HomeSort by relevance Sort by last modified time
    Searched full:privileged (Results 1 - 25 of 161) sorted by null

1 2 3 4 5 6 7

  /frameworks/base/core/java/android/app/
IUiAutomationConnection.aidl 25 * This interface contains privileged operations a shell program can perform
28 * not. Running privileged operations by the shell user on behalf of an
UiAutomationConnection.java 36 * for enabling access to privileged operations which the shell can do and the
37 * instrumentation cannot. These privileged operations are needed for implementing
  /external/openssh/
uidswap.c 55 static int privileged = 0; variable
76 privileged = 0;
82 privileged = 0;
87 privileged = 1;
126 /* Propagate the privileged gid to all of our gids. */
129 /* Propagate the privileged uid to all of our uids. */
177 * Restores to the original (privileged) uid.
182 /* it's a no-op unless privileged */
183 if (!privileged) {
192 /* Set the effective uid back to the saved privileged uid. *
    [all...]
README.privsep 3 privileged monitor process. Its purpose is to prevent privilege
36 --with-privsep-user=user Specify non-privileged user for privilege separation
60 process 6917 is the privileged monitor process, 6919 is the user owned
gss-serv.c 76 /* Privileged (called from ssh_gssapi_server_ctx) */
105 /* Privileged */
147 /* Privileged */
247 /* Privileged (called from accept_secure_ctx) */
330 /* Privileged */
357 /* Privileged */
auth-rhosts.c 223 /* Switch back to privileged uid. */
303 /* Restore the privileged uid. */
311 /* Restore the privileged uid. */
  /external/openssh/openbsd-compat/
bsd-statvfs.h 51 /* non-privileged process. */
55 /* non-privileged process. */
bindresvport.c 50 * Bind a socket to a privileged IP port
  /packages/apps/CellBroadcastReceiver/src/com/android/cellbroadcastreceiver/
CellBroadcastReceiver.java 51 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) {
70 // If 'privileged' is false, it means that the intent was delivered to the base
74 if (privileged) {
82 if (privileged) {
94 if (privileged) {
  /packages/apps/Mms/src/com/android/mms/transaction/
SmsReceiver.java 47 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) {
48 // If 'privileged' is false, it means that the intent was delivered to the base
52 if (!privileged && intent.getAction().equals(Intents.SMS_RECEIVED_ACTION)) {
  /external/chromium/chrome/browser/extensions/
stubs_apitest.cc 16 // should be available in content scripts) or update the list of privileged APIs
  /external/mksh/src/
sh_flags.h 94 /* -p use suid_profile; privileged shell */
95 FN("privileged", FPRIVILEGED, 'p', OF_ANY)
  /external/libsepol/include/sepol/policydb/
constraint.h 13 * identity or role unless it is in a privileged type.
  /libcore/dalvik/src/main/java/dalvik/system/
VMStack.java 53 * implementation doesn't have a concept of "privileged" frames.
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_priv.sgml 31 <para>If enabled, privileged operations are done in the wpa_priv process
45 non-privileged user account created just for this purpose to limit access
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/asm-generic/
siginfo.h 150 #define ILL_PRVOPC (__SI_FAULT|5) /* privileged opcode */
151 #define ILL_PRVREG (__SI_FAULT|6) /* privileged register */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/asm-generic/
siginfo.h 150 #define ILL_PRVOPC (__SI_FAULT|5) /* privileged opcode */
151 #define ILL_PRVREG (__SI_FAULT|6) /* privileged register */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/asm-generic/
siginfo.h 150 #define ILL_PRVOPC (__SI_FAULT|5) /* privileged opcode */
151 #define ILL_PRVREG (__SI_FAULT|6) /* privileged register */
  /external/ppp/pppd/
pppd.8 51 option from a privileged source cannot be overridden by a
52 non-privileged user.
85 contain privileged options, such as \fInoauth\fR, even if pppd
99 for this option from a privileged source cannot be overridden by a
100 non-privileged user.
121 is privileged if the \fInodefaultroute\fR option has been specified.
129 modem has already hung up. A value for this option from a privileged
130 source cannot be overridden by a non-privileged user.
150 for this option from a privileged source cannot be overridden by a
151 non-privileged user
    [all...]
  /external/openssh/contrib/cygwin/
ssh-host-config 193 csih_inform "However, this requires a non-privileged account called 'sshd'."
440 csih_inform "sshd requires. You need to have or to create a privileged"
450 csih_error_recoverable "There was a serious problem creating a privileged user."
470 # $password is empty, or $run_service_as is some privileged user and
593 --privileged )
608 echo " --user -u <account> privileged user for service."
609 echo " --pwd -w <passwd> Use \"pwd\" as password for privileged user."
610 echo " --privileged On Windows NT/2k/XP, require privileged user"
  /docs/source.android.com/src/devices/tech/security/
enhancements43.jd 41 the shell from acquiring privileged capabilities.</li>
  /external/chromium/chrome/browser/
mach_broker_mac.h 22 // the process. Running |task_for_pid()| is only allowed for privileged code.
  /external/webkit/Source/WebKit/chromium/public/
WebSecurityOrigin.h 72 // The empty WebSecurityOrigin is the least privileged WebSecurityOrigin.
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
serial.h 110 #define ASYNC_USR_MASK 0x3430 /* Legal flags that non-privileged
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
serial.h 110 #define ASYNC_USR_MASK 0x3430 /* Legal flags that non-privileged

Completed in 1070 milliseconds

1 2 3 4 5 6 7