/cts/hostsidetests/devicepolicy/app/AccountCheck/src-owner/com/android/cts/devicepolicy/accountcheck/owner/ |
AdminReceiver.java | 18 import android.app.admin.DeviceAdminReceiver;
|
/frameworks/base/core/java/android/app/admin/ |
DevicePolicyManager.java | 17 package android.app.admin; 35 import android.app.admin.SecurityLog.SecurityEvent; 90 * registered with the system as a <a href="{@docRoot}guide/topics/admin/device-admin.html">device 100 * "{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> developer 223 * <p> During device owner provisioning a device admin app is set as the owner of the device. 287 * <p>During device owner provisioning, a device admin app is downloaded and set as the owner of 341 * <p>During device owner provisioning a device admin app is set as the owner of the device. 504 * <p> When this extra is set, the application must have exactly one device admin receiver [all...] |
IDevicePolicyManager.aidl | 18 package android.app.admin; 20 import android.app.admin.NetworkEvent; 23 import android.app.admin.SystemUpdateInfo; 24 import android.app.admin.SystemUpdatePolicy; 25 import android.app.admin.PasswordMetrics; 83 void setMaximumFailedPasswordsForWipe(in ComponentName admin, int num, boolean parent); 84 int getMaximumFailedPasswordsForWipe(in ComponentName admin, int userHandle, boolean parent); 99 ComponentName setGlobalProxy(in ComponentName admin, String proxySpec, String exclusionList); 101 void setRecommendedGlobalProxy(in ComponentName admin, in ProxyInfo proxyInfo); 154 String[] setPackagesSuspended(in ComponentName admin, in String callerPackage, in String[] packageNames, boolean suspended) [all...] |
/external/fio/examples/ |
rbd.fio | 15 clientname=admin
|
/packages/apps/Settings/src/com/android/settings/enterprise/ |
DevicePolicyManagerWrapperImpl.java | 20 import android.app.admin.DevicePolicyManager; 41 public int getMaximumFailedPasswordsForWipe(@Nullable ComponentName admin, int userHandle) { 42 return mDpm.getMaximumFailedPasswordsForWipe(admin, userHandle); 66 public int getPermissionGrantState(@Nullable ComponentName admin, String packageName, 68 return mDpm.getPermissionGrantState(admin, packageName, permission); 72 public boolean isSecurityLoggingEnabled(@Nullable ComponentName admin) { 73 return mDpm.isSecurityLoggingEnabled(admin); 77 public boolean isNetworkLoggingEnabled(@Nullable ComponentName admin) { 78 return mDpm.isNetworkLoggingEnabled(admin);
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/tapjacking/ |
EmptyDeviceAdminReceiver.java | 17 package com.android.cts.verifier.admin.tapjacking; 19 import android.app.admin.DeviceAdminReceiver; 20 import android.app.admin.DevicePolicyManager;
|
/cts/hostsidetests/devicepolicy/app/CorpOwnedManagedProfile/src/com/android/cts/comp/provisioning/ |
AffiliationTest.java | 20 import android.app.admin.DevicePolicyManager; 41 ComponentName admin = AdminReceiver.getComponentName(getContext()); local 45 dpm.setAffiliationIds(admin, ids); 46 assertEquals(ids, dpm.getAffiliationIds(admin));
|
UserRestrictionTest.java | 19 import android.app.admin.DevicePolicyManager; 54 ComponentName admin = AdminReceiver.getComponentName(getContext()); local 56 dpm.addUserRestriction(admin, restriction); 58 dpm.clearUserRestriction(admin, restriction);
|
/external/libpcap/ChmodBPF/ |
ChmodBPF | 11 # This startup item will make it owned by the admin group, 12 # with permissions rw-rw----, so that anybody in the admin 20 # admin group can capture packets. 22 chgrp admin /dev/bpf*
|
/frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/ |
DummyDeviceAdmins.java | 18 import android.app.admin.DeviceAdminReceiver;
|
DpmTestBase.java | 27 import android.app.admin.DevicePolicyManager; 133 protected void setUpPackageManagerForAdmin(ComponentName admin, int packageUid) 135 setUpPackageManagerForAdmin(admin, packageUid, 139 protected void setUpPackageManagerForAdmin(ComponentName admin, int packageUid, 141 setUpPackageManagerForAdmin(admin, packageUid, enabledSetting, /* appTargetSdk = */ null); 144 protected void setUpPackageManagerForAdmin(ComponentName admin, int packageUid, 146 setUpPackageManagerForFakeAdmin(admin, packageUid, enabledSetting, appTargetSdk, 147 admin); 150 protected void setUpPackageManagerForFakeAdmin(ComponentName admin, int packageUid, 153 setUpPackageManagerForFakeAdmin(admin, packageUid [all...] |
/cts/hostsidetests/devicepolicy/app/DelegateApp/src/com/android/cts/delegate/ |
GeneralDelegateTest.java | 18 import static android.app.admin.DevicePolicyManager.DELEGATION_APP_RESTRICTIONS; 19 import static android.app.admin.DevicePolicyManager.DELEGATION_BLOCK_UNINSTALL; 20 import static android.app.admin.DevicePolicyManager.DELEGATION_CERT_INSTALL; 21 import static android.app.admin.DevicePolicyManager.DELEGATION_PERMISSION_GRANT; 22 import static android.app.admin.DevicePolicyManager.DELEGATION_PACKAGE_ACCESS; 23 import static android.app.admin.DevicePolicyManager.DELEGATION_ENABLE_SYSTEM_APP; 25 import android.app.admin.DevicePolicyManager; 93 MoreAsserts.assertContainsRegex("No active admin", expected.getMessage());
|
PermissionGrantDelegateTest.java | 18 import static android.app.admin.DevicePolicyManager.DELEGATION_PERMISSION_GRANT; 19 import static android.app.admin.DevicePolicyManager.PERMISSION_POLICY_AUTO_GRANT; 20 import static android.app.admin.DevicePolicyManager.PERMISSION_POLICY_AUTO_DENY; 21 import static android.app.admin.DevicePolicyManager.PERMISSION_GRANT_STATE_GRANTED; 22 import static android.app.admin.DevicePolicyManager.PERMISSION_GRANT_STATE_DENIED; 25 import android.app.admin.DevicePolicyManager;
|
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/parser/ |
ExtrasProvisioningDataParser.java | 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE_FROM_TRUSTED_SOURCE; 21 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 22 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_SHAREABLE_DEVICE; 23 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_USER; 24 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE; 25 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE; 26 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME; 27 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_MINIMUM_VERSION_CODE; 28 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM [all...] |
PropertiesProvisioningDataParser.java | 19 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE; 20 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME; 21 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_MINIMUM_VERSION_CODE; 22 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM; 23 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_COOKIE_HEADER; 24 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION; 25 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME; 26 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_SIGNATURE_CHECKSUM; 27 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED; 28 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_LOCALE [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/ |
CompHelperActivity.java | 20 import android.app.admin.DevicePolicyManager; 78 final ComponentName admin = CompDeviceAdminTestReceiver.getReceiverComponentName(); local 85 dpm.setAlwaysOnVpnPackage(admin, getPackageName(), false /* lockdownEnabled */); 90 dpm.installCaCert(admin, TEST_CA.getBytes()); 92 dpm.setMaximumFailedPasswordsForWipe(admin, 100);
|
/external/autotest/frontend/ |
urls.py | 5 # The next two lines enable the admin and load each admin.py file: 6 from django.contrib import admin 7 admin.autodiscover() 17 (RE_PREFIX + r'admin/', urls.include(admin.site.urls)),
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
RedactedNotificationKeyguardDisabledFeaturesActivity.java | 16 package com.android.cts.verifier.admin; 18 import android.app.admin.DevicePolicyManager; 29 * Tests for Device Admin keyguard redacted notification feature. This test is taken out from
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/sensors/helpers/ |
SensorDeviceAdminReceiver.java | 19 import android.app.admin.DeviceAdminReceiver;
|
/cts/hostsidetests/devicepolicy/app/DeviceAdmin/src/com.android.cts.deviceadmin/ |
ClearDeviceAdminTest.java | 18 import android.app.admin.DevicePolicyManager; 22 * Remove myself as active admin.
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
RemoteBugreportTest.java | 20 import android.app.admin.DevicePolicyManager;
|
SetPolicyActivity.java | 19 import android.app.admin.DevicePolicyManager; 66 ComponentName admin = BaseDeviceOwnerTest.getWho(); local 69 dpm.addUserRestriction(admin, restrictionKey); 74 dpm.clearUserRestriction(admin, restrictionKey);
|
/cts/hostsidetests/devicepolicy/app/ManagedProfile/src/com/android/cts/managedprofile/ |
LockNowTest.java | 19 import android.app.admin.DevicePolicyManager;
|
PrimaryUserDeviceAdmin.java | 18 import android.app.admin.DeviceAdminReceiver; 22 * A device admin class running in the primary user. Currently used by delegated cert installer
|
/cts/hostsidetests/devicepolicy/app/ProfileOwner/src/com/android/cts/profileowner/ |
ManagementTest.java | 19 import android.app.admin.DevicePolicyManager;
|