/frameworks/base/packages/SettingsLib/src/com/android/settingslib/ |
RestrictedLockUtils.java | 116 * multiple admins, then the admin component will be set to {@code null} and userId to 130 final List<ComponentName> admins = dpm.getActiveAdminsAsUser(userId); local 131 if (admins == null) { 134 for (ComponentName admin : admins) { 144 // Consider all admins for this user and the profiles that are visible from this 147 final List<ComponentName> admins = dpm.getActiveAdminsAsUser(userInfo.id); local 148 if (admins == null) { 153 for (ComponentName admin : admins) { 162 // This same admins could have set policies both on the managed profile 381 * multiple device admins, then the admin component will be set to {@code null} and userId t 397 final List<ComponentName> admins = dpm.getActiveAdminsAsUser(userId); local 416 final List<ComponentName> admins = dpm.getActiveAdminsAsUser(userInfo.id); local 481 final List<ComponentName> admins = dpm.getActiveAdminsAsUser(userInfo.id); local [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/integration/dynamodb2/ |
test_highlevel.py | 326 admins = Table.create('admins', schema=[ 329 self.addCleanup(admins.delete) 331 admins.describe() 332 self.assertEqual(admins.throughput['read'], 5) 333 self.assertEqual(admins.indexes, []) 338 admins.query,
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
DevicePolicyManagerService.java | 508 handlePackagesChanged(null /* check all admins */, userHandle); 510 handlePackagesChanged(null /* check all admins */, userHandle); 2656 List<ActiveAdmin> admins = getActiveAdminsForLockscreenPoliciesLocked( local 3059 List<ActiveAdmin> admins = local 3080 ArrayList<ActiveAdmin> admins = new ArrayList<ActiveAdmin>(); local 3146 List<ActiveAdmin> admins = local 3190 List<ActiveAdmin> admins = local 3250 List<ActiveAdmin> admins = local 3347 List<ActiveAdmin> admins = getActiveAdminsForLockscreenPoliciesLocked(userHandle, parent); local 3401 List<ActiveAdmin> admins = local 3442 List<ActiveAdmin> admins = local 3486 List<ActiveAdmin> admins = local 3533 List<ActiveAdmin> admins = local 3580 List<ActiveAdmin> admins = local 3627 List<ActiveAdmin> admins = local 3778 List<ActiveAdmin> admins = getActiveAdminsForLockscreenPoliciesLocked(userHandle, parent); local 4127 List<ActiveAdmin> admins = getActiveAdminsForLockscreenPoliciesLocked( local 4141 ArrayList<ActiveAdmin> admins = new ArrayList<ActiveAdmin>(); local 4729 List<ActiveAdmin> admins = getActiveAdminsForLockscreenPoliciesLocked( local 5628 final List<ActiveAdmin> admins; local 6612 List<ActiveAdmin> admins = local [all...] |
/external/selinux/policycoreutils/sepolicy/ |
sepolicy.py | 137 admins = get_admin() 138 if values not in admins: 139 raise ValueError("%s must be an SELinux admin domain:\nValid admin domains: %s" % (values, ", ".join(admins)))
|
/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/ |
DevicePolicyManagerTest.java | 268 // Now we have two admins. 295 List<ComponentName> admins = dpm.getActiveAdmins(); local 296 assertEquals(2, admins.size()); 297 assertEquals(admin1, admins.get(0)); 298 assertEquals(admin2, admins.get(1)); 300 // Another user has no admins. [all...] |