HomeSort by relevance Sort by last modified time
    Searched full:logins (Results 1 - 25 of 147) sorted by null

1 2 3 4 5 6

  /external/selinux/libselinux/man/man5/
service_seusers.5 13 .IR /logins/username
16 .I /etc/selinux/{SELINUXTYPE}/logins
48 # ./logins/root
57 # ./logins/rch
  /external/autotest/client/site_tests/cheets_Midis/
control 18 starts (and restarts) successfully on repeated logins
  /external/autotest/client/site_tests/login_OwnershipNotRetaken/
control 15 This test checks that, after taking ownership successfully, subsequent logins
login_OwnershipNotRetaken.py 15 """Subsequent logins after the owner must not clobber the owner's key."""
  /external/autotest/client/site_tests/performance_InboxInputLatency/
control 12 This is a test that logins in through telemetry and
  /external/autotest/client/site_tests/platform_InitLoginPerf/
control 14 This is the client-side test that goes through initialization and logins and
  /external/autotest/server/site_tests/platform_InitLoginPerfServer/
control 18 and normal logins.
  /external/autotest/server/site_tests/platform_TotalMemory/
control 19 This test reboots the DUT, logins and check the
  /external/libmtp/
libmtp.sh.in 21 # This also works with non-gdm logins (e.g. on a virtual terminal)
  /external/ppp/pppd/plugins/radius/etc/
radiusclient.conf 17 # name of the nologin file which when it exists disables logins.
20 # logins on /dev/ttyS2) (default /etc/nologin)
radiusclient.conf.in 17 # name of the nologin file which when it exists disables logins.
20 # logins on /dev/ttyS2) (default /etc/nologin)
  /external/selinux/python/semanage/
semanage.8 62 mapping from Linux usernames (logins) to SELinux user identities,
  /external/webrtc/webrtc/libjingle/xmpp/
asyncsocket.h 58 // handling the valuable certificates for logins into proxies. If
  /external/selinux/python/chcat/
chcat 73 logins = seobject.loginRecords()
74 seusers = logins.get_all()
153 logins = seobject.loginRecords()
154 seusers = logins.get_all()
239 logins = seobject.loginRecords()
240 seusers = logins.get_all()
  /external/selinux/libselinux/man/man3/
selinux_binary_policy_path.3 67 returns the failsafe context for emergency logins.
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/
ttyent.h 48 #define TTY_ON 0x01 /* enable logins (start ty_getty program) */
sysexits.h 58 * be used for mail addresses or remote logins.
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/i386-linux-gnu/bits/
utmp.h 37 previous logins. */
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/x86_64-linux-gnu/bits/
utmp.h 37 previous logins. */
  /bionic/libc/include/
sysexits.h 63 * be used for mail addresses or remote logins.
  /device/linaro/bootloader/edk2/StdLib/Include/
sysexits.h 66 * be used for mail addresses or remote logins.
  /external/selinux/gui/
loginsPage.py 55 semanagePage.__init__(self, xml, "logins", _("User Mapping"))
  /external/selinux/libselinux/src/
seusers.c 279 if (asprintf(&path,"%s/logins/%s", selinux_policy_root(), username) < 0)
  /external/syslinux/core/lwip/src/netif/ppp/
auth.c 904 /*ppp_panic("Excess Bad Logins");*/
984 /* XXX Fail until we decide that we want to support logins. */
1009 /* XXX Fail until we decide that we want to support logins. */
    [all...]
  /external/mockftpserver/MockFtpServer/src/test/java/org/mockftpserver/stub/
StubFtpServerIntegrationTest.java 200 final String STATUS = "System name: abc.def\nVersion 3.5.7\nNumber of failed logins: 2";
201 final String FORMATTED_REPLY_STATUS = "211-System name: abc.def\r\nVersion 3.5.7\r\n211 Number of failed logins: 2.";

Completed in 702 milliseconds

1 2 3 4 5 6