HomeSort by relevance Sort by last modified time
    Searched refs:RUSER (Results 1 - 12 of 12) sorted by null

  /external/ltp/testcases/network/tcp_cmds/ssh/
ssh02_s1 34 set RUSER $TEST_USER
43 # Set RUSER to an invalid user
44 set RUSER "Invaild_User"
46 spawn ssh -l $RUSER $RHOST whoami
59 send_user "SSH would not allow $RUSER to login with\
64 "$RUSER" {
65 send_user "SSH allowed $RUSER to login with invalid\
ssh01_s1 33 set RUSER $TEST_USER
45 spawn ssh -l $RUSER $RHOST whoami
58 send_user "SSH would not allow $RUSER to login with\
63 "$RUSER" {
64 send_user "SSH allowed $RUSER to login with invalid\
ssh03_s1 33 set RUSER $TEST_USER
42 spawn ssh -l $RUSER $RHOST whoami
55 send_user "\nSSH would not allow $RUSER to login, Test\
59 "$RUSER" {
60 send_user "SSH allowed $RUSER to login, Test PASSED \n"
  /external/ltp/testcases/network/tcp_cmds/rlogin/
rlogin01 29 if [ -z $RUSER ]; then
30 RUSER=root
34 tst_brkm TCONF "Please set PASSWD for $RUSER."
61 spawn rlogin $RHOST -l $RUSER
68 } \"$RUSER@\" {
70 wc -w > $RUSER.$RHOST\rexit\r\";
77 tst_rhost_run -u $RUSER -c "grep -q 9 $RUSER.$RHOST" || return 1
78 tst_rhost_run -u $RUSER -c "rm -f $RUSER.$RHOST
    [all...]
  /external/ltp/testcases/network/tcp_cmds/telnet/
telnet01 29 if [ -z $RUSER ]; then
30 RUSER=root
34 tst_brkm TCONF "Please set PASSWD for $RUSER."
64 send \"$RUSER\r\"
72 } \"$RUSER@\" {
74 wc -w > $RUSER.$RHOST\rexit\r\";
81 tst_rhost_run -u $RUSER -c "grep -q 9 $RUSER.$RHOST" || return 1
82 tst_rhost_run -u $RUSER -c "rm -f $RUSER.$RHOST
    [all...]
  /external/llvm/utils/bugpoint/
RemoteRunSafely.sh 50 RUSER=`id -un`
58 RUSER=$2
75 #DEBUG: echo 'RUSER='$RUSER
92 connection=$RUSER'@'$RHOST
  /external/swiftshader/third_party/LLVM/utils/bugpoint/
RemoteRunSafely.sh 50 RUSER=`id -un`
58 RUSER=$2
75 #DEBUG: echo 'RUSER='$RUSER
92 connection=$RUSER'@'$RHOST
  /external/ltp/testcases/network/tcp_cmds/ftp/
ftp01 60 RUSER=${RUSER:-root}
70 rsh -n -l root $RHOST chown -R ${RUSER} "$TCtmp"
97 echo user $RUSER $PASSWD
109 echo user $RUSER $PASSWD
ftp02 63 send \"$RUSER\r\"
  /external/selinux/python/sepolicy/
sepolicy.py 506 from sepolicy.generate import policy, AUSER, RUSER, EUSER, USERS, SANDBOX, APPLICATIONS, NEWTYPE
509 conflict_args = {'TYPES': (NEWTYPE,), 'DOMAIN': (EUSER,), 'ADMIN_DOMAIN': (AUSER, RUSER, EUSER,)}
592 from sepolicy.generate import DAEMON, get_poltype_desc, poltype, DAEMON, DBUS, INETD, CGI, SANDBOX, USER, EUSER, TUSER, XUSER, LUSER, AUSER, RUSER, NEWTYPE
645 group.add_argument("--confined_admin", dest="policytype", const=RUSER,
647 help=_("Generate '%s' policy") % poltype[RUSER])
  /external/selinux/python/sepolicy/sepolicy/
generate.py 137 RUSER = 11
152 poltype[RUSER] = _("Confined Root Administrator Role")
165 USERS = [XUSER, TUSER, LUSER, AUSER, RUSER]
771 if self.type == RUSER:
    [all...]
  /external/selinux/gui/
polgengui.py 238 self.pages[sepolicy.generate.RUSER] = [self.SELECT_TYPE_PAGE, self.APP_PAGE, self.ADMIN_PAGE, self.USER_TRANSITION_PAGE, self.BOOLEAN_PAGE, self.SELECT_DIR_PAGE]
468 return sepolicy.generate.RUSER
502 if self.get_type() == sepolicy.generate.RUSER:
    [all...]

Completed in 136 milliseconds