HomeSort by relevance Sort by last modified time
    Searched full:privilege (Results 1 - 25 of 128) sorted by null

1 2 3 4 5 6

  /external/openssh/
README.privsep 0 Privilege separation, or privsep, is method in OpenSSH by which
2 operations that require root privilege are performed by a separate
3 privileged monitor process. Its purpose is to prevent privilege
8 Privilege separation is now enabled by default; see the
12 compression must be disabled in order for privilege separation to
35 --with-privsep-path=xxx Path for privilege separation chroot
36 --with-privsep-user=user Specify non-privileged user for privilege separation
  /external/wpa_supplicant_8/src/common/
privsep_commands.h 2 * WPA Supplicant - privilege separation commands
  /external/clang/test/Rewriter/
rewrite-foreach-in-block.mm 25 for (I *privilege in [ace ARR]) { }
  /external/webkit/Source/WebCore/manual-tests/
liveconnect-security-exception.html 16 <p>This test checks for a regression against <i>rdar://problem/4151132 REGRESSION: Some applet liveconnect calls throws privilege exception.</i>.</p>
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_priv.sgml 11 <refpurpose>wpa_supplicant privilege separation helper</refpurpose>
27 <para><command>wpa_priv</command> is a privilege separation helper that
34 can be run as non-root user. Privilege separation restricts the effects
54 <command>wpa_supplicant</command> with privilege separation:</para>
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/sys/
perm.h 31 /* Change I/O privilege level. */
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/sys/
perm.h 31 /* Change I/O privilege level. */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/sys/
perm.h 31 /* Change I/O privilege level. */
  /external/kernel-headers/original/asm-x86/
segment_32.h 121 /* Bottom two bits of selector give the ring privilege level */
126 /* User mode is privilege level 3 */
  /external/kernel-headers/original/linux/
securebits.h 26 set*uid to gain/lose privilege, transitions to/from uid 0 cause
prctl.h 141 * Changing LSM security domain is considered a new privilege. So, for example,
  /external/libcap-ng/libcap-ng-0.7/utils/
captest.8 9 You can also apply file system capabilities to this program to study how they work. For example, filecap /usr/bin/captest chown. Then run captest as a normal user. Another interesting test is to make captest suid root so that you can see what the interaction is between root's credentials and capabilities. For example, chmod 4755 /usr/bin/captest. When run as a normal user, the program will see if privilege escalation is possible. But do not leave this app setuid root after you are don testing so that an attacker cannot take advantage of it.
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
securebits.h 26 set*uid to gain/lose privilege, transitions to/from uid 0 cause
  /external/smack/src/org/jivesoftware/smackx/packet/
MUCAdmin.java 97 * @param role the privilege level of an occupant within a room.
156 * Returns the temporary position or privilege level of an occupant within a room. The
161 * @return the privilege level of an occupant within a room.
MUCOwner.java 180 * Returns the temporary position or privilege level of an occupant within a room. The
185 * @return the privilege level of an occupant within a room.
231 * Sets the temporary position or privilege level of an occupant within a room. The
236 * @param role the new privilege level of an occupant within a room.
  /cts/tests/tests/security/src/android/security/cts/
BannedFilesTest.java 26 * Detect devices vulnerable to the cmdclient privilege escalation bug.
  /libcore/luni/src/test/java/tests/java/sql/
DatabaseMetaDataNotSupportedTest.java 316 "COLUMN_NAME", "GRANTOR", "GRANTEE", "PRIVILEGE",
334 assertEquals("Incorrect privilege", "references", rs.getString(
335 "PRIVILEGE").toLowerCase());
488 assertTrue("Wrong privilege " + privileges.getString("PRIVILEGE"),
489 expectedPrivs.remove(privileges.getString("PRIVILEGE")));
525 assertTrue("Wrong privilege " + privileges.getString("PRIVILEGE"),
526 expectedPrivs.remove(privileges.getString("PRIVILEGE")));
    [all...]
  /docs/source.android.com/src/devices/tech/security/
enhancements42.jd 36 reducing potential attack surface for root privilege escalation.</li>
  /external/chromium/chrome/browser/cocoa/
authorization_util.mm 34 // Specify the "system.privilege.admin" right, which allows
  /external/chromium/net/data/ftp/
dir-listing-vms-2 24 PICS.DIR;1 No privilege for attempted operation
  /external/chromium/third_party/libjingle/source/talk/base/
win32.h 123 bool AdjustCurrentProcessPrivilege(const TCHAR* privilege, bool to_enable);
  /external/ipsec-tools/src/racoon/
admin.h 86 * Range 0x08xx is reserved for privilege separation, see privsep.h
  /external/openssl/crypto/x509v3/
v3_enum.c 73 {CRL_REASON_PRIVILEGE_WITHDRAWN, "Privilege Withdrawn", "privilegeWithdrawn"},
  /external/valgrind/main/none/tests/x86-linux/
seg_override.c 116 : "r" (7 /* LDT(TI), least privilege */ + (ldt_entno << 3)),
  /external/ipsec-tools/src/racoon/doc/
README.plainrsa 68 especially important if you are running racoon with privilege
97 the "path certificate" directive. Keep in mind that privilege

Completed in 600 milliseconds

1 2 3 4 5 6