/libcore/luni/src/test/java/tests/java/sql/ |
DatabaseMetaDataNotSupportedTest.java | 137 // grant SELECT privileges 155 // revoke SELECT privileges 166 assertFalse("No SELECT privileges", userMeta.allTablesAreSelectable()); 169 // revoke CREATE privileges 296 @KnownFailure("not supported. Privileges are not supported.") 456 @KnownFailure("not supported. Privileges are not supported.") 459 // case 1. Get privileges when no privilegies exist for one table 460 ResultSet privileges = meta.getTablePrivileges(conn.getCatalog(), "%", local 462 assertFalse("Some privilegies exist", privileges.next()); 463 privileges.close() [all...] |
/external/smack/src/org/jivesoftware/smackx/muc/ |
ParticipantStatusListener.java | 110 * Called when an administrator grants moderator privileges to a user. This means that the user 112 * subject plus all the partcipants privileges. 114 * @param participant the participant that was granted moderator privileges in the room 120 * Called when an administrator revokes moderator privileges from a user. This means that the 122 * modify room's subject plus all the partcipants privileges. 124 * @param participant the participant that was revoked moderator privileges in the room 150 * Called when an owner grants administrator privileges to a user. This means that the user 154 * @param participant the participant that was granted administrator privileges 160 * Called when an owner revokes administrator privileges from a user. This means that the user 164 * @param participant the participant that was revoked administrator privileges [all...] |
UserStatusListener.java | 80 * Called when an administrator grants moderator privileges to your user. This means that you 82 * subject plus all the partcipants privileges. 88 * Called when an administrator revokes moderator privileges from your user. This means that 90 * modify room's subject plus all the partcipants privileges. 112 * Called when an owner grants administrator privileges to your user. This means that you 120 * Called when an owner revokes administrator privileges from your user. This means that you
|
MultiUserChat.java | 73 * different privileges (e.g. Send messages to all occupants, Kick participants and visitors, [all...] |
/external/lzma/CPP/Windows/ |
MemoryLock.cpp | 51 (NULL, SE_LOCK_MEMORY_NAME, &(tp.Privileges[0].Luid)))
54 tp.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED: 0;
|
/external/libcap-ng/libcap-ng-0.7/ |
README | 3 for apps that may have too much privileges.
|
/external/libcap-ng/libcap-ng-0.7/docs/ |
capng_lock.3 | 11 capng_lock will take steps to prevent children of the current process to regain full privileges if the uid is 0. This should be called while possessing the CAP_SETPCAP capability in the kernel. This function will do the following if permitted by the kernel: Set the NOROOT option on for PR_SET_SECUREBITS, set the NOROOT_LOCKED option to on for PR_SET_SECUREBITS, set the PR_NO_SETUID_FIXUP option on for PR_SET_SECUREBITS, and set the PR_NO_SETUID_FIXUP_LOCKED option on for PR_SET_SECUREBITS.
|
/external/chromium_org/chrome/test/pyautolib/chromeos/ |
enable_testing.py | 12 Needs to be run with superuser privileges. 43 assert os.geteuid() == 0, 'Needs superuser privileges.'
|
/external/chromium_org/chrome/test/pyautolib/ |
mock_pref_pane.py | 47 # Elevate privileges, otherwise tool_script executes with EUID != 0. 52 # Drop privileges, start the launchd job as the logged-in user. 66 # Elevate privileges, otherwise tool_script executes with EUID != 0. 71 # Drop privileges, stop the launchd job as the logged-in user. 85 # Elevate privileges, otherwise tool_script executes with EUID != 0. 90 # Drop privileges and send SIGHUP to org.chromium.chromoting
|
policy_posix_util.py | 14 assert os.geteuid() == 0, 'Need superuser privileges'
|
/external/chromium_org/sandbox/win/src/ |
restricted_token_unittest.cc | 345 ATL::CTokenPrivileges privileges; local 346 ASSERT_TRUE(restricted_token.GetPrivileges(&privileges)); 348 ASSERT_EQ(0, privileges.GetCount()); 366 ATL::CTokenPrivileges privileges; local 367 ASSERT_TRUE(restricted_token.GetPrivileges(&privileges)); 371 privileges.GetNamesAndAttributes(&privilege_names, 374 ASSERT_EQ(1, privileges.GetCount()); 376 for (unsigned int i = 0; i < privileges.GetCount(); ++i) { 393 ATL::CTokenPrivileges privileges; local 394 ASSERT_TRUE(restricted_token.GetPrivileges(&privileges)); [all...] |
/external/kernel-headers/original/linux/ |
prctl.h | 134 * If no_new_privs is set, then operations that grant new privileges (i.e. 138 * Operations that merely manipulate or drop existing privileges (setresuid, 139 * capset, etc.) will still work. Drop those privileges if you want them gone.
|
/external/chromium_org/base/process/ |
process_handle_win.cc | 24 // We try to limit privileges granted to the handle. If you need this 26 // adding more privileges here.
|
/external/chromium_org/chrome/test/base/ |
chrome_process_util.h | 68 // information for another process requires privileges that a normal executable 70 // it has the needed privileges) and processing its output. The API is provided
|
/external/chromium_org/ppapi/api/trusted/ |
ppb_broker_trusted.idl | 8 * access to a trusted broker with greater privileges than the plugin. 18 * with greater privileges than the plugin. The interface only supports
|
/external/dnsmasq/contrib/Solaris10/ |
dnsmasq.xml | 36 <method_credential user='root' group='root' privileges='all'/>
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.eclipse.build.tools/scripts_cvs/searchcvs/ |
mysql-users.dump | 14 GRANT ALL PRIVILEGES ON `dbaccessrw`.* TO 'dbaccessrw'@'localhost';
|
/external/eigen/ |
INSTALL | 31 The "make install" step may require administrator privileges.
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/sys/ |
fsuid.h | 28 other privileges (such as who can send signals at the process). */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/sys/ |
fsuid.h | 28 other privileges (such as who can send signals at the process). */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/sys/ |
fsuid.h | 28 other privileges (such as who can send signals at the process). */
|
/docs/source.android.com/src/devices/tech/security/ |
enhancements43.jd | 58 of new privileges prior to execution application code. This 60 elevate privileges via execve. (This requires Linux kernel version 3.5
|
/external/chromium_org/ppapi/c/trusted/ |
ppb_broker_trusted.h | 25 * access to a trusted broker with greater privileges than the plugin. 35 * with greater privileges than the plugin. The interface only supports
|
/external/chromium_org/tools/win/split_link/ |
install_split_link.py | 63 "Not running with Administrator privileges?") 93 "Not running with Administrator privileges?" % link)
|
/external/tcpdump/ |
acconfig.h | 132 /* define if should drop privileges by default */ 135 /* define if should chroot when dropping privileges */
|