/external/chromium/net/data/ftp/ |
dir-listing-netware-2 | 3 d [RWCEAFMS] Admin 512 Nov 13 07:51 Driver
|
/external/chromium_org/net/data/ftp/ |
dir-listing-netware-2 | 3 d [RWCEAFMS] Admin 512 Nov 13 07:51 Driver
|
/development/scripts/app_engine_server/ |
app.yaml | 9 login: admin 17 login: admin
|
index.yaml | 10 # automatically uploaded to the admin console when you next deploy
|
/frameworks/base/core/java/android/app/admin/ |
package.html | 8 <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a>
|
DevicePolicyManager.java | 17 package android.app.admin; 55 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> 98 * Activity action: send when any policy admin changes a policy. 115 * admin is being added. 203 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. Must be 207 public boolean hasGrantedPolicy(ComponentName admin, int usesPolicy) { 210 return mService.hasGrantedPolicy(admin, usesPolicy, UserHandle.myUserId()); 289 * <p>The calling device admin must have requested 293 * @param admin Which {@link DeviceAdminReceiver} this request is associated with [all...] |
DeviceAdminInfo.java | 17 package android.app.admin; 55 * A type of policy that this device admin can use: limit the passwords 59 * <p>To control this policy, the device admin must have a "limit-password" 65 * A type of policy that this device admin can use: able to watch login 70 * <p>To control this policy, the device admin must have a "watch-login" 76 * A type of policy that this device admin can use: able to reset the 80 * <p>To control this policy, the device admin must have a "reset-password" 86 * A type of policy that this device admin can use: able to force the device 91 * <p>To control this policy, the device admin must have a "force-lock" 97 * A type of policy that this device admin can use: able to factor [all...] |
/external/chromium_org/third_party/WebKit/Tools/TestResultServer/ |
app.yaml | 27 login: admin 34 login: admin
|
/external/smack/src/org/xbill/DNS/ |
SOARecord.java | 17 private Name host, admin; field in class:SOARecord 30 * @param admin The zone administrator's address 40 SOARecord(Name name, int dclass, long ttl, Name host, Name admin, 45 this.admin = checkName("admin", admin); 56 admin = new Name(in); 67 admin = st.getName(origin); 81 sb.append(admin); 118 return admin; [all...] |
/external/chromium_org/extensions/browser/ |
admin_policy.h | 15 // blacklist, and forcelist imposed by admin policy. 23 // Returns true if the extension is allowed by the admin policy. 32 // this enforces the admin policy forcelist. 36 // this enforces the admin policy forcelist.
|
/external/libpcap/ChmodBPF/ |
ChmodBPF | 11 # This startup item will make it owned by the admin group, 12 # with permissions rw-rw----, so that anybody in the admin 20 # admin group can capture packets. 22 chgrp admin /dev/bpf*
|
/frameworks/base/docs/html/sdk/api_diff/11/changes/ |
android.app.admin.DevicePolicyManager.html | 10 android.app.admin.DevicePolicyManager 74 Class android.app.admin.<A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html" target="_top"><font size="+2"><code>DevicePolicyManager</code></font></A> 86 <A NAME="android.app.admin.DevicePolicyManager.getPasswordExpiration_added(android.content.ComponentName)"></A> 87 <nobr><code>long</code> <A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordExpiration(android.content.ComponentName)" target="_top"><code>getPasswordExpiration</code></A>(<code>ComponentName</code>)</nobr> 93 <A NAME="android.app.admin.DevicePolicyManager.getPasswordExpirationTimeout_added(android.content.ComponentName)"></A> 94 <nobr><code>long</code> <A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordExpirationTimeout(android.content.ComponentName)" target="_top"><code>getPasswordExpirationTimeout</code></A>(<code>ComponentName</code>)</nobr> 100 <A NAME="android.app.admin.DevicePolicyManager.getPasswordHistoryLength_added(android.content.ComponentName)"></A> 101 <nobr><code>int</code> <A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordHistoryLength(android.content.ComponentName)" target="_top"><code>getPasswordHistoryLength</code></A>(<code>ComponentName</code>)</nobr> 107 <A NAME="android.app.admin.DevicePolicyManager.getPasswordMinimumLetters_added(android.content.ComponentName)"></A [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
PolicySerializationTestActivity.java | 17 package com.android.cts.verifier.admin; 23 import android.app.admin.DevicePolicyManager; 155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local 157 item.applyExpectedValue(mDevicePolicyManager, admin); 245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin); 253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin); 292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) { 293 mActualValue = getDeviceManagerValue(deviceManager, admin); 297 ComponentName admin); 407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) { [all...] |
TestDeviceAdminReceiver.java | 17 package com.android.cts.verifier.admin; 19 import android.app.admin.DeviceAdminReceiver;
|
/frameworks/base/docs/html/guide/topics/admin/ |
device-admin.jd | 27 <li>{@link android.app.admin.DeviceAdminReceiver}</li> 28 <li>{@link android.app.admin.DevicePolicyManager}</li> 29 <li>{@link android.app.admin.DeviceAdminInfo}</li> 68 <p>You use the Device Administration API to write device admin applications that users 69 install on their devices. The device admin application enforces the desired 71 <li>A system administrator writes a device admin application that enforces 87 <li>The system prompts the user to enable the device admin application. How 89 <li>Once users enable the device admin application, they are subject to 93 <p>If users do not enable the device admin app, it remains on the device, but in an inactive state. Users will not be subject to its policies, and they will conversely not get any of the application's benefits—for example, they may not be able to sync data.</p> 104 <p>If a device contains multiple enabled admin applications, the strictest policy i [all...] |
/cts/apps/CtsVerifier/res/xml/ |
device_admin.xml | 16 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 25 </device-admin>
|
/cts/tests/deviceadmin/res/xml/ |
device_admin.xml | 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 26 </device-admin>
|
device_admin_2.xml | 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 23 </device-admin>
|
/development/samples/training/device-management-policy/res/xml/ |
device_admin.xml | 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android"> 21 </device-admin
|
/external/chromium/chrome/common/extensions/docs/server/ |
index.yaml | 10 # automatically uploaded to the admin console when you next deploy
|
/external/valgrind/main/massif/tests/ |
culling1.vgtest | 2 vgopts: -v -v --stats=yes --stacks=no --time-unit=B --heap-admin=16 --massif-out-file=massif.out
|
culling2.vgtest | 2 vgopts: -v -v --stats=yes --stacks=no --time-unit=B --heap-admin=16 --massif-out-file=massif.out
|
/frameworks/base/services/java/com/android/server/ |
DevicePolicyManagerService.java | 41 import android.app.admin.DeviceAdminInfo; 42 import android.app.admin.DeviceAdminReceiver; 43 import android.app.admin.DevicePolicyManager; 44 import android.app.admin.IDevicePolicyManager; 147 * Whether or not device admin feature is supported. If it isn't return defaults for all 454 Slog.w(TAG, "Unknown admin tag: " + tag); 676 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who); local 677 if (admin != null 678 && who.getPackageName().equals(admin.info.getActivityInfo().packageName) 679 && who.getClassName().equals(admin.info.getActivityInfo().name)) 691 ActiveAdmin admin = policy.mAdminMap.get(who); local 708 ActiveAdmin admin = policy.mAdminList.get(i); local 741 ActiveAdmin admin = policy.mAdminList.get(i); local 750 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1087 ActiveAdmin admin = policy.mAdminList.get(i); local 1274 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1326 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1332 ActiveAdmin admin = policy.mAdminList.get(i); local 1369 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1375 ActiveAdmin admin = policy.mAdminList.get(i); local 1412 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1418 ActiveAdmin admin = policy.mAdminList.get(i); local 1467 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1475 ActiveAdmin admin = policy.mAdminList.get(i); local 1491 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1499 ActiveAdmin admin = policy.mAdminList.get(i); local 1545 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1552 ActiveAdmin admin = policy.mAdminList.get(i); local 1585 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1592 ActiveAdmin admin = policy.mAdminList.get(i); local 1628 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1635 ActiveAdmin admin = policy.mAdminList.get(i); local 1671 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1678 ActiveAdmin admin = policy.mAdminList.get(i); local 1714 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1721 ActiveAdmin admin = policy.mAdminList.get(i); local 1757 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1764 ActiveAdmin admin = policy.mAdminList.get(i); local 1840 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1846 ActiveAdmin admin = policy.mAdminList.get(i); local 2039 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2046 ActiveAdmin admin = policy.mAdminList.get(i); local 2228 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); local 2300 ActiveAdmin admin = policy.mAdminList.get(i); local 2373 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 2647 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2655 ActiveAdmin admin = policy.mAdminList.get(i); local 2697 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2706 ActiveAdmin admin = policy.mAdminList.get(i); local [all...] |
/cts/tests/deviceadmin/ |
AndroidManifest.xml | 43 <!-- Device Admin that needs to be in the deactivated state in order 54 <!-- Helper Activity used by Device Admin activation tests --> 56 android:label="Device Admin activation test" /> 58 <!-- Broken device admin: meta-data missing --> 66 <!-- Broken device admin: filter doesn't match an Intent with action 79 <!-- Broken device admin: meta-data element doesn't point to valid 80 Device Admin configuration/description --> 90 <!-- Broken device admin: filter doesn't match Intents with action 101 <!-- Broken device admin: no intent-filter --> 111 android:targetPackage="com.android.cts.admin" [all...] |
/external/chromium/chrome/browser/importer/ |
firefox_importer_utils_win.cc | 13 // to priority. For example. One machine has multiple users. One non-admin 15 // One admin user installs Firefox 3, which causes there is a Firefox 3 entry 16 // under HKLM. So when the non-admin user log in, we should deal with Firefox 2 27 // When installing Firefox with admin account, the product keys will be
|