Home
last modified time | relevance | path

Searched full:user (Results 1 – 25 of 8482) sorted by relevance

12345678910>>...340

/external/selinux/libsepol/src/
Duser_record.c9 /* This user's name */
12 /* This user's mls level (only required for mls) */
15 /* This user's mls range (only required for mls) */
26 /* This user's name */
39 "could not create selinux user key"); in sepol_user_key_create()
60 const sepol_user_t * user, in hidden_def()
64 if (sepol_user_key_create(handle, user->name, key_ptr) < 0) { in hidden_def()
65 ERR(handle, "could not extract key from user %s", user->name); in hidden_def()
77 int sepol_user_compare(const sepol_user_t * user, const sepol_user_key_t * key) in sepol_user_compare() argument
80 return strcmp(user->name, key->name); in sepol_user_compare()
[all …]
/external/toybox/tests/
Duseradd.test20 # Default password for adding user is: 'password'
23 user="toyTestUser"
24 testing "adduser user_name (text)" "useradd $user $arg ||
25 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] &&
27 userdel -r $user $arg
29 user="toy1Test2User3"
30 testing "adduser user_name (alphanumeric)" "useradd $user $arg ||
31 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] &&
33 userdel -r $user $arg
35 user="987654321"
[all …]
/external/autotest/client/cros/
Dcryptohome.py25 def get_user_hash(user): argument
26 """Get the user hash for the given user."""
28 '--user=%s' % user])
31 def user_path(user): argument
32 """Get the user mount point for the given user."""
33 return utils.system_output(['cryptohome-path', 'user', user])
36 def system_path(user): argument
37 """Get the system mount point for the given user."""
38 return utils.system_output(['cryptohome-path', 'system', user])
41 def ensure_clean_cryptohome_for(user, password=None): argument
[all …]
/external/selinux/libsemanage/src/
Duser_record.c3 /* Object: semanage_user_t (SELinux User/Class)
4 * Object: semanage_user_key_t (SELinux User/Class Key)
43 const semanage_user_t * user, in hidden_def()
47 return semanage_user_base_key_extract(handle, user->base, key); in hidden_def()
67 int semanage_user_compare(const semanage_user_t * user, in semanage_user_compare() argument
73 return strcmp(user->name, name); in semanage_user_compare()
78 int semanage_user_compare2(const semanage_user_t * user, in hidden_def()
82 return strcmp(user->name, user2->name); in hidden_def()
87 static int semanage_user_compare2_qsort(const semanage_user_t ** user, in hidden_def()
91 return strcmp((*user)->name, (*user2)->name); in hidden_def()
[all …]
Duser_base_record.c3 /* Object: semanage_user_base_t (SELinux User/Class Policy Object)
4 * Object: semanage_user_key_t (SELinux User/Class Key)
29 const semanage_user_base_t * user, in semanage_user_base_key_extract() argument
33 return sepol_user_key_extract(handle->sepolh, user, key); in semanage_user_base_key_extract()
36 static int semanage_user_base_compare(const semanage_user_base_t * user, in semanage_user_base_compare() argument
40 return sepol_user_compare(user, key); in semanage_user_base_compare()
43 static int semanage_user_base_compare2(const semanage_user_base_t * user, in semanage_user_base_compare2() argument
47 return sepol_user_compare2(user, user2); in semanage_user_base_compare2()
50 static int semanage_user_base_compare2_qsort(const semanage_user_base_t ** user, in semanage_user_base_compare2_qsort() argument
55 return sepol_user_compare2(*user, *user2); in semanage_user_base_compare2_qsort()
[all …]
/external/selinux/libsemanage/man/man3/
Dsemanage_user.34 semanage_user \- SELinux User Management API
14 This object contains properties associated with a SELinux user.
15 Typically many Unix users are mapped to the same SELinux user. See
17 for overview of the Unix user API.
27 create a user
32 release resources for this user
37 create a key, which can be used to identify a user
42 release resources for this user key
47 create a key matching this user
52 create an identical user (deep-copy clone)
[all …]
/external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/appengine/auth/
Dmodels.py29 For example, suppose we have a model `User` with three properties that
32 class User(model.Model):
37 To ensure property uniqueness when creating a new `User`, we first create
39 save the new `User` record::
45 'User.username.%s' % username,
46 'User.auth_id.%s' % auth_id,
47 'User.email.%s' % email,
54 # The unique values were created, so we can save the user.
55 user = User(username=username, auth_id=auth_id, email=email)
56 user.put()
[all …]
/external/wpa_supplicant_8/src/ap/
Deap_user_db.c2 * hostapd / EAP user database
23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) in set_user_methods() argument
32 os_memset(&user->methods, 0, sizeof(user->methods)); in set_user_methods()
39 user->methods[num_methods].method = in set_user_methods()
41 &user->methods[num_methods].vendor); in set_user_methods()
42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && in set_user_methods()
43 user->methods[num_methods].method == EAP_TYPE_NONE) { in set_user_methods()
45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; in set_user_methods()
49 user->ttls_auth |= EAP_TTLS_AUTH_CHAP; in set_user_methods()
53 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAP; in set_user_methods()
[all …]
/external/wpa_supplicant_8/hs20/server/
Dspp_server.c47 static char * db_get_session_val(struct hs20_svc *ctx, const char *user,
52 static xml_node_t * build_policy(struct hs20_svc *ctx, const char *user,
57 const char *user, const char *realm, in db_add_session() argument
65 sql = sqlite3_mprintf("INSERT INTO sessions(timestamp,id,user,realm," in db_add_session()
70 sessionid, user ? user : "", realm ? realm : "", in db_add_session()
86 static void db_update_session_password(struct hs20_svc *ctx, const char *user, in db_update_session_password() argument
93 "user=%Q AND realm=%Q", in db_update_session_password()
94 pw, sessionid, user, realm); in db_update_session_password()
107 const char *user, in db_update_session_machine_managed() argument
114 …sql = sqlite3_mprintf("UPDATE sessions SET machine_managed=%Q WHERE id=%Q AND user=%Q AND realm=%Q… in db_update_session_machine_managed()
[all …]
Dhs20-osu-server.txt46 assumes /home/user/hs20-server to be used, but this can be changed by
49 sudo mkdir -p /home/user/hs20-server
50 sudo chown $USER /home/user/hs20-server
51 mkdir -p /home/user/hs20-server/spp
52 mkdir -p /home/user/hs20-server/AS
80 cp hostapd hlr_auc_gw /home/user/hs20-server/AS
86 cp hs20_spp_server /home/user/hs20-server/spp
87 # prepare database (web server user/group needs to have write access)
88 mkdir -p /home/user/hs20-server/AS/DB
89 sudo chgrp www-data /home/user/hs20-server/AS/DB
[all …]
/external/selinux/secilc/docs/
Dcil_user_statements.md1 User Statements
4 user section in User Statements
7 Declares an SELinux user identifier in the current namespace.
11 (user user_id)
22 <td align="left"><p><code>user</code></p></td>
23 <td align="left"><p>The <code>user</code> keyword.</p></td>
27 <td align="left"><p>The SELinux <code>user</code> identifier.</p></td>
34 This will declare an SELinux user as `unconfined.user`:
37 (user user)
43 Associates a previously declared [`user`](cil_user_statements.md#user) identifier with a previously…
[all …]
/external/squashfs-tools/RELEASE-READMEs/
DPERFORMANCE.README35 Zisofs 49.88 seconds (User 2.60 secs, Sys 11.19 secs)
36 Cloop 20.80 seconds (User 2.71 secs, Sys 13.50 secs)
37 Squashfs2.0 16.56 seconds (User 2.42 secs, Sys 10.37 secs)
38 Squashfs2.1 10.14 seconds (User 2.48 secs, Sys 4.44 secs)
45 Zisofs 27 minutes 28.54 seconds (User 3.00 secs, Sys 1 min 4.80 secs)
46 Cloop 5 minutes 55.72 seconds (User 2.90 secs, Sys 3 min 37.90 secs)
47 Squashfs2.0 5 minutes 20.87 seconds (User 2.33 secs, Sys 56.98 secs)
48 Squashfs2.1 5 minutes 15.46 seconds (user 2.28 secs, Sys 51.12 secs)
58 Zisofs 101 minutes 29.65 seconds (User 5.33 secs, Sys 1 min 17.20 secs)
59 Cloop 35 minutes 27.51 seconds (user 5.93 secs, Sys 4 mins 30.23 secs)
[all …]
/external/autotest/frontend/
Dapache_auth.py1 from django.contrib.auth.models import User, Group, check_password
16 doing the real authentication. Also ensures logged-in user exists in
17 frontend.afe.models.User database.
21 user = User.objects.get(username=username)
22 except User.DoesNotExist:
24 user = User(username=username,
26 user.is_staff = True
27 user.save() # need to save before adding groups
28 user.groups.add(Group.objects.get(
32 return user
[all …]
/external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/
Dauth.py22 #: User model which authenticates custom users and tokens.
24 #: Default is :class:`webapp2_extras.appengine.auth.models.User`.
49 #: A list of extra user attributes to be stored in the session.
50 # The user object must provide all of them as attributes.
53 'user_model': 'webapp2_extras.appengine.auth.models.User',
71 """Raised when a user can't be fetched given an auth_id."""
75 """Raised when a user password doesn't match."""
102 # User data we're interested in -------------------------------------------
116 """The list of attributes retrieved from the user model.
124 # User model related ------------------------------------------------------
[all …]
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/opsworks/
Dlayer1.py115 **Required Permissions**: To use this action, an IAM user must
118 information on user permissions, see `Managing User
143 **Required Permissions**: To use this action, an IAM user must
146 information on user permissions, see `Managing User
169 **Required Permissions**: To use this action, an IAM user must
172 information on user permissions, see `Managing User
202 **Required Permissions**: To use this action, an IAM user must
205 information on user permissions, see `Managing User
239 **Required Permissions**: To use this action, an IAM user must
241 For more information on user permissions, see `Managing User
[all …]
/external/autotest/client/site_tests/security_HardlinkRestrictions/
Dsecurity_HardlinkRestrictions.py51 def _is_readable(self, path, user, expected=True): argument
52 rc = utils.system("su -c 'cat %s' %s" % (path, user),
59 (user, path))
62 (user, path))
65 def _is_writable(self, path, user, expected=True): argument
66 rc = utils.system("su -c 'echo > %s' %s" % (path, user),
73 (user, path))
76 (user, path))
79 def _can_hardlink(self, source, target, user, expected=True): argument
80 rc = utils.system("su -c 'ln %s %s' %s" % (source, target, user),
[all …]
/external/autotest/client/site_tests/platform_CryptohomeMigrateKey/
Dplatform_CryptohomeMigrateKey.py13 user = utils.random_username()
17 if not self.proxy.mount(user, old_pass, create=True):
18 raise error.TestFail('Could not create good user.')
19 if not self.proxy.unmount(user):
20 raise error.TestFail('Could not unmount good user.')
21 if not self.proxy.migrate(user, old_pass, new_pass):
22 raise error.TestFail('Could not migrate good user.')
23 if self.proxy.mount(user, old_pass):
25 if not self.proxy.mount(user, new_pass):
26 raise error.TestFail('Could not mount good user.')
[all …]
/external/autotest/client/site_tests/network_ShillInitScripts/
Dnetwork_ShillInitScripts.py29 fake_user = 'not-a-real-user@chromium.org'
54 def login(self, user=None): argument
59 @param user string user name (email address) to log in.
62 utils.system('start shill-start-user-session CHROMEOS_USER=%s' %
63 (user or self.fake_user))
76 """ Simulate user logout.
81 utils.system('start shill-stop-user-session')
92 # Deduce the root cryptohome directory name for our fake user.
96 # Deduce the user cryptohome directory name for our fake user.
98 '%s user %s' % (self.cryptohome_path_command, self.fake_user))
[all …]
/external/chromium-trace/catapult/third_party/webapp2/tests/
Dextras_appengine_auth_models_test.py13 class User(model.Model): class
23 self.register_model('User', models.User)
28 m = models.User
29 success, user = m.create_user(auth_id='auth_id_1', password_raw='foo')
31 self.assertTrue(user is not None)
32 self.assertTrue(user.password is not None)
34 # user.key.id() is required to retrieve the auth token
35 user_id = user.key.id()
39 self.assertEqual(m.get_by_auth_id('auth_id_1'), user)
43 self.assertEqual(u, user)
[all …]
/external/autotest/client/site_tests/platform_CryptohomeBadPerms/
Dplatform_CryptohomeBadPerms.py15 def require_mount_fail(self, user): argument
16 if self.cryptohome_proxy.mount(user, 'test', create=True):
17 raise error.TestFail('Mount unexpectedly succeeded for %s' % user)
22 # Leaf element of user path not owned by user.
23 user = utils.random_username()
24 path = cryptohome.user_path(user)
28 self.require_mount_fail(user)
33 user = utils.random_username()
34 path = cryptohome.system_path(user)
37 self.require_mount_fail(user)
[all …]
/external/autotest/site_utils/
Dmysql_bootstrap.py8 The purpose of this module is to grant access to a new-user/host/password
78 def mysql_cmd(cls, cmd, user=DEFAULT_USER, password=DEFAULT_PASS, argument
84 @param user: The user to use in the given command.
85 @param password: The password for the user.
89 (user, password, host, port, cmd))
109 def ping(cls, db_server, user=DEFAULT_USER, password=DEFAULT_PASS, argument
111 """Ping the given db server as 'user' using 'password'.
114 @param user: The user to use in the ping.
115 @param password: The password of the user.
130 'SELECT version();', host=mysql_cmd_host, user=user,
[all …]
/external/curl/docs/libcurl/opts/
DCURLOPT_URL.375 It is also possible to specify the user name, password and any supported login
79 http://user:password@www.example.com
81 ftp://user:password@ftp.example.com
85 imap://user:password;options@mail.example.com
87 pop3://user:password;options@mail.example.com
89 smtp://user:password;options@mail.example.com
139 ftp://user:password@ftp.example.com/readme.txt - This retrieves the readme.txt
140 file from the user's home directory. When a username and password is
142 user's home directory. To retrieve files from the root directory or a
147 ftp://user:password@ftp.example.com//readme.txt - This retrieves the readme.txt
[all …]
/external/selinux/sepolgen/tests/
Daudit.txt33 type=CRED_ACQ msg=audit(1158584988.203:719): user pid=8264 uid=0 auid=500 subj=user_u:system_r:unco…
34 type=USER_START msg=audit(1158584988.203:720): user pid=8264 uid=0 auid=500 subj=user_u:system_r:un…
35 type=USER_END msg=audit(1158584988.203:721): user pid=8264 uid=0 auid=500 subj=user_u:system_r:unco…
36 type=USER_ACCT msg=audit(1158585001.341:722): user pid=8294 uid=0 auid=4294967295 subj=system_u:sys…
38 type=USER_START msg=audit(1158585001.341:724): user pid=8294 uid=0 auid=0 subj=system_u:system_r:cr…
39 type=CRED_ACQ msg=audit(1158585001.345:725): user pid=8294 uid=0 auid=0 subj=system_u:system_r:cron…
40 type=CRED_DISP msg=audit(1158585001.397:726): user pid=8294 uid=0 auid=0 subj=system_u:system_r:cro…
41 type=USER_END msg=audit(1158585001.397:727): user pid=8294 uid=0 auid=0 subj=system_u:system_r:cron…
42 type=CRED_ACQ msg=audit(1158585033.003:728): user pid=8331 uid=0 auid=500 subj=user_u:system_r:unco…
43 type=USER_START msg=audit(1158585033.003:729): user pid=8331 uid=0 auid=500 subj=user_u:system_r:un…
[all …]
/external/autotest/client/site_tests/platform_CryptohomeChangePassword/
Dplatform_CryptohomeChangePassword.py26 # Get the hash for the test user account
27 cmd = ('/usr/sbin/cryptohome --action=obfuscate_user --user='
31 # Remove the test user account
32 cmd = ('/usr/sbin/cryptohome --action=remove --force --user='
35 # Ensure that the user directory does not exist
37 raise error.TestFail('Cryptohome could not remove the test user.')
39 # Mount the test user account
40 cmd = ('/usr/sbin/cryptohome --async --action=mount --user=' + test_user
43 # Ensure that the user directory exists
45 raise error.TestFail('Cryptohome could not create the test user.')
[all …]
/external/nist-sip/java/gov/nist/javax/sip/address/
DUserInfo.java36 * User information part of a URL.
47 /** user field
49 protected String user; field in UserInfo
65 public final static int USER = 2; field in UserInfo
86 if (!this.user.equalsIgnoreCase(other.user)) { in equals()
102 * Encode the user information as a string.
111 buffer.append(user).append(COLON).append(password); in encode()
113 buffer.append(user); in encode()
125 * Gets the user type (which can be set to TELEPHONE_SUBSCRIBER or USER)
126 * @return the type of user.
[all …]

12345678910>>...340