Searched defs:user (Results 176 - 200 of 268) sorted by relevance

1234567891011

/external/wpa_supplicant_8/src/ap/
H A Dap_config.c148 conf->fragm_threshold = -1; /* user driver default: 2346 */
370 static void hostapd_config_free_eap_user(struct hostapd_eap_user *user) argument
372 os_free(user->identity);
373 os_free(user->password);
374 os_free(user);
391 struct hostapd_eap_user *user, *prev_user; local
410 user = conf->eap_user;
411 while (user) {
412 prev_user = user;
413 user
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server.c27 static void eap_user_free(struct eap_user *user);
81 * eap_user_get - Fetch user information from the database
83 * @identity: Identity (User-Name) of the user
85 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user
88 * This function is used to fetch user information for EAP. The user will be
89 * selected based on the specified identity. sm->user and
90 * sm->user_eap_method_index are updated for the new user when a matching user
96 struct eap_user *user; local
1213 eap_user_free(struct eap_user *user) argument
[all...]
H A Deap_server_mschapv2.c291 const u8 *username, *user; local
346 user = name;
349 if (user[i] == '\\') {
351 user += i + 1;
357 os_memcmp(username, user, username_len) != 0) {
358 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names");
359 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user "
361 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user "
362 "name", user, user_len);
370 if (sm->user
[all...]
/external/wpa_supplicant_8/src/eapol_auth/
H A Deapol_auth_sm.c999 struct eap_user *user)
1003 identity_len, phase2, user);
997 eapol_sm_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dap_config.c148 conf->fragm_threshold = -1; /* user driver default: 2346 */
370 static void hostapd_config_free_eap_user(struct hostapd_eap_user *user) argument
372 os_free(user->identity);
373 os_free(user->password);
374 os_free(user);
391 struct hostapd_eap_user *user, *prev_user; local
410 user = conf->eap_user;
411 while (user) {
412 prev_user = user;
413 user
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server.c27 static void eap_user_free(struct eap_user *user);
81 * eap_user_get - Fetch user information from the database
83 * @identity: Identity (User-Name) of the user
85 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user
88 * This function is used to fetch user information for EAP. The user will be
89 * selected based on the specified identity. sm->user and
90 * sm->user_eap_method_index are updated for the new user when a matching user
96 struct eap_user *user; local
1213 eap_user_free(struct eap_user *user) argument
[all...]
H A Deap_server_mschapv2.c291 const u8 *username, *user; local
346 user = name;
349 if (user[i] == '\\') {
351 user += i + 1;
357 os_memcmp(username, user, username_len) != 0) {
358 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names");
359 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user "
361 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user "
362 "name", user, user_len);
370 if (sm->user
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/
H A Deapol_auth_sm.c999 struct eap_user *user)
1003 identity_len, phase2, user);
997 eapol_sm_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
/external/checkpolicy/test/
H A Ddismod.c416 char *user, *role, *type; local
420 user = p->p_user_val_to_name[cur->context[0].user - 1];
424 cur->u.name, cur->sid[0], user, role, type);
429 user = p->p_user_val_to_name[cur->context[0].user - 1];
433 cur->u.name, cur->sid[0], user, role, type);
/external/chromium/chrome/browser/chromeos/login/
H A Duser_controller.cc43 // Gap between the border around the image/buttons and user name.
46 // Approximate height of controls window, this constant is used in new user
90 // Doesn't send anything if user is selected.
155 const UserManager::User& user)
162 is_owner_(user.email() == UserCrosSettingsProvider::cached_owner()),
164 user_(user),
176 DCHECK(!user.email().empty());
180 // Reset the widget delegate of every window to NULL, so the user
242 void UserController::OnUserImageChanged(UserManager::User* user) { argument
243 if (user_.email() != user
154 UserController(Delegate* delegate, const UserManager::User& user) argument
[all...]
H A Duser_manager.cc49 // Incognito user is represented by an empty string (since some code already
62 DVLOG(1) << "Saving path to user image in Local State.";
92 // Deletes user's image file. Runs on FILE thread.
96 LOG(ERROR) << "Failed to remove user image.";
101 // Updates current user ownership on UI thread.
116 // Checks current user's ownership on file thread.
120 VLOG(1) << "Current user " << (is_owner ? "is owner" : "is not owner");
134 // Creates new remove attempt for the given user. Note, |delegate| can
258 User user; local
259 user
513 User user; local
[all...]
/external/chromium/chrome/browser/chromeos/
H A Duser_cros_settings_provider.cc138 LOG(WARNING) << "Failed to retrieve user whitelist.";
152 DictionaryValue* user = new DictionaryValue; local
153 user->SetString("email", email);
154 user->SetString("name", "");
155 user->SetBoolean("owner", is_owner && email == self.email());
156 user_list->Append(user);
235 VLOG(1) << "Setting user whitelist is not implemented. Please use "
/external/chromium/chrome/browser/prefs/
H A Dpref_service.cc120 JsonPrefStore* user = new JsonPrefStore( local
131 command_line, user, recommended_platform,
604 // Look for an existing preference in the user store. If it doesn't
605 // exist or isn't the correct type, create a new user preference.
/external/chromium/net/disk_cache/
H A Ddisk_format.h169 // EntryStore blocks, RankingsNode blocks or user-data blocks).
189 int32 user[5]; member in struct:disk_cache::BlockFileHeader
/external/chromium/third_party/libjingle/source/talk/examples/call/
H A Dcallclient.cc127 " friend user Request to add a user to your roster.\n"
128 " call [jid] [bw] Initiates a call to the user[/room] with the\n"
130 " vcall [jid] [bw] Initiates a video call to the user[/room] with\n"
132 " voicemail [jid] Leave a voicemail for the user with the given JID.\n"
133 " join [room] Joins a multi-user-chat.\n"
134 " invite user [room] Invites a friend to a multi-user-chat.\n"
135 " leave [room] Leaves a multi-user-chat.\n"
205 "Invalid JID. JIDs should be in the form user
862 InviteToMuc(const std::string& user, const std::string& room) argument
[all...]
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/
H A DConnection.java155 * @param user
159 * user in OpenSSH key format (PEM, you can't miss the
175 public synchronized boolean authenticateWithDSA(String user, String pem, String password) throws IOException argument
189 if (user == null)
190 throw new IllegalArgumentException("user argument is null");
195 authenticated = am.authenticatePublicKey(user, pem.toCharArray(), password, getOrCreateSecureRND());
204 * @param user
212 public synchronized boolean authenticateWithKeyboardInteractive(String user, InteractiveCallback cb) argument
215 return authenticateWithKeyboardInteractive(user, null, cb);
239 * @param user
252 authenticateWithKeyboardInteractive(String user, String[] submethods, InteractiveCallback cb) argument
302 authenticateWithPassword(String user, String password) argument
353 authenticateWithNone(String user) argument
420 authenticateWithPublicKey(String user, char[] pemPrivateKey, String password) argument
470 authenticateWithPublicKey(String user, File pemFile, String password) argument
951 getRemainingAuthMethods(String user) argument
1016 isAuthMethodAvailable(String user, String method) argument
[all...]
/external/ipsec-tools/
H A Dsetup.c473 " udprsa <user-private-key> <user-certificate> \\\n"
478 " xauthrsa <user-private-key> <user-certificate> \\\n"
628 char *user, int status)
633 int privsep_xauth_login_system(char *user, char *password) argument
627 privsep_accounting_system(int port, struct sockaddr *addr, char *user, int status) argument
/external/kernel-headers/original/linux/
H A Dkey.h46 #define KEY_USR_VIEW 0x00010000 /* user permissions... */
125 struct key_user *user; /* owner of this key */ member in struct:key
195 * user's quota will hold the payload
337 extern int alloc_uid_keyring(struct user_struct *user,
/external/libpcap/
H A Dpcap-linux.c446 pcap_read_linux(pcap_t *handle, int max_packets, pcap_handler callback, u_char *user) argument
452 return pcap_read_packet(handle, callback, user);
457 * the user. Returns the number of packets received or -1 if an
562 * If the user only wants incoming packets, reject it.
569 * If the user only wants outgoing packets, reject it.
736 /* Call the user supplied callback function */
948 * Run user level packet filter by default. Will be overriden if
H A Dpcap.c74 pcap_dispatch(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument
77 return p->read_op(p, cnt, callback, user);
84 pcap_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument
87 return p->read_op(p, cnt, callback, user);
91 pcap_loop(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument
100 n = pcap_offline_read(p, cnt, callback, user);
107 n = p->read_op(p, cnt, callback, user);
/external/libselinux/src/
H A Dandroid.c63 "user",
71 char *user; member in struct:seapp_context
93 /* Give precedence to a specified user= over an unspecified user=. */
94 if (s1->user && !s2->user)
96 if (!s1->user && s2->user)
99 if (s1->user) {
100 /* Give precedence to a fixed user
[all...]
/external/openssh/
H A Dauth-pam.c624 const char *pam_rhost, *pam_user, *user = authctxt->user; local
628 /* We already have a PAM context; check if the user matches */
631 if (sshpam_err == PAM_SUCCESS && strcmp(user, pam_user) == 0)
636 debug("PAM: initializing for \"%s\"", user);
638 pam_start(SSHD_PAM_SERVICE, user, &store_conv, &sshpam_handle);
797 sshpam_authctxt->valid ? "" : "illegal user ",
798 sshpam_authctxt->user,
1194 * If the user logging in is invalid, or is root but is not permitted
1212 authctxt->user);
[all...]
H A Dreadconf.h84 char *user; /* User to log in as. */ member in struct:__anon10495
/external/openssl/crypto/rand/
H A Drand_win.c241 HMODULE user = NULL; local
388 (user = LoadLibrary(TEXT("USER32.DLL"))))
394 win = (GETFOREGROUNDWINDOW) GetProcAddress(user, "GetForegroundWindow");
395 cursor = (GETCURSORINFO) GetProcAddress(user, "GetCursorInfo");
396 queue = (GETQUEUESTATUS) GetProcAddress(user, "GetQueueStatus");
432 FreeLibrary(user);
/external/ppp/pppd/
H A Dchap_ms.c276 * to the user). Since the RFC requires it, and it can be
306 * win98 (others untested) display the message to the user anyway.
484 char *user; local
487 if ((user = strrchr(username, '\\')) != NULL)
488 ++user;
490 user = username;
495 SHA1_Update(&sha1Context, (unsigned char *)user, strlen(user));
857 char *user, char *secret, int secret_len, MS_Chap2Response *response,
875 ChapMS2_NT((char *)rchallenge, response->PeerChallenge, user,
856 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, MS_Chap2Response *response, u_char authResponse[], int authenticator) argument
[all...]

Completed in 2577 milliseconds

1234567891011