OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:RUSER
(Results
1 - 12
of
12
) sorted by null
/external/ltp/testcases/network/tcp_cmds/ssh/
ssh02_s1
34
set
RUSER
$TEST_USER
43
# Set
RUSER
to an invalid user
44
set
RUSER
"Invaild_User"
46
spawn ssh -l $
RUSER
$RHOST whoami
59
send_user "SSH would not allow $
RUSER
to login with\
64
"$
RUSER
" {
65
send_user "SSH allowed $
RUSER
to login with invalid\
ssh01_s1
33
set
RUSER
$TEST_USER
45
spawn ssh -l $
RUSER
$RHOST whoami
58
send_user "SSH would not allow $
RUSER
to login with\
63
"$
RUSER
" {
64
send_user "SSH allowed $
RUSER
to login with invalid\
ssh03_s1
33
set
RUSER
$TEST_USER
42
spawn ssh -l $
RUSER
$RHOST whoami
55
send_user "\nSSH would not allow $
RUSER
to login, Test\
59
"$
RUSER
" {
60
send_user "SSH allowed $
RUSER
to login, Test PASSED \n"
/external/ltp/testcases/network/tcp_cmds/rlogin/
rlogin01
29
if [ -z $
RUSER
]; then
30
RUSER
=root
34
tst_brkm TCONF "Please set PASSWD for $
RUSER
."
61
spawn rlogin $RHOST -l $
RUSER
68
} \"$
RUSER
@\" {
70
wc -w > $
RUSER
.$RHOST\rexit\r\";
77
tst_rhost_run -u $
RUSER
-c "grep -q 9 $
RUSER
.$RHOST" || return 1
78
tst_rhost_run -u $
RUSER
-c "rm -f $
RUSER
.$RHOST
[
all
...]
/external/ltp/testcases/network/tcp_cmds/telnet/
telnet01
29
if [ -z $
RUSER
]; then
30
RUSER
=root
34
tst_brkm TCONF "Please set PASSWD for $
RUSER
."
64
send \"$
RUSER
\r\"
72
} \"$
RUSER
@\" {
74
wc -w > $
RUSER
.$RHOST\rexit\r\";
81
tst_rhost_run -u $
RUSER
-c "grep -q 9 $
RUSER
.$RHOST" || return 1
82
tst_rhost_run -u $
RUSER
-c "rm -f $
RUSER
.$RHOST
[
all
...]
/external/llvm/utils/bugpoint/
RemoteRunSafely.sh
50
RUSER
=`id -un`
58
RUSER
=$2
75
#DEBUG: echo '
RUSER
='$
RUSER
92
connection=$
RUSER
'@'$RHOST
/external/swiftshader/third_party/LLVM/utils/bugpoint/
RemoteRunSafely.sh
50
RUSER
=`id -un`
58
RUSER
=$2
75
#DEBUG: echo '
RUSER
='$
RUSER
92
connection=$
RUSER
'@'$RHOST
/external/ltp/testcases/network/tcp_cmds/ftp/
ftp01
60
RUSER
=${
RUSER
:-root}
70
rsh -n -l root $RHOST chown -R ${
RUSER
} "$TCtmp"
97
echo user $
RUSER
$PASSWD
109
echo user $
RUSER
$PASSWD
ftp02
63
send \"$
RUSER
\r\"
/external/selinux/python/sepolicy/
sepolicy.py
506
from sepolicy.generate import policy, AUSER,
RUSER
, EUSER, USERS, SANDBOX, APPLICATIONS, NEWTYPE
509
conflict_args = {'TYPES': (NEWTYPE,), 'DOMAIN': (EUSER,), 'ADMIN_DOMAIN': (AUSER,
RUSER
, EUSER,)}
592
from sepolicy.generate import DAEMON, get_poltype_desc, poltype, DAEMON, DBUS, INETD, CGI, SANDBOX, USER, EUSER, TUSER, XUSER, LUSER, AUSER,
RUSER
, NEWTYPE
645
group.add_argument("--confined_admin", dest="policytype", const=
RUSER
,
647
help=_("Generate '%s' policy") % poltype[
RUSER
])
/external/selinux/python/sepolicy/sepolicy/
generate.py
137
RUSER
= 11
152
poltype[
RUSER
] = _("Confined Root Administrator Role")
165
USERS = [XUSER, TUSER, LUSER, AUSER,
RUSER
]
771
if self.type ==
RUSER
:
[
all
...]
/external/selinux/gui/
polgengui.py
238
self.pages[sepolicy.generate.
RUSER
] = [self.SELECT_TYPE_PAGE, self.APP_PAGE, self.ADMIN_PAGE, self.USER_TRANSITION_PAGE, self.BOOLEAN_PAGE, self.SELECT_DIR_PAGE]
468
return sepolicy.generate.
RUSER
502
if self.get_type() == sepolicy.generate.
RUSER
:
[
all
...]
Completed in 136 milliseconds