Home
last modified time | relevance | path

Searched refs:RUSER (Results 1 – 12 of 12) sorted by relevance

/external/ltp/testcases/network/tcp_cmds/rlogin/
Drlogin0129 if [ -z $RUSER ]; then
30 RUSER=root
34 tst_brkm TCONF "Please set PASSWD for $RUSER."
61 spawn rlogin $RHOST -l $RUSER
68 } \"$RUSER@\" {
70 wc -w > $RUSER.$RHOST\rexit\r\";
77 tst_rhost_run -u $RUSER -c "grep -q 9 $RUSER.$RHOST" || return 1
78 tst_rhost_run -u $RUSER -c "rm -f $RUSER.$RHOST"
/external/ltp/testcases/network/tcp_cmds/telnet/
Dtelnet0129 if [ -z $RUSER ]; then
30 RUSER=root
34 tst_brkm TCONF "Please set PASSWD for $RUSER."
64 send \"$RUSER\r\"
72 } \"$RUSER@\" {
74 wc -w > $RUSER.$RHOST\rexit\r\";
81 tst_rhost_run -u $RUSER -c "grep -q 9 $RUSER.$RHOST" || return 1
82 tst_rhost_run -u $RUSER -c "rm -f $RUSER.$RHOST"
/external/ltp/testcases/network/tcp_cmds/ssh/
Dssh02_s134 set RUSER $TEST_USER
44 set RUSER "Invaild_User"
46 spawn ssh -l $RUSER $RHOST whoami
59 send_user "SSH would not allow $RUSER to login with\
64 "$RUSER" {
65 send_user "SSH allowed $RUSER to login with invalid\
Dssh03_s133 set RUSER $TEST_USER
42 spawn ssh -l $RUSER $RHOST whoami
55 send_user "\nSSH would not allow $RUSER to login, Test\
59 "$RUSER" {
60 send_user "SSH allowed $RUSER to login, Test PASSED \n"
Dssh01_s133 set RUSER $TEST_USER
45 spawn ssh -l $RUSER $RHOST whoami
58 send_user "SSH would not allow $RUSER to login with\
63 "$RUSER" {
64 send_user "SSH allowed $RUSER to login with invalid\
/external/ltp/testcases/network/tcp_cmds/ftp/
Dftp0160 RUSER=${RUSER:-root}
70 rsh -n -l root $RHOST chown -R ${RUSER} "$TCtmp"
97 echo user $RUSER $PASSWD
109 echo user $RUSER $PASSWD
Dftp0263 send \"$RUSER\r\"
/external/llvm/utils/bugpoint/
DRemoteRunSafely.sh50 RUSER=`id -un`
58 RUSER=$2
92 connection=$RUSER'@'$RHOST
/external/swiftshader/third_party/LLVM/utils/bugpoint/
DRemoteRunSafely.sh50 RUSER=`id -un`
58 RUSER=$2
92 connection=$RUSER'@'$RHOST
/external/selinux/python/sepolicy/
Dsepolicy.py506 from sepolicy.generate import policy, AUSER, RUSER, EUSER, USERS, SANDBOX, APPLICATIONS, NEWTYPE
509 … conflict_args = {'TYPES': (NEWTYPE,), 'DOMAIN': (EUSER,), 'ADMIN_DOMAIN': (AUSER, RUSER, EUSER,)}
592 …poltype, DAEMON, DBUS, INETD, CGI, SANDBOX, USER, EUSER, TUSER, XUSER, LUSER, AUSER, RUSER, NEWTYPE
645 group.add_argument("--confined_admin", dest="policytype", const=RUSER,
647 help=_("Generate '%s' policy") % poltype[RUSER])
/external/selinux/python/sepolicy/sepolicy/
Dgenerate.py137 RUSER = 11 variable
152 poltype[RUSER] = _("Confined Root Administrator Role")
165 USERS = [XUSER, TUSER, LUSER, AUSER, RUSER]
771 if self.type == RUSER:
1130 if self.type not in (TUSER, XUSER, AUSER, LUSER, RUSER):
1141 if self.type == RUSER or self.type == AUSER:
1227 if self.type not in (TUSER, XUSER, AUSER, LUSER, RUSER):
/external/selinux/gui/
Dpolgengui.py238 …self.pages[sepolicy.generate.RUSER] = [self.SELECT_TYPE_PAGE, self.APP_PAGE, self.ADMIN_PAGE, self…
468 return sepolicy.generate.RUSER
502 if self.get_type() == sepolicy.generate.RUSER: