/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/task/ |
SetDevicePolicyTask.java | 21 import android.app.admin.DevicePolicyManager; 34 * app if it's not currently enabled and sets the component as active admin. 111 ProvisionLogger.logd("Setting " + component + " as active admin.");
|
/packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/common/ |
UtilsTest.java | 225 // GIVEN a package info with more than one device admin 228 // THEN calling findDeviceAdmin returns the correct admin 234 // GIVEN a package info with one device admin 237 // THEN calling findDeviceAdmin returns the correct admin 258 // GIVEN a package info with one device admin 261 // THEN looking another device admin throws IllegalProvisioningArgumentException 271 // GIVEN a package info with one device admin 274 // THEN calling findDeviceAdminInPackageInfo returns the correct admin 280 // GIVEN a package info with one device admin 288 // GIVEN a package info with no device admin [all...] |
/packages/apps/Settings/src/com/android/settings/dashboard/conditional/ |
HotspotCondition.java | 111 final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(context, local 113 if (admin != null) { 114 RestrictedLockUtils.sendShowAdminSupportDetailsIntent(context, admin);
|
/packages/apps/Settings/src/com/android/settings/display/ |
TimeoutPreferenceController.java | 16 import android.app.admin.DevicePolicyManager; 64 final RestrictedLockUtils.EnforcedAdmin admin = local 68 timeoutListPreference.removeUnusableTimeouts(maxTimeout, admin);
|
/packages/apps/Settings/src/com/android/settings/nfc/ |
AndroidBeam.java | 67 final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced( local 72 if (!mBeamDisallowedByBase && admin != null) { 74 ShowAdminSupportDetailsDialog.setAdminSupportDetails(getActivity(), view, admin, false); local
|
/cts/hostsidetests/devicepolicy/src/com/android/cts/devicepolicy/ |
BaseDeviceAdminServiceTest.java | 116 // Remove admin. 117 CLog.i("Removing admin..."); 170 // Remove admin. 171 CLog.i("Removing admin again..."); 175 // Retry with package 1 and remove admin. 183 CLog.i("Removing admin again...");
|
BaseDeviceAdminHostSideTest.java | 65 assertTrue("Failed to remove admin", removeAdmin(getAdminReceiverComponent(), mUserId)); 84 * Run all tests in DeviceAdminTest.java (as device admin).
|
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/finalization/ |
FinalizationController.java | 19 import static android.app.admin.DeviceAdminReceiver.ACTION_PROFILE_PROVISIONING_COMPLETE; 20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISIONING_SUCCESSFUL; 21 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 22 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE; 184 ProvisionLogger.loge("Failed to infer the device admin component name", e); 196 ProvisionLogger.loge("Device admin package name is null");
|
DpcReceivedSuccessReceiver.java | 19 import static android.app.admin.DevicePolicyManager.ACTION_MANAGED_PROFILE_PROVISIONED; 20 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE;
|
/cts/hostsidetests/devicepolicy/app/CustomizationApp/src/com/android/cts/customizationapp/ |
CustomizationTest.java | 30 * The test verifies that non-admin app can't circumvent restriction. The tested restriction is 31 * {@link UserManager#DISALLOW_SET_WALLPAPER}. There is no non-admin API for setting the user icon,
|
/cts/hostsidetests/devicepolicy/app/DelegateApp/src/com/android/cts/delegate/ |
BlockUninstallDelegateTest.java | 18 import static android.app.admin.DevicePolicyManager.DELEGATION_BLOCK_UNINSTALL; 20 import android.app.admin.DevicePolicyManager;
|
DelegatedScopesReceiverActivity.java | 18 import static android.app.admin.DevicePolicyManager.ACTION_APPLICATION_DELEGATION_SCOPES_CHANGED; 19 import static android.app.admin.DevicePolicyManager.EXTRA_DELEGATION_SCOPES;
|
/development/samples/browseable/BasicManagedProfile/src/com.example.android.basicmanagedprofile/ |
SetupProfileFragment.java | 28 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 29 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME;
|
/development/samples/training/device-management-policy/res/values/ |
strings.xml | 18 <string name="app_name">Device Admin Lesson</string> 19 <string name="app_policy_admin_name">Policy Admin Receiver</string>
|
/docs/source.android.com/src/devices/tech/admin/ |
index.jd | 60 <p><a href="http://developer.android.com/guide/topics/admin/device-admin.html">Device Administration API</a></p>
|
/external/autotest/frontend/afe/templates/admin/ |
base.html | 5 <link rel="stylesheet" type="text/css" href="{% block stylesheet %}{% load admin_static %}{% static "admin/css/base.css" %}{% endblock %}" /> 6 {% if LANGUAGE_BIDI %}<link rel="stylesheet" type="text/css" href="{% block stylesheet_rtl %}{% static "admin/css/rtl.css" %}{% endblock %}" />{% endif %}
|
/external/dagger2/compiler/src/test/java/dagger/internal/codegen/ |
MapKeyProcessorTest.java | 49 " ADMIN,", 95 " ADMIN,", 135 " @Provides(type = MAP) @PathKey(relativePath = \"AdminPath\", value = PathEnum.ADMIN)", 171 " ADMIN,", 237 " .put(PathKeyCreator.createPathKey(PathEnum.ADMIN, \"AdminPath\"),", 312 " @Provides(type = MAP) @PathKey(value = PathEnum.ADMIN) Handler provideAdminHandler() {", 347 " ADMIN,", 413 " .put(PathKeyCreator.createPathKey(PathEnum.ADMIN, \"DefaultPath\"),",
|
/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/ |
NetworkEventTest.java | 18 import android.app.admin.ConnectEvent; 19 import android.app.admin.DnsEvent;
|
/packages/apps/Settings/src/com/android/settings/ |
DeviceAdminAdd.java | 24 import android.app.admin.DeviceAdminInfo; 25 import android.app.admin.DeviceAdminReceiver; 26 import android.app.admin.DevicePolicyManager; 85 * Optional key to map to the package name of the Device Admin. 86 * Currently only used when uninstalling an active device admin. 199 // When activating, make sure the given component name is actually a valid device admin. 201 // invalid device admin. 227 Log.w(TAG, "Request to add invalid device admin: " + who); 247 // This admin already exists, an we have two options at this point. If new policy 254 Log.w(TAG, "Requested admin is already being removed: " + who) 571 final EnforcedAdmin admin = getAdminEnforcingCantRemoveProfile(); local [all...] |
/packages/apps/Settings/src/com/android/settings/enterprise/ |
AdminGrantedPermissionsPreferenceControllerBase.java | 69 // apps that the admin has granted a given permissions takes a bit of time, we always 77 // We block and return synchronously whether the admin has granted the given permissions to
|
/packages/apps/Settings/tests/robotests/src/com/android/settings/applications/ |
AppWithAdminGrantedPermissionsCounterTest.java | 19 import android.app.admin.DevicePolicyManager; 116 // admin. 206 // admin. It should be counted. 208 // admin. It should not be counted. 209 // * app3 uses install-time permissions. It was installed by the admin and requested one of 211 // * app4 uses install-time permissions. It was not installed by the admin but did request 213 // * app5 uses install-time permissions. It was installed by the admin but did not request 220 // granted both permissions by the admin. It should be counted.
|
/system/nfc/src/nfa/include/ |
nfa_hci_defs.h | 71 /* Admin gate commands */ 106 /* Host controller Admin gate registry identifiers */
|
/external/ipsec-tools/src/racoon/ |
admin.c | 1 /* $NetBSD: admin.c,v 1.17.6.3 2009/04/20 13:32:57 tteras Exp $ */ 3 /* Id: admin.c,v 1.25 2006/04/06 14:31:04 manubsd Exp */ 79 #include "admin.h" 111 "failed to accept admin command: %s\n", 121 "failed to recv admin command: %s\n", 129 "invalid header length of admin command\n"); 136 "failed to alloc buffer for admin command\n"); 145 "failed to recv admin command: %s\n", 519 "failed to allocate admin buffer\n"); 533 "failed to send admin command: %s\n" [all...] |
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/common/ |
Utils.java | 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE_FROM_TRUSTED_SOURCE; 21 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 22 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_SHAREABLE_DEVICE; 23 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_USER; 24 import static android.app.admin.DevicePolicyManager.MIME_TYPE_PROVISIONING_NFC; 34 import android.app.admin.DevicePolicyManager; 162 * Check the validity of the admin component name supplied, or try to infer this componentName 172 * Check that this package is installed, try to infer a potential device admin in this package, 183 + " component name of the admin are supplied") [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
DeviceAdminUninstallTestActivity.java | 17 package com.android.cts.verifier.admin; 19 import android.app.admin.DevicePolicyManager; 125 Log.e(TAG, "Exception while copying device admin apk", exc); 204 static final String CONTENT_AUTHORITY = "com.android.cts.verifier.admin.fileprovider";
|