/system/sepolicy/ |
D | seapp_contexts | 5 # user (string) 13 # isOwner=true will only match for the owner/primary user. 17 # A user string selector that ends in * will perform a prefix match. 18 # user=_app will match any regular app UID. 19 # user=_isolated will match any isolated service UID. 29 # (4) Specified user= string before unspecified user= string. 30 # (5) Fixed user= string before user= prefix (i.e. ending in *). 31 # (6) Longer user= prefix before shorter user= prefix. 41 # levelFrom (string; one of none, all, app, or user) 45 # levelFrom=user is only supported for _app or _isolated UIDs. [all …]
|
D | users | 1 user u roles { r } level s0 range s0 - mls_systemhigh;
|
/system/connectivity/shill/shims/ |
D | org.chromium.flimflam.conf | 4 <policy user="root"> 8 <policy user="system"> 11 <policy user="cromo"> 14 <policy user="chronos"> 17 <policy user="debugd"> 34 <policy user="openvpn"> 38 <policy user="wpa"> 41 <policy user="dhcp"> 44 <policy user="buffet">
|
D | c_ppp.cc | 42 string user, pass; in PPPGetSecret() local 43 if (!PPP::GetInstance()->GetSecret(&user, &pass)) { in PPPGetSecret() 47 strcpy(username, user.c_str()); // NOLINT(runtime/printf) in PPPGetSecret()
|
/system/connectivity/shill/ |
D | profile.cc | 86 if (name.user.empty()) { in Profile() 119 name_.user.c_str(), name_.identifier.c_str())); in InitStorage() 126 name_.user.c_str(), name_.identifier.c_str())); in InitStorage() 133 name_.user.c_str(), name_.identifier.c_str())); in InitStorage() 148 base::StringPrintf("Profile %s:%s", name_.user.c_str(), in InitStorage() 176 return (name_.user.empty() ? "" : name_.user + "/") + name_.identifier; in GetFriendlyName() 291 string user(raw.begin() + 1, raw.begin() + slash); in ParseIdentifier() local 293 if (!IsValidIdentifierToken(user) || !IsValidIdentifierToken(identifier)) { in ParseIdentifier() 296 parsed->user = user; in ParseIdentifier() 305 parsed->user = ""; in ParseIdentifier() [all …]
|
D | rpc_task_unittest.cc | 39 virtual void GetLogin(string* user, string* password); 53 void RPCTaskTest::GetLogin(string* user, string* password) { in GetLogin() argument 55 last_user_ = user; in GetLogin() 79 string user, password; in TEST_F() local 80 task_.GetLogin(&user, &password); in TEST_F() 82 EXPECT_EQ(&user, last_user_); in TEST_F()
|
D | process_manager.h | 79 const std::string& user, in StartProcessInMinijail() argument 84 spawn_source, program, arguments, user, group, capmask, exit_callback, in StartProcessInMinijail() 96 const std::string& user,
|
D | rpc_task.cc | 46 void RPCTask::GetLogin(string* user, string* password) const { in GetLogin() argument 47 delegate_->GetLogin(user, password); in GetLogin()
|
D | rpc_task.h | 41 virtual void GetLogin(std::string* user, std::string* password) = 0; 55 virtual void GetLogin(std::string* user, std::string* password) const;
|
D | mock_process_manager.h | 49 const std::string& user, 57 const std::string& user,
|
D | profile_unittest.cc | 178 EXPECT_EQ(kUser, identifier.user); in TEST_F() 186 EXPECT_EQ("", identifier.user); in TEST_F() 194 identifier.user = kUser; in TEST_F() 207 id.user = kUser; in TEST_F() 221 id.user = kUser; in TEST_F() 361 EXPECT_EQ(kUser0, identifiers[0].user); in TEST_F() 364 EXPECT_EQ(kUser1, identifiers[1].user); in TEST_F() 460 id.user.c_str(), id.identifier.c_str())); in TEST_F()
|
D | profile.h | 62 : user(u), in Identifier() 65 std::string user; // Empty for global. member 196 const std::string& GetUser() const { return name_.user; } in GetUser()
|
/system/security/keystore/ |
D | permissions.cpp | 143 struct user_euid user = user_euids[i]; in get_keystore_euid() local 144 if (user.uid == uid) { in get_keystore_euid() 145 return user.euid; in get_keystore_euid() 159 struct user_perm user = user_perms[i]; in has_permission() local 160 if (user.uid == uid) { in has_permission() 161 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid); in has_permission() 177 struct user_euid user = user_euids[i]; in is_granted_to() local 178 if (user.euid == callingUid && user.uid == targetUid) { in is_granted_to()
|
/system/core/metricsd/collectors/ |
D | cpu_usage_collector_test.cc | 38 uint64_t user, nice, system; in TEST() local 40 ASSERT_FALSE(collector.ParseProcStat(invalid_contents[i], &user, &nice, in TEST() 46 &user, &nice, &system)); in TEST() 47 ASSERT_EQ(17191, user); in TEST()
|
/system/core/metricsd/uploader/proto/ |
D | chrome_user_metrics_extension.proto | 35 // The product (i.e. end user application) for a given UMA log. 51 // "Default" directory) Chrome user data directory [1], and so is shared among 52 // all Chrome user profiles contained in this user data directory. 55 // [1] http://www.chromium.org/user-experience/user-data-directory 58 // The session id for this user. 61 // The session id is simply an integer that is incremented each time the user 65 // Information about the user's browser and system configuration.
|
/system/connectivity/shill/bin/ |
D | shill_login_user | 40 user=$1 58 if [ -n "$user" ] ; then 59 profile_base=$(cryptohome-path system $user) 69 user_base=$(cryptohome-path user $user)
|
/system/update_engine/ |
D | UpdateEngine.conf | 4 <policy user="root"> 8 <policy user="chronos"> 62 <policy user="power">
|
/system/connectivity/shill/dbus/ |
D | chromeos_rpc_task_dbus_adaptor.cc | 68 brillo::ErrorPtr* /*error*/, string* user, string* password) { in getsec() argument 69 SLOG(this, 2) << __func__ << ": " << user; in getsec() 70 task_->GetLogin(user, password); in getsec()
|
/system/core/crash_reporter/ |
D | warn_collector.l | 254 struct passwd *user; in main() local 313 user = getpwnam("chronos"); in main() 314 if (user == NULL) in main() 318 if (chown(warn_dump_dir, user->pw_uid, user->pw_gid) < 0) in main() 322 if (setuid(user->pw_uid) < 0) { in main()
|
D | crash_reporter.cc | 162 const std::string& user, const bool crash_test) { in HandleUserCrash() argument 164 CHECK(!user.empty()) << "--user= must be set"; in HandleUserCrash() 176 bool handled = user_collector->HandleCrash(user, nullptr); in HandleUserCrash() 256 DEFINE_string(user, "", "User crash info (pid:signal:exec_name)"); in main()
|
/system/webservd/webservd/etc/dbus-1/ |
D | org.chromium.WebServer.conf | 5 <policy user="root"> 13 <policy user="webservd">
|
/system/firewalld/dbus/ |
D | org.chromium.Firewalld.conf | 5 <policy user="root"> 9 <policy user="devbroker">
|
/system/connectivity/apmanager/dbus_permissions/ |
D | org.chromium.apmanager.conf | 4 <policy user="root"> 9 <policy user="apmanager">
|
/system/connectivity/shill/vpn/ |
D | openvpn_management_server.cc | 288 string user = driver_->args()->LookupString(kOpenVPNUserProperty, ""); in PerformStaticChallenge() local 292 if (user.empty() || (token.empty() && (password.empty() || otp.empty()))) { in PerformStaticChallenge() 294 << (user.empty() ? " no-user" : "") in PerformStaticChallenge() 316 SendUsername(tag, user); in PerformStaticChallenge() 322 string user = driver_->args()->LookupString(kOpenVPNUserProperty, ""); in PerformAuthentication() local 324 if (user.empty() || password.empty()) { in PerformAuthentication() 326 << (user.empty() ? " no-user" : "") in PerformAuthentication() 331 SendUsername(tag, user); in PerformAuthentication()
|
/system/extras/tests/net_test/ |
D | README | 29 net_test compiles the kernel to a user-mode linux binary, which runs as a 46 interfaces are named <user>TAP0, <user>TAP1, etc., where <user> is the first
|