HomeSort by relevance Sort by last modified time
    Searched defs:admin (Results 1 - 25 of 74) sorted by null

1 2 3

  /cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/
TestDeviceAdminReceiver.java 17 package com.android.cts.verifier.admin;
19 import android.app.admin.DeviceAdminReceiver;
ScreenLockTestActivity.java 17 package com.android.cts.verifier.admin;
24 import android.app.admin.DevicePolicyManager;
PolicySerializationTestActivity.java 17 package com.android.cts.verifier.admin;
23 import android.app.admin.DevicePolicyManager;
155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local
157 item.applyExpectedValue(mDevicePolicyManager, admin);
245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin);
253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin);
292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) {
293 mActualValue = getDeviceManagerValue(deviceManager, admin);
297 ComponentName admin);
407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) {
    [all...]
  /frameworks/base/core/java/android/app/admin/
DevicePolicyManagerInternal.java 17 package android.app.admin;
65 * Checks if an app with given uid is an active device admin of its user and has the policy
69 * @return true if the uid is an active admin with the given policy.
SystemUpdatePolicy.java 17 package android.app.admin;
DeviceAdminReceiver.java 17 package android.app.admin;
60 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a>
85 * disabling your admin, by setting the extra field
88 * to the user before they disable your admin.
96 * impact of disabling your admin.
123 * <p>The calling device admin must have requested
139 * <p>The calling device admin must have requested
151 * <p>The calling device admin must have requested
163 * <p>The calling device admin must have requeste
    [all...]
DeviceAdminInfo.java 17 package android.app.admin;
55 * A type of policy that this device admin can use: device owner meta-policy
56 * for an admin that is designated as owner of the device.
63 * A type of policy that this device admin can use: profile owner meta-policy
71 * A type of policy that this device admin can use: limit the passwords
75 * <p>To control this policy, the device admin must have a "limit-password"
81 * A type of policy that this device admin can use: able to watch login
86 * <p>To control this policy, the device admin must have a "watch-login"
92 * A type of policy that this device admin can use: able to reset the
96 * <p>To control this policy, the device admin must have a "reset-password
    [all...]
DevicePolicyManager.java 17 package android.app.admin;
72 * <a href="{@docRoot}guide/topics/admin/device-admin.html">device administrator</a>. Additionally,
80 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a>
142 * <p> During device owner provisioning a device admin app is set as the owner of the device.
211 * <p> When this extra is set, the application must have exactly one device admin receiver.
212 * This receiver will be set as the profile or device owner and active admin.
223 * A ComponentName extra indicating the device admin receiver of the mobile device management
224 * application that will be set as the profile owner or device owner and active admin
    [all...]
  /frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/
DeviceOwnerTest.java 56 ComponentName admin = new ComponentName( local
58 out.setProfileOwner(admin, "some-company", 1);
67 assertEquals(admin, in.getProfileOwnerComponent(1));
  /cts/tests/tests/admin/src/android/admin/cts/
DeviceAdminInfoTest.java 17 package android.admin.cts;
19 import android.app.admin.DeviceAdminInfo;
DeviceAdminActivationTest.java 17 package android.admin.cts;
20 import android.app.admin.DevicePolicyManager;
43 * Tests for the standard way of activating a Device Admin: by starting system UI via an
52 // IMPLEMENTATION NOTE: Because Device Admin activation requires the use of
DeviceAdminReceiverTest.java 17 package android.admin.cts;
19 import android.app.admin.DeviceAdminReceiver;
DevicePolicyManagerTest.java 17 package android.admin.cts;
19 import android.app.admin.DevicePolicyManager;
36 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_COMPLEX;
709 mDevicePolicyManager.createAndInitializeUser(mComponent, "name", "admin name",
    [all...]
  /external/valgrind/helgrind/
hg_lock_n_thread.h 83 /* ADMIN */
84 struct _Thread* admin; member in struct:_Thread
123 /* ADMIN */
  /external/valgrind/exp-sgcheck/
h_main.c 150 struct _SegGroup* admin; member in struct:_SegGroup
175 g->admin = NULL;
181 g->admin = group_list;
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/
ByodHelperActivity.java 20 import android.app.admin.DevicePolicyManager;
216 ComponentName admin = DeviceAdminTestReceiver.getReceiverComponentName(); local
217 mDevicePolicyManager.setKeyguardDisabledFeatures(admin, value);
DeviceOwnerPositiveTestActivity.java 21 import android.app.admin.DevicePolicyManager;
140 // device admin settings
275 ComponentName admin = DeviceAdminTestReceiver.getReceiverComponentName(); local
280 dpm.addUserRestriction(admin, restrictionKey);
284 dpm.clearUserRestriction(admin, restrictionKey);
287 tearDown(dpm, admin);
291 dpm.setGlobalSetting(admin, setting, value);
294 dpm.setStatusBarDisabled(admin, value);
300 dpm.setKeyguardDisabled(admin, value);
320 private void tearDown(DevicePolicyManager dpm, ComponentName admin) {
    [all...]
  /frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/
DeviceOwner.java 20 import android.app.admin.SystemUpdatePolicy;
120 static DeviceOwner createWithDeviceInitializer(ComponentName admin) {
122 owner.mDeviceInitializer = new OwnerInfo(null, admin);
129 static DeviceOwner createWithProfileOwner(ComponentName admin, String ownerName, int userId) {
131 owner.mProfileOwners.put(userId, new OwnerInfo(ownerName, admin));
152 return mDeviceInitializer.admin;
159 void setDeviceInitializer(ComponentName admin) {
160 mDeviceInitializer = new OwnerInfo(null, admin);
171 void setProfileOwner(ComponentName admin, String ownerName, int userId) {
172 mProfileOwners.put(userId, new OwnerInfo(ownerName, admin));
258 ComponentName admin = local
275 ComponentName admin = ComponentName.unflattenFromString( local
397 public final ComponentName admin; field in class:DeviceOwner.OwnerInfo
    [all...]
DevicePolicyManagerService.java 20 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_COMPLEX;
21 import static android.app.admin.DevicePolicyManager.WIPE_EXTERNAL_STORAGE;
22 import static android.app.admin.DevicePolicyManager.WIPE_RESET_PROTECTION_DATA;
40 import android.app.admin.DeviceAdminInfo;
41 import android.app.admin.DeviceAdminReceiver;
42 import android.app.admin.DevicePolicyManager;
43 import android.app.admin.DevicePolicyManagerInternal;
44 import android.app.admin.IDevicePolicyManager;
45 import android.app.admin.SystemUpdatePolicy;
216 // The following user restrictions cannot be changed by any active admin, including devic
1202 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who); local
1223 ActiveAdmin admin = policy.mAdminMap.get(who); local
1247 ActiveAdmin admin = policy.mAdminMap.get(who); local
1334 final ActiveAdmin admin = policy.mAdminList.get(i); local
1356 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local
1838 final ActiveAdmin admin = policy.mAdminList.get(i); local
2083 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local
2133 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2143 ActiveAdmin admin = policy.mAdminList.get(i); local
2180 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2190 ActiveAdmin admin = policy.mAdminList.get(i); local
2227 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2237 ActiveAdmin admin = policy.mAdminList.get(i); local
2287 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2296 ActiveAdmin admin = policy.mAdminList.get(i); local
2385 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2394 ActiveAdmin admin = policy.mAdminList.get(i); local
2442 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2452 ActiveAdmin admin = policy.mAdminList.get(i); local
2486 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2496 ActiveAdmin admin = policy.mAdminList.get(i); local
2533 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2543 ActiveAdmin admin = policy.mAdminList.get(i); local
2583 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2593 ActiveAdmin admin = policy.mAdminList.get(i); local
2633 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2643 ActiveAdmin admin = policy.mAdminList.get(i); local
2683 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2693 ActiveAdmin admin = policy.mAdminList.get(i); local
2786 ActiveAdmin admin = (who != null) ? getActiveAdminUncheckedLocked(who, userHandle) local
2799 ActiveAdmin admin = getAdminWithMinimumFailedPasswordsForWipeLocked(userHandle); local
3048 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
3058 ActiveAdmin admin = policy.mAdminList.get(i); local
3342 final ActiveAdmin admin = getActiveAdminForCallerLocked(null, local
3432 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); local
3514 ActiveAdmin admin = policy.mAdminList.get(i); local
3605 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
3902 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
3909 ActiveAdmin admin = policy.mAdminList.get(i); local
3940 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
4013 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
4021 ActiveAdmin admin = policy.mAdminList.get(i); local
4068 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
4091 ActiveAdmin admin = policy.mAdminList.get(i); local
4207 ActiveAdmin admin = policy.mAdminList.get(i); local
4340 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, UserHandle.getCallingUserId()); local
4578 ActiveAdmin admin = policy.mAdminList.get(i); local
5088 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
5104 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
5128 ActiveAdmin admin = policy.mAdminList.get(j); local
5236 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
5252 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
5283 ActiveAdmin admin = policy.mAdminList.get(j); local
5711 ActiveAdmin admin = policy.mAdminList.get(i); local
5772 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
5788 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
5799 ActiveAdmin admin = getProfileOwnerAdmin(userId); local
5864 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
5880 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
5892 ActiveAdmin admin = getProfileOwnerAdmin(userId); local
6259 ActiveAdmin admin = policy.mAdminMap.get(ownerComponent); local
    [all...]
  /prebuilts/sdk/tools/lib/
shrinkedAndroid.jar 
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
org.eclipse.equinox.frameworkadmin.equinox_1.0.200.v20100505.jar 
  /prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/tycho-bundles-external/0.20.0/eclipse/plugins/
org.eclipse.equinox.frameworkadmin.equinox_1.0.500.v20130327-2119.jar 
  /prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/
org.eclipse.equinox.frameworkadmin.equinox_1.0.500.v20130327-2119.jar 
  /prebuilts/devtools/tools/lib/
osgi-4.0.0.jar 
  /prebuilts/tools/common/m2/repository/com/android/external/osgi/osgi/4.0.0/
osgi-4.0.0.jar 

Completed in 1629 milliseconds

1 2 3