Searched refs:privilege (Results 1 – 25 of 27) sorted by relevance
12
2 operations that require root privilege are performed by a separate3 privileged monitor process. Its purpose is to prevent privilege12 compression must be disabled in order for privilege separation to35 --with-privsep-path=xxx Path for privilege separation chroot36 --with-privsep-user=user Specify non-privileged user for privilege separation
129 sshd for privilege separation. See README.privsep for details.
957 that has the privilege of the authenticated user. The goal of958 privilege separation is to prevent privilege escalation by1050 for privilege separation.
610 chroot(2) directory used by sshd during privilege separation in633 for privilege separation.
2953 [ --with-privsep-user=user Specify non-privileged user for privilege separation],2963 [Cygwin function to fetch non-privileged user for privilege separation])2966 [non-privileged user for privilege separation])3001 …[ --with-sandbox=style Specify privilege separation sandbox (no, darwin, rlimit, systrace, sec…4140 [ --with-privsep-path=xxx Path for privilege separation chroot (default=/var/empty)],
1581 /* non-privileged user for privilege separation */
6053 [openbsd-compat/bsd-cygwin_util.h] On Cygwin, determine privilege
1 POSIX capabilities are pieces of root privilege, for instance34 1. check that privilege is needed to set file capabilities
11 <refpurpose>wpa_supplicant privilege separation helper</refpurpose>27 <para><command>wpa_priv</command> is a privilege separation helper that54 <command>wpa_supplicant</command> with privilege separation:</para>
25 for (I *privilege in [ace ARR]) { }
43 todo: privilege | ring
123 unsigned char privilege; member
127 bool AdjustCurrentProcessPrivilege(const TCHAR* privilege, bool to_enable);
1072 bool AdjustCurrentProcessPrivilege(const TCHAR* privilege, bool to_enable) { in AdjustCurrentProcessPrivilege() argument1073 ASSERT(privilege != NULL); in AdjustCurrentProcessPrivilege()1081 if (::LookupPrivilegeValue(NULL, privilege, &luid)) { in AdjustCurrentProcessPrivilege()
68 especially important if you are running racoon with privilege97 the "path certificate" directive. Keep in mind that privilege
31 * Take care with side effects as the tests are run with root privilege.
45 privilege and can lead to difficult but 'interesting' man in the
65 users of the system and require elevated privilege, this can be handled by
101 directory which requires no special privilege (other than write104 which requires root privilege.
398 # Enable privilege separation (see README 'Privilege separation' for details)
390 # Enable privilege separation (see README 'Privilege separation' for details)
919 supports optional privilege separation. If enabled, this separates the
1240 * added support for privilege separation (run only minimal part of
1405 that even if present, its use may depend on run-time privilege or other OS
META-INF/ META-INF/MANIFEST.MF META-INF/maven/ META- ...