HomeSort by relevance Sort by last modified time
    Searched refs:admin (Results 26 - 50 of 654) sorted by null

12 3 4 5 6 7 8 91011>>

  /cts/hostsidetests/devicepolicy/app/AccountCheck/src-owner/com/android/cts/devicepolicy/accountcheck/owner/
AdminReceiver.java 18 import android.app.admin.DeviceAdminReceiver;
  /frameworks/base/core/java/android/app/admin/
DevicePolicyManager.java 17 package android.app.admin;
35 import android.app.admin.SecurityLog.SecurityEvent;
90 * registered with the system as a <a href="{@docRoot}guide/topics/admin/device-admin.html">device
100 * "{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> developer
223 * <p> During device owner provisioning a device admin app is set as the owner of the device.
287 * <p>During device owner provisioning, a device admin app is downloaded and set as the owner of
341 * <p>During device owner provisioning a device admin app is set as the owner of the device.
504 * <p> When this extra is set, the application must have exactly one device admin receiver
    [all...]
IDevicePolicyManager.aidl 18 package android.app.admin;
20 import android.app.admin.NetworkEvent;
23 import android.app.admin.SystemUpdateInfo;
24 import android.app.admin.SystemUpdatePolicy;
25 import android.app.admin.PasswordMetrics;
83 void setMaximumFailedPasswordsForWipe(in ComponentName admin, int num, boolean parent);
84 int getMaximumFailedPasswordsForWipe(in ComponentName admin, int userHandle, boolean parent);
99 ComponentName setGlobalProxy(in ComponentName admin, String proxySpec, String exclusionList);
101 void setRecommendedGlobalProxy(in ComponentName admin, in ProxyInfo proxyInfo);
154 String[] setPackagesSuspended(in ComponentName admin, in String callerPackage, in String[] packageNames, boolean suspended)
    [all...]
  /external/fio/examples/
rbd.fio 15 clientname=admin
  /packages/apps/Settings/src/com/android/settings/enterprise/
DevicePolicyManagerWrapperImpl.java 20 import android.app.admin.DevicePolicyManager;
41 public int getMaximumFailedPasswordsForWipe(@Nullable ComponentName admin, int userHandle) {
42 return mDpm.getMaximumFailedPasswordsForWipe(admin, userHandle);
66 public int getPermissionGrantState(@Nullable ComponentName admin, String packageName,
68 return mDpm.getPermissionGrantState(admin, packageName, permission);
72 public boolean isSecurityLoggingEnabled(@Nullable ComponentName admin) {
73 return mDpm.isSecurityLoggingEnabled(admin);
77 public boolean isNetworkLoggingEnabled(@Nullable ComponentName admin) {
78 return mDpm.isNetworkLoggingEnabled(admin);
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/tapjacking/
EmptyDeviceAdminReceiver.java 17 package com.android.cts.verifier.admin.tapjacking;
19 import android.app.admin.DeviceAdminReceiver;
20 import android.app.admin.DevicePolicyManager;
  /cts/hostsidetests/devicepolicy/app/CorpOwnedManagedProfile/src/com/android/cts/comp/provisioning/
AffiliationTest.java 20 import android.app.admin.DevicePolicyManager;
41 ComponentName admin = AdminReceiver.getComponentName(getContext()); local
45 dpm.setAffiliationIds(admin, ids);
46 assertEquals(ids, dpm.getAffiliationIds(admin));
UserRestrictionTest.java 19 import android.app.admin.DevicePolicyManager;
54 ComponentName admin = AdminReceiver.getComponentName(getContext()); local
56 dpm.addUserRestriction(admin, restriction);
58 dpm.clearUserRestriction(admin, restriction);
  /external/libpcap/ChmodBPF/
ChmodBPF 11 # This startup item will make it owned by the admin group,
12 # with permissions rw-rw----, so that anybody in the admin
20 # admin group can capture packets.
22 chgrp admin /dev/bpf*
  /frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/
DummyDeviceAdmins.java 18 import android.app.admin.DeviceAdminReceiver;
DpmTestBase.java 27 import android.app.admin.DevicePolicyManager;
133 protected void setUpPackageManagerForAdmin(ComponentName admin, int packageUid)
135 setUpPackageManagerForAdmin(admin, packageUid,
139 protected void setUpPackageManagerForAdmin(ComponentName admin, int packageUid,
141 setUpPackageManagerForAdmin(admin, packageUid, enabledSetting, /* appTargetSdk = */ null);
144 protected void setUpPackageManagerForAdmin(ComponentName admin, int packageUid,
146 setUpPackageManagerForFakeAdmin(admin, packageUid, enabledSetting, appTargetSdk,
147 admin);
150 protected void setUpPackageManagerForFakeAdmin(ComponentName admin, int packageUid,
153 setUpPackageManagerForFakeAdmin(admin, packageUid
    [all...]
  /cts/hostsidetests/devicepolicy/app/DelegateApp/src/com/android/cts/delegate/
GeneralDelegateTest.java 18 import static android.app.admin.DevicePolicyManager.DELEGATION_APP_RESTRICTIONS;
19 import static android.app.admin.DevicePolicyManager.DELEGATION_BLOCK_UNINSTALL;
20 import static android.app.admin.DevicePolicyManager.DELEGATION_CERT_INSTALL;
21 import static android.app.admin.DevicePolicyManager.DELEGATION_PERMISSION_GRANT;
22 import static android.app.admin.DevicePolicyManager.DELEGATION_PACKAGE_ACCESS;
23 import static android.app.admin.DevicePolicyManager.DELEGATION_ENABLE_SYSTEM_APP;
25 import android.app.admin.DevicePolicyManager;
93 MoreAsserts.assertContainsRegex("No active admin", expected.getMessage());
PermissionGrantDelegateTest.java 18 import static android.app.admin.DevicePolicyManager.DELEGATION_PERMISSION_GRANT;
19 import static android.app.admin.DevicePolicyManager.PERMISSION_POLICY_AUTO_GRANT;
20 import static android.app.admin.DevicePolicyManager.PERMISSION_POLICY_AUTO_DENY;
21 import static android.app.admin.DevicePolicyManager.PERMISSION_GRANT_STATE_GRANTED;
22 import static android.app.admin.DevicePolicyManager.PERMISSION_GRANT_STATE_DENIED;
25 import android.app.admin.DevicePolicyManager;
  /packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/parser/
ExtrasProvisioningDataParser.java 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE;
20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE_FROM_TRUSTED_SOURCE;
21 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE;
22 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_SHAREABLE_DEVICE;
23 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_USER;
24 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ACCOUNT_TO_MIGRATE;
25 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE;
26 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME;
27 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_MINIMUM_VERSION_CODE;
28 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM
    [all...]
PropertiesProvisioningDataParser.java 19 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE;
20 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME;
21 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_MINIMUM_VERSION_CODE;
22 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_CHECKSUM;
23 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_COOKIE_HEADER;
24 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_DOWNLOAD_LOCATION;
25 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME;
26 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_SIGNATURE_CHECKSUM;
27 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_LEAVE_ALL_SYSTEM_APPS_ENABLED;
28 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_LOCALE
    [all...]
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/
CompHelperActivity.java 20 import android.app.admin.DevicePolicyManager;
78 final ComponentName admin = CompDeviceAdminTestReceiver.getReceiverComponentName(); local
85 dpm.setAlwaysOnVpnPackage(admin, getPackageName(), false /* lockdownEnabled */);
90 dpm.installCaCert(admin, TEST_CA.getBytes());
92 dpm.setMaximumFailedPasswordsForWipe(admin, 100);
  /external/autotest/frontend/
urls.py 5 # The next two lines enable the admin and load each admin.py file:
6 from django.contrib import admin
7 admin.autodiscover()
17 (RE_PREFIX + r'admin/', urls.include(admin.site.urls)),
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/
RedactedNotificationKeyguardDisabledFeaturesActivity.java 16 package com.android.cts.verifier.admin;
18 import android.app.admin.DevicePolicyManager;
29 * Tests for Device Admin keyguard redacted notification feature. This test is taken out from
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/sensors/helpers/
SensorDeviceAdminReceiver.java 19 import android.app.admin.DeviceAdminReceiver;
  /cts/hostsidetests/devicepolicy/app/DeviceAdmin/src/com.android.cts.deviceadmin/
ClearDeviceAdminTest.java 18 import android.app.admin.DevicePolicyManager;
22 * Remove myself as active admin.
  /cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/
RemoteBugreportTest.java 20 import android.app.admin.DevicePolicyManager;
SetPolicyActivity.java 19 import android.app.admin.DevicePolicyManager;
66 ComponentName admin = BaseDeviceOwnerTest.getWho(); local
69 dpm.addUserRestriction(admin, restrictionKey);
74 dpm.clearUserRestriction(admin, restrictionKey);
  /cts/hostsidetests/devicepolicy/app/ManagedProfile/src/com/android/cts/managedprofile/
LockNowTest.java 19 import android.app.admin.DevicePolicyManager;
PrimaryUserDeviceAdmin.java 18 import android.app.admin.DeviceAdminReceiver;
22 * A device admin class running in the primary user. Currently used by delegated cert installer
  /cts/hostsidetests/devicepolicy/app/ProfileOwner/src/com/android/cts/profileowner/
ManagementTest.java 19 import android.app.admin.DevicePolicyManager;

Completed in 534 milliseconds

12 3 4 5 6 7 8 91011>>