/external/chromium_org/chromeos/cryptohome/ |
cryptohome_parameters.h | 103 int privileges); 110 // Privileges associated with key. Combination of |AuthKeyPrivileges| values. 111 int privileges; member in struct:cryptohome::KeyDefinition
|
homedir_methods.cc | 39 if (key_def.privileges != 0) { 40 KeyPrivileges* privileges = data->mutable_privileges(); local 41 privileges->set_mount(key_def.privileges & PRIV_MOUNT); 42 privileges->set_add(key_def.privileges & PRIV_ADD); 43 privileges->set_remove(key_def.privileges & PRIV_REMOVE); 44 privileges->set_update(key_def.privileges & PRIV_MIGRATE) 352 const KeyPrivileges& privileges = it->privileges(); local [all...] |
/external/chromium_org/sandbox/win/src/ |
restricted_token_unittest.cc | 345 ATL::CTokenPrivileges privileges; local 346 ASSERT_TRUE(restricted_token.GetPrivileges(&privileges)); 348 ASSERT_EQ(0, privileges.GetCount()); 366 ATL::CTokenPrivileges privileges; local 367 ASSERT_TRUE(restricted_token.GetPrivileges(&privileges)); 371 privileges.GetNamesAndAttributes(&privilege_names, 374 ASSERT_EQ(1, privileges.GetCount()); 376 for (unsigned int i = 0; i < privileges.GetCount(); ++i) { 393 ATL::CTokenPrivileges privileges; local 394 ASSERT_TRUE(restricted_token.GetPrivileges(&privileges)); [all...] |
/external/chromium_org/chrome/installer/setup/ |
setup_util_unittest.cc | 51 // Use SE_RESTORE_NAME as it is one of the many privileges that is available, 67 // First get the size of the buffer needed for |privileges| below. 73 TOKEN_PRIVILEGES* privileges = local 76 if (!::GetTokenInformation(token.Get(), TokenPrivileges, privileges, size, 87 for (int i = privileges->PrivilegeCount - 1; i >= 0 ; --i) { 88 LUID_AND_ATTRIBUTES& luid_and_att = privileges->Privileges[i];
|
/libcore/luni/src/test/java/tests/java/sql/ |
DatabaseMetaDataNotSupportedTest.java | 137 // grant SELECT privileges 155 // revoke SELECT privileges 166 assertFalse("No SELECT privileges", userMeta.allTablesAreSelectable()); 169 // revoke CREATE privileges 296 @KnownFailure("not supported. Privileges are not supported.") 456 @KnownFailure("not supported. Privileges are not supported.") 459 // case 1. Get privileges when no privilegies exist for one table 460 ResultSet privileges = meta.getTablePrivileges(conn.getCatalog(), "%", local 462 assertFalse("Some privilegies exist", privileges.next()); 463 privileges.close() [all...] |