/external/ppp/pppd/plugins/radius/ |
H A D | radius.c | 70 static int radius_pap_auth(char *user, 75 static int radius_chap_verify(char *user, char *ourname, int id, 83 static void make_username_realm(char *user); 115 char user[MAXNAMELEN]; member in struct:radius_state 124 VALUE_PAIR *avp; /* Additional (user supplied) vp's to send to server */ 131 void (*radius_pre_auth_hook)(char const *user, 231 * user -- user-name of peer 242 radius_pap_auth(char *user, argument 260 /* Put user wit 332 radius_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 511 make_username_realm(char *user) argument [all...] |
/external/ppp/pppd/plugins/ |
H A D | winbind.c | 93 static int winbind_pap_auth(char *user, 98 static int winbind_chap_verify(char *user, char *ourname, int id, 311 /* run winbind as the user that invoked pppd */ 414 notice("Winbind has declined authentication for user!"); 423 notice("NT session key for user was not 16 bytes!"); 455 notice("Did not get user session key, despite being authenticated!"); 480 * user -- user-name of peer 491 winbind_pap_auth(char *user, argument 497 if (run_ntlm_auth(NULL, NULL, user, passwor 517 winbind_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument [all...] |
/external/qemu/distrib/sdl-1.2.15/include/ |
H A D | SDL_events.h | 210 /** A user-defined event type */ 240 SDL_UserEvent user; member in union:SDL_Event
|
/external/quake/quake/src/QW/client/ |
H A D | zone.c | 565 cache_user_t *user; member in struct:cache_system_s 591 new->user = c->user; 593 Cache_Free (c->user); 594 new->user->data = (void *)(new+1); 600 Cache_Free (c->user); // tough luck... 646 Cache_Free (c->user); // didn't move out of the way 767 Cache_Free ( cache_head.next->user ); // reclaim the space 896 cs->user = c; 904 Cache_Free ( cache_head.lru_prev->user ); [all...] |
/external/quake/quake/src/WinQuake/ |
H A D | snd_android.cpp | 503 void AndroidQuakeSoundCallback(int event, void* user, void *info) { argument 571 void AndroidQuakeSoundCallback(int event, void* user, void *info) { argument 636 0, // user
|
H A D | zone.cpp | 560 cache_user_t *user; member in struct:cache_system_s 586 newc->user = c->user; 588 Cache_Free (c->user); 589 newc->user->data = (void *)(newc+1); 595 Cache_Free (c->user); // tough luck... 641 Cache_Free (c->user); // didn't move out of the way 762 Cache_Free ( cache_head.next->user ); // reclaim the space 891 cs->user = c; 899 Cache_Free ( cache_head.lru_prev->user ); [all...] |
/external/smack/src/org/jivesoftware/smackx/packet/ |
H A D | VCard.java | 505 * Save this vCard for the user connected by 'connection'. Connection should be authenticated 534 * Load VCard information for a connected user. Connection should be authenticated 545 * Load VCard information for a given user. Connection should be authenticated and not anonymous. 547 public void load(Connection connection, String user) throws XMPPException { argument 550 setTo(user); 551 doLoad(connection, user); 554 private void doLoad(Connection connection, String user) throws XMPPException { argument 574 System.out.println("No VCard for " + user);
|
/external/tcpdump/ |
H A D | print-rx.c | 144 { 500, "new-user" }, 216 { 6, "create-user" }, 217 { 7, "delete-user" }, 1015 char *user; local 1018 if ((user = (char *)malloc(maxsize)) == NULL) 1051 if (sscanf((char *) s, fmt, user, &acl, &n) != 2) 1055 fn_print((u_char *)user, NULL); 1065 if (sscanf((char *) s, fmt, user, &acl, &n) != 2) 1069 fn_print((u_char *)user, NULL); 1078 free(user); [all...] |
H A D | tcpdump.c | 371 int initgroups(const char *user, gid_t group) {return 0;} argument 403 fprintf(stderr, "tcpdump: Couldn't find user '%.32s'\n", 844 * trace file, as that might let the user read other 894 * Let user own process after socket has been opened. 1156 dump_packet_and_trunc(u_char *user, const struct pcap_pkthdr *h, const u_char *sp) argument 1165 dump_info = (struct dump_info *)user; 1207 dump_packet(u_char *user, const struct pcap_pkthdr *h, const u_char *sp) argument 1213 pcap_dump(user, h, sp); 1216 pcap_dump_flush((pcap_dumper_t *)user); 1225 print_packet(u_char *user, cons argument [all...] |
/external/checkpolicy/ |
H A D | module_compiler.c | 371 char *user_id, user_datum_t *user) 389 yyerror2("user %s doesn't exist, is implicit bounds of %s", 394 if (!user->bounds) 395 user->bounds = bounds->s.value; 396 else if (user->bounds != bounds->s.value) { 397 yyerror2("user %s has inconsistent bounds %s/%s", 399 policydbp->p_role_val_to_name[user->bounds - 1]); 410 user_datum_t *user = NULL, *dest_user = NULL; local 415 yyerror("no user name"); 418 if ((user 370 user_implicit_bounds(hashtab_t users_tab, char *user_id, user_datum_t *user) argument 1000 user_datum_t *user = NULL; local [all...] |
/external/freetype/include/freetype/ |
H A D | ftimage.h | 549 /* user :: A typeless pointer which is passed from the caller of the */ 557 void* user ); 576 /* user :: A typeless pointer which is passed from the caller of the */ 584 void* user ); 607 /* user :: A typeless pointer which is passed from the caller of */ 616 void* user ); 639 /* user :: A typeless pointer which is passed from the caller of */ 649 void* user ); 917 /* user :: User-supplied data that is passed to the callback. */ 940 void* user ); 1113 void* user; member in struct:FT_Raster_Params_ [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | racoonctl.c | 129 { f_logoutusr, ADMIN_LOGOUT_USER, "logout-user" }, 836 char *user; local 842 user = av[0]; 843 userlen = strlen(user); 844 if ((user == NULL) || (userlen > LOGINLEN)) 857 strncpy((char *)(head + 1), user, userlen);
|
/external/libpcap/ |
H A D | pcap-dlpi.c | 244 pcap_read_dlpi(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument 361 (*callback)(user, &pkthdr, pk);
|
/external/libsepol/src/ |
H A D | services.c | 160 val1 = scontext->user; 161 val2 = tcontext->user; 271 val1 = c->user; 626 /* Set the user identity. */ 630 /* Use the process user identity. */ 631 newcontext.user = scontext->user; 635 newcontext.user = tcontext->user; 882 /* Convert the user 1295 user_datum_t *user; local [all...] |
/external/libxml2/include/libxml/ |
H A D | xpath.h | 119 void *user; member in struct:_xmlXPathObject 310 void *user; /* function to free */ member in struct:_xmlXPathContext 342 void *userData; /* user specific data block */
|
/external/libxml2/ |
H A D | nanoftp.c | 127 char *user; /* user string */ member in struct:xmlNanoFTPCtxt 149 static char *proxyUser = NULL; /* user for proxy authentication */ 257 * @user: the proxy user name 267 xmlNanoFTPProxy(const char *host, int port, const char *user, argument 283 if (user) 284 proxyUser = xmlMemStrdup(user); 340 if (uri->user != NULL) { 342 if ((cptr=strchr(uri->user, ' [all...] |
/external/openssh/ |
H A D | misc.c | 521 char user[128], ret[MAXPATHLEN]; local 530 if (path != NULL && path > filename) { /* ~user/path */ 532 if (slash > sizeof(user) - 1) 534 memcpy(user, filename, slash); 535 user[slash] = '\0'; 536 if ((pw = getpwnam(user)) == NULL) 537 fatal("tilde_expand_filename: No such user %s", user);
|
/external/ppp/pppd/ |
H A D | eap.c | 196 * eap_init - Initialize state for an EAP user. This is currently 515 /* Look up user in secrets database. */ 1197 char *user, *path, *file; local 1203 if (pw == NULL || (user = pw->pw_dir) == NULL || user[0] == 0) { 1208 pl = strlen(user) + strlen(file) + 2; 1212 (void) slprintf(path, pl, "%s/%s", user, file); 1651 /* Save pseudonym if user wants it. */
|
H A D | options.c | 96 char user[MAXNAMELEN]; /* Username for PAP */ variable 462 char *user, *path, *file; local 468 if (pw == NULL || (user = pw->pw_dir) == NULL || user[0] == 0) 471 pl = strlen(user) + strlen(file) + 2; 475 slprintf(path, pl, "%s/%s", user, file); 486 * the command line if it is something that the user can't override 1077 * readable - check if a file is readable by the real user.
|
/external/smack/src/org/jivesoftware/smackx/muc/ |
H A D | MultiUserChat.java | 148 * Creates a new multi user chat with the specified connection and room name. Note: no 159 * "service" is the hostname at which the multi-user chat 169 * Returns true if the specified user supports the Multi-User Chat protocol. 172 * @param user the user to check. A fully qualified xmpp ID, e.g. jdoe@example.com. 173 * @return a boolean indicating whether the specified user supports the MUC protocol. 175 public static boolean isServiceEnabled(Connection connection, String user) { argument 178 ServiceDiscoveryManager.getInstanceFor(connection).discoverInfo(user); 188 * Returns an Iterator on the rooms where the user has joined using a given connection. 193 * @return an Iterator on the rooms where the user ha 212 getJoinedRooms(Connection connection, String user) argument 737 invite(String user, String reason) argument 752 invite(Message message, String user, String reason) argument 1596 getOccupantPresence(String user) argument 1609 getOccupant(String user) argument [all...] |
/external/valgrind/main/coregrind/m_gdbserver/ |
H A D | remote-utils.c | 217 -from-vgdb-to-pid-by-user-on-host and -to-vgdb-from-pid-by-user-on-host 224 const HChar *user, *host; local 238 user = VG_(getenv)("LOGNAME"); 239 if (user == NULL) user = VG_(getenv)("USER"); 240 if (user == NULL) user = "???"; 246 len = strlen(name) + strlen(user) + strlen(host) + 40; 259 pid, user, hos [all...] |
/external/webkit/Source/WebCore/platform/ |
H A D | KURLGoogle.cpp | 521 String KURL::user() const function in class:WebCore::KURL 681 void KURL::setUser(const String& user) argument 685 if (user.isEmpty() && !m_url.m_parsed.username.is_valid()) 691 replacements.SetUsername(CharactersOrEmpty(user), 692 url_parse::Component(0, user.length()));
|
/external/webkit/Source/WebCore/platform/network/cf/ |
H A D | ResourceHandleCFNet.cpp | 127 static String encodeBasicAuthorization(const String& user, const String& password) argument 129 return base64Encode((user + ":" + password).utf8()); 425 String authHeader = "Basic " + encodeBasicAuthorization(d->m_initialCredential.user(), d->m_initialCredential.password()); 482 d->m_user = url.user(); 516 RetainPtr<CFStringRef> user(AdoptCF, d->m_user.createCFString()); 519 CFURLCredentialCreate(kCFAllocatorDefault, user.get(), pass.get(), 0, kCFURLCredentialPersistenceNone)); 529 // FIXME: Per the specification, the user shouldn't be asked for credentials if there were incorrect ones provided explicitly. 579 Credential webCredential(credential.user(), credential.password(), CredentialPersistenceNone); 780 // FIXME: The user should be asked for credentials, as in async case.
|
/external/webkit/Source/WebCore/xml/ |
H A D | XMLHttpRequest.cpp | 101 m_forbiddenRequestHeaders.add("user-agent"); 446 void XMLHttpRequest::open(const String& method, const KURL& url, bool async, const String& user, ExceptionCode& ec) argument 449 urlWithCredentials.setUser(user); 454 void XMLHttpRequest::open(const String& method, const KURL& url, bool async, const String& user, const String& password, ExceptionCode& ec) argument 457 urlWithCredentials.setUser(user);
|
/external/wpa_supplicant_8/hostapd/ |
H A D | config_file.c | 198 struct hostapd_eap_user *user, *tail = NULL; local 211 wpa_printf(MSG_ERROR, "EAP user file '%s' not found.", fname); 215 /* Lines: "user" METHOD,METHOD2 "password" (password optional) */ 232 user = NULL; 240 user = os_zalloc(sizeof(*user)); 241 if (user == NULL) { 242 wpa_printf(MSG_ERROR, "EAP user allocation failed"); 245 user->force_version = -1; 261 user [all...] |