/external/chromium_org/chrome/installer/setup/ |
setup_main.cc | [all...] |
uninstall.cc | [all...] |
/external/clang/lib/StaticAnalyzer/Checkers/ |
CheckSecuritySyntaxOnly.cpp | 678 // Check: Should check whether privileges are dropped successfully. 733 << "', the following code may execute with unexpected privileges";
|
/art/runtime/ |
thread.h | 182 // Transition from runnable into a state where mutator privileges are denied. Releases share of
|
/docs/source.android.com/src/devices/tech/security/ |
se-linux.jd | 116 <p>SELinux uses a whitelist approach, meaning it grants special privileges based
|
/external/chromium/chrome/browser/extensions/ |
extension_service.h | 351 // Checks if the privileges requested by |extension| have increased, and if
|
/external/chromium/chrome/browser/prefs/ |
pref_service.cc | 202 // Chromium hasn't sufficient privileges.
|
/external/chromium/chrome/browser/ui/webui/ |
app_launcher_handler.cc | 554 // Enable the extension immediately if its privileges weren't escalated.
|
/external/chromium/chrome/common/extensions/docs/ |
xhr.html | 340 requesting additional privileges, the extension can use
|
/external/chromium_org/base/ |
file_util.h | 374 // Is |path| writable only by a user with administrator privileges?
|
/external/chromium_org/chrome/browser/notifications/ |
notification_browsertest.cc | 589 // Requests notification privileges and verifies the infobar appears. [all...] |
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
app_codelab8_webresources.html | 11 <p>Sites on the internet are inherently a security risk and rendering arbitrary web pages directly into your application with elevated privileges would be a potential source of exploits.</p>
|
sencha_framework.html | 121 The media player app needs some higher privileges to render the Ext JS components.
|
/external/chromium_org/chrome/common/extensions/ |
extension_messages.h | 353 // have more privileges than other extension content that might end up running
|
/external/chromium_org/chrome/installer/util/ |
shell_util.h | 479 // when elevating and calling setup.exe with admin privileges as described
|
/external/chromium_org/content/browser/ |
site_instance_impl_unittest.cc | 557 // Test to ensure that pages that require certain privileges are grouped
|
/external/chromium_org/sync/engine/ |
sync_scheduler_impl.cc | 661 // privileges. Everyone else should use NORMAL_PRIORITY.
|
/external/clang/www/ |
hacking.html | 288 privileges, the preferred way is to send patch files to the
|
/external/dropbear/ |
CHANGES | 86 allow authenticated users to gain elevated privileges. All multi-user systems
|
svr-chansession.c | 868 /* Clean up, drop to user privileges, set up the environment and execute
|
/external/iputils/ |
ping_common.c | 204 fprintf(stderr, "This version of ping should NOT run with privileges. Aborting\n");
|
/frameworks/native/cmds/atrace/ |
atrace.cpp | 698 "privileges.\n", name);
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
imputil.py | 421 Presuming the appropriate privileges exist, the bytecodes will be
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_posix.py | 510 raise unittest.SkipTest("not enough privileges")
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
imputil.py | 421 Presuming the appropriate privileges exist, the bytecodes will be
|