Home
last modified time | relevance | path

Searched refs:user (Results 1 – 25 of 128) sorted by relevance

123456

/system/sepolicy/
Dseapp_contexts5 # user (string)
13 # isOwner=true will only match for the owner/primary user.
17 # A user string selector that ends in * will perform a prefix match.
18 # user=_app will match any regular app UID.
19 # user=_isolated will match any isolated service UID.
29 # (4) Specified user= string before unspecified user= string.
30 # (5) Fixed user= string before user= prefix (i.e. ending in *).
31 # (6) Longer user= prefix before shorter user= prefix.
41 # levelFrom (string; one of none, all, app, or user)
45 # levelFrom=user is only supported for _app or _isolated UIDs.
[all …]
Dusers1 user u roles { r } level s0 range s0 - mls_systemhigh;
/system/connectivity/shill/shims/
Dorg.chromium.flimflam.conf4 <policy user="root">
8 <policy user="system">
11 <policy user="cromo">
14 <policy user="chronos">
17 <policy user="debugd">
34 <policy user="openvpn">
38 <policy user="wpa">
41 <policy user="dhcp">
44 <policy user="buffet">
Dc_ppp.cc42 string user, pass; in PPPGetSecret() local
43 if (!PPP::GetInstance()->GetSecret(&user, &pass)) { in PPPGetSecret()
47 strcpy(username, user.c_str()); // NOLINT(runtime/printf) in PPPGetSecret()
/system/connectivity/shill/
Dprofile.cc86 if (name.user.empty()) { in Profile()
119 name_.user.c_str(), name_.identifier.c_str())); in InitStorage()
126 name_.user.c_str(), name_.identifier.c_str())); in InitStorage()
133 name_.user.c_str(), name_.identifier.c_str())); in InitStorage()
148 base::StringPrintf("Profile %s:%s", name_.user.c_str(), in InitStorage()
176 return (name_.user.empty() ? "" : name_.user + "/") + name_.identifier; in GetFriendlyName()
291 string user(raw.begin() + 1, raw.begin() + slash); in ParseIdentifier() local
293 if (!IsValidIdentifierToken(user) || !IsValidIdentifierToken(identifier)) { in ParseIdentifier()
296 parsed->user = user; in ParseIdentifier()
305 parsed->user = ""; in ParseIdentifier()
[all …]
Drpc_task_unittest.cc39 virtual void GetLogin(string* user, string* password);
53 void RPCTaskTest::GetLogin(string* user, string* password) { in GetLogin() argument
55 last_user_ = user; in GetLogin()
79 string user, password; in TEST_F() local
80 task_.GetLogin(&user, &password); in TEST_F()
82 EXPECT_EQ(&user, last_user_); in TEST_F()
Dprocess_manager.h79 const std::string& user, in StartProcessInMinijail() argument
84 spawn_source, program, arguments, user, group, capmask, exit_callback, in StartProcessInMinijail()
96 const std::string& user,
Drpc_task.cc46 void RPCTask::GetLogin(string* user, string* password) const { in GetLogin() argument
47 delegate_->GetLogin(user, password); in GetLogin()
Drpc_task.h41 virtual void GetLogin(std::string* user, std::string* password) = 0;
55 virtual void GetLogin(std::string* user, std::string* password) const;
Dmock_process_manager.h49 const std::string& user,
57 const std::string& user,
Dprofile_unittest.cc178 EXPECT_EQ(kUser, identifier.user); in TEST_F()
186 EXPECT_EQ("", identifier.user); in TEST_F()
194 identifier.user = kUser; in TEST_F()
207 id.user = kUser; in TEST_F()
221 id.user = kUser; in TEST_F()
361 EXPECT_EQ(kUser0, identifiers[0].user); in TEST_F()
364 EXPECT_EQ(kUser1, identifiers[1].user); in TEST_F()
460 id.user.c_str(), id.identifier.c_str())); in TEST_F()
Dprofile.h62 : user(u), in Identifier()
65 std::string user; // Empty for global. member
196 const std::string& GetUser() const { return name_.user; } in GetUser()
/system/security/keystore/
Dpermissions.cpp143 struct user_euid user = user_euids[i]; in get_keystore_euid() local
144 if (user.uid == uid) { in get_keystore_euid()
145 return user.euid; in get_keystore_euid()
159 struct user_perm user = user_perms[i]; in has_permission() local
160 if (user.uid == uid) { in has_permission()
161 return (user.perms & perm) && keystore_selinux_check_access(uid, perm, spid); in has_permission()
177 struct user_euid user = user_euids[i]; in is_granted_to() local
178 if (user.euid == callingUid && user.uid == targetUid) { in is_granted_to()
/system/core/metricsd/collectors/
Dcpu_usage_collector_test.cc38 uint64_t user, nice, system; in TEST() local
40 ASSERT_FALSE(collector.ParseProcStat(invalid_contents[i], &user, &nice, in TEST()
46 &user, &nice, &system)); in TEST()
47 ASSERT_EQ(17191, user); in TEST()
/system/core/metricsd/uploader/proto/
Dchrome_user_metrics_extension.proto35 // The product (i.e. end user application) for a given UMA log.
51 // "Default" directory) Chrome user data directory [1], and so is shared among
52 // all Chrome user profiles contained in this user data directory.
55 // [1] http://www.chromium.org/user-experience/user-data-directory
58 // The session id for this user.
61 // The session id is simply an integer that is incremented each time the user
65 // Information about the user's browser and system configuration.
/system/connectivity/shill/bin/
Dshill_login_user40 user=$1
58 if [ -n "$user" ] ; then
59 profile_base=$(cryptohome-path system $user)
69 user_base=$(cryptohome-path user $user)
/system/update_engine/
DUpdateEngine.conf4 <policy user="root">
8 <policy user="chronos">
62 <policy user="power">
/system/connectivity/shill/dbus/
Dchromeos_rpc_task_dbus_adaptor.cc68 brillo::ErrorPtr* /*error*/, string* user, string* password) { in getsec() argument
69 SLOG(this, 2) << __func__ << ": " << user; in getsec()
70 task_->GetLogin(user, password); in getsec()
/system/core/crash_reporter/
Dwarn_collector.l254 struct passwd *user; in main() local
313 user = getpwnam("chronos"); in main()
314 if (user == NULL) in main()
318 if (chown(warn_dump_dir, user->pw_uid, user->pw_gid) < 0) in main()
322 if (setuid(user->pw_uid) < 0) { in main()
Dcrash_reporter.cc162 const std::string& user, const bool crash_test) { in HandleUserCrash() argument
164 CHECK(!user.empty()) << "--user= must be set"; in HandleUserCrash()
176 bool handled = user_collector->HandleCrash(user, nullptr); in HandleUserCrash()
256 DEFINE_string(user, "", "User crash info (pid:signal:exec_name)"); in main()
/system/webservd/webservd/etc/dbus-1/
Dorg.chromium.WebServer.conf5 <policy user="root">
13 <policy user="webservd">
/system/firewalld/dbus/
Dorg.chromium.Firewalld.conf5 <policy user="root">
9 <policy user="devbroker">
/system/connectivity/apmanager/dbus_permissions/
Dorg.chromium.apmanager.conf4 <policy user="root">
9 <policy user="apmanager">
/system/connectivity/shill/vpn/
Dopenvpn_management_server.cc288 string user = driver_->args()->LookupString(kOpenVPNUserProperty, ""); in PerformStaticChallenge() local
292 if (user.empty() || (token.empty() && (password.empty() || otp.empty()))) { in PerformStaticChallenge()
294 << (user.empty() ? " no-user" : "") in PerformStaticChallenge()
316 SendUsername(tag, user); in PerformStaticChallenge()
322 string user = driver_->args()->LookupString(kOpenVPNUserProperty, ""); in PerformAuthentication() local
324 if (user.empty() || password.empty()) { in PerformAuthentication()
326 << (user.empty() ? " no-user" : "") in PerformAuthentication()
331 SendUsername(tag, user); in PerformAuthentication()
/system/extras/tests/net_test/
DREADME29 net_test compiles the kernel to a user-mode linux binary, which runs as a
46 interfaces are named <user>TAP0, <user>TAP1, etc., where <user> is the first

123456