HomeSort by relevance Sort by last modified time
    Searched full:privilege (Results 1 - 25 of 192) sorted by null

1 2 3 4 5 6 7 8

  /external/chromium_org/net/data/ftp/
dir-listing-vms-6 5 <%SYSTEM-F-NOPRIV, insufficient privilege or object protection violation>
7 <%SYSTEM-F-NOPRIV, insufficient privilege or object protection violation>
  /external/chromium_org/base/process/
launch.cc 44 // To prevent accidental privilege sharing to an untrusted child, processes
  /external/wpa_supplicant_8/src/common/
privsep_commands.h 2 * WPA Supplicant - privilege separation commands
  /external/chromium_org/chrome/browser/download/
download_danger_prompt.h 18 // workflow means that the chrome://downloads page no longer has the privilege
21 // privilege.
  /external/chromium_org/chrome/common/extensions/permissions/
chrome_permission_message_provider.h 51 // Returns true if |new_permissions| has an elevated API privilege level
58 // privilege level compared to |old_permissions|.
  /external/chromium_org/chrome/installer/setup/
setup_util.h 118 // This class will enable the privilege defined by |privilege_name| on the
119 // current process' token. The privilege will be disabled upon the
129 // Always returns true unless the privilege could not be enabled.
133 // Always true unless the privilege could not be enabled.
137 // preemptively should enabling the privilege fail in the constructor.
140 // The previous state of the privilege this object is responsible for. As set
  /external/chromium_org/native_client_sdk/src/examples/api/mouse_lock/
index.html 40 or tab fullscreen privilege.</li>
42 or tab fullscreen privilege.</li>
  /cts/tests/tests/security/src/android/security/cts/
IntentSenderRemovalTest.java 26 * Make sure the DebugIntentSender activity, which allows privilege escalation of intent caller
  /external/chromium_org/chrome/browser/ui/extensions/
accelerator_priority.h 10 // when bound by an extension that requests the privilege to override the
  /external/chromium_org/third_party/WebKit/ManualTests/
liveconnect-security-exception.html 16 <p>This test checks for a regression against <i>rdar://problem/4151132 REGRESSION: Some applet liveconnect calls throws privilege exception.</i>.</p>
  /external/chromium_org/third_party/ots/
README 13 privilege.
  /external/clang/test/Rewriter/
rewrite-foreach-in-block.mm 25 for (I *privilege in [ace ARR]) { }
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_priv.sgml 11 <refpurpose>wpa_supplicant privilege separation helper</refpurpose>
27 <para><command>wpa_priv</command> is a privilege separation helper that
34 can be run as non-root user. Privilege separation restricts the effects
54 <command>wpa_supplicant</command> with privilege separation:</para>
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/sys/
perm.h 31 /* Change I/O privilege level. */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/sys/
perm.h 31 /* Change I/O privilege level. */
  /external/chromium_org/sandbox/win/src/
restricted_token.h 129 // Adds a privilege to the list of privileges to remove in the restricted
131 // Parameter: privilege is the privilege name to remove. This is the string
132 // representing the privilege. (e.g. "SeChangeNotifyPrivilege").
139 unsigned DeletePrivilege(const wchar_t *privilege);
  /external/chromium_org/chromeos/cryptohome/
homedir_methods.h 66 // Key used in |auth| should have PRIV_ADD privilege.
77 // Key used in |auth| should have PRIV_AUTHORIZED_UPDATE privilege.
  /external/chromium_org/extensions/common/permissions/
permission_message_provider.h 47 // Returns true if |new_permissions| has a greater privilege level than
  /external/kernel-headers/original/uapi/linux/
securebits.h 26 set*uid to gain/lose privilege, transitions to/from uid 0 cause
  /external/libcap-ng/libcap-ng-0.7/utils/
captest.8 9 You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if privilege escalation is possible. But do not leave this app setuid root after you are don testing so that an attacker cannot take advantage of it.
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/linux/
securebits.h 26 set*uid to gain/lose privilege, transitions to/from uid 0 cause
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/
securebits.h 26 set*uid to gain/lose privilege, transitions to/from uid 0 cause
  /external/chromium_org/remoting/host/win/
launch_process_with_token.cc 149 // Creates a copy of the current process with SE_TCB_NAME privilege enabled.
158 // Get the LUID for the SE_TCB_NAME privilege.
163 PLOG(ERROR) << "Failed to lookup the LUID for the SE_TCB_NAME privilege";
167 // Enable the SE_TCB_NAME privilege.
170 PLOG(ERROR) << "Failed to enable SE_TCB_NAME privilege in a token";
419 // Temporarily enable the SE_TCB_NAME privilege as it is required by
  /external/chromium_org/extensions/browser/
process_map.h 43 // But we only allow high-privilege operations to be performed by an extension
106 // hosted in another extension's process (privilege level needs to be
107 // downgraded) or in a web page's process (privilege level needs to be
  /external/smack/src/org/jivesoftware/smackx/packet/
MUCAdmin.java 97 * @param role the privilege level of an occupant within a room.
156 * Returns the temporary position or privilege level of an occupant within a room. The
161 * @return the privilege level of an occupant within a room.

Completed in 1319 milliseconds

1 2 3 4 5 6 7 8