/external/libcap/libcap/ |
D | cap_file.c | 80 result->u[i].flat[CAP_PERMITTED] in _fcaps_load() 85 | result->u[i].flat[CAP_PERMITTED]; in _fcaps_load() 90 = result->u[i].flat[CAP_PERMITTED] in _fcaps_load() 147 || cap_d->u[i].flat[CAP_PERMITTED])) { in _fcaps_save() 159 = FIXUP_32BITS(cap_d->u[i].flat[CAP_PERMITTED]); in _fcaps_save() 165 & (cap_d->u[i].flat[CAP_PERMITTED] in _fcaps_save()
|
D | cap_text.c | 155 _cap_debugcap("p = ", *res, CAP_PERMITTED); in cap_from_text() 221 clrbits(res, list, CAP_PERMITTED, cap_blks); in cap_from_text() 230 setbits(res, list, CAP_PERMITTED, cap_blks); in cap_from_text() 239 clrbits(res, list, CAP_PERMITTED, cap_blks); in cap_from_text() 314 if (isset_cap(caps, capno, CAP_PERMITTED)) { in getstateflags() 360 _cap_debugcap("p = ", *caps, CAP_PERMITTED); in cap_to_text()
|
D | cap_flag.c | 104 case CAP_PERMITTED: in cap_clear_flag() 146 | ((a->u[i].flat[CAP_PERMITTED] != b->u[i].flat[CAP_PERMITTED]) in cap_compare()
|
D | libcap.h | 150 #define LIBCAP_PER (1 << CAP_PERMITTED)
|
/external/ltp/testcases/kernel/security/filecaps/ |
D | verify_caps_exec.c | 246 cap_set_flag(fcap, CAP_PERMITTED, 1, capvalue, CAP_SET); in caps_actually_set_test() 267 cap_set_flag(fcap, CAP_PERMITTED, 1, capvalue, CAP_SET); in caps_actually_set_test() 321 cap_set_flag(pcap, CAP_PERMITTED, 1, capvalue, CAP_SET); in caps_actually_set_test() 358 cap_set_flag(cmpcap, CAP_PERMITTED, 1, capvalue, CAP_SET); in caps_actually_set_test()
|
/external/iputils/ninfod/ |
D | ninfod.c | 524 cap_get_flag(cap_cur_p, CAP_NET_RAW, CAP_PERMITTED, &cap_ok); in limit_capabilities() 526 cap_set_flag(cap_p, CAP_PERMITTED, 1, &cap_net_raw, CAP_SET); in limit_capabilities() 530 cap_get_flag(cap_cur_p, CAP_SETUID, CAP_PERMITTED, &cap_ok); in limit_capabilities() 532 cap_set_flag(cap_p, CAP_PERMITTED, 1, &cap_setuid, CAP_SET); in limit_capabilities() 565 cap_set_flag(cap_p, CAP_PERMITTED, 1, &cap_setuid, CAP_SET); in drop_capabilities()
|
/external/libcap/progs/ |
D | setcap.c | 143 CAP_DIFFERS(cmp, CAP_PERMITTED) ? "p" : "", in main() 180 cap_get_flag(cap_d, cap, CAP_PERMITTED, &per_state) != -1; in main()
|
/external/ltp/testcases/kernel/containers/userns/ |
D | userns06_capcheck.c | 60 cap_get_flag(caps, i, CAP_PERMITTED, &flag_val); in main()
|
D | userns01.c | 77 cap_get_flag(caps, i, CAP_PERMITTED, &flag_val); in child_fn1()
|
/external/iputils/ |
D | ping_common.c | 94 cap_get_flag(cap_cur_p, CAP_NET_ADMIN, CAP_PERMITTED, &cap_ok); in limit_capabilities() 97 cap_set_flag(cap_p, CAP_PERMITTED, 1, &cap_admin, CAP_SET); in limit_capabilities() 100 cap_get_flag(cap_cur_p, CAP_NET_RAW, CAP_PERMITTED, &cap_ok); in limit_capabilities() 103 cap_set_flag(cap_p, CAP_PERMITTED, 1, &cap_raw, CAP_SET); in limit_capabilities() 151 cap_get_flag(cap_p, cap, CAP_PERMITTED, &cap_ok); in modify_capability()
|
D | arping.c | 167 cap_get_flag(cap_p, CAP_NET_RAW, CAP_PERMITTED, &cap_raw); in limit_capabilities() 175 cap_set_flag(cap_p, CAP_PERMITTED, 1, caps, CAP_SET); in limit_capabilities()
|
/external/libcap/libcap/include/sys/ |
D | capability.h | 54 CAP_PERMITTED=1, /* Specifies the permitted flag */ enumerator
|
/external/ltp/testcases/kernel/security/securebits/ |
D | check_keepcaps.c | 40 ret = cap_get_flag(c, i, CAP_PERMITTED, &v); in eff_caps_empty()
|
/external/libchrome/sandbox/linux/services/ |
D | credentials_unittest.cc | 235 for (const cap_flag_t flag : {CAP_EFFECTIVE, CAP_PERMITTED}) { in SANDBOX_TEST()
|
/external/minijail/ |
D | libminijail.c | 1474 if (cap_set_flag(caps, CAP_PERMITTED, 1, flag, CAP_SET)) in drop_caps() 1495 if (cap_set_flag(caps, CAP_PERMITTED, 1, flag, CAP_CLEAR)) in drop_caps()
|