/cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/ |
DeviceOwnerPositiveTestActivity.java | 23 import android.app.admin.DevicePolicyManager; 144 // device admin settings
|
ByodHelperActivity.java | 20 import android.app.admin.DevicePolicyManager;
|
IntentFiltersTestHelper.java | 20 import android.app.admin.DevicePolicyManager;
|
PolicyTransparencyTestActivity.java | 20 import android.app.admin.DevicePolicyManager;
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
PermissionsTest.java | 18 import android.app.admin.DevicePolicyManager;
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
KeyManagementTest.java | 22 import android.app.admin.DevicePolicyManager; 213 final String alias = "com.android.test.null-admin-1";
|
/developers/build/prebuilts/gradle/DeviceOwner/Application/src/main/java/com/example/android/deviceowner/ |
DeviceOwnerFragment.java | 21 import android.app.admin.DevicePolicyManager;
|
/developers/samples/android/admin/DeviceOwner/Application/src/main/java/com/example/android/deviceowner/ |
DeviceOwnerFragment.java | 21 import android.app.admin.DevicePolicyManager;
|
/development/samples/browseable/DeviceOwner/src/com.example.android.deviceowner/ |
DeviceOwnerFragment.java | 21 import android.app.admin.DevicePolicyManager;
|
/external/chromium-trace/catapult/telemetry/telemetry/core/ |
platform.py | 180 Set |elevate_privilege| to launch the application with root or admin rights.
|
/frameworks/base/core/java/android/content/ |
RestrictionsManager.java | 20 import android.app.admin.DevicePolicyManager;
|
/frameworks/base/packages/Keyguard/test/src/com/android/keyguard/test/ |
KeyguardTestActivity.java | 25 import android.app.admin.DevicePolicyManager;
|
/packages/apps/Settings/src/com/android/settings/ |
ConfirmDeviceCredentialBaseFragment.java | 25 import android.app.admin.DevicePolicyManager;
|
ProxySelector.java | 22 import android.app.admin.DevicePolicyManager; 82 // Disable UI if the Global Proxy is being controlled by a Device Admin
|
/packages/apps/Settings/src/com/android/settings/applications/ |
InstalledAppDetails.java | 25 import android.app.admin.DevicePolicyManager; 221 // If this is a device admin, it can't be uninstalled or disabled. 706 // User can't force stop device admin. 770 EnforcedAdmin admin = RestrictedLockUtils.checkIfUninstallBlocked(getActivity(), 774 if (admin != null && !uninstallBlockedBySystem) [all...] |
/packages/providers/ContactsProvider/tests/src/com/android/providers/contacts/enterprise/ |
EnterprisePolicyGuardTest.java | 18 import android.app.admin.DevicePolicyManager;
|
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/policy/ |
UserSwitcherController.java | 680 EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(mContext, local 682 if (admin != null && !RestrictedLockUtils.hasBaseUserRestriction(mContext, 685 record.enforcedAdmin = admin; [all...] |
/packages/apps/Email/provider_src/com/android/email/ |
SecurityPolicy.java | 19 import android.app.admin.DeviceAdminInfo; 20 import android.app.admin.DeviceAdminReceiver; 21 import android.app.admin.DevicePolicyManager; 387 // no check required for remote wipe (it's supported, if we're the admin) 403 * we only proceed if we are already active as an admin. 412 LogUtils.d(TAG, "setActivePolicies: none, remove admin"); 492 * This will kick off the notify-acquire-admin-state process and/or increase the security level. 684 LogUtils.d(Logging.LOG_TAG, "Could not remote wipe because not device admin."); 688 * If we are not the active device admin, try to become so. 705 * Report admin component name - for making calls into device policy manage [all...] |
/packages/apps/Settings/src/com/android/settings/deviceinfo/ |
StorageSettings.java | 404 EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced( 410 if (admin != null && !hasBaseUserRestriction) { 411 RestrictedLockUtils.sendShowAdminSupportDetailsIntent(getActivity(), admin);
|
/prebuilts/sdk/21/ |
android.jar | |
/prebuilts/sdk/22/ |
android.jar | |
/cts/hostsidetests/appsecurity/test-apps/EncryptionApp/src/com/android/cts/encryptionapp/ |
EncryptionAppTest.java | 22 import android.app.admin.DevicePolicyManager;
|
/external/valgrind/massif/ |
ms_main.c | 91 desc: --heap-admin=foo 119 n_events: n time(ms) total(B) useful-heap(B) admin-heap(B) stacks(B) 136 Massif arguments: --heap-admin=foo 148 -------------------------------------------------------------------------------- n time(ms) total(B) useful-heap(B) admin-heap(B) stacks(B) 197 // size, heap admin size and stack size. 265 static SizeT heap_extra_szB = 0; // Live heap extra size -- slop + admin bytes 273 // allocated/deallocated amount; includes heap, heap-admin and stack 414 else if VG_BINT_CLO(arg, "--heap-admin", clo_heap_admin, 0, 1024) {} 458 " --heap-admin=<size> average admin bytes per heap block;\n [all...] |
/frameworks/base/core/java/android/app/admin/ |
DeviceAdminInfo.java | 17 package android.app.admin; 56 * A type of policy that this device admin can use: device owner meta-policy 57 * for an admin that is designated as owner of the device. 64 * A type of policy that this device admin can use: profile owner meta-policy 72 * A type of policy that this device admin can use: limit the passwords 76 * <p>To control this policy, the device admin must have a "limit-password" 82 * A type of policy that this device admin can use: able to watch login 87 * <p>To control this policy, the device admin must have a "watch-login" 93 * A type of policy that this device admin can use: able to reset the 97 * <p>To control this policy, the device admin must have a "reset-password [all...] |
/frameworks/base/core/java/android/os/ |
Environment.java | 19 import android.app.admin.DevicePolicyManager; [all...] |