HomeSort by relevance Sort by last modified time
    Searched refs:privileged (Results 1 - 25 of 25) sorted by null

  /packages/apps/Mms/src/com/android/mms/transaction/
SmsReceiver.java 48 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) {
49 // If 'privileged' is false, it means that the intent was delivered to the base
53 if (!privileged && intent.getAction().equals(Intents.SMS_RECEIVED_ACTION)) {
  /external/openssh/
uidswap.c 55 static int privileged = 0; variable
76 privileged = 0;
82 privileged = 0;
87 privileged = 1;
126 /* Propagate the privileged gid to all of our gids. */
129 /* Propagate the privileged uid to all of our uids. */
177 * Restores to the original (privileged) uid.
182 /* it's a no-op unless privileged */
183 if (!privileged) {
192 /* Set the effective uid back to the saved privileged uid. *
    [all...]
sshconnect.c 185 * Creates a (possibly privileged) socket for use as the ssh connection.
188 ssh_create_socket(int privileged, struct addrinfo *ai)
194 * If we are running as root and want to connect to a privileged
195 * port, bind our own socket to a privileged port.
197 if (privileged) {
329 * a privileged port will be allocated to make the connection.
    [all...]
configure     [all...]
  /packages/apps/CellBroadcastReceiver/src/com/android/cellbroadcastreceiver/
CellBroadcastReceiver.java 48 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) {
62 // If 'privileged' is false, it means that the intent was delivered to the base
66 if (privileged) {
74 if (privileged) {
  /external/quake/quake/src/WinQuake/
host_cmd.cpp 128 if (pr_global_struct->deathmatch && !host_client->privileged)
146 if (pr_global_struct->deathmatch && !host_client->privileged)
166 if (pr_global_struct->deathmatch && !host_client->privileged)
198 if (pr_global_struct->deathmatch && !host_client->privileged)
979 if (cl->privileged)
981 cl->privileged = false;
987 cl->privileged = true;
999 if (cl->privileged)
1001 cl->privileged = false;
1007 cl->privileged = true
    [all...]
server.h 83 qboolean privileged; // can execute any host command member in struct:client_s
sv_user.cpp 530 if (host_client->privileged)
sv_main.cpp 277 client->privileged = IsID(&client->netconnection->addr);
279 client->privileged = false;
net_dgrm.cpp 117 if (pr_global_struct->deathmatch && !host_client->privileged)
    [all...]
  /gdk/samples/quake/jni/
host_cmd.cpp 128 if (pr_global_struct->deathmatch && !host_client->privileged)
146 if (pr_global_struct->deathmatch && !host_client->privileged)
166 if (pr_global_struct->deathmatch && !host_client->privileged)
198 if (pr_global_struct->deathmatch && !host_client->privileged)
979 if (cl->privileged)
981 cl->privileged = false;
987 cl->privileged = true;
999 if (cl->privileged)
1001 cl->privileged = false;
1007 cl->privileged = true
    [all...]
server.h 83 qboolean privileged; // can execute any host command member in struct:client_s
sv_user.cpp 530 if (host_client->privileged)
sv_main.cpp 277 client->privileged = IsID(&client->netconnection->addr);
279 client->privileged = false;
net_dgrm.cpp 117 if (pr_global_struct->deathmatch && !host_client->privileged)
    [all...]
  /external/mesa3d/docs/OLD/
MESA_trace.spec 64 that enjoys privileged access, or that they do not wish to separate
  /external/openssh/contrib/cygwin/
ssh-user-config 225 --privileged )
239 echo " --privileged On Windows NT/2k/XP, assume privileged user"
ssh-host-config 193 csih_inform "However, this requires a non-privileged account called 'sshd'."
440 csih_inform "sshd requires. You need to have or to create a privileged"
450 csih_error_recoverable "There was a serious problem creating a privileged user."
470 # $password is empty, or $run_service_as is some privileged user and
593 --privileged )
608 echo " --user -u <account> privileged user for service."
609 echo " --pwd -w <passwd> Use \"pwd\" as password for privileged user."
610 echo " --privileged On Windows NT/2k/XP, require privileged user"
  /external/ppp/pppd/
pppd.h 121 #define OPT_PRIV 0x1000 /* privileged option */
226 extern int privileged; /* We were run by real-uid root */
675 int privileged));
679 int options_from_list __P((struct wordlist *, int privileged));
    [all...]
main.c 146 int privileged; /* we're running as real uid root */ variable
340 privileged = uid == 0;
369 privileged = 1;
406 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
    [all...]
options.c 220 "Take options from a privileged file", OPT_NOPRINT },
357 privileged_option = privileged;
477 ret = options_from_file(path, 0, 1, privileged);
    [all...]
auth.c 386 "Allow group members to use privileged options", OPT_PRIV | OPT_A2LIST },
458 * privgroup - allow members of the group to have privileged access.
474 privileged = 1;
1206 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) {
    [all...]
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
org.eclipse.equinox.util_1.0.200.v20100503.jar 
  /external/iproute2/doc/
api-ip6-flowlabels.tex 233 One idea is to disallow not privileged user to allocate flow
  /external/elfutils/tests/
run-allregs.sh 232 privileged registers:
    [all...]

Completed in 965 milliseconds