/external/selinux/libsepol/src/ |
D | user_record.c | 9 /* This user's name */ 12 /* This user's mls level (only required for mls) */ 15 /* This user's mls range (only required for mls) */ 26 /* This user's name */ 39 "could not create selinux user key"); in sepol_user_key_create() 60 const sepol_user_t * user, in hidden_def() 64 if (sepol_user_key_create(handle, user->name, key_ptr) < 0) { in hidden_def() 65 ERR(handle, "could not extract key from user %s", user->name); in hidden_def() 77 int sepol_user_compare(const sepol_user_t * user, const sepol_user_key_t * key) in sepol_user_compare() argument 80 return strcmp(user->name, key->name); in sepol_user_compare() [all …]
|
/external/toybox/tests/ |
D | useradd.test | 20 # Default password for adding user is: 'password' 23 user="toyTestUser" 24 testing "adduser user_name (text)" "useradd $user $arg || 25 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] && 27 userdel -r $user $arg 29 user="toy1Test2User3" 30 testing "adduser user_name (alphanumeric)" "useradd $user $arg || 31 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] && 33 userdel -r $user $arg 35 user="987654321" [all …]
|
/external/autotest/client/cros/ |
D | cryptohome.py | 25 def get_user_hash(user): argument 26 """Get the user hash for the given user.""" 28 '--user=%s' % user]) 31 def user_path(user): argument 32 """Get the user mount point for the given user.""" 33 return utils.system_output(['cryptohome-path', 'user', user]) 36 def system_path(user): argument 37 """Get the system mount point for the given user.""" 38 return utils.system_output(['cryptohome-path', 'system', user]) 41 def ensure_clean_cryptohome_for(user, password=None): argument [all …]
|
/external/selinux/libsemanage/src/ |
D | user_record.c | 3 /* Object: semanage_user_t (SELinux User/Class) 4 * Object: semanage_user_key_t (SELinux User/Class Key) 43 const semanage_user_t * user, in hidden_def() 47 return semanage_user_base_key_extract(handle, user->base, key); in hidden_def() 67 int semanage_user_compare(const semanage_user_t * user, in semanage_user_compare() argument 73 return strcmp(user->name, name); in semanage_user_compare() 78 int semanage_user_compare2(const semanage_user_t * user, in hidden_def() 82 return strcmp(user->name, user2->name); in hidden_def() 87 static int semanage_user_compare2_qsort(const semanage_user_t ** user, in hidden_def() 91 return strcmp((*user)->name, (*user2)->name); in hidden_def() [all …]
|
D | user_base_record.c | 3 /* Object: semanage_user_base_t (SELinux User/Class Policy Object) 4 * Object: semanage_user_key_t (SELinux User/Class Key) 29 const semanage_user_base_t * user, in semanage_user_base_key_extract() argument 33 return sepol_user_key_extract(handle->sepolh, user, key); in semanage_user_base_key_extract() 36 static int semanage_user_base_compare(const semanage_user_base_t * user, in semanage_user_base_compare() argument 40 return sepol_user_compare(user, key); in semanage_user_base_compare() 43 static int semanage_user_base_compare2(const semanage_user_base_t * user, in semanage_user_base_compare2() argument 47 return sepol_user_compare2(user, user2); in semanage_user_base_compare2() 50 static int semanage_user_base_compare2_qsort(const semanage_user_base_t ** user, in semanage_user_base_compare2_qsort() argument 55 return sepol_user_compare2(*user, *user2); in semanage_user_base_compare2_qsort() [all …]
|
/external/selinux/libsemanage/man/man3/ |
D | semanage_user.3 | 4 semanage_user \- SELinux User Management API 14 This object contains properties associated with a SELinux user. 15 Typically many Unix users are mapped to the same SELinux user. See 17 for overview of the Unix user API. 27 create a user 32 release resources for this user 37 create a key, which can be used to identify a user 42 release resources for this user key 47 create a key matching this user 52 create an identical user (deep-copy clone) [all …]
|
/external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/appengine/auth/ |
D | models.py | 29 For example, suppose we have a model `User` with three properties that 32 class User(model.Model): 37 To ensure property uniqueness when creating a new `User`, we first create 39 save the new `User` record:: 45 'User.username.%s' % username, 46 'User.auth_id.%s' % auth_id, 47 'User.email.%s' % email, 54 # The unique values were created, so we can save the user. 55 user = User(username=username, auth_id=auth_id, email=email) 56 user.put() [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | eap_user_db.c | 2 * hostapd / EAP user database 23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) in set_user_methods() argument 32 os_memset(&user->methods, 0, sizeof(user->methods)); in set_user_methods() 39 user->methods[num_methods].method = in set_user_methods() 41 &user->methods[num_methods].vendor); in set_user_methods() 42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && in set_user_methods() 43 user->methods[num_methods].method == EAP_TYPE_NONE) { in set_user_methods() 45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; in set_user_methods() 49 user->ttls_auth |= EAP_TTLS_AUTH_CHAP; in set_user_methods() 53 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAP; in set_user_methods() [all …]
|
/external/wpa_supplicant_8/hs20/server/ |
D | spp_server.c | 47 static char * db_get_session_val(struct hs20_svc *ctx, const char *user, 52 static xml_node_t * build_policy(struct hs20_svc *ctx, const char *user, 57 const char *user, const char *realm, in db_add_session() argument 65 sql = sqlite3_mprintf("INSERT INTO sessions(timestamp,id,user,realm," in db_add_session() 70 sessionid, user ? user : "", realm ? realm : "", in db_add_session() 86 static void db_update_session_password(struct hs20_svc *ctx, const char *user, in db_update_session_password() argument 93 "user=%Q AND realm=%Q", in db_update_session_password() 94 pw, sessionid, user, realm); in db_update_session_password() 107 const char *user, in db_update_session_machine_managed() argument 114 …sql = sqlite3_mprintf("UPDATE sessions SET machine_managed=%Q WHERE id=%Q AND user=%Q AND realm=%Q… in db_update_session_machine_managed() [all …]
|
D | hs20-osu-server.txt | 46 assumes /home/user/hs20-server to be used, but this can be changed by 49 sudo mkdir -p /home/user/hs20-server 50 sudo chown $USER /home/user/hs20-server 51 mkdir -p /home/user/hs20-server/spp 52 mkdir -p /home/user/hs20-server/AS 80 cp hostapd hlr_auc_gw /home/user/hs20-server/AS 86 cp hs20_spp_server /home/user/hs20-server/spp 87 # prepare database (web server user/group needs to have write access) 88 mkdir -p /home/user/hs20-server/AS/DB 89 sudo chgrp www-data /home/user/hs20-server/AS/DB [all …]
|
/external/selinux/secilc/docs/ |
D | cil_user_statements.md | 1 User Statements 4 user section in User Statements 7 Declares an SELinux user identifier in the current namespace. 11 (user user_id) 22 <td align="left"><p><code>user</code></p></td> 23 <td align="left"><p>The <code>user</code> keyword.</p></td> 27 <td align="left"><p>The SELinux <code>user</code> identifier.</p></td> 34 This will declare an SELinux user as `unconfined.user`: 37 (user user) 43 Associates a previously declared [`user`](cil_user_statements.md#user) identifier with a previously… [all …]
|
/external/squashfs-tools/RELEASE-READMEs/ |
D | PERFORMANCE.README | 35 Zisofs 49.88 seconds (User 2.60 secs, Sys 11.19 secs) 36 Cloop 20.80 seconds (User 2.71 secs, Sys 13.50 secs) 37 Squashfs2.0 16.56 seconds (User 2.42 secs, Sys 10.37 secs) 38 Squashfs2.1 10.14 seconds (User 2.48 secs, Sys 4.44 secs) 45 Zisofs 27 minutes 28.54 seconds (User 3.00 secs, Sys 1 min 4.80 secs) 46 Cloop 5 minutes 55.72 seconds (User 2.90 secs, Sys 3 min 37.90 secs) 47 Squashfs2.0 5 minutes 20.87 seconds (User 2.33 secs, Sys 56.98 secs) 48 Squashfs2.1 5 minutes 15.46 seconds (user 2.28 secs, Sys 51.12 secs) 58 Zisofs 101 minutes 29.65 seconds (User 5.33 secs, Sys 1 min 17.20 secs) 59 Cloop 35 minutes 27.51 seconds (user 5.93 secs, Sys 4 mins 30.23 secs) [all …]
|
/external/autotest/frontend/ |
D | apache_auth.py | 1 from django.contrib.auth.models import User, Group, check_password 16 doing the real authentication. Also ensures logged-in user exists in 17 frontend.afe.models.User database. 21 user = User.objects.get(username=username) 22 except User.DoesNotExist: 24 user = User(username=username, 26 user.is_staff = True 27 user.save() # need to save before adding groups 28 user.groups.add(Group.objects.get( 32 return user [all …]
|
/external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/ |
D | auth.py | 22 #: User model which authenticates custom users and tokens. 24 #: Default is :class:`webapp2_extras.appengine.auth.models.User`. 49 #: A list of extra user attributes to be stored in the session. 50 # The user object must provide all of them as attributes. 53 'user_model': 'webapp2_extras.appengine.auth.models.User', 71 """Raised when a user can't be fetched given an auth_id.""" 75 """Raised when a user password doesn't match.""" 102 # User data we're interested in ------------------------------------------- 116 """The list of attributes retrieved from the user model. 124 # User model related ------------------------------------------------------ [all …]
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/opsworks/ |
D | layer1.py | 115 **Required Permissions**: To use this action, an IAM user must 118 information on user permissions, see `Managing User 143 **Required Permissions**: To use this action, an IAM user must 146 information on user permissions, see `Managing User 169 **Required Permissions**: To use this action, an IAM user must 172 information on user permissions, see `Managing User 202 **Required Permissions**: To use this action, an IAM user must 205 information on user permissions, see `Managing User 239 **Required Permissions**: To use this action, an IAM user must 241 For more information on user permissions, see `Managing User [all …]
|
/external/autotest/client/site_tests/security_HardlinkRestrictions/ |
D | security_HardlinkRestrictions.py | 51 def _is_readable(self, path, user, expected=True): argument 52 rc = utils.system("su -c 'cat %s' %s" % (path, user), 59 (user, path)) 62 (user, path)) 65 def _is_writable(self, path, user, expected=True): argument 66 rc = utils.system("su -c 'echo > %s' %s" % (path, user), 73 (user, path)) 76 (user, path)) 79 def _can_hardlink(self, source, target, user, expected=True): argument 80 rc = utils.system("su -c 'ln %s %s' %s" % (source, target, user), [all …]
|
/external/autotest/client/site_tests/platform_CryptohomeMigrateKey/ |
D | platform_CryptohomeMigrateKey.py | 13 user = utils.random_username() 17 if not self.proxy.mount(user, old_pass, create=True): 18 raise error.TestFail('Could not create good user.') 19 if not self.proxy.unmount(user): 20 raise error.TestFail('Could not unmount good user.') 21 if not self.proxy.migrate(user, old_pass, new_pass): 22 raise error.TestFail('Could not migrate good user.') 23 if self.proxy.mount(user, old_pass): 25 if not self.proxy.mount(user, new_pass): 26 raise error.TestFail('Could not mount good user.') [all …]
|
/external/autotest/client/site_tests/network_ShillInitScripts/ |
D | network_ShillInitScripts.py | 29 fake_user = 'not-a-real-user@chromium.org' 54 def login(self, user=None): argument 59 @param user string user name (email address) to log in. 62 utils.system('start shill-start-user-session CHROMEOS_USER=%s' % 63 (user or self.fake_user)) 76 """ Simulate user logout. 81 utils.system('start shill-stop-user-session') 92 # Deduce the root cryptohome directory name for our fake user. 96 # Deduce the user cryptohome directory name for our fake user. 98 '%s user %s' % (self.cryptohome_path_command, self.fake_user)) [all …]
|
/external/chromium-trace/catapult/third_party/webapp2/tests/ |
D | extras_appengine_auth_models_test.py | 13 class User(model.Model): class 23 self.register_model('User', models.User) 28 m = models.User 29 success, user = m.create_user(auth_id='auth_id_1', password_raw='foo') 31 self.assertTrue(user is not None) 32 self.assertTrue(user.password is not None) 34 # user.key.id() is required to retrieve the auth token 35 user_id = user.key.id() 39 self.assertEqual(m.get_by_auth_id('auth_id_1'), user) 43 self.assertEqual(u, user) [all …]
|
/external/autotest/client/site_tests/platform_CryptohomeBadPerms/ |
D | platform_CryptohomeBadPerms.py | 15 def require_mount_fail(self, user): argument 16 if self.cryptohome_proxy.mount(user, 'test', create=True): 17 raise error.TestFail('Mount unexpectedly succeeded for %s' % user) 22 # Leaf element of user path not owned by user. 23 user = utils.random_username() 24 path = cryptohome.user_path(user) 28 self.require_mount_fail(user) 33 user = utils.random_username() 34 path = cryptohome.system_path(user) 37 self.require_mount_fail(user) [all …]
|
/external/autotest/site_utils/ |
D | mysql_bootstrap.py | 8 The purpose of this module is to grant access to a new-user/host/password 78 def mysql_cmd(cls, cmd, user=DEFAULT_USER, password=DEFAULT_PASS, argument 84 @param user: The user to use in the given command. 85 @param password: The password for the user. 89 (user, password, host, port, cmd)) 109 def ping(cls, db_server, user=DEFAULT_USER, password=DEFAULT_PASS, argument 111 """Ping the given db server as 'user' using 'password'. 114 @param user: The user to use in the ping. 115 @param password: The password of the user. 130 'SELECT version();', host=mysql_cmd_host, user=user, [all …]
|
/external/curl/docs/libcurl/opts/ |
D | CURLOPT_URL.3 | 75 It is also possible to specify the user name, password and any supported login 79 http://user:password@www.example.com 81 ftp://user:password@ftp.example.com 85 imap://user:password;options@mail.example.com 87 pop3://user:password;options@mail.example.com 89 smtp://user:password;options@mail.example.com 139 ftp://user:password@ftp.example.com/readme.txt - This retrieves the readme.txt 140 file from the user's home directory. When a username and password is 142 user's home directory. To retrieve files from the root directory or a 147 ftp://user:password@ftp.example.com//readme.txt - This retrieves the readme.txt [all …]
|
/external/selinux/sepolgen/tests/ |
D | audit.txt | 33 type=CRED_ACQ msg=audit(1158584988.203:719): user pid=8264 uid=0 auid=500 subj=user_u:system_r:unco… 34 type=USER_START msg=audit(1158584988.203:720): user pid=8264 uid=0 auid=500 subj=user_u:system_r:un… 35 type=USER_END msg=audit(1158584988.203:721): user pid=8264 uid=0 auid=500 subj=user_u:system_r:unco… 36 type=USER_ACCT msg=audit(1158585001.341:722): user pid=8294 uid=0 auid=4294967295 subj=system_u:sys… 38 type=USER_START msg=audit(1158585001.341:724): user pid=8294 uid=0 auid=0 subj=system_u:system_r:cr… 39 type=CRED_ACQ msg=audit(1158585001.345:725): user pid=8294 uid=0 auid=0 subj=system_u:system_r:cron… 40 type=CRED_DISP msg=audit(1158585001.397:726): user pid=8294 uid=0 auid=0 subj=system_u:system_r:cro… 41 type=USER_END msg=audit(1158585001.397:727): user pid=8294 uid=0 auid=0 subj=system_u:system_r:cron… 42 type=CRED_ACQ msg=audit(1158585033.003:728): user pid=8331 uid=0 auid=500 subj=user_u:system_r:unco… 43 type=USER_START msg=audit(1158585033.003:729): user pid=8331 uid=0 auid=500 subj=user_u:system_r:un… [all …]
|
/external/autotest/client/site_tests/platform_CryptohomeChangePassword/ |
D | platform_CryptohomeChangePassword.py | 26 # Get the hash for the test user account 27 cmd = ('/usr/sbin/cryptohome --action=obfuscate_user --user=' 31 # Remove the test user account 32 cmd = ('/usr/sbin/cryptohome --action=remove --force --user=' 35 # Ensure that the user directory does not exist 37 raise error.TestFail('Cryptohome could not remove the test user.') 39 # Mount the test user account 40 cmd = ('/usr/sbin/cryptohome --async --action=mount --user=' + test_user 43 # Ensure that the user directory exists 45 raise error.TestFail('Cryptohome could not create the test user.') [all …]
|
/external/nist-sip/java/gov/nist/javax/sip/address/ |
D | UserInfo.java | 36 * User information part of a URL. 47 /** user field 49 protected String user; field in UserInfo 65 public final static int USER = 2; field in UserInfo 86 if (!this.user.equalsIgnoreCase(other.user)) { in equals() 102 * Encode the user information as a string. 111 buffer.append(user).append(COLON).append(password); in encode() 113 buffer.append(user); in encode() 125 * Gets the user type (which can be set to TELEPHONE_SUBSCRIBER or USER) 126 * @return the type of user. [all …]
|