HomeSort by relevance Sort by last modified time
    Searched full:admin (Results 1 - 25 of 641) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium/net/data/ftp/
dir-listing-netware-2 3 d [RWCEAFMS] Admin 512 Nov 13 07:51 Driver
  /external/chromium_org/net/data/ftp/
dir-listing-netware-2 3 d [RWCEAFMS] Admin 512 Nov 13 07:51 Driver
  /development/scripts/app_engine_server/
app.yaml 9 login: admin
17 login: admin
index.yaml 10 # automatically uploaded to the admin console when you next deploy
  /frameworks/base/core/java/android/app/admin/
package.html 8 <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a>
DevicePolicyManager.java 17 package android.app.admin;
55 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a>
98 * Activity action: send when any policy admin changes a policy.
115 * admin is being added.
203 * @param admin Which {@link DeviceAdminReceiver} this request is associated with. Must be
207 public boolean hasGrantedPolicy(ComponentName admin, int usesPolicy) {
210 return mService.hasGrantedPolicy(admin, usesPolicy, UserHandle.myUserId());
289 * <p>The calling device admin must have requested
293 * @param admin Which {@link DeviceAdminReceiver} this request is associated with
    [all...]
DeviceAdminInfo.java 17 package android.app.admin;
55 * A type of policy that this device admin can use: limit the passwords
59 * <p>To control this policy, the device admin must have a "limit-password"
65 * A type of policy that this device admin can use: able to watch login
70 * <p>To control this policy, the device admin must have a "watch-login"
76 * A type of policy that this device admin can use: able to reset the
80 * <p>To control this policy, the device admin must have a "reset-password"
86 * A type of policy that this device admin can use: able to force the device
91 * <p>To control this policy, the device admin must have a "force-lock"
97 * A type of policy that this device admin can use: able to factor
    [all...]
  /external/chromium_org/third_party/WebKit/Tools/TestResultServer/
app.yaml 27 login: admin
34 login: admin
  /external/smack/src/org/xbill/DNS/
SOARecord.java 17 private Name host, admin; field in class:SOARecord
30 * @param admin The zone administrator's address
40 SOARecord(Name name, int dclass, long ttl, Name host, Name admin,
45 this.admin = checkName("admin", admin);
56 admin = new Name(in);
67 admin = st.getName(origin);
81 sb.append(admin);
118 return admin;
    [all...]
  /external/chromium_org/extensions/browser/
admin_policy.h 15 // blacklist, and forcelist imposed by admin policy.
23 // Returns true if the extension is allowed by the admin policy.
32 // this enforces the admin policy forcelist.
36 // this enforces the admin policy forcelist.
  /external/libpcap/ChmodBPF/
ChmodBPF 11 # This startup item will make it owned by the admin group,
12 # with permissions rw-rw----, so that anybody in the admin
20 # admin group can capture packets.
22 chgrp admin /dev/bpf*
  /frameworks/base/docs/html/sdk/api_diff/11/changes/
android.app.admin.DevicePolicyManager.html 10 android.app.admin.DevicePolicyManager
74 Class android.app.admin.<A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html" target="_top"><font size="+2"><code>DevicePolicyManager</code></font></A>
86 <A NAME="android.app.admin.DevicePolicyManager.getPasswordExpiration_added(android.content.ComponentName)"></A>
87 <nobr><code>long</code>&nbsp;<A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordExpiration(android.content.ComponentName)" target="_top"><code>getPasswordExpiration</code></A>(<code>ComponentName</code>)</nobr>
93 <A NAME="android.app.admin.DevicePolicyManager.getPasswordExpirationTimeout_added(android.content.ComponentName)"></A>
94 <nobr><code>long</code>&nbsp;<A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordExpirationTimeout(android.content.ComponentName)" target="_top"><code>getPasswordExpirationTimeout</code></A>(<code>ComponentName</code>)</nobr>
100 <A NAME="android.app.admin.DevicePolicyManager.getPasswordHistoryLength_added(android.content.ComponentName)"></A>
101 <nobr><code>int</code>&nbsp;<A HREF="../../../../reference/android/app/admin/DevicePolicyManager.html#getPasswordHistoryLength(android.content.ComponentName)" target="_top"><code>getPasswordHistoryLength</code></A>(<code>ComponentName</code>)</nobr>
107 <A NAME="android.app.admin.DevicePolicyManager.getPasswordMinimumLetters_added(android.content.ComponentName)"></A
    [all...]
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/
PolicySerializationTestActivity.java 17 package com.android.cts.verifier.admin;
23 import android.app.admin.DevicePolicyManager;
155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local
157 item.applyExpectedValue(mDevicePolicyManager, admin);
245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin);
253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin);
292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) {
293 mActualValue = getDeviceManagerValue(deviceManager, admin);
297 ComponentName admin);
407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) {
    [all...]
TestDeviceAdminReceiver.java 17 package com.android.cts.verifier.admin;
19 import android.app.admin.DeviceAdminReceiver;
  /frameworks/base/docs/html/guide/topics/admin/
device-admin.jd 27 <li>{@link android.app.admin.DeviceAdminReceiver}</li>
28 <li>{@link android.app.admin.DevicePolicyManager}</li>
29 <li>{@link android.app.admin.DeviceAdminInfo}</li>
68 <p>You use the Device Administration API to write device admin applications that users
69 install on their devices. The device admin application enforces the desired
71 <li>A system administrator writes a device admin application that enforces
87 <li>The system prompts the user to enable the device admin application. How
89 <li>Once users enable the device admin application, they are subject to
93 <p>If users do not enable the device admin app, it remains on the device, but in an inactive state. Users will not be subject to its policies, and they will conversely not get any of the application's benefits&mdash;for example, they may not be able to sync data.</p>
104 <p>If a device contains multiple enabled admin applications, the strictest policy i
    [all...]
  /cts/apps/CtsVerifier/res/xml/
device_admin.xml 16 <device-admin xmlns:android="http://schemas.android.com/apk/res/android">
25 </device-admin>
  /cts/tests/deviceadmin/res/xml/
device_admin.xml 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android">
26 </device-admin>
device_admin_2.xml 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android">
23 </device-admin>
  /development/samples/training/device-management-policy/res/xml/
device_admin.xml 17 <device-admin xmlns:android="http://schemas.android.com/apk/res/android">
21 </device-admin
  /external/chromium/chrome/common/extensions/docs/server/
index.yaml 10 # automatically uploaded to the admin console when you next deploy
  /external/valgrind/main/massif/tests/
culling1.vgtest 2 vgopts: -v -v --stats=yes --stacks=no --time-unit=B --heap-admin=16 --massif-out-file=massif.out
culling2.vgtest 2 vgopts: -v -v --stats=yes --stacks=no --time-unit=B --heap-admin=16 --massif-out-file=massif.out
  /frameworks/base/services/java/com/android/server/
DevicePolicyManagerService.java 41 import android.app.admin.DeviceAdminInfo;
42 import android.app.admin.DeviceAdminReceiver;
43 import android.app.admin.DevicePolicyManager;
44 import android.app.admin.IDevicePolicyManager;
147 * Whether or not device admin feature is supported. If it isn't return defaults for all
454 Slog.w(TAG, "Unknown admin tag: " + tag);
676 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who); local
677 if (admin != null
678 && who.getPackageName().equals(admin.info.getActivityInfo().packageName)
679 && who.getClassName().equals(admin.info.getActivityInfo().name))
691 ActiveAdmin admin = policy.mAdminMap.get(who); local
708 ActiveAdmin admin = policy.mAdminList.get(i); local
741 ActiveAdmin admin = policy.mAdminList.get(i); local
750 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local
1087 ActiveAdmin admin = policy.mAdminList.get(i); local
1274 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local
1326 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1332 ActiveAdmin admin = policy.mAdminList.get(i); local
1369 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1375 ActiveAdmin admin = policy.mAdminList.get(i); local
1412 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1418 ActiveAdmin admin = policy.mAdminList.get(i); local
1467 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1475 ActiveAdmin admin = policy.mAdminList.get(i); local
1491 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1499 ActiveAdmin admin = policy.mAdminList.get(i); local
1545 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1552 ActiveAdmin admin = policy.mAdminList.get(i); local
1585 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1592 ActiveAdmin admin = policy.mAdminList.get(i); local
1628 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1635 ActiveAdmin admin = policy.mAdminList.get(i); local
1671 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1678 ActiveAdmin admin = policy.mAdminList.get(i); local
1714 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1721 ActiveAdmin admin = policy.mAdminList.get(i); local
1757 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1764 ActiveAdmin admin = policy.mAdminList.get(i); local
1840 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
1846 ActiveAdmin admin = policy.mAdminList.get(i); local
2039 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2046 ActiveAdmin admin = policy.mAdminList.get(i); local
2228 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); local
2300 ActiveAdmin admin = policy.mAdminList.get(i); local
2373 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local
2647 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2655 ActiveAdmin admin = policy.mAdminList.get(i); local
2697 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local
2706 ActiveAdmin admin = policy.mAdminList.get(i); local
    [all...]
  /cts/tests/deviceadmin/
AndroidManifest.xml 43 <!-- Device Admin that needs to be in the deactivated state in order
54 <!-- Helper Activity used by Device Admin activation tests -->
56 android:label="Device Admin activation test" />
58 <!-- Broken device admin: meta-data missing -->
66 <!-- Broken device admin: filter doesn't match an Intent with action
79 <!-- Broken device admin: meta-data element doesn't point to valid
80 Device Admin configuration/description -->
90 <!-- Broken device admin: filter doesn't match Intents with action
101 <!-- Broken device admin: no intent-filter -->
111 android:targetPackage="com.android.cts.admin"
    [all...]
  /external/chromium/chrome/browser/importer/
firefox_importer_utils_win.cc 13 // to priority. For example. One machine has multiple users. One non-admin
15 // One admin user installs Firefox 3, which causes there is a Firefox 3 entry
16 // under HKLM. So when the non-admin user log in, we should deal with Firefox 2
27 // When installing Firefox with admin account, the product keys will be

Completed in 2037 milliseconds

1 2 3 4 5 6 7 8 91011>>