Searched refs:RUSER (Results 1 – 12 of 12) sorted by relevance
/external/ltp/testcases/network/tcp_cmds/rlogin/ |
D | rlogin01 | 29 if [ -z $RUSER ]; then 30 RUSER=root 34 tst_brkm TCONF "Please set PASSWD for $RUSER." 61 spawn rlogin $RHOST -l $RUSER 68 } \"$RUSER@\" { 70 wc -w > $RUSER.$RHOST\rexit\r\"; 77 tst_rhost_run -u $RUSER -c "grep -q 9 $RUSER.$RHOST" || return 1 78 tst_rhost_run -u $RUSER -c "rm -f $RUSER.$RHOST"
|
/external/ltp/testcases/network/tcp_cmds/telnet/ |
D | telnet01 | 29 if [ -z $RUSER ]; then 30 RUSER=root 34 tst_brkm TCONF "Please set PASSWD for $RUSER." 64 send \"$RUSER\r\" 72 } \"$RUSER@\" { 74 wc -w > $RUSER.$RHOST\rexit\r\"; 81 tst_rhost_run -u $RUSER -c "grep -q 9 $RUSER.$RHOST" || return 1 82 tst_rhost_run -u $RUSER -c "rm -f $RUSER.$RHOST"
|
/external/ltp/testcases/network/tcp_cmds/ssh/ |
D | ssh02_s1 | 34 set RUSER $TEST_USER 44 set RUSER "Invaild_User" 46 spawn ssh -l $RUSER $RHOST whoami 59 send_user "SSH would not allow $RUSER to login with\ 64 "$RUSER" { 65 send_user "SSH allowed $RUSER to login with invalid\
|
D | ssh03_s1 | 33 set RUSER $TEST_USER 42 spawn ssh -l $RUSER $RHOST whoami 55 send_user "\nSSH would not allow $RUSER to login, Test\ 59 "$RUSER" { 60 send_user "SSH allowed $RUSER to login, Test PASSED \n"
|
D | ssh01_s1 | 33 set RUSER $TEST_USER 45 spawn ssh -l $RUSER $RHOST whoami 58 send_user "SSH would not allow $RUSER to login with\ 63 "$RUSER" { 64 send_user "SSH allowed $RUSER to login with invalid\
|
/external/ltp/testcases/network/tcp_cmds/ftp/ |
D | ftp01 | 60 RUSER=${RUSER:-root} 70 rsh -n -l root $RHOST chown -R ${RUSER} "$TCtmp" 97 echo user $RUSER $PASSWD 109 echo user $RUSER $PASSWD
|
D | ftp02 | 63 send \"$RUSER\r\"
|
/external/llvm/utils/bugpoint/ |
D | RemoteRunSafely.sh | 50 RUSER=`id -un` 58 RUSER=$2 92 connection=$RUSER'@'$RHOST
|
/external/swiftshader/third_party/LLVM/utils/bugpoint/ |
D | RemoteRunSafely.sh | 50 RUSER=`id -un` 58 RUSER=$2 92 connection=$RUSER'@'$RHOST
|
/external/selinux/python/sepolicy/ |
D | sepolicy.py | 506 from sepolicy.generate import policy, AUSER, RUSER, EUSER, USERS, SANDBOX, APPLICATIONS, NEWTYPE 509 … conflict_args = {'TYPES': (NEWTYPE,), 'DOMAIN': (EUSER,), 'ADMIN_DOMAIN': (AUSER, RUSER, EUSER,)} 592 …poltype, DAEMON, DBUS, INETD, CGI, SANDBOX, USER, EUSER, TUSER, XUSER, LUSER, AUSER, RUSER, NEWTYPE 645 group.add_argument("--confined_admin", dest="policytype", const=RUSER, 647 help=_("Generate '%s' policy") % poltype[RUSER])
|
/external/selinux/python/sepolicy/sepolicy/ |
D | generate.py | 137 RUSER = 11 variable 152 poltype[RUSER] = _("Confined Root Administrator Role") 165 USERS = [XUSER, TUSER, LUSER, AUSER, RUSER] 771 if self.type == RUSER: 1130 if self.type not in (TUSER, XUSER, AUSER, LUSER, RUSER): 1141 if self.type == RUSER or self.type == AUSER: 1227 if self.type not in (TUSER, XUSER, AUSER, LUSER, RUSER):
|
/external/selinux/gui/ |
D | polgengui.py | 238 …self.pages[sepolicy.generate.RUSER] = [self.SELECT_TYPE_PAGE, self.APP_PAGE, self.ADMIN_PAGE, self… 468 return sepolicy.generate.RUSER 502 if self.get_type() == sepolicy.generate.RUSER:
|