/external/elfutils/src/tests/ |
D | run-addrcfi.sh | 369 privileged reg70 (sr0): undefined 370 privileged reg71 (sr1): undefined 371 privileged reg72 (sr2): undefined 372 privileged reg73 (sr3): undefined 373 privileged reg74 (sr4): undefined 374 privileged reg75 (sr5): undefined 375 privileged reg76 (sr6): undefined 376 privileged reg77 (sr7): undefined 377 privileged reg78 (sr8): undefined 378 privileged reg79 (sr9): undefined [all …]
|
/external/valgrind/docs/internals/ |
D | s390-opcodes.csv | 49 csch,"clear subchannel",N/A,"privileged instruction" 51 csp,"compare and swap and purge",N/A,"privileged instruction" 60 diag,diagnose,N/A,"privileged instruction" 67 epar,"extract primary ASN",N/A,"privileged instruction" 68 epair,"extract primary ASN and instance",N/A,"privileged instruction" 70 esar,"extract secondary ASN",N/A,"privileged instruction", 71 esair,"extract secondary ASN and instance,N/A,"privileged instruction", 76 hsch,"halt subchannel",N/A,"privileged instruction" 77 iac,"insert address space control",N/A,"privileged instruction" 80 ipk,"insert PSW key",N/A,"privileged instruction" [all …]
|
/external/openssh/ |
D | uidswap.c | 56 static int privileged = 0; variable 77 privileged = 0; in temporarily_use_uid() 83 privileged = 0; in temporarily_use_uid() 88 privileged = 1; in temporarily_use_uid() 172 if (!privileged) { in restore_uid()
|
D | README.privsep | 3 privileged monitor process. Its purpose is to prevent privilege 36 --with-privsep-user=user Specify non-privileged user for privilege separation 60 process 6917 is the privileged monitor process, 6919 is the user owned
|
D | sshconnect.c | 273 ssh_create_socket(int privileged, struct addrinfo *ai) in ssh_create_socket() argument 286 if (options.bind_address == NULL && !privileged) in ssh_create_socket() 307 if (privileged) { in ssh_create_socket()
|
D | README.tun | 56 the privileged user (in /root/.ssh/config):
|
D | OVERVIEW | 112 privileged socket). Any extra privileges are dropped before
|
D | ssh.0 | 88 as a SOCKS server. Only root can forward privileged ports. 93 square brackets. Only the superuser can forward privileged 168 superuser can forward privileged ports. By default, the local 595 root can open sockets on privileged ports) and doesn't conflict with any
|
/external/openssh/contrib/cygwin/ |
D | README | 29 --user -u <account> privileged user for service, default 'cyg_server'. 30 --pwd -w <passwd> Use "pwd" as password for privileged user. 31 --privileged On Windows XP, require privileged user
|
D | ssh-host-config | 585 --privileged )
|
/external/mksh/src/ |
D | sh_flags.opt | 115 /* -p privileged shell (suid) */ 117 FN("privileged", FPRIVILEGED, OF_ANY
|
D | sh_flags.gen | 51 FN("privileged", FPRIVILEGED, OF_ANY, 'p')
|
/external/ppp/pppd/ |
D | pppd.h | 227 extern int privileged; /* We were run by real-uid root */ 702 int privileged)); 706 int options_from_list __P((struct wordlist *, int privileged));
|
D | main.c | 148 int privileged; /* we're running as real uid root */ variable 340 privileged = uid == 0; 369 privileged = 1; 406 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1)
|
D | auth.c | 488 privileged = 1; 1239 if (!auth_required && !allow_any_ip && have_route_to(0) && !privileged) { in auth_check_options() 2014 return allow_any_ip || privileged || !have_route_to(addr);
|
D | options.c | 379 privileged_option = privileged; 503 ret = options_from_file(path, 0, 1, privileged); in options_from_user()
|
/external/mesa3d/docs/OLD/ |
D | MESA_trace.spec | 64 that enjoys privileged access, or that they do not wish to separate
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_priv.sgml | 31 <para>If enabled, privileged operations are done in the wpa_priv process 45 non-privileged user account created just for this purpose to limit access
|
/external/sepolicy/ |
D | system_app.te | 3 # com.android.settings. These are not as privileged as the system
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | README | 906 privileged operations into a separate process (wpa_priv) while leaving 915 enabled, the privileged operations (driver wrapper and l2_packet) are 918 wrappers that communicate with the privileged wpa_priv process to 919 perform the needed operations. wpa_priv can control what privileged 927 on a laptop or as a special non-privileged user account created just 955 Linux capabilities instead of privileged process 960 by running wpa_supplicant as a privileged process with effective user id
|
/external/iputils/doc/ |
D | tracepath.sgml | 161 <command/tracepath/ is not a privileged program, unlike
|
/external/mdnsresponder/ |
D | PrivateDNS.txt | 163 // This also allows non-privileged users on the local host to manage
|
/external/iproute2/doc/ |
D | api-ip6-flowlabels.tex | 233 One idea is to disallow not privileged user to allocate flow
|
/external/llvm/lib/Target/ARM/ |
D | ARMRegisterInfo.td | 173 // Special Registers - only available in privileged mode.
|
/external/svox/pico_resources/tools/LingwareBuilding/PicoLingware_source_files/pkb/en-GB/ |
D | en-GB_klex.pkb | 1130 principalAprivatisation)GI!5N&K5P</&Eprivatization)GI!5N&K5P</&EprivilegedD…
|