HomeSort by relevance Sort by last modified time
    Searched refs:privileged (Results 1 - 24 of 24) sorted by null

  /external/chromium_org/remoting/host/
pairing_registry_delegate_win.h 24 // - |privileged| - contains the shared secrets of all pairings. This key must
30 // with appropriate access. |privileged| may be NULL if read-only access is
39 // |privileged| is optional and may be NULL. The caller retains ownership of
41 bool SetRootKeys(HKEY privileged, HKEY unprivileged);
pairing_registry_delegate_win.cc 107 bool PairingRegistryDelegateWin::SetRootKeys(HKEY privileged,
116 if (privileged) {
117 if (!DuplicateKeyHandle(privileged, &privileged_))
  /packages/apps/Mms/src/com/android/mms/transaction/
SmsReceiver.java 47 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) {
48 // If 'privileged' is false, it means that the intent was delivered to the base
52 if (!privileged && intent.getAction().equals(Intents.SMS_DELIVER_ACTION)) {
  /external/openssh/
uidswap.c 55 static int privileged = 0; variable
76 privileged = 0;
82 privileged = 0;
87 privileged = 1;
126 /* Propagate the privileged gid to all of our gids. */
129 /* Propagate the privileged uid to all of our uids. */
177 * Restores to the original (privileged) uid.
182 /* it's a no-op unless privileged */
183 if (!privileged) {
192 /* Set the effective uid back to the saved privileged uid. *
    [all...]
sshconnect.c 185 * Creates a (possibly privileged) socket for use as the ssh connection.
188 ssh_create_socket(int privileged, struct addrinfo *ai)
194 * If we are running as root and want to connect to a privileged
195 * port, bind our own socket to a privileged port.
197 if (privileged) {
329 * a privileged port will be allocated to make the connection.
    [all...]
configure     [all...]
  /packages/apps/CellBroadcastReceiver/src/com/android/cellbroadcastreceiver/
CellBroadcastReceiver.java 51 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) {
70 // If 'privileged' is false, it means that the intent was delivered to the base
74 if (privileged) {
82 if (privileged) {
94 if (privileged) {
  /external/chromium_org/third_party/mesa/src/docs/OLD/
MESA_trace.spec 64 that enjoys privileged access, or that they do not wish to separate
  /external/mesa3d/docs/OLD/
MESA_trace.spec 64 that enjoys privileged access, or that they do not wish to separate
  /external/openssh/contrib/cygwin/
ssh-user-config 225 --privileged )
239 echo " --privileged On Windows NT/2k/XP, assume privileged user"
ssh-host-config 193 csih_inform "However, this requires a non-privileged account called 'sshd'."
440 csih_inform "sshd requires. You need to have or to create a privileged"
450 csih_error_recoverable "There was a serious problem creating a privileged user."
470 # $password is empty, or $run_service_as is some privileged user and
593 --privileged )
608 echo " --user -u <account> privileged user for service."
609 echo " --pwd -w <passwd> Use \"pwd\" as password for privileged user."
610 echo " --privileged On Windows NT/2k/XP, require privileged user"
  /external/chromium_org/third_party/WebKit/Source/core/html/canvas/
WebGLRenderingContext.h 531 ExtensionTracker(bool privileged, bool draft, bool prefixed, const char** prefixes)
532 : m_privileged(privileged)
575 TypedExtensionTracker(RefPtr<T>& extensionField, bool privileged, bool draft, bool prefixed, const char** prefixes)
576 : ExtensionTracker(privileged, draft, prefixed, prefixes)
623 void registerExtension(RefPtr<T>& extensionPtr, bool privileged, bool draft, bool prefixed, const char** prefixes)
625 m_extensions.append(new TypedExtensionTracker<T>(extensionPtr, privileged, draft, prefixed, prefixes));
    [all...]
  /external/ppp/pppd/
pppd.h 121 #define OPT_PRIV 0x1000 /* privileged option */
226 extern int privileged; /* We were run by real-uid root */
677 int privileged));
681 int options_from_list __P((struct wordlist *, int privileged));
    [all...]
main.c 146 int privileged; /* we're running as real uid root */ variable
340 privileged = uid == 0;
369 privileged = 1;
406 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
    [all...]
options.c 220 "Take options from a privileged file", OPT_NOPRINT },
357 privileged_option = privileged;
477 ret = options_from_file(path, 0, 1, privileged);
    [all...]
auth.c 386 "Allow group members to use privileged options", OPT_PRIV | OPT_A2LIST },
458 * privgroup - allow members of the group to have privileged access.
474 privileged = 1;
1206 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) {
    [all...]
  /external/chromium_org/content/browser/browser_plugin/
browser_plugin_guest.h 366 bool privileged);
browser_plugin_guest.cc     [all...]
  /external/chromium_org/content/browser/renderer_host/
render_widget_host_impl.h 666 bool privileged);
    [all...]
render_widget_host_impl.cc     [all...]
  /external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/
x86cpu.gperf 339 privileged, x86_cpu_set, CPU_Priv
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
org.eclipse.equinox.util_1.0.200.v20100503.jar 
  /external/iproute2/doc/
api-ip6-flowlabels.tex 233 One idea is to disallow not privileged user to allocate flow
  /external/elfutils/tests/
run-allregs.sh 232 privileged registers:
    [all...]

Completed in 544 milliseconds