HomeSort by relevance Sort by last modified time
    Searched refs:admin (Results 276 - 300 of 465) sorted by null

<<111213141516171819

  /cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/
DeviceOwnerPositiveTestActivity.java 23 import android.app.admin.DevicePolicyManager;
144 // device admin settings
ByodHelperActivity.java 20 import android.app.admin.DevicePolicyManager;
IntentFiltersTestHelper.java 20 import android.app.admin.DevicePolicyManager;
PolicyTransparencyTestActivity.java 20 import android.app.admin.DevicePolicyManager;
  /cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/
PermissionsTest.java 18 import android.app.admin.DevicePolicyManager;
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/
KeyManagementTest.java 22 import android.app.admin.DevicePolicyManager;
213 final String alias = "com.android.test.null-admin-1";
  /developers/build/prebuilts/gradle/DeviceOwner/Application/src/main/java/com/example/android/deviceowner/
DeviceOwnerFragment.java 21 import android.app.admin.DevicePolicyManager;
  /developers/samples/android/admin/DeviceOwner/Application/src/main/java/com/example/android/deviceowner/
DeviceOwnerFragment.java 21 import android.app.admin.DevicePolicyManager;
  /development/samples/browseable/DeviceOwner/src/com.example.android.deviceowner/
DeviceOwnerFragment.java 21 import android.app.admin.DevicePolicyManager;
  /external/chromium-trace/catapult/telemetry/telemetry/core/
platform.py 180 Set |elevate_privilege| to launch the application with root or admin rights.
  /frameworks/base/core/java/android/content/
RestrictionsManager.java 20 import android.app.admin.DevicePolicyManager;
  /frameworks/base/packages/Keyguard/test/src/com/android/keyguard/test/
KeyguardTestActivity.java 25 import android.app.admin.DevicePolicyManager;
  /packages/apps/Settings/src/com/android/settings/
ConfirmDeviceCredentialBaseFragment.java 25 import android.app.admin.DevicePolicyManager;
ProxySelector.java 22 import android.app.admin.DevicePolicyManager;
82 // Disable UI if the Global Proxy is being controlled by a Device Admin
  /packages/apps/Settings/src/com/android/settings/applications/
InstalledAppDetails.java 25 import android.app.admin.DevicePolicyManager;
221 // If this is a device admin, it can't be uninstalled or disabled.
706 // User can't force stop device admin.
770 EnforcedAdmin admin = RestrictedLockUtils.checkIfUninstallBlocked(getActivity(),
774 if (admin != null && !uninstallBlockedBySystem)
    [all...]
  /packages/providers/ContactsProvider/tests/src/com/android/providers/contacts/enterprise/
EnterprisePolicyGuardTest.java 18 import android.app.admin.DevicePolicyManager;
  /frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/policy/
UserSwitcherController.java 680 EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(mContext, local
682 if (admin != null && !RestrictedLockUtils.hasBaseUserRestriction(mContext,
685 record.enforcedAdmin = admin;
    [all...]
  /packages/apps/Email/provider_src/com/android/email/
SecurityPolicy.java 19 import android.app.admin.DeviceAdminInfo;
20 import android.app.admin.DeviceAdminReceiver;
21 import android.app.admin.DevicePolicyManager;
387 // no check required for remote wipe (it's supported, if we're the admin)
403 * we only proceed if we are already active as an admin.
412 LogUtils.d(TAG, "setActivePolicies: none, remove admin");
492 * This will kick off the notify-acquire-admin-state process and/or increase the security level.
684 LogUtils.d(Logging.LOG_TAG, "Could not remote wipe because not device admin.");
688 * If we are not the active device admin, try to become so.
705 * Report admin component name - for making calls into device policy manage
    [all...]
  /packages/apps/Settings/src/com/android/settings/deviceinfo/
StorageSettings.java 404 EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(
410 if (admin != null && !hasBaseUserRestriction) {
411 RestrictedLockUtils.sendShowAdminSupportDetailsIntent(getActivity(), admin);
  /prebuilts/sdk/21/
android.jar 
  /prebuilts/sdk/22/
android.jar 
  /cts/hostsidetests/appsecurity/test-apps/EncryptionApp/src/com/android/cts/encryptionapp/
EncryptionAppTest.java 22 import android.app.admin.DevicePolicyManager;
  /external/valgrind/massif/
ms_main.c 91 desc: --heap-admin=foo
119 n_events: n time(ms) total(B) useful-heap(B) admin-heap(B) stacks(B)
136 Massif arguments: --heap-admin=foo
148 -------------------------------------------------------------------------------- n time(ms) total(B) useful-heap(B) admin-heap(B) stacks(B)
197 // size, heap admin size and stack size.
265 static SizeT heap_extra_szB = 0; // Live heap extra size -- slop + admin bytes
273 // allocated/deallocated amount; includes heap, heap-admin and stack
414 else if VG_BINT_CLO(arg, "--heap-admin", clo_heap_admin, 0, 1024) {}
458 " --heap-admin=<size> average admin bytes per heap block;\n
    [all...]
  /frameworks/base/core/java/android/app/admin/
DeviceAdminInfo.java 17 package android.app.admin;
56 * A type of policy that this device admin can use: device owner meta-policy
57 * for an admin that is designated as owner of the device.
64 * A type of policy that this device admin can use: profile owner meta-policy
72 * A type of policy that this device admin can use: limit the passwords
76 * <p>To control this policy, the device admin must have a "limit-password"
82 * A type of policy that this device admin can use: able to watch login
87 * <p>To control this policy, the device admin must have a "watch-login"
93 * A type of policy that this device admin can use: able to reset the
97 * <p>To control this policy, the device admin must have a "reset-password
    [all...]
  /frameworks/base/core/java/android/os/
Environment.java 19 import android.app.admin.DevicePolicyManager;
    [all...]

Completed in 3820 milliseconds

<<111213141516171819