/cts/tests/admin/app/ |
AndroidManifest.xml | 20 package="android.admin.app"> 25 <receiver android:name="android.admin.app.CtsDeviceAdminDeviceOwner" 34 <receiver android:name="android.admin.app.CtsDeviceAdminProfileOwner" 43 <receiver android:name="android.admin.app.CtsDeviceAdminReceiver" 52 <receiver android:name="android.admin.app.CtsDeviceAdminReceiver2" 61 <!-- Device Admin that needs to be in the deactivated state in order 63 <receiver android:name="android.admin.app.CtsDeviceAdminDeactivatedReceiver" 72 <!-- Helper Activity used by Device Admin activation tests --> 73 <activity android:name="android.admin.app.CtsDeviceAdminActivationTestActivity" 74 android:label="Device Admin activation test" / [all...] |
/packages/apps/Settings/src/com/android/settings/enterprise/ |
DevicePolicyManagerWrapperImpl.java | 20 import android.app.admin.DevicePolicyManager; 40 public int getMaximumFailedPasswordsForWipe(@Nullable ComponentName admin, int userHandle) { 41 return mDpm.getMaximumFailedPasswordsForWipe(admin, userHandle); 60 public int getPermissionGrantState(@Nullable ComponentName admin, String packageName, 62 return mDpm.getPermissionGrantState(admin, packageName, permission); 66 public boolean isSecurityLoggingEnabled(@Nullable ComponentName admin) { 67 return mDpm.isSecurityLoggingEnabled(admin); 71 public boolean isNetworkLoggingEnabled(@Nullable ComponentName admin) { 72 return mDpm.isNetworkLoggingEnabled(admin);
|
/frameworks/base/cmds/dpm/src/com/android/commands/dpm/ |
Dpm.java | 21 import android.app.admin.DevicePolicyManager; 22 import android.app.admin.IDevicePolicyManager; 44 private static final String COMMAND_SET_ACTIVE_ADMIN = "set-active-admin"; 47 private static final String COMMAND_REMOVE_ACTIVE_ADMIN = "remove-active-admin"; 58 "usage: dpm set-active-admin [ --user <USER_ID> | current ] <COMPONENT>\n" + 64 "usage: dpm remove-active-admin [ --user <USER_ID> | current ] [ --name <NAME> ] " + 67 "dpm set-active-admin: Sets the given component as active admin" + 70 "dpm set-device-owner: Sets the given component as active admin, and its" + 73 "dpm set-profile-owner: Sets the given component as active admin and profile" [all...] |
/cts/apps/EmptyDeviceAdmin/src/com/android/cts/emptydeviceadmin/ |
EmptyDeviceAdmin.java | 18 import android.app.admin.DeviceAdminReceiver; 21 * This is used as a test device admin for 22 * com.android.cts.verifier.admin.DeviceAdminUninstallTestActivity
|
/external/selinux/python/sepolicy/sepolicy/help/ |
login.txt | 17 * Confined Admin/Desktop User - Staff_u 18 - Full Network, sudo to admin only, no root password. Usually a confined admin
|
users.txt | 16 * Confined Admin/Desktop User - Staff_u 17 - Full Network, sudo to admin only, no root password. Usually a confined admin
|
/cts/hostsidetests/devicepolicy/app/ManagedProfile/src/com/android/cts/managedprofile/ |
PrimaryUserAdminHelper.java | 18 import android.app.admin.DevicePolicyManager; 24 * This test executes helper tasks as active device admin in the primary user. 37 * Device admin can only be deactivated by itself and this test should be executed before the 38 * device admin package can be uninstalled. 44 // Wait until device admin is not active (with 2 minutes timeout). 49 assertFalse("Clear device admin failed", mDpm.isAdminActive(cn));
|
PasswordMinimumRestrictionsTest.java | 19 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_COMPLEX; 21 import android.app.admin.DevicePolicyManager; 87 // Passing the admin component returns the value set for that admin, rather than 95 // Passing the admin component returns the value set for that admin, rather than 109 fail("Exception should have been thrown for null admin ComponentName"); 122 fail("Exception should have been thrown for null admin ComponentName"); 134 // Check getMethod with null admin. It should return the aggregated value (which is the 144 // With null admin, the restriction should be the aggregate of all admins [all...] |
/developers/build/prebuilts/gradle/AppRestrictionEnforcer/.google/ |
packaging.yaml | 9 categories: [Device Admin] 16 - android:android.app.admin.DevicePolicyManager
|
/developers/build/prebuilts/gradle/DeviceOwner/.google/ |
packaging.yaml | 9 categories: [Device Admin] 16 - android:android.app.admin.DevicePolicyManager
|
/developers/build/prebuilts/gradle/NfcProvisioning/.google/ |
packaging.yaml | 9 categories: [Device Admin] 16 - android:android.app.admin.DevicePolicyManager
|
/external/autotest/frontend/migrations/ |
092_host_attributes_permissions.py | 5 SET @group_id = (SELECT id FROM auth_group WHERE name = 'Basic Admin'); 18 WHERE auth_group.name = 'Basic Admin' AND codename IN (
|
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/parser/ |
ExtrasProvisioningDataParser.java | 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE_FROM_TRUSTED_SOURCE; 21 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 22 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_SHAREABLE_DEVICE; 23 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_USER; 24 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE; 25 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE; 26 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME; 27 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_MINIMUM_VERSION_CODE; 28 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM [all...] |
/prebuilts/sdk/tools/ |
README-jack-server.md | 32 $ jack-admin install-server <launcher.jar> <server.jar> 39 Use `jack-admin start-server`. 61 `SERVER_PORT_ADMIN`: Server admin TCP port number. Needs to match the admin port number 73 Check `Admin` section to know how to install and administrate the Jack server. 99 `jack.server.admin.port=<port-number>` 100 Server admin TCP port number. Default is 8077. Needs to match the service port defined in 110 Server logs can be found by running `jack-admin server-log`. Default location is 115 ## Admin 117 The `jack-admin` bash script allows to install and administrate the Jack server [all...] |
/prebuilts/sdk/ |
README-jack-server.txt | 31 Use jack-admin start-server. 50 SERVER_PORT_ADMIN: Server admin TCP port number. Needs to match the 51 admin port number defined in $HOME/.jack-server/config.properties on the 63 Check Admin section to know how to install and administrate the Jack 92 jack.server.admin.port=<port-number> 93 Server admin TCP port number. Default is 8077. Needs to match the 102 Server logs can be found by running jack-admin server-log. Default 105 Admin 108 The jack-admin bash script allows to install and administrate the Jack 111 $ jack-admin help [all...] |
/frameworks/base/core/java/android/app/admin/ |
DeviceAdminInfo.java | 17 package android.app.admin; 56 * A type of policy that this device admin can use: device owner meta-policy 57 * for an admin that is designated as owner of the device. 64 * A type of policy that this device admin can use: profile owner meta-policy 72 * A type of policy that this device admin can use: limit the passwords 76 * <p>To control this policy, the device admin must have a "limit-password" 82 * A type of policy that this device admin can use: able to watch login 87 * <p>To control this policy, the device admin must have a "watch-login" 93 * A type of policy that this device admin can use: able to reset the 97 * <p>To control this policy, the device admin must have a "reset-password [all...] |
SecurityLogTags.logtags | 3 option java_package android.app.admin
|
/cts/hostsidetests/devicepolicy/app/CorpOwnedManagedProfile/src/com/android/cts/comp/provisioning/ |
AffiliationTest.java | 20 import android.app.admin.DevicePolicyManager; 41 ComponentName admin = AdminReceiver.getComponentName(getContext()); local 45 dpm.setAffiliationIds(admin, ids); 46 assertEquals(ids, dpm.getAffiliationIds(admin));
|
UserRestrictionTest.java | 19 import android.app.admin.DevicePolicyManager; 54 ComponentName admin = AdminReceiver.getComponentName(getContext()); local 56 dpm.addUserRestriction(admin, restriction); 58 dpm.clearUserRestriction(admin, restriction);
|
/development/samples/browseable/AppRestrictionSchema/ |
_index.jd | 3 sample.group=Admin
|
/development/samples/browseable/NfcProvisioning/ |
_index.jd | 3 sample.group=Admin
|
/external/curl/tests/data/ |
test1304 | 25 machine example.com login admin password passwd
|
/external/libpcap/ChmodBPF/ |
ChmodBPF | 11 # This startup item will make it owned by the admin group, 12 # with permissions rw-rw----, so that anybody in the admin 20 # admin group can capture packets. 22 chgrp admin /dev/bpf*
|
/packages/apps/Settings/src/com/android/settings/ |
ShowAdminSupportDetailsDialog.java | 22 import android.app.admin.DevicePolicyManager; 75 EnforcedAdmin admin = getAdminDetailsFromIntent(intent); local 77 if (!mEnforcedAdmin.equals(admin) || !Objects.equals(mRestriction, restriction)) { 78 mEnforcedAdmin = admin; 86 EnforcedAdmin admin = new EnforcedAdmin(null, UserHandle.myUserId()); local 88 return admin; 90 admin.component = intent.getParcelableExtra(DevicePolicyManager.EXTRA_DEVICE_ADMIN); 91 admin.userId = intent.getIntExtra(Intent.EXTRA_USER_ID, UserHandle.myUserId()); 92 return admin; 100 private void initializeDialogViews(View root, ComponentName admin, int userId [all...] |
/packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/parser/ |
PropertiesProvisioningDataParserTest.java | 18 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 19 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE; 20 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE; 21 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME; 22 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_MINIMUM_VERSION_CODE; 23 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM; 24 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_COOKIE_HEADER; 25 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION; 26 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME; 27 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_SIGNATURE_CHECKSUM [all...] |