HomeSort by relevance Sort by last modified time
    Searched full:privileges (Results 26 - 50 of 322) sorted by null

12 3 4 5 6 7 8 91011>>

  /frameworks/base/core/java/android/content/pm/
UserInfo.java 45 * User with administrative privileges. Such a user can create and
56 * Indicates the user has restrictions in privileges, in addition to those for normal users.
  /external/chromium_org/sandbox/win/src/
restricted_token.h 113 // Lists all privileges in the token and add them to the list of privileges
129 // Adds a privilege to the list of privileges to remove in the restricted
183 // The list of privileges to remove in the restricted token.
restricted_token.cc 285 // Get the list of privileges in the token
309 // Build the list of privileges to disable
316 if (token_privileges->Privileges[i].Luid.HighPart == luid.HighPart &&
317 token_privileges->Privileges[i].Luid.LowPart == luid.LowPart) {
324 privileges_to_disable_.push_back(token_privileges->Privileges[i].Luid);
  /external/chromium_org/sql/
error_delegate_util.cc 47 // Presumably either transient or we don't have the privileges to
  /external/kernel-headers/original/linux/
securebits.h 12 /* When set UID 0 has no special privileges. When unset, we support
  /external/libcap-ng/libcap-ng-0.7/docs/
capng_change_id.3 11 This function will change uid and gid to the ones given while retaining the capabilities previously specified in capng_update. It is not necessary and perhaps better if capng_apply has not been called prior to this function so that all necessary privileges are still intact. The caller is required to have CAP_SETPCAP capability still active before calling this function.
  /external/libcap-ng/libcap-ng-0.7/utils/
captest.8 26 This prevents the ability for child processes to regain privileges if the uid is 0.
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
securebits.h 12 /* When set UID 0 has no special privileges. When unset, we support
  /external/chromium/third_party/libjingle/source/talk/base/
thread.h 65 // handle will, on Win32, be opened with only synchronization privileges -
67 // write additional code to adjust the privileges, or call a different
71 // be able to get synchronization privileges, in which case the result
  /external/chromium_org/chrome/installer/setup/
setup_util_unittest.cc 51 // Use SE_RESTORE_NAME as it is one of the many privileges that is available,
67 // First get the size of the buffer needed for |privileges| below.
72 TOKEN_PRIVILEGES* privileges = local
75 if (!::GetTokenInformation(token, TokenPrivileges, privileges, size, &size)) {
85 for (int i = privileges->PrivilegeCount - 1; i >= 0 ; --i) {
86 LUID_AND_ATTRIBUTES& luid_and_att = privileges->Privileges[i];
  /external/chromium_org/chrome/test/pyautolib/
chromoting_helper.py 37 assert os.geteuid() == 0, 'Need superuser privileges'
112 assert os.geteuid() == 0, 'Need superuser privileges'
121 assert os.geteuid() == 0, 'Need superuser privileges'
  /external/chromium/chrome/browser/ui/cocoa/
keystone_promote_postflight.sh 15 # real user ID (dropping root privileges).
  /external/chromium_org/chrome/browser/mac/
keystone_promote_postflight.sh 15 # real user ID (dropping root privileges).
  /external/chromium_org/third_party/mesa/src/bin/
installmesa 17 echo "***** Mesa installation - You may need root privileges to do this *****"
  /external/compiler-rt/BlocksRuntime/tests/
makefile 51 # <rdar://problem/6456031> ER: option to not require extra privileges (-nosudo or somesuch)
  /external/mesa3d/bin/
installmesa 17 echo "***** Mesa installation - You may need root privileges to do this *****"
  /external/openssh/
ssh.h 88 * sshd will change its privileges to this user and its
  /external/chromium_org/chrome/test/pyautolib/chromeos/
suid_actions.py 8 Needs to be run with superuser privileges, typically using the
42 assert os.geteuid() == 0, 'Needs superuser privileges.'
  /external/dropbear/debian/
implicit 8 @test "`id -u`" -eq 0 || sh -cx '! : need root privileges'
21 @test "`id -u`" -eq 0 || sh -cx '! : need root privileges'
  /external/e2fsprogs/util/
copy_sparse.c 3 * (requires root privileges)
57 fprintf(stderr, "No permission to use FIBMAP ioctl; must have root privileges\n");
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_priv.sgml 29 to be run with root privileges.</para>
40 privileges (usually, root user). It opens a UNIX domain socket for each
  /frameworks/base/core/java/android/bluetooth/
BluetoothServerSocket.java 82 * insufficient privileges
97 * insufficient privileges
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/sys/
io.h 28 permission off for that range. This call requires root privileges.
38 privileges. */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/sys/
io.h 28 permission off for that range. This call requires root privileges.
38 privileges. */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/sys/
io.h 28 permission off for that range. This call requires root privileges.
38 privileges. */

Completed in 536 milliseconds

12 3 4 5 6 7 8 91011>>