HomeSort by relevance Sort by last modified time
    Searched full:privilege (Results 51 - 75 of 222) sorted by null

1 23 4 5 6 7 8 9

  /external/apache-harmony/logging/src/test/java/org/apache/harmony/logging/tests/java/util/logging/
ConsoleHandlerTest.java 147 * Test close() when having sufficient privilege, and a record has been
167 * Test close() when having sufficient privilege, and an output stream that
185 * Test close() when having sufficient privilege, and no record has been
  /frameworks/base/telephony/java/com/android/internal/telephony/
CarrierAppUtils.java 54 * inserts a SIM which causes that application to gain carrier privilege (indicating a "match"),
94 * not yet read the carrier privilege rules. However, since telephony is initialized later on
  /art/runtime/arch/x86/
thread_x86.cc 127 uint16_t rpl = 3; // Requested privilege level
  /bionic/libc/kernel/uapi/linux/
ipmi.h 54 unsigned char privilege; member in struct:ipmi_lan_addr
  /cts/tests/tests/security/src/android/security/cts/
BannedFilesTest.java 33 * Detect devices vulnerable to the cmdclient privilege escalation bug.
  /development/ndk/platforms/android-21/include/linux/
ipmi.h 54 unsigned char privilege; member in struct:ipmi_lan_addr
  /external/boringssl/src/crypto/x509v3/
v3_enum.c 74 {CRL_REASON_PRIVILEGE_WITHDRAWN, "Privilege Withdrawn", "privilegeWithdrawn"},
  /external/chromium-trace/catapult/dashboard/dashboard/
datastore_hooks.py 62 This should be called ONLY by handlers that have checked privilege immediately
  /external/kernel-headers/original/uapi/linux/
kfd_ioctl.h 201 uint32_t NotPresent; /* Page not present or supervisor privilege */
prctl.h 168 * Changing LSM security domain is considered a new privilege. So, for example,
  /external/libcap/contrib/
pcaps4suid0 187 echo "Following the idea of setuid - granting a binary the privilege regardless"
  /external/libcap/doc/
capsh.1 97 In a non-pure capability mode, the kernel provides liberal privilege
  /external/libcap/libcap/include/uapi/linux/
prctl.h 141 * Changing LSM security domain is considered a new privilege. So, for example,
  /external/libcap-ng/libcap-ng-0.7/utils/
captest.c 77 printf("SUCCESS - PRIVILEGE ESCALATION POSSIBLE\n");
  /external/valgrind/include/vki/
vki-xen-x86.h 115 vki_uint8_t flags; /* 0-3: privilege level; 4: clear event enable? */
  /external/wpa_supplicant_8/src/l2_packet/
l2_packet_privsep.c 2 * WPA Supplicant - Layer2 packet handling with privilege separation
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/
UiccCard.java 167 // Reload the carrier privilege rules if necessary.
168 log("Before privilege rules: " + mCarrierPrivilegeRules + " : " + mCardState);
281 * Notifies handler when carrier privilege rules are loaded.
656 * Returns true if there are some carrier privilege rules loaded and specified.
  /libcore/ojluni/src/main/java/sun/security/x509/
ReasonFlags.java 212 if (isSet(7)) s += " Privilege Withdrawn\n";
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/sys/
io.h 36 /* Set the I/O privilege level to LEVEL. If LEVEL>3, permission to
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/i386-linux-gnu/sys/
io.h 36 /* Set the I/O privilege level to LEVEL. If LEVEL>3, permission to
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/x86_64-linux-gnu/sys/
io.h 36 /* Set the I/O privilege level to LEVEL. If LEVEL>3, permission to
  /prebuilts/ndk/current/platforms/android-21/arch-arm/usr/include/linux/
ipmi.h 54 unsigned char privilege; member in struct:ipmi_lan_addr
  /prebuilts/ndk/current/platforms/android-21/arch-arm64/usr/include/linux/
ipmi.h 54 unsigned char privilege; member in struct:ipmi_lan_addr
  /prebuilts/ndk/current/platforms/android-21/arch-mips/usr/include/linux/
ipmi.h 54 unsigned char privilege; member in struct:ipmi_lan_addr
  /prebuilts/ndk/current/platforms/android-21/arch-mips64/usr/include/linux/
ipmi.h 54 unsigned char privilege; member in struct:ipmi_lan_addr

Completed in 516 milliseconds

1 23 4 5 6 7 8 9