/external/chromium_org/remoting/host/ |
pairing_registry_delegate_win.h | 24 // - |privileged| - contains the shared secrets of all pairings. This key must 30 // with appropriate access. |privileged| may be NULL if read-only access is 39 // |privileged| is optional and may be NULL. The caller retains ownership of 41 bool SetRootKeys(HKEY privileged, HKEY unprivileged);
|
pairing_registry_delegate_win.cc | 107 bool PairingRegistryDelegateWin::SetRootKeys(HKEY privileged, 116 if (privileged) { 117 if (!DuplicateKeyHandle(privileged, &privileged_))
|
/packages/apps/Mms/src/com/android/mms/transaction/ |
SmsReceiver.java | 47 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) { 48 // If 'privileged' is false, it means that the intent was delivered to the base 52 if (!privileged && intent.getAction().equals(Intents.SMS_DELIVER_ACTION)) {
|
/external/openssh/ |
uidswap.c | 55 static int privileged = 0; variable 76 privileged = 0; 82 privileged = 0; 87 privileged = 1; 126 /* Propagate the privileged gid to all of our gids. */ 129 /* Propagate the privileged uid to all of our uids. */ 177 * Restores to the original (privileged) uid. 182 /* it's a no-op unless privileged */ 183 if (!privileged) { 192 /* Set the effective uid back to the saved privileged uid. * [all...] |
sshconnect.c | 185 * Creates a (possibly privileged) socket for use as the ssh connection. 188 ssh_create_socket(int privileged, struct addrinfo *ai) 194 * If we are running as root and want to connect to a privileged 195 * port, bind our own socket to a privileged port. 197 if (privileged) { 329 * a privileged port will be allocated to make the connection. [all...] |
configure | [all...] |
/packages/apps/CellBroadcastReceiver/src/com/android/cellbroadcastreceiver/ |
CellBroadcastReceiver.java | 51 protected void onReceiveWithPrivilege(Context context, Intent intent, boolean privileged) { 70 // If 'privileged' is false, it means that the intent was delivered to the base 74 if (privileged) { 82 if (privileged) { 94 if (privileged) {
|
/external/chromium_org/third_party/mesa/src/docs/OLD/ |
MESA_trace.spec | 64 that enjoys privileged access, or that they do not wish to separate
|
/external/mesa3d/docs/OLD/ |
MESA_trace.spec | 64 that enjoys privileged access, or that they do not wish to separate
|
/external/openssh/contrib/cygwin/ |
ssh-user-config | 225 --privileged ) 239 echo " --privileged On Windows NT/2k/XP, assume privileged user"
|
ssh-host-config | 193 csih_inform "However, this requires a non-privileged account called 'sshd'." 440 csih_inform "sshd requires. You need to have or to create a privileged" 450 csih_error_recoverable "There was a serious problem creating a privileged user." 470 # $password is empty, or $run_service_as is some privileged user and 593 --privileged ) 608 echo " --user -u <account> privileged user for service." 609 echo " --pwd -w <passwd> Use \"pwd\" as password for privileged user." 610 echo " --privileged On Windows NT/2k/XP, require privileged user"
|
/external/chromium_org/third_party/WebKit/Source/core/html/canvas/ |
WebGLRenderingContext.h | 531 ExtensionTracker(bool privileged, bool draft, bool prefixed, const char** prefixes) 532 : m_privileged(privileged) 575 TypedExtensionTracker(RefPtr<T>& extensionField, bool privileged, bool draft, bool prefixed, const char** prefixes) 576 : ExtensionTracker(privileged, draft, prefixed, prefixes) 623 void registerExtension(RefPtr<T>& extensionPtr, bool privileged, bool draft, bool prefixed, const char** prefixes) 625 m_extensions.append(new TypedExtensionTracker<T>(extensionPtr, privileged, draft, prefixed, prefixes)); [all...] |
/external/ppp/pppd/ |
pppd.h | 121 #define OPT_PRIV 0x1000 /* privileged option */ 226 extern int privileged; /* We were run by real-uid root */ 677 int privileged)); 681 int options_from_list __P((struct wordlist *, int privileged)); [all...] |
main.c | 146 int privileged; /* we're running as real uid root */ variable 340 privileged = uid == 0; 369 privileged = 1; 406 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1) [all...] |
options.c | 220 "Take options from a privileged file", OPT_NOPRINT }, 357 privileged_option = privileged; 477 ret = options_from_file(path, 0, 1, privileged); [all...] |
auth.c | 386 "Allow group members to use privileged options", OPT_PRIV | OPT_A2LIST }, 458 * privgroup - allow members of the group to have privileged access. 474 privileged = 1; 1206 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { [all...] |
/external/chromium_org/content/browser/browser_plugin/ |
browser_plugin_guest.h | 366 bool privileged);
|
browser_plugin_guest.cc | [all...] |
/external/chromium_org/content/browser/renderer_host/ |
render_widget_host_impl.h | 666 bool privileged); [all...] |
render_widget_host_impl.cc | [all...] |
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/ |
x86cpu.gperf | 339 privileged, x86_cpu_set, CPU_Priv
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.equinox.util_1.0.200.v20100503.jar | |
/external/iproute2/doc/ |
api-ip6-flowlabels.tex | 233 One idea is to disallow not privileged user to allocate flow
|
/external/elfutils/tests/ |
run-allregs.sh | 232 privileged registers: [all...] |