Loading core/api/current.txt +3 −0 Original line number Original line Diff line number Diff line Loading @@ -6943,6 +6943,7 @@ package android.app.admin { method @Nullable public String onChoosePrivateKeyAlias(@NonNull android.content.Context, @NonNull android.content.Intent, int, @Nullable android.net.Uri, @Nullable String); method @Nullable public String onChoosePrivateKeyAlias(@NonNull android.content.Context, @NonNull android.content.Intent, int, @Nullable android.net.Uri, @Nullable String); method public void onNetworkLogsAvailable(@NonNull android.content.Context, @NonNull android.content.Intent, long, @IntRange(from=1) int); method public void onNetworkLogsAvailable(@NonNull android.content.Context, @NonNull android.content.Intent, long, @IntRange(from=1) int); method public final void onReceive(@NonNull android.content.Context, @NonNull android.content.Intent); method public final void onReceive(@NonNull android.content.Context, @NonNull android.content.Intent); method public void onSecurityLogsAvailable(@NonNull android.content.Context, @NonNull android.content.Intent); } } public final class DeviceAdminInfo implements android.os.Parcelable { public final class DeviceAdminInfo implements android.os.Parcelable { Loading Loading @@ -7020,6 +7021,7 @@ package android.app.admin { field public static final String ACTION_PASSWORD_FAILED = "android.app.action.ACTION_PASSWORD_FAILED"; field public static final String ACTION_PASSWORD_FAILED = "android.app.action.ACTION_PASSWORD_FAILED"; field public static final String ACTION_PASSWORD_SUCCEEDED = "android.app.action.ACTION_PASSWORD_SUCCEEDED"; field public static final String ACTION_PASSWORD_SUCCEEDED = "android.app.action.ACTION_PASSWORD_SUCCEEDED"; field public static final String ACTION_PROFILE_PROVISIONING_COMPLETE = "android.app.action.PROFILE_PROVISIONING_COMPLETE"; field public static final String ACTION_PROFILE_PROVISIONING_COMPLETE = "android.app.action.PROFILE_PROVISIONING_COMPLETE"; field public static final String ACTION_SECURITY_LOGS_AVAILABLE = "android.app.action.SECURITY_LOGS_AVAILABLE"; field public static final int BUGREPORT_FAILURE_FAILED_COMPLETING = 0; // 0x0 field public static final int BUGREPORT_FAILURE_FAILED_COMPLETING = 0; // 0x0 field public static final int BUGREPORT_FAILURE_FILE_NO_LONGER_AVAILABLE = 1; // 0x1 field public static final int BUGREPORT_FAILURE_FILE_NO_LONGER_AVAILABLE = 1; // 0x1 field public static final String DEVICE_ADMIN_META_DATA = "android.app.device_admin"; field public static final String DEVICE_ADMIN_META_DATA = "android.app.device_admin"; Loading Loading @@ -7315,6 +7317,7 @@ package android.app.admin { field public static final String DELEGATION_NETWORK_LOGGING = "delegation-network-logging"; field public static final String DELEGATION_NETWORK_LOGGING = "delegation-network-logging"; field public static final String DELEGATION_PACKAGE_ACCESS = "delegation-package-access"; field public static final String DELEGATION_PACKAGE_ACCESS = "delegation-package-access"; field public static final String DELEGATION_PERMISSION_GRANT = "delegation-permission-grant"; field public static final String DELEGATION_PERMISSION_GRANT = "delegation-permission-grant"; field public static final String DELEGATION_SECURITY_LOGGING = "delegation-security-logging"; field public static final int ENCRYPTION_STATUS_ACTIVATING = 2; // 0x2 field public static final int ENCRYPTION_STATUS_ACTIVATING = 2; // 0x2 field public static final int ENCRYPTION_STATUS_ACTIVE = 3; // 0x3 field public static final int ENCRYPTION_STATUS_ACTIVE = 3; // 0x3 field public static final int ENCRYPTION_STATUS_ACTIVE_DEFAULT_KEY = 4; // 0x4 field public static final int ENCRYPTION_STATUS_ACTIVE_DEFAULT_KEY = 4; // 0x4 core/java/android/app/admin/DelegatedAdminReceiver.java +26 −0 Original line number Original line Diff line number Diff line Loading @@ -18,6 +18,7 @@ package android.app.admin; import static android.app.admin.DeviceAdminReceiver.ACTION_CHOOSE_PRIVATE_KEY_ALIAS; import static android.app.admin.DeviceAdminReceiver.ACTION_CHOOSE_PRIVATE_KEY_ALIAS; import static android.app.admin.DeviceAdminReceiver.ACTION_NETWORK_LOGS_AVAILABLE; import static android.app.admin.DeviceAdminReceiver.ACTION_NETWORK_LOGS_AVAILABLE; import static android.app.admin.DeviceAdminReceiver.ACTION_SECURITY_LOGS_AVAILABLE; import static android.app.admin.DeviceAdminReceiver.EXTRA_CHOOSE_PRIVATE_KEY_ALIAS; import static android.app.admin.DeviceAdminReceiver.EXTRA_CHOOSE_PRIVATE_KEY_ALIAS; import static android.app.admin.DeviceAdminReceiver.EXTRA_CHOOSE_PRIVATE_KEY_SENDER_UID; import static android.app.admin.DeviceAdminReceiver.EXTRA_CHOOSE_PRIVATE_KEY_SENDER_UID; import static android.app.admin.DeviceAdminReceiver.EXTRA_CHOOSE_PRIVATE_KEY_URI; import static android.app.admin.DeviceAdminReceiver.EXTRA_CHOOSE_PRIVATE_KEY_URI; Loading Loading @@ -114,6 +115,29 @@ public class DelegatedAdminReceiver extends BroadcastReceiver { throw new UnsupportedOperationException("onNetworkLogsAvailable should be implemented"); throw new UnsupportedOperationException("onNetworkLogsAvailable should be implemented"); } } /** * Called each time a new batch of security logs can be retrieved. This callback method will * only ever be called when security logging is enabled. The logs can only be retrieved while * security logging is enabled. * * <p>If a secondary user or profile is created, this callback won't be received until all users * become affiliated again (even if security logging is enabled). It will also no longer be * possible to retrieve the security logs. See {@link DevicePolicyManager#setAffiliationIds}. * * <p> This callback is only applicable if the delegated app has * {@link DevicePolicyManager#DELEGATION_SECURITY_LOGGING} capability. Additionally, it must * declare an intent filter for {@link DeviceAdminReceiver#ACTION_SECURITY_LOGS_AVAILABLE} in * the receiver's manifest in order to receive this callback. The default implementation * simply throws {@link UnsupportedOperationException}. * * @param context The running context as per {@link #onReceive}. * @param intent The received intent as per {@link #onReceive}. * @see DevicePolicyManager#retrieveSecurityLogs */ public void onSecurityLogsAvailable(@NonNull Context context, @NonNull Intent intent) { throw new UnsupportedOperationException("onSecurityLogsAvailable should be implemented"); } /** /** * Intercept delegated device administrator broadcasts. Implementations should not override * Intercept delegated device administrator broadcasts. Implementations should not override * this method; implement the convenience callbacks for each action instead. * this method; implement the convenience callbacks for each action instead. Loading @@ -132,6 +156,8 @@ public class DelegatedAdminReceiver extends BroadcastReceiver { long batchToken = intent.getLongExtra(EXTRA_NETWORK_LOGS_TOKEN, -1); long batchToken = intent.getLongExtra(EXTRA_NETWORK_LOGS_TOKEN, -1); int networkLogsCount = intent.getIntExtra(EXTRA_NETWORK_LOGS_COUNT, 0); int networkLogsCount = intent.getIntExtra(EXTRA_NETWORK_LOGS_COUNT, 0); onNetworkLogsAvailable(context, intent, batchToken, networkLogsCount); onNetworkLogsAvailable(context, intent, batchToken, networkLogsCount); } else if (ACTION_SECURITY_LOGS_AVAILABLE.equals(action)) { onSecurityLogsAvailable(context, intent); } else { } else { Log.w(TAG, "Unhandled broadcast: " + action); Log.w(TAG, "Unhandled broadcast: " + action); } } Loading core/java/android/app/admin/DeviceAdminReceiver.java +0 −1 Original line number Original line Diff line number Diff line Loading @@ -290,7 +290,6 @@ public class DeviceAdminReceiver extends BroadcastReceiver { /** /** * Broadcast action: notify that a new batch of security logs is ready to be collected. * Broadcast action: notify that a new batch of security logs is ready to be collected. * @hide */ */ @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION) @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION) @BroadcastBehavior(explicitOnly = true) @BroadcastBehavior(explicitOnly = true) Loading core/java/android/app/admin/DevicePolicyManager.java +22 −4 Original line number Original line Diff line number Diff line Loading @@ -1904,6 +1904,20 @@ public class DevicePolicyManager { */ */ public static final String DELEGATION_CERT_SELECTION = "delegation-cert-selection"; public static final String DELEGATION_CERT_SELECTION = "delegation-cert-selection"; /** * Grants access to {@link #setSecurityLoggingEnabled}, {@link #isSecurityLoggingEnabled}, * {@link #retrieveSecurityLogs}, and {@link #retrievePreRebootSecurityLogs}. Once granted the * delegated app will start receiving {@link DelegatedAdminReceiver#onSecurityLogsAvailable} * callback, and Device owner or Profile Owner will no longer receive the * {@link DeviceAdminReceiver#onSecurityLogsAvailable} callback. There can be at most one app * that has this delegation. If another app already had delegated security logging access, it * will lose the delegation when a new app is delegated. * * <p> Can only be granted by Device Owner or Profile Owner of an organnization owned and * managed profile. */ public static final String DELEGATION_SECURITY_LOGGING = "delegation-security-logging"; /** /** * No management for current user in-effect. This is the default. * No management for current user in-effect. This is the default. * @hide * @hide Loading Loading @@ -11241,7 +11255,7 @@ public class DevicePolicyManager { public void setSecurityLoggingEnabled(@NonNull ComponentName admin, boolean enabled) { public void setSecurityLoggingEnabled(@NonNull ComponentName admin, boolean enabled) { throwIfParentInstance("setSecurityLoggingEnabled"); throwIfParentInstance("setSecurityLoggingEnabled"); try { try { mService.setSecurityLoggingEnabled(admin, enabled); mService.setSecurityLoggingEnabled(admin, mContext.getPackageName(), enabled); } catch (RemoteException re) { } catch (RemoteException re) { throw re.rethrowFromSystemServer(); throw re.rethrowFromSystemServer(); } } Loading @@ -11260,7 +11274,7 @@ public class DevicePolicyManager { public boolean isSecurityLoggingEnabled(@Nullable ComponentName admin) { public boolean isSecurityLoggingEnabled(@Nullable ComponentName admin) { throwIfParentInstance("isSecurityLoggingEnabled"); throwIfParentInstance("isSecurityLoggingEnabled"); try { try { return mService.isSecurityLoggingEnabled(admin); return mService.isSecurityLoggingEnabled(admin, mContext.getPackageName()); } catch (RemoteException re) { } catch (RemoteException re) { throw re.rethrowFromSystemServer(); throw re.rethrowFromSystemServer(); } } Loading @@ -11285,10 +11299,12 @@ public class DevicePolicyManager { * @see #isAffiliatedUser * @see #isAffiliatedUser * @see DeviceAdminReceiver#onSecurityLogsAvailable * @see DeviceAdminReceiver#onSecurityLogsAvailable */ */ @SuppressLint("NullableCollection") public @Nullable List<SecurityEvent> retrieveSecurityLogs(@NonNull ComponentName admin) { public @Nullable List<SecurityEvent> retrieveSecurityLogs(@NonNull ComponentName admin) { throwIfParentInstance("retrieveSecurityLogs"); throwIfParentInstance("retrieveSecurityLogs"); try { try { ParceledListSlice<SecurityEvent> list = mService.retrieveSecurityLogs(admin); ParceledListSlice<SecurityEvent> list = mService.retrieveSecurityLogs( admin, mContext.getPackageName()); if (list != null) { if (list != null) { return list.getList(); return list.getList(); } else { } else { Loading Loading @@ -11438,11 +11454,13 @@ public class DevicePolicyManager { * @see #isAffiliatedUser * @see #isAffiliatedUser * @see #retrieveSecurityLogs * @see #retrieveSecurityLogs */ */ @SuppressLint("NullableCollection") public @Nullable List<SecurityEvent> retrievePreRebootSecurityLogs( public @Nullable List<SecurityEvent> retrievePreRebootSecurityLogs( @NonNull ComponentName admin) { @NonNull ComponentName admin) { throwIfParentInstance("retrievePreRebootSecurityLogs"); throwIfParentInstance("retrievePreRebootSecurityLogs"); try { try { ParceledListSlice<SecurityEvent> list = mService.retrievePreRebootSecurityLogs(admin); ParceledListSlice<SecurityEvent> list = mService.retrievePreRebootSecurityLogs( admin, mContext.getPackageName()); if (list != null) { if (list != null) { return list.getList(); return list.getList(); } else { } else { core/java/android/app/admin/IDevicePolicyManager.aidl +4 −4 Original line number Original line Diff line number Diff line Loading @@ -386,10 +386,10 @@ interface IDevicePolicyManager { List<String> getAffiliationIds(in ComponentName admin); List<String> getAffiliationIds(in ComponentName admin); boolean isAffiliatedUser(); boolean isAffiliatedUser(); void setSecurityLoggingEnabled(in ComponentName admin, boolean enabled); void setSecurityLoggingEnabled(in ComponentName admin, String packageName, boolean enabled); boolean isSecurityLoggingEnabled(in ComponentName admin); boolean isSecurityLoggingEnabled(in ComponentName admin, String packageName); ParceledListSlice retrieveSecurityLogs(in ComponentName admin); ParceledListSlice retrieveSecurityLogs(in ComponentName admin, String packageName); ParceledListSlice retrievePreRebootSecurityLogs(in ComponentName admin); ParceledListSlice retrievePreRebootSecurityLogs(in ComponentName admin, String packageName); long forceNetworkLogs(); long forceNetworkLogs(); long forceSecurityLogs(); long forceSecurityLogs(); Loading Loading
core/api/current.txt +3 −0 Original line number Original line Diff line number Diff line Loading @@ -6943,6 +6943,7 @@ package android.app.admin { method @Nullable public String onChoosePrivateKeyAlias(@NonNull android.content.Context, @NonNull android.content.Intent, int, @Nullable android.net.Uri, @Nullable String); method @Nullable public String onChoosePrivateKeyAlias(@NonNull android.content.Context, @NonNull android.content.Intent, int, @Nullable android.net.Uri, @Nullable String); method public void onNetworkLogsAvailable(@NonNull android.content.Context, @NonNull android.content.Intent, long, @IntRange(from=1) int); method public void onNetworkLogsAvailable(@NonNull android.content.Context, @NonNull android.content.Intent, long, @IntRange(from=1) int); method public final void onReceive(@NonNull android.content.Context, @NonNull android.content.Intent); method public final void onReceive(@NonNull android.content.Context, @NonNull android.content.Intent); method public void onSecurityLogsAvailable(@NonNull android.content.Context, @NonNull android.content.Intent); } } public final class DeviceAdminInfo implements android.os.Parcelable { public final class DeviceAdminInfo implements android.os.Parcelable { Loading Loading @@ -7020,6 +7021,7 @@ package android.app.admin { field public static final String ACTION_PASSWORD_FAILED = "android.app.action.ACTION_PASSWORD_FAILED"; field public static final String ACTION_PASSWORD_FAILED = "android.app.action.ACTION_PASSWORD_FAILED"; field public static final String ACTION_PASSWORD_SUCCEEDED = "android.app.action.ACTION_PASSWORD_SUCCEEDED"; field public static final String ACTION_PASSWORD_SUCCEEDED = "android.app.action.ACTION_PASSWORD_SUCCEEDED"; field public static final String ACTION_PROFILE_PROVISIONING_COMPLETE = "android.app.action.PROFILE_PROVISIONING_COMPLETE"; field public static final String ACTION_PROFILE_PROVISIONING_COMPLETE = "android.app.action.PROFILE_PROVISIONING_COMPLETE"; field public static final String ACTION_SECURITY_LOGS_AVAILABLE = "android.app.action.SECURITY_LOGS_AVAILABLE"; field public static final int BUGREPORT_FAILURE_FAILED_COMPLETING = 0; // 0x0 field public static final int BUGREPORT_FAILURE_FAILED_COMPLETING = 0; // 0x0 field public static final int BUGREPORT_FAILURE_FILE_NO_LONGER_AVAILABLE = 1; // 0x1 field public static final int BUGREPORT_FAILURE_FILE_NO_LONGER_AVAILABLE = 1; // 0x1 field public static final String DEVICE_ADMIN_META_DATA = "android.app.device_admin"; field public static final String DEVICE_ADMIN_META_DATA = "android.app.device_admin"; Loading Loading @@ -7315,6 +7317,7 @@ package android.app.admin { field public static final String DELEGATION_NETWORK_LOGGING = "delegation-network-logging"; field public static final String DELEGATION_NETWORK_LOGGING = "delegation-network-logging"; field public static final String DELEGATION_PACKAGE_ACCESS = "delegation-package-access"; field public static final String DELEGATION_PACKAGE_ACCESS = "delegation-package-access"; field public static final String DELEGATION_PERMISSION_GRANT = "delegation-permission-grant"; field public static final String DELEGATION_PERMISSION_GRANT = "delegation-permission-grant"; field public static final String DELEGATION_SECURITY_LOGGING = "delegation-security-logging"; field public static final int ENCRYPTION_STATUS_ACTIVATING = 2; // 0x2 field public static final int ENCRYPTION_STATUS_ACTIVATING = 2; // 0x2 field public static final int ENCRYPTION_STATUS_ACTIVE = 3; // 0x3 field public static final int ENCRYPTION_STATUS_ACTIVE = 3; // 0x3 field public static final int ENCRYPTION_STATUS_ACTIVE_DEFAULT_KEY = 4; // 0x4 field public static final int ENCRYPTION_STATUS_ACTIVE_DEFAULT_KEY = 4; // 0x4
core/java/android/app/admin/DelegatedAdminReceiver.java +26 −0 Original line number Original line Diff line number Diff line Loading @@ -18,6 +18,7 @@ package android.app.admin; import static android.app.admin.DeviceAdminReceiver.ACTION_CHOOSE_PRIVATE_KEY_ALIAS; import static android.app.admin.DeviceAdminReceiver.ACTION_CHOOSE_PRIVATE_KEY_ALIAS; import static android.app.admin.DeviceAdminReceiver.ACTION_NETWORK_LOGS_AVAILABLE; import static android.app.admin.DeviceAdminReceiver.ACTION_NETWORK_LOGS_AVAILABLE; import static android.app.admin.DeviceAdminReceiver.ACTION_SECURITY_LOGS_AVAILABLE; import static android.app.admin.DeviceAdminReceiver.EXTRA_CHOOSE_PRIVATE_KEY_ALIAS; import static android.app.admin.DeviceAdminReceiver.EXTRA_CHOOSE_PRIVATE_KEY_ALIAS; import static android.app.admin.DeviceAdminReceiver.EXTRA_CHOOSE_PRIVATE_KEY_SENDER_UID; import static android.app.admin.DeviceAdminReceiver.EXTRA_CHOOSE_PRIVATE_KEY_SENDER_UID; import static android.app.admin.DeviceAdminReceiver.EXTRA_CHOOSE_PRIVATE_KEY_URI; import static android.app.admin.DeviceAdminReceiver.EXTRA_CHOOSE_PRIVATE_KEY_URI; Loading Loading @@ -114,6 +115,29 @@ public class DelegatedAdminReceiver extends BroadcastReceiver { throw new UnsupportedOperationException("onNetworkLogsAvailable should be implemented"); throw new UnsupportedOperationException("onNetworkLogsAvailable should be implemented"); } } /** * Called each time a new batch of security logs can be retrieved. This callback method will * only ever be called when security logging is enabled. The logs can only be retrieved while * security logging is enabled. * * <p>If a secondary user or profile is created, this callback won't be received until all users * become affiliated again (even if security logging is enabled). It will also no longer be * possible to retrieve the security logs. See {@link DevicePolicyManager#setAffiliationIds}. * * <p> This callback is only applicable if the delegated app has * {@link DevicePolicyManager#DELEGATION_SECURITY_LOGGING} capability. Additionally, it must * declare an intent filter for {@link DeviceAdminReceiver#ACTION_SECURITY_LOGS_AVAILABLE} in * the receiver's manifest in order to receive this callback. The default implementation * simply throws {@link UnsupportedOperationException}. * * @param context The running context as per {@link #onReceive}. * @param intent The received intent as per {@link #onReceive}. * @see DevicePolicyManager#retrieveSecurityLogs */ public void onSecurityLogsAvailable(@NonNull Context context, @NonNull Intent intent) { throw new UnsupportedOperationException("onSecurityLogsAvailable should be implemented"); } /** /** * Intercept delegated device administrator broadcasts. Implementations should not override * Intercept delegated device administrator broadcasts. Implementations should not override * this method; implement the convenience callbacks for each action instead. * this method; implement the convenience callbacks for each action instead. Loading @@ -132,6 +156,8 @@ public class DelegatedAdminReceiver extends BroadcastReceiver { long batchToken = intent.getLongExtra(EXTRA_NETWORK_LOGS_TOKEN, -1); long batchToken = intent.getLongExtra(EXTRA_NETWORK_LOGS_TOKEN, -1); int networkLogsCount = intent.getIntExtra(EXTRA_NETWORK_LOGS_COUNT, 0); int networkLogsCount = intent.getIntExtra(EXTRA_NETWORK_LOGS_COUNT, 0); onNetworkLogsAvailable(context, intent, batchToken, networkLogsCount); onNetworkLogsAvailable(context, intent, batchToken, networkLogsCount); } else if (ACTION_SECURITY_LOGS_AVAILABLE.equals(action)) { onSecurityLogsAvailable(context, intent); } else { } else { Log.w(TAG, "Unhandled broadcast: " + action); Log.w(TAG, "Unhandled broadcast: " + action); } } Loading
core/java/android/app/admin/DeviceAdminReceiver.java +0 −1 Original line number Original line Diff line number Diff line Loading @@ -290,7 +290,6 @@ public class DeviceAdminReceiver extends BroadcastReceiver { /** /** * Broadcast action: notify that a new batch of security logs is ready to be collected. * Broadcast action: notify that a new batch of security logs is ready to be collected. * @hide */ */ @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION) @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION) @BroadcastBehavior(explicitOnly = true) @BroadcastBehavior(explicitOnly = true) Loading
core/java/android/app/admin/DevicePolicyManager.java +22 −4 Original line number Original line Diff line number Diff line Loading @@ -1904,6 +1904,20 @@ public class DevicePolicyManager { */ */ public static final String DELEGATION_CERT_SELECTION = "delegation-cert-selection"; public static final String DELEGATION_CERT_SELECTION = "delegation-cert-selection"; /** * Grants access to {@link #setSecurityLoggingEnabled}, {@link #isSecurityLoggingEnabled}, * {@link #retrieveSecurityLogs}, and {@link #retrievePreRebootSecurityLogs}. Once granted the * delegated app will start receiving {@link DelegatedAdminReceiver#onSecurityLogsAvailable} * callback, and Device owner or Profile Owner will no longer receive the * {@link DeviceAdminReceiver#onSecurityLogsAvailable} callback. There can be at most one app * that has this delegation. If another app already had delegated security logging access, it * will lose the delegation when a new app is delegated. * * <p> Can only be granted by Device Owner or Profile Owner of an organnization owned and * managed profile. */ public static final String DELEGATION_SECURITY_LOGGING = "delegation-security-logging"; /** /** * No management for current user in-effect. This is the default. * No management for current user in-effect. This is the default. * @hide * @hide Loading Loading @@ -11241,7 +11255,7 @@ public class DevicePolicyManager { public void setSecurityLoggingEnabled(@NonNull ComponentName admin, boolean enabled) { public void setSecurityLoggingEnabled(@NonNull ComponentName admin, boolean enabled) { throwIfParentInstance("setSecurityLoggingEnabled"); throwIfParentInstance("setSecurityLoggingEnabled"); try { try { mService.setSecurityLoggingEnabled(admin, enabled); mService.setSecurityLoggingEnabled(admin, mContext.getPackageName(), enabled); } catch (RemoteException re) { } catch (RemoteException re) { throw re.rethrowFromSystemServer(); throw re.rethrowFromSystemServer(); } } Loading @@ -11260,7 +11274,7 @@ public class DevicePolicyManager { public boolean isSecurityLoggingEnabled(@Nullable ComponentName admin) { public boolean isSecurityLoggingEnabled(@Nullable ComponentName admin) { throwIfParentInstance("isSecurityLoggingEnabled"); throwIfParentInstance("isSecurityLoggingEnabled"); try { try { return mService.isSecurityLoggingEnabled(admin); return mService.isSecurityLoggingEnabled(admin, mContext.getPackageName()); } catch (RemoteException re) { } catch (RemoteException re) { throw re.rethrowFromSystemServer(); throw re.rethrowFromSystemServer(); } } Loading @@ -11285,10 +11299,12 @@ public class DevicePolicyManager { * @see #isAffiliatedUser * @see #isAffiliatedUser * @see DeviceAdminReceiver#onSecurityLogsAvailable * @see DeviceAdminReceiver#onSecurityLogsAvailable */ */ @SuppressLint("NullableCollection") public @Nullable List<SecurityEvent> retrieveSecurityLogs(@NonNull ComponentName admin) { public @Nullable List<SecurityEvent> retrieveSecurityLogs(@NonNull ComponentName admin) { throwIfParentInstance("retrieveSecurityLogs"); throwIfParentInstance("retrieveSecurityLogs"); try { try { ParceledListSlice<SecurityEvent> list = mService.retrieveSecurityLogs(admin); ParceledListSlice<SecurityEvent> list = mService.retrieveSecurityLogs( admin, mContext.getPackageName()); if (list != null) { if (list != null) { return list.getList(); return list.getList(); } else { } else { Loading Loading @@ -11438,11 +11454,13 @@ public class DevicePolicyManager { * @see #isAffiliatedUser * @see #isAffiliatedUser * @see #retrieveSecurityLogs * @see #retrieveSecurityLogs */ */ @SuppressLint("NullableCollection") public @Nullable List<SecurityEvent> retrievePreRebootSecurityLogs( public @Nullable List<SecurityEvent> retrievePreRebootSecurityLogs( @NonNull ComponentName admin) { @NonNull ComponentName admin) { throwIfParentInstance("retrievePreRebootSecurityLogs"); throwIfParentInstance("retrievePreRebootSecurityLogs"); try { try { ParceledListSlice<SecurityEvent> list = mService.retrievePreRebootSecurityLogs(admin); ParceledListSlice<SecurityEvent> list = mService.retrievePreRebootSecurityLogs( admin, mContext.getPackageName()); if (list != null) { if (list != null) { return list.getList(); return list.getList(); } else { } else {
core/java/android/app/admin/IDevicePolicyManager.aidl +4 −4 Original line number Original line Diff line number Diff line Loading @@ -386,10 +386,10 @@ interface IDevicePolicyManager { List<String> getAffiliationIds(in ComponentName admin); List<String> getAffiliationIds(in ComponentName admin); boolean isAffiliatedUser(); boolean isAffiliatedUser(); void setSecurityLoggingEnabled(in ComponentName admin, boolean enabled); void setSecurityLoggingEnabled(in ComponentName admin, String packageName, boolean enabled); boolean isSecurityLoggingEnabled(in ComponentName admin); boolean isSecurityLoggingEnabled(in ComponentName admin, String packageName); ParceledListSlice retrieveSecurityLogs(in ComponentName admin); ParceledListSlice retrieveSecurityLogs(in ComponentName admin, String packageName); ParceledListSlice retrievePreRebootSecurityLogs(in ComponentName admin); ParceledListSlice retrievePreRebootSecurityLogs(in ComponentName admin, String packageName); long forceNetworkLogs(); long forceNetworkLogs(); long forceSecurityLogs(); long forceSecurityLogs(); Loading