/external/toybox/tests/ |
D | useradd.test | 23 user="toyTestUser" 24 testing "adduser user_name (text)" "useradd $user $arg || 25 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] && 27 userdel -r $user $arg 29 user="toy1Test2User3" 30 testing "adduser user_name (alphanumeric)" "useradd $user $arg || 31 grep '^$user:' /etc/passwd $arg && [ -d /home/$user ] && 33 userdel -r $user $arg 35 user="987654321" 36 testing "adduser user_name (numeric)" "useradd $user $arg || [all …]
|
/external/selinux/libsepol/src/ |
D | user_record.c | 60 const sepol_user_t * user, in hidden_def() 64 if (sepol_user_key_create(handle, user->name, key_ptr) < 0) { in hidden_def() 65 ERR(handle, "could not extract key from user %s", user->name); in hidden_def() 77 int sepol_user_compare(const sepol_user_t * user, const sepol_user_key_t * key) in sepol_user_compare() argument 80 return strcmp(user->name, key->name); in sepol_user_compare() 83 int sepol_user_compare2(const sepol_user_t * user, const sepol_user_t * user2) in sepol_user_compare2() argument 86 return strcmp(user->name, user2->name); in sepol_user_compare2() 90 const char *sepol_user_get_name(const sepol_user_t * user) in sepol_user_get_name() argument 93 return user->name; in sepol_user_get_name() 97 sepol_user_t * user, const char *name) in sepol_user_set_name() argument [all …]
|
/external/selinux/libsemanage/src/ |
D | user_base_record.c | 29 const semanage_user_base_t * user, in semanage_user_base_key_extract() argument 33 return sepol_user_key_extract(handle->sepolh, user, key); in semanage_user_base_key_extract() 36 static int semanage_user_base_compare(const semanage_user_base_t * user, in semanage_user_base_compare() argument 40 return sepol_user_compare(user, key); in semanage_user_base_compare() 43 static int semanage_user_base_compare2(const semanage_user_base_t * user, in semanage_user_base_compare2() argument 47 return sepol_user_compare2(user, user2); in semanage_user_base_compare2() 50 static int semanage_user_base_compare2_qsort(const semanage_user_base_t ** user, in semanage_user_base_compare2_qsort() argument 55 return sepol_user_compare2(*user, *user2); in semanage_user_base_compare2_qsort() 60 user) in semanage_user_base_get_name() 63 return sepol_user_get_name(user); in semanage_user_base_get_name() [all …]
|
D | user_record.c | 43 const semanage_user_t * user, in hidden_def() 47 return semanage_user_base_key_extract(handle, user->base, key); in hidden_def() 67 int semanage_user_compare(const semanage_user_t * user, in semanage_user_compare() argument 73 return strcmp(user->name, name); in semanage_user_compare() 78 int semanage_user_compare2(const semanage_user_t * user, in hidden_def() 82 return strcmp(user->name, user2->name); in hidden_def() 87 static int semanage_user_compare2_qsort(const semanage_user_t ** user, in hidden_def() 91 return strcmp((*user)->name, (*user2)->name); in hidden_def() 95 const char *semanage_user_get_name(const semanage_user_t * user) in semanage_user_get_name() argument 97 return user->name; in semanage_user_get_name() [all …]
|
D | user_internal.h | 84 const semanage_user_base_t * user, 88 const semanage_user_base_t * user, 92 user); 95 semanage_user_base_t * user, 99 user); 102 semanage_user_base_t * user, 106 user); 109 semanage_user_base_t * user, 112 hidden int semanage_user_base_get_num_roles(const semanage_user_base_t * user); 115 semanage_user_base_t * user, [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | eap_user_db.c | 23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) in set_user_methods() argument 32 os_memset(&user->methods, 0, sizeof(user->methods)); in set_user_methods() 39 user->methods[num_methods].method = in set_user_methods() 41 &user->methods[num_methods].vendor); in set_user_methods() 42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && in set_user_methods() 43 user->methods[num_methods].method == EAP_TYPE_NONE) { in set_user_methods() 45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; in set_user_methods() 49 user->ttls_auth |= EAP_TTLS_AUTH_CHAP; in set_user_methods() 53 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAP; in set_user_methods() 57 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAPV2; in set_user_methods() [all …]
|
/external/autotest/client/cros/ |
D | cryptohome.py | 25 def get_user_hash(user): argument 28 '--user=%s' % user]) 31 def user_path(user): argument 33 return utils.system_output(['cryptohome-path', 'user', user]) 36 def system_path(user): argument 38 return utils.system_output(['cryptohome-path', 'system', user]) 41 def ensure_clean_cryptohome_for(user, password=None): argument 49 remove_vault(user) 50 mount_vault(user, password, create=True) 176 def remove_vault(user): argument [all …]
|
/external/selinux/libsemanage/include/semanage/ |
D | user_record.h | 24 const semanage_user_t * user, 29 extern int semanage_user_compare(const semanage_user_t * user, 32 extern int semanage_user_compare2(const semanage_user_t * user, 36 extern const char *semanage_user_get_name(const semanage_user_t * user); 39 semanage_user_t * user, const char *name); 42 extern const char *semanage_user_get_prefix(const semanage_user_t * user); 45 semanage_user_t * user, const char *name); 48 extern const char *semanage_user_get_mlslevel(const semanage_user_t * user); 51 semanage_user_t * user, 54 extern const char *semanage_user_get_mlsrange(const semanage_user_t * user); [all …]
|
/external/autotest/client/site_tests/platform_CryptohomeBadPerms/ |
D | platform_CryptohomeBadPerms.py | 15 def require_mount_fail(self, user): argument 16 if self.cryptohome_proxy.mount(user, 'test', create=True): 17 raise error.TestFail('Mount unexpectedly succeeded for %s' % user) 23 user = utils.random_username() 24 path = cryptohome.user_path(user) 28 self.require_mount_fail(user) 33 user = utils.random_username() 34 path = cryptohome.system_path(user) 37 self.require_mount_fail(user) 39 self.require_mount_fail(user) [all …]
|
/external/autotest/client/site_tests/security_HardlinkRestrictions/ |
D | security_HardlinkRestrictions.py | 51 def _is_readable(self, path, user, expected=True): argument 52 rc = utils.system("su -c 'cat %s' %s" % (path, user), 59 (user, path)) 62 (user, path)) 65 def _is_writable(self, path, user, expected=True): argument 66 rc = utils.system("su -c 'echo > %s' %s" % (path, user), 73 (user, path)) 76 (user, path)) 79 def _can_hardlink(self, source, target, user, expected=True): argument 80 rc = utils.system("su -c 'ln %s %s' %s" % (source, target, user), [all …]
|
/external/selinux/libsepol/include/sepol/ |
D | user_record.h | 23 const sepol_user_t * user, 28 extern int sepol_user_compare(const sepol_user_t * user, 31 extern int sepol_user_compare2(const sepol_user_t * user, 35 extern const char *sepol_user_get_name(const sepol_user_t * user); 38 sepol_user_t * user, const char *name); 41 extern const char *sepol_user_get_mlslevel(const sepol_user_t * user); 44 sepol_user_t * user, const char *mls_level); 46 extern const char *sepol_user_get_mlsrange(const sepol_user_t * user); 49 sepol_user_t * user, const char *mls_range); 52 extern int sepol_user_get_num_roles(const sepol_user_t * user); [all …]
|
/external/wpa_supplicant_8/hs20/server/ |
D | spp_server.c | 47 static char * db_get_session_val(struct hs20_svc *ctx, const char *user, 52 static xml_node_t * build_policy(struct hs20_svc *ctx, const char *user, 57 const char *user, const char *realm, in db_add_session() argument 70 sessionid, user ? user : "", realm ? realm : "", in db_add_session() 86 static void db_update_session_password(struct hs20_svc *ctx, const char *user, in db_update_session_password() argument 94 pw, sessionid, user, realm); in db_update_session_password() 107 const char *user, in db_update_session_machine_managed() argument 115 pw_mm ? "1" : "0", sessionid, user, realm); in db_update_session_machine_managed() 128 static void db_add_session_pps(struct hs20_svc *ctx, const char *user, in db_add_session_pps() argument 140 str, sessionid, user, realm); in db_add_session_pps() [all …]
|
/external/libvterm/include/ |
D | vterm.h | 168 int (*text)(const char *bytes, size_t len, void *user); 169 int (*control)(unsigned char control, void *user); 170 int (*escape)(const char *bytes, size_t len, void *user); 171 …nst char *leader, const long args[], int argcount, const char *intermed, char command, void *user); 172 int (*osc)(const char *command, size_t cmdlen, void *user); 173 int (*dcs)(const char *command, size_t cmdlen, void *user); 174 int (*resize)(int rows, int cols, void *user); 177 void vterm_set_parser_callbacks(VTerm *vt, const VTermParserCallbacks *callbacks, void *user); 186 int (*putglyph)(VTermGlyphInfo *info, VTermPos pos, void *user); 187 int (*movecursor)(VTermPos pos, VTermPos oldpos, int visible, void *user); [all …]
|
/external/freetype/src/base/ |
D | ftbbox.c | 86 TBBox_Rec* user ) in BBox_Move_To() argument 88 FT_UPDATE_BBOX( to, user->bbox ); in BBox_Move_To() 90 user->last = *to; in BBox_Move_To() 118 TBBox_Rec* user ) in BBox_Line_To() argument 120 user->last = *to; in BBox_Line_To() 200 TBBox_Rec* user ) in BBox_Conic_To() argument 203 FT_UPDATE_BBOX( to, user->bbox ); in BBox_Conic_To() 205 if ( CHECK_X( control, user->bbox ) ) in BBox_Conic_To() 206 BBox_Conic_Check( user->last.x, in BBox_Conic_To() 209 &user->bbox.xMin, in BBox_Conic_To() [all …]
|
/external/pdfium/third_party/freetype/src/base/ |
D | ftbbox.c | 86 TBBox_Rec* user ) in BBox_Move_To() argument 88 FT_UPDATE_BBOX( to, user->bbox ); in BBox_Move_To() 90 user->last = *to; in BBox_Move_To() 118 TBBox_Rec* user ) in BBox_Line_To() argument 120 user->last = *to; in BBox_Line_To() 200 TBBox_Rec* user ) in BBox_Conic_To() argument 203 FT_UPDATE_BBOX( to, user->bbox ); in BBox_Conic_To() 205 if ( CHECK_X( control, user->bbox ) ) in BBox_Conic_To() 206 BBox_Conic_Check( user->last.x, in BBox_Conic_To() 209 &user->bbox.xMin, in BBox_Conic_To() [all …]
|
/external/selinux/secilc/docs/ |
D | cil_user_statements.md | 4 user section in User Statements 7 Declares an SELinux user identifier in the current namespace. 11 (user user_id) 22 <td align="left"><p><code>user</code></p></td> 23 <td align="left"><p>The <code>user</code> keyword.</p></td> 27 <td align="left"><p>The SELinux <code>user</code> identifier.</p></td> 34 This will declare an SELinux user as `unconfined.user`: 37 (user user) 43 Associates a previously declared [`user`](cil_user_statements.md#user) identifier with a previously… 63 <td align="left"><p>A previously declared SELinux <code>user</code> or <code>userattribute</code> i… [all …]
|
/external/autotest/client/site_tests/platform_CryptohomeMigrateKey/ |
D | platform_CryptohomeMigrateKey.py | 13 user = utils.random_username() 17 if not self.proxy.mount(user, old_pass, create=True): 19 if not self.proxy.unmount(user): 21 if not self.proxy.migrate(user, old_pass, new_pass): 23 if self.proxy.mount(user, old_pass): 25 if not self.proxy.mount(user, new_pass): 27 if not self.proxy.unmount(user): 29 self.proxy.remove(user) 32 user = utils.random_username() 35 if not self.proxy.mount(user, old_pass, create=True): [all …]
|
/external/autotest/client/site_tests/platform_CryptohomeNonDirs/ |
D | platform_CryptohomeNonDirs.py | 15 def require_mount_fail(self, user): argument 16 if self.cryptohome_proxy.mount(user, 'test', create=True): 17 raise error.TestFail('Mount failed for %s' % user) 34 user = utils.random_username() 35 path = cryptohome.user_path(user) 38 self.require_mount_fail(user) 43 user = utils.random_username() 44 path = cryptohome.system_path(user) 47 self.require_mount_fail(user) 52 user = utils.random_username() [all …]
|
/external/autotest/frontend/ |
D | apache_auth.py | 21 user = User.objects.get(username=username) 24 user = User(username=username, 26 user.is_staff = True 27 user.save() # need to save before adding groups 28 user.groups.add(Group.objects.get( 32 return user 37 user, created = models.User.objects.get_or_create(login=username) 39 user.save() 59 user = request.META.get('REMOTE_USER') 60 if user is None: [all …]
|
/external/chromium-trace/catapult/third_party/webapp2/webapp2_extras/appengine/auth/ |
D | models.py | 133 user = model.StringProperty(required=True, indexed=False) variable in UserToken 138 def get_key(cls, user, subject, token): argument 154 return model.Key(cls, '%s.%s.%s' % (str(user), subject, token)) 157 def create(cls, user, subject, token=None): argument 173 user = str(user) 175 key = cls.get_key(user, subject, token) 176 entity = cls(key=key, user=user, subject=subject, token=token) 181 def get(cls, user=None, subject=None, token=None): argument 196 if user and subject and token: 197 return cls.get_key(user, subject, token).get() [all …]
|
/external/nist-sip/java/gov/nist/javax/sip/address/ |
D | UserInfo.java | 49 protected String user; field in UserInfo 86 if (!this.user.equalsIgnoreCase(other.user)) { in equals() 111 buffer.append(user).append(COLON).append(password); in encode() 113 buffer.append(user); in encode() 136 return user; in getUser() 150 public void setUser(String user) { in setUser() argument 151 this.user = user; in setUser() 156 if (user != null in setUser() 157 && (user.indexOf(POUND) >= 0 || user.indexOf(SEMICOLON) >= 0)) { in setUser()
|
/external/wpa_supplicant_8/hs20/server/www/ |
D | est.php | 10 unset($user); 28 $user = $data['username']; variable 29 if (strlen($user) < 1) { 41 "WHERE user='$user' AND realm='$realm'"; 44 error_log("EST: Session not found for user=$user realm=$realm"); 49 error_log("EST: Session fetch failed for user=$user realm=$realm"); 56 error_log("EST: Unexpected operation $oper for user=$user realm=$realm"); 61 error_log("EST: Empty password for user=$user realm=$realm"); 65 $A1 = md5($user . ':' . $realm . ':' . $pw); 70 error_log("EST: Incorrect authentication response for user=$user realm=$realm"); [all …]
|
D | spp.php | 23 unset($user); 41 $user = $data['username']; variable 42 if (strlen($user) < 1) { 54 "WHERE identity='$user' AND realm='$realm'")->fetch(); 57 "WHERE osu_user='$user' AND realm='$realm'")->fetch(); 62 error_log("spp.php - Authentication failed - user '$user' not found"); 70 $A1 = md5($user . ':' . $realm . ':' . $pw); 81 $user = "cert-" . $_SERVER["SSL_CLIENT_M_SERIAL"]; variable 93 if (isset($user) && strlen($user) > 0) 94 putenv("HS20USER=$user");
|
/external/autotest/site_utils/ |
D | mysql_bootstrap.py | 78 def mysql_cmd(cls, cmd, user=DEFAULT_USER, password=DEFAULT_PASS, argument 89 (user, password, host, port, cmd)) 109 def ping(cls, db_server, user=DEFAULT_USER, password=DEFAULT_PASS, argument 130 'SELECT version();', host=mysql_cmd_host, user=user, 135 def bootstrap(user, password, source_host, dest_host): argument 166 'new_user': user, 180 dest_host, user=user, password=password, use_ssh=False) 215 user = global_config.global_config.get_config_value( 226 user, local_hostname, dest_host) 227 bootstrap(user, password, local_hostname, dest_host) [all …]
|
/external/autotest/frontend/client/src/autotest/afe/ |
D | HostSelectorDisplay.java | 7 import com.google.gwt.user.client.ui.Button; 8 import com.google.gwt.user.client.ui.CheckBox; 9 import com.google.gwt.user.client.ui.Composite; 10 import com.google.gwt.user.client.ui.HasText; 11 import com.google.gwt.user.client.ui.HasValue; 12 import com.google.gwt.user.client.ui.HorizontalPanel; 13 import com.google.gwt.user.client.ui.Label; 14 import com.google.gwt.user.client.ui.Panel; 15 import com.google.gwt.user.client.ui.SimplePanel; 16 import com.google.gwt.user.client.ui.TabPanel; [all …]
|