/external/chromium_org/remoting/host/installer/mac/Config/ |
org.chromium.chromoting.conf | 11 /var/log/org.chromium.chromoting.log root:admin 660 3 1000 * J
|
/external/libpcap/ |
chmod_bpf | 7 # This startup item will make it owned by the admin group, 8 # with permissions rw-rw----, so that anybody in the admin 16 # admin group can capture packets. 18 chgrp admin /dev/bpf*
|
/cts/tests/deviceadmin/src/android/deviceadmin/cts/ |
CtsDeviceAdminBrokenReceiver.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver2.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver3.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver4.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminBrokenReceiver5.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminDeactivatedReceiver.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminReceiver.java | 19 import android.app.admin.DeviceAdminReceiver;
|
CtsDeviceAdminReceiver2.java | 19 import android.app.admin.DeviceAdminReceiver;
|
/frameworks/base/core/java/android/app/admin/ |
DevicePolicyManager.java | 17 package android.app.admin; 23 import android.app.admin.IDevicePolicyManager; 70 * <a href="{@docRoot}guide/topics/admin/device-admin.html">Device Administration</a> 273 * A String extra holding a url that specifies the download location of the device admin 274 * package. When not provided it is assumed that the device admin package is already installed. 307 * <p>During device owner provisioning a device admin app is set as the owner of the device. 375 * <p>The ComponentName of the profile owner admin is pass in {@link #EXTRA_DEVICE_ADMIN} extra 376 * field. This will invoke a UI to bring the user through adding the profile owner admin 381 * be {@link Activity#RESULT_OK} and the component will be set as an active admin as wel [all...] |
DevicePolicyManagerInternal.java | 17 package android.app.admin;
|
IDevicePolicyManager.aidl | 18 package android.app.admin; 69 void setMaximumFailedPasswordsForWipe(in ComponentName admin, int num, int userHandle); 70 int getMaximumFailedPasswordsForWipe(in ComponentName admin, int userHandle); 81 ComponentName setGlobalProxy(in ComponentName admin, String proxySpec, String exclusionList, int userHandle); 83 void setRecommendedGlobalProxy(in ComponentName admin, in ProxyInfo proxyInfo); 125 boolean installCaCert(in ComponentName admin, in byte[] certBuffer); 126 void uninstallCaCert(in ComponentName admin, in String alias); 127 void enforceCanManageCaCerts(in ComponentName admin); 131 void addPersistentPreferredActivity(in ComponentName admin, in IntentFilter filter, in ComponentName activity); 132 void clearPackagePersistentPreferredActivities(in ComponentName admin, String packageName) [all...] |
/cts/apps/CtsVerifier/src/com/android/cts/verifier/admin/ |
TestDeviceAdminReceiver.java | 17 package com.android.cts.verifier.admin; 19 import android.app.admin.DeviceAdminReceiver;
|
PolicySerializationTestActivity.java | 17 package com.android.cts.verifier.admin; 23 import android.app.admin.DevicePolicyManager; 155 ComponentName admin = TestDeviceAdminReceiver.getComponent(this); local 157 item.applyExpectedValue(mDevicePolicyManager, admin); 245 void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin); 253 void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin); 292 public final void loadActualValue(DevicePolicyManager deviceManager, ComponentName admin) { 293 mActualValue = getDeviceManagerValue(deviceManager, admin); 297 ComponentName admin); 407 public void applyExpectedValue(DevicePolicyManager deviceManager, ComponentName admin) { [all...] |
/external/fio/examples/ |
rbd.fio | 15 clientname=admin
|
/external/libpcap/ChmodBPF/ |
ChmodBPF | 11 # This startup item will make it owned by the admin group, 12 # with permissions rw-rw----, so that anybody in the admin 20 # admin group can capture packets. 22 chgrp admin /dev/bpf*
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
BaseDeviceOwnerTest.java | 18 import android.app.admin.DeviceAdminReceiver; 19 import android.app.admin.DevicePolicyManager; 28 * and that it has an active admin registered, so that all tests may 29 * assume these are done. The admin component can be accessed through
|
/cts/hostsidetests/devicepolicy/app/ManagedProfile/src/com/android/cts/managedprofile/ |
BaseManagedProfileTest.java | 18 import android.app.admin.DeviceAdminReceiver; 19 import android.app.admin.DevicePolicyManager; 27 * This class handles making sure that the test is the profile owner and that it has an active admin
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/sensors/helpers/ |
SensorDeviceAdminReceiver.java | 19 import android.app.admin.DeviceAdminReceiver;
|
/external/smack/src/org/xbill/DNS/ |
SOARecord.java | 17 private Name host, admin; field in class:SOARecord 30 * @param admin The zone administrator's address 40 SOARecord(Name name, int dclass, long ttl, Name host, Name admin, 45 this.admin = checkName("admin", admin); 56 admin = new Name(in); 67 admin = st.getName(origin); 81 sb.append(admin); 118 return admin; [all...] |
/packages/apps/ManagedProvisioning/src/com/android/managedprovisioning/ |
MessageParser.java | 19 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_TIME_ZONE; 20 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_LOCAL_TIME; 21 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_LOCALE; 22 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_WIFI_SSID; 23 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_WIFI_HIDDEN; 24 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_WIFI_SECURITY_TYPE; 25 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_WIFI_PASSWORD; 26 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_WIFI_PROXY_HOST; 27 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_WIFI_PROXY_PORT; 28 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_WIFI_PROXY_BYPASS [all...] |
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
DeviceOwner.java | 117 static DeviceOwner createWithProfileOwner(ComponentName admin, String ownerName, int userId) { 119 owner.mProfileOwners.put(userId, new OwnerInfo(ownerName, admin)); 146 void setProfileOwner(ComponentName admin, String ownerName, int userId) { 147 mProfileOwners.put(userId, new OwnerInfo(ownerName, admin)); 166 return profileOwner != null ? profileOwner.admin : null; 234 ComponentName admin = ComponentName.unflattenFromString( local 236 if (admin != null) { 237 profileOwnerInfo = new OwnerInfo(profileOwnerName, admin); 293 if (ownerInfo.admin != null) { 294 out.attribute(null, ATTR_COMPONENT_NAME, ownerInfo.admin.flattenToString()) 335 public ComponentName admin; field in class:DeviceOwner.OwnerInfo [all...] |
DevicePolicyManagerService.java | 32 import android.app.admin.DeviceAdminInfo; 33 import android.app.admin.DeviceAdminReceiver; 34 import android.app.admin.DevicePolicyManager; 35 import android.app.admin.DevicePolicyManagerInternal; 36 import android.app.admin.IDevicePolicyManager; 213 * Whether or not device admin feature is supported. If it isn't return defaults for all 1048 ActiveAdmin admin = getUserData(userHandle).mAdminMap.get(who); local 1067 ActiveAdmin admin = policy.mAdminMap.get(who); local 1161 final ActiveAdmin admin = policy.mAdminList.get(i); local 1183 final ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1599 final ActiveAdmin admin = policy.mAdminList.get(i); local 1824 ActiveAdmin admin = getActiveAdminUncheckedLocked(adminReceiver, userHandle); local 1874 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1884 ActiveAdmin admin = policy.mAdminList.get(i); local 1921 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1931 ActiveAdmin admin = policy.mAdminList.get(i); local 1968 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 1978 ActiveAdmin admin = policy.mAdminList.get(i); local 2030 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2039 ActiveAdmin admin = policy.mAdminList.get(i); local 2128 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2137 ActiveAdmin admin = policy.mAdminList.get(i); local 2184 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2194 ActiveAdmin admin = policy.mAdminList.get(i); local 2228 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2238 ActiveAdmin admin = policy.mAdminList.get(i); local 2275 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2285 ActiveAdmin admin = policy.mAdminList.get(i); local 2322 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2332 ActiveAdmin admin = policy.mAdminList.get(i); local 2369 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2379 ActiveAdmin admin = policy.mAdminList.get(i); local 2416 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2426 ActiveAdmin admin = policy.mAdminList.get(i); local 2513 ActiveAdmin admin = (who != null) ? getActiveAdminUncheckedLocked(who, userHandle) local 2734 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 2744 ActiveAdmin admin = policy.mAdminList.get(i); local 2929 final ActiveAdmin admin = getActiveAdminForCallerLocked(null, local 2982 ActiveAdmin admin = getActiveAdminUncheckedLocked(comp, userHandle); local 3063 ActiveAdmin admin = policy.mAdminList.get(i); local 3153 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 3446 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 3453 ActiveAdmin admin = policy.mAdminList.get(i); local 3485 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 3556 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 3564 ActiveAdmin admin = policy.mAdminList.get(i); local 3607 ActiveAdmin admin = getActiveAdminUncheckedLocked(who, userHandle); local 3616 ActiveAdmin admin = policy.mAdminList.get(i); local 3707 ActiveAdmin admin = policy.mAdminList.get(i); local 3914 ActiveAdmin admin = policy.mAdminList.get(i); local 4342 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 4361 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 4385 ActiveAdmin admin = policy.mAdminList.get(j); local 4500 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 4519 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 4550 ActiveAdmin admin = policy.mAdminList.get(j); local 4987 ActiveAdmin admin = policy.mAdminList.get(i); local 5051 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5071 ActiveAdmin admin = getActiveAdminForCallerLocked(who, local 5082 ActiveAdmin admin = getProfileOwnerAdmin(userId); local 5334 ActiveAdmin admin = policy.mAdminMap.get(ownerComponent); local [all...] |
/developers/build/prebuilts/gradle/AppRestrictionEnforcer/Application/src/main/java/com/example/android/apprestrictionenforcer/ |
SetupProfileFragment.java | 28 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 29 import static android.app.admin.DevicePolicyManager.EXTRA_DEVICE_ADMIN; 30 import static android.app.admin.DevicePolicyManager.EXTRA_PROVISIONING_DEVICE_ADMIN_PACKAGE_NAME;
|