/external/chromium/chrome/browser/ |
H A D | browser_signin.cc | 183 std::string user; local 185 json_args.GetString("user", &user); 186 if (is_editable && user.empty() && !suggested_email_.empty()) 187 json_args.SetString("user", suggested_email_); 207 !result->GetString("user", &username) ||
|
/external/chromium/chrome/browser/service/ |
H A D | service_process_control.cc | 270 const std::string& user, 273 new ServiceMsg_SetRemotingHostCredentials(user, talk_token)); 269 SetRemotingHostCredentials( const std::string& user, const std::string& talk_token) argument
|
/external/chromium/googleurl/src/ |
H A D | url_parse.cc | 69 const Component& user, 72 // Find the first colon in the user section, which separates the username and 75 while (colon_offset < user.len && spec[user.begin + colon_offset] != ':') 78 if (colon_offset < user.len) { 80 *username = Component(user.begin, colon_offset); 81 *password = MakeRange(user.begin + colon_offset + 1, 82 user.begin + user.len); 85 *username = user; 68 ParseUserInfo(const CHAR* spec, const Component& user, Component* username, Component* password) argument [all...] |
/external/iproute2/include/linux/ |
H A D | atmsap.h | 34 #define ATM_L2_USER 0x10 /* user-specified */ 53 #define ATM_L3_USER 0x10 /* user-specified */ 64 #define ATM_HL_USER 0x02 /* user-specific */ 111 unsigned char user; /* user-specified l2 information */ member in union:atm_blli::__anon7033 122 unsigned char user; /* user specified l3 information */ member in union:atm_blli::__anon7035
|
/external/kernel-headers/original/linux/ |
H A D | atmsap.h | 34 #define ATM_L2_USER 0x10 /* user-specified */ 53 #define ATM_L3_USER 0x10 /* user-specified */ 64 #define ATM_HL_USER 0x02 /* user-specific */ 111 unsigned char user; /* user-specified l2 information */ member in union:atm_blli::__anon7658 122 unsigned char user; /* user specified l3 information */ member in union:atm_blli::__anon7660
|
/external/kernel-headers/original/linux/netfilter/ |
H A D | x_tables.h | 17 } user; member in union:xt_entry_match::__anon7835 42 } user; member in union:xt_entry_target::__anon7838 171 /* Called when user tries to insert an entry of this type. */ 217 /* Called when user tries to insert an entry of this type: 339 } user; member in union:compat_xt_entry_match::__anon7841 356 } user; member in union:compat_xt_entry_target::__anon7844
|
/external/libpcap/ |
H A D | pcap-bpf.c | 141 pcap_read_bpf(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument 183 * used to copy the buffer into user 186 * a kernel debugger shows the user buffer 301 (*callback)(user, &pkthdr, datap); 558 * non-root user to be granted specific access to pcap 653 * XXX - there should be a user-accessible hook to set the 1074 * Free any user-mode filter we might happen to have installed.
|
H A D | pcap-dag.c | 189 dag_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument 220 * If non-block is specified it will return immediately. The user 461 /* Call the user supplied callback function */ 462 callback(user, &pcap_header, dp); 468 /* Reached the user-specified limit. */
|
H A D | pcap-win32.c | 104 pcap_read_win32_npf(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument 174 (*callback)(user, (struct pcap_pkthdr*)bp, bp + hdrlen); 189 pcap_read_win32_dag(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument 324 /* Fill the header for the user suppplied callback function */ 329 (*callback)(user, &pcap_header, dp); 334 /* Stop if the number of packets requested by user has been reached*/ 688 * We filter at user level, since the kernel driver does't process the packets 699 /* Install a user level filter */
|
/external/libsepol/src/ |
H A D | mls.c | 310 if (!c->user || c->user > p->p_users.nprim) 312 usrdatum = p->user_val_to_struct[c->user - 1]; 314 return 0; /* user may not be associated with range */ 509 int mls_setup_user_range(context_struct_t * fromcon, user_datum_t * user, argument 515 mls_level_t *user_low = &(user->exp_range.level[0]); 516 mls_level_t *user_clr = &(user->exp_range.level[1]); 517 mls_level_t *user_def = &(user->exp_dfltlevel); 521 /* Honor the user's default level if we can */ 533 that of the user' [all...] |
/external/openssh/openbsd-compat/ |
H A D | bsd-cray.c | 98 struct usrv usrv; /* user security structure */ 177 record_failed_login(const char *user, const char *hostname, const char *ttyname) argument 179 cray_login_failure((char *)user, IA_UDBERR); 198 struct udb ue; /* udb entry for logging-in user */ 230 * Fetch user's UDB entry. 234 fatal("cannot fetch user's UDB entry"); 348 case IA_TRUSTED: /* Trusted user */ 537 * If an account was given, search the user's 569 * The user doesn't have the askacid permbit set or 613 * Set user an [all...] |
H A D | port-aix.c | 130 aix_valid_authentications(const char *user) argument 135 if (getuserattr((char *)user, S_AUTHSYSTEM, &sys, SEC_CHAR) != 0) { 137 user, strerror(errno)); 145 if (getuserattr((char *)user, S_AUTH1, &auth1, SEC_LIST) != 0) { 147 user, strerror(errno)); 157 user, p); 200 * Check if the user's password is expired. 215 default: /* user can't change(2) or other error (-1) */ 216 logit("Password can't be changed for user %s: %.100s", 245 * logins via ssh) or if running as non-root user (sinc 277 sys_auth_record_login(const char *user, const char *host, const char *ttynm, Buffer *loginmsg) argument 297 sys_auth_get_lastlogin_msg(const char *user, uid_t uid) argument 310 record_failed_login(const char *user, const char *hostname, const char *ttyname) argument 333 aix_setauthdb(const char *user) argument 434 getgrouplist(const char *user, gid_t pgid, gid_t *groups, int *grpcnt) argument [all...] |
/external/openssl/apps/ |
H A D | srp.c | 85 "usage: srp [args] [user] \n", 91 " -add add an user and srp verifier\n", 92 " -modify modify the srp verifier of an existing user\n", 93 " -delete delete user from verifier file\n", 94 " -list list user\n", 96 " -userinfo arg additional info to be set for user\n", 211 static char *srp_verify_user(const char *user, const char *srp_verifier, argument 220 cb_tmp.prompt_info = user; 225 VERBOSE BIO_printf(bio,"Validating\n user=\"%s\"\n srp_verifier=\"%s\"\n srp_usersalt=\"%s\"\n g=\"%s\"\n N=\"%s\"\n",user,srp_verifie 242 srp_create_user(char *user, char **srp_verifier, char **srp_usersalt, char *g, char *N, char *passout, BIO *bio, int verbose) argument 274 char * user = NULL; local [all...] |
/external/openssl/crypto/srp/ |
H A D | srp_vfy.c | 416 /* it is a user .... */ 441 /* this means that we want to simulate a default user */ 478 SRP_user_pwd *user; local 487 user = sk_SRP_user_pwd_value(vb->users_pwd, i); 488 if (strcmp(user->id,username)==0) 489 return user; 496 /* if the user is unknown we set parameters as well if we have a seed_key */ 498 if ((user = SRP_user_pwd_new()) == NULL) 501 SRP_user_pwd_set_gN(user,vb->default_g,vb->default_N); 503 if (!SRP_user_pwd_set_ids(user,usernam 524 SRP_create_verifier(const char *user, const char *pass, char **salt, char **verifier, const char *N, const char *g) argument 608 SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, BIGNUM **verifier, BIGNUM *N, BIGNUM *g) argument [all...] |
/external/oprofile/module/ia64/ |
H A D | op_pmu.c | 152 pmc_fill_in(ulong * val, u8 kernel, u8 user, u8 event, u8 um) argument 169 (user) ? (*val |= (1 << 3)) 196 sysctl.ctr[ii].user, sysctl.ctr[ii].event, 280 * the kernel because of a user request. Given we are on a UP non preeemptive 454 if (!sysctl.ctr[i].user && !sysctl.ctr[i].kernel) { 455 printk(KERN_ERR "oprofile: neither kernel nor user " 603 tab[5] = ((ctl_table) { 1, "user", &sysctl_parms.ctr[i].user, sizeof(int), 0600, NULL, lproc_dointvec, NULL, });
|
/external/qemu/android/ |
H A D | looper-generic.c | 234 glooper_io_init(Looper* looper, LoopIo* user, int fd, LoopIoFunc callback, void* opaque) argument 251 user->impl = io; 252 user->clazz = (LoopIoClass*) &gloopio_class;
|
/external/skia/legacy/src/animator/ |
H A D | SkAnimatorScript.cpp | 28 { SkType_EventKind, "none|keyChar|keyPress|keyPressUp|mouseDown|mouseDrag|mouseMove|mouseUp|onEnd|onLoad|user" }, 91 bool SkAnimatorScript::Box(void* user, SkScriptValue* scriptValue) { argument 92 SkAnimatorScript* engine = (SkAnimatorScript*) user; 159 bool SkAnimatorScript::EvalID(const char* token, size_t len, void* user, SkScriptValue* value) { argument 160 SkAnimatorScript* engine = (SkAnimatorScript*) user; 364 bool SkAnimatorScript::Infinity(const char* token, size_t len, void* user, SkScriptValue* value) { argument 419 bool SkAnimatorScript::NaN(const char* token, size_t len, void* user, SkScriptValue* value) { argument 428 bool SkAnimatorScript::ObjectToString(void* object, void* user, SkScriptValue* value) { 429 SkTDict<SkDisplayable*>* ids = (SkTDict<SkDisplayable*>*) user;
|
/external/skia/src/animator/ |
H A D | SkAnimatorScript.cpp | 28 { SkType_EventKind, "none|keyChar|keyPress|keyPressUp|mouseDown|mouseDrag|mouseMove|mouseUp|onEnd|onLoad|user" }, 91 bool SkAnimatorScript::Box(void* user, SkScriptValue* scriptValue) { argument 92 SkAnimatorScript* engine = (SkAnimatorScript*) user; 159 bool SkAnimatorScript::EvalID(const char* token, size_t len, void* user, SkScriptValue* value) { argument 160 SkAnimatorScript* engine = (SkAnimatorScript*) user; 364 bool SkAnimatorScript::Infinity(const char* token, size_t len, void* user, SkScriptValue* value) { argument 419 bool SkAnimatorScript::NaN(const char* token, size_t len, void* user, SkScriptValue* value) { argument 428 bool SkAnimatorScript::ObjectToString(void* object, void* user, SkScriptValue* value) { 429 SkTDict<SkDisplayable*>* ids = (SkTDict<SkDisplayable*>*) user;
|
/external/smack/src/org/jivesoftware/smack/ |
H A D | Roster.java | 37 * Represents a user's roster, which is the collection of users a person receives 40 * Others users may attempt to subscribe to this user using a subscription request. Three 265 * @param user the user. (e.g. johndoe@jabber.org) 266 * @param name the nickname of the user. 272 public void createEntry(String user, String name, String[] groups) throws XMPPException { argument 283 RosterPacket.Item item = new RosterPacket.Item(user, name); 308 presencePacket.setTo(user); 338 // Removing the user from the roster, so remove any presence information 379 // Find the list of groups that the user currentl 531 getEntry(String user) argument 546 contains(String user) argument 607 getPresence(String user) argument 699 getPresences(String user) argument 745 getPresenceMapKey(String user) argument [all...] |
H A D | XMPPConnection.java | 74 private String user = null; field in class:XMPPConnection 81 * Flag that indicates if the user is currently authenticated with the server. 85 * Flag that indicates if the user was authenticated with the server when the connection 201 return user; 232 // Set the user. 234 this.user = response; 239 this.user = username + "@" + getServiceName(); 241 this.user += "/" + resource; 280 debugger.userHasLogged(user); 303 // Set the user valu [all...] |
/external/webkit/Source/JavaScriptCore/wtf/url/src/ |
H A D | URLParser.h | 75 // Search backwards for @, which is the separator between the user info 83 // Found user info: <user-info>@<server-info> 87 // No user info, everything is server info. 507 static void parseUserInfo(const CHAR* spec, const URLComponent& user, URLComponent& username, URLComponent& password) argument 509 // Find the first colon in the user section, which separates the 512 while (colonOffset < user.length() && spec[user.begin() + colonOffset] != ':') 515 if (colonOffset < user.length()) { 517 username = URLComponent(user [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_config.c | 148 conf->fragm_threshold = -1; /* user driver default: 2346 */ 370 static void hostapd_config_free_eap_user(struct hostapd_eap_user *user) argument 372 os_free(user->identity); 373 os_free(user->password); 374 os_free(user); 391 struct hostapd_eap_user *user, *prev_user; local 410 user = conf->eap_user; 411 while (user) { 412 prev_user = user; 413 user [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server.c | 27 static void eap_user_free(struct eap_user *user); 81 * eap_user_get - Fetch user information from the database 83 * @identity: Identity (User-Name) of the user 85 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user 88 * This function is used to fetch user information for EAP. The user will be 89 * selected based on the specified identity. sm->user and 90 * sm->user_eap_method_index are updated for the new user when a matching user 96 struct eap_user *user; local 1213 eap_user_free(struct eap_user *user) argument [all...] |
H A D | eap_server_mschapv2.c | 291 const u8 *username, *user; local 346 user = name; 349 if (user[i] == '\\') { 351 user += i + 1; 357 os_memcmp(username, user, username_len) != 0) { 358 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names"); 359 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user " 361 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user " 362 "name", user, user_len); 370 if (sm->user [all...] |
/external/wpa_supplicant_8/hostapd/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 999 struct eap_user *user) 1003 identity_len, phase2, user); 997 eapol_sm_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|