/prebuilts/misc/darwin-x86/analyzer/tools/scan-view/ |
scan-view | 98 help='Allow connections from any host (access restricted to "127.0.0.1" by default)')
|
/prebuilts/misc/linux-x86/analyzer/tools/scan-view/ |
scan-view | 98 help='Allow connections from any host (access restricted to "127.0.0.1" by default)')
|
/system/core/logd/ |
LogCommand.cpp | 39 // has open permissions, and one that has restricted
|
/packages/apps/TvSettings/Settings/res/values-en-rGB/ |
strings.xml | 22 <string name="launcher_restricted_profile_app_name" msgid="671448012575234643">"Restricted profile"</string> [all...] |
/packages/apps/TvSettings/Settings/res/values-en-rIN/ |
strings.xml | 22 <string name="launcher_restricted_profile_app_name" msgid="671448012575234643">"Restricted profile"</string> [all...] |
/external/chromium_org/chrome/browser/chromeos/fileapi/ |
file_system_backend_unittest.cc | 171 // oem is restricted file system. 180 // The extension should be able to access restricted file system after it was
|
/external/chromium_org/chrome/browser/resources/login/ |
oobe.css | 36 /* Do not apply this style to restricted button state. */ 37 button.custom-appearance:not(.button-restricted):not(.button-fancy) {
|
/external/chromium_org/courgette/third_party/ |
LICENCE | 24 into a larger body of work will result in restricted distribution -- and 63 act of running the Program is not restricted, and the output from the
|
/external/chromium_org/extensions/common/permissions/ |
permissions_data.h | 75 // Returns true if the given |url| is restricted for the given |extension|, 166 // restricted to the extension's host permissions as well as the extension
|
/external/chromium_org/sandbox/win/src/ |
restricted_token_utils.cc | 161 // Create the primary (restricted) token for the process 172 // Create the impersonation token (restricted) to be able to start the
|
/frameworks/base/core/java/android/app/ |
KeyguardManager.java | 204 * If keyguard screen is showing or in restricted key input mode (i.e. in 208 * @return true if in keyguard restricted input mode.
|
/libcore/luni/src/main/java/java/util/ |
Queue.java | 21 * specifically for use with capacity-restricted <tt>Queue</tt> 137 * When using a capacity-restricted queue, this method is generally
|
NavigableSet.java | 194 * has a restricted range, and {@code fromElement} or 224 * restricted range, and {@code toElement} lies outside the 253 * restricted range, and {@code fromElement} lies outside the
|
/packages/services/Telecomm/res/values/ |
strings.xml | 112 <!-- DO NOT TRANSLATE. Hardcoded number used for restricted incoming phone numbers. --> 113 <string name="handle_restricted">RESTRICTED</string>
|
/libcore/luni/src/main/java/java/util/concurrent/ |
BlockingDeque.java | 183 * available. When using a capacity-restricted deque, it is generally 198 * available. When using a capacity-restricted deque, it is generally 214 * When using a capacity-restricted deque, this method is generally 230 * When using a capacity-restricted deque, this method is generally 407 * When using a capacity-restricted deque, it is generally preferable to 427 * available. When using a capacity-restricted deque, this method is
|
/frameworks/base/docs/html/guide/topics/manifest/ |
application-element.jd | 315 <p>Because restricted profiles currently 317 unavailable from a restricted profile</strong> unless you also declare 323 that you declare this attribute and leave <a href="#restrictedAccountType">{@code android:restrictedAccountType}</a> null, so that restricted profiles cannot use 331 <dd>Specifies the account type required by this application and indicates that restricted profiles 333 {@link android.accounts.Account} and restricted profiles <strong>are allowed to 342 Specifying this attribute allows restricted profiles to use your 347 to make your app unavailable to restricted profiles.</p>
|
/frameworks/base/services/core/java/com/android/server/connectivity/ |
Vpn.java | 147 // Owner's VPN also needs to handle restricted users 430 // If we are owner assign all Restricted Users to this VPN 487 // Restricted users are not allowed to create VPNs, they are tied to Owner 490 throw new SecurityException("Restricted users cannot establish VPNs"); 661 // If the user is restricted tie them to the owner's VPN 673 Log.wtf(TAG, "Failed to add restricted user to owner", e); 680 // clean up if restricted 688 Log.wtf(TAG, "Failed to remove restricted user to owner", e); 845 throw new SecurityException("Restricted users cannot establish VPNs"); [all...] |
/packages/apps/Settings/src/com/android/settings/users/ |
UserSettings.java | 223 // No restricted profiles for tablets with a device owner, or phones. 734 // Restricted Profile: There is no Restricted Profile 738 // Restricted Profile: Settings [all...] |
/external/chromium_org/webkit/browser/fileapi/ |
sandbox_file_system_backend_delegate.cc | 66 // Restricted names. 72 // Restricted chars. 534 // Restricted names specified in
|
/packages/apps/TvSettings/Settings/src/com/android/tv/settings/users/ |
AppLoadingTask.java | 77 * Loads the list of activities that the user can enable or disable in a restricted profile. 155 // Only do this for restricted profiles, not single-user restrictions 298 // If it's a system app that requires an account and doesn't see restricted
|
RestrictedProfileActivity.java | 64 * Activity that allows the configuration of a user's restricted profile. 155 * The description string that should be used for an action that launches the restricted profile 159 * @return the description string that should be used for an action that launches the restricted
|
/external/chromium_org/chrome/browser/history/ |
visit_database.h | 66 // results was restricted by |options.max_count|. 119 // results was restricted by |options.max_count|.
|
/external/chromium_org/chrome/browser/password_manager/ |
password_store_mac_internal.h | 107 // If searches should be restricted in this way, the application-specific 114 // If true, Keychain searches are restricted to items created by Chrome.
|
/external/chromium_org/net/dns/ |
dns_protocol.h | 101 // RFC 1035, section 4.2.1: Messages carried by UDP are restricted to 512 105 // RFC 6762, section 17: Messages over the local link are restricted by the
|
/external/chromium_org/remoting/host/win/ |
unprivileged_process_delegate.cc | 238 // Create a restricted token that will be used to run the worker process. 241 PLOG(ERROR) << "Failed to create a restricted LocalService token";
|