Searched defs:user (Results 151 - 175 of 268) sorted by relevance

1234567891011

/external/chromium/chrome/browser/
H A Dbrowser_signin.cc183 std::string user; local
185 json_args.GetString("user", &user);
186 if (is_editable && user.empty() && !suggested_email_.empty())
187 json_args.SetString("user", suggested_email_);
207 !result->GetString("user", &username) ||
/external/chromium/chrome/browser/service/
H A Dservice_process_control.cc270 const std::string& user,
273 new ServiceMsg_SetRemotingHostCredentials(user, talk_token));
269 SetRemotingHostCredentials( const std::string& user, const std::string& talk_token) argument
/external/chromium/googleurl/src/
H A Durl_parse.cc69 const Component& user,
72 // Find the first colon in the user section, which separates the username and
75 while (colon_offset < user.len && spec[user.begin + colon_offset] != ':')
78 if (colon_offset < user.len) {
80 *username = Component(user.begin, colon_offset);
81 *password = MakeRange(user.begin + colon_offset + 1,
82 user.begin + user.len);
85 *username = user;
68 ParseUserInfo(const CHAR* spec, const Component& user, Component* username, Component* password) argument
[all...]
/external/iproute2/include/linux/
H A Datmsap.h34 #define ATM_L2_USER 0x10 /* user-specified */
53 #define ATM_L3_USER 0x10 /* user-specified */
64 #define ATM_HL_USER 0x02 /* user-specific */
111 unsigned char user; /* user-specified l2 information */ member in union:atm_blli::__anon7033
122 unsigned char user; /* user specified l3 information */ member in union:atm_blli::__anon7035
/external/kernel-headers/original/linux/
H A Datmsap.h34 #define ATM_L2_USER 0x10 /* user-specified */
53 #define ATM_L3_USER 0x10 /* user-specified */
64 #define ATM_HL_USER 0x02 /* user-specific */
111 unsigned char user; /* user-specified l2 information */ member in union:atm_blli::__anon7658
122 unsigned char user; /* user specified l3 information */ member in union:atm_blli::__anon7660
/external/kernel-headers/original/linux/netfilter/
H A Dx_tables.h17 } user; member in union:xt_entry_match::__anon7835
42 } user; member in union:xt_entry_target::__anon7838
171 /* Called when user tries to insert an entry of this type. */
217 /* Called when user tries to insert an entry of this type:
339 } user; member in union:compat_xt_entry_match::__anon7841
356 } user; member in union:compat_xt_entry_target::__anon7844
/external/libpcap/
H A Dpcap-bpf.c141 pcap_read_bpf(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument
183 * used to copy the buffer into user
186 * a kernel debugger shows the user buffer
301 (*callback)(user, &pkthdr, datap);
558 * non-root user to be granted specific access to pcap
653 * XXX - there should be a user-accessible hook to set the
1074 * Free any user-mode filter we might happen to have installed.
H A Dpcap-dag.c189 dag_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument
220 * If non-block is specified it will return immediately. The user
461 /* Call the user supplied callback function */
462 callback(user, &pcap_header, dp);
468 /* Reached the user-specified limit. */
H A Dpcap-win32.c104 pcap_read_win32_npf(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument
174 (*callback)(user, (struct pcap_pkthdr*)bp, bp + hdrlen);
189 pcap_read_win32_dag(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument
324 /* Fill the header for the user suppplied callback function */
329 (*callback)(user, &pcap_header, dp);
334 /* Stop if the number of packets requested by user has been reached*/
688 * We filter at user level, since the kernel driver does't process the packets
699 /* Install a user level filter */
/external/libsepol/src/
H A Dmls.c310 if (!c->user || c->user > p->p_users.nprim)
312 usrdatum = p->user_val_to_struct[c->user - 1];
314 return 0; /* user may not be associated with range */
509 int mls_setup_user_range(context_struct_t * fromcon, user_datum_t * user, argument
515 mls_level_t *user_low = &(user->exp_range.level[0]);
516 mls_level_t *user_clr = &(user->exp_range.level[1]);
517 mls_level_t *user_def = &(user->exp_dfltlevel);
521 /* Honor the user's default level if we can */
533 that of the user'
[all...]
/external/openssh/openbsd-compat/
H A Dbsd-cray.c98 struct usrv usrv; /* user security structure */
177 record_failed_login(const char *user, const char *hostname, const char *ttyname) argument
179 cray_login_failure((char *)user, IA_UDBERR);
198 struct udb ue; /* udb entry for logging-in user */
230 * Fetch user's UDB entry.
234 fatal("cannot fetch user's UDB entry");
348 case IA_TRUSTED: /* Trusted user */
537 * If an account was given, search the user's
569 * The user doesn't have the askacid permbit set or
613 * Set user an
[all...]
H A Dport-aix.c130 aix_valid_authentications(const char *user) argument
135 if (getuserattr((char *)user, S_AUTHSYSTEM, &sys, SEC_CHAR) != 0) {
137 user, strerror(errno));
145 if (getuserattr((char *)user, S_AUTH1, &auth1, SEC_LIST) != 0) {
147 user, strerror(errno));
157 user, p);
200 * Check if the user's password is expired.
215 default: /* user can't change(2) or other error (-1) */
216 logit("Password can't be changed for user %s: %.100s",
245 * logins via ssh) or if running as non-root user (sinc
277 sys_auth_record_login(const char *user, const char *host, const char *ttynm, Buffer *loginmsg) argument
297 sys_auth_get_lastlogin_msg(const char *user, uid_t uid) argument
310 record_failed_login(const char *user, const char *hostname, const char *ttyname) argument
333 aix_setauthdb(const char *user) argument
434 getgrouplist(const char *user, gid_t pgid, gid_t *groups, int *grpcnt) argument
[all...]
/external/openssl/apps/
H A Dsrp.c85 "usage: srp [args] [user] \n",
91 " -add add an user and srp verifier\n",
92 " -modify modify the srp verifier of an existing user\n",
93 " -delete delete user from verifier file\n",
94 " -list list user\n",
96 " -userinfo arg additional info to be set for user\n",
211 static char *srp_verify_user(const char *user, const char *srp_verifier, argument
220 cb_tmp.prompt_info = user;
225 VERBOSE BIO_printf(bio,"Validating\n user=\"%s\"\n srp_verifier=\"%s\"\n srp_usersalt=\"%s\"\n g=\"%s\"\n N=\"%s\"\n",user,srp_verifie
242 srp_create_user(char *user, char **srp_verifier, char **srp_usersalt, char *g, char *N, char *passout, BIO *bio, int verbose) argument
274 char * user = NULL; local
[all...]
/external/openssl/crypto/srp/
H A Dsrp_vfy.c416 /* it is a user .... */
441 /* this means that we want to simulate a default user */
478 SRP_user_pwd *user; local
487 user = sk_SRP_user_pwd_value(vb->users_pwd, i);
488 if (strcmp(user->id,username)==0)
489 return user;
496 /* if the user is unknown we set parameters as well if we have a seed_key */
498 if ((user = SRP_user_pwd_new()) == NULL)
501 SRP_user_pwd_set_gN(user,vb->default_g,vb->default_N);
503 if (!SRP_user_pwd_set_ids(user,usernam
524 SRP_create_verifier(const char *user, const char *pass, char **salt, char **verifier, const char *N, const char *g) argument
608 SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g) argument
[all...]
/external/oprofile/module/ia64/
H A Dop_pmu.c152 pmc_fill_in(ulong * val, u8 kernel, u8 user, u8 event, u8 um) argument
169 (user) ? (*val |= (1 << 3))
196 sysctl.ctr[ii].user, sysctl.ctr[ii].event,
280 * the kernel because of a user request. Given we are on a UP non preeemptive
454 if (!sysctl.ctr[i].user && !sysctl.ctr[i].kernel) {
455 printk(KERN_ERR "oprofile: neither kernel nor user "
603 tab[5] = ((ctl_table) { 1, "user", &sysctl_parms.ctr[i].user, sizeof(int), 0600, NULL, lproc_dointvec, NULL, });
/external/qemu/android/
H A Dlooper-generic.c234 glooper_io_init(Looper* looper, LoopIo* user, int fd, LoopIoFunc callback, void* opaque) argument
251 user->impl = io;
252 user->clazz = (LoopIoClass*) &gloopio_class;
/external/skia/legacy/src/animator/
H A DSkAnimatorScript.cpp28 { SkType_EventKind, "none|keyChar|keyPress|keyPressUp|mouseDown|mouseDrag|mouseMove|mouseUp|onEnd|onLoad|user" },
91 bool SkAnimatorScript::Box(void* user, SkScriptValue* scriptValue) { argument
92 SkAnimatorScript* engine = (SkAnimatorScript*) user;
159 bool SkAnimatorScript::EvalID(const char* token, size_t len, void* user, SkScriptValue* value) { argument
160 SkAnimatorScript* engine = (SkAnimatorScript*) user;
364 bool SkAnimatorScript::Infinity(const char* token, size_t len, void* user, SkScriptValue* value) { argument
419 bool SkAnimatorScript::NaN(const char* token, size_t len, void* user, SkScriptValue* value) { argument
428 bool SkAnimatorScript::ObjectToString(void* object, void* user, SkScriptValue* value) {
429 SkTDict<SkDisplayable*>* ids = (SkTDict<SkDisplayable*>*) user;
/external/skia/src/animator/
H A DSkAnimatorScript.cpp28 { SkType_EventKind, "none|keyChar|keyPress|keyPressUp|mouseDown|mouseDrag|mouseMove|mouseUp|onEnd|onLoad|user" },
91 bool SkAnimatorScript::Box(void* user, SkScriptValue* scriptValue) { argument
92 SkAnimatorScript* engine = (SkAnimatorScript*) user;
159 bool SkAnimatorScript::EvalID(const char* token, size_t len, void* user, SkScriptValue* value) { argument
160 SkAnimatorScript* engine = (SkAnimatorScript*) user;
364 bool SkAnimatorScript::Infinity(const char* token, size_t len, void* user, SkScriptValue* value) { argument
419 bool SkAnimatorScript::NaN(const char* token, size_t len, void* user, SkScriptValue* value) { argument
428 bool SkAnimatorScript::ObjectToString(void* object, void* user, SkScriptValue* value) {
429 SkTDict<SkDisplayable*>* ids = (SkTDict<SkDisplayable*>*) user;
/external/smack/src/org/jivesoftware/smack/
H A DRoster.java37 * Represents a user's roster, which is the collection of users a person receives
40 * Others users may attempt to subscribe to this user using a subscription request. Three
265 * @param user the user. (e.g. johndoe@jabber.org)
266 * @param name the nickname of the user.
272 public void createEntry(String user, String name, String[] groups) throws XMPPException { argument
283 RosterPacket.Item item = new RosterPacket.Item(user, name);
308 presencePacket.setTo(user);
338 // Removing the user from the roster, so remove any presence information
379 // Find the list of groups that the user currentl
531 getEntry(String user) argument
546 contains(String user) argument
607 getPresence(String user) argument
699 getPresences(String user) argument
745 getPresenceMapKey(String user) argument
[all...]
H A DXMPPConnection.java74 private String user = null; field in class:XMPPConnection
81 * Flag that indicates if the user is currently authenticated with the server.
85 * Flag that indicates if the user was authenticated with the server when the connection
201 return user;
232 // Set the user.
234 this.user = response;
239 this.user = username + "@" + getServiceName();
241 this.user += "/" + resource;
280 debugger.userHasLogged(user);
303 // Set the user valu
[all...]
/external/webkit/Source/JavaScriptCore/wtf/url/src/
H A DURLParser.h75 // Search backwards for @, which is the separator between the user info
83 // Found user info: <user-info>@<server-info>
87 // No user info, everything is server info.
507 static void parseUserInfo(const CHAR* spec, const URLComponent& user, URLComponent& username, URLComponent& password) argument
509 // Find the first colon in the user section, which separates the
512 while (colonOffset < user.length() && spec[user.begin() + colonOffset] != ':')
515 if (colonOffset < user.length()) {
517 username = URLComponent(user
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dap_config.c148 conf->fragm_threshold = -1; /* user driver default: 2346 */
370 static void hostapd_config_free_eap_user(struct hostapd_eap_user *user) argument
372 os_free(user->identity);
373 os_free(user->password);
374 os_free(user);
391 struct hostapd_eap_user *user, *prev_user; local
410 user = conf->eap_user;
411 while (user) {
412 prev_user = user;
413 user
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server.c27 static void eap_user_free(struct eap_user *user);
81 * eap_user_get - Fetch user information from the database
83 * @identity: Identity (User-Name) of the user
85 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user
88 * This function is used to fetch user information for EAP. The user will be
89 * selected based on the specified identity. sm->user and
90 * sm->user_eap_method_index are updated for the new user when a matching user
96 struct eap_user *user; local
1213 eap_user_free(struct eap_user *user) argument
[all...]
H A Deap_server_mschapv2.c291 const u8 *username, *user; local
346 user = name;
349 if (user[i] == '\\') {
351 user += i + 1;
357 os_memcmp(username, user, username_len) != 0) {
358 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names");
359 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user "
361 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user "
362 "name", user, user_len);
370 if (sm->user
[all...]
/external/wpa_supplicant_8/hostapd/src/eapol_auth/
H A Deapol_auth_sm.c999 struct eap_user *user)
1003 identity_len, phase2, user);
997 eapol_sm_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument

Completed in 5926 milliseconds

1234567891011