/external/wpa_supplicant_8/src/ap/ |
H A D | ap_config.c | 148 conf->fragm_threshold = -1; /* user driver default: 2346 */ 370 static void hostapd_config_free_eap_user(struct hostapd_eap_user *user) argument 372 os_free(user->identity); 373 os_free(user->password); 374 os_free(user); 391 struct hostapd_eap_user *user, *prev_user; local 410 user = conf->eap_user; 411 while (user) { 412 prev_user = user; 413 user [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server.c | 27 static void eap_user_free(struct eap_user *user); 81 * eap_user_get - Fetch user information from the database 83 * @identity: Identity (User-Name) of the user 85 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user 88 * This function is used to fetch user information for EAP. The user will be 89 * selected based on the specified identity. sm->user and 90 * sm->user_eap_method_index are updated for the new user when a matching user 96 struct eap_user *user; local 1213 eap_user_free(struct eap_user *user) argument [all...] |
H A D | eap_server_mschapv2.c | 291 const u8 *username, *user; local 346 user = name; 349 if (user[i] == '\\') { 351 user += i + 1; 357 os_memcmp(username, user, username_len) != 0) { 358 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names"); 359 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user " 361 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user " 362 "name", user, user_len); 370 if (sm->user [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 999 struct eap_user *user) 1003 identity_len, phase2, user); 997 eapol_sm_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_config.c | 148 conf->fragm_threshold = -1; /* user driver default: 2346 */ 370 static void hostapd_config_free_eap_user(struct hostapd_eap_user *user) argument 372 os_free(user->identity); 373 os_free(user->password); 374 os_free(user); 391 struct hostapd_eap_user *user, *prev_user; local 410 user = conf->eap_user; 411 while (user) { 412 prev_user = user; 413 user [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server.c | 27 static void eap_user_free(struct eap_user *user); 81 * eap_user_get - Fetch user information from the database 83 * @identity: Identity (User-Name) of the user 85 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user 88 * This function is used to fetch user information for EAP. The user will be 89 * selected based on the specified identity. sm->user and 90 * sm->user_eap_method_index are updated for the new user when a matching user 96 struct eap_user *user; local 1213 eap_user_free(struct eap_user *user) argument [all...] |
H A D | eap_server_mschapv2.c | 291 const u8 *username, *user; local 346 user = name; 349 if (user[i] == '\\') { 351 user += i + 1; 357 os_memcmp(username, user, username_len) != 0) { 358 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names"); 359 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user " 361 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user " 362 "name", user, user_len); 370 if (sm->user [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 999 struct eap_user *user) 1003 identity_len, phase2, user); 997 eapol_sm_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
|
/external/checkpolicy/test/ |
H A D | dismod.c | 416 char *user, *role, *type; local 420 user = p->p_user_val_to_name[cur->context[0].user - 1]; 424 cur->u.name, cur->sid[0], user, role, type); 429 user = p->p_user_val_to_name[cur->context[0].user - 1]; 433 cur->u.name, cur->sid[0], user, role, type);
|
/external/chromium/chrome/browser/chromeos/login/ |
H A D | user_controller.cc | 43 // Gap between the border around the image/buttons and user name. 46 // Approximate height of controls window, this constant is used in new user 90 // Doesn't send anything if user is selected. 155 const UserManager::User& user) 162 is_owner_(user.email() == UserCrosSettingsProvider::cached_owner()), 164 user_(user), 176 DCHECK(!user.email().empty()); 180 // Reset the widget delegate of every window to NULL, so the user 242 void UserController::OnUserImageChanged(UserManager::User* user) { argument 243 if (user_.email() != user 154 UserController(Delegate* delegate, const UserManager::User& user) argument [all...] |
H A D | user_manager.cc | 49 // Incognito user is represented by an empty string (since some code already 62 DVLOG(1) << "Saving path to user image in Local State."; 92 // Deletes user's image file. Runs on FILE thread. 96 LOG(ERROR) << "Failed to remove user image."; 101 // Updates current user ownership on UI thread. 116 // Checks current user's ownership on file thread. 120 VLOG(1) << "Current user " << (is_owner ? "is owner" : "is not owner"); 134 // Creates new remove attempt for the given user. Note, |delegate| can 258 User user; local 259 user 513 User user; local [all...] |
/external/chromium/chrome/browser/chromeos/ |
H A D | user_cros_settings_provider.cc | 138 LOG(WARNING) << "Failed to retrieve user whitelist."; 152 DictionaryValue* user = new DictionaryValue; local 153 user->SetString("email", email); 154 user->SetString("name", ""); 155 user->SetBoolean("owner", is_owner && email == self.email()); 156 user_list->Append(user); 235 VLOG(1) << "Setting user whitelist is not implemented. Please use "
|
/external/chromium/chrome/browser/prefs/ |
H A D | pref_service.cc | 120 JsonPrefStore* user = new JsonPrefStore( local 131 command_line, user, recommended_platform, 604 // Look for an existing preference in the user store. If it doesn't 605 // exist or isn't the correct type, create a new user preference.
|
/external/chromium/net/disk_cache/ |
H A D | disk_format.h | 169 // EntryStore blocks, RankingsNode blocks or user-data blocks). 189 int32 user[5]; member in struct:disk_cache::BlockFileHeader
|
/external/chromium/third_party/libjingle/source/talk/examples/call/ |
H A D | callclient.cc | 127 " friend user Request to add a user to your roster.\n" 128 " call [jid] [bw] Initiates a call to the user[/room] with the\n" 130 " vcall [jid] [bw] Initiates a video call to the user[/room] with\n" 132 " voicemail [jid] Leave a voicemail for the user with the given JID.\n" 133 " join [room] Joins a multi-user-chat.\n" 134 " invite user [room] Invites a friend to a multi-user-chat.\n" 135 " leave [room] Leaves a multi-user-chat.\n" 205 "Invalid JID. JIDs should be in the form user 862 InviteToMuc(const std::string& user, const std::string& room) argument [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
H A D | Connection.java | 155 * @param user 159 * user in OpenSSH key format (PEM, you can't miss the 175 public synchronized boolean authenticateWithDSA(String user, String pem, String password) throws IOException argument 189 if (user == null) 190 throw new IllegalArgumentException("user argument is null"); 195 authenticated = am.authenticatePublicKey(user, pem.toCharArray(), password, getOrCreateSecureRND()); 204 * @param user 212 public synchronized boolean authenticateWithKeyboardInteractive(String user, InteractiveCallback cb) argument 215 return authenticateWithKeyboardInteractive(user, null, cb); 239 * @param user 252 authenticateWithKeyboardInteractive(String user, String[] submethods, InteractiveCallback cb) argument 302 authenticateWithPassword(String user, String password) argument 353 authenticateWithNone(String user) argument 420 authenticateWithPublicKey(String user, char[] pemPrivateKey, String password) argument 470 authenticateWithPublicKey(String user, File pemFile, String password) argument 951 getRemainingAuthMethods(String user) argument 1016 isAuthMethodAvailable(String user, String method) argument [all...] |
/external/ipsec-tools/ |
H A D | setup.c | 473 " udprsa <user-private-key> <user-certificate> \\\n" 478 " xauthrsa <user-private-key> <user-certificate> \\\n" 628 char *user, int status) 633 int privsep_xauth_login_system(char *user, char *password) argument 627 privsep_accounting_system(int port, struct sockaddr *addr, char *user, int status) argument
|
/external/kernel-headers/original/linux/ |
H A D | key.h | 46 #define KEY_USR_VIEW 0x00010000 /* user permissions... */ 125 struct key_user *user; /* owner of this key */ member in struct:key 195 * user's quota will hold the payload 337 extern int alloc_uid_keyring(struct user_struct *user,
|
/external/libpcap/ |
H A D | pcap-linux.c | 446 pcap_read_linux(pcap_t *handle, int max_packets, pcap_handler callback, u_char *user) argument 452 return pcap_read_packet(handle, callback, user); 457 * the user. Returns the number of packets received or -1 if an 562 * If the user only wants incoming packets, reject it. 569 * If the user only wants outgoing packets, reject it. 736 /* Call the user supplied callback function */ 948 * Run user level packet filter by default. Will be overriden if
|
H A D | pcap.c | 74 pcap_dispatch(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument 77 return p->read_op(p, cnt, callback, user); 84 pcap_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument 87 return p->read_op(p, cnt, callback, user); 91 pcap_loop(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument 100 n = pcap_offline_read(p, cnt, callback, user); 107 n = p->read_op(p, cnt, callback, user);
|
/external/libselinux/src/ |
H A D | android.c | 63 "user", 71 char *user; member in struct:seapp_context 93 /* Give precedence to a specified user= over an unspecified user=. */ 94 if (s1->user && !s2->user) 96 if (!s1->user && s2->user) 99 if (s1->user) { 100 /* Give precedence to a fixed user [all...] |
/external/openssh/ |
H A D | auth-pam.c | 624 const char *pam_rhost, *pam_user, *user = authctxt->user; local 628 /* We already have a PAM context; check if the user matches */ 631 if (sshpam_err == PAM_SUCCESS && strcmp(user, pam_user) == 0) 636 debug("PAM: initializing for \"%s\"", user); 638 pam_start(SSHD_PAM_SERVICE, user, &store_conv, &sshpam_handle); 797 sshpam_authctxt->valid ? "" : "illegal user ", 798 sshpam_authctxt->user, 1194 * If the user logging in is invalid, or is root but is not permitted 1212 authctxt->user); [all...] |
H A D | readconf.h | 84 char *user; /* User to log in as. */ member in struct:__anon10495
|
/external/openssl/crypto/rand/ |
H A D | rand_win.c | 241 HMODULE user = NULL; local 388 (user = LoadLibrary(TEXT("USER32.DLL")))) 394 win = (GETFOREGROUNDWINDOW) GetProcAddress(user, "GetForegroundWindow"); 395 cursor = (GETCURSORINFO) GetProcAddress(user, "GetCursorInfo"); 396 queue = (GETQUEUESTATUS) GetProcAddress(user, "GetQueueStatus"); 432 FreeLibrary(user);
|
/external/ppp/pppd/ |
H A D | chap_ms.c | 276 * to the user). Since the RFC requires it, and it can be 306 * win98 (others untested) display the message to the user anyway. 484 char *user; local 487 if ((user = strrchr(username, '\\')) != NULL) 488 ++user; 490 user = username; 495 SHA1_Update(&sha1Context, (unsigned char *)user, strlen(user)); 857 char *user, char *secret, int secret_len, MS_Chap2Response *response, 875 ChapMS2_NT((char *)rchallenge, response->PeerChallenge, user, 856 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, MS_Chap2Response *response, u_char authResponse[], int authenticator) argument [all...] |