HomeSort by relevance Sort by last modified time
    Searched full:privilege (Results 26 - 50 of 222) sorted by null

12 3 4 5 6 7 8 9

  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/
securebits.h 26 set*uid to gain/lose privilege, transitions to/from uid 0 cause
prctl.h 132 * Changing LSM security domain is considered a new privilege. So, for example,
  /docs/source.android.com/src/security/bulletin/
2015-10-01.jd 101 <td>Elevation of Privilege Vulnerability in KeyStore</td>
106 <td>Elevation of Privilege Vulnerability in Media Player Framework</td>
111 <td>Elevation of Privilege Vulnerability in Android Runtime</td>
116 <td>Elevation of Privilege Vulnerabilities in Mediaserver </td>
121 <td>Elevation of Privilege Vulnerability in Secure Element Evaluation Kit</td>
126 <td>Elevation of Privilege Vulnerability in Media Projection</td>
131 <td>Elevation of Privilege Vulnerability in Bluetooth</td>
136 <td>Elevation of Privilege Vulnerabilities in SQLite</td>
166 applications that exploit a privilege escalation vulnerability. If such an
515 <h3 id=elevation_of_privilege_vulnerability_in_keystore>Elevation of Privilege Vulnerability in KeyStore</h3
    [all...]
2015-11-01.jd 77 <td>Elevation of Privilege Vulnerability in libstagefright</td>
82 <td>Elevation of Privilege Vulnerability in libmedia</td>
87 <td>Elevation of Privilege Vulnerability in Bluetooth</td>
92 <td>Elevation of Privilege Vulnerability in Telephony</td>
120 applications that exploit a privilege escalation vulnerability. If such an
327 <h3 id=elevation_of_privilege_vulnerability_in_libstagefright>Elevation of Privilege Vulnerability in libstagefright</h3>
330 <p>There is an elevation of privilege vulnerability in libstagefright that can
354 <h3 id=elevation_of_privilege_vulnerability_in_libmedia>Elevation of Privilege Vulnerability in libmedia</h3>
379 <h3 id=elevation_of_privilege_vulnerability_in_bluetooth>Elevation of Privilege Vulnerability in Bluetooth</h3>
404 Elevation Of Privilege Vulnerability in Telephony</h3
    [all...]
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/
PhoneSubInfoController.java 278 * Make sure caller has either read privileged phone permission or carrier privilege.
280 * @throws SecurityException if the caller does not have the required permission/privilege
288 log("No read privileged phone permission, check carrier privilege next.");
291 throw new SecurityException("No Carrier Privilege: No UICC");
295 throw new SecurityException("No Carrier Privilege.");
  /bionic/libc/arch-x86/bionic/
__set_tls.c 68 uint16_t rpl = 3; // Requested privilege level
  /docs/source.android.com/src/devices/tech/config/
carrier.jd 30 functionality, based on the <a href="uicc.html">UICC carrier privilege
50 href="#how_privilege_is_granted_to_a_carrier_app">How is privilege granted to a
66 <li><strong>Security</strong> - Privilege to provide this configuration is
108 <h4 id=how_privilege_is_granted_to_a_carrier_app>How privilege is granted to a Carrier App</h4>
uicc.jd 33 Access File Rule (ARF), for UICC carrier privilege rules, dramatically
91 <p>Android 7.0 adds support for reading carrier privilege rules from the Access
189 include carrier privilege rules as part of the UICC.
192 a privilege check is needed, <code>UiccCarrierPrivilegeRules</code> compares the
209 junit.framework.AssertionFailedError: This test requires a SIM card with carrier privilege rule on it.
  /external/selinux/policycoreutils/mcstrans/src/
mcstrans.init 16 # 4 - insufficient privilege
  /libcore/luni/src/test/java/tests/java/sql/
DatabaseMetaDataNotSupportedTest.java 316 "COLUMN_NAME", "GRANTOR", "GRANTEE", "PRIVILEGE",
334 assertEquals("Incorrect privilege", "references", rs.getString(
335 "PRIVILEGE").toLowerCase());
488 assertTrue("Wrong privilege " + privileges.getString("PRIVILEGE"),
489 expectedPrivs.remove(privileges.getString("PRIVILEGE")));
525 assertTrue("Wrong privilege " + privileges.getString("PRIVILEGE"),
526 expectedPrivs.remove(privileges.getString("PRIVILEGE")));
    [all...]
  /external/libcap/progs/
quicktest.sh 99 # Suppress uid=0 privilege
102 # suppress uid=0 privilege and test this privileged
  /docs/source.android.com/src/security/selinux/
concepts.jd 36 to unintended privilege escalation. A MAC system, however, consults a central
52 privilege level. This mitigates the effects of attacks and reduces the
61 privilege can write to only those specified in the associated policy. In this
  /cts/tests/tests/carrierapi/src/android/carrierapi/cts/
CarrierApiTest.java 93 fail("This test requires a SIM card with carrier privilege rule on it.\n" +
  /docs/source.android.com/src/security/enhancements/
enhancements42.jd 36 reducing potential attack surface for root privilege escalation.</li>
  /docs/source.android.com/src/security/overview/
updates-resources.jd 78 <li>Remote privileged code execution (execution at a privilege level that
92 <li>Remote unprivileged code execution (execution at a privilege level that
158 <h4 id=high_privilege_levels>Severity of vulnerabilities that affect high privilege levels</h4>
161 already requires executing code at a high privilege level. For example, a bug
  /external/ipsec-tools/src/racoon/
admin.h 86 * Range 0x08xx is reserved for privilege separation, see privsep.h
  /external/kernel-headers/original/uapi/asm-x86/asm/
processor-flags.h 30 #define X86_EFLAGS_IOPL_BIT 12 /* I/O Privilege Level (2 bits) */
  /external/libcap/doc/
capability.notes 45 privilege and can lead to difficult but 'interesting' man in the
  /external/libunwind/src/hppa/
Gstep.c 70 c->dwarf.ip = ip & ~0x3; /* mask out the privilege level */
  /external/tlsdate/
HACKING.md 46 what context it will run. When possible, run with the least privilege as is
  /external/valgrind/none/tests/x86-linux/
seg_override.c 117 : "r" (7 /* LDT(TI), least privilege */ + (ldt_entno << 3)),
  /external/webrtc/webrtc/base/
win32.h 127 bool AdjustCurrentProcessPrivilege(const TCHAR* privilege, bool to_enable);
  /system/tpm/attestation/common/
tpm_utility.h 37 // owner privilege. The |identity_key_blob| is the key to which the credential
  /external/ipsec-tools/src/racoon/doc/
README.plainrsa 68 especially important if you are running racoon with privilege
97 the "path certificate" directive. Keep in mind that privilege
  /external/minijail/
libminijail.h 151 * since there is no way to undo privilege-dropping; therefore, if any part of
152 * the privilege-drop fails, minijail_enter() will abort the entire process.

Completed in 2808 milliseconds

12 3 4 5 6 7 8 9