/external/chromium_org/remoting/host/ |
H A D | pairing_registry_delegate_win.h | 35 // - |privileged| - contains the shared secrets of all pairings. This key must 41 // with appropriate access. |privileged| may be NULL if read-only access is 50 // |privileged| is optional and may be NULL. The caller retains ownership of 52 bool SetRootKeys(HKEY privileged, HKEY unprivileged);
|
H A D | daemon_process_win.cc | 311 base::win::RegKey privileged; local 312 result = privileged.Open(root.Handle(), kPairingRegistryClientsKeyName, 331 pairing_registry_privileged_key_.Set(privileged.Take());
|
H A D | pairing_registry_delegate_win.cc | 106 bool PairingRegistryDelegateWin::SetRootKeys(HKEY privileged, argument 115 if (privileged) { 116 if (!DuplicateKeyHandle(privileged, &privileged_)) 152 // Enumerate and delete the values in the privileged and unprivileged keys
|
/external/chromium_org/remoting/host/setup/ |
H A D | me2me_native_messaging_host_main.cc | 216 // Only try to open the privileged key if the current process is elevated. 217 base::win::RegKey privileged; local 219 result = privileged.Open(root.Handle(), kPairingRegistryClientsKeyName, 232 if (!delegate->SetRootKeys(privileged.Take(), unprivileged.Take()))
|
/external/chromium_org/third_party/mesa/src/docs/OLD/ |
H A D | MESA_trace.spec | 64 that enjoys privileged access, or that they do not wish to separate
|
/external/mesa3d/docs/OLD/ |
H A D | MESA_trace.spec | 64 that enjoys privileged access, or that they do not wish to separate
|
/external/ppp/pppd/ |
H A D | pppd.h | 121 #define OPT_PRIV 0x1000 /* privileged option */ 226 extern int privileged; /* We were run by real-uid root */ 677 int privileged)); 681 int options_from_list __P((struct wordlist *, int privileged));
|
H A D | main.c | 146 int privileged; /* we're running as real uid root */ variable 340 privileged = uid == 0; 369 privileged = 1; 406 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
|
H A D | options.c | 220 "Take options from a privileged file", OPT_NOPRINT }, 357 privileged_option = privileged; 477 ret = options_from_file(path, 0, 1, privileged);
|
H A D | auth.c | 386 "Allow group members to use privileged options", OPT_PRIV | OPT_A2LIST }, 458 * privgroup - allow members of the group to have privileged access. 474 privileged = 1; 1206 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { 2204 return allow_any_ip || privileged || !have_route_to(addr);
|
/external/chromium_org/content/browser/browser_plugin/ |
H A D | browser_plugin_guest.h | 253 bool privileged);
|
H A D | browser_plugin_guest.cc | 635 bool privileged) { 633 OnLockMouse(bool user_gesture, bool last_unlocked_by_target, bool privileged) argument
|
/external/chromium_org/content/browser/renderer_host/ |
H A D | render_widget_host_impl.h | 641 bool privileged);
|
H A D | render_widget_host_impl.cc | 1718 bool privileged) { 1729 if (privileged && allow_privileged_mouse_lock_) { 1716 OnLockMouse(bool user_gesture, bool last_unlocked_by_target, bool privileged) argument
|
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/ |
H A D | x86cpu.gperf | 339 privileged, x86_cpu_set, CPU_Priv
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.equinox.util_1.0.200.v20100503.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/iproute2/doc/ |
H A D | api-ip6-flowlabels.tex | 233 One idea is to disallow not privileged user to allocate flow
|
/external/lldb/source/Plugins/Instruction/ARM/ |
H A D | EmulateInstructionARM.cpp | 13095 bool privileged = CurrentModeIsPrivileged(); local 13116 if (privileged) 13122 if (privileged) 13126 if (privileged)
|