/external/autotest/puppylab/ |
clusterctl | 42 Usage: clusterctl --admin-repo /usr/local/autotest/chromeos-internal 81 # modulepath with the path to you chromeos-admin/puppet directory. 281 @param admin_repo: Path to the chromeos-admin repo. 292 raise ValueError('Admin repo %s does not contain puppet module' % 338 '--admin-repo', dest='admin_repo', type=str, 339 help=('Path to the admin repo that has puppet scripts used for ' 341 'can git clone the chromeos/chromeos-admin repo.'))
|
/external/testng/doc/ |
selenium.html | 59 <li>Enter "admin" in the "Username" field 62 <li>Verify that the text "Howdy, admin" is present 77 <li>Open the Admin Login page 96 @Test(description="Navigates to the admin page") 98 selenium.open("wp-admin"); 105 selenium.type("user_login", "admin"); 109 assertTrue(selenium.isTextPresent("Howdy, admin"));
|
/external/selinux/secilc/docs/ |
cil_user_statements.md | 364 This example will associate `unconfined.admin` user with a prefix of "[`user`](cil_user_statements.md#user)": 367 (user admin 368 (userprefix admin user) 409 This example will associate `unconfined.admin` user with a GNU / Linux user "`admin_1`": 412 (user admin) 413 (selinuxuser admin_1 admin low_low)
|
/packages/apps/Settings/src/com/android/settings/location/ |
LocationSettings.java | 269 final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(getActivity(), local 272 if (!isRestrictedByBase && admin != null) { 273 mManagedProfileSwitch.setDisabledByAdmin(admin); 349 EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(getActivity(), local 355 if (!hasBaseUserRestriction && admin != null) { 356 mSwitchBar.setDisabledByAdmin(admin);
|
/cts/apps/CtsVerifier/ |
Android.mk | 95 empty-device-admin := $(call intermediates-dir-for,APPS,CtsEmptyDeviceAdmin)/package.apk 138 $(verifier-zip) : $(empty-device-admin) 145 $(ACP) -fp $(empty-device-admin) $(verifier-dir)/CtsEmptyDeviceAdmin.apk
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/sensors/helpers/ |
SensorTestScreenManipulator.java | 24 import android.app.admin.DeviceAdminInfo; 25 import android.app.admin.DevicePolicyManager; 92 * NOTE: Initialization will bring up an Activity to let the user activate the Device Admin,
|
/cts/hostsidetests/devicepolicy/app/DeviceOwner/src/com/android/cts/deviceowner/ |
NetworkLoggingTest.java | 18 import android.app.admin.ConnectEvent; 19 import android.app.admin.DnsEvent; 20 import android.app.admin.NetworkEvent;
|
/external/ipsec-tools/ |
ChangeLog | 50 * src/racoon/: admin.c, racoonctl.c: Originally from Bin Li: Fix a 155 * src/racoon/: grabmyaddr.c, admin.c, ipsec_doi.c, isakmp.c, 261 src/racoon/admin.c, src/racoon/backupsa.c, src/racoon/cfparse.y, 555 * src/racoon/admin.c: fix endianness issue introduced yesterday 579 * src/racoon/admin.c: Fix memory leak (Coverity 2002) 581 * src/racoon/: admin.c, isakmp.c, sockmisc.c: Fix memory leak 584 * src/racoon/admin.c: Avoid reusing free'd pointer (Coverity 4200) 629 * src/racoon/admin.c: Do not free id and key, as they are used 650 * src/racoon/admin.c: Remove dead code (Coverity) 652 * src/racoon/admin.c: Fix memory leak (Coverity [all...] |
/external/ipsec-tools/src/racoon/ |
Makefile.am | 5 include_racoon_HEADERS = racoonctl.h var.h vmbuf.h misc.h gcmalloc.h admin.h \ 33 pfkey.c admin.c evt.c ipsec_doi.c oakley.c grabmyaddr.c vendorid.c \ 66 admin.h dnssec.h isakmp_base.h oakley.h session.h \
|
/external/selinux/python/sepolicy/sepolicy/ |
interface.py | 76 """ Get all domains with an admin interface from installed policy.""" 77 """ If xml_path is specified, func returns an admin interface from specified xml file""" 136 <layer name="admin">
|
/frameworks/base/services/core/java/com/android/server/am/ |
ActivityStartInterceptor.java | 35 import android.app.admin.DevicePolicyManagerInternal; 109 // Skip the rest of interceptions as the package is suspended by device admin so 144 // Do not intercept if the admin did not suspend the package
|
/frameworks/base/services/devicepolicy/java/com/android/server/devicepolicy/ |
NetworkLoggingHandler.java | 21 import android.app.admin.DeviceAdminReceiver; 22 import android.app.admin.NetworkEvent; 241 // without interfering with the admin's ability to collect logs out-of-order.
|
/packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/provisioning/ |
DeviceOwnerProvisioningControllerTest.java | 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 50 private static final ComponentName TEST_ADMIN = new ComponentName("com.test.admin", 51 "com.test.admin.AdminReceiver");
|
/packages/apps/ManagedProvisioning/tests/instrumentation/src/com/android/managedprovisioning/task/nonrequiredapps/ |
OverlayPackagesProviderTest.java | 19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE; 20 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_PROFILE; 21 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_USER;
|
/packages/apps/Settings/src/com/android/settings/ |
ResetNetwork.java | 192 final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced( local 197 } else if (admin != null) { 199 ShowAdminSupportDetailsDialog.setAdminSupportDetails(getActivity(), view, admin, false); local
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
root_cgo_darwin.go | 21 // It lacks support for admin & user cert domains. 125 // admin or user domain, causing it to be added to untrustedPemRoots. The 129 // SecTrustServer.c, "user trust settings overrule admin trust settings",
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
root_cgo_darwin.go | 21 // It lacks support for admin & user cert domains. 125 // admin or user domain, causing it to be added to untrustedPemRoots. The 129 // SecTrustServer.c, "user trust settings overrule admin trust settings",
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/managedprovisioning/ |
CrossProfileTestActivity.java | 21 import android.app.admin.DevicePolicyManager;
|
SetSupportMessageActivity.java | 20 import android.app.admin.DevicePolicyManager;
|
/cts/apps/CtsVerifier/src/com/android/cts/verifier/security/ |
LockConfirmBypassTest.java | 20 import android.app.admin.DevicePolicyManager;
|
/cts/hostsidetests/devicepolicy/app/CorpOwnedManagedProfile/src/com/android/cts/comp/ |
BindDeviceAdminServiceFailsTest.java | 20 import android.app.admin.DevicePolicyManager;
|
DeviceWideLoggingFeaturesTest.java | 19 import android.app.admin.DevicePolicyManager;
|
/cts/hostsidetests/devicepolicy/app/DeviceAndProfileOwner/src/com/android/cts/deviceandprofileowner/ |
PolicyTransparencyTest.java | 18 import android.app.admin.DevicePolicyManager;
|
ResetPasswordTest.java | 23 * Test cases for {@link android.app.admin.DevicePolicyManager#resetPassword(String, int)}.
|
TrustAgentInfoTest.java | 19 import android.app.admin.DevicePolicyManager;
|