/external/chromium_org/remoting/host/installer/mac/Config/ |
org.chromium.chromoting.conf | 11 /var/log/org.chromium.chromoting.log root:admin 660 3 1000 * J
|
/cts/tests/deviceadmin/src/android/deviceadmin/cts/ |
CtsDeviceAdminBrokenReceiver.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver2.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver3.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver4.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver5.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminDeactivatedReceiver.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminReceiver.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminReceiver2.java | 19 import android.app.admin.DeviceAdminReceiver;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
TestDeviceAdminReceiver.java | 17 package com.android.cts.verifier.admin; 19 import android.app.admin.DeviceAdminReceiver;
|
PolicySerializationTestActivity.java | 17 package com.android.cts.verifier.admin; 23 import android.app.admin.DevicePolicyManager; 155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local 157 item.applyExpectedValue(mDevicePolicyManager, admin); 245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin); 253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin); 292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) { 293 mActualValue = getDeviceManagerValue(deviceManager, admin); 297 ComponentName admin); 407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) { [all...] |
ScreenLockTestActivity.java | 17 package com.android.cts.verifier.admin; 24 import android.app.admin.DevicePolicyManager;
|
/external/libpcap/ChmodBPF/ |
ChmodBPF | 11 # This startup item will make it owned by the admin group, 12 # with permissions rw-rw----, so that anybody in the admin 20 # admin group can capture packets. 22 chgrp admin /dev/bpf*
|
/frameworks/base/core/java/android/app/admin/ |
DevicePolicyManager.java | 17 package android.app.admin; 55 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> 98 * Activity action: send when any policy admin changes a policy. 115 * admin is being added. 203 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. Must be 207 public boolean hasGrantedPolicy(ComponentName admin, int usesPolicy) { 210 return mService.hasGrantedPolicy(admin, usesPolicy, UserHandle.myUserId()); 289 * <p>The calling device admin must have requested 293 * @param admin Which {@link DeviceAdminReceiver} this request is associated with [all...] |
IDevicePolicyManager.aidl | 18 package android.app.admin; 63 void setMaximumFailedPasswordsForWipe(in ComponentName admin, int num, int userHandle); 64 int getMaximumFailedPasswordsForWipe(in ComponentName admin, int userHandle); 75 ComponentName setGlobalProxy(in ComponentName admin, String proxySpec, String exclusionList, int userHandle);
|
/external/smack/src/org/xbill/DNS/ |
SOARecord.java | 17 private Name host, admin; field in class:SOARecord 30 * @param admin The zone administrator's address 40 SOARecord(Name name, int dclass, long ttl, Name host, Name admin, 45 this.admin = checkName("admin", admin); 56 admin = new Name(in); 67 admin = st.getName(origin); 81 sb.append(admin); 118 return admin; [all...] |
/frameworks/base/services/java/com/android/server/ |
DevicePolicyManagerService.java | 41 import android.app.admin.DeviceAdminInfo; 42 import android.app.admin.DeviceAdminReceiver; 43 import android.app.admin.DevicePolicyManager; 44 import android.app.admin.IDevicePolicyManager; 147 * Whether or not device admin feature is supported. If it isn't return defaults for all 454 Slog.w(TAG, "Unknown admin tag: " + tag); 676 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who); local 677 if (admin != null 678 && who.getPackageName().equals(admin.info.getActivityInfo().packageName) 679 && who.getClassName().equals(admin.info.getActivityInfo().name)) 691 ActiveAdmin admin = policy.mAdminMap.get(who); local 708 ActiveAdmin admin = policy.mAdminList.get(i); local 741 ActiveAdmin admin = policy.mAdminList.get(i); local 750 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1087 ActiveAdmin admin = policy.mAdminList.get(i); local 1274 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1326 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1332 ActiveAdmin admin = policy.mAdminList.get(i); local 1369 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1375 ActiveAdmin admin = policy.mAdminList.get(i); local 1412 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1418 ActiveAdmin admin = policy.mAdminList.get(i); local 1467 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1475 ActiveAdmin admin = policy.mAdminList.get(i); local 1491 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1499 ActiveAdmin admin = policy.mAdminList.get(i); local 1545 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1552 ActiveAdmin admin = policy.mAdminList.get(i); local 1585 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1592 ActiveAdmin admin = policy.mAdminList.get(i); local 1628 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1635 ActiveAdmin admin = policy.mAdminList.get(i); local 1671 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1678 ActiveAdmin admin = policy.mAdminList.get(i); local 1714 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1721 ActiveAdmin admin = policy.mAdminList.get(i); local 1757 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1764 ActiveAdmin admin = policy.mAdminList.get(i); local 1840 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1846 ActiveAdmin admin = policy.mAdminList.get(i); local 2039 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2046 ActiveAdmin admin = policy.mAdminList.get(i); local 2228 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); local 2300 ActiveAdmin admin = policy.mAdminList.get(i); local 2373 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 2647 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2655 ActiveAdmin admin = policy.mAdminList.get(i); local 2697 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2706 ActiveAdmin admin = policy.mAdminList.get(i); local [all...] |
/cts/tests/tests/admin/src/android/admin/cts/ |
DeviceAdminInfoTest.java | 17 package android.admin.cts; 19 import android.app.admin.DeviceAdminInfo;
|
DeviceAdminReceiverTest.java | 17 package android.admin.cts; 19 import android.app.admin.DeviceAdminReceiver;
|
/development/samples/training/device-management-policy/src/com/example/training/deviceadmin/ |
Policy.java | 20 import android.app.admin.DeviceAdminReceiver; 21 import android.app.admin.DevicePolicyManager;
|
/external/chromium/chrome/browser/ui/cocoa/ |
install.sh | 61 # somewhere under /Applications, try to make it writable by all admin users. 62 # This will allow other admin users to update the application from their own 73 # admin-writeability is not a concern. Set the entire thing to be owned by 77 # If this script is running as a user that is not a member of the admin group, 84 chgrp -Rh admin "${DEST}" >& /dev/null ; then
|
/external/chromium_org/chrome/browser/mac/ |
install.sh | 64 # somewhere under /Applications, try to make it writable by all admin users. 65 # This will allow other admin users to update the application from their own 76 # admin-writeability is not a concern. Set the entire thing to be owned by 80 # If this script is running as a user that is not a member of the admin group, 87 chgrp -Rh admin "${DEST}" >& /dev/null ; then
|
/development/samples/ApiDemos/src/com/example/android/apis/app/ |
SoftInputModes.java | 6 import android.app.admin.DevicePolicyManager;
|
/external/chromium_org/tools/grit/grit/gather/ |
admin_template.py | 22 '''Gatherer for the translateable portions of an admin template.
|
/external/valgrind/main/helgrind/ |
hg_lock_n_thread.h | 83 /* ADMIN */ 84 struct _Thread* admin; member in struct:_Thread 123 /* ADMIN */
|