/cts/hostsidetests/devicepolicy/app/PackageInstaller/res/xml/ |
device_admin.xml | 1 <device-admin xmlns:android="http://schemas.android.com/apk/res/android" android:visible="false"> 3 </device-admin>
|
/cts/tests/tests/packageinstaller/adminpackageinstaller/res/xml/ |
device_admin.xml | 1 <device-admin xmlns:android="http://schemas.android.com/apk/res/android" android:visible="false"> 3 </device-admin>
|
/cts/hostsidetests/devicepolicy/app/CorpOwnedManagedProfile/res/xml/ |
device_admin.xml | 1 <device-admin xmlns:android="http://schemas.android.com/apk/res/android" android:visible="false"> 5 </device-admin>
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/res/xml/ |
device_admin.xml | 1 <device-admin xmlns:android="http://schemas.android.com/apk/res/android" android:visible="false"> 6 </device-admin>
|
/cts/hostsidetests/devicepolicy/app/ProfileOwner/res/xml/ |
device_admin.xml | 1 <device-admin xmlns:android="http://schemas.android.com/apk/res/android" android:visible="false"> 4 </device-admin>
|
/frameworks/base/services/tests/servicestests/assets/DevicePolicyManagerServiceMigrationTest/ |
legacy_device_policies.xml | 3 <admin name="com.google.android.gms/com.google.android.gms.mdm.receivers.MdmDeviceAdminReceiver"> 4 </admin> 5 <admin name="com.android.frameworks.servicestests/com.android.server.devicepolicy.DummyDeviceAdmins$Admin1"> 6 </admin>
|
legacy_device_policies_10.xml | 3 <admin name="com.android.frameworks.servicestests/com.android.server.devicepolicy.DummyDeviceAdmins$Admin2"> 4 </admin>
|
legacy_device_policies_11.xml | 3 <admin name="com.android.frameworks.servicestests/com.android.server.devicepolicy.DummyDeviceAdmins$Admin3"> 4 </admin>
|
/external/autotest/apache/conf/ |
django-directives | 27 RewriteCond /usr/lib64/python2.7/site-packages/django/contrib/admin/static/admin -d 28 RewriteRule ^/media/(css|img|js)(.*) /usr/lib64/python2.7/site-packages/django/contrib/admin/static/admin/$1/$2 29 RewriteCond /usr/lib64/python2.7/site-packages/django/contrib/admin/static/admin -d 30 RewriteRule ^/afe/server/admin/admin/(css|img|js)(.*) /usr/lib64/python2.7/site-packages/django/contrib/admin/static/admin/$1/$ [all...] |
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
RequiredStrongAuthTimeoutTest.java | 31 private static final ComponentName ADMIN = ADMIN_RECEIVER_COMPONENT; 34 // aggregation should be the default if unset by any admin 38 // admin not participating by default 39 assertEquals(mDevicePolicyManager.getRequiredStrongAuthTimeout(ADMIN), 0); 42 mDevicePolicyManager.setRequiredStrongAuthTimeout(ADMIN, 44 assertEquals(mDevicePolicyManager.getRequiredStrongAuthTimeout(ADMIN), 49 // 0 means the admin is not participating, so default should be returned 50 mDevicePolicyManager.setRequiredStrongAuthTimeout(ADMIN, 0); 51 assertEquals(mDevicePolicyManager.getRequiredStrongAuthTimeout(ADMIN), 0); 56 mDevicePolicyManager.setRequiredStrongAuthTimeout(ADMIN, [all...] |
/packages/apps/Settings/src/com/android/settings/ |
EventLogTags.logtags | 8 # log whether user accepted and activated device admin 11 # log whether user declined activation of device admin 14 # log whether user uninstalled device admin on activation screen
|
/packages/apps/Settings/src/com/android/settings/enterprise/ |
DevicePolicyManagerWrapper.java | 27 * This interface replicates a subset of the android.app.admin.DevicePolicyManager (DPM). The 36 * @see android.app.admin.DevicePolicyManager#getActiveAdminsAsUser 43 * @see android.app.admin.DevicePolicyManager#getMaximumFailedPasswordsForWipe 45 int getMaximumFailedPasswordsForWipe(@Nullable ComponentName admin, int userHandle); 50 * @see android.app.admin.DevicePolicyManager#getDeviceOwnerComponentOnAnyUser 57 * @see android.app.admin.DevicePolicyManager#getProfileOwnerAsUser 64 * @see android.app.admin.DevicePolicyManager#getDeviceOwnerNameOnAnyUser 71 * @see android.app.admin.DevicePolicyManager#getPermissionGrantState 73 int getPermissionGrantState(@Nullable ComponentName admin, String packageName, 79 * @see android.app.admin.DevicePolicyManager#isSecurityLoggingEnable [all...] |
/frameworks/base/services/tests/servicestests/assets/DevicePolicyManagerServiceMigrationTest2/ |
legacy_device_policies.xml | 3 <admin name="com.android.frameworks.servicestests/com.android.server.devicepolicy.DummyDeviceAdmins$Admin2"> 4 </admin>
|
/frameworks/base/core/java/android/app/admin/ |
IDevicePolicyManager.aidl | 18 package android.app.admin; 20 import android.app.admin.NetworkEvent; 23 import android.app.admin.SystemUpdateInfo; 24 import android.app.admin.SystemUpdatePolicy; 25 import android.app.admin.PasswordMetrics; 83 void setMaximumFailedPasswordsForWipe(in ComponentName admin, int num, boolean parent); 84 int getMaximumFailedPasswordsForWipe(in ComponentName admin, int userHandle, boolean parent); 99 ComponentName setGlobalProxy(in ComponentName admin, String proxySpec, String exclusionList); 101 void setRecommendedGlobalProxy(in ComponentName admin, in ProxyInfo proxyInfo); 154 String[] setPackagesSuspended(in ComponentName admin, in String callerPackage, in String[] packageNames, boolean suspended) [all...] |
package.html | 8 <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a>
|
/cts/tests/admin/ |
AndroidTest.xml | 16 <configuration description="Config for the CTS device admin tests"> 26 <option name="run-command" value="dpm set-active-admin --user cur android.admin.app/.CtsDeviceAdminReceiver" /> 27 <option name="run-command" value="dpm set-active-admin --user cur android.admin.app/.CtsDeviceAdminReceiver2" /> 28 <option name="run-command" value="dpm set-profile-owner --user cur android.admin.app/.CtsDeviceAdminProfileOwner" /> 29 <option name="teardown-command" value="dpm remove-active-admin --user cur android.admin.app/.CtsDeviceAdminProfileOwner" /> 30 <option name="teardown-command" value="dpm remove-active-admin --user cur android.admin.app/.CtsDeviceAdminReceiver" / [all...] |
/developers/build/prebuilts/gradle/BasicManagedProfile/.google/ |
packaging.yaml | 9 categories: [Device Admin] 16 - android:android.app.admin.DevicePolicyManager 17 - android:android.app.admin.DeviceAdminReceiver
|
/development/samples/browseable/AppRestrictionEnforcer/ |
_index.jd | 3 sample.group=Admin
|
/external/autotest/server/site_tests/cheets_CTS/ |
control.arm.android.admin | 8 NAME = 'cheets_CTS.arm.android.admin' 15 DOC = ('Run package android.admin of the ' 25 tag='android.admin', 26 target_package='android.admin',
|
control.x86.android.admin | 8 NAME = 'cheets_CTS.x86.android.admin' 15 DOC = ('Run package android.admin of the ' 25 tag='android.admin', 26 target_package='android.admin',
|
/external/libpcap/ |
chmod_bpf | 7 # This startup item will make it owned by the admin group, 8 # with permissions rw-rw----, so that anybody in the admin 16 # admin group can capture packets. 18 chgrp admin /dev/bpf*
|
/frameworks/base/services/tests/servicestests/assets/DevicePolicyManagerServiceMigrationTest3/ |
profile_device_policies.xml | 3 <admin name="com.android.frameworks.servicestests/com.android.server.devicepolicy.DummyDeviceAdmins$Admin1"> 7 </admin>
|
/external/autotest/frontend/ |
urls.py | 5 # The next two lines enable the admin and load each admin.py file: 6 from django.contrib import admin 7 admin.autodiscover() 17 (RE_PREFIX + r'admin/', defaults.include(admin.site.urls)),
|
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/ |
RestrictedLockUtils.java | 19 import static android.app.admin.DevicePolicyManager.KEYGUARD_DISABLE_FEATURES_NONE; 20 import static android.app.admin.DevicePolicyManager.PROFILE_KEYGUARD_FEATURES_AFFECT_OWNER; 26 import android.app.admin.DevicePolicyManager; 50 * Utility class to host methods usable in adding a restricted padlock icon and showing admin 55 * @return drawables for displaying with settings that are locked by a device admin. 66 * Checks if a restriction is enforced on a user and returns the enforced admin and 67 * admin userId. 71 * @return EnforcedAdmin Object containing the enforced admin component and admin user details, 73 * and profile owner, then the admin component will be set to {@code null} and userId t 241 EnforcedAdmin admin = getProfileOrDeviceOwner(context, userId); local 275 EnforcedAdmin admin = getProfileOwner(context, userId); local 294 EnforcedAdmin admin = getProfileOrDeviceOwner(context, userId); local [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/ |
DpmTestBase.java | 19 import android.app.admin.DevicePolicyManager; 123 protected void setUpPackageManagerForAdmin(ComponentName admin, int packageUid) 125 setUpPackageManagerForAdmin(admin, packageUid, 129 protected void setUpPackageManagerForAdmin(ComponentName admin, int packageUid, 131 setUpPackageManagerForAdmin(admin, packageUid, enabledSetting, /* appTargetSdk = */ null); 134 protected void setUpPackageManagerForAdmin(ComponentName admin, int packageUid, 136 setUpPackageManagerForFakeAdmin(admin, packageUid, enabledSetting, appTargetSdk, 137 admin); 140 protected void setUpPackageManagerForFakeAdmin(ComponentName admin, int packageUid, 143 setUpPackageManagerForFakeAdmin(admin, packageUid [all...] |