HomeSort by relevance Sort by last modified time
    Searched full:admin (Results 176 - 200 of 1441) sorted by null

1 2 3 4 5 6 78 91011>>

  /cts/apps/CtsVerifier/res/xml/
device_admin_byod.xml 18 <device-admin xmlns:android="http://schemas.android.com/apk/res/android">
29 </device-admin>
tapjacking_device_admin.xml 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android">
28 </device-admin>
  /cts/apps/EmptyDeviceAdmin/res/xml/
device_admin.xml 16 <device-admin xmlns:android="http://schemas.android.com/apk/res/android">
28 </device-admin>
  /cts/hostsidetests/devicepolicy/app/ManagedProfile/src/com/android/cts/managedprofile/
PrimaryUserDeviceAdmin.java 18 import android.app.admin.DeviceAdminReceiver;
22 * A device admin class running in the primary user. Currently used by delegated cert installer
  /cts/hostsidetests/devicepolicy/app/ProfileOwner/src/com/android/cts/profileowner/
BaseProfileOwnerTest.java 18 import android.app.admin.DeviceAdminReceiver;
19 import android.app.admin.DevicePolicyManager;
  /cts/hostsidetests/devicepolicy/src/com/android/cts/devicepolicy/
DeviceAdminHostSideTestApi24.java 19 * BaseDeviceAdminHostSideTest for device admin targeting API level 24.
28 * Device admin must be protected with BIND_DEVICE_ADMIN, if the target SDK >= 24.
  /development/samples/ApiDemos/res/xml/
device_admin_sample.xml 18 <device-admin xmlns:android="http://schemas.android.com/apk/res/android">
30 </device-admin>
  /development/samples/DataWiper/src/com.example.android.datawiper/
MyAdmin.java 18 import android.app.admin.DeviceAdminReceiver;
19 import android.app.admin.DevicePolicyManager;
  /external/autotest/frontend/migrations/
059_drone_sets_permissions.py 5 SET @group_id = (SELECT id FROM auth_group WHERE name = 'Basic Admin');
19 WHERE auth_group.name = 'Basic Admin' AND codename IN (
  /external/iptables/extensions/
libipt_REJECT.man 22 \fBicmp\-admin\-prohibited\fP (*),
32 (*) Using icmp\-admin\-prohibited with kernels that do not support it will result in a plain DROP instead of REJECT
  /frameworks/base/services/tests/servicestests/res/xml/
device_admin_sample.xml 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android">
29 </device-admin>
  /packages/apps/Email/res/xml/
device_admin.xml 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"
28 </device-admin>
  /packages/apps/ManagedProvisioning/tests/instrumentation/res/xml/
device_admin_sample.xml 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android">
29 </device-admin
  /packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/e2eui/
ManagedProfileAdminReceiver.java 18 import android.app.admin.DeviceAdminReceiver;
19 import android.app.admin.DevicePolicyManager;
  /packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/finalization/
UserProvisioningStateHelperTest.java 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE;
20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE;
21 import static android.app.admin.DevicePolicyManager.STATE_USER_PROFILE_COMPLETE;
22 import static android.app.admin.DevicePolicyManager.STATE_USER_SETUP_COMPLETE;
23 import static android.app.admin.DevicePolicyManager.STATE_USER_SETUP_FINALIZED;
24 import static android.app.admin.DevicePolicyManager.STATE_USER_SETUP_INCOMPLETE;
25 import static android.app.admin.DevicePolicyManager.STATE_USER_UNMANAGED;
30 import android.app.admin.DevicePolicyManager;
FinalizationControllerTest.java 19 import static android.app.admin.DeviceAdminReceiver.ACTION_PROFILE_PROVISIONING_COMPLETE;
20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISIONING_SUCCESSFUL;
21 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE;
22 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE;
23 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE;
224 // THEN the intent should be sent to the admin receiver
226 // THEN the admin extras bundle should contain mdm extras
244 // THEN the intent should be sent to the admin receiver
246 // THEN the admin extras bundle should contain mdm extras
257 // THEN the admin extras bundle should contain mdm extra
    [all...]
  /packages/apps/Settings/src/com/android/settings/accounts/
ProviderPreference.java 50 EnforcedAdmin admin = RestrictedLockUtils.checkIfAccountManagementDisabled( local
52 setDisabledByAdmin(admin);
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/
CompHelperActivity.java 20 import android.app.admin.DevicePolicyManager;
78 final ComponentName admin = CompDeviceAdminTestReceiver.getReceiverComponentName(); local
85 dpm.setAlwaysOnVpnPackage(admin, getPackageName(), false /* lockdownEnabled */);
90 dpm.installCaCert(admin, TEST_CA.getBytes());
92 dpm.setMaximumFailedPasswordsForWipe(admin, 100);
  /packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/preprovisioning/
PreProvisioningActivityTest.java 18 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE;
19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE;
20 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME;
21 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_LOGO_URI;
22 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_MAIN_COLOR;
EncryptDeviceActivityTest.java 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE;
20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE;
21 import static android.app.admin.DevicePolicyManager.ACTION_START_ENCRYPTION;
61 private static final ComponentName ADMIN = new ComponentName("com.test.admin", ".Receiver");
66 .setDeviceAdminComponentName(ADMIN)
71 .setDeviceAdminComponentName(ADMIN)
  /frameworks/base/packages/SettingsLib/src/com/android/settingslib/
RestrictedPreferenceHelper.java 137 EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(mContext, local
139 setDisabledByAdmin(admin);
143 * Disable this preference based on the enforce admin.
145 * @param EnforcedAdmin Details of the admin who enforced the restriction. If it
149 public boolean setDisabledByAdmin(EnforcedAdmin admin) {
150 final boolean disabled = (admin != null ? true : false);
151 mEnforcedAdmin = admin;
  /packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/finalization/
UserProvisioningStateHelper.java 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE;
20 import static android.app.admin.DevicePolicyManager.STATE_USER_PROFILE_COMPLETE;
21 import static android.app.admin.DevicePolicyManager.STATE_USER_SETUP_COMPLETE;
22 import static android.app.admin.DevicePolicyManager.STATE_USER_SETUP_FINALIZED;
23 import static android.app.admin.DevicePolicyManager.STATE_USER_SETUP_INCOMPLETE;
24 import static android.app.admin.DevicePolicyManager.STATE_USER_UNMANAGED;
28 import android.app.admin.DevicePolicyManager;
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/
DeviceAdminKeyguardDisabledFeaturesActivity.java 17 package com.android.cts.verifier.admin;
19 import android.app.admin.DevicePolicyManager;
38 * Tests for Device Admin keyguard disabled features.
  /cts/hostsidetests/devicepolicy/app/DeviceAdmin/src/com.android.cts.deviceadmin/
BaseDeviceAdminTest.java 18 import android.app.admin.DeviceAdminReceiver;
19 import android.app.admin.DevicePolicyManager;
70 assertFalse("Still active admin", dpm.isAdminActive(mAdminComponent));
DeviceAdminPasswordTest.java 18 import android.app.admin.DevicePolicyManager;
23 * - need to be run as device admin (as opposed to device owner) and
52 MoreAsserts.assertContainsRegex("Admin cannot change current password", e.getMessage());

Completed in 260 milliseconds

1 2 3 4 5 6 78 91011>>