/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
H A D | ext_password.h | 22 void ext_password_free(struct wpabuf *pw);
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_common.c | 753 struct wpabuf *priv = NULL, *pub = NULL, *pw, *ret; local 757 pw = wpabuf_alloc(WPS_OOB_DEVICE_PASSWORD_LEN); 758 if (pw == NULL) 761 if (random_get_bytes(wpabuf_put(pw, WPS_OOB_DEVICE_PASSWORD_LEN), 764 wpabuf_free(pw); 770 wpabuf_free(pw); 781 *dev_pw = pw;
|
/external/wpa_supplicant_8/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
H A D | ext_password.h | 22 void ext_password_free(struct wpabuf *pw);
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_common.c | 753 struct wpabuf *priv = NULL, *pub = NULL, *pw, *ret; local 757 pw = wpabuf_alloc(WPS_OOB_DEVICE_PASSWORD_LEN); 758 if (pw == NULL) 761 if (random_get_bytes(wpabuf_put(pw, WPS_OOB_DEVICE_PASSWORD_LEN), 764 wpabuf_free(pw); 770 wpabuf_free(pw); 781 *dev_pw = pw;
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | ext_password.c | 104 void ext_password_free(struct wpabuf *pw) argument 106 if (pw == NULL) 108 os_memset(wpabuf_mhead(pw), 0, wpabuf_len(pw)); 110 if (munlock(wpabuf_head(pw), wpabuf_len(pw)) < 0) { 115 wpabuf_free(pw);
|
H A D | ext_password.h | 22 void ext_password_free(struct wpabuf *pw);
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_common.c | 753 struct wpabuf *priv = NULL, *pub = NULL, *pw, *ret; local 757 pw = wpabuf_alloc(WPS_OOB_DEVICE_PASSWORD_LEN); 758 if (pw == NULL) 761 if (random_get_bytes(wpabuf_put(pw, WPS_OOB_DEVICE_PASSWORD_LEN), 764 wpabuf_free(pw); 770 wpabuf_free(pw); 781 *dev_pw = pw;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_supplicant.c | 1154 struct wpabuf *pw = ext_password_get(wpa_s->ext_pw, local 1159 if (pw == NULL) { 1165 if (wpabuf_len(pw) < 8 || wpabuf_len(pw) > 64) { 1168 (int) wpabuf_len(pw)); 1169 ext_password_free(pw); 1173 os_memcpy(pw_str, wpabuf_head(pw), wpabuf_len(pw)); 1174 pw_str[wpabuf_len(pw)] = '\0'; 1177 if (wpabuf_len(pw) > [all...] |
H A D | wps_supplicant.c | 1819 char pw[32 * 2 + 1]; local 1843 wpa_snprintf_hex_uppercase(pw, sizeof(pw), 1846 return wpas_wps_start_pin(wpa_s, bssid, pw, 0,
|
/external/webkit/Source/WebCore/platform/efl/ |
H A D | RenderThemeEfl.cpp | 554 Evas_Coord px, py, pw, ph; local 575 edje_object_part_geometry_get(object, "text_confinement", &px, &py, &pw, &ph); 581 r = (ow + ox) - (pw + px);
|
/external/tagsoup/src/org/ccil/cowan/tagsoup/ |
H A D | HTMLScanner.java | 636 PYXWriter pw = new PYXWriter(w); 637 s.scan(r, pw);
|
/external/tcpdump/ |
H A D | tcpdump.c | 376 struct passwd *pw = NULL; local 383 pw = getpwnam(username); 384 if (pw) { 392 if (initgroups(pw->pw_name, pw->pw_gid) != 0 || 393 setgid(pw->pw_gid) != 0 || setuid(pw->pw_uid) != 0) { 396 (unsigned long)pw->pw_uid, 397 (unsigned long)pw->pw_gid,
|
/external/speex/libspeex/ |
H A D | lsp.c | 532 float *pw,*n1,*n2,*n3,*n4=NULL; local 537 pw = Wp; 542 *pw++ = 0.0; 547 pw = Wp; 562 n1 = pw+(i*4);
|
/external/qemu/distrib/sdl-1.2.15/acinclude/ |
H A D | libtool.m4 | 2260 # pw32 DLLs use 'pw' prefix rather than 'lib' 2261 library_names_spec='`echo ${libname} | sed -e 's/^lib/pw/'``echo ${release} | $SED -e 's/[[.]]/-/g'`${versuffix}${shared_ext}'
|
/external/quake/quake/src/QW/server/ |
H A D | sv_main.c | 1203 static char *pw, *spw; local 1206 if (password.string == pw && spectator_password.string == spw) 1208 pw = password.string; 1212 if (pw && pw[0] && strcmp(pw, "none"))
|
/external/ppp/pppd/ |
H A D | auth.c | 1588 struct passwd *pw = getpwnam(user); 1591 if (pw == NULL) 1608 pw->pw_passwd = spwd->sp_pwdp; 1615 if (pw->pw_passwd == NULL || strlen(pw->pw_passwd) < 2 1616 || strcmp(crypt(passwd, pw->pw_passwd), pw->pw_passwd) != 0) 1631 if (pw != (struct passwd *)NULL) { 1636 (void)lseek(fd, (off_t)(pw->pw_uid * sizeof(ll)), SEEK_SET); 2533 struct passwd *pw; local [all...] |
H A D | eap.c | 1198 struct passwd *pw; local 1202 pw = getpwuid(getuid()); 1203 if (pw == NULL || (user = pw->pw_dir) == NULL || user[0] == 0) {
|
H A D | main.c | 318 struct passwd *pw; local 504 pw = getpwuid(uid); 505 if (pw != NULL && pw->pw_name != NULL) 506 p = pw->pw_name;
|
H A D | options.c | 464 struct passwd *pw; local 467 pw = getpwuid(getuid()); 468 if (pw == NULL || (user = pw->pw_dir) == NULL || user[0] == 0)
|
/external/openssh/ |
H A D | audit-bsm.c | 198 uid = the_authctxt->pw->pw_uid; 199 gid = the_authctxt->pw->pw_gid; 235 info.ai_auid = the_authctxt->pw->pw_uid;
|
H A D | auth-krb5.c | 84 platform_client = platform_krb5_get_principal_name(authctxt->pw->pw_name); 85 client = platform_client ? platform_client : authctxt->pw->pw_name; 87 temporarily_use_uid(authctxt->pw); 113 temporarily_use_uid(authctxt->pw); 145 temporarily_use_uid(authctxt->pw);
|
H A D | auth-options.c | 95 auth_parse_options(struct passwd *pw, char *opts, char *file, u_long linenum) argument 294 pw->pw_name, remote_host, remote_ip); 423 parse_option_list(u_char *optblob, size_t optblob_len, struct passwd *pw, argument 532 "(ip=%.200s).", pw->pw_name, 593 auth_cert_options(Key *k, struct passwd *pw) argument 606 buffer_len(&k->cert->critical), pw, 619 buffer_len(&k->cert->critical), pw, 625 buffer_len(&k->cert->extensions), pw,
|
H A D | auth-pam.c | 265 if (setreuid(sshpam_authctxt->pw->pw_uid, -1) == -1) 784 (sshpam_authctxt->pw->pw_uid == 0 && 835 (sshpam_authctxt->pw->pw_uid != 0 || 1198 if (!authctxt->valid || (authctxt->pw->pw_uid == 0 &&
|