Searched refs:privilege (Results 1 – 18 of 18) sorted by relevance
11 <refpurpose>wpa_supplicant privilege separation helper</refpurpose>27 <para><command>wpa_priv</command> is a privilege separation helper that54 <command>wpa_supplicant</command> with privilege separation:</para>
25 for (I *privilege in [ace ARR]) { }
43 todo: privilege | ring
123 unsigned char privilege; member
127 bool AdjustCurrentProcessPrivilege(const TCHAR* privilege, bool to_enable);
1072 bool AdjustCurrentProcessPrivilege(const TCHAR* privilege, bool to_enable) { in AdjustCurrentProcessPrivilege() argument1073 ASSERT(privilege != NULL); in AdjustCurrentProcessPrivilege()1081 if (::LookupPrivilegeValue(NULL, privilege, &luid)) { in AdjustCurrentProcessPrivilege()
68 especially important if you are running racoon with privilege97 the "path certificate" directive. Keep in mind that privilege
46 what context it will run. When possible, run with the least privilege as is
45 privilege and can lead to difficult but 'interesting' man in the
185 (1) Running ltrace with -u option requires the superuser privilege.
65 users of the system and require elevated privilege, this can be handled by
373 # Enable privilege separation (see README 'Privilege separation' for details)
394 # Enable privilege separation (see README 'Privilege separation' for details)
919 supports optional privilege separation. If enabled, this separates the
1096 * added support for privilege separation (run only minimal part of
234 helper doesn't obey environment variables to avoid privilege escalation
1404 that even if present, its use may depend on run-time privilege or other OS
9375 Note that runtime support may be conditional on the privilege-level code is