/external/apache-harmony/logging/src/test/java/org/apache/harmony/logging/tests/java/util/logging/ |
ConsoleHandlerTest.java | 147 * Test close() when having sufficient privilege, and a record has been 167 * Test close() when having sufficient privilege, and an output stream that 185 * Test close() when having sufficient privilege, and no record has been
|
/frameworks/base/telephony/java/com/android/internal/telephony/ |
CarrierAppUtils.java | 54 * inserts a SIM which causes that application to gain carrier privilege (indicating a "match"), 94 * not yet read the carrier privilege rules. However, since telephony is initialized later on
|
/art/runtime/arch/x86/ |
thread_x86.cc | 127 uint16_t rpl = 3; // Requested privilege level
|
/bionic/libc/kernel/uapi/linux/ |
ipmi.h | 54 unsigned char privilege; member in struct:ipmi_lan_addr
|
/cts/tests/tests/security/src/android/security/cts/ |
BannedFilesTest.java | 33 * Detect devices vulnerable to the cmdclient privilege escalation bug.
|
/development/ndk/platforms/android-21/include/linux/ |
ipmi.h | 54 unsigned char privilege; member in struct:ipmi_lan_addr
|
/external/boringssl/src/crypto/x509v3/ |
v3_enum.c | 74 {CRL_REASON_PRIVILEGE_WITHDRAWN, "Privilege Withdrawn", "privilegeWithdrawn"},
|
/external/chromium-trace/catapult/dashboard/dashboard/ |
datastore_hooks.py | 62 This should be called ONLY by handlers that have checked privilege immediately
|
/external/kernel-headers/original/uapi/linux/ |
kfd_ioctl.h | 201 uint32_t NotPresent; /* Page not present or supervisor privilege */
|
prctl.h | 168 * Changing LSM security domain is considered a new privilege. So, for example,
|
/external/libcap/contrib/ |
pcaps4suid0 | 187 echo "Following the idea of setuid - granting a binary the privilege regardless"
|
/external/libcap/doc/ |
capsh.1 | 97 In a non-pure capability mode, the kernel provides liberal privilege
|
/external/libcap/libcap/include/uapi/linux/ |
prctl.h | 141 * Changing LSM security domain is considered a new privilege. So, for example,
|
/external/libcap-ng/libcap-ng-0.7/utils/ |
captest.c | 77 printf("SUCCESS - PRIVILEGE ESCALATION POSSIBLE\n");
|
/external/valgrind/include/vki/ |
vki-xen-x86.h | 115 vki_uint8_t flags; /* 0-3: privilege level; 4: clear event enable? */
|
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_privsep.c | 2 * WPA Supplicant - Layer2 packet handling with privilege separation
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
UiccCard.java | 167 // Reload the carrier privilege rules if necessary. 168 log("Before privilege rules: " + mCarrierPrivilegeRules + " : " + mCardState); 281 * Notifies handler when carrier privilege rules are loaded. 656 * Returns true if there are some carrier privilege rules loaded and specified.
|
/libcore/ojluni/src/main/java/sun/security/x509/ |
ReasonFlags.java | 212 if (isSet(7)) s += " Privilege Withdrawn\n";
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/sys/ |
io.h | 36 /* Set the I/O privilege level to LEVEL. If LEVEL>3, permission to
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/i386-linux-gnu/sys/ |
io.h | 36 /* Set the I/O privilege level to LEVEL. If LEVEL>3, permission to
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/x86_64-linux-gnu/sys/ |
io.h | 36 /* Set the I/O privilege level to LEVEL. If LEVEL>3, permission to
|
/prebuilts/ndk/current/platforms/android-21/arch-arm/usr/include/linux/ |
ipmi.h | 54 unsigned char privilege; member in struct:ipmi_lan_addr
|
/prebuilts/ndk/current/platforms/android-21/arch-arm64/usr/include/linux/ |
ipmi.h | 54 unsigned char privilege; member in struct:ipmi_lan_addr
|
/prebuilts/ndk/current/platforms/android-21/arch-mips/usr/include/linux/ |
ipmi.h | 54 unsigned char privilege; member in struct:ipmi_lan_addr
|
/prebuilts/ndk/current/platforms/android-21/arch-mips64/usr/include/linux/ |
ipmi.h | 54 unsigned char privilege; member in struct:ipmi_lan_addr
|