| /external/selinux/libsepol/src/ |
| D | user_record.c | 9 /* This user's name */ 12 /* This user's mls level (only required for mls) */ 15 /* This user's mls range (only required for mls) */ 26 /* This user's name */ 39 "could not create selinux user key"); in sepol_user_key_create() 60 const sepol_user_t * user, in hidden_def() 64 if (sepol_user_key_create(handle, user->name, key_ptr) < 0) { in hidden_def() 65 ERR(handle, "could not extract key from user %s", user->name); in hidden_def() 77 int sepol_user_compare(const sepol_user_t * user, const sepol_user_key_t * key) in sepol_user_compare() argument 80 return strcmp(user->name, key->name); in sepol_user_compare() [all …]
|
| /external/toybox/tests/ |
| D | useradd.test | 20 # Default password for adding user is: 'password' 23 user="toyTestUser" 24 testing "adduser user_name (text)" "useradd $user $arg || 25 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] && 27 userdel -r $user $arg 29 user="toy1Test2User3" 30 testing "adduser user_name (alphanumeric)" "useradd $user $arg || 31 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] && 33 userdel -r $user $arg 35 user="987654321" [all …]
|
| /external/selinux/libsemanage/man/man3/ |
| D | semanage_user.3 | 4 semanage_user \- SELinux User Management API 14 This object contains properties associated with a SELinux user. 15 Typically many Unix users are mapped to the same SELinux user. See 17 for overview of the Unix user API. 27 create a user 32 release resources for this user 37 create a key, which can be used to identify a user 42 release resources for this user key 47 create a key matching this user 52 create an identical user (deep-copy clone) [all …]
|
| /external/autotest/client/cros/ |
| D | cryptohome.py | 25 def get_user_hash(user): argument 26 """Get the user hash for the given user.""" 28 '--user=%s' % user]) 31 def user_path(user): argument 32 """Get the user mount point for the given user.""" 33 return utils.system_output(['cryptohome-path', 'user', user]) 36 def system_path(user): argument 37 """Get the system mount point for the given user.""" 38 return utils.system_output(['cryptohome-path', 'system', user]) 41 def ensure_clean_cryptohome_for(user, password=None): argument [all …]
|
| /external/selinux/libsemanage/src/ |
| D | user_base_record.c | 3 /* Object: semanage_user_base_t (SELinux User/Class Policy Object) 4 * Object: semanage_user_key_t (SELinux User/Class Key) 29 const semanage_user_base_t * user, in semanage_user_base_key_extract() argument 33 return sepol_user_key_extract(handle->sepolh, user, key); in semanage_user_base_key_extract() 36 static int semanage_user_base_compare(const semanage_user_base_t * user, in semanage_user_base_compare() argument 40 return sepol_user_compare(user, key); in semanage_user_base_compare() 43 static int semanage_user_base_compare2(const semanage_user_base_t * user, in semanage_user_base_compare2() argument 47 return sepol_user_compare2(user, user2); in semanage_user_base_compare2() 50 static int semanage_user_base_compare2_qsort(const semanage_user_base_t ** user, in semanage_user_base_compare2_qsort() argument 55 return sepol_user_compare2(*user, *user2); in semanage_user_base_compare2_qsort() [all …]
|
| D | user_record.c | 3 /* Object: semanage_user_t (SELinux User/Class) 4 * Object: semanage_user_key_t (SELinux User/Class Key) 43 const semanage_user_t * user, in hidden_def() 47 return semanage_user_base_key_extract(handle, user->base, key); in hidden_def() 67 int semanage_user_compare(const semanage_user_t * user, in semanage_user_compare() argument 73 return strcmp(user->name, name); in semanage_user_compare() 78 int semanage_user_compare2(const semanage_user_t * user, in hidden_def() 82 return strcmp(user->name, user2->name); in hidden_def() 87 static int semanage_user_compare2_qsort(const semanage_user_t ** user, in hidden_def() 91 return strcmp((*user)->name, (*user2)->name); in hidden_def() [all …]
|
| D | user_internal.h | 31 /* USER record: metod table */ 34 /* USER BASE record: method table */ 37 /* USER EXTRA record: method table */ 42 /* USER BASE record, FILE backend */ 50 /* USER EXTRA record, FILE backend */ 58 /* USER BASE record, POLICYDB backend */ 64 /* USER record, JOIN backend */ 72 /*======= Internal API: Base (Policy) User record ====== */ 84 const semanage_user_base_t * user, 88 const semanage_user_base_t * user, [all …]
|
| /external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/appengine/auth/ |
| D | models.py | 29 For example, suppose we have a model `User` with three properties that 32 class User(model.Model): 37 To ensure property uniqueness when creating a new `User`, we first create 39 save the new `User` record:: 45 'User.username.%s' % username, 46 'User.auth_id.%s' % auth_id, 47 'User.email.%s' % email, 54 # The unique values were created, so we can save the user. 55 user = User(username=username, auth_id=auth_id, email=email) 56 user.put() [all …]
|
| /external/wpa_supplicant_8/src/ap/ |
| D | eap_user_db.c | 2 * hostapd / EAP user database 23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) in set_user_methods() argument 32 os_memset(&user->methods, 0, sizeof(user->methods)); in set_user_methods() 39 user->methods[num_methods].method = in set_user_methods() 41 &user->methods[num_methods].vendor); in set_user_methods() 42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && in set_user_methods() 43 user->methods[num_methods].method == EAP_TYPE_NONE) { in set_user_methods() 45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; in set_user_methods() 49 user->ttls_auth |= EAP_TTLS_AUTH_CHAP; in set_user_methods() 53 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAP; in set_user_methods() [all …]
|
| /external/squashfs-tools/RELEASE-READMEs/ |
| D | PERFORMANCE.README | 35 Zisofs 49.88 seconds (User 2.60 secs, Sys 11.19 secs) 36 Cloop 20.80 seconds (User 2.71 secs, Sys 13.50 secs) 37 Squashfs2.0 16.56 seconds (User 2.42 secs, Sys 10.37 secs) 38 Squashfs2.1 10.14 seconds (User 2.48 secs, Sys 4.44 secs) 45 Zisofs 27 minutes 28.54 seconds (User 3.00 secs, Sys 1 min 4.80 secs) 46 Cloop 5 minutes 55.72 seconds (User 2.90 secs, Sys 3 min 37.90 secs) 47 Squashfs2.0 5 minutes 20.87 seconds (User 2.33 secs, Sys 56.98 secs) 48 Squashfs2.1 5 minutes 15.46 seconds (user 2.28 secs, Sys 51.12 secs) 58 Zisofs 101 minutes 29.65 seconds (User 5.33 secs, Sys 1 min 17.20 secs) 59 Cloop 35 minutes 27.51 seconds (user 5.93 secs, Sys 4 mins 30.23 secs) [all …]
|
| /external/autotest/frontend/ |
| D | apache_auth.py | 1 from django.contrib.auth.models import User, Group, check_password 16 doing the real authentication. Also ensures logged-in user exists in 17 frontend.afe.models.User database. 21 user = User.objects.get(username=username) 22 except User.DoesNotExist: 24 user = User(username=username, 26 user.is_staff = True 27 user.save() # need to save before adding groups 28 user.groups.add(Group.objects.get( 32 return user [all …]
|
| /external/selinux/secilc/docs/ |
| D | cil_user_statements.md | 1 User Statements 4 user section in User Statements 7 Declares an SELinux user identifier in the current namespace. 11 (user user_id) 22 <td align="left"><p><code>user</code></p></td> 23 <td align="left"><p>The <code>user</code> keyword.</p></td> 27 <td align="left"><p>The SELinux <code>user</code> identifier.</p></td> 34 This will declare an SELinux user as `unconfined.user`: 37 (user user) 43 Associates a previously declared [`user`](cil_user_statements.md#user) identifier with a previously… [all …]
|
| /external/wpa_supplicant_8/hs20/server/ |
| D | spp_server.c | 47 static char * db_get_session_val(struct hs20_svc *ctx, const char *user, 52 static xml_node_t * build_policy(struct hs20_svc *ctx, const char *user, 57 const char *user, const char *realm, in db_add_session() argument 65 sql = sqlite3_mprintf("INSERT INTO sessions(timestamp,id,user,realm," in db_add_session() 70 sessionid, user ? user : "", realm ? realm : "", in db_add_session() 86 static void db_update_session_password(struct hs20_svc *ctx, const char *user, in db_update_session_password() argument 93 "user=%Q AND realm=%Q", in db_update_session_password() 94 pw, sessionid, user, realm); in db_update_session_password() 107 const char *user, in db_update_session_machine_managed() argument 114 …sql = sqlite3_mprintf("UPDATE sessions SET machine_managed=%Q WHERE id=%Q AND user=%Q AND realm=%Q… in db_update_session_machine_managed() [all …]
|
| /external/autotest/client/site_tests/platform_CryptohomeMigrateKey/ |
| D | platform_CryptohomeMigrateKey.py | 13 user = utils.random_username() 17 if not self.proxy.mount(user, old_pass, create=True): 18 raise error.TestFail('Could not create good user.') 19 if not self.proxy.unmount(user): 20 raise error.TestFail('Could not unmount good user.') 21 if not self.proxy.migrate(user, old_pass, new_pass): 22 raise error.TestFail('Could not migrate good user.') 23 if self.proxy.mount(user, old_pass): 25 if not self.proxy.mount(user, new_pass): 26 raise error.TestFail('Could not mount good user.') [all …]
|
| /external/autotest/client/site_tests/platform_CryptohomeBadPerms/ |
| D | platform_CryptohomeBadPerms.py | 15 def require_mount_fail(self, user): argument 16 if self.cryptohome_proxy.mount(user, 'test', create=True): 17 raise error.TestFail('Mount unexpectedly succeeded for %s' % user) 22 # Leaf element of user path not owned by user. 23 user = utils.random_username() 24 path = cryptohome.user_path(user) 28 self.require_mount_fail(user) 33 user = utils.random_username() 34 path = cryptohome.system_path(user) 37 self.require_mount_fail(user) [all …]
|
| /external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/ |
| D | auth.py | 22 #: User model which authenticates custom users and tokens. 24 #: Default is :class:`webapp2_extras.appengine.auth.models.User`. 49 #: A list of extra user attributes to be stored in the session. 50 # The user object must provide all of them as attributes. 53 'user_model': 'webapp2_extras.appengine.auth.models.User', 71 """Raised when a user can't be fetched given an auth_id.""" 75 """Raised when a user password doesn't match.""" 102 # User data we're interested in ------------------------------------------- 116 """The list of attributes retrieved from the user model. 124 # User model related ------------------------------------------------------ [all …]
|
| /external/autotest/client/site_tests/security_HardlinkRestrictions/ |
| D | security_HardlinkRestrictions.py | 51 def _is_readable(self, path, user, expected=True): argument 52 rc = utils.system("su -c 'cat %s' %s" % (path, user), 59 (user, path)) 62 (user, path)) 65 def _is_writable(self, path, user, expected=True): argument 66 rc = utils.system("su -c 'echo > %s' %s" % (path, user), 73 (user, path)) 76 (user, path)) 79 def _can_hardlink(self, source, target, user, expected=True): argument 80 rc = utils.system("su -c 'ln %s %s' %s" % (source, target, user), [all …]
|
| /external/chromium-trace/catapult/third_party/webapp2/tests/ |
| D | extras_appengine_auth_models_test.py | 13 class User(model.Model): class 23 self.register_model('User', models.User) 28 m = models.User 29 success, user = m.create_user(auth_id='auth_id_1', password_raw='foo') 31 self.assertTrue(user is not None) 32 self.assertTrue(user.password is not None) 34 # user.key.id() is required to retrieve the auth token 35 user_id = user.key.id() 39 self.assertEqual(m.get_by_auth_id('auth_id_1'), user) 43 self.assertEqual(u, user) [all …]
|
| /external/autotest/client/site_tests/network_ShillInitScripts/ |
| D | network_ShillInitScripts.py | 29 fake_user = 'not-a-real-user@chromium.org' 54 def login(self, user=None): argument 59 @param user string user name (email address) to log in. 62 utils.system('start shill-start-user-session CHROMEOS_USER=%s' % 63 (user or self.fake_user)) 76 """ Simulate user logout. 81 utils.system('start shill-stop-user-session') 92 # Deduce the root cryptohome directory name for our fake user. 96 # Deduce the user cryptohome directory name for our fake user. 98 '%s user %s' % (self.cryptohome_path_command, self.fake_user)) [all …]
|
| /external/autotest/client/site_tests/platform_CryptohomeChangePassword/ |
| D | platform_CryptohomeChangePassword.py | 26 # Get the hash for the test user account 27 cmd = ('/usr/sbin/cryptohome --action=obfuscate_user --user=' 31 # Remove the test user account 32 cmd = ('/usr/sbin/cryptohome --action=remove --force --user=' 35 # Ensure that the user directory does not exist 37 raise error.TestFail('Cryptohome could not remove the test user.') 39 # Mount the test user account 40 cmd = ('/usr/sbin/cryptohome --async --action=mount --user=' + test_user 43 # Ensure that the user directory exists 45 raise error.TestFail('Cryptohome could not create the test user.') [all …]
|
| /external/autotest/site_utils/ |
| D | mysql_bootstrap.py | 8 The purpose of this module is to grant access to a new-user/host/password 78 def mysql_cmd(cls, cmd, user=DEFAULT_USER, password=DEFAULT_PASS, argument 84 @param user: The user to use in the given command. 85 @param password: The password for the user. 89 (user, password, host, port, cmd)) 109 def ping(cls, db_server, user=DEFAULT_USER, password=DEFAULT_PASS, argument 111 """Ping the given db server as 'user' using 'password'. 114 @param user: The user to use in the ping. 115 @param password: The password of the user. 130 'SELECT version();', host=mysql_cmd_host, user=user, [all …]
|
| /external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/opsworks/ |
| D | layer1.py | 115 **Required Permissions**: To use this action, an IAM user must 118 information on user permissions, see `Managing User 143 **Required Permissions**: To use this action, an IAM user must 146 information on user permissions, see `Managing User 169 **Required Permissions**: To use this action, an IAM user must 172 information on user permissions, see `Managing User 202 **Required Permissions**: To use this action, an IAM user must 205 information on user permissions, see `Managing User 239 **Required Permissions**: To use this action, an IAM user must 241 For more information on user permissions, see `Managing User [all …]
|
| /external/selinux/libsemanage/include/semanage/ |
| D | user_record.h | 24 const semanage_user_t * user, 29 extern int semanage_user_compare(const semanage_user_t * user, 32 extern int semanage_user_compare2(const semanage_user_t * user, 36 extern const char *semanage_user_get_name(const semanage_user_t * user); 39 semanage_user_t * user, const char *name); 42 extern const char *semanage_user_get_prefix(const semanage_user_t * user); 45 semanage_user_t * user, const char *name); 48 extern const char *semanage_user_get_mlslevel(const semanage_user_t * user); 51 semanage_user_t * user, 54 extern const char *semanage_user_get_mlsrange(const semanage_user_t * user); [all …]
|
| /external/selinux/libselinux/include/selinux/ |
| D | get_context_list.h | 12 /* Get an ordered list of authorized security contexts for a user session 13 for 'user' spawned by 'fromcon' and set *conary to refer to the 15 be authorized by the policy, but the ordering is subject to user 19 extern int get_ordered_context_list(const char *user, 24 default level for the user. */ 25 int get_ordered_context_list_with_level(const char *user, 30 /* Get the default security context for a user session for 'user' 33 of a default is subject to user customizable preferences. 37 extern int get_default_context(const char *user, 42 default level for the user. */ [all …]
|
| /external/nist-sip/java/gov/nist/javax/sip/address/ |
| D | UserInfo.java | 36 * User information part of a URL. 47 /** user field 49 protected String user; field in UserInfo 65 public final static int USER = 2; field in UserInfo 86 if (!this.user.equalsIgnoreCase(other.user)) { in equals() 102 * Encode the user information as a string. 111 buffer.append(user).append(COLON).append(password); in encode() 113 buffer.append(user); in encode() 125 * Gets the user type (which can be set to TELEPHONE_SUBSCRIBER or USER) 126 * @return the type of user. [all …]
|