/packages/apps/Mms/src/com/android/mms/transaction/ |
SmsReceiver.java | 48 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) { 49 // If 'privileged' is false, it means that the intent was delivered to the base 53 if (!privileged && intent.getAction().equals(Intents.SMS_RECEIVED_ACTION)) {
|
/external/openssh/ |
uidswap.c | 55 static int privileged = 0; variable 76 privileged = 0; 82 privileged = 0; 87 privileged = 1; 126 /* Propagate the privileged gid to all of our gids. */ 129 /* Propagate the privileged uid to all of our uids. */ 177 * Restores to the original (privileged) uid. 182 /* it's a no-op unless privileged */ 183 if (!privileged) { 192 /* Set the effective uid back to the saved privileged uid. * [all...] |
sshconnect.c | 185 * Creates a (possibly privileged) socket for use as the ssh connection. 188 ssh_create_socket(int privileged, struct addrinfo *ai) 194 * If we are running as root and want to connect to a privileged 195 * port, bind our own socket to a privileged port. 197 if (privileged) { 329 * a privileged port will be allocated to make the connection. [all...] |
configure | [all...] |
/packages/apps/CellBroadcastReceiver/src/com/android/cellbroadcastreceiver/ |
CellBroadcastReceiver.java | 48 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) { 62 // If 'privileged' is false, it means that the intent was delivered to the base 66 if (privileged) { 74 if (privileged) {
|
/external/quake/quake/src/WinQuake/ |
host_cmd.cpp | 128 if (pr_global_struct->deathmatch && !host_client->privileged) 146 if (pr_global_struct->deathmatch && !host_client->privileged) 166 if (pr_global_struct->deathmatch && !host_client->privileged) 198 if (pr_global_struct->deathmatch && !host_client->privileged) 979 if (cl->privileged) 981 cl->privileged = false; 987 cl->privileged = true; 999 if (cl->privileged) 1001 cl->privileged = false; 1007 cl->privileged = true [all...] |
server.h | 83 qboolean privileged; // can execute any host command member in struct:client_s
|
sv_user.cpp | 530 if (host_client->privileged)
|
sv_main.cpp | 277 client->privileged = IsID(&client->netconnection->addr); 279 client->privileged = false;
|
net_dgrm.cpp | 117 if (pr_global_struct->deathmatch && !host_client->privileged) [all...] |
/gdk/samples/quake/jni/ |
host_cmd.cpp | 128 if (pr_global_struct->deathmatch && !host_client->privileged) 146 if (pr_global_struct->deathmatch && !host_client->privileged) 166 if (pr_global_struct->deathmatch && !host_client->privileged) 198 if (pr_global_struct->deathmatch && !host_client->privileged) 979 if (cl->privileged) 981 cl->privileged = false; 987 cl->privileged = true; 999 if (cl->privileged) 1001 cl->privileged = false; 1007 cl->privileged = true [all...] |
server.h | 83 qboolean privileged; // can execute any host command member in struct:client_s
|
sv_user.cpp | 530 if (host_client->privileged)
|
sv_main.cpp | 277 client->privileged = IsID(&client->netconnection->addr); 279 client->privileged = false;
|
net_dgrm.cpp | 117 if (pr_global_struct->deathmatch && !host_client->privileged) [all...] |
/external/mesa3d/docs/OLD/ |
MESA_trace.spec | 64 that enjoys privileged access, or that they do not wish to separate
|
/external/openssh/contrib/cygwin/ |
ssh-user-config | 225 --privileged ) 239 echo " --privileged On Windows NT/2k/XP, assume privileged user"
|
ssh-host-config | 193 csih_inform "However, this requires a non-privileged account called 'sshd'." 440 csih_inform "sshd requires. You need to have or to create a privileged" 450 csih_error_recoverable "There was a serious problem creating a privileged user." 470 # $password is empty, or $run_service_as is some privileged user and 593 --privileged ) 608 echo " --user -u <account> privileged user for service." 609 echo " --pwd -w <passwd> Use \"pwd\" as password for privileged user." 610 echo " --privileged On Windows NT/2k/XP, require privileged user"
|
/external/ppp/pppd/ |
pppd.h | 121 #define OPT_PRIV 0x1000 /* privileged option */ 226 extern int privileged; /* We were run by real-uid root */ 675 int privileged)); 679 int options_from_list __P((struct wordlist *, int privileged)); [all...] |
main.c | 146 int privileged; /* we're running as real uid root */ variable 340 privileged = uid == 0; 369 privileged = 1; 406 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1) [all...] |
options.c | 220 "Take options from a privileged file", OPT_NOPRINT }, 357 privileged_option = privileged; 477 ret = options_from_file(path, 0, 1, privileged); [all...] |
auth.c | 386 "Allow group members to use privileged options", OPT_PRIV | OPT_A2LIST }, 458 * privgroup - allow members of the group to have privileged access. 474 privileged = 1; 1206 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.equinox.util_1.0.200.v20100503.jar | |
/external/iproute2/doc/ |
api-ip6-flowlabels.tex | 233 One idea is to disallow not privileged user to allocate flow
|
/external/elfutils/tests/ |
run-allregs.sh | 232 privileged registers: [all...] |