OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:effective
(Results
51 - 75
of
1939
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/strace/tests-mx32/
caps.awk
39
r[4] = "^capget\\(\\{version=_LINUX_CAPABILITY_VERSION_3, pid=0\\}, \\{
effective
=" cap ", permitted=" cap ", inheritable=" cap "\\}\\) = 0$"
41
capset_v1_data = "{
effective
=1<<CAP_DAC_OVERRIDE, permitted=1<<CAP_DAC_READ_SEARCH, inheritable=0}"
42
capset_v3hi_data = "{
effective
=1<<CAP_WAKE_ALARM, permitted=1<<CAP_BLOCK_SUSPEND, inheritable=0}"
43
capset_data = "{
effective
=1<<CAP_DAC_OVERRIDE|1<<CAP_WAKE_ALARM, permitted=1<<CAP_DAC_READ_SEARCH|1<<CAP_BLOCK_SUSPEND, inheritable=0}"
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/
DSAParameterGenerationParameters.java
19
* @param L desired length of prime P in bits (the
effective
key size).
36
* @param L desired length of prime P in bits (the
effective
key size).
/external/libcap/doc/old/
_setproccap.2
17
Inheritable, Permitted and
Effective
capabilities to the sets specified.
40
a capability in the
Effective
or Inheritable sets that is not in the
/external/llvm/test/CodeGen/PowerPC/
fast-isel-load-store-vsx.ll
4
;; whether it is used as base or offset. If used as base, the
effective
6
;; an offset the content will be used in the
effective
address. We observed that
/external/ltp/testcases/open_posix_testsuite/conformance/interfaces/shm_open/
16-1.c
10
* Test that the user ID of the shared memory object is set to the
effective
60
("shm_open() does not set the user ID to the
effective
user ID of the process.\n");
17-1.c
10
* Test that the goup ID of the shared memory object is set to the
effective
60
("shm_open() does not set the user ID to the
effective
user ID of the process.\n");
/prebuilts/go/darwin-x86/src/os/
proc.go
30
// Geteuid returns the numeric
effective
user id of the caller.
36
// Getegid returns the numeric
effective
group id of the caller.
/prebuilts/go/linux-x86/src/os/
proc.go
30
// Geteuid returns the numeric
effective
user id of the caller.
36
// Getegid returns the numeric
effective
group id of the caller.
/external/libcap/contrib/
pcaps4suid0
11
# implement idea of change between permitted/
effective
set
12
# or iherited/
effective
set (pam_cap.so)
18
# POSIX Capabilities through their Permitted and
Effective
Set
24
# POSIX Capabilities through their Inherited and
Effective
Set
189
echo "
Effective
set."
191
echo "Inherited and
Effective
set (check for the SET var)."
/external/ltp/testcases/kernel/syscalls/setdomainname/
setdomainname03.c
35
* if the
effective
user id of the caller is not super-user.
42
* change
effective
user id to "nobody" user
56
* Change
effective
user id to root
151
"to set the
effective
uid to %d", ltpuser->pw_uid);
171
/* Set
effective
user id back to root */
174
"to set the
effective
uid to root");
/external/openssh/
uidswap.c
54
/* Saved
effective
uid. */
59
/* Saved
effective
uid. */
66
* Temporarily changes to the given uid. If the
effective
user
125
/* Set the
effective
uid to the given (unprivileged) uid. */
187
fatal("restore_uid: temporarily_use_uid not
effective
");
191
/* Set the
effective
uid back to the saved privileged uid. */
199
* Propagate the real uid (usually more privileged) to
effective
uid
213
* called while temporarily_use_uid is
effective
.
230
fatal("permanently_set_uid: temporarily_use_uid
effective
");
303
cap.
effective
= cap.permitted = (1 << CAP_SYS_BOOT)
[
all
...]
/external/ltp/testcases/kernel/syscalls/mknod/
mknod03.c
27
* equal to the
effective
gid of the process.
31
* set group-ID bit set, its gid should be equal to the
effective
gid of
122
* to that of
effective
gid of the process.
194
* Set the
effective
uid/gid of the process to that of guest user.
228
/* Get the
effective
group id of the test process */
266
* Set the
effective
group id and user id of the test process
292
* Restore the real/
effective
user id of the process changed during
302
* Restore the
effective
uid of the process changed in the
307
"resetting process real/
effective
uid failed");
mknod04.c
27
* equal to the
effective
gid of the process.
31
* have set group-ID bit set and its gid should be equal to the
effective
123
*
effective
gid of the process.
195
* Set the
effective
uid/gid of the process to that of guest user.
230
/* Get the
effective
group id of the test process */
268
* Set the
effective
group id and user id of the test process
294
* Restore the real/
effective
user id of the process changed during
304
* Restore the
effective
uid of the process changed in the
309
"resetting process real/
effective
uid failed");
mknod08.c
191
* Set the
effective
uid/gid of the process to that of nobody user.
226
/* Get
effective
group id of the test process */
261
* Set the
effective
group id and user id of the test process
287
* Restore the real/
effective
user id of the process changed during
297
* Restore the
effective
uid of the process changed in the
302
"resetting process real/
effective
uid failed");
/external/ltp/testcases/kernel/syscalls/setresuid/
setresuid02.c
25
* Test that a non-root user can change the real,
effective
and saved
137
/* Set the real,
effective
or saved user id */
223
tst_resm(TFAIL, "ERROR: %s real uid = %d;
effective
uid = %d; "
225
tst_resm(TINFO, "Expected: real uid = %d,
effective
uid = %d "
229
tst_resm(TINFO, "real uid = %d,
effective
uid = %d, and "
setresuid03.c
26
* values when a non-root user attempts to change the real,
effective
or
28
*
effective
uid of the current saved uid. Also verify that setresuid
146
/* Set the real,
effective
or saved user id */
236
tst_resm(TFAIL, "ERROR: %s real uid = %d;
effective
uid = %d; "
238
tst_resm(TINFO, "Expected: real uid = %d,
effective
uid = %d "
242
tst_resm(TINFO, "real uid = %d,
effective
uid = %d, and "
/device/linaro/bootloader/edk2/StdLib/Include/sys/
unistd.h
52
*
effective
user ID established at the last exec call."
54
* not allow changing the
effective
ID from the super-user without also
57
*
effective
ID through the seteuid/setegid function. In addition, we do
/external/libcap/progs/
setcap.c
157
* Raise the
effective
CAP_SETFCAP.
166
perror("unable to set CAP_SETFCAP
effective
capability");
187
fprintf(stderr, "NOTE: Under Linux,
effective
file capabilities must either be empty, or\n"
/external/libcap-ng/libcap-ng-0.7/
ChangeLog
23
- Fix
effective
capabilities read from file descriptor
27
- In netcap and pscap use the
effective
uid
52
- Use bit mask on
effective
capabilities check in have_capabilities
/external/libchrome/sandbox/linux/services/
credentials.h
36
// Drop all capabilities in the
effective
, inheritable and permitted sets for
45
// Sets the
effective
and permitted capability sets for the current thread to
59
// Returns true if the current thread has either the
effective
, permitted, or
/external/apache-http/src/org/apache/http/impl/cookie/
RFC2965DomainAttributeHandler.java
148
// The
effective
host name must domain-match domain attribute.
152
+ "\" violates RFC 2965:
effective
host name does not "
156
//
effective
host name minus domain must not contain any dots
162
+ "
effective
host minus domain may not contain any dots");
189
// The
effective
host name MUST domain-match the Domain
194
//
effective
host name minus domain must not contain any dots
/external/ltp/testcases/kernel/syscalls/setresgid/
setresgid02.c
35
* Verify that for non-root
effective
group id,
89
uid_t *egid; /*
effective
GID */
92
struct passwd *exp_egid; /* Expected
effective
GID */
172
/* Get current real,
effective
and saved group id */
218
/* Set
effective
/saved gid to nobody */
221
" setting real/
effective
/saved gid");
/external/ltp/testcases/kernel/containers/userns/
userns01.c
19
* of permitted and
effective
capabilities, even though the program was
83
printf("unexpected
effective
/permitted caps at %d\n", i);
/external/ltp/testcases/kernel/syscalls/setegid/
setegid01.c
93
tst_resm(TFAIL, "setegid() failed to change the
effective
gid");
115
tst_resm(TFAIL, "setegid() failed to reset
effective
gid back");
/external/ltp/testcases/kernel/syscalls/setgid/
setgid02.c
94
"to set the
effective
gid to %d", ltpuser->pw_gid);
100
"to set the
effective
uid to %d", ltpuser->pw_uid);
Completed in 534 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>