/external/selinux/libsepol/src/ |
D | user_record.c | 9 /* This user's name */ 12 /* This user's mls level (only required for mls) */ 15 /* This user's mls range (only required for mls) */ 26 /* This user's name */ 39 "could not create selinux user key"); in sepol_user_key_create() 43 tmp_key->name = name; in sepol_user_key_create() 54 *name = key->name; in hidden_def() 60 const sepol_user_t * user, in hidden_def() 64 if (sepol_user_key_create(handle, user->name, key_ptr) < 0) { in hidden_def() 65 ERR(handle, "could not extract key from user %s", user->name); in hidden_def() [all …]
|
/external/toybox/tests/ |
D | useradd.test | 6 [ -f testing.sh ] && . testing.sh 8 if [ "$(id -u)" -ne 0 ] 20 # Default password for adding user is: 'password' 21 pass=`echo -ne 'password\npassword\n'` 23 user="toyTestUser" 24 testing "adduser user_name (text)" "useradd $user $arg || 25 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] && 27 userdel -r $user $arg 29 user="toy1Test2User3" 30 testing "adduser user_name (alphanumeric)" "useradd $user $arg || [all …]
|
/external/autotest/client/cros/ |
D | cryptohome.py | 2 # Use of this source code is governed by a BSD-style license that can be 18 """Generic error for ChromiumOS-specific exceptions.""" 25 def get_user_hash(user): argument 26 """Get the user hash for the given user.""" 27 return utils.system_output(['cryptohome', '--action=obfuscate_user', 28 '--user=%s' % user]) 31 def user_path(user): argument 32 """Get the user mount point for the given user.""" 33 return utils.system_output(['cryptohome-path', 'user', user]) 36 def system_path(user): argument [all …]
|
/external/selinux/libsemanage/src/ |
D | user_record.c | 3 /* Object: semanage_user_t (SELinux User/Class) 4 * Object: semanage_user_key_t (SELinux User/Class Key) 37 return sepol_user_key_create(handle->sepolh, name, key); in semanage_user_key_create() 43 const semanage_user_t * user, in hidden_def() 47 return semanage_user_base_key_extract(handle, user->base, key); in hidden_def() 67 int semanage_user_compare(const semanage_user_t * user, in semanage_user_compare() argument 73 return strcmp(user->name, name); in semanage_user_compare() 78 int semanage_user_compare2(const semanage_user_t * user, in hidden_def() 82 return strcmp(user->name, user2->name); in hidden_def() 87 static int semanage_user_compare2_qsort(const semanage_user_t ** user, in hidden_def() [all …]
|
D | user_base_record.c | 3 /* Object: semanage_user_base_t (SELinux User/Class Policy Object) 4 * Object: semanage_user_key_t (SELinux User/Class Key) 29 const semanage_user_base_t * user, in semanage_user_base_key_extract() argument 33 return sepol_user_key_extract(handle->sepolh, user, key); in semanage_user_base_key_extract() 36 static int semanage_user_base_compare(const semanage_user_base_t * user, in semanage_user_base_compare() argument 40 return sepol_user_compare(user, key); in semanage_user_base_compare() 43 static int semanage_user_base_compare2(const semanage_user_base_t * user, in semanage_user_base_compare2() argument 47 return sepol_user_compare2(user, user2); in semanage_user_base_compare2() 50 static int semanage_user_base_compare2_qsort(const semanage_user_base_t ** user, in semanage_user_base_compare2_qsort() argument 55 return sepol_user_compare2(*user, *user2); in semanage_user_base_compare2_qsort() [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | eap_user_db.c | 2 * hostapd / EAP user database 23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) in set_user_methods() argument 32 os_memset(&user->methods, 0, sizeof(user->methods)); in set_user_methods() 39 user->methods[num_methods].method = in set_user_methods() 41 &user->methods[num_methods].vendor); in set_user_methods() 42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && in set_user_methods() 43 user->methods[num_methods].method == EAP_TYPE_NONE) { in set_user_methods() 44 if (os_strcmp(start, "TTLS-PAP") == 0) { in set_user_methods() 45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; in set_user_methods() 48 if (os_strcmp(start, "TTLS-CHAP") == 0) { in set_user_methods() [all …]
|
/external/squashfs-tools/RELEASE-READMEs/ |
D | PERFORMANCE.README | 2 ---------------------------------------- 32 Time taken to perform "ls -lR --color=alawys | cat > /dev/null" on filesystem 35 Zisofs 49.88 seconds (User 2.60 secs, Sys 11.19 secs) 36 Cloop 20.80 seconds (User 2.71 secs, Sys 13.50 secs) 37 Squashfs2.0 16.56 seconds (User 2.42 secs, Sys 10.37 secs) 38 Squashfs2.1 10.14 seconds (User 2.48 secs, Sys 4.44 secs) 42 Time taken to perform "tar cf - | cat > /dev/null" on filesystem mounted 45 Zisofs 27 minutes 28.54 seconds (User 3.00 secs, Sys 1 min 4.80 secs) 46 Cloop 5 minutes 55.72 seconds (User 2.90 secs, Sys 3 min 37.90 secs) 47 Squashfs2.0 5 minutes 20.87 seconds (User 2.33 secs, Sys 56.98 secs) [all …]
|
/external/selinux/secilc/docs/ |
D | cil_user_statements.md | 1 User Statements 4 user section in User Statements 5 ---- 7 Declares an SELinux user identifier in the current namespace. 11 (user user_id) 22 <td align="left"><p><code>user</code></p></td> 23 <td align="left"><p>The <code>user</code> keyword.</p></td> 27 <td align="left"><p>The SELinux <code>user</code> identifier.</p></td> 34 This will declare an SELinux user as `unconfined.user`: 37 (user user) [all …]
|
/external/wpa_supplicant_8/hs20/server/ |
D | spp_server.c | 3 * Copyright (c) 2012-2013, Qualcomm Atheros, Inc. 20 #include "xml-utils.h" 24 #define SPP_NS_URI "http://www.wi-fi.org/specifications/hotspot2dot0/v1.0/spp" 26 #define URN_OMA_DM_DEVINFO "urn:oma:mo:oma-dm-devinfo:1.0" 27 #define URN_OMA_DM_DEVDETAIL "urn:oma:mo:oma-dm-devdetail:1.0" 28 #define URN_OMA_DM_DMACC "urn:oma:mo:oma-dm-dmacc:1.0" 29 #define URN_HS20_PPS "urn:wfa:mo:hotspot2dot0-perprovidersubscription:1.0" 47 static char * db_get_session_val(struct hs20_svc *ctx, const char *user, 52 static xml_node_t * build_policy(struct hs20_svc *ctx, const char *user, 57 const char *user, const char *realm, in db_add_session() argument [all …]
|
D | hs20-osu-server.txt | 5 12.04 server (64-bit) distribution is used and the web server is 22 ------------------ 25 - default installation 26 - upgraded to latest package versions 27 sudo apt-get update 28 sudo apt-get upgrade 31 sudo apt-get install sqlite3 32 sudo apt-get install apache2 33 sudo apt-get install php5-sqlite libapache2-mod-php5 36 sudo apt-get install build-essential [all …]
|
/external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/appengine/auth/ |
D | models.py | 1 # -*- coding: utf-8 -*- 29 For example, suppose we have a model `User` with three properties that 32 class User(model.Model): 37 To ensure property uniqueness when creating a new `User`, we first create 39 save the new `User` record:: 45 'User.username.%s' % username, 46 'User.auth_id.%s' % auth_id, 47 'User.email.%s' % email, 54 # The unique values were created, so we can save the user. 55 user = User(username=username, auth_id=auth_id, email=email) [all …]
|
/external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/ |
D | auth.py | 1 # -*- coding: utf-8 -*- 22 #: User model which authenticates custom users and tokens. 24 #: Default is :class:`webapp2_extras.appengine.auth.models.User`. 49 #: A list of extra user attributes to be stored in the session. 50 # The user object must provide all of them as attributes. 53 'user_model': 'webapp2_extras.appengine.auth.models.User', 71 """Raised when a user can't be fetched given an auth_id.""" 75 """Raised when a user password doesn't match.""" 102 # User data we're interested in ------------------------------------------- 116 """The list of attributes retrieved from the user model. [all …]
|
/external/autotest/client/site_tests/network_ShillInitScripts/ |
D | network_ShillInitScripts.py | 17 via "dbus-send" in the shill startup scripts. However, the 25 '/var/run/state/logged-in', 29 fake_user = 'not-a-real-user@chromium.org' 31 cryptohome_path_command = 'cryptohome-path' 34 magic_header = '# --- shill init file test magic header ---' 54 def login(self, user=None): argument 59 @param user string user name (email address) to log in. 62 utils.system('start shill-start-user-session CHROMEOS_USER=%s' % 63 (user or self.fake_user)) 69 For guest login, session-manager passes an empty CHROMEOS_USER arg. [all …]
|
/external/autotest/client/site_tests/security_HardlinkRestrictions/ |
D | security_HardlinkRestrictions.py | 2 # Use of this source code is governed by a BSD-style license that can be 5 …from http://bazaar.launchpad.net/~ubuntu-bugcontrol/qa-regression-testing/master/view/head:/script… 6 # Copyright (C) 2008-2011 Canonical Ltd. 51 def _is_readable(self, path, user, expected=True): argument 52 rc = utils.system("su -c 'cat %s' %s" % (path, user), 59 (user, path)) 62 (user, path)) 65 def _is_writable(self, path, user, expected=True): argument 66 rc = utils.system("su -c 'echo > %s' %s" % (path, user), 73 (user, path)) [all …]
|
/external/autotest/client/site_tests/platform_CryptohomeChangePassword/ |
D | platform_CryptohomeChangePassword.py | 2 # Use of this source code is governed by a BSD-style license that can be 26 # Get the hash for the test user account 27 cmd = ('/usr/sbin/cryptohome --action=obfuscate_user --user=' 31 # Remove the test user account 32 cmd = ('/usr/sbin/cryptohome --action=remove --force --user=' 35 # Ensure that the user directory does not exist 37 raise error.TestFail('Cryptohome could not remove the test user.') 39 # Mount the test user account 40 cmd = ('/usr/sbin/cryptohome --async --action=mount --user=' + test_user 41 + ' --password=' + test_password + ' --create') [all …]
|
/external/opencv3/doc/tutorials/introduction/clojure_dev_intro/ |
D | clojure_dev_intro.markdown | 13 ------------------------------ 20 You can find a runnable source code of the sample in the `samples/java/clojure/simple-sample` folder 24 cd path/to/samples/java/clojure/simple-sample 28 -------- 31 tutorial](http://docs.opencv.org/2.4.4-beta/doc/tutorials/introduction/desktop_java/java_dev_intro.… 48 cmake -DBUILD_SHARED_LIBS=OFF .. 51 make -j8 56 ----------------- 65 -# [Download the script](https://raw.github.com/technomancy/leiningen/stable/bin/lein) 66 -# Place it on your $PATH (cf. \~/bin is a good choice if it is on your path.) [all …]
|
/external/autotest/site_utils/ |
D | mysql_bootstrap.py | 3 # Use of this source code is governed by a BSD-style license that can be 8 The purpose of this module is to grant access to a new-user/host/password 19 Execute mysql -u <default_user> -p<default_pass> -e 36 Execute mysql -u <default_user> -p<default_pass> -e 78 def mysql_cmd(cls, cmd, user=DEFAULT_USER, password=DEFAULT_PASS, argument 82 @param cmd: The mysql command to wrap with the --execute option. 84 @param user: The user to use in the given command. 85 @param password: The password for the user. 88 return ('mysql -u %s -p%s --host %s --port %s -e "%s"' % 89 (user, password, host, port, cmd)) [all …]
|
/external/curl/docs/libcurl/opts/ |
D | CURLOPT_URL.3 | 8 .\" * Copyright (C) 1998 - 2015, Daniel Stenberg, <daniel@haxx.se>, et al. 25 CURLOPT_URL \- provide the URL to use in the request 32 char * to a zero terminated string which must be URL-encoded in the following 75 It is also possible to specify the user name, password and any supported login 79 http://user:password@www.example.com 81 ftp://user:password@ftp.example.com 85 imap://user:password;options@mail.example.com 87 pop3://user:password;options@mail.example.com 89 smtp://user:password;options@mail.example.com 93 RFC5092 and IETF draft draft-earhart-url-smtp-00.txt (Added in 7.31.0). [all …]
|
/external/selinux/sepolgen/tests/ |
D | audit.txt | 2 type=SYSCALL msg=audit(1158584779.745:708): arch=40000003 syscall=195 success=no exit=-13 a0=80d243… 3 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_override } for pid=8133 comm="vpnc-scr… 4 type=AVC msg=audit(1158584779.753:709): avc: denied { dac_read_search } for pid=8133 comm="vpnc-… 5 …-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8133 auid=500 uid=0 gid=0 euid=0… 6 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_override } for pid=8134 comm="vpnc-scr… 7 type=AVC msg=audit(1158584779.825:710): avc: denied { dac_read_search } for pid=8134 comm="vpnc-… 8 …-13 a0=80d2437 a1=bf910a48 a2=4c56cff4 a3=0 items=0 ppid=8132 pid=8134 auid=500 uid=0 gid=0 euid=0… 11 type=SYSCALL msg=audit(1158584780.793:711): arch=40000003 syscall=195 success=no exit=-13 a0=80d243… 12 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_override } for pid=8145 comm="vpnc-scr… 13 type=AVC msg=audit(1158584780.797:712): avc: denied { dac_read_search } for pid=8145 comm="vpnc-… [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/opsworks/ |
D | layer1.py | 6 # without limitation the rights to use, copy, modify, merge, publish, dis- 8 # persons to whom the Software is furnished to do so, subject to the fol- 15 # OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL- 63 AWS OpsWorks supports only one endpoint, opsworks.us- 64 east-1.amazonaws.com (HTTPS), so you must connect to that 81 APIVersion = "2013-02-18" 82 DefaultRegionName = "us-east-1" 83 DefaultRegionEndpoint = "opsworks.us-east-1.amazonaws.com" 107 return ['hmac-v4'] 115 **Required Permissions**: To use this action, an IAM user must [all …]
|
/external/libvterm/include/ |
D | vterm.h | 24 /* order points by on-screen flow order */ 27 return (a.row == b.row) ? a.col - b.col : a.row - b.row; in vterm_pos_cmp() 47 rect->start_row += row_delta; rect->end_row += row_delta; in vterm_rect_move() 48 rect->start_col += col_delta; rect->end_col += col_delta; in vterm_rect_move() 78 VTERM_ATTR_FONT, // number: 10-19 79 VTERM_ATTR_FOREGROUND, // color: 30-39 90-97 80 VTERM_ATTR_BACKGROUND, // color: 40-49 100-107 105 unsigned int protected_cell:1; /* DECSCA-protected against DECSEL/DECSED */ 106 unsigned int dwl:1; /* DECDWL or DECDHL double-width line */ 107 unsigned int dhl:2; /* DECDHL double-height line (1=top 2=bottom) */ [all …]
|
/external/selinux/policycoreutils/sepolicy/sepolicy/ |
D | manpage.py | 1 #! /usr/bin/python -Es 2 # Copyright (C) 2012-2013 Red Hat 22 # 02111-1307 USA 57 if name == "user" or name == "unconfined": 60 name = "user" 82 allusers_info = info(USER) 113 domain = d[:-2] 121 if role[:-2] in domains or role == "system_r": 123 domains.append(role[:-2]) 146 return " ".join(f[:-len(trim)].split("_")) [all …]
|
/external/wpa_supplicant_8/hostapd/ |
D | hostapd.eap_user | 1 # hostapd user database for integrated EAP server 5 # double quoted ("user"). Password can alternatively be stored as 6 # NtPasswordHash (16-byte MD4 hash of the unicode presentation of the password 8 # that the plaintext password does not need to be included in the user file. 9 # Password hash is stored as hash:<16-octets of hex data> without quotation 13 # 2 authentication (e.g., within EAP-PEAP). In these cases, an anonymous 14 # identity can be used in the unencrypted phase 1 and the real user identity 15 # is transmitted only within the encrypted tunnel in phase 2. If non-anonymous 16 # access is needed, two user entries is needed, one for phase 1 and another 19 # EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-FAST, EAP-SIM, and EAP-AKA do not use [all …]
|
/external/chromium-trace/catapult/third_party/webapp2/docs/tutorials/ |
D | auth.rst | 7 ---------------- 10 ------------------- 13 ----------------- 16 Custom User model 17 ----------------- 18 :mod:`webapp2_extras.appengine.auth.models` provides a default ``User`` model 21 can be used with any model you wish -- even non-App Engine models which use, 24 The required interface that a custom user model must implement consists of 27 class User(object): 30 """Returns this user's unique ID, which can be an integer or string.""" [all …]
|
/external/llvm/lib/IR/ |
D | User.cpp | 1 //===-- User.cpp - Implement the User class -------------------------------===// 8 //===----------------------------------------------------------------------===// 10 #include "llvm/IR/User.h" 18 //===----------------------------------------------------------------------===// 19 // User Class 20 //===----------------------------------------------------------------------===// 22 void User::anchor() {} in anchor() 24 void User::replaceUsesOfWith(Value *From, Value *To) { in replaceUsesOfWith() 28 "Cannot call User::replaceUsesOfWith on a constant!"); in replaceUsesOfWith() 39 //===----------------------------------------------------------------------===// [all …]
|