/cts/apps/CtsVerifier/res/xml/ |
device_admin_byod.xml | 18 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 29 </device-admin>
|
tapjacking_device_admin.xml | 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 28 </device-admin>
|
/cts/apps/EmptyDeviceAdmin/res/xml/ |
device_admin.xml | 16 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 28 </device-admin>
|
/cts/hostsidetests/devicepolicy/app/ManagedProfile/src/com/android/cts/managedprofile/ |
PrimaryUserDeviceAdmin.java | 18 import android.app.admin.DeviceAdminReceiver; 22 * A device admin class running in the primary user. Currently used by delegated cert installer
|
/cts/hostsidetests/devicepolicy/app/ProfileOwner/src/com/android/cts/profileowner/ |
BaseProfileOwnerTest.java | 18 import android.app.admin.DeviceAdminReceiver; 19 import android.app.admin.DevicePolicyManager;
|
/cts/hostsidetests/devicepolicy/src/com/android/cts/devicepolicy/ |
DeviceAdminHostSideTestApi24.java | 19 * BaseDeviceAdminHostSideTest for device admin targeting API level 24. 28 * Device admin must be protected with BIND_DEVICE_ADMIN, if the target SDK >= 24.
|
/development/samples/ApiDemos/res/xml/ |
device_admin_sample.xml | 18 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 30 </device-admin>
|
/development/samples/DataWiper/src/com.example.android.datawiper/ |
MyAdmin.java | 18 import android.app.admin.DeviceAdminReceiver; 19 import android.app.admin.DevicePolicyManager;
|
/external/autotest/frontend/migrations/ |
059_drone_sets_permissions.py | 5 SET @group_id = (SELECT id FROM auth_group WHERE name = 'Basic Admin'); 19 WHERE auth_group.name = 'Basic Admin' AND codename IN (
|
/external/iptables/extensions/ |
libipt_REJECT.man | 22 \fBicmp\-admin\-prohibited\fP (*), 32 (*) Using icmp\-admin\-prohibited with kernels that do not support it will result in a plain DROP instead of REJECT
|
/frameworks/base/services/tests/servicestests/res/xml/ |
device_admin_sample.xml | 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 29 </device-admin>
|
/packages/apps/Email/res/xml/ |
device_admin.xml | 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android" 28 </device-admin>
|
/packages/apps/ManagedProvisioning/tests/instrumentation/res/xml/ |
device_admin_sample.xml | 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 29 </device-admin
|
/packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/e2eui/ |
ManagedProfileAdminReceiver.java | 18 import android.app.admin.DeviceAdminReceiver; 19 import android.app.admin.DevicePolicyManager;
|
/packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/finalization/ |
UserProvisioningStateHelperTest.java | 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 21 import static android.app.admin.DevicePolicyManager.STATE_USER_PROFILE_COMPLETE; 22 import static android.app.admin.DevicePolicyManager.STATE_USER_SETUP_COMPLETE; 23 import static android.app.admin.DevicePolicyManager.STATE_USER_SETUP_FINALIZED; 24 import static android.app.admin.DevicePolicyManager.STATE_USER_SETUP_INCOMPLETE; 25 import static android.app.admin.DevicePolicyManager.STATE_USER_UNMANAGED; 30 import android.app.admin.DevicePolicyManager;
|
FinalizationControllerTest.java | 19 import static android.app.admin.DeviceAdminReceiver.ACTION_PROFILE_PROVISIONING_COMPLETE; 20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISIONING_SUCCESSFUL; 21 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 22 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 23 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE; 224 // THEN the intent should be sent to the admin receiver 226 // THEN the admin extras bundle should contain mdm extras 244 // THEN the intent should be sent to the admin receiver 246 // THEN the admin extras bundle should contain mdm extras 257 // THEN the admin extras bundle should contain mdm extra [all...] |
/packages/apps/Settings/src/com/android/settings/accounts/ |
ProviderPreference.java | 50 EnforcedAdmin admin = RestrictedLockUtils.checkIfAccountManagementDisabled( local 52 setDisabledByAdmin(admin);
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/ |
CompHelperActivity.java | 20 import android.app.admin.DevicePolicyManager; 78 final ComponentName admin = CompDeviceAdminTestReceiver.getReceiverComponentName(); local 85 dpm.setAlwaysOnVpnPackage(admin, getPackageName(), false /* lockdownEnabled */); 90 dpm.installCaCert(admin, TEST_CA.getBytes()); 92 dpm.setMaximumFailedPasswordsForWipe(admin, 100);
|
/packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/preprovisioning/ |
PreProvisioningActivityTest.java | 18 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 20 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME; 21 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_LOGO_URI; 22 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_MAIN_COLOR;
|
EncryptDeviceActivityTest.java | 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 21 import static android.app.admin.DevicePolicyManager.ACTION_START_ENCRYPTION; 61 private static final ComponentName ADMIN = new ComponentName("com.test.admin", ".Receiver"); 66 .setDeviceAdminComponentName(ADMIN) 71 .setDeviceAdminComponentName(ADMIN)
|
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/ |
RestrictedPreferenceHelper.java | 137 EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(mContext, local 139 setDisabledByAdmin(admin); 143 * Disable this preference based on the enforce admin. 145 * @param EnforcedAdmin Details of the admin who enforced the restriction. If it 149 public boolean setDisabledByAdmin(EnforcedAdmin admin) { 150 final boolean disabled = (admin != null ? true : false); 151 mEnforcedAdmin = admin;
|
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/finalization/ |
UserProvisioningStateHelper.java | 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 20 import static android.app.admin.DevicePolicyManager.STATE_USER_PROFILE_COMPLETE; 21 import static android.app.admin.DevicePolicyManager.STATE_USER_SETUP_COMPLETE; 22 import static android.app.admin.DevicePolicyManager.STATE_USER_SETUP_FINALIZED; 23 import static android.app.admin.DevicePolicyManager.STATE_USER_SETUP_INCOMPLETE; 24 import static android.app.admin.DevicePolicyManager.STATE_USER_UNMANAGED; 28 import android.app.admin.DevicePolicyManager;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
DeviceAdminKeyguardDisabledFeaturesActivity.java | 17 package com.android.cts.verifier.admin; 19 import android.app.admin.DevicePolicyManager; 38 * Tests for Device Admin keyguard disabled features.
|
/cts/hostsidetests/devicepolicy/app/DeviceAdmin/src/com.android.cts.deviceadmin/ |
BaseDeviceAdminTest.java | 18 import android.app.admin.DeviceAdminReceiver; 19 import android.app.admin.DevicePolicyManager; 70 assertFalse("Still active admin", dpm.isAdminActive(mAdminComponent));
|
DeviceAdminPasswordTest.java | 18 import android.app.admin.DevicePolicyManager; 23 * - need to be run as device admin (as opposed to device owner) and 52 MoreAsserts.assertContainsRegex("Admin cannot change current password", e.getMessage());
|