/aoo41x/main/stoc/test/security/ |
H A D | test_security.policy | 5 permission com.sun.star.io.FilePermission "file:///home/dbo/-", ",,read , write "; 6 permission com.sun.star.io.FilePermission "-", "read ,write"; 7 permission com.sun.star.connection.SocketPermission "dbo-1:1024-", "listen"; 8 permission com.sun.star.security.RuntimePermission "DBO"; 15 permission com.sun.star.security.RuntimePermission "JBU"; 18 …permission com.sun.star.io.FilePermission "*",",read,write";}; grant user "root"{permission com.su… 27 permission com.sun.star.security.RuntimePermission "DEF"; 28 permission com.sun.star.io.FilePermission "file:///usr/bin/*", "read"; 29 permission com.sun.star.io.FilePermission "file:///usr/bin/*", "read"; 30 permission com.sun.star.io.FilePermission "file:///tmp/-", "read, write"; [all …]
|
/aoo41x/main/bean/test/applet/oooapplet/ |
H A D | bean.policy | 6 /* permission java.lang.RuntimePermission "loadLibrary.*"; */ 7 /* permission java.io.FilePermission "C:\\Program Files\\OpenOffice.org 2.0\\program\\*", "read"; … 8 /* permission java.io.FilePermission "C:\\Program Files\\OpenOffice.org 2.0\\program\\classes\\*",… 9 /* permission java.util.PropertyPermission "*", "read"; */ 13 permission java.security.AllPermission; 14 permission java.lang.RuntimePermission "queuePrintJob";
|
/aoo41x/main/udkapi/com/sun/star/io/ |
H A D | FilePermission.idl | 31 /** This permission represents access to a file or directory. 50 <li><code>read</code> -- read permission</li> 51 <li><code>write</code> -- write permission</li> 52 <li><code>execute</code> -- execute permission</li> 53 <li><code>delete</code> -- delete permission</li> 61 The <code>"<<ALL FILES>>"</code> permission with write action is 62 especially dangerous. This grants permission to write to the entire file system.
|
/aoo41x/main/udkapi/com/sun/star/security/ |
H A D | XAccessController.idl | 56 permission should be allowed or denied, based on the security policy 58 The semantics are equivalent to the security permission classes of 68 permission to be checked 96 access control context to restrict permission; null for no restriction 125 access control context to restrict permission; null for no restriction
|
H A D | RuntimePermission.idl | 31 /** This permission grants runtime access to some named functionality. 33 but no actions list; you either have the named permission or you don't. 39 /** name of permission
|
H A D | AllPermission.idl | 31 /** The AllPermission is a permission that implies all other permissions. 37 permission to code. This permission should be used only during testing,
|
H A D | AccessControlException.idl | 36 /** Exception notifying a lacking permission to access data or execute code 37 thus it is thrown if permission ought to be denied. 43 /** lacking permission.
|
H A D | XAccessControlContext.idl | 56 permission should be allowed or denied, based on this context. 57 The semantics are equivalent to the security permission classes of 67 permission to be checked
|
H A D | AccessController.idl | 46 to assure that permission checks are not corrupted via insecure inter-process
|
/aoo41x/main/ |
H A D | LICENSE | 503 permission. 538 permission notice appear in supporting documentation. 741 software without specific prior written permission. 814 prior written permission. 917 this software without specific prior written permission. 1013 notice and this permission notice appear in all copies. 1073 software without specific prior written permission. 1246 prior written permission. For written permission, please contact 1251 permission of the OpenSSL Project. 1806 permission. [all …]
|
H A D | aclocal.m4 | 6 # gives unlimited permission to copy and/or distribute it, 178 # gives unlimited permission to copy and/or distribute it, 382 # gives unlimited permission to copy and/or distribute it,
|
/aoo41x/main/udkapi/com/sun/star/connection/ |
H A D | SocketPermission.idl | 32 /** This permission represents access to a network via sockets. 63 the following permission 70 Similarly, if the following permission 79 Granting code permission to accept or make connections to remote hosts may be
|
/aoo41x/main/scripting/source/storage/ |
H A D | ScriptSecurityManager.cxx | 326 security::RuntimePermission permission; in checkPermission() local 327 permission.Name = OUString::createFromAscii( "execute" ).concat( scriptStorageURL ); in checkPermission() 328 aPermission <<= permission; in checkPermission()
|
/aoo41x/main/cui/source/dialogs/ |
H A D | scriptdlg.src | 228 Text [ en-US ] = " You do not have permission to delete this object."; 244 Text [ en-US ] = " You do not have permission to create this object."; 256 Text [ en-US ] = " You do not have permission to rename this object.";
|
/aoo41x/main/i18npool/source/breakiterator/data/ |
H A D | LICENSE_INFO | 49 copyright notice(s) and this permission notice appear in all copies of 51 permission notice appear in supporting documentation.
|
/aoo41x/main/filter/source/pdf/ |
H A D | impdialog.src | 44 Text[ en-US ] = "Set permission password"; 570 Text[ en-US ] = "File encryption and permission"; 635 Text [ en-US ] = "No permission password set";
|
/aoo41x/main/offapi/com/sun/star/deployment/ |
H A D | XPackageManager.idl | 244 write permission. Only the XPackageManager implementation knows the 246 to check "externally" for write permission.
|
/aoo41x/main/uui/source/ |
H A D | lockfailed.src | 36 …uld not be locked for exclusive access by %PRODUCTNAME, due to missing permission to create a lock…
|
/aoo41x/main/winaccessibility/source/UAccCOMIDL/ |
H A D | ia2_api_all.idl | 26 * permission. 83 * permission. 274 * permission. 501 * permission. 721 * permission. 1016 * permission. 1225 * permission. 1319 permission. 1917 * permission. 2040 * permission. [all …]
|
/aoo41x/main/apple_remote/ |
H A D | KeyspanFrontRowControl.m | 18 * The above copyright notice and this permission notice shall be included
|
H A D | RemoteControlContainer.m | 18 * The above copyright notice and this permission notice shall be included
|
H A D | RemoteControl.m | 18 * The above copyright notice and this permission notice shall be included
|
H A D | AppleRemote.m | 18 * The above copyright notice and this permission notice shall be included
|
H A D | RemoteMainController.m | 17 * The above copyright notice and this permission notice shall be included
|
/aoo41x/main/icc/ |
H A D | SampleICC-1.3.2.patch | 151 - * written permission. For written permission, please see 382 - << " of a readable file (i.e. you do not have permission to read that" 383 - << " file, or you do not have permission to read some directory" 473 + * written permission. For written permission, please see 711 + << " of a readable file (i.e. you do not have permission to read that" 712 + << " file, or you do not have permission to read some directory"
|