/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
TestDeviceAdminReceiver.java | 17 package com.android.cts.verifier.admin; 19 import android.app.admin.DeviceAdminReceiver;
|
ScreenLockTestActivity.java | 17 package com.android.cts.verifier.admin; 24 import android.app.admin.DevicePolicyManager;
|
PolicySerializationTestActivity.java | 17 package com.android.cts.verifier.admin; 23 import android.app.admin.DevicePolicyManager; 155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local 157 item.applyExpectedValue(mDevicePolicyManager, admin); 245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin); 253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin); 292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) { 293 mActualValue = getDeviceManagerValue(deviceManager, admin); 297 ComponentName admin); 407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) { [all...] |
/frameworks/base/core/java/android/app/admin/ |
DevicePolicyManagerInternal.java | 17 package android.app.admin;
|
DeviceAdminReceiver.java | 17 package android.app.admin; 57 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> 82 * disabling your admin, by setting the extra field 85 * to the user before they disable your admin. 93 * impact of disabling your admin. 120 * <p>The calling device admin must have requested 136 * <p>The calling device admin must have requested 148 * <p>The calling device admin must have requested 160 * <p>The calling device admin must have requeste [all...] |
DeviceAdminInfo.java | 17 package android.app.admin; 55 * A type of policy that this device admin can use: device owner meta-policy 56 * for an admin that is designated as owner of the device. 63 * A type of policy that this device admin can use: profile owner meta-policy 71 * A type of policy that this device admin can use: limit the passwords 75 * <p>To control this policy, the device admin must have a "limit-password" 81 * A type of policy that this device admin can use: able to watch login 86 * <p>To control this policy, the device admin must have a "watch-login" 92 * A type of policy that this device admin can use: able to reset the 96 * <p>To control this policy, the device admin must have a "reset-password [all...] |
DevicePolicyManager.java | 17 package android.app.admin; 23 import android.app.admin.IDevicePolicyManager; 70 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> 273 * A String extra holding a url that specifies the download location of the device admin 274 * package. When not provided it is assumed that the device admin package is already installed. 307 * <p>During device owner provisioning a device admin app is set as the owner of the device. 375 * <p>The ComponentName of the profile owner admin is pass in {@link #EXTRA_DEVICE_ADMIN} extra 376 * field. This will invoke a UI to bring the user through adding the profile owner admin 381 * be {@link Activity#RESULT_OK} and the component will be set as an active admin as wel [all...] |
/external/smack/src/org/xbill/DNS/ |
SOARecord.java | 17 private Name host, admin; field in class:SOARecord 30 * @param admin The zone administrator's address 40 SOARecord(Name name, int dclass, long ttl, Name host, Name admin, 45 this.admin = checkName("admin", admin); 56 admin = new Name(in); 67 admin = st.getName(origin); 81 sb.append(admin); 118 return admin; [all...] |
/cts/tests/tests/admin/src/android/admin/cts/ |
DeviceAdminInfoTest.java | 17 package android.admin.cts; 19 import android.app.admin.DeviceAdminInfo;
|
DeviceAdminActivationTest.java | 17 package android.admin.cts; 20 import android.app.admin.DevicePolicyManager; 43 * Tests for the standard way of activating a Device Admin: by starting system UI via an 52 // IMPLEMENTATION NOTE: Because Device Admin activation requires the use of
|
DeviceAdminReceiverTest.java | 17 package android.admin.cts; 19 import android.app.admin.DeviceAdminReceiver;
|
DevicePolicyManagerTest.java | 17 package android.admin.cts; 19 import android.app.admin.DevicePolicyManager; 32 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_COMPLEX; 670 mDevicePolicyManager.createAndInitializeUser(mComponent, "name", "admin name", [all...] |
/external/valgrind/main/helgrind/ |
hg_lock_n_thread.h | 83 /* ADMIN */ 84 struct _Thread* admin; member in struct:_Thread 123 /* ADMIN */
|
/external/valgrind/main/exp-sgcheck/ |
h_main.c | 150 struct _SegGroup* admin; member in struct:_SegGroup 175 g->admin = NULL; 181 g->admin = group_list;
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
DeviceOwner.java | 117 static DeviceOwner createWithProfileOwner(ComponentName admin, String ownerName, int userId) { 119 owner.mProfileOwners.put(userId, new OwnerInfo(ownerName, admin)); 146 void setProfileOwner(ComponentName admin, String ownerName, int userId) { 147 mProfileOwners.put(userId, new OwnerInfo(ownerName, admin)); 166 return profileOwner != null ? profileOwner.admin : null; 234 ComponentName admin = ComponentName.unflattenFromString( local 236 if (admin != null) { 237 profileOwnerInfo = new OwnerInfo(profileOwnerName, admin); 293 if (ownerInfo.admin != null) { 294 out.attribute(null, ATTR_COMPONENT_NAME, ownerInfo.admin.flattenToString()) 335 public ComponentName admin; field in class:DeviceOwner.OwnerInfo [all...] |
DevicePolicyManagerService.java | 32 import android.app.admin.DeviceAdminInfo; 33 import android.app.admin.DeviceAdminReceiver; 34 import android.app.admin.DevicePolicyManager; 35 import android.app.admin.DevicePolicyManagerInternal; 36 import android.app.admin.IDevicePolicyManager; 213 * Whether or not device admin feature is supported. If it isn't return defaults for all 1048 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who); local 1067 ActiveAdmin admin = policy.mAdminMap.get(who); local 1161 final ActiveAdmin admin = policy.mAdminList.get(i); local 1183 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1599 final ActiveAdmin admin = policy.mAdminList.get(i); local 1824 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1874 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1884 ActiveAdmin admin = policy.mAdminList.get(i); local 1921 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1931 ActiveAdmin admin = policy.mAdminList.get(i); local 1968 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1978 ActiveAdmin admin = policy.mAdminList.get(i); local 2030 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2039 ActiveAdmin admin = policy.mAdminList.get(i); local 2128 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2137 ActiveAdmin admin = policy.mAdminList.get(i); local 2184 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2194 ActiveAdmin admin = policy.mAdminList.get(i); local 2228 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2238 ActiveAdmin admin = policy.mAdminList.get(i); local 2275 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2285 ActiveAdmin admin = policy.mAdminList.get(i); local 2322 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2332 ActiveAdmin admin = policy.mAdminList.get(i); local 2369 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2379 ActiveAdmin admin = policy.mAdminList.get(i); local 2416 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2426 ActiveAdmin admin = policy.mAdminList.get(i); local 2513 ActiveAdmin admin = (who != null) ? getActiveAdminUncheckedLocked(who, userHandle) local 2734 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2744 ActiveAdmin admin = policy.mAdminList.get(i); local 2929 final ActiveAdmin admin = getActiveAdminForCallerLocked(null, local 2982 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); local 3063 ActiveAdmin admin = policy.mAdminList.get(i); local 3153 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 3446 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 3453 ActiveAdmin admin = policy.mAdminList.get(i); local 3485 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 3556 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 3564 ActiveAdmin admin = policy.mAdminList.get(i); local 3607 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 3616 ActiveAdmin admin = policy.mAdminList.get(i); local 3707 ActiveAdmin admin = policy.mAdminList.get(i); local 3914 ActiveAdmin admin = policy.mAdminList.get(i); local 4342 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 4361 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 4385 ActiveAdmin admin = policy.mAdminList.get(j); local 4500 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 4519 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 4550 ActiveAdmin admin = policy.mAdminList.get(j); local 4987 ActiveAdmin admin = policy.mAdminList.get(i); local 5051 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5071 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5082 ActiveAdmin admin = getProfileOwnerAdmin(userId); local 5334 ActiveAdmin admin = policy.mAdminMap.get(ownerComponent); local [all...] |
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/irc/ |
irclib.py | 634 def admin(self, server=""): member in class:ServerConnection 635 """Send an ADMIN command.""" 636 self.send_raw(" ".join(["ADMIN", server]).strip()) [all...] |
/prebuilts/sdk/tools/lib/ |
shrinkedAndroid.jar | |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.equinox.frameworkadmin.equinox_1.0.200.v20100505.jar | |
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/tycho-bundles-external/0.20.0/eclipse/plugins/ |
org.eclipse.equinox.frameworkadmin.equinox_1.0.500.v20130327-2119.jar | |
/prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/ |
org.eclipse.equinox.frameworkadmin.equinox_1.0.500.v20130327-2119.jar | |
/prebuilts/devtools/tools/lib/ |
osgi-4.0.0.jar | |
/prebuilts/tools/common/m2/repository/com/android/external/osgi/osgi/4.0.0/ |
osgi-4.0.0.jar | |
/prebuilts/tools/common/osgi/ |
osgi.jar | |
/prebuilts/sdk/21/ |
android.jar | |