/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
BaseDeviceAdminTest.java | 18 import android.app.admin.DeviceAdminReceiver; 19 import android.app.admin.DevicePolicyManager; 35 * active admin registered, so that all tests may assume these are done.
|
/development/samples/browseable/BasicManagedProfile/src/com.example.android.basicmanagedprofile/ |
SetupProfileFragment.java | 28 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 29 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME;
|
/cts/tests/admin/src/android/admin/cts/ |
DeviceAdminReceiverTest.java | 17 package android.admin.cts; 19 import static android.app.admin.DeviceAdminReceiver.ACTION_PASSWORD_CHANGED; 20 import static android.app.admin.DeviceAdminReceiver.ACTION_PASSWORD_FAILED; 21 import static android.app.admin.DeviceAdminReceiver.ACTION_PASSWORD_SUCCEEDED; 22 import static android.app.admin.DeviceAdminReceiver.ACTION_PASSWORD_EXPIRING; 29 import android.app.admin.DeviceAdminReceiver;
|
/external/autotest/apache/conf/ |
django-directives | 24 # Block all access to the django admin pages. The django admin module that we 27 RewriteRule ^/admin/.* - [R=404] 28 RewriteRule ^/afe/server/admin/.* - [R=404] 29 RewriteRule ^/afe/server/admin - [R=404] 56 # Note: this maximum-requests argument is required because of a memory leak in the django admin pages.
|
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/preprovisioning/ |
PreProvisioningController.java | 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE_FROM_TRUSTED_SOURCE; 21 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 22 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_SHAREABLE_DEVICE; 23 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_USER; 24 import static android.app.admin.DevicePolicyManager.CODE_ADD_MANAGED_PROFILE_DISALLOWED; 25 import static android.app.admin.DevicePolicyManager.CODE_CANNOT_ADD_MANAGED_PROFILE; 26 import static android.app.admin.DevicePolicyManager.CODE_HAS_DEVICE_OWNER; 27 import static android.app.admin.DevicePolicyManager.CODE_MANAGED_USERS_NOT_SUPPORTED; 28 import static android.app.admin.DevicePolicyManager.CODE_NOT_SYSTEM_USER [all...] |
/packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/finalization/ |
FinalizationControllerTest.java | 19 import static android.app.admin.DeviceAdminReceiver.ACTION_PROFILE_PROVISIONING_COMPLETE; 20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISIONING_SUCCESSFUL; 21 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 22 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 23 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE; 224 // THEN the intent should be sent to the admin receiver 226 // THEN the admin extras bundle should contain mdm extras 244 // THEN the intent should be sent to the admin receiver 246 // THEN the admin extras bundle should contain mdm extras 257 // THEN the admin extras bundle should contain mdm extra [all...] |
DpcReceivedSuccessReceiverTest.java | 19 import static android.app.admin.DeviceAdminReceiver.ACTION_PROFILE_PROVISIONING_COMPLETE; 20 import static android.app.admin.DevicePolicyManager.ACTION_MANAGED_PROFILE_PROVISIONED; 21 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE;
|
/packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/ota/ |
OtaControllerTest.java | 27 import android.app.admin.DevicePolicyManager; 62 private static final ComponentName ADMIN_COMPONENT = new ComponentName("com.test.admin", 177 private void setDeviceOwner(int userId, ComponentName admin) { 179 when(mDevicePolicyManager.getDeviceOwnerComponentOnAnyUser()).thenReturn(admin); 182 private void addManagedProfile(int userId, ComponentName admin) { 185 when(mDevicePolicyManager.getProfileOwnerAsUser(userId)).thenReturn(admin);
|
/packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/preprovisioning/ |
PreProvisioningActivityTest.java | 18 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 20 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME; 21 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_LOGO_URI; 22 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_MAIN_COLOR;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/ |
Utils.java | 24 import android.app.admin.DevicePolicyManager; 71 static void provisionManagedProfile(Activity activity, ComponentName admin, int requestCode) { 73 sending.putExtra(DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME, admin);
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
NetworkLogger.java | 19 import android.app.admin.ConnectEvent; 20 import android.app.admin.DnsEvent; 21 import android.app.admin.NetworkEvent;
|
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/ota/ |
OtaController.java | 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 23 import android.app.admin.DevicePolicyManager;
|
/packages/apps/Settings/src/com/android/settings/ |
MasterClearConfirm.java | 147 final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced( local 152 } else if (admin != null) { 154 ShowAdminSupportDetailsDialog.setAdminSupportDetails(getActivity(), view, admin, false); local
|
ResetNetworkConfirm.java | 141 final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced( local 146 } else if (admin != null) { 148 ShowAdminSupportDetailsDialog.setAdminSupportDetails(getActivity(), view, admin, false); local
|
/packages/apps/Settings/src/com/android/settings/dashboard/conditional/ |
HotspotCondition.java | 111 final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(context, local 113 if (admin != null) { 114 RestrictedLockUtils.sendShowAdminSupportDetailsIntent(context, admin);
|
/packages/apps/Settings/src/com/android/settings/display/ |
TimeoutPreferenceController.java | 16 import android.app.admin.DevicePolicyManager; 65 final RestrictedLockUtils.EnforcedAdmin admin = local 69 timeoutListPreference.removeUnusableTimeouts(maxTimeout, admin);
|
/packages/apps/Settings/src/com/android/settings/nfc/ |
AndroidBeam.java | 67 final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced( local 72 if (!mBeamDisallowedByBase && admin != null) { 74 ShowAdminSupportDetailsDialog.setAdminSupportDetails(getActivity(), view, admin, false); local
|
/packages/apps/Settings/tests/robotests/src/com/android/settings/ |
EncryptionAndCredentialTest.java | 19 import static android.app.admin.DevicePolicyManager.ENCRYPTION_STATUS_ACTIVE; 20 import static android.app.admin.DevicePolicyManager.ENCRYPTION_STATUS_INACTIVE; 25 import android.app.admin.DevicePolicyManager;
|
/compatibility/cdd/9_security-model/ |
9_12_data-deletion.md | 14 https://developer.android.com/reference/android/app/admin/DevicePolicyManager.html#wipeData%28int%29)
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
ScreenLockTestActivity.java | 17 package com.android.cts.verifier.admin; 25 import android.app.admin.DevicePolicyManager;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/tapjacking/ |
DeviceAdminTapjackingTestActivity.java | 17 package com.android.cts.verifier.admin.tapjacking; 19 import android.app.admin.DevicePolicyManager; 32 * Test that checks that device admin activate button does not allow taps when another window 33 * is obscuring the device admin details 67 Log.e(TAG, "Could not remove active admin. Cannot proceed with test"); 107 Log.e(TAG, "Admin was activated. Restart the Test");
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
BaseDeviceOwnerTest.java | 18 import android.app.admin.DeviceAdminReceiver; 19 import android.app.admin.DevicePolicyManager; 33 * and that it has an active admin registered, so that all tests may 34 * assume these are done. The admin component can be accessed through
|
SystemUpdatePolicyTest.java | 20 import android.app.admin.DevicePolicyManager; 21 import android.app.admin.SystemUpdatePolicy;
|
/development/samples/training/device-management-policy/src/com/example/training/deviceadmin/ |
Policy.java | 20 import android.app.admin.DeviceAdminReceiver; 21 import android.app.admin.DevicePolicyManager;
|
/external/autotest/server/cros/ap_configurators/basic_auth_extension/ |
background.js | 19 callback({authCredentials: {username: 'admin', password: 'password'}});
|