName)} in order to set restrictions on the parent 3447 * profile. 3448 * <p> 3449 * Requests to disable other features on a managed profile will be ignored. 3450 * <p> 3451 * The admin can check which features have been disabled by calling 3452 * {@link #getKeyguardDisabledFeatures(ComponentName)} 3453 * 3454 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 3455 * @param which {@link #KEYGUARD_DISABLE_FEATURES_NONE} (default), 3456 * {@link #KEYGUARD_DISABLE_WIDGETS_ALL}, {@link #KEYGUARD_DISABLE_SECURE_CAMERA}, 3457 * {@link #KEYGUARD_DISABLE_SECURE_NOTIFICATIONS}, 3458 * {@link #KEYGUARD_DISABLE_TRUST_AGENTS}, 3459 * {@link #KEYGUARD_DISABLE_UNREDACTED_NOTIFICATIONS}, 3460 * {@link #KEYGUARD_DISABLE_FINGERPRINT}, {@link #KEYGUARD_DISABLE_FEATURES_ALL} 3461 * @throws SecurityException if {@code admin} is not an active administrator or does not user 3462 * {@link DeviceAdminInfo#USES_POLICY_DISABLE_KEYGUARD_FEATURES} 3463 */ setKeyguardDisabledFeatures(@onNull ComponentName admin, int which)3464 public void setKeyguardDisabledFeatures(@NonNull ComponentName admin, int which) { 3465 if (mService != null) { 3466 try { 3467 mService.setKeyguardDisabledFeatures(admin, which, mParentInstance); 3468 } catch (RemoteException e) { 3469 throw e.rethrowFromSystemServer(); 3470 } 3471 } 3472 } 3473 3474 /** 3475 * Determine whether or not features have been disabled in keyguard either by the calling 3476 * admin, if specified, or all admins that set restrictions on this user and its participating 3477 * profiles. Restrictions on profiles that have a separate challenge are not taken into account. 3478 * 3479 * <p>This method can be called on the {@link DevicePolicyManager} instance 3480 * returned by {@link #getParentProfileInstance(ComponentName)} in order to retrieve 3481 * restrictions on the parent profile. 3482 * 3483 * @param admin The name of the admin component to check, or {@code null} to check whether any 3484 * admins have disabled features in keyguard. 3485 * @return bitfield of flags. See {@link #setKeyguardDisabledFeatures(ComponentName, int)} 3486 * for a list. 3487 */ getKeyguardDisabledFeatures(@ullable ComponentName admin)3488 public int getKeyguardDisabledFeatures(@Nullable ComponentName admin) { 3489 return getKeyguardDisabledFeatures(admin, myUserId()); 3490 } 3491 3492 /** @hide per-user version */ getKeyguardDisabledFeatures(@ullable ComponentName admin, int userHandle)3493 public int getKeyguardDisabledFeatures(@Nullable ComponentName admin, int userHandle) { 3494 if (mService != null) { 3495 try { 3496 return mService.getKeyguardDisabledFeatures(admin, userHandle, mParentInstance); 3497 } catch (RemoteException e) { 3498 throw e.rethrowFromSystemServer(); 3499 } 3500 } 3501 return KEYGUARD_DISABLE_FEATURES_NONE; 3502 } 3503 3504 /** 3505 * @hide 3506 */ setActiveAdmin(@onNull ComponentName policyReceiver, boolean refreshing, int userHandle)3507 public void setActiveAdmin(@NonNull ComponentName policyReceiver, boolean refreshing, 3508 int userHandle) { 3509 if (mService != null) { 3510 try { 3511 mService.setActiveAdmin(policyReceiver, refreshing, userHandle); 3512 } catch (RemoteException e) { 3513 throw e.rethrowFromSystemServer(); 3514 } 3515 } 3516 } 3517 3518 /** 3519 * @hide 3520 */ setActiveAdmin(@onNull ComponentName policyReceiver, boolean refreshing)3521 public void setActiveAdmin(@NonNull ComponentName policyReceiver, boolean refreshing) { 3522 setActiveAdmin(policyReceiver, refreshing, myUserId()); 3523 } 3524 3525 /** 3526 * @hide 3527 */ getRemoveWarning(@ullable ComponentName admin, RemoteCallback result)3528 public void getRemoveWarning(@Nullable ComponentName admin, RemoteCallback result) { 3529 if (mService != null) { 3530 try { 3531 mService.getRemoveWarning(admin, result, myUserId()); 3532 } catch (RemoteException e) { 3533 throw e.rethrowFromSystemServer(); 3534 } 3535 } 3536 } 3537 3538 /** 3539 * @hide 3540 */ setActivePasswordState(int quality, int length, int letters, int uppercase, int lowercase, int numbers, int symbols, int nonletter, int userHandle)3541 public void setActivePasswordState(int quality, int length, int letters, int uppercase, 3542 int lowercase, int numbers, int symbols, int nonletter, int userHandle) { 3543 if (mService != null) { 3544 try { 3545 mService.setActivePasswordState(quality, length, letters, uppercase, lowercase, 3546 numbers, symbols, nonletter, userHandle); 3547 } catch (RemoteException e) { 3548 throw e.rethrowFromSystemServer(); 3549 } 3550 } 3551 } 3552 3553 /** 3554 * @hide 3555 */ reportPasswordChanged(int userId)3556 public void reportPasswordChanged(int userId) { 3557 if (mService != null) { 3558 try { 3559 mService.reportPasswordChanged(userId); 3560 } catch (RemoteException e) { 3561 throw e.rethrowFromSystemServer(); 3562 } 3563 } 3564 } 3565 3566 /** 3567 * @hide 3568 */ reportFailedPasswordAttempt(int userHandle)3569 public void reportFailedPasswordAttempt(int userHandle) { 3570 if (mService != null) { 3571 try { 3572 mService.reportFailedPasswordAttempt(userHandle); 3573 } catch (RemoteException e) { 3574 throw e.rethrowFromSystemServer(); 3575 } 3576 } 3577 } 3578 3579 /** 3580 * @hide 3581 */ reportSuccessfulPasswordAttempt(int userHandle)3582 public void reportSuccessfulPasswordAttempt(int userHandle) { 3583 if (mService != null) { 3584 try { 3585 mService.reportSuccessfulPasswordAttempt(userHandle); 3586 } catch (RemoteException e) { 3587 throw e.rethrowFromSystemServer(); 3588 } 3589 } 3590 } 3591 3592 /** 3593 * @hide 3594 */ reportFailedFingerprintAttempt(int userHandle)3595 public void reportFailedFingerprintAttempt(int userHandle) { 3596 if (mService != null) { 3597 try { 3598 mService.reportFailedFingerprintAttempt(userHandle); 3599 } catch (RemoteException e) { 3600 throw e.rethrowFromSystemServer(); 3601 } 3602 } 3603 } 3604 3605 /** 3606 * @hide 3607 */ reportSuccessfulFingerprintAttempt(int userHandle)3608 public void reportSuccessfulFingerprintAttempt(int userHandle) { 3609 if (mService != null) { 3610 try { 3611 mService.reportSuccessfulFingerprintAttempt(userHandle); 3612 } catch (RemoteException e) { 3613 throw e.rethrowFromSystemServer(); 3614 } 3615 } 3616 } 3617 3618 /** 3619 * Should be called when keyguard has been dismissed. 3620 * @hide 3621 */ reportKeyguardDismissed(int userHandle)3622 public void reportKeyguardDismissed(int userHandle) { 3623 if (mService != null) { 3624 try { 3625 mService.reportKeyguardDismissed(userHandle); 3626 } catch (RemoteException e) { 3627 throw e.rethrowFromSystemServer(); 3628 } 3629 } 3630 } 3631 3632 /** 3633 * Should be called when keyguard view has been shown to the user. 3634 * @hide 3635 */ reportKeyguardSecured(int userHandle)3636 public void reportKeyguardSecured(int userHandle) { 3637 if (mService != null) { 3638 try { 3639 mService.reportKeyguardSecured(userHandle); 3640 } catch (RemoteException e) { 3641 throw e.rethrowFromSystemServer(); 3642 } 3643 } 3644 } 3645 3646 /** 3647 * @hide 3648 * Sets the given package as the device owner. 3649 * Same as {@link #setDeviceOwner(ComponentName, String)} but without setting a device owner name. 3650 * @param who the component name to be registered as device owner. 3651 * @return whether the package was successfully registered as the device owner. 3652 * @throws IllegalArgumentException if the package name is null or invalid 3653 * @throws IllegalStateException If the preconditions mentioned are not met. 3654 */ setDeviceOwner(ComponentName who)3655 public boolean setDeviceOwner(ComponentName who) { 3656 return setDeviceOwner(who, null); 3657 } 3658 3659 /** 3660 * @hide 3661 */ setDeviceOwner(ComponentName who, int userId)3662 public boolean setDeviceOwner(ComponentName who, int userId) { 3663 return setDeviceOwner(who, null, userId); 3664 } 3665 3666 /** 3667 * @hide 3668 */ setDeviceOwner(ComponentName who, String ownerName)3669 public boolean setDeviceOwner(ComponentName who, String ownerName) { 3670 return setDeviceOwner(who, ownerName, UserHandle.USER_SYSTEM); 3671 } 3672 3673 /** 3674 * @hide 3675 * Sets the given package as the device owner. The package must already be installed. There 3676 * must not already be a device owner. 3677 * Only apps with the MANAGE_PROFILE_AND_DEVICE_OWNERS permission and the shell uid can call 3678 * this method. 3679 * Calling this after the setup phase of the primary user has completed is allowed only if 3680 * the caller is the shell uid, and there are no additional users and no accounts. 3681 * @param who the component name to be registered as device owner. 3682 * @param ownerName the human readable name of the institution that owns this device. 3683 * @param userId ID of the user on which the device owner runs. 3684 * @return whether the package was successfully registered as the device owner. 3685 * @throws IllegalArgumentException if the package name is null or invalid 3686 * @throws IllegalStateException If the preconditions mentioned are not met. 3687 */ setDeviceOwner(ComponentName who, String ownerName, int userId)3688 public boolean setDeviceOwner(ComponentName who, String ownerName, int userId) 3689 throws IllegalArgumentException, IllegalStateException { 3690 if (mService != null) { 3691 try { 3692 return mService.setDeviceOwner(who, ownerName, userId); 3693 } catch (RemoteException re) { 3694 throw re.rethrowFromSystemServer(); 3695 } 3696 } 3697 return false; 3698 } 3699 3700 /** 3701 * Used to determine if a particular package has been registered as a Device Owner app. 3702 * A device owner app is a special device admin that cannot be deactivated by the user, once 3703 * activated as a device admin. It also cannot be uninstalled. To check whether a particular 3704 * package is currently registered as the device owner app, pass in the package name from 3705 * {@link Context#getPackageName()} to this method.<p/>This is useful for device 3706 * admin apps that want to check whether they are also registered as the device owner app. The 3707 * exact mechanism by which a device admin app is registered as a device owner app is defined by 3708 * the setup process. 3709 * @param packageName the package name of the app, to compare with the registered device owner 3710 * app, if any. 3711 * @return whether or not the package is registered as the device owner app. 3712 */ isDeviceOwnerApp(String packageName)3713 public boolean isDeviceOwnerApp(String packageName) { 3714 throwIfParentInstance("isDeviceOwnerApp"); 3715 return isDeviceOwnerAppOnCallingUser(packageName); 3716 } 3717 3718 /** 3719 * @return true if a package is registered as device owner, only when it's running on the 3720 * calling user. 3721 * 3722 * <p>Same as {@link #isDeviceOwnerApp}, but bundled code should use it for clarity. 3723 * @hide 3724 */ isDeviceOwnerAppOnCallingUser(String packageName)3725 public boolean isDeviceOwnerAppOnCallingUser(String packageName) { 3726 return isDeviceOwnerAppOnAnyUserInner(packageName, /* callingUserOnly =*/ true); 3727 } 3728 3729 /** 3730 * @return true if a package is registered as device owner, even if it's running on a different 3731 * user. 3732 * 3733 * <p>Requires the MANAGE_USERS permission. 3734 * 3735 * @hide 3736 */ isDeviceOwnerAppOnAnyUser(String packageName)3737 public boolean isDeviceOwnerAppOnAnyUser(String packageName) { 3738 return isDeviceOwnerAppOnAnyUserInner(packageName, /* callingUserOnly =*/ false); 3739 } 3740 3741 /** 3742 * @return device owner component name, only when it's running on the calling user. 3743 * 3744 * @hide 3745 */ getDeviceOwnerComponentOnCallingUser()3746 public ComponentName getDeviceOwnerComponentOnCallingUser() { 3747 return getDeviceOwnerComponentInner(/* callingUserOnly =*/ true); 3748 } 3749 3750 /** 3751 * @return device owner component name, even if it's running on a different user. 3752 * 3753 * <p>Requires the MANAGE_USERS permission. 3754 * 3755 * @hide 3756 */ getDeviceOwnerComponentOnAnyUser()3757 public ComponentName getDeviceOwnerComponentOnAnyUser() { 3758 return getDeviceOwnerComponentInner(/* callingUserOnly =*/ false); 3759 } 3760 isDeviceOwnerAppOnAnyUserInner(String packageName, boolean callingUserOnly)3761 private boolean isDeviceOwnerAppOnAnyUserInner(String packageName, boolean callingUserOnly) { 3762 if (packageName == null) { 3763 return false; 3764 } 3765 final ComponentName deviceOwner = getDeviceOwnerComponentInner(callingUserOnly); 3766 if (deviceOwner == null) { 3767 return false; 3768 } 3769 return packageName.equals(deviceOwner.getPackageName()); 3770 } 3771 getDeviceOwnerComponentInner(boolean callingUserOnly)3772 private ComponentName getDeviceOwnerComponentInner(boolean callingUserOnly) { 3773 if (mService != null) { 3774 try { 3775 return mService.getDeviceOwnerComponent(callingUserOnly); 3776 } catch (RemoteException re) { 3777 throw re.rethrowFromSystemServer(); 3778 } 3779 } 3780 return null; 3781 } 3782 3783 /** 3784 * @return ID of the user who runs device owner, or {@link UserHandle#USER_NULL} if there's 3785 * no device owner. 3786 * 3787 * <p>Requires the MANAGE_USERS permission. 3788 * 3789 * @hide 3790 */ getDeviceOwnerUserId()3791 public int getDeviceOwnerUserId() { 3792 if (mService != null) { 3793 try { 3794 return mService.getDeviceOwnerUserId(); 3795 } catch (RemoteException re) { 3796 throw re.rethrowFromSystemServer(); 3797 } 3798 } 3799 return UserHandle.USER_NULL; 3800 } 3801 3802 /** 3803 * Clears the current device owner. The caller must be the device owner. This function should be 3804 * used cautiously as once it is called it cannot be undone. The device owner can only be set as 3805 * a part of device setup before setup completes. 3806 * 3807 * @param packageName The package name of the device owner. 3808 * @throws SecurityException if the caller is not in {@code packageName} or {@code packageName} 3809 * does not own the current device owner component. 3810 */ clearDeviceOwnerApp(String packageName)3811 public void clearDeviceOwnerApp(String packageName) { 3812 throwIfParentInstance("clearDeviceOwnerApp"); 3813 if (mService != null) { 3814 try { 3815 mService.clearDeviceOwner(packageName); 3816 } catch (RemoteException re) { 3817 throw re.rethrowFromSystemServer(); 3818 } 3819 } 3820 } 3821 3822 /** 3823 * Returns the device owner package name, only if it's running on the calling user. 3824 * 3825 * <p>Bundled components should use {@code getDeviceOwnerComponentOnCallingUser()} for clarity. 3826 * 3827 * @hide 3828 */ 3829 @SystemApi getDeviceOwner()3830 public String getDeviceOwner() { 3831 throwIfParentInstance("getDeviceOwner"); 3832 final ComponentName name = getDeviceOwnerComponentOnCallingUser(); 3833 return name != null ? name.getPackageName() : null; 3834 } 3835 3836 /** 3837 * @return true if the device is managed by any device owner. 3838 * 3839 * <p>Requires the MANAGE_USERS permission. 3840 * 3841 * @hide 3842 */ isDeviceManaged()3843 public boolean isDeviceManaged() { 3844 return getDeviceOwnerComponentOnAnyUser() != null; 3845 } 3846 3847 /** 3848 * Returns the device owner name. Note this method *will* return the device owner 3849 * name when it's running on a different user. 3850 * 3851 * <p>Requires the MANAGE_USERS permission. 3852 * 3853 * @hide 3854 */ 3855 @SystemApi getDeviceOwnerNameOnAnyUser()3856 public String getDeviceOwnerNameOnAnyUser() { 3857 throwIfParentInstance("getDeviceOwnerNameOnAnyUser"); 3858 if (mService != null) { 3859 try { 3860 return mService.getDeviceOwnerName(); 3861 } catch (RemoteException re) { 3862 throw re.rethrowFromSystemServer(); 3863 } 3864 } 3865 return null; 3866 } 3867 3868 /** 3869 * @hide 3870 * @deprecated Do not use 3871 * @removed 3872 */ 3873 @Deprecated 3874 @SystemApi getDeviceInitializerApp()3875 public String getDeviceInitializerApp() { 3876 return null; 3877 } 3878 3879 /** 3880 * @hide 3881 * @deprecated Do not use 3882 * @removed 3883 */ 3884 @Deprecated 3885 @SystemApi getDeviceInitializerComponent()3886 public ComponentName getDeviceInitializerComponent() { 3887 return null; 3888 } 3889 3890 /** 3891 * @hide 3892 * @deprecated Use #ACTION_SET_PROFILE_OWNER 3893 * Sets the given component as an active admin and registers the package as the profile 3894 * owner for this user. The package must already be installed and there shouldn't be 3895 * an existing profile owner registered for this user. Also, this method must be called 3896 * before the user setup has been completed. 3897 * <p> 3898 * This method can only be called by system apps that hold MANAGE_USERS permission and 3899 * MANAGE_DEVICE_ADMINS permission. 3900 * @param admin The component to register as an active admin and profile owner. 3901 * @param ownerName The user-visible name of the entity that is managing this user. 3902 * @return whether the admin was successfully registered as the profile owner. 3903 * @throws IllegalArgumentException if packageName is null, the package isn't installed, or 3904 * the user has already been set up. 3905 */ 3906 @SystemApi setActiveProfileOwner(@onNull ComponentName admin, @Deprecated String ownerName)3907 public boolean setActiveProfileOwner(@NonNull ComponentName admin, @Deprecated String ownerName) 3908 throws IllegalArgumentException { 3909 throwIfParentInstance("setActiveProfileOwner"); 3910 if (mService != null) { 3911 try { 3912 final int myUserId = myUserId(); 3913 mService.setActiveAdmin(admin, false, myUserId); 3914 return mService.setProfileOwner(admin, ownerName, myUserId); 3915 } catch (RemoteException re) { 3916 throw re.rethrowFromSystemServer(); 3917 } 3918 } 3919 return false; 3920 } 3921 3922 /** 3923 * Clears the active profile owner and removes all user restrictions. The caller must be from 3924 * the same package as the active profile owner for this user, otherwise a SecurityException 3925 * will be thrown. 3926 * <p> 3927 * This doesn't work for managed profile owners. 3928 * 3929 * @param admin The component to remove as the profile owner. 3930 * @throws SecurityException if {@code admin} is not an active profile owner. 3931 */ clearProfileOwner(@onNull ComponentName admin)3932 public void clearProfileOwner(@NonNull ComponentName admin) { 3933 throwIfParentInstance("clearProfileOwner"); 3934 if (mService != null) { 3935 try { 3936 mService.clearProfileOwner(admin); 3937 } catch (RemoteException re) { 3938 throw re.rethrowFromSystemServer(); 3939 } 3940 } 3941 } 3942 3943 /** 3944 * @hide 3945 * Checks whether the user was already setup. 3946 */ hasUserSetupCompleted()3947 public boolean hasUserSetupCompleted() { 3948 if (mService != null) { 3949 try { 3950 return mService.hasUserSetupCompleted(); 3951 } catch (RemoteException re) { 3952 throw re.rethrowFromSystemServer(); 3953 } 3954 } 3955 return true; 3956 } 3957 3958 /** 3959 * @hide 3960 * Sets the given component as the profile owner of the given user profile. The package must 3961 * already be installed. There must not already be a profile owner for this user. 3962 * Only apps with the MANAGE_PROFILE_AND_DEVICE_OWNERS permission and the shell uid can call 3963 * this method. 3964 * Calling this after the setup phase of the specified user has completed is allowed only if: 3965 * - the caller is SYSTEM_UID. 3966 * - or the caller is the shell uid, and there are no accounts on the specified user. 3967 * @param admin the component name to be registered as profile owner. 3968 * @param ownerName the human readable name of the organisation associated with this DPM. 3969 * @param userHandle the userId to set the profile owner for. 3970 * @return whether the component was successfully registered as the profile owner. 3971 * @throws IllegalArgumentException if admin is null, the package isn't installed, or the 3972 * preconditions mentioned are not met. 3973 */ setProfileOwner(@onNull ComponentName admin, @Deprecated String ownerName, int userHandle)3974 public boolean setProfileOwner(@NonNull ComponentName admin, @Deprecated String ownerName, 3975 int userHandle) throws IllegalArgumentException { 3976 if (mService != null) { 3977 try { 3978 if (ownerName == null) { 3979 ownerName = ""; 3980 } 3981 return mService.setProfileOwner(admin, ownerName, userHandle); 3982 } catch (RemoteException re) { 3983 throw re.rethrowFromSystemServer(); 3984 } 3985 } 3986 return false; 3987 } 3988 3989 /** 3990 * Sets the device owner information to be shown on the lock screen. 3991 * <p> 3992 * If the device owner information is {@code null} or empty then the device owner info is 3993 * cleared and the user owner info is shown on the lock screen if it is set. 3994 * <p> 3995 * If the device owner information contains only whitespaces then the message on the lock screen 3996 * will be blank and the user will not be allowed to change it. 3997 * <p> 3998 * If the device owner information needs to be localized, it is the responsibility of the 3999 * {@link DeviceAdminReceiver} to listen to the {@link Intent#ACTION_LOCALE_CHANGED} broadcast 4000 * and set a new version of this string accordingly. 4001 * 4002 * @param admin The name of the admin component to check. 4003 * @param info Device owner information which will be displayed instead of the user owner info. 4004 * @throws SecurityException if {@code admin} is not a device owner. 4005 */ setDeviceOwnerLockScreenInfo(@onNull ComponentName admin, CharSequence info)4006 public void setDeviceOwnerLockScreenInfo(@NonNull ComponentName admin, CharSequence info) { 4007 throwIfParentInstance("setDeviceOwnerLockScreenInfo"); 4008 if (mService != null) { 4009 try { 4010 mService.setDeviceOwnerLockScreenInfo(admin, info); 4011 } catch (RemoteException re) { 4012 throw re.rethrowFromSystemServer(); 4013 } 4014 } 4015 } 4016 4017 /** 4018 * @return The device owner information. If it is not set returns {@code null}. 4019 */ getDeviceOwnerLockScreenInfo()4020 public CharSequence getDeviceOwnerLockScreenInfo() { 4021 throwIfParentInstance("getDeviceOwnerLockScreenInfo"); 4022 if (mService != null) { 4023 try { 4024 return mService.getDeviceOwnerLockScreenInfo(); 4025 } catch (RemoteException re) { 4026 throw re.rethrowFromSystemServer(); 4027 } 4028 } 4029 return null; 4030 } 4031 4032 /** 4033 * Called by device or profile owners to suspend packages for this user. 4034 * <p> 4035 * A suspended package will not be able to start activities. Its notifications will be hidden, 4036 * it will not show up in recents, will not be able to show toasts or dialogs or ring the 4037 * device. 4038 * <p> 4039 * The package must already be installed. If the package is uninstalled while suspended the 4040 * package will no longer be suspended. The admin can block this by using 4041 * {@link #setUninstallBlocked}. 4042 * 4043 * @param admin The name of the admin component to check. 4044 * @param packageNames The package names to suspend or unsuspend. 4045 * @param suspended If set to {@code true} than the packages will be suspended, if set to 4046 * {@code false} the packages will be unsuspended. 4047 * @return an array of package names for which the suspended status is not set as requested in 4048 * this method. 4049 * @throws SecurityException if {@code admin} is not a device or profile owner. 4050 */ setPackagesSuspended(@onNull ComponentName admin, String[] packageNames, boolean suspended)4051 public String[] setPackagesSuspended(@NonNull ComponentName admin, String[] packageNames, 4052 boolean suspended) { 4053 throwIfParentInstance("setPackagesSuspended"); 4054 if (mService != null) { 4055 try { 4056 return mService.setPackagesSuspended(admin, packageNames, suspended); 4057 } catch (RemoteException re) { 4058 throw re.rethrowFromSystemServer(); 4059 } 4060 } 4061 return packageNames; 4062 } 4063 4064 /** 4065 * Called by device or profile owners to determine if a package is suspended. 4066 * 4067 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4068 * @param packageName The name of the package to retrieve the suspended status of. 4069 * @return {@code true} if the package is suspended or {@code false} if the package is not 4070 * suspended, could not be found or an error occurred. 4071 * @throws SecurityException if {@code admin} is not a device or profile owner. 4072 * @throws NameNotFoundException if the package could not be found. 4073 */ isPackageSuspended(@onNull ComponentName admin, String packageName)4074 public boolean isPackageSuspended(@NonNull ComponentName admin, String packageName) 4075 throws NameNotFoundException { 4076 throwIfParentInstance("isPackageSuspended"); 4077 if (mService != null) { 4078 try { 4079 return mService.isPackageSuspended(admin, packageName); 4080 } catch (RemoteException e) { 4081 throw e.rethrowFromSystemServer(); 4082 } catch (IllegalArgumentException ex) { 4083 throw new NameNotFoundException(packageName); 4084 } 4085 } 4086 return false; 4087 } 4088 4089 /** 4090 * Sets the enabled state of the profile. A profile should be enabled only once it is ready to 4091 * be used. Only the profile owner can call this. 4092 * 4093 * @see #isProfileOwnerApp 4094 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4095 * @throws SecurityException if {@code admin} is not a profile owner. 4096 */ setProfileEnabled(@onNull ComponentName admin)4097 public void setProfileEnabled(@NonNull ComponentName admin) { 4098 throwIfParentInstance("setProfileEnabled"); 4099 if (mService != null) { 4100 try { 4101 mService.setProfileEnabled(admin); 4102 } catch (RemoteException e) { 4103 throw e.rethrowFromSystemServer(); 4104 } 4105 } 4106 } 4107 4108 /** 4109 * Sets the name of the profile. In the device owner case it sets the name of the user which it 4110 * is called from. Only a profile owner or device owner can call this. If this is never called 4111 * by the profile or device owner, the name will be set to default values. 4112 * 4113 * @see #isProfileOwnerApp 4114 * @see #isDeviceOwnerApp 4115 * @param admin Which {@link DeviceAdminReceiver} this request is associate with. 4116 * @param profileName The name of the profile. 4117 * @throws SecurityException if {@code admin} is not a device or profile owner. 4118 */ setProfileName(@onNull ComponentName admin, String profileName)4119 public void setProfileName(@NonNull ComponentName admin, String profileName) { 4120 throwIfParentInstance("setProfileName"); 4121 if (mService != null) { 4122 try { 4123 mService.setProfileName(admin, profileName); 4124 } catch (RemoteException e) { 4125 throw e.rethrowFromSystemServer(); 4126 } 4127 } 4128 } 4129 4130 /** 4131 * Used to determine if a particular package is registered as the profile owner for the 4132 * user. A profile owner is a special device admin that has additional privileges 4133 * within the profile. 4134 * 4135 * @param packageName The package name of the app to compare with the registered profile owner. 4136 * @return Whether or not the package is registered as the profile owner. 4137 */ isProfileOwnerApp(String packageName)4138 public boolean isProfileOwnerApp(String packageName) { 4139 throwIfParentInstance("isProfileOwnerApp"); 4140 if (mService != null) { 4141 try { 4142 ComponentName profileOwner = mService.getProfileOwner(myUserId()); 4143 return profileOwner != null 4144 && profileOwner.getPackageName().equals(packageName); 4145 } catch (RemoteException re) { 4146 throw re.rethrowFromSystemServer(); 4147 } 4148 } 4149 return false; 4150 } 4151 4152 /** 4153 * @hide 4154 * @return the packageName of the owner of the given user profile or {@code null} if no profile 4155 * owner has been set for that user. 4156 * @throws IllegalArgumentException if the userId is invalid. 4157 */ 4158 @SystemApi getProfileOwner()4159 public ComponentName getProfileOwner() throws IllegalArgumentException { 4160 throwIfParentInstance("getProfileOwner"); 4161 return getProfileOwnerAsUser(Process.myUserHandle().getIdentifier()); 4162 } 4163 4164 /** 4165 * @see #getProfileOwner() 4166 * @hide 4167 */ getProfileOwnerAsUser(final int userId)4168 public ComponentName getProfileOwnerAsUser(final int userId) throws IllegalArgumentException { 4169 if (mService != null) { 4170 try { 4171 return mService.getProfileOwner(userId); 4172 } catch (RemoteException re) { 4173 throw re.rethrowFromSystemServer(); 4174 } 4175 } 4176 return null; 4177 } 4178 4179 /** 4180 * @hide 4181 * @return the human readable name of the organisation associated with this DPM or {@code null} 4182 * if one is not set. 4183 * @throws IllegalArgumentException if the userId is invalid. 4184 */ getProfileOwnerName()4185 public String getProfileOwnerName() throws IllegalArgumentException { 4186 if (mService != null) { 4187 try { 4188 return mService.getProfileOwnerName(Process.myUserHandle().getIdentifier()); 4189 } catch (RemoteException re) { 4190 throw re.rethrowFromSystemServer(); 4191 } 4192 } 4193 return null; 4194 } 4195 4196 /** 4197 * @hide 4198 * @param userId The user for whom to fetch the profile owner name, if any. 4199 * @return the human readable name of the organisation associated with this profile owner or 4200 * null if one is not set. 4201 * @throws IllegalArgumentException if the userId is invalid. 4202 */ 4203 @SystemApi getProfileOwnerNameAsUser(int userId)4204 public String getProfileOwnerNameAsUser(int userId) throws IllegalArgumentException { 4205 throwIfParentInstance("getProfileOwnerNameAsUser"); 4206 if (mService != null) { 4207 try { 4208 return mService.getProfileOwnerName(userId); 4209 } catch (RemoteException re) { 4210 throw re.rethrowFromSystemServer(); 4211 } 4212 } 4213 return null; 4214 } 4215 4216 /** 4217 * Called by a profile owner or device owner to add a default intent handler activity for 4218 * intents that match a certain intent filter. This activity will remain the default intent 4219 * handler even if the set of potential event handlers for the intent filter changes and if the 4220 * intent preferences are reset. 4221 * <p> 4222 * The default disambiguation mechanism takes over if the activity is not installed (anymore). 4223 * When the activity is (re)installed, it is automatically reset as default intent handler for 4224 * the filter. 4225 * <p> 4226 * The calling device admin must be a profile owner or device owner. If it is not, a security 4227 * exception will be thrown. 4228 * 4229 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4230 * @param filter The IntentFilter for which a default handler is added. 4231 * @param activity The Activity that is added as default intent handler. 4232 * @throws SecurityException if {@code admin} is not a device or profile owner. 4233 */ addPersistentPreferredActivity(@onNull ComponentName admin, IntentFilter filter, @NonNull ComponentName activity)4234 public void addPersistentPreferredActivity(@NonNull ComponentName admin, IntentFilter filter, 4235 @NonNull ComponentName activity) { 4236 throwIfParentInstance("addPersistentPreferredActivity"); 4237 if (mService != null) { 4238 try { 4239 mService.addPersistentPreferredActivity(admin, filter, activity); 4240 } catch (RemoteException e) { 4241 throw e.rethrowFromSystemServer(); 4242 } 4243 } 4244 } 4245 4246 /** 4247 * Called by a profile owner or device owner to remove all persistent intent handler preferences 4248 * associated with the given package that were set by {@link #addPersistentPreferredActivity}. 4249 * <p> 4250 * The calling device admin must be a profile owner. If it is not, a security exception will be 4251 * thrown. 4252 * 4253 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4254 * @param packageName The name of the package for which preferences are removed. 4255 * @throws SecurityException if {@code admin} is not a device or profile owner. 4256 */ clearPackagePersistentPreferredActivities(@onNull ComponentName admin, String packageName)4257 public void clearPackagePersistentPreferredActivities(@NonNull ComponentName admin, 4258 String packageName) { 4259 throwIfParentInstance("clearPackagePersistentPreferredActivities"); 4260 if (mService != null) { 4261 try { 4262 mService.clearPackagePersistentPreferredActivities(admin, packageName); 4263 } catch (RemoteException e) { 4264 throw e.rethrowFromSystemServer(); 4265 } 4266 } 4267 } 4268 4269 /** 4270 * Called by a profile owner or device owner to grant permission to a package to manage 4271 * application restrictions for the calling user via {@link #setApplicationRestrictions} and 4272 * {@link #getApplicationRestrictions}. 4273 * <p> 4274 * This permission is persistent until it is later cleared by calling this method with a 4275 * {@code null} value or uninstalling the managing package. 4276 * <p> 4277 * The supplied application restriction managing package must be installed when calling this 4278 * API, otherwise an {@link NameNotFoundException} will be thrown. 4279 * 4280 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4281 * @param packageName The package name which will be given access to application restrictions 4282 * APIs. If {@code null} is given the current package will be cleared. 4283 * @throws SecurityException if {@code admin} is not a device or profile owner. 4284 * @throws NameNotFoundException if {@code packageName} is not found 4285 */ setApplicationRestrictionsManagingPackage(@onNull ComponentName admin, @Nullable String packageName)4286 public void setApplicationRestrictionsManagingPackage(@NonNull ComponentName admin, 4287 @Nullable String packageName) throws NameNotFoundException { 4288 throwIfParentInstance("setApplicationRestrictionsManagingPackage"); 4289 if (mService != null) { 4290 try { 4291 if (!mService.setApplicationRestrictionsManagingPackage(admin, packageName)) { 4292 throw new NameNotFoundException(packageName); 4293 } 4294 } catch (RemoteException e) { 4295 throw e.rethrowFromSystemServer(); 4296 } 4297 } 4298 } 4299 4300 /** 4301 * Called by a profile owner or device owner to retrieve the application restrictions managing 4302 * package for the current user, or {@code null} if none is set. 4303 * 4304 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4305 * @return The package name allowed to manage application restrictions on the current user, or 4306 * {@code null} if none is set. 4307 * @throws SecurityException if {@code admin} is not a device or profile owner. 4308 */ getApplicationRestrictionsManagingPackage(@onNull ComponentName admin)4309 public String getApplicationRestrictionsManagingPackage(@NonNull ComponentName admin) { 4310 throwIfParentInstance("getApplicationRestrictionsManagingPackage"); 4311 if (mService != null) { 4312 try { 4313 return mService.getApplicationRestrictionsManagingPackage(admin); 4314 } catch (RemoteException e) { 4315 throw e.rethrowFromSystemServer(); 4316 } 4317 } 4318 return null; 4319 } 4320 4321 /** 4322 * Called by any application to find out whether it has been granted permission via 4323 * {@link #setApplicationRestrictionsManagingPackage} to manage application restrictions 4324 * for the calling user. 4325 * 4326 * <p>This is done by comparing the calling Linux uid with the uid of the package specified by 4327 * that method. 4328 */ isCallerApplicationRestrictionsManagingPackage()4329 public boolean isCallerApplicationRestrictionsManagingPackage() { 4330 throwIfParentInstance("isCallerApplicationRestrictionsManagingPackage"); 4331 if (mService != null) { 4332 try { 4333 return mService.isCallerApplicationRestrictionsManagingPackage(); 4334 } catch (RemoteException e) { 4335 throw e.rethrowFromSystemServer(); 4336 } 4337 } 4338 return false; 4339 } 4340 4341 /** 4342 * Sets the application restrictions for a given target application running in the calling user. 4343 * <p> 4344 * The caller must be a profile or device owner on that user, or the package allowed to manage 4345 * application restrictions via {@link #setApplicationRestrictionsManagingPackage}; otherwise a 4346 * security exception will be thrown. 4347 * <p> 4348 * The provided {@link Bundle} consists of key-value pairs, where the types of values may be: 4349 * <ul> 4350 * <li>{@code boolean} 4351 * <li>{@code int} 4352 * <li>{@code String} or {@code String[]} 4353 * <li>From {@link android.os.Build.VERSION_CODES#M}, {@code Bundle} or {@code Bundle[]} 4354 * </ul> 4355 * <p> 4356 * If the restrictions are not available yet, but may be applied in the near future, the caller 4357 * can notify the target application of that by adding 4358 * {@link UserManager#KEY_RESTRICTIONS_PENDING} to the settings parameter. 4359 * <p> 4360 * The application restrictions are only made visible to the target application via 4361 * {@link UserManager#getApplicationRestrictions(String)}, in addition to the profile or device 4362 * owner, and the application restrictions managing package via 4363 * {@link #getApplicationRestrictions}. 4364 * 4365 * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or 4366 * {@code null} if called by the application restrictions managing package. 4367 * @param packageName The name of the package to update restricted settings for. 4368 * @param settings A {@link Bundle} to be parsed by the receiving application, conveying a new 4369 * set of active restrictions. 4370 * @throws SecurityException if {@code admin} is not a device or profile owner. 4371 * @see #setApplicationRestrictionsManagingPackage 4372 * @see UserManager#KEY_RESTRICTIONS_PENDING 4373 */ setApplicationRestrictions(@ullable ComponentName admin, String packageName, Bundle settings)4374 public void setApplicationRestrictions(@Nullable ComponentName admin, String packageName, 4375 Bundle settings) { 4376 throwIfParentInstance("setApplicationRestrictions"); 4377 if (mService != null) { 4378 try { 4379 mService.setApplicationRestrictions(admin, packageName, settings); 4380 } catch (RemoteException e) { 4381 throw e.rethrowFromSystemServer(); 4382 } 4383 } 4384 } 4385 4386 /** 4387 * Sets a list of configuration features to enable for a TrustAgent component. This is meant to 4388 * be used in conjunction with {@link #KEYGUARD_DISABLE_TRUST_AGENTS}, which disables all trust 4389 * agents but those enabled by this function call. If flag 4390 * {@link #KEYGUARD_DISABLE_TRUST_AGENTS} is not set, then this call has no effect. 4391 * <p> 4392 * The calling device admin must have requested 4393 * {@link DeviceAdminInfo#USES_POLICY_DISABLE_KEYGUARD_FEATURES} to be able to call this method; 4394 * if not, a security exception will be thrown. 4395 * <p> 4396 * This method can be called on the {@link DevicePolicyManager} instance returned by 4397 * {@link #getParentProfileInstance(ComponentName)} in order to set the configuration for 4398 * the parent profile. 4399 * 4400 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4401 * @param target Component name of the agent to be enabled. 4402 * @param configuration TrustAgent-specific feature bundle. If null for any admin, agent will be 4403 * strictly disabled according to the state of the 4404 * {@link #KEYGUARD_DISABLE_TRUST_AGENTS} flag. 4405 * <p> 4406 * If {@link #KEYGUARD_DISABLE_TRUST_AGENTS} is set and options is not null for all 4407 * admins, then it's up to the TrustAgent itself to aggregate the values from all 4408 * device admins. 4409 * <p> 4410 * Consult documentation for the specific TrustAgent to determine legal options 4411 * parameters. 4412 * @throws SecurityException if {@code admin} is not an active administrator or does not use 4413 * {@link DeviceAdminInfo#USES_POLICY_DISABLE_KEYGUARD_FEATURES} 4414 */ setTrustAgentConfiguration(@onNull ComponentName admin, @NonNull ComponentName target, PersistableBundle configuration)4415 public void setTrustAgentConfiguration(@NonNull ComponentName admin, 4416 @NonNull ComponentName target, PersistableBundle configuration) { 4417 if (mService != null) { 4418 try { 4419 mService.setTrustAgentConfiguration(admin, target, configuration, mParentInstance); 4420 } catch (RemoteException e) { 4421 throw e.rethrowFromSystemServer(); 4422 } 4423 } 4424 } 4425 4426 /** 4427 * Gets configuration for the given trust agent based on aggregating all calls to 4428 * {@link #setTrustAgentConfiguration(ComponentName, ComponentName, PersistableBundle)} for 4429 * all device admins. 4430 * <p> 4431 * This method can be called on the {@link DevicePolicyManager} instance returned by 4432 * {@link #getParentProfileInstance(ComponentName)} in order to retrieve the configuration set 4433 * on the parent profile. 4434 * 4435 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. If null, 4436 * this function returns a list of configurations for all admins that declare 4437 * {@link #KEYGUARD_DISABLE_TRUST_AGENTS}. If any admin declares 4438 * {@link #KEYGUARD_DISABLE_TRUST_AGENTS} but doesn't call 4439 * {@link #setTrustAgentConfiguration(ComponentName, ComponentName, PersistableBundle)} 4440 * for this {@param agent} or calls it with a null configuration, null is returned. 4441 * @param agent Which component to get enabled features for. 4442 * @return configuration for the given trust agent. 4443 */ getTrustAgentConfiguration(@ullable ComponentName admin, @NonNull ComponentName agent)4444 public List<PersistableBundle> getTrustAgentConfiguration(@Nullable ComponentName admin, 4445 @NonNull ComponentName agent) { 4446 return getTrustAgentConfiguration(admin, agent, myUserId()); 4447 } 4448 4449 /** @hide per-user version */ getTrustAgentConfiguration(@ullable ComponentName admin, @NonNull ComponentName agent, int userHandle)4450 public List<PersistableBundle> getTrustAgentConfiguration(@Nullable ComponentName admin, 4451 @NonNull ComponentName agent, int userHandle) { 4452 if (mService != null) { 4453 try { 4454 return mService.getTrustAgentConfiguration(admin, agent, userHandle, 4455 mParentInstance); 4456 } catch (RemoteException e) { 4457 throw e.rethrowFromSystemServer(); 4458 } 4459 } 4460 return new ArrayList<PersistableBundle>(); // empty list 4461 } 4462 4463 /** 4464 * Called by a profile owner of a managed profile to set whether caller-Id information from the 4465 * managed profile will be shown in the parent profile, for incoming calls. 4466 * <p> 4467 * The calling device admin must be a profile owner. If it is not, a security exception will be 4468 * thrown. 4469 * 4470 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4471 * @param disabled If true caller-Id information in the managed profile is not displayed. 4472 * @throws SecurityException if {@code admin} is not a device or profile owner. 4473 */ setCrossProfileCallerIdDisabled(@onNull ComponentName admin, boolean disabled)4474 public void setCrossProfileCallerIdDisabled(@NonNull ComponentName admin, boolean disabled) { 4475 throwIfParentInstance("setCrossProfileCallerIdDisabled"); 4476 if (mService != null) { 4477 try { 4478 mService.setCrossProfileCallerIdDisabled(admin, disabled); 4479 } catch (RemoteException e) { 4480 throw e.rethrowFromSystemServer(); 4481 } 4482 } 4483 } 4484 4485 /** 4486 * Called by a profile owner of a managed profile to determine whether or not caller-Id 4487 * information has been disabled. 4488 * <p> 4489 * The calling device admin must be a profile owner. If it is not, a security exception will be 4490 * thrown. 4491 * 4492 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4493 * @throws SecurityException if {@code admin} is not a device or profile owner. 4494 */ getCrossProfileCallerIdDisabled(@onNull ComponentName admin)4495 public boolean getCrossProfileCallerIdDisabled(@NonNull ComponentName admin) { 4496 throwIfParentInstance("getCrossProfileCallerIdDisabled"); 4497 if (mService != null) { 4498 try { 4499 return mService.getCrossProfileCallerIdDisabled(admin); 4500 } catch (RemoteException e) { 4501 throw e.rethrowFromSystemServer(); 4502 } 4503 } 4504 return false; 4505 } 4506 4507 /** 4508 * Determine whether or not caller-Id information has been disabled. 4509 * 4510 * @param userHandle The user for whom to check the caller-id permission 4511 * @hide 4512 */ getCrossProfileCallerIdDisabled(UserHandle userHandle)4513 public boolean getCrossProfileCallerIdDisabled(UserHandle userHandle) { 4514 if (mService != null) { 4515 try { 4516 return mService.getCrossProfileCallerIdDisabledForUser(userHandle.getIdentifier()); 4517 } catch (RemoteException e) { 4518 throw e.rethrowFromSystemServer(); 4519 } 4520 } 4521 return false; 4522 } 4523 4524 /** 4525 * Called by a profile owner of a managed profile to set whether contacts search from the 4526 * managed profile will be shown in the parent profile, for incoming calls. 4527 * <p> 4528 * The calling device admin must be a profile owner. If it is not, a security exception will be 4529 * thrown. 4530 * 4531 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4532 * @param disabled If true contacts search in the managed profile is not displayed. 4533 * @throws SecurityException if {@code admin} is not a device or profile owner. 4534 */ setCrossProfileContactsSearchDisabled(@onNull ComponentName admin, boolean disabled)4535 public void setCrossProfileContactsSearchDisabled(@NonNull ComponentName admin, 4536 boolean disabled) { 4537 throwIfParentInstance("setCrossProfileContactsSearchDisabled"); 4538 if (mService != null) { 4539 try { 4540 mService.setCrossProfileContactsSearchDisabled(admin, disabled); 4541 } catch (RemoteException e) { 4542 throw e.rethrowFromSystemServer(); 4543 } 4544 } 4545 } 4546 4547 /** 4548 * Called by a profile owner of a managed profile to determine whether or not contacts search 4549 * has been disabled. 4550 * <p> 4551 * The calling device admin must be a profile owner. If it is not, a security exception will be 4552 * thrown. 4553 * 4554 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4555 * @throws SecurityException if {@code admin} is not a device or profile owner. 4556 */ getCrossProfileContactsSearchDisabled(@onNull ComponentName admin)4557 public boolean getCrossProfileContactsSearchDisabled(@NonNull ComponentName admin) { 4558 throwIfParentInstance("getCrossProfileContactsSearchDisabled"); 4559 if (mService != null) { 4560 try { 4561 return mService.getCrossProfileContactsSearchDisabled(admin); 4562 } catch (RemoteException e) { 4563 throw e.rethrowFromSystemServer(); 4564 } 4565 } 4566 return false; 4567 } 4568 4569 4570 /** 4571 * Determine whether or not contacts search has been disabled. 4572 * 4573 * @param userHandle The user for whom to check the contacts search permission 4574 * @hide 4575 */ getCrossProfileContactsSearchDisabled(@onNull UserHandle userHandle)4576 public boolean getCrossProfileContactsSearchDisabled(@NonNull UserHandle userHandle) { 4577 if (mService != null) { 4578 try { 4579 return mService 4580 .getCrossProfileContactsSearchDisabledForUser(userHandle.getIdentifier()); 4581 } catch (RemoteException e) { 4582 throw e.rethrowFromSystemServer(); 4583 } 4584 } 4585 return false; 4586 } 4587 4588 /** 4589 * Start Quick Contact on the managed profile for the user, if the policy allows. 4590 * 4591 * @hide 4592 */ startManagedQuickContact(String actualLookupKey, long actualContactId, boolean isContactIdIgnored, long directoryId, Intent originalIntent)4593 public void startManagedQuickContact(String actualLookupKey, long actualContactId, 4594 boolean isContactIdIgnored, long directoryId, Intent originalIntent) { 4595 if (mService != null) { 4596 try { 4597 mService.startManagedQuickContact(actualLookupKey, actualContactId, 4598 isContactIdIgnored, directoryId, originalIntent); 4599 } catch (RemoteException e) { 4600 throw e.rethrowFromSystemServer(); 4601 } 4602 } 4603 } 4604 4605 /** 4606 * Start Quick Contact on the managed profile for the user, if the policy allows. 4607 * @hide 4608 */ startManagedQuickContact(String actualLookupKey, long actualContactId, Intent originalIntent)4609 public void startManagedQuickContact(String actualLookupKey, long actualContactId, 4610 Intent originalIntent) { 4611 startManagedQuickContact(actualLookupKey, actualContactId, false, Directory.DEFAULT, 4612 originalIntent); 4613 } 4614 4615 /** 4616 * Called by a profile owner of a managed profile to set whether bluetooth devices can access 4617 * enterprise contacts. 4618 * <p> 4619 * The calling device admin must be a profile owner. If it is not, a security exception will be 4620 * thrown. 4621 * <p> 4622 * This API works on managed profile only. 4623 * 4624 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4625 * @param disabled If true, bluetooth devices cannot access enterprise contacts. 4626 * @throws SecurityException if {@code admin} is not a device or profile owner. 4627 */ setBluetoothContactSharingDisabled(@onNull ComponentName admin, boolean disabled)4628 public void setBluetoothContactSharingDisabled(@NonNull ComponentName admin, boolean disabled) { 4629 throwIfParentInstance("setBluetoothContactSharingDisabled"); 4630 if (mService != null) { 4631 try { 4632 mService.setBluetoothContactSharingDisabled(admin, disabled); 4633 } catch (RemoteException e) { 4634 throw e.rethrowFromSystemServer(); 4635 } 4636 } 4637 } 4638 4639 /** 4640 * Called by a profile owner of a managed profile to determine whether or not Bluetooth devices 4641 * cannot access enterprise contacts. 4642 * <p> 4643 * The calling device admin must be a profile owner. If it is not, a security exception will be 4644 * thrown. 4645 * <p> 4646 * This API works on managed profile only. 4647 * 4648 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4649 * @throws SecurityException if {@code admin} is not a device or profile owner. 4650 */ getBluetoothContactSharingDisabled(@onNull ComponentName admin)4651 public boolean getBluetoothContactSharingDisabled(@NonNull ComponentName admin) { 4652 throwIfParentInstance("getBluetoothContactSharingDisabled"); 4653 if (mService != null) { 4654 try { 4655 return mService.getBluetoothContactSharingDisabled(admin); 4656 } catch (RemoteException e) { 4657 throw e.rethrowFromSystemServer(); 4658 } 4659 } 4660 return true; 4661 } 4662 4663 /** 4664 * Determine whether or not Bluetooth devices cannot access contacts. 4665 * <p> 4666 * This API works on managed profile UserHandle only. 4667 * 4668 * @param userHandle The user for whom to check the caller-id permission 4669 * @hide 4670 */ getBluetoothContactSharingDisabled(UserHandle userHandle)4671 public boolean getBluetoothContactSharingDisabled(UserHandle userHandle) { 4672 if (mService != null) { 4673 try { 4674 return mService.getBluetoothContactSharingDisabledForUser(userHandle 4675 .getIdentifier()); 4676 } catch (RemoteException e) { 4677 throw e.rethrowFromSystemServer(); 4678 } 4679 } 4680 return true; 4681 } 4682 4683 /** 4684 * Called by the profile owner of a managed profile so that some intents sent in the managed 4685 * profile can also be resolved in the parent, or vice versa. Only activity intents are 4686 * supported. 4687 * 4688 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4689 * @param filter The {@link IntentFilter} the intent has to match to be also resolved in the 4690 * other profile 4691 * @param flags {@link DevicePolicyManager#FLAG_MANAGED_CAN_ACCESS_PARENT} and 4692 * {@link DevicePolicyManager#FLAG_PARENT_CAN_ACCESS_MANAGED} are supported. 4693 * @throws SecurityException if {@code admin} is not a device or profile owner. 4694 */ addCrossProfileIntentFilter(@onNull ComponentName admin, IntentFilter filter, int flags)4695 public void addCrossProfileIntentFilter(@NonNull ComponentName admin, IntentFilter filter, int flags) { 4696 throwIfParentInstance("addCrossProfileIntentFilter"); 4697 if (mService != null) { 4698 try { 4699 mService.addCrossProfileIntentFilter(admin, filter, flags); 4700 } catch (RemoteException e) { 4701 throw e.rethrowFromSystemServer(); 4702 } 4703 } 4704 } 4705 4706 /** 4707 * Called by a profile owner of a managed profile to remove the cross-profile intent filters 4708 * that go from the managed profile to the parent, or from the parent to the managed profile. 4709 * Only removes those that have been set by the profile owner. 4710 * 4711 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4712 * @throws SecurityException if {@code admin} is not a device or profile owner. 4713 */ clearCrossProfileIntentFilters(@onNull ComponentName admin)4714 public void clearCrossProfileIntentFilters(@NonNull ComponentName admin) { 4715 throwIfParentInstance("clearCrossProfileIntentFilters"); 4716 if (mService != null) { 4717 try { 4718 mService.clearCrossProfileIntentFilters(admin); 4719 } catch (RemoteException e) { 4720 throw e.rethrowFromSystemServer(); 4721 } 4722 } 4723 } 4724 4725 /** 4726 * Called by a profile or device owner to set the permitted accessibility services. When set by 4727 * a device owner or profile owner the restriction applies to all profiles of the user the 4728 * device owner or profile owner is an admin for. By default the user can use any accessiblity 4729 * service. When zero or more packages have been added, accessiblity services that are not in 4730 * the list and not part of the system can not be enabled by the user. 4731 * <p> 4732 * Calling with a null value for the list disables the restriction so that all services can be 4733 * used, calling with an empty list only allows the builtin system's services. 4734 * <p> 4735 * System accesibility services are always available to the user the list can't modify this. 4736 * 4737 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4738 * @param packageNames List of accessibility service package names. 4739 * @return true if setting the restriction succeeded. It fail if there is one or more non-system 4740 * accessibility services enabled, that are not in the list. 4741 * @throws SecurityException if {@code admin} is not a device or profile owner. 4742 */ setPermittedAccessibilityServices(@onNull ComponentName admin, List<String> packageNames)4743 public boolean setPermittedAccessibilityServices(@NonNull ComponentName admin, 4744 List<String> packageNames) { 4745 throwIfParentInstance("setPermittedAccessibilityServices"); 4746 if (mService != null) { 4747 try { 4748 return mService.setPermittedAccessibilityServices(admin, packageNames); 4749 } catch (RemoteException e) { 4750 throw e.rethrowFromSystemServer(); 4751 } 4752 } 4753 return false; 4754 } 4755 4756 /** 4757 * Returns the list of permitted accessibility services set by this device or profile owner. 4758 * <p> 4759 * An empty list means no accessibility services except system services are allowed. Null means 4760 * all accessibility services are allowed. 4761 * 4762 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4763 * @return List of accessiblity service package names. 4764 * @throws SecurityException if {@code admin} is not a device or profile owner. 4765 */ getPermittedAccessibilityServices(@onNull ComponentName admin)4766 public List<String> getPermittedAccessibilityServices(@NonNull ComponentName admin) { 4767 throwIfParentInstance("getPermittedAccessibilityServices"); 4768 if (mService != null) { 4769 try { 4770 return mService.getPermittedAccessibilityServices(admin); 4771 } catch (RemoteException e) { 4772 throw e.rethrowFromSystemServer(); 4773 } 4774 } 4775 return null; 4776 } 4777 4778 /** 4779 * Called by the system to check if a specific accessibility service is disabled by admin. 4780 * 4781 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4782 * @param packageName Accessibility service package name that needs to be checked. 4783 * @param userHandle user id the admin is running as. 4784 * @return true if the accessibility service is permitted, otherwise false. 4785 * 4786 * @hide 4787 */ isAccessibilityServicePermittedByAdmin(@onNull ComponentName admin, @NonNull String packageName, int userHandle)4788 public boolean isAccessibilityServicePermittedByAdmin(@NonNull ComponentName admin, 4789 @NonNull String packageName, int userHandle) { 4790 if (mService != null) { 4791 try { 4792 return mService.isAccessibilityServicePermittedByAdmin(admin, packageName, 4793 userHandle); 4794 } catch (RemoteException e) { 4795 throw e.rethrowFromSystemServer(); 4796 } 4797 } 4798 return false; 4799 } 4800 4801 /** 4802 * Returns the list of accessibility services permitted by the device or profiles 4803 * owners of this user. 4804 * 4805 * <p>Null means all accessibility services are allowed, if a non-null list is returned 4806 * it will contain the intersection of the permitted lists for any device or profile 4807 * owners that apply to this user. It will also include any system accessibility services. 4808 * 4809 * @param userId which user to check for. 4810 * @return List of accessiblity service package names. 4811 * @hide 4812 */ 4813 @SystemApi getPermittedAccessibilityServices(int userId)4814 public List<String> getPermittedAccessibilityServices(int userId) { 4815 throwIfParentInstance("getPermittedAccessibilityServices"); 4816 if (mService != null) { 4817 try { 4818 return mService.getPermittedAccessibilityServicesForUser(userId); 4819 } catch (RemoteException e) { 4820 throw e.rethrowFromSystemServer(); 4821 } 4822 } 4823 return null; 4824 } 4825 4826 /** 4827 * Called by a profile or device owner to set the permitted input methods services. When set by 4828 * a device owner or profile owner the restriction applies to all profiles of the user the 4829 * device owner or profile owner is an admin for. By default the user can use any input method. 4830 * When zero or more packages have been added, input method that are not in the list and not 4831 * part of the system can not be enabled by the user. This method will fail if it is called for 4832 * a admin that is not for the foreground user or a profile of the foreground user. 4833 * <p> 4834 * Calling with a null value for the list disables the restriction so that all input methods can 4835 * be used, calling with an empty list disables all but the system's own input methods. 4836 * <p> 4837 * System input methods are always available to the user this method can't modify this. 4838 * 4839 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4840 * @param packageNames List of input method package names. 4841 * @return true if setting the restriction succeeded. It will fail if there are one or more 4842 * non-system input methods currently enabled that are not in the packageNames list. 4843 * @throws SecurityException if {@code admin} is not a device or profile owner. 4844 */ setPermittedInputMethods(@onNull ComponentName admin, List<String> packageNames)4845 public boolean setPermittedInputMethods(@NonNull ComponentName admin, List<String> packageNames) { 4846 throwIfParentInstance("setPermittedInputMethods"); 4847 if (mService != null) { 4848 try { 4849 return mService.setPermittedInputMethods(admin, packageNames); 4850 } catch (RemoteException e) { 4851 throw e.rethrowFromSystemServer(); 4852 } 4853 } 4854 return false; 4855 } 4856 4857 4858 /** 4859 * Returns the list of permitted input methods set by this device or profile owner. 4860 * <p> 4861 * An empty list means no input methods except system input methods are allowed. Null means all 4862 * input methods are allowed. 4863 * 4864 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4865 * @return List of input method package names. 4866 * @throws SecurityException if {@code admin} is not a device or profile owner. 4867 */ getPermittedInputMethods(@onNull ComponentName admin)4868 public List<String> getPermittedInputMethods(@NonNull ComponentName admin) { 4869 throwIfParentInstance("getPermittedInputMethods"); 4870 if (mService != null) { 4871 try { 4872 return mService.getPermittedInputMethods(admin); 4873 } catch (RemoteException e) { 4874 throw e.rethrowFromSystemServer(); 4875 } 4876 } 4877 return null; 4878 } 4879 4880 /** 4881 * Called by the system to check if a specific input method is disabled by admin. 4882 * 4883 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4884 * @param packageName Input method package name that needs to be checked. 4885 * @param userHandle user id the admin is running as. 4886 * @return true if the input method is permitted, otherwise false. 4887 * 4888 * @hide 4889 */ isInputMethodPermittedByAdmin(@onNull ComponentName admin, @NonNull String packageName, int userHandle)4890 public boolean isInputMethodPermittedByAdmin(@NonNull ComponentName admin, 4891 @NonNull String packageName, int userHandle) { 4892 if (mService != null) { 4893 try { 4894 return mService.isInputMethodPermittedByAdmin(admin, packageName, userHandle); 4895 } catch (RemoteException e) { 4896 throw e.rethrowFromSystemServer(); 4897 } 4898 } 4899 return false; 4900 } 4901 4902 /** 4903 * Returns the list of input methods permitted by the device or profiles 4904 * owners of the current user. (*Not* calling user, due to a limitation in InputMethodManager.) 4905 * 4906 * <p>Null means all input methods are allowed, if a non-null list is returned 4907 * it will contain the intersection of the permitted lists for any device or profile 4908 * owners that apply to this user. It will also include any system input methods. 4909 * 4910 * @return List of input method package names. 4911 * @hide 4912 */ 4913 @SystemApi getPermittedInputMethodsForCurrentUser()4914 public List<String> getPermittedInputMethodsForCurrentUser() { 4915 throwIfParentInstance("getPermittedInputMethodsForCurrentUser"); 4916 if (mService != null) { 4917 try { 4918 return mService.getPermittedInputMethodsForCurrentUser(); 4919 } catch (RemoteException e) { 4920 throw e.rethrowFromSystemServer(); 4921 } 4922 } 4923 return null; 4924 } 4925 4926 /** 4927 * Called by a device owner to get the list of apps to keep around as APKs even if no user has 4928 * currently installed it. 4929 * 4930 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4931 * 4932 * @return List of package names to keep cached. 4933 * @hide 4934 */ getKeepUninstalledPackages(@onNull ComponentName admin)4935 public List<String> getKeepUninstalledPackages(@NonNull ComponentName admin) { 4936 throwIfParentInstance("getKeepUninstalledPackages"); 4937 if (mService != null) { 4938 try { 4939 return mService.getKeepUninstalledPackages(admin); 4940 } catch (RemoteException e) { 4941 throw e.rethrowFromSystemServer(); 4942 } 4943 } 4944 return null; 4945 } 4946 4947 /** 4948 * Called by a device owner to set a list of apps to keep around as APKs even if no user has 4949 * currently installed it. 4950 * 4951 * <p>Please note that setting this policy does not imply that specified apps will be 4952 * automatically pre-cached.</p> 4953 * 4954 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4955 * @param packageNames List of package names to keep cached. 4956 * @throws SecurityException if {@code admin} is not a device owner. 4957 * @hide 4958 */ setKeepUninstalledPackages(@onNull ComponentName admin, @NonNull List<String> packageNames)4959 public void setKeepUninstalledPackages(@NonNull ComponentName admin, 4960 @NonNull List<String> packageNames) { 4961 throwIfParentInstance("setKeepUninstalledPackages"); 4962 if (mService != null) { 4963 try { 4964 mService.setKeepUninstalledPackages(admin, packageNames); 4965 } catch (RemoteException e) { 4966 throw e.rethrowFromSystemServer(); 4967 } 4968 } 4969 } 4970 4971 /** 4972 * Called by a device owner to create a user with the specified name. The UserHandle returned 4973 * by this method should not be persisted as user handles are recycled as users are removed and 4974 * created. If you need to persist an identifier for this user, use 4975 * {@link UserManager#getSerialNumberForUser}. 4976 * 4977 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 4978 * @param name the user's name 4979 * @see UserHandle 4980 * @return the {@link android.os.UserHandle} object for the created user, or {@code null} if the 4981 * user could not be created. 4982 * 4983 * @deprecated From {@link android.os.Build.VERSION_CODES#M} 4984 * @removed From {@link android.os.Build.VERSION_CODES#N} 4985 */ 4986 @Deprecated createUser(@onNull ComponentName admin, String name)4987 public UserHandle createUser(@NonNull ComponentName admin, String name) { 4988 return null; 4989 } 4990 4991 /** 4992 * Called by a device owner to create a user with the specified name. The UserHandle returned 4993 * by this method should not be persisted as user handles are recycled as users are removed and 4994 * created. If you need to persist an identifier for this user, use 4995 * {@link UserManager#getSerialNumberForUser}. The new user will be started in the background 4996 * immediately. 4997 * 4998 * <p> profileOwnerComponent is the {@link DeviceAdminReceiver} to be the profile owner as well 4999 * as registered as an active admin on the new user. The profile owner package will be 5000 * installed on the new user if it already is installed on the device. 5001 * 5002 * <p>If the optionalInitializeData is not null, then the extras will be passed to the 5003 * profileOwnerComponent when onEnable is called. 5004 * 5005 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5006 * @param name the user's name 5007 * @param ownerName the human readable name of the organisation associated with this DPM. 5008 * @param profileOwnerComponent The {@link DeviceAdminReceiver} that will be an active admin on 5009 * the user. 5010 * @param adminExtras Extras that will be passed to onEnable of the admin receiver 5011 * on the new user. 5012 * @see UserHandle 5013 * @return the {@link android.os.UserHandle} object for the created user, or {@code null} if the 5014 * user could not be created. 5015 * 5016 * @deprecated From {@link android.os.Build.VERSION_CODES#M} 5017 * @removed From {@link android.os.Build.VERSION_CODES#N} 5018 */ 5019 @Deprecated createAndInitializeUser(@onNull ComponentName admin, String name, String ownerName, @NonNull ComponentName profileOwnerComponent, Bundle adminExtras)5020 public UserHandle createAndInitializeUser(@NonNull ComponentName admin, String name, 5021 String ownerName, @NonNull ComponentName profileOwnerComponent, Bundle adminExtras) { 5022 return null; 5023 } 5024 5025 /** 5026 * Flag used by {@link #createAndManageUser} to skip setup wizard after creating a new user. 5027 */ 5028 public static final int SKIP_SETUP_WIZARD = 0x0001; 5029 5030 /** 5031 * Flag used by {@link #createAndManageUser} to specify that the user should be created 5032 * ephemeral. 5033 * @hide 5034 */ 5035 public static final int MAKE_USER_EPHEMERAL = 0x0002; 5036 5037 /** 5038 * Called by a device owner to create a user with the specified name and a given component of 5039 * the calling package as profile owner. The UserHandle returned by this method should not be 5040 * persisted as user handles are recycled as users are removed and created. If you need to 5041 * persist an identifier for this user, use {@link UserManager#getSerialNumberForUser}. The new 5042 * user will not be started in the background. 5043 * <p> 5044 * admin is the {@link DeviceAdminReceiver} which is the device owner. profileOwner is also a 5045 * DeviceAdminReceiver in the same package as admin, and will become the profile owner and will 5046 * be registered as an active admin on the new user. The profile owner package will be installed 5047 * on the new user. 5048 * <p> 5049 * If the adminExtras are not null, they will be stored on the device until the user is started 5050 * for the first time. Then the extras will be passed to the admin when onEnable is called. 5051 * 5052 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5053 * @param name The user's name. 5054 * @param profileOwner Which {@link DeviceAdminReceiver} will be profile owner. Has to be in the 5055 * same package as admin, otherwise no user is created and an 5056 * IllegalArgumentException is thrown. 5057 * @param adminExtras Extras that will be passed to onEnable of the admin receiver on the new 5058 * user. 5059 * @param flags {@link #SKIP_SETUP_WIZARD} is supported. 5060 * @see UserHandle 5061 * @return the {@link android.os.UserHandle} object for the created user, or {@code null} if the 5062 * user could not be created. 5063 * @throws SecurityException if {@code admin} is not a device owner. 5064 */ createAndManageUser(@onNull ComponentName admin, @NonNull String name, @NonNull ComponentName profileOwner, @Nullable PersistableBundle adminExtras, int flags)5065 public UserHandle createAndManageUser(@NonNull ComponentName admin, @NonNull String name, 5066 @NonNull ComponentName profileOwner, @Nullable PersistableBundle adminExtras, 5067 int flags) { 5068 throwIfParentInstance("createAndManageUser"); 5069 try { 5070 return mService.createAndManageUser(admin, name, profileOwner, adminExtras, flags); 5071 } catch (RemoteException re) { 5072 throw re.rethrowFromSystemServer(); 5073 } 5074 } 5075 5076 /** 5077 * Called by a device owner to remove a user and all associated data. The primary user can not 5078 * be removed. 5079 * 5080 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5081 * @param userHandle the user to remove. 5082 * @return {@code true} if the user was removed, {@code false} otherwise. 5083 * @throws SecurityException if {@code admin} is not a device owner. 5084 */ removeUser(@onNull ComponentName admin, UserHandle userHandle)5085 public boolean removeUser(@NonNull ComponentName admin, UserHandle userHandle) { 5086 throwIfParentInstance("removeUser"); 5087 try { 5088 return mService.removeUser(admin, userHandle); 5089 } catch (RemoteException re) { 5090 throw re.rethrowFromSystemServer(); 5091 } 5092 } 5093 5094 /** 5095 * Called by a device owner to switch the specified user to the foreground. 5096 * 5097 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5098 * @param userHandle the user to switch to; null will switch to primary. 5099 * @return {@code true} if the switch was successful, {@code false} otherwise. 5100 * @throws SecurityException if {@code admin} is not a device owner. 5101 * @see Intent#ACTION_USER_FOREGROUND 5102 */ switchUser(@onNull ComponentName admin, @Nullable UserHandle userHandle)5103 public boolean switchUser(@NonNull ComponentName admin, @Nullable UserHandle userHandle) { 5104 throwIfParentInstance("switchUser"); 5105 try { 5106 return mService.switchUser(admin, userHandle); 5107 } catch (RemoteException re) { 5108 throw re.rethrowFromSystemServer(); 5109 } 5110 } 5111 5112 /** 5113 * Retrieves the application restrictions for a given target application running in the calling 5114 * user. 5115 * <p> 5116 * The caller must be a profile or device owner on that user, or the package allowed to manage 5117 * application restrictions via {@link #setApplicationRestrictionsManagingPackage}; otherwise a 5118 * security exception will be thrown. 5119 * 5120 * @param admin Which {@link DeviceAdminReceiver} this request is associated with, or 5121 * {@code null} if called by the application restrictions managing package. 5122 * @param packageName The name of the package to fetch restricted settings of. 5123 * @return {@link Bundle} of settings corresponding to what was set last time 5124 * {@link DevicePolicyManager#setApplicationRestrictions} was called, or an empty 5125 * {@link Bundle} if no restrictions have been set. 5126 * @throws SecurityException if {@code admin} is not a device or profile owner. 5127 * @see {@link #setApplicationRestrictionsManagingPackage} 5128 */ getApplicationRestrictions(@ullable ComponentName admin, String packageName)5129 public Bundle getApplicationRestrictions(@Nullable ComponentName admin, String packageName) { 5130 throwIfParentInstance("getApplicationRestrictions"); 5131 if (mService != null) { 5132 try { 5133 return mService.getApplicationRestrictions(admin, packageName); 5134 } catch (RemoteException e) { 5135 throw e.rethrowFromSystemServer(); 5136 } 5137 } 5138 return null; 5139 } 5140 5141 /** 5142 * Called by a profile or device owner to set a user restriction specified by the key. 5143 * <p> 5144 * The calling device admin must be a profile or device owner; if it is not, a security 5145 * exception will be thrown. 5146 * 5147 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5148 * @param key The key of the restriction. See the constants in {@link android.os.UserManager} 5149 * for the list of keys. 5150 * @throws SecurityException if {@code admin} is not a device or profile owner. 5151 */ addUserRestriction(@onNull ComponentName admin, String key)5152 public void addUserRestriction(@NonNull ComponentName admin, String key) { 5153 throwIfParentInstance("addUserRestriction"); 5154 if (mService != null) { 5155 try { 5156 mService.setUserRestriction(admin, key, true); 5157 } catch (RemoteException e) { 5158 throw e.rethrowFromSystemServer(); 5159 } 5160 } 5161 } 5162 5163 /** 5164 * Called by a profile or device owner to clear a user restriction specified by the key. 5165 * <p> 5166 * The calling device admin must be a profile or device owner; if it is not, a security 5167 * exception will be thrown. 5168 * 5169 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5170 * @param key The key of the restriction. See the constants in {@link android.os.UserManager} 5171 * for the list of keys. 5172 * @throws SecurityException if {@code admin} is not a device or profile owner. 5173 */ clearUserRestriction(@onNull ComponentName admin, String key)5174 public void clearUserRestriction(@NonNull ComponentName admin, String key) { 5175 throwIfParentInstance("clearUserRestriction"); 5176 if (mService != null) { 5177 try { 5178 mService.setUserRestriction(admin, key, false); 5179 } catch (RemoteException e) { 5180 throw e.rethrowFromSystemServer(); 5181 } 5182 } 5183 } 5184 5185 /** 5186 * Called by a profile or device owner to get user restrictions set with 5187 * {@link #addUserRestriction(ComponentName, String)}. 5188 * <p> 5189 * The target user may have more restrictions set by the system or other device owner / profile 5190 * owner. To get all the user restrictions currently set, use 5191 * {@link UserManager#getUserRestrictions()}. 5192 * 5193 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5194 * @throws SecurityException if {@code admin} is not a device or profile owner. 5195 */ getUserRestrictions(@onNull ComponentName admin)5196 public Bundle getUserRestrictions(@NonNull ComponentName admin) { 5197 throwIfParentInstance("getUserRestrictions"); 5198 Bundle ret = null; 5199 if (mService != null) { 5200 try { 5201 ret = mService.getUserRestrictions(admin); 5202 } catch (RemoteException e) { 5203 throw e.rethrowFromSystemServer(); 5204 } 5205 } 5206 return ret == null ? new Bundle() : ret; 5207 } 5208 5209 /** 5210 * Called by profile or device owners to hide or unhide packages. When a package is hidden it is 5211 * unavailable for use, but the data and actual package file remain. 5212 * 5213 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5214 * @param packageName The name of the package to hide or unhide. 5215 * @param hidden {@code true} if the package should be hidden, {@code false} if it should be 5216 * unhidden. 5217 * @return boolean Whether the hidden setting of the package was successfully updated. 5218 * @throws SecurityException if {@code admin} is not a device or profile owner. 5219 */ setApplicationHidden(@onNull ComponentName admin, String packageName, boolean hidden)5220 public boolean setApplicationHidden(@NonNull ComponentName admin, String packageName, 5221 boolean hidden) { 5222 throwIfParentInstance("setApplicationHidden"); 5223 if (mService != null) { 5224 try { 5225 return mService.setApplicationHidden(admin, packageName, hidden); 5226 } catch (RemoteException e) { 5227 throw e.rethrowFromSystemServer(); 5228 } 5229 } 5230 return false; 5231 } 5232 5233 /** 5234 * Called by profile or device owners to determine if a package is hidden. 5235 * 5236 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5237 * @param packageName The name of the package to retrieve the hidden status of. 5238 * @return boolean {@code true} if the package is hidden, {@code false} otherwise. 5239 * @throws SecurityException if {@code admin} is not a device or profile owner. 5240 */ isApplicationHidden(@onNull ComponentName admin, String packageName)5241 public boolean isApplicationHidden(@NonNull ComponentName admin, String packageName) { 5242 throwIfParentInstance("isApplicationHidden"); 5243 if (mService != null) { 5244 try { 5245 return mService.isApplicationHidden(admin, packageName); 5246 } catch (RemoteException e) { 5247 throw e.rethrowFromSystemServer(); 5248 } 5249 } 5250 return false; 5251 } 5252 5253 /** 5254 * Called by profile or device owners to re-enable a system app that was disabled by default 5255 * when the user was initialized. 5256 * 5257 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5258 * @param packageName The package to be re-enabled in the calling profile. 5259 * @throws SecurityException if {@code admin} is not a device or profile owner. 5260 */ enableSystemApp(@onNull ComponentName admin, String packageName)5261 public void enableSystemApp(@NonNull ComponentName admin, String packageName) { 5262 throwIfParentInstance("enableSystemApp"); 5263 if (mService != null) { 5264 try { 5265 mService.enableSystemApp(admin, packageName); 5266 } catch (RemoteException e) { 5267 throw e.rethrowFromSystemServer(); 5268 } 5269 } 5270 } 5271 5272 /** 5273 * Called by profile or device owners to re-enable system apps by intent that were disabled by 5274 * default when the user was initialized. 5275 * 5276 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5277 * @param intent An intent matching the app(s) to be installed. All apps that resolve for this 5278 * intent will be re-enabled in the calling profile. 5279 * @return int The number of activities that matched the intent and were installed. 5280 * @throws SecurityException if {@code admin} is not a device or profile owner. 5281 */ enableSystemApp(@onNull ComponentName admin, Intent intent)5282 public int enableSystemApp(@NonNull ComponentName admin, Intent intent) { 5283 throwIfParentInstance("enableSystemApp"); 5284 if (mService != null) { 5285 try { 5286 return mService.enableSystemAppWithIntent(admin, intent); 5287 } catch (RemoteException e) { 5288 throw e.rethrowFromSystemServer(); 5289 } 5290 } 5291 return 0; 5292 } 5293 5294 /** 5295 * Called by a device owner or profile owner to disable account management for a specific type 5296 * of account. 5297 * <p> 5298 * The calling device admin must be a device owner or profile owner. If it is not, a security 5299 * exception will be thrown. 5300 * <p> 5301 * When account management is disabled for an account type, adding or removing an account of 5302 * that type will not be possible. 5303 * <p> 5304 * From {@link android.os.Build.VERSION_CODES#N} the profile or device owner can still use 5305 * {@link android.accounts.AccountManager} APIs to add or remove accounts when account 5306 * management for a specific type is disabled. 5307 * 5308 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5309 * @param accountType For which account management is disabled or enabled. 5310 * @param disabled The boolean indicating that account management will be disabled (true) or 5311 * enabled (false). 5312 * @throws SecurityException if {@code admin} is not a device or profile owner. 5313 */ setAccountManagementDisabled(@onNull ComponentName admin, String accountType, boolean disabled)5314 public void setAccountManagementDisabled(@NonNull ComponentName admin, String accountType, 5315 boolean disabled) { 5316 throwIfParentInstance("setAccountManagementDisabled"); 5317 if (mService != null) { 5318 try { 5319 mService.setAccountManagementDisabled(admin, accountType, disabled); 5320 } catch (RemoteException e) { 5321 throw e.rethrowFromSystemServer(); 5322 } 5323 } 5324 } 5325 5326 /** 5327 * Gets the array of accounts for which account management is disabled by the profile owner. 5328 * 5329 * <p> Account management can be disabled/enabled by calling 5330 * {@link #setAccountManagementDisabled}. 5331 * 5332 * @return a list of account types for which account management has been disabled. 5333 * 5334 * @see #setAccountManagementDisabled 5335 */ getAccountTypesWithManagementDisabled()5336 public String[] getAccountTypesWithManagementDisabled() { 5337 throwIfParentInstance("getAccountTypesWithManagementDisabled"); 5338 return getAccountTypesWithManagementDisabledAsUser(myUserId()); 5339 } 5340 5341 /** 5342 * @see #getAccountTypesWithManagementDisabled() 5343 * @hide 5344 */ getAccountTypesWithManagementDisabledAsUser(int userId)5345 public String[] getAccountTypesWithManagementDisabledAsUser(int userId) { 5346 if (mService != null) { 5347 try { 5348 return mService.getAccountTypesWithManagementDisabledAsUser(userId); 5349 } catch (RemoteException e) { 5350 throw e.rethrowFromSystemServer(); 5351 } 5352 } 5353 5354 return null; 5355 } 5356 5357 /** 5358 * Sets which packages may enter lock task mode. 5359 * <p> 5360 * Any packages that shares uid with an allowed package will also be allowed to activate lock 5361 * task. From {@link android.os.Build.VERSION_CODES#M} removing packages from the lock task 5362 * package list results in locked tasks belonging to those packages to be finished. This 5363 * function can only be called by the device owner. 5364 * 5365 * @param packages The list of packages allowed to enter lock task mode 5366 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5367 * @throws SecurityException if {@code admin} is not a device owner. 5368 * @see Activity#startLockTask() 5369 * @see DeviceAdminReceiver#onLockTaskModeEntering(Context, Intent, String) 5370 * @see DeviceAdminReceiver#onLockTaskModeExiting(Context, Intent) 5371 * @see UserManager#DISALLOW_CREATE_WINDOWS 5372 */ setLockTaskPackages(@onNull ComponentName admin, String[] packages)5373 public void setLockTaskPackages(@NonNull ComponentName admin, String[] packages) 5374 throws SecurityException { 5375 throwIfParentInstance("setLockTaskPackages"); 5376 if (mService != null) { 5377 try { 5378 mService.setLockTaskPackages(admin, packages); 5379 } catch (RemoteException e) { 5380 throw e.rethrowFromSystemServer(); 5381 } 5382 } 5383 } 5384 5385 /** 5386 * This function returns the list of packages allowed to start the lock task mode. 5387 * 5388 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5389 * @hide 5390 */ getLockTaskPackages(@onNull ComponentName admin)5391 public String[] getLockTaskPackages(@NonNull ComponentName admin) { 5392 throwIfParentInstance("getLockTaskPackages"); 5393 if (mService != null) { 5394 try { 5395 return mService.getLockTaskPackages(admin); 5396 } catch (RemoteException e) { 5397 throw e.rethrowFromSystemServer(); 5398 } 5399 } 5400 return null; 5401 } 5402 5403 /** 5404 * This function lets the caller know whether the given component is allowed to start the 5405 * lock task mode. 5406 * @param pkg The package to check 5407 */ isLockTaskPermitted(String pkg)5408 public boolean isLockTaskPermitted(String pkg) { 5409 throwIfParentInstance("isLockTaskPermitted"); 5410 if (mService != null) { 5411 try { 5412 return mService.isLockTaskPermitted(pkg); 5413 } catch (RemoteException e) { 5414 throw e.rethrowFromSystemServer(); 5415 } 5416 } 5417 return false; 5418 } 5419 5420 /** 5421 * Called by device owners to update {@link Settings.Global} settings. Validation that the value 5422 * of the setting is in the correct form for the setting type should be performed by the caller. 5423 * <p> 5424 * The settings that can be updated with this method are: 5425 * <ul> 5426 * <li>{@link Settings.Global#ADB_ENABLED}</li> 5427 * <li>{@link Settings.Global#AUTO_TIME}</li> 5428 * <li>{@link Settings.Global#AUTO_TIME_ZONE}</li> 5429 * <li>{@link Settings.Global#DATA_ROAMING}</li> 5430 * <li>{@link Settings.Global#USB_MASS_STORAGE_ENABLED}</li> 5431 * <li>{@link Settings.Global#WIFI_SLEEP_POLICY}</li> 5432 * <li>{@link Settings.Global#STAY_ON_WHILE_PLUGGED_IN} This setting is only available from 5433 * {@link android.os.Build.VERSION_CODES#M} onwards and can only be set if 5434 * {@link #setMaximumTimeToLock} is not used to set a timeout.</li> 5435 * <li>{@link Settings.Global#WIFI_DEVICE_OWNER_CONFIGS_LOCKDOWN}</li> This setting is only 5436 * available from {@link android.os.Build.VERSION_CODES#M} onwards.</li> 5437 * </ul> 5438 * <p> 5439 * Changing the following settings has no effect as of {@link android.os.Build.VERSION_CODES#M}: 5440 * <ul> 5441 * <li>{@link Settings.Global#BLUETOOTH_ON}. Use 5442 * {@link android.bluetooth.BluetoothAdapter#enable()} and 5443 * {@link android.bluetooth.BluetoothAdapter#disable()} instead.</li> 5444 * <li>{@link Settings.Global#DEVELOPMENT_SETTINGS_ENABLED}</li> 5445 * <li>{@link Settings.Global#MODE_RINGER}. Use 5446 * {@link android.media.AudioManager#setRingerMode(int)} instead.</li> 5447 * <li>{@link Settings.Global#NETWORK_PREFERENCE}</li> 5448 * <li>{@link Settings.Global#WIFI_ON}. Use 5449 * {@link android.net.wifi.WifiManager#setWifiEnabled(boolean)} instead.</li> 5450 * </ul> 5451 * 5452 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5453 * @param setting The name of the setting to update. 5454 * @param value The value to update the setting to. 5455 * @throws SecurityException if {@code admin} is not a device owner. 5456 */ setGlobalSetting(@onNull ComponentName admin, String setting, String value)5457 public void setGlobalSetting(@NonNull ComponentName admin, String setting, String value) { 5458 throwIfParentInstance("setGlobalSetting"); 5459 if (mService != null) { 5460 try { 5461 mService.setGlobalSetting(admin, setting, value); 5462 } catch (RemoteException e) { 5463 throw e.rethrowFromSystemServer(); 5464 } 5465 } 5466 } 5467 5468 /** 5469 * Called by profile or device owners to update {@link Settings.Secure} settings. Validation 5470 * that the value of the setting is in the correct form for the setting type should be performed 5471 * by the caller. 5472 * <p> 5473 * The settings that can be updated by a profile or device owner with this method are: 5474 * <ul> 5475 * <li>{@link Settings.Secure#DEFAULT_INPUT_METHOD}</li> 5476 * <li>{@link Settings.Secure#INSTALL_NON_MARKET_APPS}</li> 5477 * <li>{@link Settings.Secure#SKIP_FIRST_USE_HINTS}</li> 5478 * </ul> 5479 * <p> 5480 * A device owner can additionally update the following settings: 5481 * <ul> 5482 * <li>{@link Settings.Secure#LOCATION_MODE}</li> 5483 * </ul> 5484 * 5485 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5486 * @param setting The name of the setting to update. 5487 * @param value The value to update the setting to. 5488 * @throws SecurityException if {@code admin} is not a device or profile owner. 5489 */ setSecureSetting(@onNull ComponentName admin, String setting, String value)5490 public void setSecureSetting(@NonNull ComponentName admin, String setting, String value) { 5491 throwIfParentInstance("setSecureSetting"); 5492 if (mService != null) { 5493 try { 5494 mService.setSecureSetting(admin, setting, value); 5495 } catch (RemoteException e) { 5496 throw e.rethrowFromSystemServer(); 5497 } 5498 } 5499 } 5500 5501 /** 5502 * Designates a specific service component as the provider for making permission requests of a 5503 * local or remote administrator of the user. 5504 * <p/> 5505 * Only a profile owner can designate the restrictions provider. 5506 * 5507 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5508 * @param provider The component name of the service that implements 5509 * {@link RestrictionsReceiver}. If this param is null, it removes the restrictions 5510 * provider previously assigned. 5511 * @throws SecurityException if {@code admin} is not a device or profile owner. 5512 */ setRestrictionsProvider(@onNull ComponentName admin, @Nullable ComponentName provider)5513 public void setRestrictionsProvider(@NonNull ComponentName admin, 5514 @Nullable ComponentName provider) { 5515 throwIfParentInstance("setRestrictionsProvider"); 5516 if (mService != null) { 5517 try { 5518 mService.setRestrictionsProvider(admin, provider); 5519 } catch (RemoteException re) { 5520 throw re.rethrowFromSystemServer(); 5521 } 5522 } 5523 } 5524 5525 /** 5526 * Called by profile or device owners to set the master volume mute on or off. 5527 * 5528 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5529 * @param on {@code true} to mute master volume, {@code false} to turn mute off. 5530 * @throws SecurityException if {@code admin} is not a device or profile owner. 5531 */ setMasterVolumeMuted(@onNull ComponentName admin, boolean on)5532 public void setMasterVolumeMuted(@NonNull ComponentName admin, boolean on) { 5533 throwIfParentInstance("setMasterVolumeMuted"); 5534 if (mService != null) { 5535 try { 5536 mService.setMasterVolumeMuted(admin, on); 5537 } catch (RemoteException re) { 5538 throw re.rethrowFromSystemServer(); 5539 } 5540 } 5541 } 5542 5543 /** 5544 * Called by profile or device owners to check whether the master volume mute is on or off. 5545 * 5546 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5547 * @return {@code true} if master volume is muted, {@code false} if it's not. 5548 * @throws SecurityException if {@code admin} is not a device or profile owner. 5549 */ isMasterVolumeMuted(@onNull ComponentName admin)5550 public boolean isMasterVolumeMuted(@NonNull ComponentName admin) { 5551 throwIfParentInstance("isMasterVolumeMuted"); 5552 if (mService != null) { 5553 try { 5554 return mService.isMasterVolumeMuted(admin); 5555 } catch (RemoteException re) { 5556 throw re.rethrowFromSystemServer(); 5557 } 5558 } 5559 return false; 5560 } 5561 5562 /** 5563 * Called by profile or device owners to change whether a user can uninstall a package. 5564 * 5565 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5566 * @param packageName package to change. 5567 * @param uninstallBlocked true if the user shouldn't be able to uninstall the package. 5568 * @throws SecurityException if {@code admin} is not a device or profile owner. 5569 */ setUninstallBlocked(@onNull ComponentName admin, String packageName, boolean uninstallBlocked)5570 public void setUninstallBlocked(@NonNull ComponentName admin, String packageName, 5571 boolean uninstallBlocked) { 5572 throwIfParentInstance("setUninstallBlocked"); 5573 if (mService != null) { 5574 try { 5575 mService.setUninstallBlocked(admin, packageName, uninstallBlocked); 5576 } catch (RemoteException re) { 5577 throw re.rethrowFromSystemServer(); 5578 } 5579 } 5580 } 5581 5582 /** 5583 * Check whether the user has been blocked by device policy from uninstalling a package. 5584 * Requires the caller to be the profile owner if checking a specific admin's policy. 5585 * <p> 5586 * <strong>Note:</strong> Starting from {@link android.os.Build.VERSION_CODES#LOLLIPOP_MR1}, the 5587 * behavior of this API is changed such that passing {@code null} as the {@code admin} parameter 5588 * will return if any admin has blocked the uninstallation. Before L MR1, passing {@code null} 5589 * will cause a NullPointerException to be raised. 5590 * 5591 * @param admin The name of the admin component whose blocking policy will be checked, or 5592 * {@code null} to check whether any admin has blocked the uninstallation. 5593 * @param packageName package to check. 5594 * @return true if uninstallation is blocked. 5595 * @throws SecurityException if {@code admin} is not a device or profile owner. 5596 */ isUninstallBlocked(@ullable ComponentName admin, String packageName)5597 public boolean isUninstallBlocked(@Nullable ComponentName admin, String packageName) { 5598 throwIfParentInstance("isUninstallBlocked"); 5599 if (mService != null) { 5600 try { 5601 return mService.isUninstallBlocked(admin, packageName); 5602 } catch (RemoteException re) { 5603 throw re.rethrowFromSystemServer(); 5604 } 5605 } 5606 return false; 5607 } 5608 5609 /** 5610 * Called by the profile owner of a managed profile to enable widget providers from a given 5611 * package to be available in the parent profile. As a result the user will be able to add 5612 * widgets from the white-listed package running under the profile to a widget host which runs 5613 * under the parent profile, for example the home screen. Note that a package may have zero or 5614 * more provider components, where each component provides a different widget type. 5615 * <p> 5616 * <strong>Note:</strong> By default no widget provider package is white-listed. 5617 * 5618 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5619 * @param packageName The package from which widget providers are white-listed. 5620 * @return Whether the package was added. 5621 * @throws SecurityException if {@code admin} is not a profile owner. 5622 * @see #removeCrossProfileWidgetProvider(android.content.ComponentName, String) 5623 * @see #getCrossProfileWidgetProviders(android.content.ComponentName) 5624 */ addCrossProfileWidgetProvider(@onNull ComponentName admin, String packageName)5625 public boolean addCrossProfileWidgetProvider(@NonNull ComponentName admin, String packageName) { 5626 throwIfParentInstance("addCrossProfileWidgetProvider"); 5627 if (mService != null) { 5628 try { 5629 return mService.addCrossProfileWidgetProvider(admin, packageName); 5630 } catch (RemoteException re) { 5631 throw re.rethrowFromSystemServer(); 5632 } 5633 } 5634 return false; 5635 } 5636 5637 /** 5638 * Called by the profile owner of a managed profile to disable widget providers from a given 5639 * package to be available in the parent profile. For this method to take effect the package 5640 * should have been added via 5641 * {@link #addCrossProfileWidgetProvider( android.content.ComponentName, String)}. 5642 * <p> 5643 * <strong>Note:</strong> By default no widget provider package is white-listed. 5644 * 5645 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5646 * @param packageName The package from which widget providers are no longer white-listed. 5647 * @return Whether the package was removed. 5648 * @throws SecurityException if {@code admin} is not a profile owner. 5649 * @see #addCrossProfileWidgetProvider(android.content.ComponentName, String) 5650 * @see #getCrossProfileWidgetProviders(android.content.ComponentName) 5651 */ removeCrossProfileWidgetProvider( @onNull ComponentName admin, String packageName)5652 public boolean removeCrossProfileWidgetProvider( 5653 @NonNull ComponentName admin, String packageName) { 5654 throwIfParentInstance("removeCrossProfileWidgetProvider"); 5655 if (mService != null) { 5656 try { 5657 return mService.removeCrossProfileWidgetProvider(admin, packageName); 5658 } catch (RemoteException re) { 5659 throw re.rethrowFromSystemServer(); 5660 } 5661 } 5662 return false; 5663 } 5664 5665 /** 5666 * Called by the profile owner of a managed profile to query providers from which packages are 5667 * available in the parent profile. 5668 * 5669 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5670 * @return The white-listed package list. 5671 * @see #addCrossProfileWidgetProvider(android.content.ComponentName, String) 5672 * @see #removeCrossProfileWidgetProvider(android.content.ComponentName, String) 5673 * @throws SecurityException if {@code admin} is not a profile owner. 5674 */ getCrossProfileWidgetProviders(@onNull ComponentName admin)5675 public List<String> getCrossProfileWidgetProviders(@NonNull ComponentName admin) { 5676 throwIfParentInstance("getCrossProfileWidgetProviders"); 5677 if (mService != null) { 5678 try { 5679 List<String> providers = mService.getCrossProfileWidgetProviders(admin); 5680 if (providers != null) { 5681 return providers; 5682 } 5683 } catch (RemoteException re) { 5684 throw re.rethrowFromSystemServer(); 5685 } 5686 } 5687 return Collections.emptyList(); 5688 } 5689 5690 /** 5691 * Called by profile or device owners to set the user's photo. 5692 * 5693 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5694 * @param icon the bitmap to set as the photo. 5695 * @throws SecurityException if {@code admin} is not a device or profile owner. 5696 */ setUserIcon(@onNull ComponentName admin, Bitmap icon)5697 public void setUserIcon(@NonNull ComponentName admin, Bitmap icon) { 5698 throwIfParentInstance("setUserIcon"); 5699 try { 5700 mService.setUserIcon(admin, icon); 5701 } catch (RemoteException re) { 5702 throw re.rethrowFromSystemServer(); 5703 } 5704 } 5705 5706 /** 5707 * Called by device owners to set a local system update policy. When a new policy is set, 5708 * {@link #ACTION_SYSTEM_UPDATE_POLICY_CHANGED} is broadcasted. 5709 * 5710 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. All 5711 * components in the device owner package can set system update policies and the most 5712 * recent policy takes effect. 5713 * @param policy the new policy, or {@code null} to clear the current policy. 5714 * @throws SecurityException if {@code admin} is not a device owner. 5715 * @see SystemUpdatePolicy 5716 */ setSystemUpdatePolicy(@onNull ComponentName admin, SystemUpdatePolicy policy)5717 public void setSystemUpdatePolicy(@NonNull ComponentName admin, SystemUpdatePolicy policy) { 5718 throwIfParentInstance("setSystemUpdatePolicy"); 5719 if (mService != null) { 5720 try { 5721 mService.setSystemUpdatePolicy(admin, policy); 5722 } catch (RemoteException re) { 5723 throw re.rethrowFromSystemServer(); 5724 } 5725 } 5726 } 5727 5728 /** 5729 * Retrieve a local system update policy set previously by {@link #setSystemUpdatePolicy}. 5730 * 5731 * @return The current policy object, or {@code null} if no policy is set. 5732 */ getSystemUpdatePolicy()5733 public SystemUpdatePolicy getSystemUpdatePolicy() { 5734 throwIfParentInstance("getSystemUpdatePolicy"); 5735 if (mService != null) { 5736 try { 5737 return mService.getSystemUpdatePolicy(); 5738 } catch (RemoteException re) { 5739 throw re.rethrowFromSystemServer(); 5740 } 5741 } 5742 return null; 5743 } 5744 5745 /** 5746 * Called by a device owner to disable the keyguard altogether. 5747 * <p> 5748 * Setting the keyguard to disabled has the same effect as choosing "None" as the screen lock 5749 * type. However, this call has no effect if a password, pin or pattern is currently set. If a 5750 * password, pin or pattern is set after the keyguard was disabled, the keyguard stops being 5751 * disabled. 5752 * 5753 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5754 * @param disabled {@code true} disables the keyguard, {@code false} reenables it. 5755 * @return {@code false} if attempting to disable the keyguard while a lock password was in 5756 * place. {@code true} otherwise. 5757 * @throws SecurityException if {@code admin} is not a device owner. 5758 */ setKeyguardDisabled(@onNull ComponentName admin, boolean disabled)5759 public boolean setKeyguardDisabled(@NonNull ComponentName admin, boolean disabled) { 5760 throwIfParentInstance("setKeyguardDisabled"); 5761 try { 5762 return mService.setKeyguardDisabled(admin, disabled); 5763 } catch (RemoteException re) { 5764 throw re.rethrowFromSystemServer(); 5765 } 5766 } 5767 5768 /** 5769 * Called by device owner to disable the status bar. Disabling the status bar blocks 5770 * notifications, quick settings and other screen overlays that allow escaping from a single use 5771 * device. 5772 * 5773 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 5774 * @param disabled {@code true} disables the status bar, {@code false} reenables it. 5775 * @return {@code false} if attempting to disable the status bar failed. {@code true} otherwise. 5776 * @throws SecurityException if {@code admin} is not a device owner. 5777 */ setStatusBarDisabled(@onNull ComponentName admin, boolean disabled)5778 public boolean setStatusBarDisabled(@NonNull ComponentName admin, boolean disabled) { 5779 throwIfParentInstance("setStatusBarDisabled"); 5780 try { 5781 return mService.setStatusBarDisabled(admin, disabled); 5782 } catch (RemoteException re) { 5783 throw re.rethrowFromSystemServer(); 5784 } 5785 } 5786 5787 /** 5788 * Callable by the system update service to notify device owners about pending updates. 5789 * The caller must hold {@link android.Manifest.permission#NOTIFY_PENDING_SYSTEM_UPDATE} 5790 * permission. 5791 * 5792 * @param updateReceivedTime The time as given by {@link System#currentTimeMillis()} indicating 5793 * when the current pending update was first available. -1 if no update is available. 5794 * @hide 5795 */ 5796 @SystemApi notifyPendingSystemUpdate(long updateReceivedTime)5797 public void notifyPendingSystemUpdate(long updateReceivedTime) { 5798 throwIfParentInstance("notifyPendingSystemUpdate"); 5799 if (mService != null) { 5800 try { 5801 mService.notifyPendingSystemUpdate(updateReceivedTime); 5802 } catch (RemoteException re) { 5803 throw re.rethrowFromSystemServer(); 5804 } 5805 } 5806 } 5807 5808 /** 5809 * Called by profile or device owners to set the default response for future runtime permission 5810 * requests by applications. The policy can allow for normal operation which prompts the user to 5811 * grant a permission, or can allow automatic granting or denying of runtime permission requests 5812 * by an application. This also applies to new permissions declared by app updates. When a 5813 * permission is denied or granted this way, the effect is equivalent to setting the permission 5814 * grant state via {@link #setPermissionGrantState}. 5815 * <p/> 5816 * As this policy only acts on runtime permission requests, it only applies to applications 5817 * built with a {@code targetSdkVersion} of {@link android.os.Build.VERSION_CODES#M} or later. 5818 * 5819 * @param admin Which profile or device owner this request is associated with. 5820 * @param policy One of the policy constants {@link #PERMISSION_POLICY_PROMPT}, 5821 * {@link #PERMISSION_POLICY_AUTO_GRANT} and {@link #PERMISSION_POLICY_AUTO_DENY}. 5822 * @throws SecurityException if {@code admin} is not a device or profile owner. 5823 * @see #setPermissionGrantState 5824 */ setPermissionPolicy(@onNull ComponentName admin, int policy)5825 public void setPermissionPolicy(@NonNull ComponentName admin, int policy) { 5826 throwIfParentInstance("setPermissionPolicy"); 5827 try { 5828 mService.setPermissionPolicy(admin, policy); 5829 } catch (RemoteException re) { 5830 throw re.rethrowFromSystemServer(); 5831 } 5832 } 5833 5834 /** 5835 * Returns the current runtime permission policy set by the device or profile owner. The 5836 * default is {@link #PERMISSION_POLICY_PROMPT}. 5837 * @param admin Which profile or device owner this request is associated with. 5838 * @return the current policy for future permission requests. 5839 */ getPermissionPolicy(ComponentName admin)5840 public int getPermissionPolicy(ComponentName admin) { 5841 throwIfParentInstance("getPermissionPolicy"); 5842 try { 5843 return mService.getPermissionPolicy(admin); 5844 } catch (RemoteException re) { 5845 throw re.rethrowFromSystemServer(); 5846 } 5847 } 5848 5849 /** 5850 * Sets the grant state of a runtime permission for a specific application. The state can be 5851 * {@link #PERMISSION_GRANT_STATE_DEFAULT default} in which a user can manage it through the UI, 5852 * {@link #PERMISSION_GRANT_STATE_DENIED denied}, in which the permission is denied and the user 5853 * cannot manage it through the UI, and {@link #PERMISSION_GRANT_STATE_GRANTED granted} in which 5854 * the permission is granted and the user cannot manage it through the UI. This might affect all 5855 * permissions in a group that the runtime permission belongs to. This method can only be called 5856 * by a profile or device owner. 5857 * <p/> 5858 * Setting the grant state to {@link #PERMISSION_GRANT_STATE_DEFAULT default} does not revoke 5859 * the permission. It retains the previous grant, if any. 5860 * <p/> 5861 * Permissions can be granted or revoked only for applications built with a 5862 * {@code targetSdkVersion} of {@link android.os.Build.VERSION_CODES#M} or later. 5863 * 5864 * @param admin Which profile or device owner this request is associated with. 5865 * @param packageName The application to grant or revoke a permission to. 5866 * @param permission The permission to grant or revoke. 5867 * @param grantState The permission grant state which is one of 5868 * {@link #PERMISSION_GRANT_STATE_DENIED}, {@link #PERMISSION_GRANT_STATE_DEFAULT}, 5869 * {@link #PERMISSION_GRANT_STATE_GRANTED}, 5870 * @return whether the permission was successfully granted or revoked. 5871 * @throws SecurityException if {@code admin} is not a device or profile owner. 5872 * @see #PERMISSION_GRANT_STATE_DENIED 5873 * @see #PERMISSION_GRANT_STATE_DEFAULT 5874 * @see #PERMISSION_GRANT_STATE_GRANTED 5875 */ setPermissionGrantState(@onNull ComponentName admin, String packageName, String permission, int grantState)5876 public boolean setPermissionGrantState(@NonNull ComponentName admin, String packageName, 5877 String permission, int grantState) { 5878 throwIfParentInstance("setPermissionGrantState"); 5879 try { 5880 return mService.setPermissionGrantState(admin, packageName, permission, grantState); 5881 } catch (RemoteException re) { 5882 throw re.rethrowFromSystemServer(); 5883 } 5884 } 5885 5886 /** 5887 * Returns the current grant state of a runtime permission for a specific application. 5888 * 5889 * @param admin Which profile or device owner this request is associated with. 5890 * @param packageName The application to check the grant state for. 5891 * @param permission The permission to check for. 5892 * @return the current grant state specified by device policy. If the profile or device owner 5893 * has not set a grant state, the return value is 5894 * {@link #PERMISSION_GRANT_STATE_DEFAULT}. This does not indicate whether or not the 5895 * permission is currently granted for the package. 5896 * <p/> 5897 * If a grant state was set by the profile or device owner, then the return value will 5898 * be one of {@link #PERMISSION_GRANT_STATE_DENIED} or 5899 * {@link #PERMISSION_GRANT_STATE_GRANTED}, which indicates if the permission is 5900 * currently denied or granted. 5901 * @throws SecurityException if {@code admin} is not a device or profile owner. 5902 * @see #setPermissionGrantState(ComponentName, String, String, int) 5903 * @see PackageManager#checkPermission(String, String) 5904 */ getPermissionGrantState(@onNull ComponentName admin, String packageName, String permission)5905 public int getPermissionGrantState(@NonNull ComponentName admin, String packageName, 5906 String permission) { 5907 throwIfParentInstance("getPermissionGrantState"); 5908 try { 5909 return mService.getPermissionGrantState(admin, packageName, permission); 5910 } catch (RemoteException re) { 5911 throw re.rethrowFromSystemServer(); 5912 } 5913 } 5914 5915 /** 5916 * Returns if provisioning a managed profile or device is possible or not. 5917 * @param action One of {@link #ACTION_PROVISION_MANAGED_DEVICE}, 5918 * {@link #ACTION_PROVISION_MANAGED_PROFILE}. 5919 * @return if provisioning a managed profile or device is possible or not. 5920 * @throws IllegalArgumentException if the supplied action is not valid. 5921 */ isProvisioningAllowed(String action)5922 public boolean isProvisioningAllowed(String action) { 5923 throwIfParentInstance("isProvisioningAllowed"); 5924 try { 5925 return mService.isProvisioningAllowed(action); 5926 } catch (RemoteException re) { 5927 throw re.rethrowFromSystemServer(); 5928 } 5929 } 5930 5931 /** 5932 * Return if this user is a managed profile of another user. An admin can become the profile 5933 * owner of a managed profile with {@link #ACTION_PROVISION_MANAGED_PROFILE} and of a managed 5934 * user with {@link #createAndManageUser} 5935 * @param admin Which profile owner this request is associated with. 5936 * @return if this user is a managed profile of another user. 5937 */ isManagedProfile(@onNull ComponentName admin)5938 public boolean isManagedProfile(@NonNull ComponentName admin) { 5939 throwIfParentInstance("isManagedProfile"); 5940 try { 5941 return mService.isManagedProfile(admin); 5942 } catch (RemoteException re) { 5943 throw re.rethrowFromSystemServer(); 5944 } 5945 } 5946 5947 /** 5948 * @hide 5949 * Return if this user is a system-only user. An admin can manage a device from a system only 5950 * user by calling {@link #ACTION_PROVISION_MANAGED_SHAREABLE_DEVICE}. 5951 * @param admin Which device owner this request is associated with. 5952 * @return if this user is a system-only user. 5953 */ isSystemOnlyUser(@onNull ComponentName admin)5954 public boolean isSystemOnlyUser(@NonNull ComponentName admin) { 5955 try { 5956 return mService.isSystemOnlyUser(admin); 5957 } catch (RemoteException re) { 5958 throw re.rethrowFromSystemServer(); 5959 } 5960 } 5961 5962 /** 5963 * Called by device owner to get the MAC address of the Wi-Fi device. 5964 * 5965 * @param admin Which device owner this request is associated with. 5966 * @return the MAC address of the Wi-Fi device, or null when the information is not available. 5967 * (For example, Wi-Fi hasn't been enabled, or the device doesn't support Wi-Fi.) 5968 * <p> 5969 * The address will be in the {@code XX:XX:XX:XX:XX:XX} format. 5970 * @throws SecurityException if {@code admin} is not a device owner. 5971 */ getWifiMacAddress(@onNull ComponentName admin)5972 public String getWifiMacAddress(@NonNull ComponentName admin) { 5973 throwIfParentInstance("getWifiMacAddress"); 5974 try { 5975 return mService.getWifiMacAddress(admin); 5976 } catch (RemoteException re) { 5977 throw re.rethrowFromSystemServer(); 5978 } 5979 } 5980 5981 /** 5982 * Called by device owner to reboot the device. If there is an ongoing call on the device, 5983 * throws an {@link IllegalStateException}. 5984 * @param admin Which device owner the request is associated with. 5985 * @throws IllegalStateException if device has an ongoing call. 5986 * @throws SecurityException if {@code admin} is not a device owner. 5987 * @see TelephonyManager#CALL_STATE_IDLE 5988 */ reboot(@onNull ComponentName admin)5989 public void reboot(@NonNull ComponentName admin) { 5990 throwIfParentInstance("reboot"); 5991 try { 5992 mService.reboot(admin); 5993 } catch (RemoteException re) { 5994 throw re.rethrowFromSystemServer(); 5995 } 5996 } 5997 5998 /** 5999 * Called by a device admin to set the short support message. This will be displayed to the user 6000 * in settings screens where funtionality has been disabled by the admin. The message should be 6001 * limited to a short statement such as "This setting is disabled by your administrator. Contact 6002 * someone@example.com for support." If the message is longer than 200 characters it may be 6003 * truncated. 6004 * <p> 6005 * If the short support message needs to be localized, it is the responsibility of the 6006 * {@link DeviceAdminReceiver} to listen to the {@link Intent#ACTION_LOCALE_CHANGED} broadcast 6007 * and set a new version of this string accordingly. 6008 * 6009 * @see #setLongSupportMessage 6010 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 6011 * @param message Short message to be displayed to the user in settings or null to clear the 6012 * existing message. 6013 * @throws SecurityException if {@code admin} is not an active administrator. 6014 */ setShortSupportMessage(@onNull ComponentName admin, @Nullable CharSequence message)6015 public void setShortSupportMessage(@NonNull ComponentName admin, 6016 @Nullable CharSequence message) { 6017 throwIfParentInstance("setShortSupportMessage"); 6018 if (mService != null) { 6019 try { 6020 mService.setShortSupportMessage(admin, message); 6021 } catch (RemoteException e) { 6022 throw e.rethrowFromSystemServer(); 6023 } 6024 } 6025 } 6026 6027 /** 6028 * Called by a device admin to get the short support message. 6029 * 6030 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 6031 * @return The message set by {@link #setShortSupportMessage(ComponentName, CharSequence)} or 6032 * null if no message has been set. 6033 * @throws SecurityException if {@code admin} is not an active administrator. 6034 */ getShortSupportMessage(@onNull ComponentName admin)6035 public CharSequence getShortSupportMessage(@NonNull ComponentName admin) { 6036 throwIfParentInstance("getShortSupportMessage"); 6037 if (mService != null) { 6038 try { 6039 return mService.getShortSupportMessage(admin); 6040 } catch (RemoteException e) { 6041 throw e.rethrowFromSystemServer(); 6042 } 6043 } 6044 return null; 6045 } 6046 6047 /** 6048 * Called by a device admin to set the long support message. This will be displayed to the user 6049 * in the device administators settings screen. 6050 * <p> 6051 * If the long support message needs to be localized, it is the responsibility of the 6052 * {@link DeviceAdminReceiver} to listen to the {@link Intent#ACTION_LOCALE_CHANGED} broadcast 6053 * and set a new version of this string accordingly. 6054 * 6055 * @see #setShortSupportMessage 6056 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 6057 * @param message Long message to be displayed to the user in settings or null to clear the 6058 * existing message. 6059 * @throws SecurityException if {@code admin} is not an active administrator. 6060 */ setLongSupportMessage(@onNull ComponentName admin, @Nullable CharSequence message)6061 public void setLongSupportMessage(@NonNull ComponentName admin, 6062 @Nullable CharSequence message) { 6063 throwIfParentInstance("setLongSupportMessage"); 6064 if (mService != null) { 6065 try { 6066 mService.setLongSupportMessage(admin, message); 6067 } catch (RemoteException e) { 6068 throw e.rethrowFromSystemServer(); 6069 } 6070 } 6071 } 6072 6073 /** 6074 * Called by a device admin to get the long support message. 6075 * 6076 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 6077 * @return The message set by {@link #setLongSupportMessage(ComponentName, CharSequence)} or 6078 * null if no message has been set. 6079 * @throws SecurityException if {@code admin} is not an active administrator. 6080 */ getLongSupportMessage(@onNull ComponentName admin)6081 public CharSequence getLongSupportMessage(@NonNull ComponentName admin) { 6082 throwIfParentInstance("getLongSupportMessage"); 6083 if (mService != null) { 6084 try { 6085 return mService.getLongSupportMessage(admin); 6086 } catch (RemoteException e) { 6087 throw e.rethrowFromSystemServer(); 6088 } 6089 } 6090 return null; 6091 } 6092 6093 /** 6094 * Called by the system to get the short support message. 6095 * 6096 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 6097 * @param userHandle user id the admin is running as. 6098 * @return The message set by {@link #setShortSupportMessage(ComponentName, CharSequence)} 6099 * 6100 * @hide 6101 */ getShortSupportMessageForUser(@onNull ComponentName admin, int userHandle)6102 public CharSequence getShortSupportMessageForUser(@NonNull ComponentName admin, 6103 int userHandle) { 6104 if (mService != null) { 6105 try { 6106 return mService.getShortSupportMessageForUser(admin, userHandle); 6107 } catch (RemoteException e) { 6108 throw e.rethrowFromSystemServer(); 6109 } 6110 } 6111 return null; 6112 } 6113 6114 6115 /** 6116 * Called by the system to get the long support message. 6117 * 6118 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 6119 * @param userHandle user id the admin is running as. 6120 * @return The message set by {@link #setLongSupportMessage(ComponentName, CharSequence)} 6121 * 6122 * @hide 6123 */ getLongSupportMessageForUser(@onNull ComponentName admin, int userHandle)6124 public CharSequence getLongSupportMessageForUser(@NonNull ComponentName admin, int userHandle) { 6125 if (mService != null) { 6126 try { 6127 return mService.getLongSupportMessageForUser(admin, userHandle); 6128 } catch (RemoteException e) { 6129 throw e.rethrowFromSystemServer(); 6130 } 6131 } 6132 return null; 6133 } 6134 6135 /** 6136 * Called by the profile owner of a managed profile to obtain a {@link DevicePolicyManager} 6137 * whose calls act on the parent profile. 6138 * 6139 * <p>The following methods are supported for the parent instance, all other methods will 6140 * throw a SecurityException when called on the parent instance: 6141 * <ul> 6142 * <li>{@link #getPasswordQuality}</li> 6143 * <li>{@link #setPasswordQuality}</li> 6144 * <li>{@link #getPasswordMinimumLength}</li> 6145 * <li>{@link #setPasswordMinimumLength}</li> 6146 * <li>{@link #getPasswordMinimumUpperCase}</li> 6147 * <li>{@link #setPasswordMinimumUpperCase}</li> 6148 * <li>{@link #getPasswordMinimumLowerCase}</li> 6149 * <li>{@link #setPasswordMinimumLowerCase}</li> 6150 * <li>{@link #getPasswordMinimumLetters}</li> 6151 * <li>{@link #setPasswordMinimumLetters}</li> 6152 * <li>{@link #getPasswordMinimumNumeric}</li> 6153 * <li>{@link #setPasswordMinimumNumeric}</li> 6154 * <li>{@link #getPasswordMinimumSymbols}</li> 6155 * <li>{@link #setPasswordMinimumSymbols}</li> 6156 * <li>{@link #getPasswordMinimumNonLetter}</li> 6157 * <li>{@link #setPasswordMinimumNonLetter}</li> 6158 * <li>{@link #getPasswordHistoryLength}</li> 6159 * <li>{@link #setPasswordHistoryLength}</li> 6160 * <li>{@link #getPasswordExpirationTimeout}</li> 6161 * <li>{@link #setPasswordExpirationTimeout}</li> 6162 * <li>{@link #getPasswordExpiration}</li> 6163 * <li>{@link #isActivePasswordSufficient}</li> 6164 * <li>{@link #getCurrentFailedPasswordAttempts}</li> 6165 * <li>{@link #getMaximumFailedPasswordsForWipe}</li> 6166 * <li>{@link #setMaximumFailedPasswordsForWipe}</li> 6167 * <li>{@link #getMaximumTimeToLock}</li> 6168 * <li>{@link #setMaximumTimeToLock}</li> 6169 * <li>{@link #lockNow}</li> 6170 * <li>{@link #getKeyguardDisabledFeatures}</li> 6171 * <li>{@link #setKeyguardDisabledFeatures}</li> 6172 * <li>{@link #getTrustAgentConfiguration}</li> 6173 * <li>{@link #setTrustAgentConfiguration}</li> 6174 * </ul> 6175 * 6176 * @return a new instance of {@link DevicePolicyManager} that acts on the parent profile. 6177 * @throws SecurityException if {@code admin} is not a profile owner. 6178 */ getParentProfileInstance(@onNull ComponentName admin)6179 public DevicePolicyManager getParentProfileInstance(@NonNull ComponentName admin) { 6180 throwIfParentInstance("getParentProfileInstance"); 6181 try { 6182 if (!mService.isManagedProfile(admin)) { 6183 throw new SecurityException("The current user does not have a parent profile."); 6184 } 6185 return new DevicePolicyManager(mContext, true); 6186 } catch (RemoteException e) { 6187 throw e.rethrowFromSystemServer(); 6188 } 6189 } 6190 6191 /** 6192 * Called by device owner to control the security logging feature. Logging can only be 6193 * enabled on single user devices where the sole user is managed by the device owner. 6194 * 6195 * <p> Security logs contain various information intended for security auditing purposes. 6196 * See {@link SecurityEvent} for details. 6197 * 6198 * <p>There must be only one user on the device, managed by the device owner. 6199 * Otherwise a {@link SecurityException} will be thrown. 6200 * 6201 * @param admin Which device owner this request is associated with. 6202 * @param enabled whether security logging should be enabled or not. 6203 * @throws SecurityException if {@code admin} is not a device owner. 6204 * @see #retrieveSecurityLogs 6205 */ setSecurityLoggingEnabled(@onNull ComponentName admin, boolean enabled)6206 public void setSecurityLoggingEnabled(@NonNull ComponentName admin, boolean enabled) { 6207 throwIfParentInstance("setSecurityLoggingEnabled"); 6208 try { 6209 mService.setSecurityLoggingEnabled(admin, enabled); 6210 } catch (RemoteException re) { 6211 throw re.rethrowFromSystemServer(); 6212 } 6213 } 6214 6215 /** 6216 * Return whether security logging is enabled or not by the device owner. 6217 * 6218 * <p>Can only be called by the device owner, otherwise a {@link SecurityException} will be 6219 * thrown. 6220 * 6221 * @param admin Which device owner this request is associated with. 6222 * @return {@code true} if security logging is enabled by device owner, {@code false} otherwise. 6223 * @throws SecurityException if {@code admin} is not a device owner. 6224 */ isSecurityLoggingEnabled(@onNull ComponentName admin)6225 public boolean isSecurityLoggingEnabled(@NonNull ComponentName admin) { 6226 throwIfParentInstance("isSecurityLoggingEnabled"); 6227 try { 6228 return mService.isSecurityLoggingEnabled(admin); 6229 } catch (RemoteException re) { 6230 throw re.rethrowFromSystemServer(); 6231 } 6232 } 6233 6234 /** 6235 * Called by device owner to retrieve all new security logging entries since the last call to 6236 * this API after device boots. 6237 * 6238 * <p> Access to the logs is rate limited and it will only return new logs after the device 6239 * owner has been notified via {@link DeviceAdminReceiver#onSecurityLogsAvailable}. 6240 * 6241 * <p>There must be only one user on the device, managed by the device owner. 6242 * Otherwise a {@link SecurityException} will be thrown. 6243 * 6244 * @param admin Which device owner this request is associated with. 6245 * @return the new batch of security logs which is a list of {@link SecurityEvent}, 6246 * or {@code null} if rate limitation is exceeded or if logging is currently disabled. 6247 * @throws SecurityException if {@code admin} is not a device owner. 6248 */ retrieveSecurityLogs(@onNull ComponentName admin)6249 public List<SecurityEvent> retrieveSecurityLogs(@NonNull ComponentName admin) { 6250 throwIfParentInstance("retrieveSecurityLogs"); 6251 try { 6252 ParceledListSlice<SecurityEvent> list = mService.retrieveSecurityLogs(admin); 6253 if (list != null) { 6254 return list.getList(); 6255 } else { 6256 // Rate limit exceeded. 6257 return null; 6258 } 6259 } catch (RemoteException re) { 6260 throw re.rethrowFromSystemServer(); 6261 } 6262 } 6263 6264 /** 6265 * Called by the system to obtain a {@link DevicePolicyManager} whose calls act on the parent 6266 * profile. 6267 * 6268 * @hide 6269 */ getParentProfileInstance(UserInfo uInfo)6270 public DevicePolicyManager getParentProfileInstance(UserInfo uInfo) { 6271 mContext.checkSelfPermission( 6272 android.Manifest.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS); 6273 if (!uInfo.isManagedProfile()) { 6274 throw new SecurityException("The user " + uInfo.id 6275 + " does not have a parent profile."); 6276 } 6277 return new DevicePolicyManager(mContext, true); 6278 } 6279 6280 /** 6281 * Called by device owners to retrieve device logs from before the device's last reboot. 6282 * <p> 6283 * <strong> This API is not supported on all devices. Calling this API on unsupported devices 6284 * will result in {@code null} being returned. The device logs are retrieved from a RAM region 6285 * which is not guaranteed to be corruption-free during power cycles, as a result be cautious 6286 * about data corruption when parsing. </strong> 6287 * <p> 6288 * There must be only one user on the device, managed by the device owner. Otherwise a 6289 * {@link SecurityException} will be thrown. 6290 * 6291 * @param admin Which device owner this request is associated with. 6292 * @return Device logs from before the latest reboot of the system, or {@code null} if this API 6293 * is not supported on the device. 6294 * @throws SecurityException if {@code admin} is not a device owner. 6295 */ retrievePreRebootSecurityLogs(@onNull ComponentName admin)6296 public List<SecurityEvent> retrievePreRebootSecurityLogs(@NonNull ComponentName admin) { 6297 throwIfParentInstance("retrievePreRebootSecurityLogs"); 6298 try { 6299 ParceledListSlice<SecurityEvent> list = mService.retrievePreRebootSecurityLogs(admin); 6300 if (list != null) { 6301 return list.getList(); 6302 } else { 6303 return null; 6304 } 6305 } catch (RemoteException re) { 6306 throw re.rethrowFromSystemServer(); 6307 } 6308 } 6309 6310 /** 6311 * Called by a profile owner of a managed profile to set the color used for customization. This 6312 * color is used as background color of the confirm credentials screen for that user. The 6313 * default color is teal (#00796B). 6314 * <p> 6315 * The confirm credentials screen can be created using 6316 * {@link android.app.KeyguardManager#createConfirmDeviceCredentialIntent}. 6317 * 6318 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 6319 * @param color The 24bit (0xRRGGBB) representation of the color to be used. 6320 * @throws SecurityException if {@code admin} is not a profile owner. 6321 */ setOrganizationColor(@onNull ComponentName admin, int color)6322 public void setOrganizationColor(@NonNull ComponentName admin, int color) { 6323 throwIfParentInstance("setOrganizationColor"); 6324 try { 6325 // always enforce alpha channel to have 100% opacity 6326 color |= 0xFF000000; 6327 mService.setOrganizationColor(admin, color); 6328 } catch (RemoteException re) { 6329 throw re.rethrowFromSystemServer(); 6330 } 6331 } 6332 6333 /** 6334 * @hide 6335 * 6336 * Sets the color used for customization. 6337 * 6338 * @param color The 24bit (0xRRGGBB) representation of the color to be used. 6339 * @param userId which user to set the color to. 6340 * @RequiresPermission(allOf = { 6341 * Manifest.permission.MANAGE_USERS, 6342 * Manifest.permission.INTERACT_ACROSS_USERS_FULL}) 6343 */ setOrganizationColorForUser(@olorInt int color, @UserIdInt int userId)6344 public void setOrganizationColorForUser(@ColorInt int color, @UserIdInt int userId) { 6345 try { 6346 // always enforce alpha channel to have 100% opacity 6347 color |= 0xFF000000; 6348 mService.setOrganizationColorForUser(color, userId); 6349 } catch (RemoteException re) { 6350 throw re.rethrowFromSystemServer(); 6351 } 6352 } 6353 6354 /** 6355 * Called by a profile owner of a managed profile to retrieve the color used for customization. 6356 * This color is used as background color of the confirm credentials screen for that user. 6357 * 6358 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 6359 * @return The 24bit (0xRRGGBB) representation of the color to be used. 6360 * @throws SecurityException if {@code admin} is not a profile owner. 6361 */ getOrganizationColor(@onNull ComponentName admin)6362 public @ColorInt int getOrganizationColor(@NonNull ComponentName admin) { 6363 throwIfParentInstance("getOrganizationColor"); 6364 try { 6365 return mService.getOrganizationColor(admin); 6366 } catch (RemoteException re) { 6367 throw re.rethrowFromSystemServer(); 6368 } 6369 } 6370 6371 /** 6372 * @hide 6373 * Retrieve the customization color for a given user. 6374 * 6375 * @param userHandle The user id of the user we're interested in. 6376 * @return The 24bit (0xRRGGBB) representation of the color to be used. 6377 */ getOrganizationColorForUser(int userHandle)6378 public @ColorInt int getOrganizationColorForUser(int userHandle) { 6379 try { 6380 return mService.getOrganizationColorForUser(userHandle); 6381 } catch (RemoteException re) { 6382 throw re.rethrowFromSystemServer(); 6383 } 6384 } 6385 6386 /** 6387 * Called by a profile owner of a managed profile to set the name of the organization under 6388 * management. 6389 * <p> 6390 * If the organization name needs to be localized, it is the responsibility of the 6391 * {@link DeviceAdminReceiver} to listen to the {@link Intent#ACTION_LOCALE_CHANGED} broadcast 6392 * and set a new version of this string accordingly. 6393 * 6394 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 6395 * @param title The organization name or {@code null} to clear a previously set name. 6396 * @throws SecurityException if {@code admin} is not a profile owner. 6397 */ setOrganizationName(@onNull ComponentName admin, @Nullable CharSequence title)6398 public void setOrganizationName(@NonNull ComponentName admin, @Nullable CharSequence title) { 6399 throwIfParentInstance("setOrganizationName"); 6400 try { 6401 mService.setOrganizationName(admin, title); 6402 } catch (RemoteException re) { 6403 throw re.rethrowFromSystemServer(); 6404 } 6405 } 6406 6407 /** 6408 * Called by a profile owner of a managed profile to retrieve the name of the organization under 6409 * management. 6410 * 6411 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 6412 * @return The organization name or {@code null} if none is set. 6413 * @throws SecurityException if {@code admin} is not a profile owner. 6414 */ getOrganizationName(@onNull ComponentName admin)6415 public CharSequence getOrganizationName(@NonNull ComponentName admin) { 6416 throwIfParentInstance("getOrganizationName"); 6417 try { 6418 return mService.getOrganizationName(admin); 6419 } catch (RemoteException re) { 6420 throw re.rethrowFromSystemServer(); 6421 } 6422 } 6423 6424 /** 6425 * Retrieve the default title message used in the confirm credentials screen for a given user. 6426 * 6427 * @param userHandle The user id of the user we're interested in. 6428 * @return The organization name or {@code null} if none is set. 6429 * 6430 * @hide 6431 */ getOrganizationNameForUser(int userHandle)6432 public CharSequence getOrganizationNameForUser(int userHandle) { 6433 try { 6434 return mService.getOrganizationNameForUser(userHandle); 6435 } catch (RemoteException re) { 6436 throw re.rethrowFromSystemServer(); 6437 } 6438 } 6439 6440 /** 6441 * @return the {@link UserProvisioningState} for the current user - for unmanaged users will 6442 * return {@link #STATE_USER_UNMANAGED} 6443 * @hide 6444 */ 6445 @SystemApi 6446 @UserProvisioningState getUserProvisioningState()6447 public int getUserProvisioningState() { 6448 throwIfParentInstance("getUserProvisioningState"); 6449 if (mService != null) { 6450 try { 6451 return mService.getUserProvisioningState(); 6452 } catch (RemoteException e) { 6453 throw e.rethrowFromSystemServer(); 6454 } 6455 } 6456 return STATE_USER_UNMANAGED; 6457 } 6458 6459 /** 6460 * Set the {@link UserProvisioningState} for the supplied user, if they are managed. 6461 * 6462 * @param state to store 6463 * @param userHandle for user 6464 * @hide 6465 */ setUserProvisioningState(@serProvisioningState int state, int userHandle)6466 public void setUserProvisioningState(@UserProvisioningState int state, int userHandle) { 6467 if (mService != null) { 6468 try { 6469 mService.setUserProvisioningState(state, userHandle); 6470 } catch (RemoteException e) { 6471 throw e.rethrowFromSystemServer(); 6472 } 6473 } 6474 } 6475 6476 /** 6477 * @hide 6478 * Indicates the entity that controls the device or profile owner. A user/profile is considered 6479 * affiliated if it is managed by the same entity as the device. 6480 * 6481 * <p> By definition, the user that the device owner runs on is always affiliated. Any other 6482 * user/profile is considered affiliated if the following conditions are both met: 6483 * <ul> 6484 * <li>The device owner and the user's/profile's profile owner have called this method, 6485 * specifying a set of opaque affiliation ids each. If the sets specified by the device owner 6486 * and a profile owner intersect, they must have come from the same source, which means that 6487 * the device owner and profile owner are controlled by the same entity.</li> 6488 * <li>The device owner's and profile owner's package names are the same.</li> 6489 * </ul> 6490 * 6491 * @param admin Which profile or device owner this request is associated with. 6492 * @param ids A set of opaque affiliation ids. 6493 */ setAffiliationIds(@onNull ComponentName admin, Set<String> ids)6494 public void setAffiliationIds(@NonNull ComponentName admin, Set<String> ids) { 6495 throwIfParentInstance("setAffiliationIds"); 6496 try { 6497 mService.setAffiliationIds(admin, new ArrayList<String>(ids)); 6498 } catch (RemoteException e) { 6499 throw e.rethrowFromSystemServer(); 6500 } 6501 } 6502 6503 /** 6504 * @hide 6505 * Returns whether this user/profile is affiliated with the device. See 6506 * {@link #setAffiliationIds} for the definition of affiliation. 6507 * 6508 * @return whether this user/profile is affiliated with the device. 6509 */ isAffiliatedUser()6510 public boolean isAffiliatedUser() { 6511 throwIfParentInstance("isAffiliatedUser"); 6512 try { 6513 return mService != null && mService.isAffiliatedUser(); 6514 } catch (RemoteException e) { 6515 throw e.rethrowFromSystemServer(); 6516 } 6517 } 6518 6519 /** 6520 * @hide 6521 * Returns whether the uninstall for {@code packageName} for the current user is in queue 6522 * to be started 6523 * @param packageName the package to check for 6524 * @return whether the uninstall intent for {@code packageName} is pending 6525 */ isUninstallInQueue(String packageName)6526 public boolean isUninstallInQueue(String packageName) { 6527 try { 6528 return mService.isUninstallInQueue(packageName); 6529 } catch (RemoteException re) { 6530 throw re.rethrowFromSystemServer(); 6531 } 6532 } 6533 6534 /** 6535 * @hide 6536 * @param packageName the package containing active DAs to be uninstalled 6537 */ uninstallPackageWithActiveAdmins(String packageName)6538 public void uninstallPackageWithActiveAdmins(String packageName) { 6539 try { 6540 mService.uninstallPackageWithActiveAdmins(packageName); 6541 } catch (RemoteException re) { 6542 throw re.rethrowFromSystemServer(); 6543 } 6544 } 6545 6546 /** 6547 * @hide 6548 * Remove a test admin synchronously without sending it a broadcast about being removed. 6549 * If the admin is a profile owner or device owner it will still be removed. 6550 * 6551 * @param userHandle user id to remove the admin for. 6552 * @param admin The administration compononent to remove. 6553 * @throws SecurityException if the caller is not shell / root or the admin package 6554 * isn't a test application see {@link ApplicationInfo#FLAG_TEST_APP}. 6555 */ forceRemoveActiveAdmin(ComponentName adminReceiver, int userHandle)6556 public void forceRemoveActiveAdmin(ComponentName adminReceiver, int userHandle) { 6557 try { 6558 mService.forceRemoveActiveAdmin(adminReceiver, userHandle); 6559 } catch (RemoteException re) { 6560 throw re.rethrowFromSystemServer(); 6561 } 6562 } 6563 6564 /** 6565 * @hide 6566 * @return whether {@link android.provider.Settings.Global#DEVICE_PROVISIONED} has ever been set 6567 * to 1. 6568 */ isDeviceProvisioned()6569 public boolean isDeviceProvisioned() { 6570 try { 6571 return mService.isDeviceProvisioned(); 6572 } catch (RemoteException re) { 6573 throw re.rethrowFromSystemServer(); 6574 } 6575 } 6576 6577 /** 6578 * @hide 6579 * Writes that the provisioning configuration has been applied. 6580 */ setDeviceProvisioningConfigApplied()6581 public void setDeviceProvisioningConfigApplied() { 6582 try { 6583 mService.setDeviceProvisioningConfigApplied(); 6584 } catch (RemoteException re) { 6585 throw re.rethrowFromSystemServer(); 6586 } 6587 } 6588 6589 /** 6590 * @hide 6591 * @return whether the provisioning configuration has been applied. 6592 */ isDeviceProvisioningConfigApplied()6593 public boolean isDeviceProvisioningConfigApplied() { 6594 try { 6595 return mService.isDeviceProvisioningConfigApplied(); 6596 } catch (RemoteException re) { 6597 throw re.rethrowFromSystemServer(); 6598 } 6599 } 6600 throwIfParentInstance(String functionName)6601 private void throwIfParentInstance(String functionName) { 6602 if (mParentInstance) { 6603 throw new SecurityException(functionName + " cannot be called on the parent instance"); 6604 } 6605 } 6606 6607 /** 6608 * @hide 6609 * Enable backup service. 6610 * <p>This includes all backup and restore mechanisms. 6611 * Setting this to {@code false} will make backup service no-op or return empty results. 6612 * 6613 * <p>There must be only one user on the device, managed by the device owner. 6614 * Otherwise a {@link SecurityException} will be thrown. 6615 * 6616 * <p>Backup service is off by default when device owner is present. 6617 */ setBackupServiceEnabled(@onNull ComponentName admin, boolean enabled)6618 public void setBackupServiceEnabled(@NonNull ComponentName admin, boolean enabled) { 6619 try { 6620 mService.setBackupServiceEnabled(admin, enabled); 6621 } catch (RemoteException re) { 6622 throw re.rethrowFromSystemServer(); 6623 } 6624 } 6625 6626 /** 6627 * @hide 6628 * @return {@code true} if backup service is enabled, {@code false} otherwise. 6629 */ isBackupServiceEnabled(@onNull ComponentName admin)6630 public boolean isBackupServiceEnabled(@NonNull ComponentName admin) { 6631 try { 6632 return mService.isBackupServiceEnabled(admin); 6633 } catch (RemoteException re) { 6634 throw re.rethrowFromSystemServer(); 6635 } 6636 } 6637 6638 /** 6639 * Called by a device owner to control the network logging feature. Logging can only be 6640 * enabled on single user devices where the sole user is managed by the device owner. If a new 6641 * user is added on the device, logging is disabled. 6642 * 6643 * <p> Network logs contain DNS lookup and connect() library call events. 6644 * 6645 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 6646 * @param enabled whether network logging should be enabled or not. 6647 * @throws {@link SecurityException} if {@code admin} is not a device owner. 6648 * @see #retrieveNetworkLogs 6649 * 6650 * @hide 6651 */ setNetworkLoggingEnabled(@onNull ComponentName admin, boolean enabled)6652 public void setNetworkLoggingEnabled(@NonNull ComponentName admin, boolean enabled) { 6653 throwIfParentInstance("setNetworkLoggingEnabled"); 6654 try { 6655 mService.setNetworkLoggingEnabled(admin, enabled); 6656 } catch (RemoteException re) { 6657 throw re.rethrowFromSystemServer(); 6658 } 6659 } 6660 6661 /** 6662 * Return whether network logging is enabled by a device owner. 6663 * 6664 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. Can only 6665 * be {@code null} if the caller has MANAGE_USERS permission. 6666 * @return {@code true} if network logging is enabled by device owner, {@code false} otherwise. 6667 * @throws {@link SecurityException} if {@code admin} is not a device owner and caller has 6668 * no MANAGE_USERS permission 6669 * 6670 * @hide 6671 */ isNetworkLoggingEnabled(@ullable ComponentName admin)6672 public boolean isNetworkLoggingEnabled(@Nullable ComponentName admin) { 6673 throwIfParentInstance("isNetworkLoggingEnabled"); 6674 try { 6675 return mService.isNetworkLoggingEnabled(admin); 6676 } catch (RemoteException re) { 6677 throw re.rethrowFromSystemServer(); 6678 } 6679 } 6680 6681 /** 6682 * Called by device owner to retrieve the most recent batch of network logging events. 6683 * A device owner has to provide a batchToken provided as part of 6684 * {@link DeviceAdminReceiver#onNetworkLogsAvailable} callback. If the token doesn't match the 6685 * token of the most recent available batch of logs, {@code null} will be returned. 6686 * 6687 * <p> {@link NetworkEvent} can be one of {@link DnsEvent} or {@link ConnectEvent}. 6688 * 6689 * <p> The list of network events is sorted chronologically, and contains at most 1200 events. 6690 * 6691 * <p> Access to the logs is rate limited and this method will only return a new batch of logs 6692 * after the device device owner has been notified via 6693 * {@link DeviceAdminReceiver#onNetworkLogsAvailable}. 6694 * 6695 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. 6696 * @param batchToken A token of the batch to retrieve 6697 * @return A new batch of network logs which is a list of {@link NetworkEvent}. Returns 6698 * {@code null} if the batch represented by batchToken is no longer available or if 6699 * logging is disabled. 6700 * @throws {@link SecurityException} if {@code admin} is not a device owner. 6701 * @see DeviceAdminReceiver#onNetworkLogsAvailable 6702 * 6703 * @hide 6704 */ retrieveNetworkLogs(@onNull ComponentName admin, long batchToken)6705 public @Nullable List<NetworkEvent> retrieveNetworkLogs(@NonNull ComponentName admin, 6706 long batchToken) { 6707 throwIfParentInstance("retrieveNetworkLogs"); 6708 try { 6709 return mService.retrieveNetworkLogs(admin, batchToken); 6710 } catch (RemoteException re) { 6711 throw re.rethrowFromSystemServer(); 6712 } 6713 } 6714 } 6715