/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
TestDeviceAdminReceiver.java | 17 package com.android.cts.verifier.admin; 19 import android.app.admin.DeviceAdminReceiver;
|
ScreenLockTestActivity.java | 17 package com.android.cts.verifier.admin; 24 import android.app.admin.DevicePolicyManager;
|
PolicySerializationTestActivity.java | 17 package com.android.cts.verifier.admin; 23 import android.app.admin.DevicePolicyManager; 155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local 157 item.applyExpectedValue(mDevicePolicyManager, admin); 245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin); 253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin); 292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) { 293 mActualValue = getDeviceManagerValue(deviceManager, admin); 297 ComponentName admin); 407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) { [all...] |
/frameworks/base/core/java/android/app/admin/ |
DevicePolicyManagerInternal.java | 17 package android.app.admin;
|
DeviceAdminReceiver.java | 17 package android.app.admin; 57 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> 82 * disabling your admin, by setting the extra field 85 * to the user before they disable your admin. 93 * impact of disabling your admin. 120 * <p>The calling device admin must have requested 136 * <p>The calling device admin must have requested 148 * <p>The calling device admin must have requested 160 * <p>The calling device admin must have requeste [all...] |
DeviceAdminInfo.java | 17 package android.app.admin; 55 * A type of policy that this device admin can use: device owner meta-policy 56 * for an admin that is designated as owner of the device. 63 * A type of policy that this device admin can use: profile owner meta-policy 71 * A type of policy that this device admin can use: limit the passwords 75 * <p>To control this policy, the device admin must have a "limit-password" 81 * A type of policy that this device admin can use: able to watch login 86 * <p>To control this policy, the device admin must have a "watch-login" 92 * A type of policy that this device admin can use: able to reset the 96 * <p>To control this policy, the device admin must have a "reset-password [all...] |
DevicePolicyManager.java | 17 package android.app.admin; 23 import android.app.admin.IDevicePolicyManager; 67 * <a href={@docRoot}guide/topics/admin/device-admin.html">device administrator</a>. Additionally, 75 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> 299 * A String extra holding a url that specifies the download location of the device admin 300 * package. When not provided it is assumed that the device admin package is already installed. 333 * <p>During device owner provisioning a device admin app is set as the owner of the device. 401 * <p>The ComponentName of the profile owner admin is pass in {@link #EXTRA_DEVICE_ADMIN} extr [all...] |
/external/smack/src/org/xbill/DNS/ |
SOARecord.java | 17 private Name host, admin; field in class:SOARecord 30 * @param admin The zone administrator's address 40 SOARecord(Name name, int dclass, long ttl, Name host, Name admin, 45 this.admin = checkName("admin", admin); 56 admin = new Name(in); 67 admin = st.getName(origin); 81 sb.append(admin); 118 return admin; [all...] |
/cts/tests/tests/admin/src/android/admin/cts/ |
DeviceAdminInfoTest.java | 17 package android.admin.cts; 19 import android.app.admin.DeviceAdminInfo;
|
DeviceAdminActivationTest.java | 17 package android.admin.cts; 20 import android.app.admin.DevicePolicyManager; 43 * Tests for the standard way of activating a Device Admin: by starting system UI via an 52 // IMPLEMENTATION NOTE: Because Device Admin activation requires the use of
|
DeviceAdminReceiverTest.java | 17 package android.admin.cts; 19 import android.app.admin.DeviceAdminReceiver;
|
DevicePolicyManagerTest.java | 17 package android.admin.cts; 19 import android.app.admin.DevicePolicyManager; 32 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_COMPLEX; 652 mDevicePolicyManager.createAndInitializeUser(mComponent, "name", "admin name", [all...] |
/external/valgrind/main/helgrind/ |
hg_lock_n_thread.h | 83 /* ADMIN */ 84 struct _Thread* admin; member in struct:_Thread 123 /* ADMIN */
|
/external/valgrind/main/exp-sgcheck/ |
h_main.c | 150 struct _SegGroup* admin; member in struct:_SegGroup 175 g->admin = NULL; 181 g->admin = group_list;
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
DeviceOwner.java | 117 static DeviceOwner createWithProfileOwner(ComponentName admin, String ownerName, int userId) { 119 owner.mProfileOwners.put(userId, new OwnerInfo(ownerName, admin)); 146 void setProfileOwner(ComponentName admin, String ownerName, int userId) { 147 mProfileOwners.put(userId, new OwnerInfo(ownerName, admin)); 166 return profileOwner != null ? profileOwner.admin : null; 234 ComponentName admin = ComponentName.unflattenFromString( local 236 if (admin != null) { 237 profileOwnerInfo = new OwnerInfo(profileOwnerName, admin); 293 if (ownerInfo.admin != null) { 294 out.attribute(null, ATTR_COMPONENT_NAME, ownerInfo.admin.flattenToString()) 335 public ComponentName admin; field in class:DeviceOwner.OwnerInfo [all...] |
DevicePolicyManagerService.java | 20 import static android.app.admin.DevicePolicyManager.WIPE_EXTERNAL_STORAGE; 21 import static android.app.admin.DevicePolicyManager.WIPE_RESET_PROTECTION_DATA; 34 import android.app.admin.DeviceAdminInfo; 35 import android.app.admin.DeviceAdminReceiver; 36 import android.app.admin.DevicePolicyManager; 37 import android.app.admin.DevicePolicyManagerInternal; 38 import android.app.admin.IDevicePolicyManager; 222 * Whether or not device admin feature is supported. If it isn't return defaults for all 1099 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who); local 1118 ActiveAdmin admin = policy.mAdminMap.get(who); local 1212 final ActiveAdmin admin = policy.mAdminList.get(i); local 1234 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1656 final ActiveAdmin admin = policy.mAdminList.get(i); local 1895 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1945 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1955 ActiveAdmin admin = policy.mAdminList.get(i); local 1992 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2002 ActiveAdmin admin = policy.mAdminList.get(i); local 2039 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2049 ActiveAdmin admin = policy.mAdminList.get(i); local 2101 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2110 ActiveAdmin admin = policy.mAdminList.get(i); local 2199 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2208 ActiveAdmin admin = policy.mAdminList.get(i); local 2255 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2265 ActiveAdmin admin = policy.mAdminList.get(i); local 2299 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2309 ActiveAdmin admin = policy.mAdminList.get(i); local 2346 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2356 ActiveAdmin admin = policy.mAdminList.get(i); local 2393 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2403 ActiveAdmin admin = policy.mAdminList.get(i); local 2440 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2450 ActiveAdmin admin = policy.mAdminList.get(i); local 2487 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2497 ActiveAdmin admin = policy.mAdminList.get(i); local 2587 ActiveAdmin admin = (who != null) ? getActiveAdminUncheckedLocked(who, userHandle) local 2600 ActiveAdmin admin = getAdminWithMinimumFailedPasswordsForWipeLocked(userHandle); local 2821 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2831 ActiveAdmin admin = policy.mAdminList.get(i); local 3013 final ActiveAdmin admin = getActiveAdminForCallerLocked(null, local 3078 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); local 3159 ActiveAdmin admin = policy.mAdminList.get(i); local 3250 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 3543 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 3550 ActiveAdmin admin = policy.mAdminList.get(i); local 3582 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 3653 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 3661 ActiveAdmin admin = policy.mAdminList.get(i); local 3704 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 3713 ActiveAdmin admin = policy.mAdminList.get(i); local 3816 ActiveAdmin admin = policy.mAdminList.get(i); local 4023 ActiveAdmin admin = policy.mAdminList.get(i); local 4466 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 4485 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 4509 ActiveAdmin admin = policy.mAdminList.get(j); local 4624 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 4643 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 4674 ActiveAdmin admin = policy.mAdminList.get(j); local 5128 ActiveAdmin admin = policy.mAdminList.get(i); local 5194 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5214 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5225 ActiveAdmin admin = getProfileOwnerAdmin(userId); local 5477 ActiveAdmin admin = policy.mAdminMap.get(ownerComponent); local [all...] |
/external/chromium_org/third_party/WebKit/Tools/Scripts/webkitpy/thirdparty/irc/ |
irclib.py | 634 def admin(self, server=""): member in class:ServerConnection 635 """Send an ADMIN command.""" 636 self.send_raw(" ".join(["ADMIN", server]).strip()) [all...] |
/prebuilts/sdk/tools/lib/ |
shrinkedAndroid.jar | |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.equinox.frameworkadmin.equinox_1.0.200.v20100505.jar | |
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/tycho-bundles-external/0.20.0/eclipse/plugins/ |
org.eclipse.equinox.frameworkadmin.equinox_1.0.500.v20130327-2119.jar | |
/prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/ |
org.eclipse.equinox.frameworkadmin.equinox_1.0.500.v20130327-2119.jar | |
/prebuilts/devtools/tools/lib/ |
osgi-4.0.0.jar | |
/prebuilts/tools/common/m2/repository/com/android/external/osgi/osgi/4.0.0/ |
osgi-4.0.0.jar | |
/prebuilts/tools/common/osgi/ |
osgi.jar | |
/prebuilts/sdk/system_current/ |
android.jar | |