/external/selinux/libselinux/man/man5/ |
service_seusers.5 | 13 .IR /logins/username 16 .I /etc/selinux/{SELINUXTYPE}/logins 48 # ./logins/root 57 # ./logins/rch
|
/external/autotest/client/site_tests/cheets_Midis/ |
control | 18 starts (and restarts) successfully on repeated logins
|
/external/autotest/client/site_tests/login_OwnershipNotRetaken/ |
control | 15 This test checks that, after taking ownership successfully, subsequent logins
|
login_OwnershipNotRetaken.py | 15 """Subsequent logins after the owner must not clobber the owner's key."""
|
/external/autotest/client/site_tests/performance_InboxInputLatency/ |
control | 12 This is a test that logins in through telemetry and
|
/external/autotest/client/site_tests/platform_InitLoginPerf/ |
control | 14 This is the client-side test that goes through initialization and logins and
|
/external/autotest/server/site_tests/platform_InitLoginPerfServer/ |
control | 18 and normal logins.
|
/external/autotest/server/site_tests/platform_TotalMemory/ |
control | 19 This test reboots the DUT, logins and check the
|
/external/libmtp/ |
libmtp.sh.in | 21 # This also works with non-gdm logins (e.g. on a virtual terminal)
|
/external/ppp/pppd/plugins/radius/etc/ |
radiusclient.conf | 17 # name of the nologin file which when it exists disables logins. 20 # logins on /dev/ttyS2) (default /etc/nologin)
|
radiusclient.conf.in | 17 # name of the nologin file which when it exists disables logins. 20 # logins on /dev/ttyS2) (default /etc/nologin)
|
/external/selinux/python/semanage/ |
semanage.8 | 62 mapping from Linux usernames (logins) to SELinux user identities,
|
/external/webrtc/webrtc/libjingle/xmpp/ |
asyncsocket.h | 58 // handling the valuable certificates for logins into proxies. If
|
/external/selinux/python/chcat/ |
chcat | 73 logins = seobject.loginRecords() 74 seusers = logins.get_all() 153 logins = seobject.loginRecords() 154 seusers = logins.get_all() 239 logins = seobject.loginRecords() 240 seusers = logins.get_all()
|
/external/selinux/libselinux/man/man3/ |
selinux_binary_policy_path.3 | 67 returns the failsafe context for emergency logins.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/ |
ttyent.h | 48 #define TTY_ON 0x01 /* enable logins (start ty_getty program) */
|
sysexits.h | 58 * be used for mail addresses or remote logins.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/i386-linux-gnu/bits/ |
utmp.h | 37 previous logins. */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/x86_64-linux-gnu/bits/ |
utmp.h | 37 previous logins. */
|
/bionic/libc/include/ |
sysexits.h | 63 * be used for mail addresses or remote logins.
|
/device/linaro/bootloader/edk2/StdLib/Include/ |
sysexits.h | 66 * be used for mail addresses or remote logins.
|
/external/selinux/gui/ |
loginsPage.py | 55 semanagePage.__init__(self, xml, "logins", _("User Mapping"))
|
/external/selinux/libselinux/src/ |
seusers.c | 279 if (asprintf(&path,"%s/logins/%s", selinux_policy_root(), username) < 0)
|
/external/syslinux/core/lwip/src/netif/ppp/ |
auth.c | 904 /*ppp_panic("Excess Bad Logins");*/ 984 /* XXX Fail until we decide that we want to support logins. */ 1009 /* XXX Fail until we decide that we want to support logins. */ [all...] |
/external/mockftpserver/MockFtpServer/src/test/java/org/mockftpserver/stub/ |
StubFtpServerIntegrationTest.java | 200 final String STATUS = "System name: abc.def\nVersion 3.5.7\nNumber of failed logins: 2";
201 final String FORMATTED_REPLY_STATUS = "211-System name: abc.def\r\nVersion 3.5.7\r\n211 Number of failed logins: 2.";
|