HomeSort by relevance Sort by last modified time
    Searched refs:admin (Results 1 - 25 of 169) sorted by null

1 2 3 4 5 6 7

  /external/chromium_org/remoting/host/installer/mac/Config/
org.chromium.chromoting.conf 11 /var/log/org.chromium.chromoting.log root:admin 660 3 1000 * J
  /cts/tests/deviceadmin/src/android/deviceadmin/cts/
CtsDeviceAdminBrokenReceiver.java 19 import android.app.admin.DeviceAdminReceiver;
CtsDeviceAdminBrokenReceiver2.java 19 import android.app.admin.DeviceAdminReceiver;
CtsDeviceAdminBrokenReceiver3.java 19 import android.app.admin.DeviceAdminReceiver;
CtsDeviceAdminBrokenReceiver4.java 19 import android.app.admin.DeviceAdminReceiver;
CtsDeviceAdminBrokenReceiver5.java 19 import android.app.admin.DeviceAdminReceiver;
CtsDeviceAdminDeactivatedReceiver.java 19 import android.app.admin.DeviceAdminReceiver;
CtsDeviceAdminReceiver.java 19 import android.app.admin.DeviceAdminReceiver;
CtsDeviceAdminReceiver2.java 19 import android.app.admin.DeviceAdminReceiver;
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/
TestDeviceAdminReceiver.java 17 package com.android.cts.verifier.admin;
19 import android.app.admin.DeviceAdminReceiver;
PolicySerializationTestActivity.java 17 package com.android.cts.verifier.admin;
23 import android.app.admin.DevicePolicyManager;
155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local
157 item.applyExpectedValue(mDevicePolicyManager, admin);
245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin);
253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin);
292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) {
293 mActualValue = getDeviceManagerValue(deviceManager, admin);
297 ComponentName admin);
407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) {
    [all...]
ScreenLockTestActivity.java 17 package com.android.cts.verifier.admin;
24 import android.app.admin.DevicePolicyManager;
  /external/libpcap/ChmodBPF/
ChmodBPF 11 # This startup item will make it owned by the admin group,
12 # with permissions rw-rw----, so that anybody in the admin
20 # admin group can capture packets.
22 chgrp admin /dev/bpf*
  /frameworks/base/core/java/android/app/admin/
DevicePolicyManager.java 17 package android.app.admin;
55 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a>
98 * Activity action: send when any policy admin changes a policy.
115 * admin is being added.
203 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. Must be
207 public boolean hasGrantedPolicy(ComponentName admin, int usesPolicy) {
210 return mService.hasGrantedPolicy(admin, usesPolicy, UserHandle.myUserId());
289 * <p>The calling device admin must have requested
293 * @param admin Which {@link DeviceAdminReceiver} this request is associated with
    [all...]
IDevicePolicyManager.aidl 18 package android.app.admin;
63 void setMaximumFailedPasswordsForWipe(in ComponentName admin, int num, int userHandle);
64 int getMaximumFailedPasswordsForWipe(in ComponentName admin, int userHandle);
75 ComponentName setGlobalProxy(in ComponentName admin, String proxySpec, String exclusionList, int userHandle);
  /external/smack/src/org/xbill/DNS/
SOARecord.java 17 private Name host, admin; field in class:SOARecord
30 * @param admin The zone administrator's address
40 SOARecord(Name name, int dclass, long ttl, Name host, Name admin,
45 this.admin = checkName("admin", admin);
56 admin = new Name(in);
67 admin = st.getName(origin);
81 sb.append(admin);
118 return admin;
    [all...]
  /frameworks/base/services/java/com/android/server/
DevicePolicyManagerService.java 41 import android.app.admin.DeviceAdminInfo;
42 import android.app.admin.DeviceAdminReceiver;
43 import android.app.admin.DevicePolicyManager;
44 import android.app.admin.IDevicePolicyManager;
147 * Whether or not device admin feature is supported. If it isn't return defaults for all
454 Slog.w(TAG, "Unknown admin tag: " + tag);
676 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who); local
677 if (admin != null
678 && who.getPackageName().equals(admin.info.getActivityInfo().packageName)
679 && who.getClassName().equals(admin.info.getActivityInfo().name))
691 ActiveAdmin admin = policy.mAdminMap.get(who); local
708 ActiveAdmin admin = policy.mAdminList.get(i); local
741 ActiveAdmin admin = policy.mAdminList.get(i); local
750 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local
1087 ActiveAdmin admin = policy.mAdminList.get(i); local
1274 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local
1326 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1332 ActiveAdmin admin = policy.mAdminList.get(i); local
1369 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1375 ActiveAdmin admin = policy.mAdminList.get(i); local
1412 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1418 ActiveAdmin admin = policy.mAdminList.get(i); local
1467 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1475 ActiveAdmin admin = policy.mAdminList.get(i); local
1491 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1499 ActiveAdmin admin = policy.mAdminList.get(i); local
1545 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1552 ActiveAdmin admin = policy.mAdminList.get(i); local
1585 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1592 ActiveAdmin admin = policy.mAdminList.get(i); local
1628 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1635 ActiveAdmin admin = policy.mAdminList.get(i); local
1671 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1678 ActiveAdmin admin = policy.mAdminList.get(i); local
1714 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1721 ActiveAdmin admin = policy.mAdminList.get(i); local
1757 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1764 ActiveAdmin admin = policy.mAdminList.get(i); local
1840 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1846 ActiveAdmin admin = policy.mAdminList.get(i); local
2039 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2046 ActiveAdmin admin = policy.mAdminList.get(i); local
2228 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); local
2300 ActiveAdmin admin = policy.mAdminList.get(i); local
2373 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
2647 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2655 ActiveAdmin admin = policy.mAdminList.get(i); local
2697 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2706 ActiveAdmin admin = policy.mAdminList.get(i); local
    [all...]
  /cts/tests/tests/admin/src/android/admin/cts/
DeviceAdminInfoTest.java 17 package android.admin.cts;
19 import android.app.admin.DeviceAdminInfo;
DeviceAdminReceiverTest.java 17 package android.admin.cts;
19 import android.app.admin.DeviceAdminReceiver;
  /development/samples/training/device-management-policy/src/com/example/training/deviceadmin/
Policy.java 20 import android.app.admin.DeviceAdminReceiver;
21 import android.app.admin.DevicePolicyManager;
  /external/chromium/chrome/browser/ui/cocoa/
install.sh 61 # somewhere under /Applications, try to make it writable by all admin users.
62 # This will allow other admin users to update the application from their own
73 # admin-writeability is not a concern. Set the entire thing to be owned by
77 # If this script is running as a user that is not a member of the admin group,
84 chgrp -Rh admin "${DEST}" >& /dev/null ; then
  /external/chromium_org/chrome/browser/mac/
install.sh 64 # somewhere under /Applications, try to make it writable by all admin users.
65 # This will allow other admin users to update the application from their own
76 # admin-writeability is not a concern. Set the entire thing to be owned by
80 # If this script is running as a user that is not a member of the admin group,
87 chgrp -Rh admin "${DEST}" >& /dev/null ; then
  /development/samples/ApiDemos/src/com/example/android/apis/app/
SoftInputModes.java 6 import android.app.admin.DevicePolicyManager;
  /external/chromium_org/tools/grit/grit/gather/
admin_template.py 22 '''Gatherer for the translateable portions of an admin template.
  /external/valgrind/main/helgrind/
hg_lock_n_thread.h 83 /* ADMIN */
84 struct _Thread* admin; member in struct:_Thread
123 /* ADMIN */

Completed in 566 milliseconds

1 2 3 4 5 6 7