HomeSort by relevance Sort by last modified time
    Searched full:effective (Results 51 - 75 of 1939) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/strace/tests-mx32/
caps.awk 39 r[4] = "^capget\\(\\{version=_LINUX_CAPABILITY_VERSION_3, pid=0\\}, \\{effective=" cap ", permitted=" cap ", inheritable=" cap "\\}\\) = 0$"
41 capset_v1_data = "{effective=1<<CAP_DAC_OVERRIDE, permitted=1<<CAP_DAC_READ_SEARCH, inheritable=0}"
42 capset_v3hi_data = "{effective=1<<CAP_WAKE_ALARM, permitted=1<<CAP_BLOCK_SUSPEND, inheritable=0}"
43 capset_data = "{effective=1<<CAP_DAC_OVERRIDE|1<<CAP_WAKE_ALARM, permitted=1<<CAP_DAC_READ_SEARCH|1<<CAP_BLOCK_SUSPEND, inheritable=0}"
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/params/
DSAParameterGenerationParameters.java 19 * @param L desired length of prime P in bits (the effective key size).
36 * @param L desired length of prime P in bits (the effective key size).
  /external/libcap/doc/old/
_setproccap.2 17 Inheritable, Permitted and Effective capabilities to the sets specified.
40 a capability in the Effective or Inheritable sets that is not in the
  /external/llvm/test/CodeGen/PowerPC/
fast-isel-load-store-vsx.ll 4 ;; whether it is used as base or offset. If used as base, the effective
6 ;; an offset the content will be used in the effective address. We observed that
  /external/ltp/testcases/open_posix_testsuite/conformance/interfaces/shm_open/
16-1.c 10 * Test that the user ID of the shared memory object is set to the effective
60 ("shm_open() does not set the user ID to the effective user ID of the process.\n");
17-1.c 10 * Test that the goup ID of the shared memory object is set to the effective
60 ("shm_open() does not set the user ID to the effective user ID of the process.\n");
  /prebuilts/go/darwin-x86/src/os/
proc.go 30 // Geteuid returns the numeric effective user id of the caller.
36 // Getegid returns the numeric effective group id of the caller.
  /prebuilts/go/linux-x86/src/os/
proc.go 30 // Geteuid returns the numeric effective user id of the caller.
36 // Getegid returns the numeric effective group id of the caller.
  /external/libcap/contrib/
pcaps4suid0 11 # implement idea of change between permitted/effective set
12 # or iherited/effective set (pam_cap.so)
18 # POSIX Capabilities through their Permitted and Effective Set
24 # POSIX Capabilities through their Inherited and Effective Set
189 echo "Effective set."
191 echo "Inherited and Effective set (check for the SET var)."
  /external/ltp/testcases/kernel/syscalls/setdomainname/
setdomainname03.c 35 * if the effective user id of the caller is not super-user.
42 * change effective user id to "nobody" user
56 * Change effective user id to root
151 "to set the effective uid to %d", ltpuser->pw_uid);
171 /* Set effective user id back to root */
174 "to set the effective uid to root");
  /external/openssh/
uidswap.c 54 /* Saved effective uid. */
59 /* Saved effective uid. */
66 * Temporarily changes to the given uid. If the effective user
125 /* Set the effective uid to the given (unprivileged) uid. */
187 fatal("restore_uid: temporarily_use_uid not effective");
191 /* Set the effective uid back to the saved privileged uid. */
199 * Propagate the real uid (usually more privileged) to effective uid
213 * called while temporarily_use_uid is effective.
230 fatal("permanently_set_uid: temporarily_use_uid effective");
303 cap.effective = cap.permitted = (1 << CAP_SYS_BOOT)
    [all...]
  /external/ltp/testcases/kernel/syscalls/mknod/
mknod03.c 27 * equal to the effective gid of the process.
31 * set group-ID bit set, its gid should be equal to the effective gid of
122 * to that of effective gid of the process.
194 * Set the effective uid/gid of the process to that of guest user.
228 /* Get the effective group id of the test process */
266 * Set the effective group id and user id of the test process
292 * Restore the real/effective user id of the process changed during
302 * Restore the effective uid of the process changed in the
307 "resetting process real/effective uid failed");
mknod04.c 27 * equal to the effective gid of the process.
31 * have set group-ID bit set and its gid should be equal to the effective
123 * effective gid of the process.
195 * Set the effective uid/gid of the process to that of guest user.
230 /* Get the effective group id of the test process */
268 * Set the effective group id and user id of the test process
294 * Restore the real/effective user id of the process changed during
304 * Restore the effective uid of the process changed in the
309 "resetting process real/effective uid failed");
mknod08.c 191 * Set the effective uid/gid of the process to that of nobody user.
226 /* Get effective group id of the test process */
261 * Set the effective group id and user id of the test process
287 * Restore the real/effective user id of the process changed during
297 * Restore the effective uid of the process changed in the
302 "resetting process real/effective uid failed");
  /external/ltp/testcases/kernel/syscalls/setresuid/
setresuid02.c 25 * Test that a non-root user can change the real, effective and saved
137 /* Set the real, effective or saved user id */
223 tst_resm(TFAIL, "ERROR: %s real uid = %d; effective uid = %d; "
225 tst_resm(TINFO, "Expected: real uid = %d, effective uid = %d "
229 tst_resm(TINFO, "real uid = %d, effective uid = %d, and "
setresuid03.c 26 * values when a non-root user attempts to change the real, effective or
28 * effective uid of the current saved uid. Also verify that setresuid
146 /* Set the real, effective or saved user id */
236 tst_resm(TFAIL, "ERROR: %s real uid = %d; effective uid = %d; "
238 tst_resm(TINFO, "Expected: real uid = %d, effective uid = %d "
242 tst_resm(TINFO, "real uid = %d, effective uid = %d, and "
  /device/linaro/bootloader/edk2/StdLib/Include/sys/
unistd.h 52 * effective user ID established at the last exec call."
54 * not allow changing the effective ID from the super-user without also
57 * effective ID through the seteuid/setegid function. In addition, we do
  /external/libcap/progs/
setcap.c 157 * Raise the effective CAP_SETFCAP.
166 perror("unable to set CAP_SETFCAP effective capability");
187 fprintf(stderr, "NOTE: Under Linux, effective file capabilities must either be empty, or\n"
  /external/libcap-ng/libcap-ng-0.7/
ChangeLog 23 - Fix effective capabilities read from file descriptor
27 - In netcap and pscap use the effective uid
52 - Use bit mask on effective capabilities check in have_capabilities
  /external/libchrome/sandbox/linux/services/
credentials.h 36 // Drop all capabilities in the effective, inheritable and permitted sets for
45 // Sets the effective and permitted capability sets for the current thread to
59 // Returns true if the current thread has either the effective, permitted, or
  /external/apache-http/src/org/apache/http/impl/cookie/
RFC2965DomainAttributeHandler.java 148 // The effective host name must domain-match domain attribute.
152 + "\" violates RFC 2965: effective host name does not "
156 // effective host name minus domain must not contain any dots
162 + "effective host minus domain may not contain any dots");
189 // The effective host name MUST domain-match the Domain
194 // effective host name minus domain must not contain any dots
  /external/ltp/testcases/kernel/syscalls/setresgid/
setresgid02.c 35 * Verify that for non-root effective group id,
89 uid_t *egid; /* effective GID */
92 struct passwd *exp_egid; /* Expected effective GID */
172 /* Get current real, effective and saved group id */
218 /* Set effective/saved gid to nobody */
221 " setting real/effective/saved gid");
  /external/ltp/testcases/kernel/containers/userns/
userns01.c 19 * of permitted and effective capabilities, even though the program was
83 printf("unexpected effective/permitted caps at %d\n", i);
  /external/ltp/testcases/kernel/syscalls/setegid/
setegid01.c 93 tst_resm(TFAIL, "setegid() failed to change the effective gid");
115 tst_resm(TFAIL, "setegid() failed to reset effective gid back");
  /external/ltp/testcases/kernel/syscalls/setgid/
setgid02.c 94 "to set the effective gid to %d", ltpuser->pw_gid);
100 "to set the effective uid to %d", ltpuser->pw_uid);

Completed in 534 milliseconds

1 23 4 5 6 7 8 91011>>