/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/kernel/ |
H A D | capability.c | 39 * @dataptr: pointer to struct that contains the effective, permitted, 79 ret = security_capget(target, &data.effective, &data.inheritable, &data.permitted); 97 kernel_cap_t *permitted) 110 permitted)) { 113 permitted); 131 kernel_cap_t *permitted) 142 permitted)) 145 security_capset_set(target, effective, inheritable, permitted); 157 * @data: pointer to struct that contains the effective, permitted, 167 * I: any raised capabilities must be a subset of the (old current) permitted 95 cap_set_pg(int pgrp_nr, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 129 cap_set_all(kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 175 kernel_cap_t inheritable, permitted, effective; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/security/ |
H A D | commoncap.c | 68 kernel_cap_t *inheritable, kernel_cap_t *permitted) 73 *permitted = cap_t (target->cap_permitted); 78 kernel_cap_t *inheritable, kernel_cap_t *permitted) 89 if (!cap_issubset (*permitted, 96 if (!cap_issubset (*effective, *permitted)) { 104 kernel_cap_t *inheritable, kernel_cap_t *permitted) 108 target->cap_permitted = *permitted; 125 * and permitted sets of the executable file. 214 * cap_emulate_setxuid() fixes the effective / permitted capabilities of 218 * {r,e,s}uid != 0, the permitted an 67 cap_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 77 cap_capset_check(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 103 cap_capset_set(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument [all...] |
H A D | dummy.c | 38 kernel_cap_t * inheritable, kernel_cap_t * permitted) 40 *effective = *inheritable = *permitted = 0; 43 *permitted |= (~0 & ~CAP_FS_MASK); 47 *permitted |= CAP_FS_MASK; 57 kernel_cap_t * permitted) 65 kernel_cap_t * permitted) 37 dummy_capget(struct task_struct *target, kernel_cap_t * effective, kernel_cap_t * inheritable, kernel_cap_t * permitted) argument 54 dummy_capset_check(struct task_struct *target, kernel_cap_t * effective, kernel_cap_t * inheritable, kernel_cap_t * permitted) argument 62 dummy_capset_set(struct task_struct *target, kernel_cap_t * effective, kernel_cap_t * inheritable, kernel_cap_t * permitted) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/linux/ |
H A D | security.h | 46 extern int cap_capget (struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 47 extern int cap_capset_check (struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 48 extern void cap_capset_set (struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted); 622 * from the kernel and should typically be permitted. 1063 * Get the @effective, @inheritable, and @permitted capability sets for 1070 * @permitted contains the permitted capability set. 1074 * @permitted capability sets for the @target process. 1082 * @permitted contains the permitted capabilit 1410 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 1418 security_capset_check(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 1426 security_capset_set(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 2155 security_capget(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 2163 security_capset_check(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument 2171 security_capset_set(struct task_struct *target, kernel_cap_t *effective, kernel_cap_t *inheritable, kernel_cap_t *permitted) argument [all...] |
H A D | capability.h | 36 __u32 permitted; member in struct:__user_cap_data_struct 128 /* Transfer any capability in your permitted set to any pid, 129 remove any capability in your permitted set from any pid */
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/flac-1.2.1/src/libFLAC/ia32/ |
H A D | nasm.h | 5 ; modification, are permitted provided that the following conditions
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | oplock_linux.c | 78 uint32 permitted; member in struct:__anon1738
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/util/ |
H A D | add_cr.pl | 88 * modification, are permitted provided that the following conditions
|
H A D | mkerr.pl | 269 " * modification, are permitted provided that the following conditions\n", 411 * modification, are permitted provided that the following conditions
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/bn/ |
H A D | bn_prime.pl | 56 * modification, are permitted provided that the following conditions
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/bn/ |
H A D | bn_prime.pl | 56 * modification, are permitted provided that the following conditions
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/util/ |
H A D | add_cr.pl | 88 * modification, are permitted provided that the following conditions
|
H A D | mkerr.pl | 318 " * modification, are permitted provided that the following conditions\n", 492 * modification, are permitted provided that the following conditions
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/conf/ |
H A D | keysets.pl | 78 * modification, are permitted provided that the following conditions
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/conf/ |
H A D | keysets.pl | 78 * modification, are permitted provided that the following conditions
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/m68k/ifpsp060/ |
H A D | fskeleton.S | 10 |To the maximum extent permitted by applicable law, 16 |To the maximum extent permitted by applicable law,
|
H A D | iskeleton.S | 10 |To the maximum extent permitted by applicable law, 16 |To the maximum extent permitted by applicable law,
|
H A D | os.S | 10 |To the maximum extent permitted by applicable law, 16 |To the maximum extent permitted by applicable law,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/examples/LDAP/smbldap-tools-0.8.7/ |
H A D | smbldap-passwd | 326 The user is first prompted for their old password, if one is present. This password is then tested against the stored password by binding to the server. The user has only one chance to enter the correct passwword. The super user is permitted to bypass this step so that forgotten passwords may be changed.
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/db-4.7.25.NC/docs_src/tcl/ |
H A D | m4.tcl | 132 The m4_db process' environment may be permitted to specify information 140 The m4_db process' environment may be permitted to specify information
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/arm/mach-omap1/ |
H A D | board-h3.c | 301 #error this is not permitted - mode is an argument variable
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/objects/ |
H A D | obj_dat.pl | 200 * modification, are permitted provided that the following conditions
|
H A D | objects.pl | 148 * modification, are permitted provided that the following conditions
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/objects/ |
H A D | obj_dat.pl | 200 * modification, are permitted provided that the following conditions
|
H A D | objects.pl | 148 * modification, are permitted provided that the following conditions
|