/external/robolectric-shadows/shadows/framework/src/main/java/org/robolectric/shadows/ |
D | ShadowDevicePolicyManager.java | 20 import android.app.admin.DeviceAdminReceiver; 21 import android.app.admin.DevicePolicyManager; 22 import android.app.admin.IDevicePolicyManager; 177 protected void addUserRestriction(ComponentName admin, String key) { in addUserRestriction() argument 178 enforceActiveAdmin(admin); in addUserRestriction() 183 protected void clearUserRestriction(ComponentName admin, String key) { in clearUserRestriction() argument 184 enforceActiveAdmin(admin); in clearUserRestriction() 189 protected boolean setApplicationHidden(ComponentName admin, String packageName, boolean hidden) { in setApplicationHidden() argument 190 enforceActiveAdmin(admin); in setApplicationHidden() 214 protected boolean isApplicationHidden(ComponentName admin, String packageName) { in isApplicationHidden() argument [all …]
|
/external/autotest/frontend/afe/ |
D | admin.py | 4 from django.contrib import admin, messages 14 class SiteAdmin(admin.ModelAdmin): 54 admin.site.register(models.AtomicGroup, AtomicGroupAdmin) 71 admin.site.register(models.Label, LabelAdmin) 78 admin.site.register(models.User, UserAdmin) 151 class HostAttributeInline(admin.TabularInline): 255 admin.site.register(models.Host, HostAdmin) 267 admin.site.register(models.Test, TestAdmin) 274 admin.site.register(models.Profiler, ProfilerAdmin) 295 admin.site.register(models.AclGroup, AclGroupAdmin) [all …]
|
/external/autotest/frontend/ |
D | urls.py | 6 from django.contrib import admin 7 admin.autodiscover() 17 (RE_PREFIX + r'admin/', urls.include(admin.site.urls)),
|
/external/autotest/apache/conf/ |
D | django-directives | 24 # Block all access to the django admin pages. The django admin module that we 27 RewriteRule ^/admin/.* - [R=404] 28 RewriteRule ^/afe/server/admin/.* - [R=404] 29 RewriteRule ^/afe/server/admin - [R=404] 56 …# Note: this maximum-requests argument is required because of a memory leak in the django admin pa…
|
/external/python/cpython3/Lib/test/test_email/data/ |
D | msg_25.txt | 5 for linuxuser-admin@www.linux.org.uk; Fri, 06 Apr 2001 16:46:09 +0100 9 Subject: Returned mail: Too many hops 19 (17 max): from <linuxuser-admin@www.linux.org.uk> via [199… 11 To: <linuxuser-admin@www.linux.org.uk> 29 554 Too many hops 19 (17 max): from <linuxuser-admin@www.linux.org.uk> via [199.164.235.226], to <s… 46 Return-Path: linuxuser-admin@www.linux.org.uk 100 Sender: linuxuser-admin@www.linux.org.uk 101 Errors-To: linuxuser-admin@www.linux.org.uk
|
D | msg_16.txt | 2 Delivered-To: scr-admin@socal-raves.org 5 for <scr-admin@socal-raves.org>; Sun, 23 Sep 2001 20:13:54 -0700 (PDT) 8 id <0GK500B01D0B8Y@cougar.noc.ucla.edu> for scr-admin@socal-raves.org; Sun, 16 To: scr-admin@socal-raves.org 66 Return-path: scr-admin@socal-raves.org 91 Sender: scr-admin@socal-raves.org 93 Errors-to: scr-admin@socal-raves.org
|
D | msg_02.txt | 3 Sender: ppp-admin@zzz.org 24 ppp-admin@zzz.org
|
/external/python/cpython2/Lib/email/test/data/ |
D | msg_25.txt | 5 for linuxuser-admin@www.linux.org.uk; Fri, 06 Apr 2001 16:46:09 +0100 9 Subject: Returned mail: Too many hops 19 (17 max): from <linuxuser-admin@www.linux.org.uk> via [199… 11 To: <linuxuser-admin@www.linux.org.uk> 29 554 Too many hops 19 (17 max): from <linuxuser-admin@www.linux.org.uk> via [199.164.235.226], to <s… 46 Return-Path: linuxuser-admin@www.linux.org.uk 100 Sender: linuxuser-admin@www.linux.org.uk 101 Errors-To: linuxuser-admin@www.linux.org.uk
|
D | msg_16.txt | 2 Delivered-To: scr-admin@socal-raves.org 5 for <scr-admin@socal-raves.org>; Sun, 23 Sep 2001 20:13:54 -0700 (PDT) 8 id <0GK500B01D0B8Y@cougar.noc.ucla.edu> for scr-admin@socal-raves.org; Sun, 16 To: scr-admin@socal-raves.org 66 Return-path: scr-admin@socal-raves.org 91 Sender: scr-admin@socal-raves.org 93 Errors-to: scr-admin@socal-raves.org
|
D | msg_02.txt | 3 Sender: ppp-admin@zzz.org 24 ppp-admin@zzz.org
|
/external/robolectric-shadows/robolectric/src/test/java/org/robolectric/shadows/ |
D | ShadowDevicePolicyManagerTest.java | 3 import static android.app.admin.DevicePolicyManager.ENCRYPTION_STATUS_ACTIVATING; 4 import static android.app.admin.DevicePolicyManager.ENCRYPTION_STATUS_ACTIVE; 5 import static android.app.admin.DevicePolicyManager.ENCRYPTION_STATUS_ACTIVE_DEFAULT_KEY; 6 import static android.app.admin.DevicePolicyManager.ENCRYPTION_STATUS_ACTIVE_PER_USER; 7 import static android.app.admin.DevicePolicyManager.ENCRYPTION_STATUS_INACTIVE; 8 import static android.app.admin.DevicePolicyManager.ENCRYPTION_STATUS_UNSUPPORTED; 9 import static android.app.admin.DevicePolicyManager.STATE_USER_SETUP_COMPLETE; 10 import static android.app.admin.DevicePolicyManager.STATE_USER_SETUP_INCOMPLETE; 11 import static android.app.admin.DevicePolicyManager.STATE_USER_UNMANAGED; 24 import android.app.admin.DevicePolicyManager; [all …]
|
/external/python/cpython2/Mac/BuildScript/scripts/ |
D | postflight.ensurepip | 25 chgrp -R admin "${FWK}/lib/python${PYVER}/site-packages" "${FWK}/bin" 45 chgrp -h admin "./${fn}"
|
D | postflight.framework | 29 chgrp -R admin "${FWK}"
|
/external/python/cpython3/Mac/BuildScript/scripts/ |
D | postflight.ensurepip | 30 chgrp -R admin "${FWK}/lib/python${PYVER}/site-packages" "${FWK}/bin" 50 chgrp -h admin "./${fn}"
|
D | postflight.framework | 29 chgrp -R admin "${FWK}"
|
/external/selinux/python/sepolicy/sepolicy/help/ |
D | login.txt | 18 - Full Network, sudo to admin only, no root password. Usually a confined admin
|
D | users.txt | 17 - Full Network, sudo to admin only, no root password. Usually a confined admin
|
/external/iptables/extensions/ |
D | libipt_REJECT.man | 22 \fBicmp\-admin\-prohibited\fP (*), 32 (*) Using icmp\-admin\-prohibited with kernels that do not support it will result in a plain DROP i…
|
/external/libcups/cups/ |
D | Makefile | 630 --header api-admin.header --intro api-admin.shtml \ 631 api-admin.xml \ 632 adminutil.c adminutil.h getdevices.c >../doc/help/api-admin.html 633 $(RM) api-admin.xml
|
/external/libpcap/doc/ |
D | README.macos | 27 "admin" group owns them, and will change the permission of the BPF 28 devices to rw-rw----, so that all users in the "admin" group - i.e., all 68 group to "admin", and the permissions to rw-r-----. Other possibilities
|
/external/libpcap/ |
D | chmod_bpf | 18 chgrp admin /dev/bpf*
|
/external/libpcap/ChmodBPF/ |
D | ChmodBPF | 22 chgrp admin /dev/bpf*
|
/external/ipsec-tools/ |
D | ChangeLog | 50 * src/racoon/: admin.c, racoonctl.c: Originally from Bin Li: Fix a 155 * src/racoon/: grabmyaddr.c, admin.c, ipsec_doi.c, isakmp.c, 261 src/racoon/admin.c, src/racoon/backupsa.c, src/racoon/cfparse.y, 555 * src/racoon/admin.c: fix endianness issue introduced yesterday 579 * src/racoon/admin.c: Fix memory leak (Coverity 2002) 581 * src/racoon/: admin.c, isakmp.c, sockmisc.c: Fix memory leak 584 * src/racoon/admin.c: Avoid reusing free'd pointer (Coverity 4200) 629 * src/racoon/admin.c: Do not free id and key, as they are used 650 * src/racoon/admin.c: Remove dead code (Coverity) 652 * src/racoon/admin.c: Fix memory leak (Coverity) [all …]
|
/external/autotest/contrib/ |
D | deploy_puppet.sh | 89 run_puppet="ssh ${host} -- 'sudo /root/chromeos-admin/puppet/sync_and_run_puppet -f'"
|
/external/selinux/secilc/docs/ |
D | cil_user_statements.md | 364 This example will associate `unconfined.admin` user with a prefix of "[`user`](cil_user_statements.… 367 (user admin 368 (userprefix admin user) 409 This example will associate `unconfined.admin` user with a GNU / Linux user "`admin_1`": 412 (user admin) 413 (selinuxuser admin_1 admin low_low)
|