| /OK3568_Linux_fs/buildroot/support/scripts/ |
| H A D | mkusers | 56 local username="${1}" 58 awk -F: -v username="${username}" \ 64 local username="${1}" 66 awk -F: -v username="${username}" \ 104 local username="${1}" 107 ugid="$( get_ugid "${username}" )" 122 local username="${1}" 130 _ugid="$( get_ugid "${username}" )" 132 _uid="$( get_uid "${username}" )" 133 _ugroup="$( get_ugroup "${username}" )" [all …]
|
| /OK3568_Linux_fs/buildroot/package/janus-gateway/ |
| H A D | 0003-Fix-potential-Cross-site-Scripting-XSS-exploits-in-demos.patch | 55 var register = { request: "join", room: myroom, display: username }; 56 - myusername = username; 57 + myusername = escapeXmlTags(username); 197 var username = json["username"]; 199 - participants[username] = display ? display : username; 200 + participants[username] = escapeXmlTags(display ? display : username); 201 if(username !== myid && $('#rp' + username).length === 0) { 203 …$('#list').append('<li id="rp' + username + '" class="list-group-item">' + participants[username] … 205 username: myid, 206 display: username [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/classes/ |
| H A D | useradd_base.bbclass | 34 local username=`echo "$opts" | awk '{ print $NF }'` 35 local user_exists="`grep "^$username:" $rootdir/etc/passwd || true`" 38 user_exists="`grep "^$username:" $rootdir/etc/passwd || true`" 43 bbnote "${PN}: user $username already exists, not re-creating it" 52 …local username=`echo "$opts" | awk '{ for (i = 1; i < NF; i++) if ($i == "-a" || $i == "--add") pr… 53 bbnote "${PN}: Running groupmems command with group $groupname and user $username" 54 …local mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/gr… 57 …mem_exists="`grep "^$groupname:[^:]*:[^:]*:\([^,]*,\)*$username\(,[^,]*\)*$" $rootdir/etc/group ||… 62 bbnote "${PN}: group $groupname already contains $username, not re-adding it" 97 local username=`echo "$opts" | awk '{ print $NF }'` [all …]
|
| /OK3568_Linux_fs/yocto/poky/bitbake/lib/layerindexlib/ |
| H A D | restapi.py | 144 def _get_json_response(apiurl=None, username=None, password=None, retry=True): argument 151 username=up.username 160 … res = self.layerindex._fetch_url(up_stripped.geturl(), username=username, password=password) 167 …parsed = _get_json_response(apiurl=up_stripped.geturl(), username=username, password=password, ret… 197 … index.apilinks = _get_json_response(apiurl=url, username=up.username, password=up.password) 214 username=up.username, password=up.password) 226 username=up.username, password=up.password) 242 username=up.username, password=up.password) 263 username=up.username, password=up.password)
|
| /OK3568_Linux_fs/buildroot/dl/sox/git/ |
| H A D | release.sh | 301 username="${user},sox" 304 echo "Creating shell on sourceforge for $username" 305 ssh ${username}@${hostname} create 311 ssh ${username}@${hostname} rm -rf ${web_path}/soxpng 312 scp -pr *.pdf *.html soxpng ${username}@${hostname}:${web_path} 313 scp -p Docs.Features ${username}@${hostname}:${web_path/wiki.d} 317 ssh ${username}@${hostname} mkdir -p ${release_path}/${rcpath}${module}/${release_num} 318 …rsync -avz --delete --progress $release_list ${username}@${hostname}:${release_path}/${rcpath}${mo…
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-gnome/epiphany/files/ |
| H A D | CVE-2023-26081.patch | 42 query(origin, targetOrigin, username, usernameField, passwordField) 49 …ying passwords for origin=${origin}, targetOrigin=${targetOrigin}, username=${username}, usernameF… 54 save(origin, targetOrigin, username, password, usernameField, passwordField, isNew) 61 …aving password for origin=${origin}, targetOrigin=${targetOrigin}, username=${username}, usernameF… 66 … requestSave(origin, targetOrigin, username, password, usernameField, passwordField, isNew, pageID) 73 … save password for origin=${origin}, targetOrigin=${targetOrigin}, username=${username}, usernameF…
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/curl/curl/ |
| H A D | CVE-2022-27782-1.patch | 163 - data->set.ssl.username = data->set.str[STRING_TLSAUTH_USERNAME]; 165 + data->set.ssl.primary.username = data->set.str[STRING_TLSAUTH_USERNAME]; 168 - data->set.proxy_ssl.username = data->set.str[STRING_TLSAUTH_USERNAME_PROXY]; 170 + data->set.proxy_ssl.primary.username = 190 + char *username; /* TLS username (for, e.g., SRP) */ 212 - char *username; /* TLS username (for, e.g., SRP) */ 230 - infof(data, "Using TLS-SRP username: %s", SSL_SET_OPTION(username)); 231 + infof(data, "Using TLS-SRP username: %s", 232 + SSL_SET_OPTION(primary.username)); 240 - SSL_SET_OPTION(username), [all …]
|
| H A D | CVE-2022-27774-4.patch | 28 infof(data, "Using TLS-SRP username: %s", SSL_SET_OPTION(username));
|
| /OK3568_Linux_fs/yocto/poky/bitbake/lib/bb/fetch2/ |
| H A D | repo.py | 58 username = ud.user + "@" 60 username = "" 65 … -b %s -u %s://%s%s%s" % (ud.basecmd, ud.manifest, ud.branch, ud.proto, username, ud.host, ud.path… 66 … -b %s -u %s://%s%s%s" % (ud.basecmd, ud.manifest, ud.branch, ud.proto, username, ud.host, ud.path…
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/ |
| H A D | vlock-no_tally.patch | 85 static void auth_loop(const char *username) 87 @@ -182,7 +184,9 @@ static void auth_loop(const char *username) 97 @@ -190,11 +194,13 @@ static void auth_loop(const char *username) 112 if (username == NULL) 113 fatal_perror("vlock: could not get username");
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-extended/python-pykickstart/files/ |
| H A D | 0002-pykickstart-parser.py-add-lock-for-readKickstart-and.patch | 58 def readKickstart(self, f, reset=True, username=None, password=None): 60 + self._readKickstart(f, reset=reset, username=username, password=password) 62 + def _readKickstart(self, f, reset=True, username=None, password=None):
|
| H A D | 0001-support-authentication-for-kickstart.patch | 103 + raise KickstartAuthError("Require Authentication.\nAppend 'ksuser=<username> kspasswd=… 133 + def readKickstart(self, f, reset=True, username=None, password=None): 142 + s = load_to_str(f, user=username, passwd=password)
|
| /OK3568_Linux_fs/yocto/meta-rockchip/recipes-graphics/wayland/weston_11.0.1/ |
| H A D | 0090-backend-vnc-Add-user-authentication.patch | 6 Let VNC clients authenticate using the local username and password of 35 +vnc_handle_auth(const char *username, const char *password, void *userdata) 37 + struct passwd *pw = getpwnam(username); 40 + weston_log("VNC: wrong user '%s'\n", username); 44 + return weston_authenticate_user(username, password);
|
| H A D | 0092-HACK-vnc-Make-pam-optional.patch | 16 @@ -423,7 +423,10 @@ vnc_handle_auth(const char *username, const char *password, void *userdata) 21 return weston_authenticate_user(username, password);
|
| /OK3568_Linux_fs/buildroot/package/weston/ |
| H A D | 0089-backend-vnc-Add-user-authentication.patch | 6 Let VNC clients authenticate using the local username and password of 35 +vnc_handle_auth(const char *username, const char *password, void *userdata) 37 + struct passwd *pw = getpwnam(username); 40 + weston_log("VNC: wrong user '%s'\n", username); 44 + return weston_authenticate_user(username, password);
|
| /OK3568_Linux_fs/external/rkwifibt/drivers/bcmdhd/include/ |
| H A D | eap.h | 99 unsigned char username[1]; member 111 unsigned char username[1]; member
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/rockchip_wlan/rkwifi/bcmdhd/include/ |
| H A D | eap.h | 99 unsigned char username[1]; member 111 unsigned char username[1]; member
|
| /OK3568_Linux_fs/buildroot/dl/stressapptest/git/ |
| H A D | configure.ac | 83 username=$(whoami) 85 AC_MSG_RESULT([$username]) 98 username=reproducible 103 "$username @ $hostname on $timestamp",
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-gnome/recipes-gnome/gnome-online-accounts/files/ |
| H A D | 0001-Update-to-rest-1.0.patch | 63 - const gchar *username, 69 + const gchar *username, 87 username, 96 username,
|
| /OK3568_Linux_fs/kernel/drivers/s390/net/ |
| H A D | netiucv.c | 1344 static int netiucv_check_user(const char *buf, size_t count, char *username, in netiucv_check_user() argument 1361 username[i] = toupper(*p); in netiucv_check_user() 1372 username[i++] = ' '; in netiucv_check_user() 1373 username[8] = '\0'; in netiucv_check_user() 1397 char username[9]; in user_write() local 1403 rc = netiucv_check_user(buf, count, username, userdata); in user_write() 1407 if (memcmp(username, priv->conn->userid, 9) && in user_write() 1415 if (!strncmp(username, cp->userid, 9) && in user_write() 1424 memcpy(priv->conn->userid, username, 9); in user_write() 1761 char *username, in netiucv_new_connection() argument [all …]
|
| /OK3568_Linux_fs/buildroot/package/lighttpd/ |
| H A D | 0001-Fix-default-config-file.patch | 49 ## Run as a different username/groupname. 52 -server.username = "lighttpd" 54 +server.username = "www-data"
|
| /OK3568_Linux_fs/buildroot/docs/manual/ |
| H A D | makeusers-syntax.txt | 14 |username |uid |group |gid |password |home |shell |groups |comment 19 - +username+ is the desired user name (aka login name) for the user. 65 - +username+ (aka login name) is: +foo+ 81 - +username+ (aka login name) is: +test+
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/ |
| H A D | srp.h | 125 SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username); 127 SRP_user_pwd *SRP_VBASE_get1_by_user(SRP_VBASE *vb, char *username);
|
| /OK3568_Linux_fs/kernel/drivers/scsi/qla4xxx/ |
| H A D | ql4_glbl.h | 83 int qla4xxx_get_chap_index(struct scsi_qla_host *ha, char *username, 85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 168 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, 267 int qla4xxx_get_uni_chap_at_index(struct scsi_qla_host *ha, char *username,
|
| /OK3568_Linux_fs/buildroot/fs/oci/ |
| H A D | Config.in | 56 string "username or UID" 59 The username or UID of user the process run as.
|