/libcore/ojluni/src/main/java/java/net/ |
InetAddress.java | 394 * privilege can be obtained, otherwise it will try to establish 418 * privilege can be obtained, otherwise it will try to establish [all...] |
/build/tools/releasetools/ |
build_image.py | 458 # not writable even with root privilege. It only affects devices using
|
/device/google/contexthub/firmware/inc/platform/stm32f4xx/cmsis/ |
core_cm0.h | 290 uint32_t nPRIV:1; /*!< bit: 0 Execution privilege in Thread mode */
[all...] |
core_cm0plus.h | 301 uint32_t nPRIV:1; /*!< bit: 0 Execution privilege in Thread mode */
[all...] |
core_sc000.h | 296 uint32_t nPRIV:1; /*!< bit: 0 Execution privilege in Thread mode */
[all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/cognito/identity/ |
layer1.py | 45 privilege AWS credentials.
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/java/lang/ |
ClassTest.java | 179 final Permission privCheckPermission = new BasicPermission("Privilege check") {
|
/libcore/ojluni/src/main/java/java/util/logging/ |
FileHandler.java | 585 // So it is safe to raise privilege here.
|
/packages/apps/Settings/src/com/android/settings/users/ |
AppRestrictionsFragment.java | 656 // Prevent potential privilege escalation [all...] |
/packages/apps/TvSettings/Settings/src/com/android/tv/settings/users/ |
AppRestrictionsFragment.java | 543 // Prevent potential privilege escalation [all...] |
/system/sepolicy/ |
domain.te | 480 # script with differing privilege, define a domain and set up a transition.
|
/external/minijail/ |
libminijail.c | [all...] |
/packages/apps/Dialer/src/com/android/dialer/dialpad/ |
DialpadFragment.java | [all...] |
/cts/tests/tests/permission/src/android/permission/cts/ |
FileSystemPermissionTest.java | [all...] |
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/sts/ |
connection.py | 41 to request temporary, limited-privilege credentials for AWS
|
/external/dbus/ |
NEWS | 234 helper doesn't obey environment variables to avoid privilege escalation
|
/external/google-breakpad/src/processor/ |
stackwalker_x86.cc | 414 // an independent execute privilege on memory pages.
|
/external/ipsec-tools/src/racoon/ |
privsep.c | 181 plog(LLV_ERROR, LOCATION, NULL, "privilege separation "
|
/external/libpcap/ |
inet.c | 226 * without sufficient privilege to open capture
|
/frameworks/base/docs/html/about/versions/marshmallow/ |
android-6.0-changes.jd | 346 Owners have the privilege of editing or removing any Wi-Fi configurations, including
|
/frameworks/base/docs/html/guide/components/ |
fundamentals.jd | 48 <p>In this way, the Android system implements the <em>principle of least privilege</em>. That is,
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/ |
WifiQualifiedNetworkSelector.java | 476 localLog("User has no privilege to overwrite the current priority"); [all...] |
/docs/source.android.com/src/security/bulletin/ |
2015-08-01.jd | 171 applications that exploit a privilege escalation vulnerability. If such an [all...] |
/external/autotest/site_utils/ |
lxc.py | [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
CertPathReviewerMessages.properties | [all...] |