/cts/tests/admin/app/src/android/admin/app/ |
CtsDeviceAdminBrokenReceiver.java | 17 package android.admin.app; 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver2.java | 17 package android.admin.app; 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver3.java | 17 package android.admin.app; 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver4.java | 17 package android.admin.app; 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver5.java | 17 package android.admin.app; 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminDeactivatedReceiver.java | 17 package android.admin.app; 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminDeviceOwner.java | 17 package android.admin.app; 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminReceiver.java | 17 package android.admin.app; 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminReceiver2.java | 17 package android.admin.app; 19 import android.app.admin.DeviceAdminReceiver;
|
/frameworks/base/core/java/android/app/admin/ |
SystemUpdatePolicy.aidl | 18 package android.app.admin;
|
DevicePolicyManager.java | 17 package android.app.admin; 28 import android.app.admin.SecurityLog.SecurityEvent; 81 * registered with the system as a <a href="{@docRoot}guide/topics/admin/device-admin.html">device 91 * "{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> developer 214 * <p> During device owner provisioning a device admin app is set as the owner of the device. 253 * <p>During device owner provisioning, a device admin app is downloaded and set as the owner of 303 * <p>During device owner provisioning a device admin app is set as the owner of the device. 454 * <p> When this extra is set, the application must have exactly one device admin receiver [all...] |
IDevicePolicyManager.aidl | 18 package android.app.admin; 20 import android.app.admin.SystemUpdatePolicy; 76 void setMaximumFailedPasswordsForWipe(in ComponentName admin, int num, boolean parent); 77 int getMaximumFailedPasswordsForWipe(in ComponentName admin, int userHandle, boolean parent); 89 ComponentName setGlobalProxy(in ComponentName admin, String proxySpec, String exclusionList); 91 void setRecommendedGlobalProxy(in ComponentName admin, in ProxyInfo proxyInfo); 143 String[] setPackagesSuspended(in ComponentName admin, in String[] packageNames, boolean suspended); 144 boolean isPackageSuspended(in ComponentName admin, String packageName); 146 boolean installCaCert(in ComponentName admin, in byte[] certBuffer); 147 void uninstallCaCerts(in ComponentName admin, in String[] aliases) [all...] |
/external/libpcap/ |
chmod_bpf | 7 # This startup item will make it owned by the admin group, 8 # with permissions rw-rw----, so that anybody in the admin 16 # admin group can capture packets. 18 chgrp admin /dev/bpf*
|
/cts/hostsidetests/devicepolicy/app/DeviceAdmin/src/com.android.cts.deviceadmin/ |
DeviceAdminReceiverWithNoProtection.java | 18 import android.app.admin.DeviceAdminReceiver; 21 * Active admin with no android:permission="android.permission.BIND_DEVICE_ADMIN". It can still
|
/cts/tests/deviceadmin/deviceadminapp/src/android/devicepolicy/cts/emptydeviceadmin/ |
EmptyDeviceAdmin.java | 18 import android.app.admin.DeviceAdminReceiver;
|
/external/autotest/apache/conf/ |
django-directives | 27 RewriteCond /usr/lib64/python2.7/site-packages/django/contrib/admin/static/admin -d 28 RewriteRule ^/media/(css|img|js)(.*) /usr/lib64/python2.7/site-packages/django/contrib/admin/static/admin/$1/$2 29 RewriteCond /usr/lib64/python2.7/site-packages/django/contrib/admin/static/admin -d 30 RewriteRule ^/afe/server/admin/admin/(css|img|js)(.*) /usr/lib64/python2.7/site-packages/django/contrib/admin/static/admin/$1/$ [all...] |
/external/fio/examples/ |
rbd.fio | 15 clientname=admin
|
/external/libpcap/ChmodBPF/ |
ChmodBPF | 11 # This startup item will make it owned by the admin group, 12 # with permissions rw-rw----, so that anybody in the admin 20 # admin group can capture packets. 22 chgrp admin /dev/bpf*
|
/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/ |
DummyDeviceAdmins.java | 18 import android.app.admin.DeviceAdminReceiver;
|
DpmTestBase.java | 87 protected void setUpPackageManagerForAdmin(ComponentName admin, int packageUid) 89 setUpPackageManagerForAdmin(admin, packageUid, 93 protected void setUpPackageManagerForAdmin(ComponentName admin, int packageUid, 95 setUpPackageManagerForAdmin(admin, packageUid, enabledSetting, /* appTargetSdk = */ null); 98 protected void setUpPackageManagerForAdmin(ComponentName admin, int packageUid, 100 setUpPackageManagerForFakeAdmin(admin, packageUid, enabledSetting, appTargetSdk, 101 admin); 105 * Set up a component in the mock package manager to be an active admin. 107 * @param admin ComponentName that's visible to the test code, which doesn't have to exist. 108 * @param copyFromAdmin package information for {@code admin} will be built based on thi [all...] |
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/parser/ |
MessageParser.java | 19 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE; 20 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE; 21 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME; 22 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_MINIMUM_VERSION_CODE; 23 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM; 24 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_COOKIE_HEADER; 25 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION; 26 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME; 27 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_SIGNATURE_CHECKSUM; 28 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED [all...] |
ExtrasProvisioningDataParser.java | 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE_FROM_TRUSTED_SOURCE; 21 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 22 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_SHAREABLE_DEVICE; 23 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_USER; 24 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE; 25 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE; 26 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME; 27 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_MINIMUM_VERSION_CODE; 28 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM [all...] |
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/ |
RestrictedLockUtils.java | 20 import android.app.admin.DevicePolicyManager; 43 * Utility class to host methods usable in adding a restricted padlock icon and showing admin 48 * @return drawables for displaying with settings that are locked by a device admin. 59 * Checks if a restriction is enforced on a user and returns the enforced admin and 60 * admin userId. 64 * @return EnforcedAdmin Object containing the enforced admin component and admin user details, 66 * and profile owner, then the admin component will be set to {@code null} and userId to 93 // When the restriction is enforced by device owner, return the device owner admin only 94 // if the admin is for the {@param userId} otherwise return a default EnforcedAdmin 237 EnforcedAdmin admin = getProfileOrDeviceOwner(context, userId); local 271 EnforcedAdmin admin = getProfileOwner(context, userId); local 290 EnforcedAdmin admin = getProfileOrDeviceOwner(context, userId); local [all...] |
/packages/apps/ManagedProvisioning/tests/src/com/android/managedprovisioning/parser/ |
PropertiesProvisioningDataParserTest.java | 18 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 19 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE; 20 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE; 21 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME; 22 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_MINIMUM_VERSION_CODE; 23 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM; 24 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_COOKIE_HEADER; 25 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION; 26 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME; 27 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_SIGNATURE_CHECKSUM [all...] |
/external/autotest/frontend/ |
urls.py | 5 # The next two lines enable the admin and load each admin.py file: 6 from django.contrib import admin namespace 7 admin.autodiscover() 17 (RE_PREFIX + r'admin/', defaults.include(admin.site.urls)),
|