Searched defs:user (Results 226 - 250 of 268) sorted by relevance

1234567891011

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_1x.c1696 struct eap_user *user)
1706 os_memset(user, 0, sizeof(*user));
1707 user->phase2 = phase2;
1709 user->methods[i].vendor = eap_user->methods[i].vendor;
1710 user->methods[i].method = eap_user->methods[i].method;
1714 user->password = os_malloc(eap_user->password_len);
1715 if (user->password == NULL)
1717 os_memcpy(user->password, eap_user->password,
1719 user
1694 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_i.h150 struct eap_user *user; member in struct:eap_sm
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_server.c167 * This A-ID-Info contains a user-friendly name for the A-ID. For
252 * get_eap_user - Callback for fetching EAP user information
257 * @user: Data structure for filling in the user information
260 * This is used to fetch information from user database. The callback
261 * will fill in information about allowed EAP methods and the user
266 int phase2, struct eap_user *user);
461 u8 *user; local
469 user = os_malloc(256);
470 if (user
1473 radius_server_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dieee802_1x.c1696 struct eap_user *user)
1706 os_memset(user, 0, sizeof(*user));
1707 user->phase2 = phase2;
1709 user->methods[i].vendor = eap_user->methods[i].vendor;
1710 user->methods[i].method = eap_user->methods[i].method;
1714 user->password = os_malloc(eap_user->password_len);
1715 if (user->password == NULL)
1717 os_memcpy(user->password, eap_user->password,
1719 user
1694 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_i.h150 struct eap_user *user; member in struct:eap_sm
/external/wpa_supplicant_8/src/radius/
H A Dradius_server.c167 * This A-ID-Info contains a user-friendly name for the A-ID. For
252 * get_eap_user - Callback for fetching EAP user information
257 * @user: Data structure for filling in the user information
260 * This is used to fetch information from user database. The callback
261 * will fill in information about allowed EAP methods and the user
266 int phase2, struct eap_user *user);
461 u8 *user; local
469 user = os_malloc(256);
470 if (user
1473 radius_server_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_1x.c1696 struct eap_user *user)
1706 os_memset(user, 0, sizeof(*user));
1707 user->phase2 = phase2;
1709 user->methods[i].vendor = eap_user->methods[i].vendor;
1710 user->methods[i].method = eap_user->methods[i].method;
1714 user->password = os_malloc(eap_user->password_len);
1715 if (user->password == NULL)
1717 os_memcpy(user->password, eap_user->password,
1719 user
1694 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_i.h150 struct eap_user *user; member in struct:eap_sm
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_server.c167 * This A-ID-Info contains a user-friendly name for the A-ID. For
252 * get_eap_user - Callback for fetching EAP user information
257 * @user: Data structure for filling in the user information
260 * This is used to fetch information from user database. The callback
261 * will fill in information about allowed EAP methods and the user
266 int phase2, struct eap_user *user);
461 u8 *user; local
469 user = os_malloc(256);
470 if (user
1473 radius_server_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
/external/checkpolicy/
H A Dpolicy_define.c376 yyerror2("conflicting default user information for class %s", id);
2942 user_datum_t *user; local
3020 yyerror2("user %s is not within scope",
3025 user =
3031 if (!user) {
3032 yyerror2("unknown user %s", id);
3036 val = user->s.value;
3304 yyerror("* is not allowed in user declarations");
3310 yyerror("~ is not allowed in user declarations");
3494 yyerror("no default level specified for user");
[all...]
/external/chromium/chrome/browser/chromeos/login/
H A Dscreen_locker.cc130 // |active_input_method_list| so that the user can always use the hardware
625 // A event observer used to unlock the screen upon user's action
662 // user action: mouse or keyboard interactions.
699 ScreenLocker::ScreenLocker(const UserManager::User& user) argument
706 user_(user),
1034 // Power manager decided no to unlock the screen even if a user
1035 // typed in password, for example, when a user closed the lid
1040 // This can happen when a user requested unlock, but PowerManager
/external/kernel-headers/original/linux/
H A Dmm.h560 * On an anonymous page mapped into a user virtual memory area,
566 * refers to user virtual address space into which the page is mapped.
653 int shmem_lock(struct file *file, int lock, struct user_struct *user);
658 struct user_struct *user)
657 shmem_lock(struct file *file, int lock, struct user_struct *user) argument
/external/libpcap/
H A Dsavefile.c1317 pcap_offline_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument
1352 (*callback)(user, &h, p->buffer);
1365 pcap_dump(u_char *user, const struct pcap_pkthdr *h, const u_char *sp) argument
1370 f = (FILE *)user;
/external/libsepol/src/
H A Dexpand.c369 ERR(state->handle, "Found conflicting default user definitions");
574 user_datum_t *user = (user_datum_t *) datum; local
578 if (!user->bounds)
584 bounds_val = state->usermap[user->bounds - 1];
935 user_datum_t *user; local
941 user = (user_datum_t *) datum;
950 INFO(state->handle, "copying user %s", id);
964 state->usermap[user->s.value - 1] = new_user->s.value;
984 if (mls_semantic_range_expand(&user->range,
989 if (mls_semantic_level_expand(&user
[all...]
H A Dlink.c82 "common", "class", "role", "type/attribute", "user",
214 ERR(state->handle, "Found conflicting default user definitions");
529 user_datum_t *user, *base_user, *new_user = NULL; local
532 user = (user_datum_t *) datum;
537 INFO(state->handle, "copying user %s", id);
580 state->cur->map[SYM_USERS][user->s.value - 1] = base_user->s.value;
806 user_datum_t *user = (user_datum_t *) datum; local
810 if (!user->bounds)
813 bounds_val = state->cur->map[SYM_USERS][user->bounds - 1];
1201 user_datum_t *user, *new_use local
[all...]
H A Dpolicydb.c744 user_datum_t *user; local
746 user = (user_datum_t *) datum;
749 ebitmap_destroy(&user->cache);
750 if (role_set_expand(&user->roles, &user->cache, p, NULL, NULL)) {
754 /* we do not expand user's MLS info in kernel policies because the
755 * semantic representation is not present and we do not expand user's
759 mls_range_destroy(&user->exp_range);
760 if (mls_semantic_range_expand(&user->range,
761 &user
[all...]
/external/openssh/
H A Dmonitor_wrap.c361 debug3("%s: user %sauthenticated",
373 mm_hostbased_key_allowed(struct passwd *pw, char *user, char *host, argument
376 return (mm_key_allowed(MM_HOSTKEY, user, host, key));
380 mm_auth_rhosts_rsa_key_allowed(struct passwd *pw, char *user, argument
386 ret = mm_key_allowed(MM_RSAHOSTKEY, user, host, key);
392 mm_key_allowed(enum mm_keytype type, char *user, char *host, Key *key) argument
407 buffer_put_cstring(&m, user ? user : "");
824 buffer_put_cstring(&m, authctxt->user);
1275 mm_ssh_gssapi_userok(char *user) argument
[all...]
H A Dservconf.c577 match_cfg_line_group(const char *grps, int line, const char *user) argument
582 if (user == NULL)
585 if ((pw = getpwnam(user)) == NULL) {
586 debug("Can't match group at line %d because user %.100s does "
587 "not exist", line, user);
589 debug("Can't Match group because user %.100s not in any group "
590 "at line %d", user, line);
592 debug("user %.100s does not match group list %.100s at line %d",
593 user, grps, line);
595 debug("user
605 match_cfg_line(char **condition, int line, const char *user, const char *host, const char *address) argument
716 process_server_config_line(ServerOptions *options, char *line, const char *filename, int linenum, int *activep, const char *user, const char *host, const char *address) argument
1458 parse_server_match_config(ServerOptions *options, const char *user, const char *host, const char *address) argument
1549 parse_server_config(ServerOptions *options, const char *filename, Buffer *conf, const char *user, const char *host, const char *address) argument
[all...]
/external/openssl/apps/
H A Ds_server.c385 SRP_user_pwd *user; member in struct:srpsrvparm_st
393 set the user parameters.
398 if (p->login == NULL && p->user == NULL )
405 if (p->user == NULL)
410 if (SSL_set_srp_server_param(s, p->user->N, p->user->g, p->user->s, p->user->v,
411 p->user->info) < 0)
416 BIO_printf(bio_err, "SRP parameters set: username = \"%s\" info=\"%s\" \n", p->login,p->user
[all...]
/external/valgrind/main/coregrind/
H A Dvgdb.c102 #include <sys/user.h>
110 // Outputs information for the user about ptrace_scope protection
689 static struct user user_save;
860 struct user user_mod;
1471 const HChar *user, *host; local
1474 user = getenv("LOGNAME");
1475 if (user == NULL) user = getenv("USER");
1476 if (user == NULL) user
[all...]
/external/webkit/Source/WebCore/platform/
H A DKURL.cpp613 String KURL::user() const function in class:WebCore::KURL
776 void KURL::setUser(const String& user) argument
782 // and to avoid changing more than just the user login.
785 if (!user.isEmpty()) {
786 u = user;
793 // Remove '@' if we now have neither user nor password.
806 // and to avoid changing more than just the user password.
817 // Remove '@' if we now have neither user nor password.
883 append(authority, user());
1236 // hit the end of the authority, must have been no user
[all...]
/external/clang/lib/CodeGen/
H A DCodeGenModule.cpp1877 llvm::User *user = *use; local
1881 if (llvm::ConstantExpr *bitcast = dyn_cast<llvm::ConstantExpr>(user)) {
1888 llvm::CallSite callSite(user);
/external/iproute2/include/linux/
H A Dxfrm.h58 __kernel_uid32_t user; member in struct:xfrm_selector
131 XFRM_SHARE_USER, /* For this user only */
210 * Generic LSM security context for comunicating to user space
385 #define XFRM_POLICY_LOCALOK 1 /* Allow user to override global policy */
/external/libxml2/
H A Dvalid.c2855 * @user: Value supplied by the user
2860 xmlWalkRemoveRef(const void *data, const void *user) argument
2863 xmlAttrPtr attr1 = ((xmlRemoveMemoPtr)user)->ap;
2864 xmlListPtr ref_list = ((xmlRemoveMemoPtr)user)->l;
2875 * @data0: Value supplied by the user
2876 * @data1: Value supplied by the user
6511 * @user: Value supplied by the user
6516 xmlWalkValidateList(const void *data, const void *user) argument
[all...]
/external/llvm/bindings/ocaml/llvm/
H A Dllvm.mli602 (** [user u] returns the user of the use [u].
604 val user : lluse -> llvalue var

Completed in 731 milliseconds

1234567891011