HomeSort by relevance Sort by last modified time
    Searched full:admin (Results 101 - 125 of 1441) sorted by null

1 2 3 45 6 7 8 91011>>

  /development/samples/browseable/DeviceOwner/
_index.jd 3 sample.group=Admin
  /external/fio/examples/
rbd.fio 15 clientname=admin
  /external/valgrind/massif/tests/
culling1.vgtest 2 vgopts: -v -v --stats=yes --stacks=no --time-unit=B --heap-admin=16 --massif-out-file=massif.out
culling2.vgtest 2 vgopts: -v -v --stats=yes --stacks=no --time-unit=B --heap-admin=16 --massif-out-file=massif.out
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/
RedactedNotificationKeyguardDisabledFeaturesActivity.java 16 package com.android.cts.verifier.admin;
18 import android.app.admin.DevicePolicyManager;
29 * Tests for Device Admin keyguard redacted notification feature. This test is taken out from
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/tapjacking/
EmptyDeviceAdminReceiver.java 17 package com.android.cts.verifier.admin.tapjacking;
19 import android.app.admin.DeviceAdminReceiver;
20 import android.app.admin.DevicePolicyManager;
DeviceAdminTapjackingTestActivity.java 17 package com.android.cts.verifier.admin.tapjacking;
19 import android.app.admin.DevicePolicyManager;
32 * Test that checks that device admin activate button does not allow taps when another window
33 * is obscuring the device admin details
67 Log.e(TAG, "Could not remove active admin. Cannot proceed with test");
107 Log.e(TAG, "Admin was activated. Restart the Test");
  /cts/hostsidetests/devicepolicy/app/DeviceAdmin/src/com.android.cts.deviceadmin/
ClearDeviceAdminWithNoProtectionTest.java 18 import android.app.admin.DevicePolicyManager;
23 * Remove {@link DeviceAdminReceiverWithNoProtection} as active admin.
40 assertFalse("Still active admin", dpm.isAdminActive(cn));
  /cts/tests/admin/
AndroidManifest.xml 20 package="android.admin.cts">
28 android:targetPackage="android.admin.app"
29 android:label="Tests for the admin APIs.">
  /cts/tests/admin/src/android/admin/cts/
DeviceAdminActivationTest.java 17 package android.admin.cts;
20 import android.app.admin.DevicePolicyManager;
25 import android.admin.app.CtsDeviceAdminBrokenReceiver;
26 import android.admin.app.CtsDeviceAdminBrokenReceiver2;
27 import android.admin.app.CtsDeviceAdminBrokenReceiver3;
28 import android.admin.app.CtsDeviceAdminBrokenReceiver4;
29 import android.admin.app.CtsDeviceAdminBrokenReceiver5;
30 import android.admin.app.CtsDeviceAdminDeactivatedReceiver;
31 import android.admin.app.CtsDeviceAdminActivationTestActivity;
32 import android.admin.app.CtsDeviceAdminActivationTestActivity.OnActivityResultListener
    [all...]
  /cts/hostsidetests/devicepolicy/app/ManagedProfile/src/com/android/cts/managedprofile/
OrganizationInfoTest.java 59 fail("Exception should have been thrown for null admin ComponentName");
65 fail("Exception should have been thrown for null admin ComponentName");
94 mDevicePolicyManager.setOrganizationName(null, "null-admin-fails");
95 fail("Exception should have been thrown for null admin ComponentName");
101 fail("Exception should have been thrown for null admin ComponentName");
BaseManagedProfileTest.java 18 import android.app.admin.DeviceAdminReceiver;
19 import android.app.admin.DevicePolicyManager;
28 * This class handles making sure that the test is the profile owner and that it has an active admin
  /cts/tests/tests/packageinstaller/adminpackageinstaller/
AndroidTest.xml 17 <configuration description="Config for CTS Admin Package Installer test cases">
37 <option name="run-command" value="dpm set-device-owner --user current 'android.packageinstaller.admin.cts/.BasicAdminReceiver'" />
38 <option name="teardown-command" value="dpm remove-active-admin --user current 'android.packageinstaller.admin.cts/.BasicAdminReceiver'"/>
42 <option name="package" value="android.packageinstaller.admin.cts" />
  /developers/samples/android/
build.gradle 51 "admin/BasicManagedProfile",
71 "admin/AppRestrictionEnforcer",
72 "admin/AppRestrictionSchema",
96 "admin/NfcProvisioning",
97 "admin/DeviceOwner",
projects.txt 50 admin/BasicManagedProfile
70 admin/AppRestrictionEnforcer
71 admin/AppRestrictionSchema
95 admin/NfcProvisioning
96 admin/DeviceOwner
  /device/linaro/bootloader/edk2/MdeModulePkg/Bus/Pci/NvmExpressDxe/
NvmExpressHci.h 31 #define NVME_AQA_OFFSET 0x0024 // Admin Queue Attributes
32 #define NVME_ASQ_OFFSET 0x0028 // Admin Submission Queue Base Address
33 #define NVME_ACQ_OFFSET 0x0030 // Admin Completion Queue Base Address
34 #define NVME_SQ0_OFFSET 0x1000 // Submission Queue 0 (admin) Tail Doorbell
35 #define NVME_CQ0_OFFSET 0x1004 // Completion Queue 0 (admin) Head Doorbell
100 // 3.1.8 Offset 24h: AQA - Admin Queue Attributes
110 // 3.1.9 Offset 28h: ASQ - Admin Submission Queue Base Address
114 // 3.1.10 Offset 30h: ACQ - Admin Completion Queue Base Address
341 // Admin Command Set Attributes
343 UINT16 Oacs; /* Optional Admin Command Support */
    [all...]
  /packages/apps/Settings/src/com/android/settings/
TimeoutListPreference.java 21 import android.app.admin.DevicePolicyManager;
72 public void removeUnusableTimeouts(long maxTimeout, EnforcedAdmin admin) {
79 if (admin == null && mAdmin == null && !isDisabledByAdmin()) {
82 if (admin == null) {
97 // by admin, otherwise remove the padlock in case it was set earlier.
99 setDisabledByAdmin(admin);
109 mAdmin = admin;
  /external/autotest/frontend/afe/
admin.py 1 """Django 1.0 admin interface declarations."""
4 from django.contrib import admin, messages
14 class SiteAdmin(admin.ModelAdmin):
54 admin.site.register(models.AtomicGroup, AtomicGroupAdmin)
71 admin.site.register(models.Label, LabelAdmin)
78 admin.site.register(models.User, UserAdmin)
151 class HostAttributeInline(admin.TabularInline):
171 """ Field layout for admin page.
255 admin.site.register(models.Host, HostAdmin)
267 admin.site.register(models.Test, TestAdmin
    [all...]
  /packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/parser/
MessageParserTest.java 18 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE;
19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE_FROM_TRUSTED_SOURCE;
20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE;
21 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_SHAREABLE_DEVICE;
22 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_USER;
23 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME;
24 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME;
25 import static android.app.admin.DevicePolicyManager.MIME_TYPE_PROVISIONING_NFC;
30 import android.app.admin.DevicePolicyManager;
107 // GIVEN the device admin app is installed
    [all...]
  /frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/
DevicePolicyManagerService.java 21 import static android.app.admin.DevicePolicyManager.CODE_ACCOUNTS_NOT_EMPTY;
22 import static android.app.admin.DevicePolicyManager.CODE_ADD_MANAGED_PROFILE_DISALLOWED;
23 import static android.app.admin.DevicePolicyManager.CODE_CANNOT_ADD_MANAGED_PROFILE;
24 import static android.app.admin.DevicePolicyManager.CODE_DEVICE_ADMIN_NOT_SUPPORTED;
25 import static android.app.admin.DevicePolicyManager.CODE_HAS_DEVICE_OWNER;
26 import static android.app.admin.DevicePolicyManager.CODE_HAS_PAIRED;
27 import static android.app.admin.DevicePolicyManager.CODE_MANAGED_USERS_NOT_SUPPORTED;
28 import static android.app.admin.DevicePolicyManager.CODE_NONSYSTEM_USER_EXISTS;
29 import static android.app.admin.DevicePolicyManager.CODE_NOT_SYSTEM_USER;
30 import static android.app.admin.DevicePolicyManager.CODE_NOT_SYSTEM_USER_SPLIT
2189 final ActiveAdmin admin = policy.mAdminList.get(i); local
2247 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who); local
2260 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2279 ActiveAdmin admin = policy.mAdminMap.get(who); local
2303 ActiveAdmin admin = getActiveAdminForCallerLocked(who, reqPolicy); local
2313 ActiveAdmin admin = policy.mAdminMap.get(who); local
2329 ActiveAdmin admin = policy.mAdminMap.get(who); local
2403 final ActiveAdmin admin = policy.mAdminList.get(i); local
2437 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local
3117 ActiveAdmin admin = admins.get(i); local
3341 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, local
3392 final ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
3411 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local
3471 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local
3480 ActiveAdmin admin = admins.get(i); local
3509 ActiveAdmin admin = policy.mAdminList.get(i); local
3558 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local
3567 ActiveAdmin admin = admins.get(i); local
3602 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local
3611 ActiveAdmin admin = admins.get(i); local
3662 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local
3671 ActiveAdmin admin = admins.get(i); local
3760 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local
3768 ActiveAdmin admin = admins.get(i); local
3814 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local
3823 ActiveAdmin admin = admins.get(i); local
3855 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local
3864 ActiveAdmin admin = admins.get(i); local
3899 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local
3908 ActiveAdmin admin = admins.get(i); local
3946 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local
3955 ActiveAdmin admin = admins.get(i); local
3993 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local
4002 ActiveAdmin admin = admins.get(i); local
4040 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local
4049 ActiveAdmin admin = admins.get(i); local
4166 ActiveAdmin admin = (who != null) local
4180 ActiveAdmin admin = getAdminWithMinimumFailedPasswordsForWipeLocked( local
4205 ActiveAdmin admin = admins.get(i); local
4246 ActiveAdmin admin = getActiveAdminWithPolicyForUidLocked( local
4496 ActiveAdmin admin = policy.mAdminList.get(i); local
4544 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local
4583 ActiveAdmin admin = admins.get(i); local
4636 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userId, parent); local
4675 final ActiveAdmin admin = getActiveAdminForCallerLocked( local
5321 final ActiveAdmin admin; local
5403 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); local
5487 ActiveAdmin admin = admins.get(i); local
5651 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
5963 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
5970 ActiveAdmin admin = policy.mAdminList.get(i); local
6004 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
6338 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
6354 ActiveAdmin admin = policy.mAdminList.get(i); local
6401 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle, parent); local
6418 ActiveAdmin admin = admins.get(i); local
6655 ActiveAdmin admin = policy.mAdminList.get(i); local
6688 final ActiveAdmin admin = getDeviceOwnerAdminLocked(); local
6758 final ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
6801 final ActiveAdmin admin = local
7059 ActiveAdmin admin = policy.mAdminList.get(i); local
7738 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
7754 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
7777 ActiveAdmin admin = policy.mAdminList.get(j); local
7833 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
7911 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
7927 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
7957 ActiveAdmin admin = policy.mAdminList.get(j); local
8006 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
8032 ActiveAdmin admin = getActiveAdminForCallerLocked( local
8048 ActiveAdmin admin = getActiveAdminForCallerLocked( local
8081 ActiveAdmin admin = getProfileOwnerAdminLocked(userHandle); local
8569 ActiveAdmin admin = policy.mAdminList.get(i); local
8629 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
8645 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
8655 ActiveAdmin admin = getProfileOwnerAdminLocked(userId); local
8667 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
8683 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
8693 ActiveAdmin admin = getProfileOwnerAdminLocked(userId); local
8766 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
8782 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
8794 ActiveAdmin admin = getProfileOwnerAdminLocked(userId); local
9196 ActiveAdmin admin = policy.mAdminMap.get(ownerComponent); local
9333 final ActiveAdmin admin = policy.mAdminList.get(i); local
9346 final ActiveAdmin admin = getDeviceOwnerAdminLocked(); local
9912 ActiveAdmin admin = getActiveAdminForUidLocked(who, local
9928 ActiveAdmin admin = getActiveAdminForUidLocked(who, local
9942 ActiveAdmin admin = getActiveAdminForUidLocked(who, local
9958 ActiveAdmin admin = getActiveAdminForUidLocked(who, local
9974 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
9992 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
10009 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
10025 ActiveAdmin admin = getProfileOwnerAdminLocked(userId); local
10039 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
10069 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
10087 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
10452 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local
    [all...]
  /developers/samples/android/admin/DeviceOwner/
template-params.xml 19 <group>Admin</group>
38 <categories>Device Admin</categories>
48 <android>android.app.admin.DevicePolicyManager</android>
74 [1]: http://developer.android.com/reference/android/app/admin/DevicePolicyManager.html#setGlobalSetting(android.content.ComponentName, java.lang.String, java.lang.String)
76 [3]: http://developer.android.com/reference/android/app/admin/DevicePolicyManager.html#addPersistentPreferredActivity(android.content.ComponentName, android.content.IntentFilter, android.content.ComponentName)
77 [4]: http://developer.android.com/reference/android/app/admin/DevicePolicyManager.html#clearPackagePersistentPreferredActivities(android.content.ComponentName, java.lang.String)
  /packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/task/
ManagedProfileSettingsTaskTest.java 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE;
28 import android.app.admin.DevicePolicyManager;
51 private static final ComponentName ADMIN = new ComponentName("com.test.admin", ".Receiver");
54 .setDeviceAdminComponentName(ADMIN)
58 .setDeviceAdminComponentName(ADMIN)
  /packages/apps/Settings/src/com/android/settings/applications/
ApplicationFeatureProvider.java 63 * managed profiles that have been granted one or more of the given permissions by the admin.
66 * by the admin, either at run-time or install-time
75 * managed profiles that have been granted one or more of the given permissions by the admin.
78 * by the admin, either at run-time or install-time
84 * Return the persistent preferred activities configured by the admin for the given user.
85 * A persistent preferred activity is an activity that the admin configured to always handle a
  /cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/
ScreenCaptureDisabledTest.java 18 import android.app.admin.DevicePolicyManager;
40 assertFalse(mDevicePolicyManager.getScreenCaptureDisabled(null /* any admin */));
46 assertTrue(mDevicePolicyManager.getScreenCaptureDisabled(null /* any admin */));
  /cts/tests/admin/app/src/android/admin/app/
CtsDeviceAdminActivationTestActivity.java 17 package android.admin.app;
27 * Helper {@link Activity} for CTS tests of Device Admin activation. The {@code Activity}
44 // not invoked when a Device Admin activation is rejected without user interaction.

Completed in 652 milliseconds

1 2 3 45 6 7 8 91011>>