/external/ipsec-tools/src/racoon/ |
Makefile.am | 5 include_racoon_HEADERS = racoonctl.h var.h vmbuf.h misc.h gcmalloc.h admin.h \ 33 pfkey.c admin.c evt.c ipsec_doi.c oakley.c grabmyaddr.c vendorid.c \ 66 admin.h dnssec.h isakmp_base.h oakley.h session.h \
|
evt.c | 48 #include "admin.h" 67 /* If admin socket is disabled, silently discard anything */
|
kmpstat.c | 77 #include "admin.h" 87 #include "admin.h"
|
/external/smack/src/org/jivesoftware/smackx/packet/ |
MUCAdmin.java | 33 * 'http://jabber.org/protocol/muc#admin' namespace. 67 buf.append("<query xmlns=\"http://jabber.org/protocol/muc#admin\">"); 125 * association or connection with a room. The possible affiliations are "owner", "admin",
|
/development/samples/ApiDemos/src/com/example/android/apis/app/ |
ScreenOrientation.java | 22 import android.app.admin.DevicePolicyManager;
|
/external/chromium_org/remoting/tools/win/ |
chromoting-set-channel.bat | 11 REM http://stackoverflow.com/questions/4051883/batch-script-how-to-check-for-admin-rights
|
/external/chromium_org/rlz/win/lib/ |
rlz_lib.h | 20 // HKLM write: Calls must be made from an account with admin rights. No SID
|
/external/ipsec-tools/src/racoon/samples/ |
racoon.conf.in | 36 #admin [7002]; # administrative port for racoonctl.
|
/packages/apps/Settings/src/com/android/settings/ |
MonitoringCertInfoActivity.java | 22 import android.app.admin.DevicePolicyManager;
|
/cts/tests/tests/admin/src/android/admin/cts/ |
DevicePolicyManagerTest.java | 17 package android.admin.cts; 19 import android.app.admin.DevicePolicyManager;
|
/external/iptables/extensions/ |
libipt_REJECT.c | 50 {"icmp-admin-prohibited", "admin-prohib",
|
/frameworks/base/docs/html/sdk/api_diff/8/changes/ |
packages_index_additions.html | 53 <A HREF="changes-summary.html#android.app.admin" class="hiddenlink" target="rightframe"><b>android.app.admin</b></A><br>
|
/packages/apps/Bluetooth/src/com/android/bluetooth/a2dp/ |
A2dpService.java | 116 "Need BLUETOOTH ADMIN permission"); 134 "Need BLUETOOTH ADMIN permission");
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/email/test/data/ |
msg_02.txt | 3 Sender: ppp-admin@zzz.org 24 ppp-admin@zzz.org
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/email/test/data/ |
msg_02.txt | 3 Sender: ppp-admin@zzz.org 24 ppp-admin@zzz.org
|
/packages/apps/Email/src/com/android/email/ |
SecurityPolicy.java | 19 import android.app.admin.DeviceAdminInfo; 20 import android.app.admin.DeviceAdminReceiver; 21 import android.app.admin.DevicePolicyManager; 385 // no check required for remote wipe (it's supported, if we're the admin) 401 * we only proceed if we are already active as an admin. 410 LogUtils.d(TAG, "setActivePolicies: none, remove admin"); 481 * This will kick off the notify-acquire-admin-state process and/or increase the security level. 658 LogUtils.d(Logging.LOG_TAG, "Could not remote wipe because not device admin."); 662 * If we are not the active device admin, try to become so. 679 * Report admin component name - for making calls into device policy manage [all...] |
/external/smack/src/org/jivesoftware/smackx/muc/ |
MultiUserChat.java | 71 * Possible affiliatons are "owner", "admin", "member", and "outcast". Possible roles [all...] |
/external/valgrind/main/helgrind/ |
hg_lock_n_thread.h | 83 /* ADMIN */ 84 struct _Thread* admin; member in struct:_Thread 123 /* ADMIN */
|
/frameworks/base/docs/html/google/gcm/ |
server.jd | 146 [java] SEVERE: Created fake key. Please go to App Engine admin console, change its value to your API Key (the entity type is 'Settings' and its field to be changed is 'ApiKey'), then restart the server! 150 [java] INFO: The admin console is running at http://192.168.1.10:8080/_ah/admin
|
/cts/tools/tradefed-host/src/com/android/cts/tradefed/targetprep/ |
CtsRootDeviceSetup.java | 89 // TODO: enable device admin Settings
|
/external/bison/ |
README-release | 79 https://savannah.gnu.org/project/admin/editgroupfeatures.php?group=bison
|
/external/chromium/chrome/browser/cocoa/ |
authorization_util.mm | 34 // Specify the "system.privilege.admin" right, which allows
|
/external/chromium/chrome/browser/ui/cocoa/ |
keystone_promote_preflight.sh | 71 OWNER_GROUP="root:admin"
|
/external/chromium_org/base/mac/ |
authorization_util.mm | 37 // Specify the "system.privilege.admin" right, which allows
|
/external/chromium_org/chrome/browser/custom_handlers/ |
protocol_handler_registry_browsertest.cc | 79 // running as admin on Windows 7.
|