Home
last modified time | relevance | path

Searched refs:privilege (Results 1 – 25 of 31) sorted by relevance

12

/external/openssh/
DREADME.privsep2 operations that require root privilege are performed by a separate
3 privileged monitor process. Its purpose is to prevent privilege
31 --with-privsep-path=xxx Path for privilege separation chroot
32 --with-privsep-user=user Specify non-privileged user for privilege separation
DINSTALL136 sshd for privilege separation. See README.privsep for details.
Dsshd.0601 chroot(2) directory used by sshd during privilege separation in
624 for privilege separation.
Dconfigure.ac938 AC_MSG_CHECKING([for Solaris/Illumos privilege support])
3104 [ --with-privsep-user=user Specify non-privileged user for privilege separation],
3114 [Cygwin function to fetch non-privileged user for privilege separation])
3117 [non-privileged user for privilege separation])
3152 …[ --with-sandbox=style Specify privilege separation sandbox (no, capsicum, darwin, rlimit, sec…
4303 [ --with-privsep-path=xxx Path for privilege separation chroot (default=/var/empty)],
5101 echo " Solaris privilege support: $SPP_MSG"
Dconfig.h.in1628 /* non-privileged user for privilege separation */
Dsshd_config.01018 for privilege separation.
/external/ltp/testcases/kernel/security/filecaps/
DREADME1 POSIX capabilities are pieces of root privilege, for instance
34 1. check that privilege is needed to set file capabilities
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_priv.sgml11 <refpurpose>wpa_supplicant privilege separation helper</refpurpose>
27 <para><command>wpa_priv</command> is a privilege separation helper that
54 <command>wpa_supplicant</command> with privilege separation:</para>
/external/clang/test/Rewriter/
Drewrite-foreach-in-block.mm25 for (I *privilege in [ace ARR]) { }
/external/kernel-headers/original/uapi/linux/
Dipmi.h123 unsigned char privilege; member
/external/google-breakpad/src/third_party/libdisasm/
DTODO43 todo: privilege | ring
/external/webrtc/webrtc/base/
Dwin32.h127 bool AdjustCurrentProcessPrivilege(const TCHAR* privilege, bool to_enable);
Dwin32regkey.cc1072 bool AdjustCurrentProcessPrivilege(const TCHAR* privilege, bool to_enable) { in AdjustCurrentProcessPrivilege() argument
1073 ASSERT(privilege != NULL); in AdjustCurrentProcessPrivilege()
1081 if (::LookupPrivilegeValue(NULL, privilege, &luid)) { in AdjustCurrentProcessPrivilege()
/external/libese/tools/ese_ls_provision/
DREADME.md8 perform high-privilege operations like installing and deleting applets in a secure way. The result
/external/ipsec-tools/src/racoon/doc/
DREADME.plainrsa68 especially important if you are running racoon with privilege
97 the "path certificate" directive. Keep in mind that privilege
/external/linux-kselftest/tools/testing/selftests/ftrace/
DREADME31 * Take care with side effects as the tests are run with root privilege.
/external/libcap/doc/
Dcapability.notes45 privilege and can lead to difficult but 'interesting' man in the
/external/python/cpython2/Doc/library/
Drestricted.rst23 with inner cells creating subcells of lesser, but never greater, privilege.
D_winreg.rst246 :const:`SE_RESTORE_PRIVILEGE` privilege. Note that privileges are different
359 possess the :const:`SeBackupPrivilege` security privilege. Note that
/external/curl/packages/vms/
Dcurl_gnv_build_steps.txt65 users of the system and require elevated privilege, this can be handled by
/external/syslinux/doc/
Dsyslinux.txt101 directory which requires no special privilege (other than write
104 which requires root privilege.
/external/wpa_supplicant_8/wpa_supplicant/
Ddefconfig398 # Enable privilege separation (see README 'Privilege separation' for details)
Dandroid.config390 # Enable privilege separation (see README 'Privilege separation' for details)
DREADME919 supports optional privilege separation. If enabled, this separates the
/external/clang/docs/
DLanguageExtensions.rst1405 that even if present, its use may depend on run-time privilege or other OS

12