/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_1x.c | 1696 struct eap_user *user) 1706 os_memset(user, 0, sizeof(*user)); 1707 user->phase2 = phase2; 1709 user->methods[i].vendor = eap_user->methods[i].vendor; 1710 user->methods[i].method = eap_user->methods[i].method; 1714 user->password = os_malloc(eap_user->password_len); 1715 if (user->password == NULL) 1717 os_memcpy(user->password, eap_user->password, 1719 user 1694 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_i.h | 150 struct eap_user *user; member in struct:eap_sm
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_server.c | 167 * This A-ID-Info contains a user-friendly name for the A-ID. For 252 * get_eap_user - Callback for fetching EAP user information 257 * @user: Data structure for filling in the user information 260 * This is used to fetch information from user database. The callback 261 * will fill in information about allowed EAP methods and the user 266 int phase2, struct eap_user *user); 461 u8 *user; local 469 user = os_malloc(256); 470 if (user 1473 radius_server_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_1x.c | 1696 struct eap_user *user) 1706 os_memset(user, 0, sizeof(*user)); 1707 user->phase2 = phase2; 1709 user->methods[i].vendor = eap_user->methods[i].vendor; 1710 user->methods[i].method = eap_user->methods[i].method; 1714 user->password = os_malloc(eap_user->password_len); 1715 if (user->password == NULL) 1717 os_memcpy(user->password, eap_user->password, 1719 user 1694 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_i.h | 150 struct eap_user *user; member in struct:eap_sm
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_server.c | 167 * This A-ID-Info contains a user-friendly name for the A-ID. For 252 * get_eap_user - Callback for fetching EAP user information 257 * @user: Data structure for filling in the user information 260 * This is used to fetch information from user database. The callback 261 * will fill in information about allowed EAP methods and the user 266 int phase2, struct eap_user *user); 461 u8 *user; local 469 user = os_malloc(256); 470 if (user 1473 radius_server_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_1x.c | 1696 struct eap_user *user) 1706 os_memset(user, 0, sizeof(*user)); 1707 user->phase2 = phase2; 1709 user->methods[i].vendor = eap_user->methods[i].vendor; 1710 user->methods[i].method = eap_user->methods[i].method; 1714 user->password = os_malloc(eap_user->password_len); 1715 if (user->password == NULL) 1717 os_memcpy(user->password, eap_user->password, 1719 user 1694 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_i.h | 150 struct eap_user *user; member in struct:eap_sm
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_server.c | 167 * This A-ID-Info contains a user-friendly name for the A-ID. For 252 * get_eap_user - Callback for fetching EAP user information 257 * @user: Data structure for filling in the user information 260 * This is used to fetch information from user database. The callback 261 * will fill in information about allowed EAP methods and the user 266 int phase2, struct eap_user *user); 461 u8 *user; local 469 user = os_malloc(256); 470 if (user 1473 radius_server_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
/external/checkpolicy/ |
H A D | policy_define.c | 376 yyerror2("conflicting default user information for class %s", id); 2942 user_datum_t *user; local 3020 yyerror2("user %s is not within scope", 3025 user = 3031 if (!user) { 3032 yyerror2("unknown user %s", id); 3036 val = user->s.value; 3304 yyerror("* is not allowed in user declarations"); 3310 yyerror("~ is not allowed in user declarations"); 3494 yyerror("no default level specified for user"); [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
H A D | screen_locker.cc | 130 // |active_input_method_list| so that the user can always use the hardware 625 // A event observer used to unlock the screen upon user's action 662 // user action: mouse or keyboard interactions. 699 ScreenLocker::ScreenLocker(const UserManager::User& user) argument 706 user_(user), 1034 // Power manager decided no to unlock the screen even if a user 1035 // typed in password, for example, when a user closed the lid 1040 // This can happen when a user requested unlock, but PowerManager
|
/external/kernel-headers/original/linux/ |
H A D | mm.h | 560 * On an anonymous page mapped into a user virtual memory area, 566 * refers to user virtual address space into which the page is mapped. 653 int shmem_lock(struct file *file, int lock, struct user_struct *user); 658 struct user_struct *user) 657 shmem_lock(struct file *file, int lock, struct user_struct *user) argument
|
/external/libpcap/ |
H A D | savefile.c | 1317 pcap_offline_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument 1352 (*callback)(user, &h, p->buffer); 1365 pcap_dump(u_char *user, const struct pcap_pkthdr *h, const u_char *sp) argument 1370 f = (FILE *)user;
|
/external/libsepol/src/ |
H A D | expand.c | 369 ERR(state->handle, "Found conflicting default user definitions"); 574 user_datum_t *user = (user_datum_t *) datum; local 578 if (!user->bounds) 584 bounds_val = state->usermap[user->bounds - 1]; 935 user_datum_t *user; local 941 user = (user_datum_t *) datum; 950 INFO(state->handle, "copying user %s", id); 964 state->usermap[user->s.value - 1] = new_user->s.value; 984 if (mls_semantic_range_expand(&user->range, 989 if (mls_semantic_level_expand(&user [all...] |
H A D | link.c | 82 "common", "class", "role", "type/attribute", "user", 214 ERR(state->handle, "Found conflicting default user definitions"); 529 user_datum_t *user, *base_user, *new_user = NULL; local 532 user = (user_datum_t *) datum; 537 INFO(state->handle, "copying user %s", id); 580 state->cur->map[SYM_USERS][user->s.value - 1] = base_user->s.value; 806 user_datum_t *user = (user_datum_t *) datum; local 810 if (!user->bounds) 813 bounds_val = state->cur->map[SYM_USERS][user->bounds - 1]; 1201 user_datum_t *user, *new_use local [all...] |
H A D | policydb.c | 744 user_datum_t *user; local 746 user = (user_datum_t *) datum; 749 ebitmap_destroy(&user->cache); 750 if (role_set_expand(&user->roles, &user->cache, p, NULL, NULL)) { 754 /* we do not expand user's MLS info in kernel policies because the 755 * semantic representation is not present and we do not expand user's 759 mls_range_destroy(&user->exp_range); 760 if (mls_semantic_range_expand(&user->range, 761 &user [all...] |
/external/openssh/ |
H A D | monitor_wrap.c | 361 debug3("%s: user %sauthenticated", 373 mm_hostbased_key_allowed(struct passwd *pw, char *user, char *host, argument 376 return (mm_key_allowed(MM_HOSTKEY, user, host, key)); 380 mm_auth_rhosts_rsa_key_allowed(struct passwd *pw, char *user, argument 386 ret = mm_key_allowed(MM_RSAHOSTKEY, user, host, key); 392 mm_key_allowed(enum mm_keytype type, char *user, char *host, Key *key) argument 407 buffer_put_cstring(&m, user ? user : ""); 824 buffer_put_cstring(&m, authctxt->user); 1275 mm_ssh_gssapi_userok(char *user) argument [all...] |
H A D | servconf.c | 577 match_cfg_line_group(const char *grps, int line, const char *user) argument 582 if (user == NULL) 585 if ((pw = getpwnam(user)) == NULL) { 586 debug("Can't match group at line %d because user %.100s does " 587 "not exist", line, user); 589 debug("Can't Match group because user %.100s not in any group " 590 "at line %d", user, line); 592 debug("user %.100s does not match group list %.100s at line %d", 593 user, grps, line); 595 debug("user 605 match_cfg_line(char **condition, int line, const char *user, const char *host, const char *address) argument 716 process_server_config_line(ServerOptions *options, char *line, const char *filename, int linenum, int *activep, const char *user, const char *host, const char *address) argument 1458 parse_server_match_config(ServerOptions *options, const char *user, const char *host, const char *address) argument 1549 parse_server_config(ServerOptions *options, const char *filename, Buffer *conf, const char *user, const char *host, const char *address) argument [all...] |
/external/openssl/apps/ |
H A D | s_server.c | 385 SRP_user_pwd *user; member in struct:srpsrvparm_st 393 set the user parameters. 398 if (p->login == NULL && p->user == NULL ) 405 if (p->user == NULL) 410 if (SSL_set_srp_server_param(s, p->user->N, p->user->g, p->user->s, p->user->v, 411 p->user->info) < 0) 416 BIO_printf(bio_err, "SRP parameters set: username = \"%s\" info=\"%s\" \n", p->login,p->user [all...] |
/external/valgrind/main/coregrind/ |
H A D | vgdb.c | 102 #include <sys/user.h> 110 // Outputs information for the user about ptrace_scope protection 689 static struct user user_save; 860 struct user user_mod; 1471 const HChar *user, *host; local 1474 user = getenv("LOGNAME"); 1475 if (user == NULL) user = getenv("USER"); 1476 if (user == NULL) user [all...] |
/external/webkit/Source/WebCore/platform/ |
H A D | KURL.cpp | 613 String KURL::user() const function in class:WebCore::KURL 776 void KURL::setUser(const String& user) argument 782 // and to avoid changing more than just the user login. 785 if (!user.isEmpty()) { 786 u = user; 793 // Remove '@' if we now have neither user nor password. 806 // and to avoid changing more than just the user password. 817 // Remove '@' if we now have neither user nor password. 883 append(authority, user()); 1236 // hit the end of the authority, must have been no user [all...] |
/external/clang/lib/CodeGen/ |
H A D | CodeGenModule.cpp | 1877 llvm::User *user = *use; local 1881 if (llvm::ConstantExpr *bitcast = dyn_cast<llvm::ConstantExpr>(user)) { 1888 llvm::CallSite callSite(user);
|
/external/iproute2/include/linux/ |
H A D | xfrm.h | 58 __kernel_uid32_t user; member in struct:xfrm_selector 131 XFRM_SHARE_USER, /* For this user only */ 210 * Generic LSM security context for comunicating to user space 385 #define XFRM_POLICY_LOCALOK 1 /* Allow user to override global policy */
|
/external/libxml2/ |
H A D | valid.c | 2855 * @user: Value supplied by the user 2860 xmlWalkRemoveRef(const void *data, const void *user) argument 2863 xmlAttrPtr attr1 = ((xmlRemoveMemoPtr)user)->ap; 2864 xmlListPtr ref_list = ((xmlRemoveMemoPtr)user)->l; 2875 * @data0: Value supplied by the user 2876 * @data1: Value supplied by the user 6511 * @user: Value supplied by the user 6516 xmlWalkValidateList(const void *data, const void *user) argument [all...] |
/external/llvm/bindings/ocaml/llvm/ |
H A D | llvm.mli | 602 (** [user u] returns the user of the use [u]. 604 val user : lluse -> llvalue var
|