Home
last modified time | relevance | path

Searched refs:privilege (Results 1 – 25 of 27) sorted by relevance

12

/external/openssh/
DREADME.privsep2 operations that require root privilege are performed by a separate
3 privileged monitor process. Its purpose is to prevent privilege
12 compression must be disabled in order for privilege separation to
35 --with-privsep-path=xxx Path for privilege separation chroot
36 --with-privsep-user=user Specify non-privileged user for privilege separation
DINSTALL129 sshd for privilege separation. See README.privsep for details.
Dsshd_config.0957 that has the privilege of the authenticated user. The goal of
958 privilege separation is to prevent privilege escalation by
1050 for privilege separation.
Dsshd.0610 chroot(2) directory used by sshd during privilege separation in
633 for privilege separation.
Dconfigure.ac2953 [ --with-privsep-user=user Specify non-privileged user for privilege separation],
2963 [Cygwin function to fetch non-privileged user for privilege separation])
2966 [non-privileged user for privilege separation])
3001 …[ --with-sandbox=style Specify privilege separation sandbox (no, darwin, rlimit, systrace, sec…
4140 [ --with-privsep-path=xxx Path for privilege separation chroot (default=/var/empty)],
Dconfig.h.in1581 /* non-privileged user for privilege separation */
DChangeLog6053 [openbsd-compat/bsd-cygwin_util.h] On Cygwin, determine privilege
/external/ltp/testcases/kernel/security/filecaps/
DREADME1 POSIX capabilities are pieces of root privilege, for instance
34 1. check that privilege is needed to set file capabilities
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_priv.sgml11 <refpurpose>wpa_supplicant privilege separation helper</refpurpose>
27 <para><command>wpa_priv</command> is a privilege separation helper that
54 <command>wpa_supplicant</command> with privilege separation:</para>
/external/clang/test/Rewriter/
Drewrite-foreach-in-block.mm25 for (I *privilege in [ace ARR]) { }
/external/google-breakpad/src/third_party/libdisasm/
DTODO43 todo: privilege | ring
/external/kernel-headers/original/uapi/linux/
Dipmi.h123 unsigned char privilege; member
/external/webrtc/webrtc/base/
Dwin32.h127 bool AdjustCurrentProcessPrivilege(const TCHAR* privilege, bool to_enable);
Dwin32regkey.cc1072 bool AdjustCurrentProcessPrivilege(const TCHAR* privilege, bool to_enable) { in AdjustCurrentProcessPrivilege() argument
1073 ASSERT(privilege != NULL); in AdjustCurrentProcessPrivilege()
1081 if (::LookupPrivilegeValue(NULL, privilege, &luid)) { in AdjustCurrentProcessPrivilege()
/external/ipsec-tools/src/racoon/doc/
DREADME.plainrsa68 especially important if you are running racoon with privilege
97 the "path certificate" directive. Keep in mind that privilege
/external/linux-kselftest/tools/testing/selftests/ftrace/
DREADME31 * Take care with side effects as the tests are run with root privilege.
/external/libcap/doc/
Dcapability.notes45 privilege and can lead to difficult but 'interesting' man in the
/external/curl/packages/vms/
Dcurl_gnv_build_steps.txt65 users of the system and require elevated privilege, this can be handled by
/external/syslinux/doc/
Dsyslinux.txt101 directory which requires no special privilege (other than write
104 which requires root privilege.
/external/wpa_supplicant_8/wpa_supplicant/
Ddefconfig398 # Enable privilege separation (see README 'Privilege separation' for details)
Dandroid.config390 # Enable privilege separation (see README 'Privilege separation' for details)
DREADME919 supports optional privilege separation. If enabled, this separates the
DChangeLog1240 * added support for privilege separation (run only minimal part of
/external/clang/docs/
DLanguageExtensions.rst1405 that even if present, its use may depend on run-time privilege or other OS
/external/mockito/lib/
Dbyte-buddy-1.6.9.jarMETA-INF/ META-INF/MANIFEST.MF META-INF/maven/ META- ...

12