/cts/tests/deviceadmin/src/android/deviceadmin/cts/ |
CtsDeviceAdminReceiver.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminReceiver2.java | 19 import android.app.admin.DeviceAdminReceiver;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
TestDeviceAdminReceiver.java | 17 package com.android.cts.verifier.admin; 19 import android.app.admin.DeviceAdminReceiver;
|
PolicySerializationTestActivity.java | 17 package com.android.cts.verifier.admin; 23 import android.app.admin.DevicePolicyManager; 155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local 157 item.applyExpectedValue(mDevicePolicyManager, admin); 245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin); 253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin); 292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) { 293 mActualValue = getDeviceManagerValue(deviceManager, admin); 297 ComponentName admin); 407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) { [all...] |
ScreenLockTestActivity.java | 17 package com.android.cts.verifier.admin; 24 import android.app.admin.DevicePolicyManager;
|
/frameworks/base/core/java/android/app/admin/ |
DevicePolicyManager.java | 17 package android.app.admin; 47 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> 90 * Activity action: send when any policy admin changes a policy. 107 * admin is being added. 193 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. Must be 197 public boolean hasGrantedPolicy(ComponentName admin, int usesPolicy) { 200 return mService.hasGrantedPolicy(admin, usesPolicy); 279 * <p>The calling device admin must have requested 283 * @param admin Which {@link DeviceAdminReceiver} this request is associated with [all...] |
IDevicePolicyManager.aidl | 18 package android.app.admin; 63 void setMaximumFailedPasswordsForWipe(in ComponentName admin, int num); 64 int getMaximumFailedPasswordsForWipe(in ComponentName admin); 75 ComponentName setGlobalProxy(in ComponentName admin, String proxySpec, String exclusionList);
|
DeviceAdminReceiver.java | 17 package android.app.admin; 56 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> 81 * disabling your admin, by setting the extra field 84 * to the user before they disable your admin. 92 * impact of disabling your admin. 119 * <p>The calling device admin must have requested 135 * <p>The calling device admin must have requested 147 * <p>The calling device admin must have requested 159 * <p>The calling device admin must have requeste [all...] |
/external/libpcap/ChmodBPF/ |
ChmodBPF | 11 # This startup item will make it owned by the admin group, 12 # with permissions rw-rw----, so that anybody in the admin 20 # admin group can capture packets. 22 chgrp admin /dev/bpf*
|
/frameworks/base/services/java/com/android/server/ |
DevicePolicyManagerService.java | 33 import android.app.admin.DeviceAdminInfo; 34 import android.app.admin.DeviceAdminReceiver; 35 import android.app.admin.DevicePolicyManager; 36 import android.app.admin.IDevicePolicyManager; 357 Slog.w(TAG, "Unknown admin tag: " + tag); 425 Slog.w(TAG, "Admin unexpectedly uninstalled: " 434 Slog.w(TAG, "Admin package change removed component: " 522 ActiveAdmin admin = mAdminMap.get(who); local 523 if (admin != null 524 && who.getPackageName().equals(admin.info.getActivityInfo().packageName 535 ActiveAdmin admin = mAdminMap.get(who); local 552 ActiveAdmin admin = mAdminList.get(i); local 584 ActiveAdmin admin = mAdminList.get(i); local 593 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver); local 903 ActiveAdmin admin = mAdminList.get(i); local 1003 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver); local 1041 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local 1047 ActiveAdmin admin = mAdminList.get(i); local 1075 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local 1081 ActiveAdmin admin = mAdminList.get(i); local 1109 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local 1115 ActiveAdmin admin = mAdminList.get(i); local 1155 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local 1162 ActiveAdmin admin = mAdminList.get(i); local 1178 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local 1185 ActiveAdmin admin = mAdminList.get(i); local 1219 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local 1225 ActiveAdmin admin = mAdminList.get(i); local 1253 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local 1259 ActiveAdmin admin = mAdminList.get(i); local 1287 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local 1293 ActiveAdmin admin = mAdminList.get(i); local 1321 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local 1327 ActiveAdmin admin = mAdminList.get(i); local 1355 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local 1361 ActiveAdmin admin = mAdminList.get(i); local 1389 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local 1395 ActiveAdmin admin = mAdminList.get(i); local 1456 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local 1462 ActiveAdmin admin = mAdminList.get(i); local 1643 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local 1649 ActiveAdmin admin = mAdminList.get(i); local 1726 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp); local 1791 ActiveAdmin admin = mAdminList.get(i); local 1850 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 2077 ActiveAdmin admin = getActiveAdminUncheckedLocked(who); local 2084 ActiveAdmin admin = mAdminList.get(i); local [all...] |
/cts/tests/tests/admin/src/android/admin/cts/ |
DeviceAdminInfoTest.java | 17 package android.admin.cts; 19 import android.app.admin.DeviceAdminInfo;
|
DeviceAdminReceiverTest.java | 17 package android.admin.cts; 19 import android.app.admin.DeviceAdminReceiver;
|
DevicePolicyManagerTest.java | 17 package android.admin.cts; 19 import android.app.admin.DevicePolicyManager;
|
/development/samples/training/device-management-policy/src/com/example/training/deviceadmin/ |
Policy.java | 20 import android.app.admin.DeviceAdminReceiver; 21 import android.app.admin.DevicePolicyManager;
|
/external/chromium/chrome/browser/ui/cocoa/ |
install.sh | 61 # somewhere under /Applications, try to make it writable by all admin users. 62 # This will allow other admin users to update the application from their own 73 # admin-writeability is not a concern. Set the entire thing to be owned by 77 # If this script is running as a user that is not a member of the admin group, 84 chgrp -Rh admin "${DEST}" >& /dev/null ; then
|
/development/samples/ApiDemos/src/com/example/android/apis/app/ |
ScreenOrientation.java | 22 import android.app.admin.DevicePolicyManager;
|
SoftInputModes.java | 6 import android.app.admin.DevicePolicyManager;
|
/external/valgrind/main/helgrind/ |
hg_lock_n_thread.h | 83 /* ADMIN */ 84 struct _Thread* admin; member in struct:_Thread 123 /* ADMIN */
|
/packages/apps/Settings/src/com/android/settings/ |
ChooseLockSettingsHelper.java | 23 import android.app.admin.DevicePolicyManager;
|
DeviceAdminSettings.java | 24 import android.app.admin.DeviceAdminInfo; 25 import android.app.admin.DeviceAdminReceiver; 26 import android.app.admin.DevicePolicyManager;
|
DeviceAdminAdd.java | 25 import android.app.admin.DeviceAdminInfo; 26 import android.app.admin.DeviceAdminReceiver; 27 import android.app.admin.DevicePolicyManager; 131 // This admin already exists, an we have two options at this point. If new policy 190 Log.w(TAG, "Exception trying to activate admin " 199 // Don't allow the admin to put a dialog up in front
|
DreamSettings.java | 25 import android.app.admin.DevicePolicyManager;
|
/external/valgrind/main/exp-sgcheck/ |
h_main.c | 150 struct _SegGroup* admin; member in struct:_SegGroup 175 g->admin = NULL; 181 g->admin = group_list;
|
/external/webkit/Tools/Scripts/webkitpy/common/net/bugzilla/ |
bugzilla_unittest.py | 167 maintainer="admin@webkit.org" 254 <bugzilla version="3.2.3" urlbase="https://bugs.webkit.org/" maintainer="admin@webkit.org" exporter="eric@webkit.org">
|
/ndk/sources/host-tools/sed-4.2.1/testsuite/ |
mac-mf.good | 119 ADMIN_BINDIR = {KRB5ROOT}{S}admin
|