/cts/tests/deviceadmin/src/android/deviceadmin/cts/ |
CtsDeviceAdminBrokenReceiver.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver2.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver3.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver4.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver5.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminReceiver.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminReceiver2.java | 19 import android.app.admin.DeviceAdminReceiver;
|
/frameworks/base/core/java/android/app/admin/ |
DevicePolicyManager.java | 17 package android.app.admin; 48 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> 91 * Activity action: send when any policy admin changes a policy. 108 * admin is being added. 196 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. Must be 200 public boolean hasGrantedPolicy(ComponentName admin, int usesPolicy) { 203 return mService.hasGrantedPolicy(admin, usesPolicy, UserHandle.myUserId()); 282 * <p>The calling device admin must have requested 286 * @param admin Which {@link DeviceAdminReceiver} this request is associated with [all...] |
IDevicePolicyManager.aidl | 18 package android.app.admin; 63 void setMaximumFailedPasswordsForWipe(in ComponentName admin, int num, int userHandle); 64 int getMaximumFailedPasswordsForWipe(in ComponentName admin, int userHandle); 75 ComponentName setGlobalProxy(in ComponentName admin, String proxySpec, String exclusionList, int userHandle);
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
TestDeviceAdminReceiver.java | 17 package com.android.cts.verifier.admin; 19 import android.app.admin.DeviceAdminReceiver;
|
PolicySerializationTestActivity.java | 17 package com.android.cts.verifier.admin; 23 import android.app.admin.DevicePolicyManager; 155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local 157 item.applyExpectedValue(mDevicePolicyManager, admin); 245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin); 253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin); 292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) { 293 mActualValue = getDeviceManagerValue(deviceManager, admin); 297 ComponentName admin); 407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) { [all...] |
ScreenLockTestActivity.java | 17 package com.android.cts.verifier.admin; 24 import android.app.admin.DevicePolicyManager;
|
/external/libpcap/ChmodBPF/ |
ChmodBPF | 11 # This startup item will make it owned by the admin group, 12 # with permissions rw-rw----, so that anybody in the admin 20 # admin group can capture packets. 22 chgrp admin /dev/bpf*
|
/frameworks/base/services/java/com/android/server/ |
DevicePolicyManagerService.java | 34 import android.app.admin.DeviceAdminInfo; 35 import android.app.admin.DeviceAdminReceiver; 36 import android.app.admin.DevicePolicyManager; 37 import android.app.admin.IDevicePolicyManager; 417 Slog.w(TAG, "Unknown admin tag: " + tag); 623 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who); local 624 if (admin != null 625 && who.getPackageName().equals(admin.info.getActivityInfo().packageName) 626 && who.getClassName().equals(admin.info.getActivityInfo().name)) { 627 return admin; 638 ActiveAdmin admin = policy.mAdminMap.get(who); local 655 ActiveAdmin admin = policy.mAdminList.get(i); local 688 ActiveAdmin admin = policy.mAdminList.get(i); local 697 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1028 ActiveAdmin admin = policy.mAdminList.get(i); local 1138 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1184 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1190 ActiveAdmin admin = policy.mAdminList.get(i); local 1221 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1227 ActiveAdmin admin = policy.mAdminList.get(i); local 1258 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1264 ActiveAdmin admin = policy.mAdminList.get(i); local 1307 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1315 ActiveAdmin admin = policy.mAdminList.get(i); local 1331 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1339 ActiveAdmin admin = policy.mAdminList.get(i); local 1376 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1383 ActiveAdmin admin = policy.mAdminList.get(i); local 1413 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1420 ActiveAdmin admin = policy.mAdminList.get(i); local 1450 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1457 ActiveAdmin admin = policy.mAdminList.get(i); local 1487 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1494 ActiveAdmin admin = policy.mAdminList.get(i); local 1524 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1531 ActiveAdmin admin = policy.mAdminList.get(i); local 1561 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1568 ActiveAdmin admin = policy.mAdminList.get(i); local 1635 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1641 ActiveAdmin admin = policy.mAdminList.get(i); local 1825 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1832 ActiveAdmin admin = policy.mAdminList.get(i); local 1935 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); local 2004 ActiveAdmin admin = policy.mAdminList.get(i); local 2070 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 2320 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2328 ActiveAdmin admin = policy.mAdminList.get(i); local 2364 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2373 ActiveAdmin admin = policy.mAdminList.get(i); local [all...] |
/external/smack/src/org/xbill/DNS/ |
SOARecord.java | 17 private Name host, admin; field in class:SOARecord 30 * @param admin The zone administrator's address 40 SOARecord(Name name, int dclass, long ttl, Name host, Name admin, 45 this.admin = checkName("admin", admin); 56 admin = new Name(in); 67 admin = st.getName(origin); 81 sb.append(admin); 118 return admin; [all...] |
/frameworks/base/policy/src/com/android/internal/policy/impl/keyguard/ |
KeyguardUpdateMonitorCallback.java | 19 import android.app.admin.DevicePolicyManager;
|
/cts/tests/tests/admin/src/android/admin/cts/ |
DeviceAdminActivationTest.java | 17 package android.admin.cts; 20 import android.app.admin.DevicePolicyManager; 35 * Tests for the standard way of activating a Device Admin: by starting system UI via an 42 // IMPLEMENTATION NOTE: Because Device Admin activation requires the use of
|
DeviceAdminInfoTest.java | 17 package android.admin.cts; 19 import android.app.admin.DeviceAdminInfo;
|
DeviceAdminReceiverTest.java | 17 package android.admin.cts; 19 import android.app.admin.DeviceAdminReceiver;
|
/development/samples/training/device-management-policy/src/com/example/training/deviceadmin/ |
Policy.java | 20 import android.app.admin.DeviceAdminReceiver; 21 import android.app.admin.DevicePolicyManager;
|
/external/chromium/chrome/browser/ui/cocoa/ |
install.sh | 61 # somewhere under /Applications, try to make it writable by all admin users. 62 # This will allow other admin users to update the application from their own 73 # admin-writeability is not a concern. Set the entire thing to be owned by 77 # If this script is running as a user that is not a member of the admin group, 84 chgrp -Rh admin "${DEST}" >& /dev/null ; then
|
/development/samples/ApiDemos/src/com/example/android/apis/app/ |
SoftInputModes.java | 6 import android.app.admin.DevicePolicyManager;
|
ScreenOrientation.java | 22 import android.app.admin.DevicePolicyManager;
|
/external/valgrind/main/helgrind/ |
hg_lock_n_thread.h | 83 /* ADMIN */ 84 struct _Thread* admin; member in struct:_Thread 123 /* ADMIN */
|
/frameworks/base/services/java/com/android/server/wm/ |
KeyguardDisableHandler.java | 20 import android.app.admin.DevicePolicyManager;
|