OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:privilege
(Results
26 - 50
of
222
) sorted by null
1
2
3
4
5
6
7
8
9
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/
securebits.h
26
set*uid to gain/lose
privilege
, transitions to/from uid 0 cause
prctl.h
132
* Changing LSM security domain is considered a new
privilege
. So, for example,
/docs/source.android.com/src/security/bulletin/
2015-10-01.jd
101
<td>Elevation of
Privilege
Vulnerability in KeyStore</td>
106
<td>Elevation of
Privilege
Vulnerability in Media Player Framework</td>
111
<td>Elevation of
Privilege
Vulnerability in Android Runtime</td>
116
<td>Elevation of
Privilege
Vulnerabilities in Mediaserver </td>
121
<td>Elevation of
Privilege
Vulnerability in Secure Element Evaluation Kit</td>
126
<td>Elevation of
Privilege
Vulnerability in Media Projection</td>
131
<td>Elevation of
Privilege
Vulnerability in Bluetooth</td>
136
<td>Elevation of
Privilege
Vulnerabilities in SQLite</td>
166
applications that exploit a
privilege
escalation vulnerability. If such an
515
<h3 id=elevation_of_privilege_vulnerability_in_keystore>Elevation of
Privilege
Vulnerability in KeyStore</h3
[
all
...]
2015-11-01.jd
77
<td>Elevation of
Privilege
Vulnerability in libstagefright</td>
82
<td>Elevation of
Privilege
Vulnerability in libmedia</td>
87
<td>Elevation of
Privilege
Vulnerability in Bluetooth</td>
92
<td>Elevation of
Privilege
Vulnerability in Telephony</td>
120
applications that exploit a
privilege
escalation vulnerability. If such an
327
<h3 id=elevation_of_privilege_vulnerability_in_libstagefright>Elevation of
Privilege
Vulnerability in libstagefright</h3>
330
<p>There is an elevation of
privilege
vulnerability in libstagefright that can
354
<h3 id=elevation_of_privilege_vulnerability_in_libmedia>Elevation of
Privilege
Vulnerability in libmedia</h3>
379
<h3 id=elevation_of_privilege_vulnerability_in_bluetooth>Elevation of
Privilege
Vulnerability in Bluetooth</h3>
404
Elevation Of
Privilege
Vulnerability in Telephony</h3
[
all
...]
/frameworks/opt/telephony/src/java/com/android/internal/telephony/
PhoneSubInfoController.java
278
* Make sure caller has either read privileged phone permission or carrier
privilege
.
280
* @throws SecurityException if the caller does not have the required permission/
privilege
288
log("No read privileged phone permission, check carrier
privilege
next.");
291
throw new SecurityException("No Carrier
Privilege
: No UICC");
295
throw new SecurityException("No Carrier
Privilege
.");
/bionic/libc/arch-x86/bionic/
__set_tls.c
68
uint16_t rpl = 3; // Requested
privilege
level
/docs/source.android.com/src/devices/tech/config/
carrier.jd
30
functionality, based on the <a href="uicc.html">UICC carrier
privilege
50
href="#how_privilege_is_granted_to_a_carrier_app">How is
privilege
granted to a
66
<li><strong>Security</strong> -
Privilege
to provide this configuration is
108
<h4 id=how_privilege_is_granted_to_a_carrier_app>How
privilege
is granted to a Carrier App</h4>
uicc.jd
33
Access File Rule (ARF), for UICC carrier
privilege
rules, dramatically
91
<p>Android 7.0 adds support for reading carrier
privilege
rules from the Access
189
include carrier
privilege
rules as part of the UICC.
192
a
privilege
check is needed, <code>UiccCarrierPrivilegeRules</code> compares the
209
junit.framework.AssertionFailedError: This test requires a SIM card with carrier
privilege
rule on it.
/external/selinux/policycoreutils/mcstrans/src/
mcstrans.init
16
# 4 - insufficient
privilege
/libcore/luni/src/test/java/tests/java/sql/
DatabaseMetaDataNotSupportedTest.java
316
"COLUMN_NAME", "GRANTOR", "GRANTEE", "
PRIVILEGE
",
334
assertEquals("Incorrect
privilege
", "references", rs.getString(
335
"
PRIVILEGE
").toLowerCase());
488
assertTrue("Wrong
privilege
" + privileges.getString("
PRIVILEGE
"),
489
expectedPrivs.remove(privileges.getString("
PRIVILEGE
")));
525
assertTrue("Wrong
privilege
" + privileges.getString("
PRIVILEGE
"),
526
expectedPrivs.remove(privileges.getString("
PRIVILEGE
")));
[
all
...]
/external/libcap/progs/
quicktest.sh
99
# Suppress uid=0
privilege
102
# suppress uid=0
privilege
and test this privileged
/docs/source.android.com/src/security/selinux/
concepts.jd
36
to unintended
privilege
escalation. A MAC system, however, consults a central
52
privilege
level. This mitigates the effects of attacks and reduces the
61
privilege
can write to only those specified in the associated policy. In this
/cts/tests/tests/carrierapi/src/android/carrierapi/cts/
CarrierApiTest.java
93
fail("This test requires a SIM card with carrier
privilege
rule on it.\n" +
/docs/source.android.com/src/security/enhancements/
enhancements42.jd
36
reducing potential attack surface for root
privilege
escalation.</li>
/docs/source.android.com/src/security/overview/
updates-resources.jd
78
<li>Remote privileged code execution (execution at a
privilege
level that
92
<li>Remote unprivileged code execution (execution at a
privilege
level that
158
<h4 id=high_privilege_levels>Severity of vulnerabilities that affect high
privilege
levels</h4>
161
already requires executing code at a high
privilege
level. For example, a bug
/external/ipsec-tools/src/racoon/
admin.h
86
* Range 0x08xx is reserved for
privilege
separation, see privsep.h
/external/kernel-headers/original/uapi/asm-x86/asm/
processor-flags.h
30
#define X86_EFLAGS_IOPL_BIT 12 /* I/O
Privilege
Level (2 bits) */
/external/libcap/doc/
capability.notes
45
privilege
and can lead to difficult but 'interesting' man in the
/external/libunwind/src/hppa/
Gstep.c
70
c->dwarf.ip = ip & ~0x3; /* mask out the
privilege
level */
/external/tlsdate/
HACKING.md
46
what context it will run. When possible, run with the least
privilege
as is
/external/valgrind/none/tests/x86-linux/
seg_override.c
117
: "r" (7 /* LDT(TI), least
privilege
*/ + (ldt_entno << 3)),
/external/webrtc/webrtc/base/
win32.h
127
bool AdjustCurrentProcessPrivilege(const TCHAR*
privilege
, bool to_enable);
/system/tpm/attestation/common/
tpm_utility.h
37
// owner
privilege
. The |identity_key_blob| is the key to which the credential
/external/ipsec-tools/src/racoon/doc/
README.plainrsa
68
especially important if you are running racoon with
privilege
97
the "path certificate" directive. Keep in mind that
privilege
/external/minijail/
libminijail.h
151
* since there is no way to undo
privilege
-dropping; therefore, if any part of
152
* the
privilege
-drop fails, minijail_enter() will abort the entire process.
Completed in 2808 milliseconds
1
2
3
4
5
6
7
8
9