/packages/apps/PackageInstaller/src/com/android/packageinstaller/permission/ui/handheld/ |
AppPermissionsFragment.java | 247 EnforcedAdmin admin = RestrictedLockUtils.getProfileOrDeviceOwner(getContext(), local 249 if (admin != null) { 250 preference.setDisabledByAdmin(admin);
|
/packages/apps/Settings/src/com/android/settings/ |
DeviceAdminAdd.java | 24 import android.app.admin.DeviceAdminInfo; 25 import android.app.admin.DeviceAdminReceiver; 26 import android.app.admin.DevicePolicyManager; 85 * Optional key to map to the package name of the Device Admin. 86 * Currently only used when uninstalling an active device admin. 199 // When activating, make sure the given component name is actually a valid device admin. 201 // invalid device admin. 227 Log.w(TAG, "Request to add invalid device admin: " + who); 247 // This admin already exists, an we have two options at this point. If new policy 254 Log.w(TAG, "Requested admin is already being removed: " + who) 571 final EnforcedAdmin admin = getAdminEnforcingCantRemoveProfile(); local [all...] |
SecuritySettings.java | 26 import android.app.admin.DevicePolicyManager; 441 * Sets the preference as disabled by admin if PASSWORD_QUALITY_MANAGED is set. 445 final EnforcedAdmin admin = RestrictedLockUtils.checkIfPasswordQualityIsSet( local 447 if (admin != null && mDPM.getPasswordQuality(admin.component, userId) == 451 pref.setDisabledByAdmin(admin); 484 trustAgentPreference.setDisabledByAdmin(agent.admin); 539 EnforcedAdmin admin = RestrictedLockUtils.checkIfKeyguardFeaturesDisabled(context, local 555 if (admin != null && dpm.getTrustAgentConfiguration( 557 trustAgentComponentInfo.admin = admin 864 final EnforcedAdmin admin = RestrictedLockUtils.checkIfPasswordQualityIsSet( local 1080 final EnforcedAdmin admin = RestrictedLockUtils.checkIfMaximumTimeToLockIsSet( local [all...] |
/packages/apps/Settings/src/com/android/settings/fuelgauge/ |
AppButtonsPreferenceController.java | 225 RestrictedLockUtils.EnforcedAdmin admin = local 230 if (admin != null && !uninstallBlockedBySystem) { 231 RestrictedLockUtils.sendShowAdminSupportDetailsIntent(mActivity, admin); 374 // If this is a device admin, it can't be uninstalled or disabled. 477 // User can't force stop device admin. 478 Log.w(TAG, "User can't force stop device admin");
|
/packages/apps/Settings/src/com/android/settings/notification/ |
NotificationSettingsBase.java | 37 import android.app.admin.DevicePolicyManager; 407 RestrictedLockUtils.EnforcedAdmin admin = local 410 if (admin != null) { 412 new RestrictedDropDownPreference.RestrictedItem(entry, entryValue, admin);
|
/cts/tests/admin/src/android/admin/cts/ |
DevicePolicyManagerTest.java | 17 package android.admin.cts; 19 import android.app.admin.DevicePolicyManager; 357 mDevicePolicyManager.clearDeviceOwnerApp("android.admin.app"); 557 new ComponentName("android.admin.cts", "dummy")); 571 "android.admin.cts"); 585 "android.admin.cts", null); 627 new ComponentName("android.admin.cts", "dummy")); 641 "android.admin.cts", true); 727 * Test that managed provisioning is pre-installed if the device declares the device admin [all...] |
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/policy/ |
UserSwitcherController.java | 759 EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(mContext, local 761 if (admin != null && !RestrictedLockUtils.hasBaseUserRestriction(mContext, 764 record.enforcedAdmin = admin; [all...] |
/packages/apps/Settings/src/com/android/settings/accessibility/ |
AccessibilitySettings.java | 20 import android.app.admin.DevicePolicyManager; 493 EnforcedAdmin admin = RestrictedLockUtils.checkIfAccessibilityServiceDisallowed( local 495 if (admin != null) { 496 preference.setDisabledByAdmin(admin); [all...] |
/packages/apps/Settings/src/com/android/settings/fingerprint/ |
FingerprintSettings.java | 23 import android.app.admin.DevicePolicyManager; 336 final EnforcedAdmin admin = RestrictedLockUtils.checkIfKeyguardFeaturesDisabled( local 338 pref.setTitle(LearnMoreSpan.linkify(getText(admin != null 341 getString(getHelpResource()), admin)); local [all...] |
/prebuilts/sdk/tools/lib/ |
shrinkedAndroid.jar | |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.equinox.frameworkadmin.equinox_1.0.200.v20100505.jar | |
/prebuilts/eclipse/mavenplugins/tycho/tycho-dependencies-m2repo/org/eclipse/tycho/tycho-bundles-external/0.20.0/eclipse/plugins/ |
org.eclipse.equinox.frameworkadmin.equinox_1.0.500.v20130327-2119.jar | |
/prebuilts/tools/common/m2/repository/org/eclipse/tycho/tycho-bundles-external/0.18.1/eclipse/plugins/ |
org.eclipse.equinox.frameworkadmin.equinox_1.0.500.v20130327-2119.jar | |
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
DevicePolicyManagerService.java | 21 import static android.app.admin.DevicePolicyManager.CODE_ACCOUNTS_NOT_EMPTY; 22 import static android.app.admin.DevicePolicyManager.CODE_ADD_MANAGED_PROFILE_DISALLOWED; 23 import static android.app.admin.DevicePolicyManager.CODE_CANNOT_ADD_MANAGED_PROFILE; 24 import static android.app.admin.DevicePolicyManager.CODE_DEVICE_ADMIN_NOT_SUPPORTED; 25 import static android.app.admin.DevicePolicyManager.CODE_HAS_DEVICE_OWNER; 26 import static android.app.admin.DevicePolicyManager.CODE_HAS_PAIRED; 27 import static android.app.admin.DevicePolicyManager.CODE_MANAGED_USERS_NOT_SUPPORTED; 28 import static android.app.admin.DevicePolicyManager.CODE_NONSYSTEM_USER_EXISTS; 29 import static android.app.admin.DevicePolicyManager.CODE_NOT_SYSTEM_USER; 30 import static android.app.admin.DevicePolicyManager.CODE_NOT_SYSTEM_USER_SPLIT 2189 final ActiveAdmin admin = policy.mAdminList.get(i); local 2247 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who); local 2260 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2279 ActiveAdmin admin = policy.mAdminMap.get(who); local 2303 ActiveAdmin admin = getActiveAdminForCallerLocked(who, reqPolicy); local 2313 ActiveAdmin admin = policy.mAdminMap.get(who); local 2329 ActiveAdmin admin = policy.mAdminMap.get(who); local 2403 final ActiveAdmin admin = policy.mAdminList.get(i); local 2437 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 3117 ActiveAdmin admin = admins.get(i); local 3341 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, local 3392 final ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 3411 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 3471 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local 3480 ActiveAdmin admin = admins.get(i); local 3509 ActiveAdmin admin = policy.mAdminList.get(i); local 3558 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local 3567 ActiveAdmin admin = admins.get(i); local 3602 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local 3611 ActiveAdmin admin = admins.get(i); local 3662 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local 3671 ActiveAdmin admin = admins.get(i); local 3760 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local 3768 ActiveAdmin admin = admins.get(i); local 3814 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local 3823 ActiveAdmin admin = admins.get(i); local 3855 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local 3864 ActiveAdmin admin = admins.get(i); local 3899 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local 3908 ActiveAdmin admin = admins.get(i); local 3946 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local 3955 ActiveAdmin admin = admins.get(i); local 3993 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local 4002 ActiveAdmin admin = admins.get(i); local 4040 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local 4049 ActiveAdmin admin = admins.get(i); local 4166 ActiveAdmin admin = (who != null) local 4180 ActiveAdmin admin = getAdminWithMinimumFailedPasswordsForWipeLocked( local 4205 ActiveAdmin admin = admins.get(i); local 4246 ActiveAdmin admin = getActiveAdminWithPolicyForUidLocked( local 4496 ActiveAdmin admin = policy.mAdminList.get(i); local 4544 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local 4583 ActiveAdmin admin = admins.get(i); local 4636 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userId, parent); local 4675 final ActiveAdmin admin = getActiveAdminForCallerLocked( local 5321 final ActiveAdmin admin; local 5403 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); local 5487 ActiveAdmin admin = admins.get(i); local 5651 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5963 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 5970 ActiveAdmin admin = policy.mAdminList.get(i); local 6004 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 6338 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 6354 ActiveAdmin admin = policy.mAdminList.get(i); local 6401 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local 6418 ActiveAdmin admin = admins.get(i); local 6655 ActiveAdmin admin = policy.mAdminList.get(i); local 6688 final ActiveAdmin admin = getDeviceOwnerAdminLocked(); local 6758 final ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 6801 final ActiveAdmin admin = local 7059 ActiveAdmin admin = policy.mAdminList.get(i); local 7738 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 7754 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 7777 ActiveAdmin admin = policy.mAdminList.get(j); local 7833 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 7911 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 7927 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 7957 ActiveAdmin admin = policy.mAdminList.get(j); local 8006 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 8032 ActiveAdmin admin = getActiveAdminForCallerLocked( local 8048 ActiveAdmin admin = getActiveAdminForCallerLocked( local 8081 ActiveAdmin admin = getProfileOwnerAdminLocked(userHandle); local 8569 ActiveAdmin admin = policy.mAdminList.get(i); local 8629 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 8645 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 8655 ActiveAdmin admin = getProfileOwnerAdminLocked(userId); local 8667 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 8683 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 8693 ActiveAdmin admin = getProfileOwnerAdminLocked(userId); local 8766 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 8782 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 8794 ActiveAdmin admin = getProfileOwnerAdminLocked(userId); local 9196 ActiveAdmin admin = policy.mAdminMap.get(ownerComponent); local 9333 final ActiveAdmin admin = policy.mAdminList.get(i); local 9346 final ActiveAdmin admin = getDeviceOwnerAdminLocked(); local 9912 ActiveAdmin admin = getActiveAdminForUidLocked(who, local 9928 ActiveAdmin admin = getActiveAdminForUidLocked(who, local 9942 ActiveAdmin admin = getActiveAdminForUidLocked(who, local 9958 ActiveAdmin admin = getActiveAdminForUidLocked(who, local 9974 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 9992 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 10009 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 10025 ActiveAdmin admin = getProfileOwnerAdminLocked(userId); local 10039 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 10069 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 10087 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 10452 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local [all...] |
/prebuilts/sdk/system_current/ |
android.jar | |
/prebuilts/sdk/current/ |
android.jar | |
/prebuilts/sdk/24/ |
android.jar | |
/prebuilts/sdk/25/ |
android.jar | |
/prebuilts/devtools/tools/lib/ |
osgi-4.0.0.jar | |
/prebuilts/tools/common/m2/repository/com/android/external/osgi/osgi/4.0.0/ |
osgi-4.0.0.jar | |
/prebuilts/tools/common/osgi/ |
osgi.jar | |
/prebuilts/sdk/23/ |
android.jar | |
/frameworks/base/core/java/android/app/admin/ |
DevicePolicyManager.java | 17 package android.app.admin; 35 import android.app.admin.SecurityLog.SecurityEvent; 91 * registered with the system as a <a href="{@docRoot}guide/topics/admin/device-admin.html">device 101 * "{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> developer 225 * <p> During device owner provisioning a device admin app is set as the owner of the device. 269 * <p>During device owner provisioning, a device admin app is downloaded and set as the owner of 323 * <p>During device owner provisioning a device admin app is set as the owner of the device. 486 * <p> When this extra is set, the application must have exactly one device admin receiver [all...] |
/packages/apps/Settings/src/com/android/settings/development/ |
DevelopmentSettings.java | 672 final EnforcedAdmin admin = RestrictedLockUtils.checkIfMaximumTimeToLockIsSet( local 674 mKeepScreenOn.setDisabledByAdmin(admin); 675 if (admin == null) { [all...] |
/prebuilts/sdk/21/ |
android.jar | |