/external/selinux/libsepol/src/ |
D | user_record.c | 9 /* This user's name */ 12 /* This user's mls level (only required for mls) */ 15 /* This user's mls range (only required for mls) */ 26 /* This user's name */ 39 "could not create selinux user key"); in sepol_user_key_create() 45 ERR(handle, "out of memory, could not create selinux user key"); in sepol_user_key_create() 65 const sepol_user_t * user, in hidden_def() 69 if (sepol_user_key_create(handle, user->name, key_ptr) < 0) { in hidden_def() 70 ERR(handle, "could not extract key from user %s", user->name); in hidden_def() 85 int sepol_user_compare(const sepol_user_t * user, const sepol_user_key_t * key) in sepol_user_compare() argument [all …]
|
/external/toybox/tests/ |
D | useradd.test | 20 # Default password for adding user is: 'password' 23 user="toyTestUser" 24 testing "(text)" "useradd $user $arg || 25 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] && 27 userdel -r $user $arg 29 user="toy1Test2User3" 30 testing "(alphanumeric)" "useradd $user $arg || 31 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] && 33 userdel -r $user $arg 35 user="987654321" [all …]
|
/external/autotest/client/cros/ |
D | cryptohome.py | 28 def get_user_hash(user): argument 29 """Get the user hash for the given user.""" 31 '--user=%s' % user]) 34 def user_path(user): argument 35 """Get the user mount point for the given user.""" 36 return utils.system_output(['cryptohome-path', 'user', user]) 39 def system_path(user): argument 40 """Get the system mount point for the given user.""" 41 return utils.system_output(['cryptohome-path', 'system', user]) 44 def temporary_mount_path(user): argument [all …]
|
/external/selinux/libsemanage/man/man3/ |
D | semanage_user.3 | 4 semanage_user \- SELinux User Management API 14 This object contains properties associated with a SELinux user. 15 Typically many Unix users are mapped to the same SELinux user. See 17 for overview of the Unix user API. 27 create a user 32 release resources for this user 37 create a key, which can be used to identify a user 42 release resources for this user key 47 create a key matching this user 52 create an identical user (deep-copy clone) [all …]
|
/external/selinux/libsemanage/src/ |
D | user_base_record.c | 3 /* Object: semanage_user_base_t (SELinux User/Class Policy Object) 4 * Object: semanage_user_key_t (SELinux User/Class Key) 29 const semanage_user_base_t * user, in semanage_user_base_key_extract() argument 33 return sepol_user_key_extract(handle->sepolh, user, key); in semanage_user_base_key_extract() 36 static int semanage_user_base_compare(const semanage_user_base_t * user, in semanage_user_base_compare() argument 40 return sepol_user_compare(user, key); in semanage_user_base_compare() 43 static int semanage_user_base_compare2(const semanage_user_base_t * user, in semanage_user_base_compare2() argument 47 return sepol_user_compare2(user, user2); in semanage_user_base_compare2() 50 static int semanage_user_base_compare2_qsort(const semanage_user_base_t ** user, in semanage_user_base_compare2_qsort() argument 55 return sepol_user_compare2(*user, *user2); in semanage_user_base_compare2_qsort() [all …]
|
D | user_record.c | 3 /* Object: semanage_user_t (SELinux User/Class) 4 * Object: semanage_user_key_t (SELinux User/Class Key) 43 const semanage_user_t * user, in hidden_def() 47 return semanage_user_base_key_extract(handle, user->base, key); in hidden_def() 67 int semanage_user_compare(const semanage_user_t * user, in semanage_user_compare() argument 73 return strcmp(user->name, name); in semanage_user_compare() 78 int semanage_user_compare2(const semanage_user_t * user, in hidden_def() 82 return strcmp(user->name, user2->name); in hidden_def() 87 static int semanage_user_compare2_qsort(const semanage_user_t ** user, in hidden_def() 91 return strcmp((*user)->name, (*user2)->name); in hidden_def() [all …]
|
D | user_internal.h | 31 /* USER record: metod table */ 34 /* USER BASE record: method table */ 37 /* USER EXTRA record: method table */ 42 /* USER BASE record, FILE backend */ 50 /* USER EXTRA record, FILE backend */ 58 /* USER BASE record, POLICYDB backend */ 64 /* USER record, JOIN backend */ 72 /*======= Internal API: Base (Policy) User record ====== */ 84 const semanage_user_base_t * user, 88 const semanage_user_base_t * user, [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | eap_user_db.c | 2 * hostapd / EAP user database 23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) in set_user_methods() argument 32 os_memset(&user->methods, 0, sizeof(user->methods)); in set_user_methods() 39 user->methods[num_methods].method = in set_user_methods() 41 &user->methods[num_methods].vendor); in set_user_methods() 42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && in set_user_methods() 43 user->methods[num_methods].method == EAP_TYPE_NONE) { in set_user_methods() 45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; in set_user_methods() 49 user->ttls_auth |= EAP_TTLS_AUTH_CHAP; in set_user_methods() 53 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAP; in set_user_methods() [all …]
|
/external/autotest/frontend/ |
D | apache_auth.py | 1 from django.contrib.auth.models import User, Group, check_password 16 doing the real authentication. Also ensures logged-in user exists in 17 frontend.afe.models.User database. 21 user = User.objects.get(username=username) 22 except User.DoesNotExist: 24 user = User(username=username, 26 user.is_staff = True 27 user.save() # need to save before adding groups 28 user.groups.add(Group.objects.get( 32 return user [all …]
|
/external/squashfs-tools/RELEASE-READMEs/ |
D | PERFORMANCE.README | 35 Zisofs 49.88 seconds (User 2.60 secs, Sys 11.19 secs) 36 Cloop 20.80 seconds (User 2.71 secs, Sys 13.50 secs) 37 Squashfs2.0 16.56 seconds (User 2.42 secs, Sys 10.37 secs) 38 Squashfs2.1 10.14 seconds (User 2.48 secs, Sys 4.44 secs) 45 Zisofs 27 minutes 28.54 seconds (User 3.00 secs, Sys 1 min 4.80 secs) 46 Cloop 5 minutes 55.72 seconds (User 2.90 secs, Sys 3 min 37.90 secs) 47 Squashfs2.0 5 minutes 20.87 seconds (User 2.33 secs, Sys 56.98 secs) 48 Squashfs2.1 5 minutes 15.46 seconds (user 2.28 secs, Sys 51.12 secs) 58 Zisofs 101 minutes 29.65 seconds (User 5.33 secs, Sys 1 min 17.20 secs) 59 Cloop 35 minutes 27.51 seconds (user 5.93 secs, Sys 4 mins 30.23 secs) [all …]
|
/external/syslinux/gpxe/src/include/gpxe/ |
D | uaccess.h | 7 * Access to external ("user") memory 30 * A pointer to a user buffer 35 /** Equivalent of NULL for user pointers */ 39 * @defgroup uaccess_trivial Trivial user access API implementations 41 * User access API implementations that can be used by environments in 49 * Convert virtual address to user pointer 52 * @ret userptr User pointer 60 * Convert user pointer to virtual address 62 * @v userptr User pointer 63 * @v offset Offset from user pointer [all …]
|
/external/selinux/secilc/docs/ |
D | cil_user_statements.md | 1 User Statements 4 user section in User Statements 7 Declares an SELinux user identifier in the current namespace. 11 (user user_id) 22 <td align="left"><p><code>user</code></p></td> 23 <td align="left"><p>The <code>user</code> keyword.</p></td> 27 <td align="left"><p>The SELinux <code>user</code> identifier.</p></td> 34 This will declare an SELinux user as `unconfined.user`: 37 (user user) 43 Associates a previously declared [`user`](cil_user_statements.md#user) identifier with a previously… [all …]
|
/external/wpa_supplicant_8/hs20/server/ |
D | spp_server.c | 47 static char * db_get_session_val(struct hs20_svc *ctx, const char *user, 52 static xml_node_t * build_policy(struct hs20_svc *ctx, const char *user, 57 const char *user, const char *realm, in db_add_session() argument 65 sql = sqlite3_mprintf("INSERT INTO sessions(timestamp,id,user,realm," in db_add_session() 70 sessionid, user ? user : "", realm ? realm : "", in db_add_session() 86 static void db_update_session_password(struct hs20_svc *ctx, const char *user, in db_update_session_password() argument 93 "user=%Q AND realm=%Q", in db_update_session_password() 94 pw, sessionid, user, realm); in db_update_session_password() 107 const char *user, in db_update_session_machine_managed() argument 114 …sql = sqlite3_mprintf("UPDATE sessions SET machine_managed=%Q WHERE id=%Q AND user=%Q AND realm=%Q… in db_update_session_machine_managed() [all …]
|
D | hs20-osu-server.txt | 46 assumes /home/user/hs20-server to be used, but this can be changed by 49 sudo mkdir -p /home/user/hs20-server 50 sudo chown $USER /home/user/hs20-server 51 mkdir -p /home/user/hs20-server/spp 52 mkdir -p /home/user/hs20-server/AS 80 cp hostapd hlr_auc_gw /home/user/hs20-server/AS 86 cp hs20_spp_server /home/user/hs20-server/spp 87 # prepare database (web server user/group needs to have write access) 88 mkdir -p /home/user/hs20-server/AS/DB 89 sudo chgrp www-data /home/user/hs20-server/AS/DB [all …]
|
/external/autotest/client/site_tests/platform_CryptohomeMigrateKey/ |
D | platform_CryptohomeMigrateKey.py | 13 user = utils.random_username() 17 if not self.proxy.mount(user, old_pass, create=True): 18 raise error.TestFail('Could not create good user.') 19 if not self.proxy.unmount(user): 20 raise error.TestFail('Could not unmount good user.') 21 if not self.proxy.migrate(user, old_pass, new_pass): 22 raise error.TestFail('Could not migrate good user.') 23 if self.proxy.mount(user, old_pass): 25 if not self.proxy.mount(user, new_pass): 26 raise error.TestFail('Could not mount good user.') [all …]
|
/external/autotest/client/site_tests/platform_CryptohomeBadPerms/ |
D | platform_CryptohomeBadPerms.py | 18 def require_mount_fail(self, user): argument 21 @param user: A random user created in run_once. 23 if self.cryptohome_proxy.mount(user, 'test', create=True): 24 raise error.TestFail('Mount unexpectedly succeeded for %s' % user) 29 # Leaf element of user path not owned by user. 30 user = utils.random_username() 31 path = cryptohome.user_path(user) 35 self.require_mount_fail(user) 40 user = utils.random_username() 41 path = cryptohome.system_path(user) [all …]
|
/external/autotest/client/site_tests/security_HardlinkRestrictions/ |
D | security_HardlinkRestrictions.py | 51 def _is_readable(self, path, user, expected=True): argument 52 rc = utils.system("su -c 'cat %s' %s" % (path, user), 59 (user, path)) 62 (user, path)) 65 def _is_writable(self, path, user, expected=True): argument 66 rc = utils.system("su -c 'echo > %s' %s" % (path, user), 73 (user, path)) 76 (user, path)) 79 def _can_hardlink(self, source, target, user, expected=True): argument 80 rc = utils.system("su -c 'ln %s %s' %s" % (source, target, user), [all …]
|
/external/autotest/client/site_tests/platform_CryptohomeChangePassword/ |
D | platform_CryptohomeChangePassword.py | 26 # Get the hash for the test user account 27 cmd = ('/usr/sbin/cryptohome --action=obfuscate_user --user=' 31 # Remove the test user account 32 cmd = ('/usr/sbin/cryptohome --action=remove --force --user=' 35 # Ensure that the user directory does not exist 37 raise error.TestFail('Cryptohome could not remove the test user.') 39 # Mount the test user account 40 cmd = ('/usr/sbin/cryptohome --async --action=mount --user=' + test_user 43 # Ensure that the user directory exists 45 raise error.TestFail('Cryptohome could not create the test user.') [all …]
|
/external/autotest/site_utils/ |
D | mysql_bootstrap.py | 8 The purpose of this module is to grant access to a new-user/host/password 78 def mysql_cmd(cls, cmd, user=DEFAULT_USER, password=DEFAULT_PASS, argument 84 @param user: The user to use in the given command. 85 @param password: The password for the user. 89 (user, password, host, port, cmd)) 109 def ping(cls, db_server, user=DEFAULT_USER, password=DEFAULT_PASS, argument 111 """Ping the given db server as 'user' using 'password'. 114 @param user: The user to use in the ping. 115 @param password: The password of the user. 130 'SELECT version();', host=mysql_cmd_host, user=user, [all …]
|
/external/openssh/regress/ |
D | addrmatch.sh | 10 user="$1"; addr="$2"; host="$3"; laddr="$4"; lport="$5" 13 verbose "test $descr for $user $addr $host" 15 -C user=${user},addr=${addr},host=${host},laddr=${laddr},lport=${lport} | \ 35 run_trial user 192.168.0.1 somehost 1.2.3.4 1234 match1 "first entry" 36 run_trial user 192.168.30.1 somehost 1.2.3.4 1234 nomatch "negative match" 37 run_trial user 19.0.0.1 somehost 1.2.3.4 1234 nomatch "no match" 38 run_trial user 10.255.255.254 somehost 1.2.3.4 1234 match1 "list middle" 39 run_trial user 192.168.30.1 192.168.0.1 1.2.3.4 1234 nomatch "faked IP in hostname" 40 run_trial user 1.1.1.1 somehost.example.com 1.2.3.4 1234 match2 "bare IP4 address" 41 run_trial user 19.0.0.1 somehost 127.0.0.1 1234 match3 "localaddress" [all …]
|
D | cert-userkey.sh | 4 tid="certified user keys" 6 rm -f $OBJ/authorized_keys_$USER $OBJ/user_ca_key* $OBJ/cert_user_key* 29 # Generate and sign user keys 31 verbose "$tid: sign user ${ktype} cert" 41 -I "regress user key for $USER" \ 42 -n ${USER},mekmitasdigoat $tflag $OBJ/cert_user_key_${ktype} || \ 53 rm -f $OBJ/authorized_keys_$USER 69 rm -f $OBJ/authorized_principals_$USER 78 echo > $OBJ/authorized_principals_$USER 87 echo gregorsamsa > $OBJ/authorized_principals_$USER [all …]
|
/external/selinux/libsemanage/include/semanage/ |
D | user_record.h | 24 const semanage_user_t * user, 29 extern int semanage_user_compare(const semanage_user_t * user, 32 extern int semanage_user_compare2(const semanage_user_t * user, 36 extern const char *semanage_user_get_name(const semanage_user_t * user); 39 semanage_user_t * user, const char *name); 42 extern const char *semanage_user_get_prefix(const semanage_user_t * user); 45 semanage_user_t * user, const char *name); 48 extern const char *semanage_user_get_mlslevel(const semanage_user_t * user); 51 semanage_user_t * user, 54 extern const char *semanage_user_get_mlsrange(const semanage_user_t * user); [all …]
|
/external/selinux/libselinux/include/selinux/ |
D | get_context_list.h | 12 /* Get an ordered list of authorized security contexts for a user session 13 for 'user' spawned by 'fromcon' and set *conary to refer to the 15 be authorized by the policy, but the ordering is subject to user 19 extern int get_ordered_context_list(const char *user, 24 default level for the user. */ 25 int get_ordered_context_list_with_level(const char *user, 30 /* Get the default security context for a user session for 'user' 33 of a default is subject to user customizable preferences. 37 extern int get_default_context(const char *user, 42 default level for the user. */ [all …]
|
/external/nist-sip/java/gov/nist/javax/sip/address/ |
D | UserInfo.java | 36 * User information part of a URL. 47 /** user field 49 protected String user; field in UserInfo 65 public final static int USER = 2; field in UserInfo 86 if (!this.user.equalsIgnoreCase(other.user)) { in equals() 102 * Encode the user information as a string. 111 buffer.append(user).append(COLON).append(password); in encode() 113 buffer.append(user); in encode() 125 * Gets the user type (which can be set to TELEPHONE_SUBSCRIBER or USER) 126 * @return the type of user. [all …]
|
/external/curl/docs/libcurl/opts/ |
D | CURLOPT_URL.3 | 77 It is also possible to specify the user name, password and any supported login 81 http://user:password@www.example.com 83 ftp://user:password@ftp.example.com 87 imap://user:password;options@mail.example.com 89 pop3://user:password;options@mail.example.com 91 smtp://user:password;options@mail.example.com 141 ftp://user:password@ftp.example.com/readme.txt - This retrieves the readme.txt 142 file from the user's home directory. When a username and password is 144 user's home directory. To retrieve files from the root directory or a 149 ftp://user:password@ftp.example.com//readme.txt - This retrieves the readme.txt [all …]
|