/frameworks/base/core/java/android/app/ |
IUiAutomationConnection.aidl | 25 * This interface contains privileged operations a shell program can perform 28 * not. Running privileged operations by the shell user on behalf of an
|
UiAutomationConnection.java | 36 * for enabling access to privileged operations which the shell can do and the 37 * instrumentation cannot. These privileged operations are needed for implementing
|
/external/openssh/ |
uidswap.c | 55 static int privileged = 0; variable 76 privileged = 0; 82 privileged = 0; 87 privileged = 1; 126 /* Propagate the privileged gid to all of our gids. */ 129 /* Propagate the privileged uid to all of our uids. */ 177 * Restores to the original (privileged) uid. 182 /* it's a no-op unless privileged */ 183 if (!privileged) { 192 /* Set the effective uid back to the saved privileged uid. * [all...] |
README.privsep | 3 privileged monitor process. Its purpose is to prevent privilege 36 --with-privsep-user=user Specify non-privileged user for privilege separation 60 process 6917 is the privileged monitor process, 6919 is the user owned
|
gss-serv.c | 76 /* Privileged (called from ssh_gssapi_server_ctx) */ 105 /* Privileged */ 147 /* Privileged */ 247 /* Privileged (called from accept_secure_ctx) */ 330 /* Privileged */ 357 /* Privileged */
|
auth-rhosts.c | 223 /* Switch back to privileged uid. */ 303 /* Restore the privileged uid. */ 311 /* Restore the privileged uid. */
|
/external/openssh/openbsd-compat/ |
bsd-statvfs.h | 51 /* non-privileged process. */ 55 /* non-privileged process. */
|
bindresvport.c | 50 * Bind a socket to a privileged IP port
|
/packages/apps/CellBroadcastReceiver/src/com/android/cellbroadcastreceiver/ |
CellBroadcastReceiver.java | 51 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) { 70 // If 'privileged' is false, it means that the intent was delivered to the base 74 if (privileged) { 82 if (privileged) { 94 if (privileged) {
|
/packages/apps/Mms/src/com/android/mms/transaction/ |
SmsReceiver.java | 47 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) { 48 // If 'privileged' is false, it means that the intent was delivered to the base 52 if (!privileged && intent.getAction().equals(Intents.SMS_RECEIVED_ACTION)) {
|
/external/chromium/chrome/browser/extensions/ |
stubs_apitest.cc | 16 // should be available in content scripts) or update the list of privileged APIs
|
/external/mksh/src/ |
sh_flags.h | 94 /* -p use suid_profile; privileged shell */ 95 FN("privileged", FPRIVILEGED, 'p', OF_ANY)
|
/external/libsepol/include/sepol/policydb/ |
constraint.h | 13 * identity or role unless it is in a privileged type.
|
/libcore/dalvik/src/main/java/dalvik/system/ |
VMStack.java | 53 * implementation doesn't have a concept of "privileged" frames.
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_priv.sgml | 31 <para>If enabled, privileged operations are done in the wpa_priv process 45 non-privileged user account created just for this purpose to limit access
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/asm-generic/ |
siginfo.h | 150 #define ILL_PRVOPC (__SI_FAULT|5) /* privileged opcode */ 151 #define ILL_PRVREG (__SI_FAULT|6) /* privileged register */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/asm-generic/ |
siginfo.h | 150 #define ILL_PRVOPC (__SI_FAULT|5) /* privileged opcode */ 151 #define ILL_PRVREG (__SI_FAULT|6) /* privileged register */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/asm-generic/ |
siginfo.h | 150 #define ILL_PRVOPC (__SI_FAULT|5) /* privileged opcode */ 151 #define ILL_PRVREG (__SI_FAULT|6) /* privileged register */
|
/external/ppp/pppd/ |
pppd.8 | 51 option from a privileged source cannot be overridden by a 52 non-privileged user. 85 contain privileged options, such as \fInoauth\fR, even if pppd 99 for this option from a privileged source cannot be overridden by a 100 non-privileged user. 121 is privileged if the \fInodefaultroute\fR option has been specified. 129 modem has already hung up. A value for this option from a privileged 130 source cannot be overridden by a non-privileged user. 150 for this option from a privileged source cannot be overridden by a 151 non-privileged user [all...] |
/external/openssh/contrib/cygwin/ |
ssh-host-config | 193 csih_inform "However, this requires a non-privileged account called 'sshd'." 440 csih_inform "sshd requires. You need to have or to create a privileged" 450 csih_error_recoverable "There was a serious problem creating a privileged user." 470 # $password is empty, or $run_service_as is some privileged user and 593 --privileged ) 608 echo " --user -u <account> privileged user for service." 609 echo " --pwd -w <passwd> Use \"pwd\" as password for privileged user." 610 echo " --privileged On Windows NT/2k/XP, require privileged user"
|
/docs/source.android.com/src/devices/tech/security/ |
enhancements43.jd | 41 the shell from acquiring privileged capabilities.</li>
|
/external/chromium/chrome/browser/ |
mach_broker_mac.h | 22 // the process. Running |task_for_pid()| is only allowed for privileged code.
|
/external/webkit/Source/WebKit/chromium/public/ |
WebSecurityOrigin.h | 72 // The empty WebSecurityOrigin is the least privileged WebSecurityOrigin.
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
serial.h | 110 #define ASYNC_USR_MASK 0x3430 /* Legal flags that non-privileged
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
serial.h | 110 #define ASYNC_USR_MASK 0x3430 /* Legal flags that non-privileged
|