/frameworks/base/core/java/android/app/admin/ |
DevicePolicyManagerInternal.java | 17 package android.app.admin; 72 * Checks if an app with given uid is an active device admin of its user and has the policy 79 * @return true if the uid is an active admin with the given policy. 84 * Creates an intent to show the admin support dialog to say that an action is disallowed by 91 * @return The intent to trigger the admin support dialog. 96 * Creates an intent to show the admin support dialog showing the admin who has set a user 101 * @return The intent to trigger the admin support dialog, or null if the user restriction is 129 * being an admin which can call {@link #resetPassword} to reset the password without knowledge
|
NetworkEvent.java | 17 package android.app.admin;
|
DnsEvent.java | 17 package android.app.admin;
|
PasswordMetrics.java | 17 package android.app.admin;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
DeviceAdminKeyguardDisabledFeaturesActivity.java | 17 package com.android.cts.verifier.admin; 19 import android.app.admin.DevicePolicyManager; 38 * Tests for Device Admin keyguard disabled features.
|
ScreenLockTestActivity.java | 17 package com.android.cts.verifier.admin; 25 import android.app.admin.DevicePolicyManager;
|
/cts/hostsidetests/devicepolicy/app/CorpOwnedManagedProfile/src/com/android/cts/comp/provisioning/ |
UserRestrictionTest.java | 19 import android.app.admin.DevicePolicyManager; 54 ComponentName admin = AdminReceiver.getComponentName(getContext()); local 56 dpm.addUserRestriction(admin, restriction); 58 dpm.clearUserRestriction(admin, restriction);
|
/packages/apps/Settings/src/com/android/settings/enterprise/ |
ActionDisabledByAdminDialog.java | 20 import android.app.admin.DevicePolicyManager; 49 final EnforcedAdmin admin = getAdminDetailsFromIntent(intent); local 51 mDialogHelper.updateDialog(restriction, admin); 56 final EnforcedAdmin admin = new EnforcedAdmin(null, UserHandle.myUserId()); local 58 return admin; 60 admin.component = intent.getParcelableExtra(DevicePolicyManager.EXTRA_DEVICE_ADMIN); 61 admin.userId = intent.getIntExtra(Intent.EXTRA_USER_ID, UserHandle.myUserId()); 62 return admin;
|
/packages/apps/Settings/src/com/android/settings/location/ |
LocationForWorkPreferenceController.java | 80 final RestrictedLockUtils.EnforcedAdmin admin = local 84 if (!isRestrictedByBase && admin != null) { 85 mPreference.setDisabledByAdmin(admin);
|
LocationSwitchBarController.java | 67 final RestrictedLockUtils.EnforcedAdmin admin = local 73 if (!hasBaseUserRestriction && admin != null) { 74 mSwitchBar.setDisabledByAdmin(admin);
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/tapjacking/ |
UsbTest.java | 17 package com.android.cts.verifier.admin.tapjacking;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/ |
CompHelperActivity.java | 20 import android.app.admin.DevicePolicyManager; 78 final ComponentName admin = CompDeviceAdminTestReceiver.getReceiverComponentName(); local 85 dpm.setAlwaysOnVpnPackage(admin, getPackageName(), false /* lockdownEnabled */); 90 dpm.installCaCert(admin, TEST_CA.getBytes()); 92 dpm.setMaximumFailedPasswordsForWipe(admin, 100);
|
/frameworks/base/core/tests/coretests/src/android/app/admin/ |
PasswordMetricsTest.java | 17 package android.app.admin;
|
/frameworks/base/packages/SettingsLib/src/com/android/settingslib/ |
RestrictedPreferenceHelper.java | 137 EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(mContext, local 139 setDisabledByAdmin(admin); 143 * Disable this preference based on the enforce admin. 145 * @param EnforcedAdmin Details of the admin who enforced the restriction. If it 149 public boolean setDisabledByAdmin(EnforcedAdmin admin) { 150 final boolean disabled = (admin != null ? true : false); 151 mEnforcedAdmin = admin;
|
/packages/apps/Settings/src/com/android/settings/ |
MasterClearConfirm.java | 149 final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced( local 154 } else if (admin != null) { 156 .prepareDialogBuilder(UserManager.DISALLOW_FACTORY_RESET, admin)
|
/packages/apps/Settings/src/com/android/settings/dashboard/conditional/ |
HotspotCondition.java | 115 final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(context, local 117 if (admin != null) { 118 RestrictedLockUtils.sendShowAdminSupportDetailsIntent(context, admin);
|
/packages/apps/Settings/src/com/android/settings/security/ |
ChangeScreenLockPreferenceController.java | 19 import android.app.admin.DevicePolicyManager; 167 * Sets the preference as disabled by admin if PASSWORD_QUALITY_MANAGED is set. 173 final RestrictedLockUtils.EnforcedAdmin admin = RestrictedLockUtils local 177 if (admin != null && dpm.getPasswordQuality(admin.component, userId) 179 mPreference.setDisabledByAdmin(admin);
|
/packages/services/Car/service/src/com/android/car/user/ |
CarUserService.java | 38 * <li> Creates a secondary admin user on first run. 92 UserInfo admin = mCarUserManagerHelper.createNewAdminUser(OWNER_NAME); local 93 mCarUserManagerHelper.switchToUser(admin);
|
/packages/services/Car/tests/carservice_unit_test/src/com/android/car/user/ |
CarUserServiceTest.java | 101 * Test that the {@link CarUserService} starts up a secondary admin user upon first run. 108 UserInfo admin = new UserInfo(adminUserId, CarUserService.OWNER_NAME, UserInfo.FLAG_ADMIN); local 112 doReturn(admin).when(mCarUserManagerHelper).createNewAdminUser(CarUserService.OWNER_NAME); 113 doReturn(true).when(mCarUserManagerHelper).switchToUser(admin); 119 verify(mCarUserManagerHelper).switchToUser(admin);
|
/cts/hostsidetests/devicepolicy/app/AccountCheck/Auth/src/com/android/cts/devicepolicy/accountcheck/ |
AccountCheckTest.java | 20 import android.app.admin.DevicePolicyManager; 103 final ComponentName admin = new ComponentName( local 107 if (mDevicePolicyManager.isDeviceOwnerApp(admin.getPackageName())) { 109 mDevicePolicyManager.clearDeviceOwnerApp(admin.getPackageName()); 112 if (mDevicePolicyManager.isProfileOwnerApp(admin.getPackageName())) { 114 mDevicePolicyManager.clearProfileOwner(admin); 117 if (mDevicePolicyManager.isAdminActive(admin)) { 119 mDevicePolicyManager.removeActiveAdmin(admin); 123 && mDevicePolicyManager.isAdminActive(admin)) {
|
/cts/hostsidetests/devicepolicy/app/CorpOwnedManagedProfile/src/com/android/cts/comp/ |
ManagementTest.java | 18 import android.app.admin.DevicePolicyManager; 92 ComponentName admin = AdminReceiver.getComponentName(mContext); local 93 assertNotNull(mDevicePolicyManager.createAndManageUser(admin, "secondary-user", 94 admin, null, DevicePolicyManager.SKIP_SETUP_WIZARD));
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
SetPolicyActivity.java | 19 import android.app.admin.DevicePolicyManager; 66 ComponentName admin = BasicAdminReceiver.getComponentName(this); local 69 dpm.addUserRestriction(admin, restrictionKey); 74 dpm.clearUserRestriction(admin, restrictionKey);
|
/cts/hostsidetests/devicepolicy/app/TransferOwnerIncomingApp/src/com/android/cts/transferowner/ |
DeviceAndProfileOwnerTransferIncomingTest.java | 22 import android.app.admin.DeviceAdminReceiver; 23 import android.app.admin.DevicePolicyManager; 77 ComponentName admin = mIncomingComponentName; local 80 Set<String> affiliationIds = dpm.getAffiliationIds(admin);
|
/development/samples/DeviceAdminWhitelistedAccount/src/com/example/android/app/admin/whitelistedaccount/ |
MyAuthenticator.java | 17 package com.example.android.app.admin.whitelistedaccount; 33 private static final String ACCOUNT_TYPE = "com.example.android.app.admin.whitelistedaccount";
|
/external/valgrind/helgrind/ |
hg_lock_n_thread.h | 83 /* ADMIN */ 84 struct _Thread* admin; member in struct:_Thread 146 /* ADMIN */
|