HomeSort by relevance Sort by last modified time
    Searched full:admin (Results 1 - 25 of 634) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium/net/data/ftp/
dir-listing-netware-2 3 d [RWCEAFMS] Admin 512 Nov 13 07:51 Driver
  /external/chromium_org/net/data/ftp/
dir-listing-netware-2 3 d [RWCEAFMS] Admin 512 Nov 13 07:51 Driver
  /development/scripts/app_engine_server/
app.yaml 9 login: admin
17 login: admin
index.yaml 10 # automatically uploaded to the admin console when you next deploy
  /frameworks/base/core/java/android/app/admin/
package.html 8 <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a>
DevicePolicyManager.java 17 package android.app.admin;
55 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a>
98 * Activity action: send when any policy admin changes a policy.
115 * admin is being added.
203 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. Must be
207 public boolean hasGrantedPolicy(ComponentName admin, int usesPolicy) {
210 return mService.hasGrantedPolicy(admin, usesPolicy, UserHandle.myUserId());
289 * <p>The calling device admin must have requested
293 * @param admin Which {@link DeviceAdminReceiver} this request is associated with
    [all...]
DeviceAdminInfo.java 17 package android.app.admin;
55 * A type of policy that this device admin can use: limit the passwords
59 * <p>To control this policy, the device admin must have a "limit-password"
65 * A type of policy that this device admin can use: able to watch login
70 * <p>To control this policy, the device admin must have a "watch-login"
76 * A type of policy that this device admin can use: able to reset the
80 * <p>To control this policy, the device admin must have a "reset-password"
86 * A type of policy that this device admin can use: able to force the device
91 * <p>To control this policy, the device admin must have a "force-lock"
97 * A type of policy that this device admin can use: able to factor
    [all...]
  /external/chromium_org/third_party/WebKit/Tools/TestResultServer/
app.yaml 27 login: admin
34 login: admin
  /external/smack/src/org/xbill/DNS/
SOARecord.java 17 private Name host, admin; field in class:SOARecord
30 * @param admin The zone administrator's address
40 SOARecord(Name name, int dclass, long ttl, Name host, Name admin,
45 this.admin = checkName("admin", admin);
56 admin = new Name(in);
67 admin = st.getName(origin);
81 sb.append(admin);
118 return admin;
    [all...]
  /external/chromium_org/chrome/browser/extensions/
admin_policy.h 16 // blacklist, and forcelist imposed by admin policy.
25 // Returns true if the extension is allowed by the admin policy.
34 // this enforces the admin policy forcelist.
38 // this enforces the admin policy forcelist.
  /external/libpcap/ChmodBPF/
ChmodBPF 11 # This startup item will make it owned by the admin group,
12 # with permissions rw-rw----, so that anybody in the admin
20 # admin group can capture packets.
22 chgrp admin /dev/bpf*
  /frameworks/base/docs/html/sdk/api_diff/11/changes/
android.app.admin.DevicePolicyManager.html 10 android.app.admin.DevicePolicyManager
74 Class android.app.admin.<A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html" target="_top"><font size="+2"><code>DevicePolicyManager</code></font></A>
86 <A NAME="android.app.admin.DevicePolicyManager.getPasswordExpiration_added(android.content.ComponentName)"></A>
87 <nobr><code>long</code>&nbsp;<A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordExpiration(android.content.ComponentName)" target="_top"><code>getPasswordExpiration</code></A>(<code>ComponentName</code>)</nobr>
93 <A NAME="android.app.admin.DevicePolicyManager.getPasswordExpirationTimeout_added(android.content.ComponentName)"></A>
94 <nobr><code>long</code>&nbsp;<A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordExpirationTimeout(android.content.ComponentName)" target="_top"><code>getPasswordExpirationTimeout</code></A>(<code>ComponentName</code>)</nobr>
100 <A NAME="android.app.admin.DevicePolicyManager.getPasswordHistoryLength_added(android.content.ComponentName)"></A>
101 <nobr><code>int</code>&nbsp;<A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordHistoryLength(android.content.ComponentName)" target="_top"><code>getPasswordHistoryLength</code></A>(<code>ComponentName</code>)</nobr>
107 <A NAME="android.app.admin.DevicePolicyManager.getPasswordMinimumLetters_added(android.content.ComponentName)"></A
    [all...]
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/
PolicySerializationTestActivity.java 17 package com.android.cts.verifier.admin;
23 import android.app.admin.DevicePolicyManager;
155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local
157 item.applyExpectedValue(mDevicePolicyManager, admin);
245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin);
253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin);
292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) {
293 mActualValue = getDeviceManagerValue(deviceManager, admin);
297 ComponentName admin);
407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) {
    [all...]
TestDeviceAdminReceiver.java 17 package com.android.cts.verifier.admin;
19 import android.app.admin.DeviceAdminReceiver;
  /frameworks/base/docs/html/guide/topics/admin/
device-admin.jd 27 <li>{@link android.app.admin.DeviceAdminReceiver}</li>
28 <li>{@link android.app.admin.DevicePolicyManager}</li>
29 <li>{@link android.app.admin.DeviceAdminInfo}</li>
68 <p>You use the Device Administration API to write device admin applications that users
69 install on their devices. The device admin application enforces the desired
71 <li>A system administrator writes a device admin application that enforces
87 <li>The system prompts the user to enable the device admin application. How
89 <li>Once users enable the device admin application, they are subject to
93 <p>If users do not enable the device admin app, it remains on the device, but in an inactive state. Users will not be subject to its policies, and they will conversely not get any of the application's benefits&mdash;for example, they may not be able to sync data.</p>
104 <p>If a device contains multiple enabled admin applications, the strictest policy i
    [all...]
  /cts/apps/CtsVerifier/res/xml/
device_admin.xml 16 <device-admin xmlns:android="http://schemas.android.com/apk/res/android">
25 </device-admin>
  /cts/tests/deviceadmin/res/xml/
device_admin.xml 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android">
26 </device-admin>
device_admin_2.xml 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android">
23 </device-admin>
  /development/samples/training/device-management-policy/res/xml/
device_admin.xml 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android">
21 </device-admin
  /external/chromium/chrome/common/extensions/docs/server/
index.yaml 10 # automatically uploaded to the admin console when you next deploy
  /external/valgrind/main/massif/tests/
culling1.vgtest 2 vgopts: -v -v --stats=yes --stacks=no --time-unit=B --heap-admin=16 --massif-out-file=massif.out
culling2.vgtest 2 vgopts: -v -v --stats=yes --stacks=no --time-unit=B --heap-admin=16 --massif-out-file=massif.out
  /frameworks/base/services/java/com/android/server/
DevicePolicyManagerService.java 41 import android.app.admin.DeviceAdminInfo;
42 import android.app.admin.DeviceAdminReceiver;
43 import android.app.admin.DevicePolicyManager;
44 import android.app.admin.IDevicePolicyManager;
146 * Whether or not device admin feature is supported. If it isn't return defaults for all
453 Slog.w(TAG, "Unknown admin tag: " + tag);
674 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who); local
675 if (admin != null
676 && who.getPackageName().equals(admin.info.getActivityInfo().packageName)
677 && who.getClassName().equals(admin.info.getActivityInfo().name))
689 ActiveAdmin admin = policy.mAdminMap.get(who); local
706 ActiveAdmin admin = policy.mAdminList.get(i); local
739 ActiveAdmin admin = policy.mAdminList.get(i); local
748 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local
1085 ActiveAdmin admin = policy.mAdminList.get(i); local
1272 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local
1324 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1330 ActiveAdmin admin = policy.mAdminList.get(i); local
1367 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1373 ActiveAdmin admin = policy.mAdminList.get(i); local
1410 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1416 ActiveAdmin admin = policy.mAdminList.get(i); local
1465 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1473 ActiveAdmin admin = policy.mAdminList.get(i); local
1489 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1497 ActiveAdmin admin = policy.mAdminList.get(i); local
1543 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1550 ActiveAdmin admin = policy.mAdminList.get(i); local
1583 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1590 ActiveAdmin admin = policy.mAdminList.get(i); local
1626 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1633 ActiveAdmin admin = policy.mAdminList.get(i); local
1669 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1676 ActiveAdmin admin = policy.mAdminList.get(i); local
1712 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1719 ActiveAdmin admin = policy.mAdminList.get(i); local
1755 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1762 ActiveAdmin admin = policy.mAdminList.get(i); local
1838 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1844 ActiveAdmin admin = policy.mAdminList.get(i); local
2037 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2044 ActiveAdmin admin = policy.mAdminList.get(i); local
2226 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); local
2298 ActiveAdmin admin = policy.mAdminList.get(i); local
2371 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
2639 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2647 ActiveAdmin admin = policy.mAdminList.get(i); local
2689 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2698 ActiveAdmin admin = policy.mAdminList.get(i); local
    [all...]
  /cts/tests/deviceadmin/
AndroidManifest.xml 43 <!-- Device Admin that needs to be in the deactivated state in order
54 <!-- Helper Activity used by Device Admin activation tests -->
56 android:label="Device Admin activation test" />
58 <!-- Broken device admin: meta-data missing -->
66 <!-- Broken device admin: filter doesn't match an Intent with action
79 <!-- Broken device admin: meta-data element doesn't point to valid
80 Device Admin configuration/description -->
90 <!-- Broken device admin: filter doesn't match Intents with action
101 <!-- Broken device admin: no intent-filter -->
111 android:targetPackage="com.android.cts.admin"
    [all...]
  /external/chromium/chrome/browser/importer/
firefox_importer_utils_win.cc 13 // to priority. For example. One machine has multiple users. One non-admin
15 // One admin user installs Firefox 3, which causes there is a Firefox 3 entry
16 // under HKLM. So when the non-admin user log in, we should deal with Firefox 2
27 // When installing Firefox with admin account, the product keys will be

Completed in 710 milliseconds

1 2 3 4 5 6 7 8 91011>>