HomeSort by relevance Sort by last modified time
    Searched full:suid (Results 1 - 25 of 178) sorted by null

1 2 3 4 5 6 7 8

  /bionic/libc/bionic/
setresuid.c 31 extern int __setresuid(uid_t ruid, uid_t euid, uid_t suid);
33 int setresuid(uid_t ruid, uid_t euid, uid_t suid)
36 return __setresuid(ruid, euid, suid);
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/suid/
SuidFilesActivity.java 17 package com.android.cts.verifier.suid;
47 /** {@link Activity} that tries to find suid files. */
52 /** These programs are expected suid binaries. */
113 // Start searching for suid files using a background thread.
144 Log.e("Suid", "onDestroy");
151 /** {@link ListView} items display the basenames of the suid files. */
170 /** {@link AsyncTask} that searches the file system for suid files. */
  /external/libcap-ng/libcap-ng-0.7/utils/
captest.c 57 uid_t uid, euid, suid; local
67 getresuid(&uid, &euid, &suid);
75 getresuid(&uid, &euid, &suid);
86 printf("User credentials uid:%d euid:%d suid:%d\n", uid, euid, suid);
captest.8 9 You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if privilege escalation is possible. But do not leave this app setuid root after you are don testing so that an attacker cannot take advantage of it.
  /external/kernel-headers/original/linux/
securebits.h 13 inheritance of root-permissions and suid-root executable under
prctl.h 135 * execve) will either fail or not grant them. This affects suid/sgid,
ptrace.h 63 #define PT_PTRACE_CAP 0x00000008 /* ptracer can follow suid-exec */
  /hardware/samsung_slsi/exynos5/mobicore/common/MobiCore/inc/
mcSuid.h 37 /** Length of SUID. */
mcContainer.h 163 mcSuid_t suid; member in struct:__anon21518
173 mcSuid_t suid; member in struct:__anon21519
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
securebits.h 13 inheritance of root-permissions and suid-root executable under
  /libcore/luni/src/main/java/java/io/
ObjectStreamClass.java 41 * and SUID of the class as well as field names and types. Information inherited
50 // No need to compute the SUID for ObjectStreamClass, just use the value
54 // Name of the field that contains the SUID value (if present)
253 // Compute the SUID
382 * a java.lang.Class for which to compute the SUID
385 * @return the value of SUID of this class
391 * really need to compute SUID using SHAOutputStream
409 throw new RuntimeException("Error fetching SUID: " + iae);
578 throw new RuntimeException(e + " computing SHA-1/SUID");
    [all...]
  /frameworks/opt/timezonepicker/res/values-af/
arrays.xml 49 <item msgid="8972081011408691260">"Suid-Soedan"</item>
  /hardware/samsung_slsi/exynos5/mobicore/common/MobiCore/inc/TlCm/
cmp.h 171 mcSuid_t suid; member in struct:__anon21297
229 mcSuid_t suid; member in struct:__anon21304
270 mcSuid_t suid; member in struct:__anon21309
315 mcSuid_t suid; member in struct:__anon21315
340 mcSuid_t suid; member in struct:__anon21318
372 mcSuid_t suid; member in struct:__anon21323
475 mcSuid_t suid; member in struct:__anon21338
505 mcSuid_t suid; member in struct:__anon21343
1499 mcSuid_t suid; member in struct:__anon21487
    [all...]
  /cts/apps/CtsVerifier/src/com/android/cts/verifier/
TestResultsReport.java 50 * <test title="SUID File Scanner" class-name="com.android.cts.verifier.suid.SuidFilesActivity" result="not-executed" />
  /external/oprofile/libpp/
locate_images.cpp 24 int extra_images::suid; member in class:extra_images
28 uid(++suid)
locate_images.h 104 static int suid; member in class:extra_images
  /bionic/libc/include/sys/
mount.h 40 #define MS_NOSUID 2 /* Ignore suid and sgid bits */
  /development/ndk/platforms/android-3/include/sys/
mount.h 40 #define MS_NOSUID 2 /* Ignore suid and sgid bits */
  /external/apache-harmony/sql/src/test/java/org/apache/harmony/sql/tests/java/sql/
SQLExceptionTest.java 37 * SUID test
46 assertEquals("SUID mismatch: ", theFixedSUID, theSUID);
48 System.out.println("SUID check got exception: " + e.getMessage());
49 // assertTrue("Exception while testing SUID ", false );
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/bits/
statvfs.h 84 ST_NOSUID = 2 /* Ignore suid and sgid bits. */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/
mntent.h 46 #define MNTOPT_SUID "suid" /* Set uid allowed. */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/bits/
statvfs.h 84 ST_NOSUID = 2 /* Ignore suid and sgid bits. */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/
mntent.h 46 #define MNTOPT_SUID "suid" /* Set uid allowed. */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/bits/
statvfs.h 84 ST_NOSUID = 2 /* Ignore suid and sgid bits. */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/
mntent.h 46 #define MNTOPT_SUID "suid" /* Set uid allowed. */

Completed in 707 milliseconds

1 2 3 4 5 6 7 8