| /src/sys/contrib/device-tree/src/powerpc/ |
| H A D | microwatt.dts | 46 usable-privilege = <6>; 52 usable-privilege = <7>; 59 usable-privilege = <6>; 65 usable-privilege = <7>; 70 usable-privilege = <2>; 78 usable-privilege = <7>; 87 usable-privilege = <7>; 96 usable-privilege = <7>; 104 usable-privilege = <7>; 109 usable-privilege = <7>;
|
| /src/sys/contrib/device-tree/Bindings/powerpc/ |
| H A D | ibm,powerpc-cpu-features.txt | 13 enablement, privilege, and compatibility metadata. 94 - usable-privilege 104 This property describes the privilege levels and/or software components 118 This property describes the HV privilege support required to enable the 119 feature to lesser privilege levels. If the property does not exist then no 137 This property describes the OS privilege support required to enable the 138 feature to lesser privilege levels. If the property does not exist then no 179 This property may exist when the usable-privilege property value has PR bit set. 213 usable-privilege = <1 | 2 | 4>; 219 usable-privilege = <1 | 2>; [all …]
|
| /src/crypto/krb5/src/lib/kadm5/ |
| H A D | kadm_err.et | 8 error_code KADM5_AUTH_GET, "Operation requires ``get'' privilege" 9 error_code KADM5_AUTH_ADD, "Operation requires ``add'' privilege" 10 error_code KADM5_AUTH_MODIFY, "Operation requires ``modify'' privilege" 11 error_code KADM5_AUTH_DELETE, "Operation requires ``delete'' privilege" 51 error_code KADM5_AUTH_LIST, "Operation requires ``list'' privilege" 52 error_code KADM5_AUTH_CHANGEPW, "Operation requires ``change-password'' privilege" 57 error_code KADM5_AUTH_SETKEY, "Operation requires ``set-key'' privilege" 67 error_code KADM5_AUTH_EXTRACT, "Operation requires ``extract-keys'' privilege"
|
| /src/crypto/heimdal/lib/kadm5/ |
| H A D | kadm5_err.et | 12 error_code AUTH_GET, "Operation requires `get' privilege" 13 error_code AUTH_ADD, "Operation requires `add' privilege" 14 error_code AUTH_MODIFY, "Operation requires `modify' privilege" 15 error_code AUTH_DELETE, "Operation requires `delete' privilege" 55 error_code AUTH_LIST, "Operation requires `list' privilege" 56 error_code AUTH_CHANGEPW, "Operation requires `change-password' privilege"
|
| /src/crypto/openssh/ |
| H A D | README.privsep | 2 operations that require root privilege are performed by a separate 3 privileged monitor process. Its purpose is to prevent privilege 28 --with-privsep-path=xxx Path for privilege separation chroot 29 --with-privsep-user=user Specify non-privileged user for privilege separation
|
| H A D | INSTALL | 12 to create the user, group and directory used by sshd for privilege
|
| H A D | configure.ac | 1191 AC_MSG_CHECKING([for Solaris/Illumos privilege support]) 3685 [ --with-privsep-user=user Specify non-privileged user for privilege separation], 3695 [Cygwin function to fetch non-privileged user for privilege separation]) 3698 [non-privileged user for privilege separation]) 3753 …[ --with-sandbox=style Specify privilege separation sandbox (no, capsicum, darwin, rlimit, sec… 5032 [ --with-privsep-path=xxx Path for privilege separation chroot (default=/var/empty)], 5846 echo " Solaris privilege support: $SPP_MSG"
|
| /src/sys/contrib/openzfs/tests/runfiles/ |
| H A D | sunos.run | 38 [tests/functional/privilege] 40 tags = ['functional', 'privilege']
|
| /src/contrib/wpa/wpa_supplicant/doc/docbook/ |
| H A D | wpa_priv.sgml | 15 <refpurpose>wpa_supplicant privilege separation helper</refpurpose> 31 <para><command>wpa_priv</command> is a privilege separation helper that 58 <command>wpa_supplicant</command> with privilege separation:</para>
|
| /src/sys/contrib/device-tree/Bindings/interrupt-controller/ |
| H A D | sifive,plic-1.0.0.txt | 9 A hart context is a privilege mode in a hardware execution thread. For example, 11 privilege modes per hart; machine mode and supervisor mode.
|
| /src/sys/contrib/device-tree/Bindings/arm/firmware/ |
| H A D | sdei.txt | 11 privilege level of the SDEI firmware (specified as part of the binding
|
| /src/contrib/ntp/sntp/ |
| H A D | sntp-opts.def | 244 the time or set the local system's time (given suitable privilege). It can be 300 With suitable privilege, 313 With suitable privilege,
|
| H A D | sntp.texi | 81 With suitable privilege, it can be run as a command or in a
|
| H A D | invoke-sntp.texi | 18 the time or set the local system's time (given suitable privilege). It can be
|
| /src/contrib/ntp/libntp/lib/isc/include/isc/ |
| H A D | task.h | 140 isc_boolean_t (*privilege)(isc_task_t *task); member
|
| /src/contrib/ntp/ntpdc/ |
| H A D | ntpdc.texi | 81 With suitable privilege, it can be run as a command or in a
|
| /src/contrib/llvm-project/compiler-rt/lib/gwp_asan/ |
| H A D | options.inc | 75 // arbitrary file write and thus privilege escalation. For an example, see the
|
| /src/sys/ufs/ufs/ |
| H A D | README.extattr | 21 normal inode protections, whereas SYSTEM EAs require privilege to access
|
| /src/sys/contrib/device-tree/Bindings/c6x/ |
| H A D | dscr.txt | 97 Offset and default value for register used to set access privilege for
|
| /src/contrib/llvm-project/llvm/lib/Target/RISCV/ |
| H A D | RISCVFeatures.td | 1011 // privilege mode (U-mode), and for VS- and VU-modes if the H extension is 1015 … "'Ssnpm' (Supervisor-level Pointer Masking for next lower privilege mode)">; 1018 // privilege mode (S/HS if S-mode is implemented, or U-mode otherwise). 1021 … "'Smnpm' (Machine-level Pointer Masking for next lower privilege mode)">;
|
| H A D | RISCVSystemOperands.td | 36 // Register number without the privilege bits.
|
| /src/usr.sbin/ypldap/ |
| H A D | ypldap.c | 610 #warning disabling privilege revocation in debug mode in main()
|
| H A D | ldapclient.c | 393 #warning disabling privilege revocation in DEBUG mode in ldapclient()
|
| /src/contrib/openbsm/ |
| H A D | NEWS | 52 - Support for Solaris privilege and privilege set tokens.
|
| /src/contrib/openbsm/etc/ |
| H A D | audit_event | 282 291:AUE_MODADDPRIV:modctl(2) - configure additional privilege:ad
|