/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.jdt.debug_3.6.1.v20100715_r361/ |
.api_description | 5 <type name="IJavaArray" restrictions="3"/> 6 <type name="IJavaArrayType" restrictions="3"/> 7 <type name="IJavaBreakpoint" restrictions="3"/> 8 <type name="IJavaClassObject" restrictions="3"/> 9 <type name="IJavaClassPrepareBreakpoint" restrictions="3"/> 10 <type name="IJavaClassType" restrictions="3"/> 11 <type name="IJavaDebugTarget" restrictions="3"/> 12 <type name="IJavaExceptionBreakpoint" restrictions="3"/> 13 <type name="IJavaFieldVariable" restrictions="3"/> 14 <type name="IJavaInterfaceType" restrictions="3"/ [all...] |
/development/samples/browseable/AppRestrictionEnforcer/ |
_index.jd | 8 This sample demonstrates how to set restrictions to other apps as a profile owner. 9 Use AppRestrictionSchema sample as a app with available restrictions.
|
/developers/build/prebuilts/gradle/AppRestrictionSchema/Application/src/main/java/com/example/android/apprestrictionschema/ |
AppRestrictionSchemaFragment.java | 41 * disabled according to the restrictions set by device/profile owner. You can use the 115 Bundle restrictions = manager.getApplicationRestrictions(); local 122 updateCanSayHello(entry, restrictions); 124 updateMessage(entry, restrictions); 126 updateNumber(entry, restrictions); 128 updateRank(entry, restrictions); 130 updateApprovals(entry, restrictions); 132 updateProfile(entry, restrictions); 134 updateItems(entry, restrictions); 139 private void updateCanSayHello(RestrictionEntry entry, Bundle restrictions) { [all...] |
/developers/samples/android/admin/AppRestrictionSchema/Application/src/main/java/com/example/android/apprestrictionschema/ |
AppRestrictionSchemaFragment.java | 41 * disabled according to the restrictions set by device/profile owner. You can use the 115 Bundle restrictions = manager.getApplicationRestrictions(); local 122 updateCanSayHello(entry, restrictions); 124 updateMessage(entry, restrictions); 126 updateNumber(entry, restrictions); 128 updateRank(entry, restrictions); 130 updateApprovals(entry, restrictions); 132 updateProfile(entry, restrictions); 134 updateItems(entry, restrictions); 139 private void updateCanSayHello(RestrictionEntry entry, Bundle restrictions) { [all...] |
/development/samples/browseable/AppRestrictionSchema/src/com.example.android.apprestrictionschema/ |
AppRestrictionSchemaFragment.java | 41 * disabled according to the restrictions set by device/profile owner. You can use the 115 Bundle restrictions = manager.getApplicationRestrictions(); local 122 updateCanSayHello(entry, restrictions); 124 updateMessage(entry, restrictions); 126 updateNumber(entry, restrictions); 128 updateRank(entry, restrictions); 130 updateApprovals(entry, restrictions); 132 updateProfile(entry, restrictions); 134 updateItems(entry, restrictions); 139 private void updateCanSayHello(RestrictionEntry entry, Bundle restrictions) { [all...] |
/external/autotest/client/site_tests/security_HardlinkRestrictions/ |
control | 7 PURPOSE = "Verify hardlink restrictions introduced by the Yama LSM" 8 CRITERIA = "Fails if kernel lacks hardlink restrictions" 18 Checks that the kernel correctly restrictions the creation of dangerous
|
/external/autotest/client/site_tests/security_SymlinkRestrictions/ |
control | 7 PURPOSE = "Verify symlink restrictions introduced by the Yama LSM" 8 CRITERIA = "Fails if kernel lacks symlink restrictions" 18 Checks that the kernel correctly restrictions the use of dangerous
|
/frameworks/base/services/restrictions/ |
Android.mk | 5 LOCAL_MODULE := services.restrictions
|
/toolchain/binutils/binutils-2.25/gas/testsuite/gas/mmix/ |
err-local1.s | 2 % Check that error handling for the restrictions on LOCAL works.
|
err-local2.s | 2 % Check that error handling for the restrictions on LOCAL works.
|
local-1.s | 10 # Restrictions on the implementation means we have to have the LOCAL in
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/userrestrictions/ |
SecondaryProfileOwnerUserRestrictionsTest.java | 74 * This is called after DO setting all DO restrictions. Global restrictions should be 82 * This is called after DO setting all DO restrictions, and PO setting all PO restrictions. 83 * All global + local restrictions should be visible. 98 * This is called after DO setting all DO restrictions, and PO setting all PO restrictions, 99 * then DO clearing all restrictions. Only PO restrictions should be set. 107 * Only the default restrictions should be set [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.pde.build_3.6.1.R36x_v20100823/ |
.api_description | 5 <type name="Constants" restrictions="1"/> 6 <type name="IAntScript" restrictions="1"/>
|
/external/autotest/client/site_tests/security_ptraceRestrictions/ |
control | 7 PURPOSE = "Verify ptrace restrictions introduced by the Yama LSM" 8 CRITERIA = "Fails if kernel lacks ptrace restrictions"
|
/development/samples/browseable/AppRestrictionSchema/ |
_index.jd | 8 This sample shows how to use app restrictions. This application has one boolean
|
/developers/build/prebuilts/gradle/AppRestrictionEnforcer/Application/src/main/res/values/ |
base-strings.xml | 24 This sample demonstrates how to set restrictions to other apps as a profile owner. 25 Use AppRestrictionSchema sample as a app with available restrictions.
|
/development/samples/browseable/AppRestrictionEnforcer/res/values/ |
base-strings.xml | 24 This sample demonstrates how to set restrictions to other apps as a profile owner. 25 Use AppRestrictionSchema sample as a app with available restrictions.
|
/cts/hostsidetests/devicepolicy/app/AppRestrictionsTargetApp/src/com/android/cts/apprestrictions/targetapp/ |
ApplicationRestrictionsActivity.java | 27 * The actual test will set restrictions for this package, and the purpose of this 28 * activity is to retrieve those restrictions and relay them back to the test for validation. 52 Bundle restrictions = mUserManager.getApplicationRestrictions(getPackageName()); local 55 .putExtra("value", restrictions));
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
AlwaysOnVpnTest.java | 55 /* restrictions */ null); 67 final Bundle restrictions = new Bundle(); local 68 restrictions.putStringArray(RESTRICTION_ALLOWED, new String[] {mPackageName}); 70 restrictions); 76 final Bundle restrictions = new Bundle(); local 77 restrictions.putStringArray(RESTRICTION_DISALLOWED, new String[] {mPackageName}); 79 restrictions);
|
/frameworks/base/core/java/android/service/restrictions/ |
RestrictionsReceiver.java | 17 package android.service.restrictions; 27 * Abstract implementation of a Restrictions Provider BroadcastReceiver. To implement a 28 * Restrictions Provider, extend from this class and implement the abstract methods. 30 * component as a Restrictions Provider using 33 * The function of a Restrictions Provider is to transport permission requests from apps on this 46 * authorization by a local or remote administrator other than the user. The Restrictions 68 * Intercept standard Restrictions Provider broadcasts. Implementations
|
/frameworks/base/core/java/android/content/ |
RestrictionsManager.java | 29 import android.service.restrictions.RestrictionsReceiver; 46 * Provides a mechanism for apps to query restrictions imposed by an entity that 48 * device administrator to override default app-specific restrictions or any other 51 * Apps can expose a set of restrictions via an XML file specified in the manifest. 53 * If the user has an active Restrictions Provider, dynamic requests can be made in 54 * addition to the statically imposed restrictions. Dynamic requests are app-specific 58 * Restrictions Provider. The Restrictions Provider can respond back to requests by calling 64 * Static restrictions are specified by an XML file referenced by a meta-data attribute 66 * to be able to read the list of available restrictions from the apk 559 ArrayList<RestrictionEntry> restrictions = new ArrayList<>(); local 717 RestrictionEntry[] restrictions = entry.getRestrictions(); local [all...] |
/cts/hostsidetests/devicepolicy/src/com/android/cts/devicepolicy/ |
UserRestrictionsTest.java | 47 assertTrue("Some user restrictions are still set", 118 * DO + PO combination. Make sure global DO restrictions are visible on secondary users. 139 // Let DO set all restrictions. 143 // Make sure the global restrictions are visible to secondary users. 147 // Then let PO set all restrictions. 151 // Make sure both local and global restrictions are visible on secondary users. 155 // Let DO clear all restrictions. 159 // Now only PO restrictions should be set on the secondary user. 165 * PO on user-0. It can set DO restrictions too, but they shouldn't leak to other users. 190 // Let user-0 PO sets all restrictions [all...] |
/developers/build/prebuilts/gradle/BasicManagedProfile/Application/src/main/res/values/ |
strings.xml | 30 <string name="set_chrome_restrictions">Set Chrome restrictions</string> 31 <string name="clear_chrome_restrictions">Clear Chrome restrictions</string> 36 <string name="restrictions_set">Restrictions set.</string>
|
/developers/samples/android/admin/BasicManagedProfile/Application/src/main/res/values/ |
strings.xml | 30 <string name="set_chrome_restrictions">Set Chrome restrictions</string> 31 <string name="clear_chrome_restrictions">Clear Chrome restrictions</string> 36 <string name="restrictions_set">Restrictions set.</string>
|
/development/samples/browseable/BasicManagedProfile/res/values/ |
strings.xml | 30 <string name="set_chrome_restrictions">Set Chrome restrictions</string> 31 <string name="clear_chrome_restrictions">Clear Chrome restrictions</string> 36 <string name="restrictions_set">Restrictions set.</string>
|