HomeSort by relevance Sort by last modified time
    Searched full:admin (Results 351 - 375 of 1441) sorted by null

<<11121314151617181920>>

  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/email/test/data/
msg_16.txt 2 Delivered-To: scr-admin@socal-raves.org
5 for <scr-admin@socal-raves.org>; Sun, 23 Sep 2001 20:13:54 -0700 (PDT)
8 id <0GK500B01D0B8Y@cougar.noc.ucla.edu> for scr-admin@socal-raves.org; Sun,
16 To: scr-admin@socal-raves.org
66 Return-path: scr-admin@socal-raves.org
91 Sender: scr-admin@socal-raves.org
93 Errors-to: scr-admin@socal-raves.org
  /frameworks/base/packages/SettingsLib/tests/robotests/src/com/android/settingslib/
RestrictedLockUtilsTest.java 19 import static android.app.admin.DevicePolicyManager.KEYGUARD_DISABLE_FEATURES_NONE;
20 import static android.app.admin.DevicePolicyManager.KEYGUARD_DISABLE_FINGERPRINT;
21 import static android.app.admin.DevicePolicyManager.KEYGUARD_DISABLE_REMOTE_INPUT;
22 import static android.app.admin.DevicePolicyManager.KEYGUARD_DISABLE_UNREDACTED_NOTIFICATIONS;
30 import android.app.admin.DevicePolicyManager;
  /frameworks/base/core/java/android/app/admin/
DeviceAdminReceiver.java 17 package android.app.admin;
67 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a>
93 * disabling your admin, by setting the extra field
96 * to the user before they disable your admin.
105 * impact of disabling your admin.
133 * <p>The calling device admin must have requested
150 * <p>The calling device admin must have requested
164 * <p>The calling device admin must have requested
178 * <p>The calling device admin must have requeste
    [all...]
  /packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/provisioning/
ProvisioningActivityTest.java 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE;
20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE;
77 private static final String ADMIN_PACKAGE = "com.test.admin";
78 private static final ComponentName ADMIN = new ComponentName(ADMIN_PACKAGE, ".Receiver");
81 .setDeviceAdminComponentName(ADMIN)
85 .setDeviceAdminComponentName(ADMIN)
164 .setDeviceAdminComponentName(ADMIN)
319 .setDeviceAdminComponentName(ADMIN)
339 .setDeviceAdminComponentName(ADMIN)
  /packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/preprovisioning/
PreProvisioningController.java 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE;
20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE_FROM_TRUSTED_SOURCE;
21 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE;
22 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_SHAREABLE_DEVICE;
23 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_USER;
24 import static android.app.admin.DevicePolicyManager.CODE_ADD_MANAGED_PROFILE_DISALLOWED;
25 import static android.app.admin.DevicePolicyManager.CODE_CANNOT_ADD_MANAGED_PROFILE;
26 import static android.app.admin.DevicePolicyManager.CODE_HAS_DEVICE_OWNER;
27 import static android.app.admin.DevicePolicyManager.CODE_MANAGED_USERS_NOT_SUPPORTED;
28 import static android.app.admin.DevicePolicyManager.CODE_NOT_SYSTEM_USER
    [all...]
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/
ScreenLockTestActivity.java 17 package com.android.cts.verifier.admin;
25 import android.app.admin.DevicePolicyManager;
  /cts/common/device-side/util/src/com/android/compatibility/common/util/devicepolicy/provisioning/
SilentProvisioningTestManager.java 18 import static android.app.admin.DevicePolicyManager.ACTION_MANAGED_PROFILE_PROVISIONED;
19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE;
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/
SystemUpdatePolicyTest.java 20 import android.app.admin.DevicePolicyManager;
21 import android.app.admin.SystemUpdatePolicy;
  /developers/build/prebuilts/gradle/BasicManagedProfile/Application/src/main/java/com/example/android/basicmanagedprofile/
SetupProfileFragment.java 21 import android.app.admin.DevicePolicyManager;
77 // Use a different intent extra below M to configure the admin component.
  /developers/samples/android/admin/BasicManagedProfile/Application/src/main/java/com/example/android/basicmanagedprofile/
SetupProfileFragment.java 21 import android.app.admin.DevicePolicyManager;
77 // Use a different intent extra below M to configure the admin component.
  /development/samples/training/device-management-policy/src/com/example/training/deviceadmin/
Policy.java 20 import android.app.admin.DeviceAdminReceiver;
21 import android.app.admin.DevicePolicyManager;
  /external/autotest/site_utils/
setup_db.sh 90 'chromeosqa-admin'@'localhost' IDENTIFIED BY '${PASSWD}';"
94 'chromeosqa-admin'@'%' IDENTIFIED BY '${PASSWD}';"
  /external/ipsec-tools/src/racoon/
admin.h 1 /* $NetBSD: admin.h,v 1.4 2006/09/09 16:22:09 manu Exp $ */
3 /* Id: admin.h,v 1.11 2005/06/19 22:37:47 manubsd Exp */
  /frameworks/base/core/java/android/service/restrictions/
RestrictionsReceiver.java 19 import android.app.admin.DevicePolicyManager;
29 * Export this receiver in the manifest. A profile owner device admin can then register this
  /frameworks/base/services/core/java/com/android/server/
LockSettingsShellCommand.java 19 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_ALPHABETIC;
20 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_NUMERIC;
  /packages/apps/Email/provider_src/com/android/email/service/
PolicyService.java 20 import android.app.admin.DevicePolicyManager;
99 // The camera is already disabled, by this admin.
  /packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/task/
InstallExistingPackageTaskTest.java 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE;
41 private static final String ADMIN_PACKAGE_NAME = "com.admin.test";
  /packages/apps/Settings/src/com/android/settings/
SettingsInitialize.java 41 * webview setting for non-admin users.
101 // Disable WebView Setting if the current user is not an admin
  /packages/apps/Settings/src/com/android/settings/dashboard/suggestions/
SuggestionsChecks.java 23 import android.app.admin.DevicePolicyManager;
123 final int dpmFlags = dpManager.getKeyguardDisabledFeatures(null, /* admin */
  /packages/apps/Settings/src/com/android/settings/security/
OwnerInfoPreferenceController.java 85 EnforcedAdmin admin = getDeviceOwner(); local
86 mOwnerInfoPref.setDisabledByAdmin(admin);
  /packages/apps/TvSettings/Settings/src/com/android/tv/settings/device/apps/
ForceStopPreference.java 21 import android.app.admin.DevicePolicyManager;
48 // User can't force stop device admin.
  /cts/apps/CtsVerifier/res/layout/
da_tapjacking_test_main.xml 27 <!-- Enable device admin -->
  /cts/hostsidetests/devicepolicy/app/AccountManagement/src/com/android/cts/devicepolicy/accountmanagement/
AccountUtilsTest.java 32 * {@link android.app.admin.DevicePolicyManager#setAccountManagementDisabled}
  /cts/hostsidetests/devicepolicy/app/AppRestrictionsTargetApp/src/com/android/cts/apprestrictions/targetapp/
ApplicationRestrictionsActivity.java 25 * Test activity for {@link android.app.admin.DevicePolicyManager#setApplicationRestrictions}.
  /cts/hostsidetests/devicepolicy/app/DeviceAdmin/api23/
AndroidManifest.xml 51 android:label="Device Admin CTS tests"/>

Completed in 1187 milliseconds

<<11121314151617181920>>