/external/chromium/net/data/ftp/ |
dir-listing-netware-2 | 3 d [RWCEAFMS] Admin 512 Nov 13 07:51 Driver
|
/external/chromium_org/net/data/ftp/ |
dir-listing-netware-2 | 3 d [RWCEAFMS] Admin 512 Nov 13 07:51 Driver
|
/development/scripts/app_engine_server/ |
app.yaml | 9 login: admin 17 login: admin
|
index.yaml | 10 # automatically uploaded to the admin console when you next deploy
|
/frameworks/base/core/java/android/app/admin/ |
package.html | 8 <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a>
|
DevicePolicyManager.java | 17 package android.app.admin; 55 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> 98 * Activity action: send when any policy admin changes a policy. 115 * admin is being added. 203 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. Must be 207 public boolean hasGrantedPolicy(ComponentName admin, int usesPolicy) { 210 return mService.hasGrantedPolicy(admin, usesPolicy, UserHandle.myUserId()); 289 * <p>The calling device admin must have requested 293 * @param admin Which {@link DeviceAdminReceiver} this request is associated with [all...] |
DeviceAdminInfo.java | 17 package android.app.admin; 55 * A type of policy that this device admin can use: limit the passwords 59 * <p>To control this policy, the device admin must have a "limit-password" 65 * A type of policy that this device admin can use: able to watch login 70 * <p>To control this policy, the device admin must have a "watch-login" 76 * A type of policy that this device admin can use: able to reset the 80 * <p>To control this policy, the device admin must have a "reset-password" 86 * A type of policy that this device admin can use: able to force the device 91 * <p>To control this policy, the device admin must have a "force-lock" 97 * A type of policy that this device admin can use: able to factor [all...] |
/external/chromium_org/third_party/WebKit/Tools/TestResultServer/ |
app.yaml | 27 login: admin 34 login: admin
|
/external/smack/src/org/xbill/DNS/ |
SOARecord.java | 17 private Name host, admin; field in class:SOARecord 30 * @param admin The zone administrator's address 40 SOARecord(Name name, int dclass, long ttl, Name host, Name admin, 45 this.admin = checkName("admin", admin); 56 admin = new Name(in); 67 admin = st.getName(origin); 81 sb.append(admin); 118 return admin; [all...] |
/external/chromium_org/chrome/browser/extensions/ |
admin_policy.h | 16 // blacklist, and forcelist imposed by admin policy. 25 // Returns true if the extension is allowed by the admin policy. 34 // this enforces the admin policy forcelist. 38 // this enforces the admin policy forcelist.
|
/external/libpcap/ChmodBPF/ |
ChmodBPF | 11 # This startup item will make it owned by the admin group, 12 # with permissions rw-rw----, so that anybody in the admin 20 # admin group can capture packets. 22 chgrp admin /dev/bpf*
|
/frameworks/base/docs/html/sdk/api_diff/11/changes/ |
android.app.admin.DevicePolicyManager.html | 10 android.app.admin.DevicePolicyManager 74 Class android.app.admin.<A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html" target="_top"><font size="+2"><code>DevicePolicyManager</code></font></A> 86 <A NAME="android.app.admin.DevicePolicyManager.getPasswordExpiration_added(android.content.ComponentName)"></A> 87 <nobr><code>long</code> <A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordExpiration(android.content.ComponentName)" target="_top"><code>getPasswordExpiration</code></A>(<code>ComponentName</code>)</nobr> 93 <A NAME="android.app.admin.DevicePolicyManager.getPasswordExpirationTimeout_added(android.content.ComponentName)"></A> 94 <nobr><code>long</code> <A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordExpirationTimeout(android.content.ComponentName)" target="_top"><code>getPasswordExpirationTimeout</code></A>(<code>ComponentName</code>)</nobr> 100 <A NAME="android.app.admin.DevicePolicyManager.getPasswordHistoryLength_added(android.content.ComponentName)"></A> 101 <nobr><code>int</code> <A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordHistoryLength(android.content.ComponentName)" target="_top"><code>getPasswordHistoryLength</code></A>(<code>ComponentName</code>)</nobr> 107 <A NAME="android.app.admin.DevicePolicyManager.getPasswordMinimumLetters_added(android.content.ComponentName)"></A [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
PolicySerializationTestActivity.java | 17 package com.android.cts.verifier.admin; 23 import android.app.admin.DevicePolicyManager; 155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local 157 item.applyExpectedValue(mDevicePolicyManager, admin); 245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin); 253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin); 292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) { 293 mActualValue = getDeviceManagerValue(deviceManager, admin); 297 ComponentName admin); 407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) { [all...] |
TestDeviceAdminReceiver.java | 17 package com.android.cts.verifier.admin; 19 import android.app.admin.DeviceAdminReceiver;
|
/frameworks/base/docs/html/guide/topics/admin/ |
device-admin.jd | 27 <li>{@link android.app.admin.DeviceAdminReceiver}</li> 28 <li>{@link android.app.admin.DevicePolicyManager}</li> 29 <li>{@link android.app.admin.DeviceAdminInfo}</li> 68 <p>You use the Device Administration API to write device admin applications that users 69 install on their devices. The device admin application enforces the desired 71 <li>A system administrator writes a device admin application that enforces 87 <li>The system prompts the user to enable the device admin application. How 89 <li>Once users enable the device admin application, they are subject to 93 <p>If users do not enable the device admin app, it remains on the device, but in an inactive state. Users will not be subject to its policies, and they will conversely not get any of the application's benefits—for example, they may not be able to sync data.</p> 104 <p>If a device contains multiple enabled admin applications, the strictest policy i [all...] |
/cts/apps/CtsVerifier/res/xml/ |
device_admin.xml | 16 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 25 </device-admin>
|
/cts/tests/deviceadmin/res/xml/ |
device_admin.xml | 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 26 </device-admin>
|
device_admin_2.xml | 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 23 </device-admin>
|
/development/samples/training/device-management-policy/res/xml/ |
device_admin.xml | 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 21 </device-admin
|
/external/chromium/chrome/common/extensions/docs/server/ |
index.yaml | 10 # automatically uploaded to the admin console when you next deploy
|
/external/valgrind/main/massif/tests/ |
culling1.vgtest | 2 vgopts: -v -v --stats=yes --stacks=no --time-unit=B --heap-admin=16 --massif-out-file=massif.out
|
culling2.vgtest | 2 vgopts: -v -v --stats=yes --stacks=no --time-unit=B --heap-admin=16 --massif-out-file=massif.out
|
/frameworks/base/services/java/com/android/server/ |
DevicePolicyManagerService.java | 41 import android.app.admin.DeviceAdminInfo; 42 import android.app.admin.DeviceAdminReceiver; 43 import android.app.admin.DevicePolicyManager; 44 import android.app.admin.IDevicePolicyManager; 146 * Whether or not device admin feature is supported. If it isn't return defaults for all 453 Slog.w(TAG, "Unknown admin tag: " + tag); 674 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who); local 675 if (admin != null 676 && who.getPackageName().equals(admin.info.getActivityInfo().packageName) 677 && who.getClassName().equals(admin.info.getActivityInfo().name)) 689 ActiveAdmin admin = policy.mAdminMap.get(who); local 706 ActiveAdmin admin = policy.mAdminList.get(i); local 739 ActiveAdmin admin = policy.mAdminList.get(i); local 748 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1085 ActiveAdmin admin = policy.mAdminList.get(i); local 1272 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1324 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1330 ActiveAdmin admin = policy.mAdminList.get(i); local 1367 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1373 ActiveAdmin admin = policy.mAdminList.get(i); local 1410 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1416 ActiveAdmin admin = policy.mAdminList.get(i); local 1465 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1473 ActiveAdmin admin = policy.mAdminList.get(i); local 1489 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1497 ActiveAdmin admin = policy.mAdminList.get(i); local 1543 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1550 ActiveAdmin admin = policy.mAdminList.get(i); local 1583 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1590 ActiveAdmin admin = policy.mAdminList.get(i); local 1626 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1633 ActiveAdmin admin = policy.mAdminList.get(i); local 1669 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1676 ActiveAdmin admin = policy.mAdminList.get(i); local 1712 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1719 ActiveAdmin admin = policy.mAdminList.get(i); local 1755 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1762 ActiveAdmin admin = policy.mAdminList.get(i); local 1838 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1844 ActiveAdmin admin = policy.mAdminList.get(i); local 2037 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2044 ActiveAdmin admin = policy.mAdminList.get(i); local 2226 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); local 2298 ActiveAdmin admin = policy.mAdminList.get(i); local 2371 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 2639 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2647 ActiveAdmin admin = policy.mAdminList.get(i); local 2689 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2698 ActiveAdmin admin = policy.mAdminList.get(i); local [all...] |
/cts/tests/deviceadmin/ |
AndroidManifest.xml | 43 <!-- Device Admin that needs to be in the deactivated state in order 54 <!-- Helper Activity used by Device Admin activation tests --> 56 android:label="Device Admin activation test" /> 58 <!-- Broken device admin: meta-data missing --> 66 <!-- Broken device admin: filter doesn't match an Intent with action 79 <!-- Broken device admin: meta-data element doesn't point to valid 80 Device Admin configuration/description --> 90 <!-- Broken device admin: filter doesn't match Intents with action 101 <!-- Broken device admin: no intent-filter --> 111 android:targetPackage="com.android.cts.admin" [all...] |
/external/chromium/chrome/browser/importer/ |
firefox_importer_utils_win.cc | 13 // to priority. For example. One machine has multiple users. One non-admin 15 // One admin user installs Firefox 3, which causes there is a Firefox 3 entry 16 // under HKLM. So when the non-admin user log in, we should deal with Firefox 2 27 // When installing Firefox with admin account, the product keys will be
|