HomeSort by relevance Sort by last modified time
    Searched full:privileges (Results 51 - 75 of 323) sorted by null

1 23 4 5 6 7 8 91011>>

  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/sys/
io.h 28 permission off for that range. This call requires root privileges.
38 privileges. */
acct.h 90 ASU = 0x02, /* Used super-user privileges. */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/sys/
io.h 28 permission off for that range. This call requires root privileges.
38 privileges. */
acct.h 90 ASU = 0x02, /* Used super-user privileges. */
  /external/clang/test/Analysis/
security-syntax-checks.m 52 // <rdar://problem/6337132> CWE-273: Failure to Check Whether Privileges Were
67 setuid(2); // expected-warning{{The return value from the call to 'setuid' is not checked. If an error occurs in 'setuid', the following code may execute with unexpected privileges}}
68 setuid(0); // expected-warning{{The return value from the call to 'setuid' is not checked. If an error occurs in 'setuid', the following code may execute with unexpected privileges}}
80 setreuid(2,2); // expected-warning{{The return value from the call to 'setreuid' is not checked. If an error occurs in 'setreuid', the following code may execute with unexpected privileges}}
81 setregid(2,2); // expected-warning{{The return value from the call to 'setregid' is not checked. If an error occurs in 'setregid', the following code may execute with unexpected privileges}}
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/plat-mac/lib-scriptpackages/Finder/
Finder_items.py 200 """everyones privileges - """
212 """group privileges - """
256 """owner privileges - """
  /system/core/adb/
SERVICES.TXT 181 privileges and thus may not run on all devices. <path> is a full
208 It requires sufficient privileges but works as follow:
225 If the adbd daemon doesn't have sufficient privileges to open
  /external/chromium/chrome/browser/ui/cocoa/
keystone_promote_preflight.sh 18 # real user ID (dropping root privileges).
  /external/chromium_org/chrome/browser/mac/
keystone_promote_preflight.sh 18 # real user ID (dropping root privileges).
  /external/chromium_org/chrome/browser/ui/
browser_instant_controller.h 92 // privileges for any existing WebContents (that belong to the erstwhile
  /external/openssh/
README.privsep 16 chroot(2) to "/var/empty" and change its privileges to the "sshd" user
OVERVIEW 111 privileges are only used to make the connection (from a
112 privileged socket). Any extra privileges are dropped before
  /external/protobuf/python/
README.txt 65 This step may require superuser privileges.
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
acct.h 101 #define ASU 0x02 /* ... used super-user privileges */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/sys/
acct.h 90 ASU = 0x02, /* Used super-user privileges. */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
acct.h 101 #define ASU 0x02 /* ... used super-user privileges */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/
acct.h 101 #define ASU 0x02 /* ... used super-user privileges */
  /sdk/find_lock/
find_lock.cpp 189 // Open a process token that lets us adjust privileges
205 priv.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
208 &(priv.Privileges[0].Luid)); // lpLuid
607 if (gIsDebug) fprintf(stderr, "Warning: adusting privileges failed. Continuing anyway.\n");
609 if (gIsDebug) fprintf(stderr, "Privileges adjusted.\n"); // DEBUG remove lter
  /external/chromium_org/chrome/browser/extensions/
window_open_apitest.cc 422 // the new window has extension privileges.
459 // gives the new window extension privileges - even though the opening page
460 // does not have extension privileges, we break the script connection, so
  /external/chromium_org/chrome/installer/setup/
setup_util.cc 458 // Adjust the token's privileges to enable |privilege_name|. If this privilege
463 tp.Privileges[0].Luid = privilege_luid;
464 tp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
  /external/smack/src/org/jivesoftware/smackx/packet/
MUCOwner.java 30 * IQ packet that serves for granting and revoking ownership privileges, granting
31 * and revoking administrative privileges and destroying a room. All these operations
  /external/tcpdump/
config.h 133 /* define if should drop privileges by default */
136 /* define if should chroot when dropping privileges */
config.h.in 132 /* define if should drop privileges by default */
135 /* define if should chroot when dropping privileges */
  /bionic/libc/include/sys/
limits.h 172 #define _POSIX_CHOWN_RESTRICTED 1 /* yes, chown requires appropriate privileges */
  /development/ndk/platforms/android-3/include/sys/
limits.h 172 #define _POSIX_CHOWN_RESTRICTED 1 /* yes, chown requires appropriate privileges */

Completed in 1319 milliseconds

1 23 4 5 6 7 8 91011>>