/packages/apps/Settings/tests/robotests/src/com/android/settings/password/ |
SetNewPasswordControllerTest.java | 19 import android.app.admin.DevicePolicyManager;
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/netinet/ |
ip_icmp.h | 255 #define ICMP_UNREACH_FILTER_PROHIB 13 /* admin prohib */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/netinet/ |
ip_icmp.h | 255 #define ICMP_UNREACH_FILTER_PROHIB 13 /* admin prohib */
|
/prebuilts/sdk/23/ |
framework.aidl | 42 parcelable android.app.admin.SystemUpdatePolicy;
|
/prebuilts/sdk/tools/ |
jack | 165 echo "No Jack server running. Try 'jack-admin start-server'" >&2
|
/cts/hostsidetests/devicepolicy/src/com/android/cts/devicepolicy/ |
DeviceAndProfileOwnerTest.java | 499 // Sets restrictions and launches non-admin app, that tries to set wallpaper. 500 // Non-admin apps must not violate any user restriction. 518 // Runs test with admin privileges. The test methods set all the tested restrictions [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
smtpd.py | 399 # listname-admin
413 '', 'admin', 'owner', 'request', 'join', 'leave'):
448 elif command == 'admin':
|
/external/valgrind/exp-sgcheck/ |
h_main.c | 150 struct _SegGroup* admin; member in struct:_SegGroup 175 g->admin = NULL; 181 g->admin = group_list;
|
/frameworks/base/core/java/android/os/ |
UserManager.java | 32 import android.app.admin.DevicePolicyManager; 761 * @see android.app.admin.DevicePolicyManager#setApplicationRestrictions( 763 * @see android.app.admin.DevicePolicyManager#getApplicationRestrictions( [all...] |
/frameworks/base/packages/SystemUI/res/values-en-rAU/ |
strings.xml | 67 <string name="usb_debugging_secondary_user_message" msgid="8572228137833020196">"The user currently signed in to this device can\'t turn on USB debugging. To use this feature, please switch to an Admin user."</string> [all...] |
/frameworks/base/packages/SystemUI/res/values-en-rGB/ |
strings.xml | 67 <string name="usb_debugging_secondary_user_message" msgid="8572228137833020196">"The user currently signed in to this device can\'t turn on USB debugging. To use this feature, please switch to an Admin user."</string> [all...] |
/frameworks/base/packages/SystemUI/res/values-en-rIN/ |
strings.xml | 67 <string name="usb_debugging_secondary_user_message" msgid="8572228137833020196">"The user currently signed in to this device can\'t turn on USB debugging. To use this feature, please switch to an Admin user."</string> [all...] |
/frameworks/base/packages/SystemUI/res/values-tl/ |
strings.xml | 67 <string name="usb_debugging_secondary_user_message" msgid="8572228137833020196">"Hindi maaaring i-on ng user na kasalukuyang naka-sign in sa device na ito ang pagde-debug sa pamamagitan ng USB. Upang magamit ang feature na ito, mangyaring lumipat sa isang user na Admin."</string> [all...] |
/frameworks/base/packages/SystemUI/src/com/android/systemui/statusbar/policy/ |
UserSwitcherController.java | 759 EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(mContext, local 761 if (admin != null && !RestrictedLockUtils.hasBaseUserRestriction(mContext, 764 record.enforcedAdmin = admin; [all...] |
/packages/apps/Email/provider_src/com/android/email/activity/setup/ |
AccountSecurity.java | 25 import android.app.admin.DevicePolicyManager; 383 LogUtils.d(TAG, "Not active admin: repost notification"); 399 LogUtils.d(TAG, "Not active admin: post initial notification");
|
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
smtpd.py | 399 # listname-admin 413 '', 'admin', 'owner', 'request', 'join', 'leave'): 448 elif command == 'admin':
|
/prebuilts/gdb/linux-x86/lib/python2.7/ |
smtpd.py | 399 # listname-admin 413 '', 'admin', 'owner', 'request', 'join', 'leave'): 448 elif command == 'admin':
|
/prebuilts/python/darwin-x86/2.7.5/bin/ |
smtpd.py | 399 # listname-admin 413 '', 'admin', 'owner', 'request', 'join', 'leave'): 448 elif command == 'admin':
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
smtpd.py | 399 # listname-admin 413 '', 'admin', 'owner', 'request', 'join', 'leave'): 448 elif command == 'admin':
|
/prebuilts/python/linux-x86/2.7.5/bin/ |
smtpd.py | 399 # listname-admin 413 '', 'admin', 'owner', 'request', 'join', 'leave'): 448 elif command == 'admin':
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
smtpd.py | 399 # listname-admin 413 '', 'admin', 'owner', 'request', 'join', 'leave'): 448 elif command == 'admin':
|
/cts/apps/CtsVerifier/res/values/ |
strings.xml | 77 <string name="da_uninstall_test">Device Admin Uninstall Test</string> 82 <string name="da_tapjacking_test">Device Admin Tapjacking Test</string> 84 user by obscuring the device admin details while prompting the user to activate the admin. 127 <string name="da_install_admin_instructions">Please install the \'Test Device Admin\' app on the device. 130 <string name="da_install_admin_button_text">Install admin</string> 131 <string name="da_enable_admin_instructions">Add \'Test Device Admin\' as an active administrator on the device. 132 Tap the button below to review the device admin details and activate the administrator. 134 <string name="da_enable_admin_button_text">Enable admin</string> 135 <string name="da_uninstall_admin_instructions">Attempt to uninstall the app from the application details page of the \'Test Device Admin\' app [all...] |
/external/tpm2/ |
SessionProcess.c | 192 // Checks if a policy session is required for a command. If a command requires DUP or ADMIN role 194 // this checking. If a new command is created that requires multiple ADMIN role authorizations, then it will 197 // b) the command requires the ADMIN role and the authorized entity is an object and its adminWithPolicy 199 // c) the command requires the ADMIN role and the authorized entity is a permanent handle or an NV 313 // 2. ADMIN role is required 779 // If command requires a DUP or ADMIN authorization, the session must have 821 // Compare cpHash/nameHash if defined, or if the command requires an ADMIN or [all...] |
/external/c-ares/ |
ares_platform.c | [all...] |
/packages/apps/Settings/res/values-en-rAU/ |
strings.xml | [all...] |