HomeSort by relevance Sort by last modified time
    Searched refs:admin (Results 1 - 25 of 119) sorted by null

1 2 3 4 5

  /cts/tests/deviceadmin/src/android/deviceadmin/cts/
CtsDeviceAdminReceiver.java 19 import android.app.admin.DeviceAdminReceiver;
CtsDeviceAdminReceiver2.java 19 import android.app.admin.DeviceAdminReceiver;
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/
TestDeviceAdminReceiver.java 17 package com.android.cts.verifier.admin;
19 import android.app.admin.DeviceAdminReceiver;
PolicySerializationTestActivity.java 17 package com.android.cts.verifier.admin;
23 import android.app.admin.DevicePolicyManager;
155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local
157 item.applyExpectedValue(mDevicePolicyManager, admin);
245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin);
253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin);
292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) {
293 mActualValue = getDeviceManagerValue(deviceManager, admin);
297 ComponentName admin);
407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) {
    [all...]
ScreenLockTestActivity.java 17 package com.android.cts.verifier.admin;
24 import android.app.admin.DevicePolicyManager;
  /frameworks/base/core/java/android/app/admin/
DevicePolicyManager.java 17 package android.app.admin;
47 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a>
90 * Activity action: send when any policy admin changes a policy.
107 * admin is being added.
193 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. Must be
197 public boolean hasGrantedPolicy(ComponentName admin, int usesPolicy) {
200 return mService.hasGrantedPolicy(admin, usesPolicy);
279 * <p>The calling device admin must have requested
283 * @param admin Which {@link DeviceAdminReceiver} this request is associated with
    [all...]
IDevicePolicyManager.aidl 18 package android.app.admin;
63 void setMaximumFailedPasswordsForWipe(in ComponentName admin, int num);
64 int getMaximumFailedPasswordsForWipe(in ComponentName admin);
75 ComponentName setGlobalProxy(in ComponentName admin, String proxySpec, String exclusionList);
DeviceAdminReceiver.java 17 package android.app.admin;
56 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a>
81 * disabling your admin, by setting the extra field
84 * to the user before they disable your admin.
92 * impact of disabling your admin.
119 * <p>The calling device admin must have requested
135 * <p>The calling device admin must have requested
147 * <p>The calling device admin must have requested
159 * <p>The calling device admin must have requeste
    [all...]
  /external/libpcap/ChmodBPF/
ChmodBPF 11 # This startup item will make it owned by the admin group,
12 # with permissions rw-rw----, so that anybody in the admin
20 # admin group can capture packets.
22 chgrp admin /dev/bpf*
  /frameworks/base/services/java/com/android/server/
DevicePolicyManagerService.java 33 import android.app.admin.DeviceAdminInfo;
34 import android.app.admin.DeviceAdminReceiver;
35 import android.app.admin.DevicePolicyManager;
36 import android.app.admin.IDevicePolicyManager;
357 Slog.w(TAG, "Unknown admin tag: " + tag);
425 Slog.w(TAG, "Admin unexpectedly uninstalled: "
434 Slog.w(TAG, "Admin package change removed component: "
522 ActiveAdmin admin = mAdminMap.get(who); local
523 if (admin != null
524 && who.getPackageName().equals(admin.info.getActivityInfo().packageName
535 ActiveAdmin admin = mAdminMap.get(who); local
552 ActiveAdmin admin = mAdminList.get(i); local
584 ActiveAdmin admin = mAdminList.get(i); local
593 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver); local
903 ActiveAdmin admin = mAdminList.get(i); local
1003 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver); local
1041 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local
1047 ActiveAdmin admin = mAdminList.get(i); local
1075 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local
1081 ActiveAdmin admin = mAdminList.get(i); local
1109 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local
1115 ActiveAdmin admin = mAdminList.get(i); local
1155 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local
1162 ActiveAdmin admin = mAdminList.get(i); local
1178 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local
1185 ActiveAdmin admin = mAdminList.get(i); local
1219 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local
1225 ActiveAdmin admin = mAdminList.get(i); local
1253 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local
1259 ActiveAdmin admin = mAdminList.get(i); local
1287 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local
1293 ActiveAdmin admin = mAdminList.get(i); local
1321 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local
1327 ActiveAdmin admin = mAdminList.get(i); local
1355 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local
1361 ActiveAdmin admin = mAdminList.get(i); local
1389 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local
1395 ActiveAdmin admin = mAdminList.get(i); local
1456 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local
1462 ActiveAdmin admin = mAdminList.get(i); local
1643 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local
1649 ActiveAdmin admin = mAdminList.get(i); local
1726 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp); local
1791 ActiveAdmin admin = mAdminList.get(i); local
1850 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
2077 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local
2084 ActiveAdmin admin = mAdminList.get(i); local
    [all...]
  /cts/tests/tests/admin/src/android/admin/cts/
DeviceAdminInfoTest.java 17 package android.admin.cts;
19 import android.app.admin.DeviceAdminInfo;
DeviceAdminReceiverTest.java 17 package android.admin.cts;
19 import android.app.admin.DeviceAdminReceiver;
DevicePolicyManagerTest.java 17 package android.admin.cts;
19 import android.app.admin.DevicePolicyManager;
  /development/samples/training/device-management-policy/src/com/example/training/deviceadmin/
Policy.java 20 import android.app.admin.DeviceAdminReceiver;
21 import android.app.admin.DevicePolicyManager;
  /external/chromium/chrome/browser/ui/cocoa/
install.sh 61 # somewhere under /Applications, try to make it writable by all admin users.
62 # This will allow other admin users to update the application from their own
73 # admin-writeability is not a concern. Set the entire thing to be owned by
77 # If this script is running as a user that is not a member of the admin group,
84 chgrp -Rh admin "${DEST}" >& /dev/null ; then
  /development/samples/ApiDemos/src/com/example/android/apis/app/
ScreenOrientation.java 22 import android.app.admin.DevicePolicyManager;
SoftInputModes.java 6 import android.app.admin.DevicePolicyManager;
  /external/valgrind/main/helgrind/
hg_lock_n_thread.h 83 /* ADMIN */
84 struct _Thread* admin; member in struct:_Thread
123 /* ADMIN */
  /packages/apps/Settings/src/com/android/settings/
ChooseLockSettingsHelper.java 23 import android.app.admin.DevicePolicyManager;
DeviceAdminSettings.java 24 import android.app.admin.DeviceAdminInfo;
25 import android.app.admin.DeviceAdminReceiver;
26 import android.app.admin.DevicePolicyManager;
DeviceAdminAdd.java 25 import android.app.admin.DeviceAdminInfo;
26 import android.app.admin.DeviceAdminReceiver;
27 import android.app.admin.DevicePolicyManager;
131 // This admin already exists, an we have two options at this point. If new policy
190 Log.w(TAG, "Exception trying to activate admin "
199 // Don't allow the admin to put a dialog up in front
DreamSettings.java 25 import android.app.admin.DevicePolicyManager;
  /external/valgrind/main/exp-sgcheck/
h_main.c 150 struct _SegGroup* admin; member in struct:_SegGroup
175 g->admin = NULL;
181 g->admin = group_list;
  /external/webkit/Tools/Scripts/webkitpy/common/net/bugzilla/
bugzilla_unittest.py 167 maintainer="admin@webkit.org"
254 <bugzilla version="3.2.3" urlbase="https://bugs.webkit.org/" maintainer="admin@webkit.org" exporter="eric@webkit.org">
  /ndk/sources/host-tools/sed-4.2.1/testsuite/
mac-mf.good 119 ADMIN_BINDIR = {KRB5ROOT}{S}admin

Completed in 421 milliseconds

1 2 3 4 5