Home
last modified time | relevance | path

Searched full:user (Results 1 – 25 of 9044) sorted by relevance

12345678910>>...362

/external/selinux/libsepol/src/
Duser_record.c9 /* This user's name */
12 /* This user's mls level (only required for mls) */
15 /* This user's mls range (only required for mls) */
26 /* This user's name */
39 "could not create selinux user key"); in sepol_user_key_create()
45 ERR(handle, "out of memory, could not create selinux user key"); in sepol_user_key_create()
65 const sepol_user_t * user, in hidden_def()
69 if (sepol_user_key_create(handle, user->name, key_ptr) < 0) { in hidden_def()
70 ERR(handle, "could not extract key from user %s", user->name); in hidden_def()
85 int sepol_user_compare(const sepol_user_t * user, const sepol_user_key_t * key) in sepol_user_compare() argument
[all …]
/external/toybox/tests/
Duseradd.test20 # Default password for adding user is: 'password'
23 user="toyTestUser"
24 testing "(text)" "useradd $user $arg ||
25 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] &&
27 userdel -r $user $arg
29 user="toy1Test2User3"
30 testing "(alphanumeric)" "useradd $user $arg ||
31 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] &&
33 userdel -r $user $arg
35 user="987654321"
[all …]
/external/autotest/client/cros/
Dcryptohome.py28 def get_user_hash(user): argument
29 """Get the user hash for the given user."""
31 '--user=%s' % user])
34 def user_path(user): argument
35 """Get the user mount point for the given user."""
36 return utils.system_output(['cryptohome-path', 'user', user])
39 def system_path(user): argument
40 """Get the system mount point for the given user."""
41 return utils.system_output(['cryptohome-path', 'system', user])
44 def temporary_mount_path(user): argument
[all …]
/external/selinux/libsemanage/man/man3/
Dsemanage_user.34 semanage_user \- SELinux User Management API
14 This object contains properties associated with a SELinux user.
15 Typically many Unix users are mapped to the same SELinux user. See
17 for overview of the Unix user API.
27 create a user
32 release resources for this user
37 create a key, which can be used to identify a user
42 release resources for this user key
47 create a key matching this user
52 create an identical user (deep-copy clone)
[all …]
/external/selinux/libsemanage/src/
Duser_base_record.c3 /* Object: semanage_user_base_t (SELinux User/Class Policy Object)
4 * Object: semanage_user_key_t (SELinux User/Class Key)
29 const semanage_user_base_t * user, in semanage_user_base_key_extract() argument
33 return sepol_user_key_extract(handle->sepolh, user, key); in semanage_user_base_key_extract()
36 static int semanage_user_base_compare(const semanage_user_base_t * user, in semanage_user_base_compare() argument
40 return sepol_user_compare(user, key); in semanage_user_base_compare()
43 static int semanage_user_base_compare2(const semanage_user_base_t * user, in semanage_user_base_compare2() argument
47 return sepol_user_compare2(user, user2); in semanage_user_base_compare2()
50 static int semanage_user_base_compare2_qsort(const semanage_user_base_t ** user, in semanage_user_base_compare2_qsort() argument
55 return sepol_user_compare2(*user, *user2); in semanage_user_base_compare2_qsort()
[all …]
Duser_record.c3 /* Object: semanage_user_t (SELinux User/Class)
4 * Object: semanage_user_key_t (SELinux User/Class Key)
43 const semanage_user_t * user, in hidden_def()
47 return semanage_user_base_key_extract(handle, user->base, key); in hidden_def()
67 int semanage_user_compare(const semanage_user_t * user, in semanage_user_compare() argument
73 return strcmp(user->name, name); in semanage_user_compare()
78 int semanage_user_compare2(const semanage_user_t * user, in hidden_def()
82 return strcmp(user->name, user2->name); in hidden_def()
87 static int semanage_user_compare2_qsort(const semanage_user_t ** user, in hidden_def()
91 return strcmp((*user)->name, (*user2)->name); in hidden_def()
[all …]
Duser_internal.h31 /* USER record: metod table */
34 /* USER BASE record: method table */
37 /* USER EXTRA record: method table */
42 /* USER BASE record, FILE backend */
50 /* USER EXTRA record, FILE backend */
58 /* USER BASE record, POLICYDB backend */
64 /* USER record, JOIN backend */
72 /*======= Internal API: Base (Policy) User record ====== */
84 const semanage_user_base_t * user,
88 const semanage_user_base_t * user,
[all …]
/external/wpa_supplicant_8/src/ap/
Deap_user_db.c2 * hostapd / EAP user database
23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) in set_user_methods() argument
32 os_memset(&user->methods, 0, sizeof(user->methods)); in set_user_methods()
39 user->methods[num_methods].method = in set_user_methods()
41 &user->methods[num_methods].vendor); in set_user_methods()
42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && in set_user_methods()
43 user->methods[num_methods].method == EAP_TYPE_NONE) { in set_user_methods()
45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; in set_user_methods()
49 user->ttls_auth |= EAP_TTLS_AUTH_CHAP; in set_user_methods()
53 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAP; in set_user_methods()
[all …]
/external/autotest/frontend/
Dapache_auth.py1 from django.contrib.auth.models import User, Group, check_password
16 doing the real authentication. Also ensures logged-in user exists in
17 frontend.afe.models.User database.
21 user = User.objects.get(username=username)
22 except User.DoesNotExist:
24 user = User(username=username,
26 user.is_staff = True
27 user.save() # need to save before adding groups
28 user.groups.add(Group.objects.get(
32 return user
[all …]
/external/squashfs-tools/RELEASE-READMEs/
DPERFORMANCE.README35 Zisofs 49.88 seconds (User 2.60 secs, Sys 11.19 secs)
36 Cloop 20.80 seconds (User 2.71 secs, Sys 13.50 secs)
37 Squashfs2.0 16.56 seconds (User 2.42 secs, Sys 10.37 secs)
38 Squashfs2.1 10.14 seconds (User 2.48 secs, Sys 4.44 secs)
45 Zisofs 27 minutes 28.54 seconds (User 3.00 secs, Sys 1 min 4.80 secs)
46 Cloop 5 minutes 55.72 seconds (User 2.90 secs, Sys 3 min 37.90 secs)
47 Squashfs2.0 5 minutes 20.87 seconds (User 2.33 secs, Sys 56.98 secs)
48 Squashfs2.1 5 minutes 15.46 seconds (user 2.28 secs, Sys 51.12 secs)
58 Zisofs 101 minutes 29.65 seconds (User 5.33 secs, Sys 1 min 17.20 secs)
59 Cloop 35 minutes 27.51 seconds (user 5.93 secs, Sys 4 mins 30.23 secs)
[all …]
/external/syslinux/gpxe/src/include/gpxe/
Duaccess.h7 * Access to external ("user") memory
30 * A pointer to a user buffer
35 /** Equivalent of NULL for user pointers */
39 * @defgroup uaccess_trivial Trivial user access API implementations
41 * User access API implementations that can be used by environments in
49 * Convert virtual address to user pointer
52 * @ret userptr User pointer
60 * Convert user pointer to virtual address
62 * @v userptr User pointer
63 * @v offset Offset from user pointer
[all …]
/external/selinux/secilc/docs/
Dcil_user_statements.md1 User Statements
4 user section in User Statements
7 Declares an SELinux user identifier in the current namespace.
11 (user user_id)
22 <td align="left"><p><code>user</code></p></td>
23 <td align="left"><p>The <code>user</code> keyword.</p></td>
27 <td align="left"><p>The SELinux <code>user</code> identifier.</p></td>
34 This will declare an SELinux user as `unconfined.user`:
37 (user user)
43 Associates a previously declared [`user`](cil_user_statements.md#user) identifier with a previously…
[all …]
/external/wpa_supplicant_8/hs20/server/
Dspp_server.c47 static char * db_get_session_val(struct hs20_svc *ctx, const char *user,
52 static xml_node_t * build_policy(struct hs20_svc *ctx, const char *user,
57 const char *user, const char *realm, in db_add_session() argument
65 sql = sqlite3_mprintf("INSERT INTO sessions(timestamp,id,user,realm," in db_add_session()
70 sessionid, user ? user : "", realm ? realm : "", in db_add_session()
86 static void db_update_session_password(struct hs20_svc *ctx, const char *user, in db_update_session_password() argument
93 "user=%Q AND realm=%Q", in db_update_session_password()
94 pw, sessionid, user, realm); in db_update_session_password()
107 const char *user, in db_update_session_machine_managed() argument
114 …sql = sqlite3_mprintf("UPDATE sessions SET machine_managed=%Q WHERE id=%Q AND user=%Q AND realm=%Q… in db_update_session_machine_managed()
[all …]
Dhs20-osu-server.txt46 assumes /home/user/hs20-server to be used, but this can be changed by
49 sudo mkdir -p /home/user/hs20-server
50 sudo chown $USER /home/user/hs20-server
51 mkdir -p /home/user/hs20-server/spp
52 mkdir -p /home/user/hs20-server/AS
80 cp hostapd hlr_auc_gw /home/user/hs20-server/AS
86 cp hs20_spp_server /home/user/hs20-server/spp
87 # prepare database (web server user/group needs to have write access)
88 mkdir -p /home/user/hs20-server/AS/DB
89 sudo chgrp www-data /home/user/hs20-server/AS/DB
[all …]
/external/autotest/client/site_tests/platform_CryptohomeMigrateKey/
Dplatform_CryptohomeMigrateKey.py13 user = utils.random_username()
17 if not self.proxy.mount(user, old_pass, create=True):
18 raise error.TestFail('Could not create good user.')
19 if not self.proxy.unmount(user):
20 raise error.TestFail('Could not unmount good user.')
21 if not self.proxy.migrate(user, old_pass, new_pass):
22 raise error.TestFail('Could not migrate good user.')
23 if self.proxy.mount(user, old_pass):
25 if not self.proxy.mount(user, new_pass):
26 raise error.TestFail('Could not mount good user.')
[all …]
/external/autotest/client/site_tests/platform_CryptohomeBadPerms/
Dplatform_CryptohomeBadPerms.py18 def require_mount_fail(self, user): argument
21 @param user: A random user created in run_once.
23 if self.cryptohome_proxy.mount(user, 'test', create=True):
24 raise error.TestFail('Mount unexpectedly succeeded for %s' % user)
29 # Leaf element of user path not owned by user.
30 user = utils.random_username()
31 path = cryptohome.user_path(user)
35 self.require_mount_fail(user)
40 user = utils.random_username()
41 path = cryptohome.system_path(user)
[all …]
/external/autotest/client/site_tests/security_HardlinkRestrictions/
Dsecurity_HardlinkRestrictions.py51 def _is_readable(self, path, user, expected=True): argument
52 rc = utils.system("su -c 'cat %s' %s" % (path, user),
59 (user, path))
62 (user, path))
65 def _is_writable(self, path, user, expected=True): argument
66 rc = utils.system("su -c 'echo > %s' %s" % (path, user),
73 (user, path))
76 (user, path))
79 def _can_hardlink(self, source, target, user, expected=True): argument
80 rc = utils.system("su -c 'ln %s %s' %s" % (source, target, user),
[all …]
/external/autotest/client/site_tests/platform_CryptohomeChangePassword/
Dplatform_CryptohomeChangePassword.py26 # Get the hash for the test user account
27 cmd = ('/usr/sbin/cryptohome --action=obfuscate_user --user='
31 # Remove the test user account
32 cmd = ('/usr/sbin/cryptohome --action=remove --force --user='
35 # Ensure that the user directory does not exist
37 raise error.TestFail('Cryptohome could not remove the test user.')
39 # Mount the test user account
40 cmd = ('/usr/sbin/cryptohome --async --action=mount --user=' + test_user
43 # Ensure that the user directory exists
45 raise error.TestFail('Cryptohome could not create the test user.')
[all …]
/external/autotest/site_utils/
Dmysql_bootstrap.py8 The purpose of this module is to grant access to a new-user/host/password
78 def mysql_cmd(cls, cmd, user=DEFAULT_USER, password=DEFAULT_PASS, argument
84 @param user: The user to use in the given command.
85 @param password: The password for the user.
89 (user, password, host, port, cmd))
109 def ping(cls, db_server, user=DEFAULT_USER, password=DEFAULT_PASS, argument
111 """Ping the given db server as 'user' using 'password'.
114 @param user: The user to use in the ping.
115 @param password: The password of the user.
130 'SELECT version();', host=mysql_cmd_host, user=user,
[all …]
/external/openssh/regress/
Daddrmatch.sh10 user="$1"; addr="$2"; host="$3"; laddr="$4"; lport="$5"
13 verbose "test $descr for $user $addr $host"
15 -C user=${user},addr=${addr},host=${host},laddr=${laddr},lport=${lport} | \
35 run_trial user 192.168.0.1 somehost 1.2.3.4 1234 match1 "first entry"
36 run_trial user 192.168.30.1 somehost 1.2.3.4 1234 nomatch "negative match"
37 run_trial user 19.0.0.1 somehost 1.2.3.4 1234 nomatch "no match"
38 run_trial user 10.255.255.254 somehost 1.2.3.4 1234 match1 "list middle"
39 run_trial user 192.168.30.1 192.168.0.1 1.2.3.4 1234 nomatch "faked IP in hostname"
40 run_trial user 1.1.1.1 somehost.example.com 1.2.3.4 1234 match2 "bare IP4 address"
41 run_trial user 19.0.0.1 somehost 127.0.0.1 1234 match3 "localaddress"
[all …]
Dcert-userkey.sh4 tid="certified user keys"
6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key*
29 # Generate and sign user keys
31 verbose "$tid: sign user ${ktype} cert"
41 -I "regress user key for $USER" \
42 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \
53 rm -f $OBJ/authorized_keys_$USER
69 rm -f $OBJ/authorized_principals_$USER
78 echo > $OBJ/authorized_principals_$USER
87 echo gregorsamsa > $OBJ/authorized_principals_$USER
[all …]
/external/selinux/libsemanage/include/semanage/
Duser_record.h24 const semanage_user_t * user,
29 extern int semanage_user_compare(const semanage_user_t * user,
32 extern int semanage_user_compare2(const semanage_user_t * user,
36 extern const char *semanage_user_get_name(const semanage_user_t * user);
39 semanage_user_t * user, const char *name);
42 extern const char *semanage_user_get_prefix(const semanage_user_t * user);
45 semanage_user_t * user, const char *name);
48 extern const char *semanage_user_get_mlslevel(const semanage_user_t * user);
51 semanage_user_t * user,
54 extern const char *semanage_user_get_mlsrange(const semanage_user_t * user);
[all …]
/external/selinux/libselinux/include/selinux/
Dget_context_list.h12 /* Get an ordered list of authorized security contexts for a user session
13 for 'user' spawned by 'fromcon' and set *conary to refer to the
15 be authorized by the policy, but the ordering is subject to user
19 extern int get_ordered_context_list(const char *user,
24 default level for the user. */
25 int get_ordered_context_list_with_level(const char *user,
30 /* Get the default security context for a user session for 'user'
33 of a default is subject to user customizable preferences.
37 extern int get_default_context(const char *user,
42 default level for the user. */
[all …]
/external/nist-sip/java/gov/nist/javax/sip/address/
DUserInfo.java36 * User information part of a URL.
47 /** user field
49 protected String user; field in UserInfo
65 public final static int USER = 2; field in UserInfo
86 if (!this.user.equalsIgnoreCase(other.user)) { in equals()
102 * Encode the user information as a string.
111 buffer.append(user).append(COLON).append(password); in encode()
113 buffer.append(user); in encode()
125 * Gets the user type (which can be set to TELEPHONE_SUBSCRIBER or USER)
126 * @return the type of user.
[all …]
/external/curl/docs/libcurl/opts/
DCURLOPT_URL.377 It is also possible to specify the user name, password and any supported login
81 http://user:password@www.example.com
83 ftp://user:password@ftp.example.com
87 imap://user:password;options@mail.example.com
89 pop3://user:password;options@mail.example.com
91 smtp://user:password;options@mail.example.com
141 ftp://user:password@ftp.example.com/readme.txt - This retrieves the readme.txt
142 file from the user's home directory. When a username and password is
144 user's home directory. To retrieve files from the root directory or a
149 ftp://user:password@ftp.example.com//readme.txt - This retrieves the readme.txt
[all …]

12345678910>>...362