/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
TestDeviceAdminReceiver.java | 17 package com.android.cts.verifier.admin; 19 import android.app.admin.DeviceAdminReceiver;
|
ScreenLockTestActivity.java | 17 package com.android.cts.verifier.admin; 24 import android.app.admin.DevicePolicyManager;
|
PolicySerializationTestActivity.java | 17 package com.android.cts.verifier.admin; 23 import android.app.admin.DevicePolicyManager; 155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local 157 item.applyExpectedValue(mDevicePolicyManager, admin); 245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin); 253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin); 292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) { 293 mActualValue = getDeviceManagerValue(deviceManager, admin); 297 ComponentName admin); 407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) { [all...] |
/frameworks/base/core/java/android/app/admin/ |
DevicePolicyManagerInternal.java | 17 package android.app.admin; 65 * Checks if an app with given uid is an active device admin of its user and has the policy 69 * @return true if the uid is an active admin with the given policy.
|
SystemUpdatePolicy.java | 17 package android.app.admin;
|
DeviceAdminReceiver.java | 17 package android.app.admin; 60 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> 85 * disabling your admin, by setting the extra field 88 * to the user before they disable your admin. 96 * impact of disabling your admin. 123 * <p>The calling device admin must have requested 139 * <p>The calling device admin must have requested 151 * <p>The calling device admin must have requested 163 * <p>The calling device admin must have requeste [all...] |
DeviceAdminInfo.java | 17 package android.app.admin; 55 * A type of policy that this device admin can use: device owner meta-policy 56 * for an admin that is designated as owner of the device. 63 * A type of policy that this device admin can use: profile owner meta-policy 71 * A type of policy that this device admin can use: limit the passwords 75 * <p>To control this policy, the device admin must have a "limit-password" 81 * A type of policy that this device admin can use: able to watch login 86 * <p>To control this policy, the device admin must have a "watch-login" 92 * A type of policy that this device admin can use: able to reset the 96 * <p>To control this policy, the device admin must have a "reset-password [all...] |
DevicePolicyManager.java | 17 package android.app.admin; 72 * <a href="{@docRoot}guide/topics/admin/device-admin.html">device administrator</a>. Additionally, 80 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> 142 * <p> During device owner provisioning a device admin app is set as the owner of the device. 211 * <p> When this extra is set, the application must have exactly one device admin receiver. 212 * This receiver will be set as the profile or device owner and active admin. 223 * A ComponentName extra indicating the device admin receiver of the mobile device management 224 * application that will be set as the profile owner or device owner and active admin [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/ |
DeviceOwnerTest.java | 56 ComponentName admin = new ComponentName( local 58 out.setProfileOwner(admin, "some-company", 1); 67 assertEquals(admin, in.getProfileOwnerComponent(1));
|
/cts/tests/tests/admin/src/android/admin/cts/ |
DeviceAdminInfoTest.java | 17 package android.admin.cts; 19 import android.app.admin.DeviceAdminInfo;
|
DeviceAdminActivationTest.java | 17 package android.admin.cts; 20 import android.app.admin.DevicePolicyManager; 43 * Tests for the standard way of activating a Device Admin: by starting system UI via an 52 // IMPLEMENTATION NOTE: Because Device Admin activation requires the use of
|
DeviceAdminReceiverTest.java | 17 package android.admin.cts; 19 import android.app.admin.DeviceAdminReceiver;
|
DevicePolicyManagerTest.java | 17 package android.admin.cts; 19 import android.app.admin.DevicePolicyManager; 36 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_COMPLEX; 709 mDevicePolicyManager.createAndInitializeUser(mComponent, "name", "admin name", [all...] |
/external/valgrind/helgrind/ |
hg_lock_n_thread.h | 83 /* ADMIN */ 84 struct _Thread* admin; member in struct:_Thread 123 /* ADMIN */
|
/external/valgrind/exp-sgcheck/ |
h_main.c | 150 struct _SegGroup* admin; member in struct:_SegGroup 175 g->admin = NULL; 181 g->admin = group_list;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/ |
ByodHelperActivity.java | 20 import android.app.admin.DevicePolicyManager; 216 ComponentName admin = DeviceAdminTestReceiver.getReceiverComponentName(); local 217 mDevicePolicyManager.setKeyguardDisabledFeatures(admin, value);
|
DeviceOwnerPositiveTestActivity.java | 21 import android.app.admin.DevicePolicyManager; 140 // device admin settings 275 ComponentName admin = DeviceAdminTestReceiver.getReceiverComponentName(); local 280 dpm.addUserRestriction(admin, restrictionKey); 284 dpm.clearUserRestriction(admin, restrictionKey); 287 tearDown(dpm, admin); 291 dpm.setGlobalSetting(admin, setting, value); 294 dpm.setStatusBarDisabled(admin, value); 300 dpm.setKeyguardDisabled(admin, value); 320 private void tearDown(DevicePolicyManager dpm, ComponentName admin) { [all...] |
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
DeviceOwner.java | 20 import android.app.admin.SystemUpdatePolicy; 120 static DeviceOwner createWithDeviceInitializer(ComponentName admin) { 122 owner.mDeviceInitializer = new OwnerInfo(null, admin); 129 static DeviceOwner createWithProfileOwner(ComponentName admin, String ownerName, int userId) { 131 owner.mProfileOwners.put(userId, new OwnerInfo(ownerName, admin)); 152 return mDeviceInitializer.admin; 159 void setDeviceInitializer(ComponentName admin) { 160 mDeviceInitializer = new OwnerInfo(null, admin); 171 void setProfileOwner(ComponentName admin, String ownerName, int userId) { 172 mProfileOwners.put(userId, new OwnerInfo(ownerName, admin)); 258 ComponentName admin = local 275 ComponentName admin = ComponentName.unflattenFromString( local 397 public final ComponentName admin; field in class:DeviceOwner.OwnerInfo [all...] |
DevicePolicyManagerService.java | 20 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_COMPLEX; 21 import static android.app.admin.DevicePolicyManager.WIPE_EXTERNAL_STORAGE; 22 import static android.app.admin.DevicePolicyManager.WIPE_RESET_PROTECTION_DATA; 40 import android.app.admin.DeviceAdminInfo; 41 import android.app.admin.DeviceAdminReceiver; 42 import android.app.admin.DevicePolicyManager; 43 import android.app.admin.DevicePolicyManagerInternal; 44 import android.app.admin.IDevicePolicyManager; 45 import android.app.admin.SystemUpdatePolicy; 216 // The following user restrictions cannot be changed by any active admin, including devic 1202 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who); local 1223 ActiveAdmin admin = policy.mAdminMap.get(who); local 1247 ActiveAdmin admin = policy.mAdminMap.get(who); local 1334 final ActiveAdmin admin = policy.mAdminList.get(i); local 1356 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1838 final ActiveAdmin admin = policy.mAdminList.get(i); local 2083 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 2133 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2143 ActiveAdmin admin = policy.mAdminList.get(i); local 2180 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2190 ActiveAdmin admin = policy.mAdminList.get(i); local 2227 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2237 ActiveAdmin admin = policy.mAdminList.get(i); local 2287 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2296 ActiveAdmin admin = policy.mAdminList.get(i); local 2385 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2394 ActiveAdmin admin = policy.mAdminList.get(i); local 2442 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2452 ActiveAdmin admin = policy.mAdminList.get(i); local 2486 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2496 ActiveAdmin admin = policy.mAdminList.get(i); local 2533 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2543 ActiveAdmin admin = policy.mAdminList.get(i); local 2583 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2593 ActiveAdmin admin = policy.mAdminList.get(i); local 2633 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2643 ActiveAdmin admin = policy.mAdminList.get(i); local 2683 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2693 ActiveAdmin admin = policy.mAdminList.get(i); local 2786 ActiveAdmin admin = (who != null) ? getActiveAdminUncheckedLocked(who, userHandle) local 2799 ActiveAdmin admin = getAdminWithMinimumFailedPasswordsForWipeLocked(userHandle); local 3048 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 3058 ActiveAdmin admin = policy.mAdminList.get(i); local 3342 final ActiveAdmin admin = getActiveAdminForCallerLocked(null, local 3432 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); local 3514 ActiveAdmin admin = policy.mAdminList.get(i); local 3605 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 3902 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 3909 ActiveAdmin admin = policy.mAdminList.get(i); local 3940 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 4013 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 4021 ActiveAdmin admin = policy.mAdminList.get(i); local 4068 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 4091 ActiveAdmin admin = policy.mAdminList.get(i); local 4207 ActiveAdmin admin = policy.mAdminList.get(i); local 4340 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, UserHandle.getCallingUserId()); local 4578 ActiveAdmin admin = policy.mAdminList.get(i); local 5088 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5104 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5128 ActiveAdmin admin = policy.mAdminList.get(j); local 5236 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5252 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5283 ActiveAdmin admin = policy.mAdminList.get(j); local 5711 ActiveAdmin admin = policy.mAdminList.get(i); local 5772 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5788 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5799 ActiveAdmin admin = getProfileOwnerAdmin(userId); local 5864 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5880 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5892 ActiveAdmin admin = getProfileOwnerAdmin(userId); local 6259 ActiveAdmin admin = policy.mAdminMap.get(ownerComponent); local [all...] |
/prebuilts/sdk/tools/lib/ |
shrinkedAndroid.jar | |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.equinox.frameworkadmin.equinox_1.0.200.v20100505.jar | |
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/tycho-bundles-external/0.20.0/eclipse/plugins/ |
org.eclipse.equinox.frameworkadmin.equinox_1.0.500.v20130327-2119.jar | |
/prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/ |
org.eclipse.equinox.frameworkadmin.equinox_1.0.500.v20130327-2119.jar | |
/prebuilts/devtools/tools/lib/ |
osgi-4.0.0.jar | |
/prebuilts/tools/common/m2/repository/com/android/external/osgi/osgi/4.0.0/ |
osgi-4.0.0.jar | |