Searched refs:privilege (Results 1 – 25 of 42) sorted by relevance
12
/external/openssh/ |
D | README.privsep | 2 operations that require root privilege are performed by a separate 3 privileged monitor process. Its purpose is to prevent privilege 31 --with-privsep-path=xxx Path for privilege separation chroot 32 --with-privsep-user=user Specify non-privileged user for privilege separation
|
D | INSTALL | 136 sshd for privilege separation. See README.privsep for details.
|
D | sshd.0 | 601 chroot(2) directory used by sshd during privilege separation in 624 for privilege separation.
|
D | configure.ac | 938 AC_MSG_CHECKING([for Solaris/Illumos privilege support]) 3104 [ --with-privsep-user=user Specify non-privileged user for privilege separation], 3114 [Cygwin function to fetch non-privileged user for privilege separation]) 3117 [non-privileged user for privilege separation]) 3152 …[ --with-sandbox=style Specify privilege separation sandbox (no, capsicum, darwin, rlimit, sec… 4303 [ --with-privsep-path=xxx Path for privilege separation chroot (default=/var/empty)], 5101 echo " Solaris privilege support: $SPP_MSG"
|
D | config.h.in | 1628 /* non-privileged user for privilege separation */
|
/external/u-boot/doc/ |
D | README.fsl-trustzone-components | 7 privilege mode), but still some configurations of these peripherals 8 might be required while the bootloader is executing in EL3 privilege
|
/external/ltp/testcases/kernel/security/filecaps/ |
D | README | 1 POSIX capabilities are pieces of root privilege, for instance 34 1. check that privilege is needed to set file capabilities
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_priv.sgml | 11 <refpurpose>wpa_supplicant privilege separation helper</refpurpose> 27 <para><command>wpa_priv</command> is a privilege separation helper that 54 <command>wpa_supplicant</command> with privilege separation:</para>
|
/external/clang/test/Rewriter/ |
D | rewrite-foreach-in-block.mm | 25 for (I *privilege in [ace ARR]) { }
|
/external/google-breakpad/src/third_party/libdisasm/ |
D | TODO | 43 todo: privilege | ring
|
/external/kernel-headers/original/uapi/linux/ |
D | ipmi.h | 104 unsigned char privilege; member
|
/external/webrtc/webrtc/base/ |
D | win32.h | 127 bool AdjustCurrentProcessPrivilege(const TCHAR* privilege, bool to_enable);
|
D | win32regkey.cc | 1072 bool AdjustCurrentProcessPrivilege(const TCHAR* privilege, bool to_enable) { in AdjustCurrentProcessPrivilege() argument 1073 ASSERT(privilege != NULL); in AdjustCurrentProcessPrivilege() 1081 if (::LookupPrivilegeValue(NULL, privilege, &luid)) { in AdjustCurrentProcessPrivilege()
|
/external/libese/tools/ese_ls_provision/ |
D | README.md | 8 perform high-privilege operations like installing and deleting applets in a secure way. The result
|
/external/ipsec-tools/src/racoon/doc/ |
D | README.plainrsa | 68 especially important if you are running racoon with privilege 97 the "path certificate" directive. Keep in mind that privilege
|
/external/linux-kselftest/tools/testing/selftests/ftrace/ |
D | README | 31 * Take care with side effects as the tests are run with root privilege.
|
/external/libcap/doc/ |
D | capability.notes | 45 privilege and can lead to difficult but 'interesting' man in the
|
/external/python/cpython2/Doc/library/ |
D | restricted.rst | 23 with inner cells creating subcells of lesser, but never greater, privilege.
|
D | _winreg.rst | 246 :const:`SE_RESTORE_PRIVILEGE` privilege. Note that privileges are different 359 possess the :const:`SeBackupPrivilege` security privilege. Note that
|
/external/perfetto/docs/ |
D | README.md | 59 * Perfetto daemons are designed following to the principle of least privilege,
|
/external/u-boot/scripts/ |
D | spelling.txt | 878 privilage||privilege 879 priviledge||privilege
|
/external/python/cpython3/Doc/library/ |
D | winreg.rst | 274 :const:`SE_RESTORE_PRIVILEGE` privilege. Note that privileges are different 388 possess the :const:`SeBackupPrivilege` security privilege. Note that
|
/external/curl/packages/vms/ |
D | curl_gnv_build_steps.txt | 65 users of the system and require elevated privilege, this can be handled by
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | android.config | 380 # Enable privilege separation (see README 'Privilege separation' for details)
|
D | defconfig | 404 # Enable privilege separation (see README 'Privilege separation' for details)
|
12