/external/chromium/chrome/browser/policy/ |
H A D | device_policy_cache_unittest.cc | 18 // Test registration user name. 61 const std::string& user, 68 signed_response.set_username(user); 79 const std::string& user, 92 signed_response.set_username(user); 203 // Set new policy information. This should fail due to invalid user. 227 // Set new policy information. This should fail due to invalid user. 60 CreateRefreshRatePolicy(em::PolicyFetchResponse* policy, const std::string& user, int refresh_rate) argument 78 CreateProxyPolicy(em::PolicyFetchResponse* policy, const std::string& user, const std::string& proxy_mode, const std::string& proxy_server, const std::string& proxy_pac_url, const std::string& proxy_bypass_list) argument
|
/external/chromium/chrome/browser/remoting/ |
H A D | setup_flow_login_step.cc | 51 if (!result->GetString("user", &username) || 68 void SetupFlowLoginStep::OnUserSubmittedAuth(const std::string& user, argument 72 flow()->context()->login = user; 85 authenticator_->StartClientLogin(user, remoting_password, 126 args.SetString("user", "");
|
/external/chromium/chrome/browser/ui/webui/ |
H A D | new_tab_page_sync_handler.cc | 138 // from the user's perspective are: 183 std::string user; local 207 // The only time we set the URL is when the user is synced and we need to 209 // set that URL, HandleSyncLinkClicked won't be called when the user
|
/external/freetype/include/freetype/ |
H A D | ftsystem.h | 158 * user :: 159 * A generic typeless pointer for user data. 173 void* user; member in struct:FT_MemoryRec_
|
/external/freetype/src/base/ |
H A D | ftbbox.c | 51 /* in `user->last'; no further computations are necessary since we */ 58 /* user :: A pointer to the current walk context. */ 65 TBBox_Rec* user ) 67 user->last = *to; 153 /* user :: The address of the current walk context. */ 165 TBBox_Rec* user ) 170 if ( CHECK_X( control, user->bbox ) ) 171 BBox_Conic_Check( user->last.x, 174 &user->bbox.xMin, 175 &user 640 TBBox_Rec user; local [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/auth/ |
H A D | AuthenticationManager.java | 124 public String[] getRemainingMethods(String user) throws IOException argument 126 initialize(user); 140 private boolean initialize(String user) throws IOException argument 152 PacketUserauthRequestNone urn = new PacketUserauthRequestNone("ssh-connection", user); 180 public boolean authenticatePublicKey(String user, char[] PEMPrivateKey, String password, SecureRandom rnd) argument 185 initialize(user); 204 tw.writeString(user); 217 PacketUserauthRequestPublicKey ua = new PacketUserauthRequestPublicKey("ssh-connection", user, 233 tw.writeString(user); 247 PacketUserauthRequestPublicKey ua = new PacketUserauthRequestPublicKey("ssh-connection", user, 285 authenticateNone(String user) argument 299 authenticatePassword(String user, String pass) argument 340 authenticateInteractive(String user, String[] submethods, InteractiveCallback cb) argument [all...] |
/external/iproute2/ip/ |
H A D | iptuntap.c | 40 fprintf(stderr, " [ mode { tun | tap } ] [ user USER ] [ group GROUP ]\n"); 134 } else if (uid && matches(*argv, "user") == 0) { 136 unsigned long user; local 139 if (**argv && ((user = strtol(*argv, &end, 10)), !*end)) 140 *uid = user; 144 fprintf(stderr, "invalid user \"%s\"\n", *argv); 296 printf(" user %ld", owner);
|
/external/ipsec-tools/src/racoon/ |
H A D | admin.c | 310 char user[LOGINLEN+1]; local 319 memcpy(user, (char *)(com + 1), len); 320 user[len] = 0; 322 found = purgeph1bylogin(user); 324 "deleted %d SA for user \"%s\"\n", found, user);
|
/external/kernel-headers/original/linux/ |
H A D | signal.h | 19 struct user_struct *user; member in struct:sigqueue
|
/external/libpcap/ |
H A D | pcap-nit.c | 99 pcap_read_nit(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument 183 (*callback)(user, &h, cp);
|
H A D | pcap-septel.c | 73 static int septel_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user) { argument 83 * LOCAL 0xdd * upe - Example user part task */ 174 /* Call the user supplied callback function */ 175 callback(user, &pcap_header, dp);
|
H A D | pcap-snoop.c | 62 pcap_read_snoop(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument 132 (*callback)(user, &h, cp);
|
/external/libsepol/src/ |
H A D | context.c | 47 if (!c->user || c->user > p->p_users.nprim) 65 usrdatum = p->user_val_to_struct[c->user - 1]; 70 /* user may not be associated with role */ 99 strlen(policydb->p_user_val_to_name[context->user - 1]) + 1; 115 * Copy the user name, role name and type name into the context. 119 policydb->p_user_val_to_name[context->user - 1], 124 strlen(policydb->p_user_val_to_name[context->user - 1]) + 1 + 155 char *user = strdup(sepol_context_get_user(record)); local 161 if (!user || !rol [all...] |
H A D | user_record.c | 9 /* This user's name */ 12 /* This user's mls level (only required for mls) */ 15 /* This user's mls range (only required for mls) */ 26 /* This user's name */ 39 "could not create selinux user key"); 60 const sepol_user_t * user, 64 if (sepol_user_key_create(handle, user->name, key_ptr) < 0) { 65 ERR(handle, "could not extract key from user %s", user->name); 77 int sepol_user_compare(const sepol_user_t * user, cons argument 83 sepol_user_compare2(const sepol_user_t * user, const sepol_user_t * user2) argument 90 sepol_user_get_name(const sepol_user_t * user) argument 96 sepol_user_set_name(sepol_handle_t * handle, sepol_user_t * user, const char *name) argument 170 sepol_user_add_role(sepol_handle_t * handle, sepol_user_t * user, const char *role) argument 260 sepol_user_get_roles(sepol_handle_t * handle, const sepol_user_t * user, const char ***roles_arr, unsigned int *num_roles) argument 305 sepol_user_t *user = (sepol_user_t *) malloc(sizeof(sepol_user_t)); local 362 sepol_user_free(sepol_user_t * user) argument [all...] |
H A D | users.c | 103 const sepol_user_key_t * key, const sepol_user_t * user) 108 /* For user data */ 129 cmls_level = sepol_user_get_mlslevel(user); 130 cmls_range = sepol_user_get_mlsrange(user); 133 if (sepol_user_get_roles(handle, user, &roles, &num_roles) < 0) 136 /* Now, see if a user exists */ 164 ERR(handle, "undefined role %s for user %s", 185 "default level was defined for user %s", cname); 205 "range was defined for user %s", cname); 222 "was found for user 101 sepol_user_modify(sepol_handle_t * handle, sepol_policydb_t * p, const sepol_user_key_t * key, const sepol_user_t * user) argument 345 sepol_user_iterate(sepol_handle_t * handle, const sepol_policydb_t * p, int (*fn) (const sepol_user_t * user, void *fn_arg), void *arg) argument 353 sepol_user_t *user = NULL; local [all...] |
/external/nist-sip/java/gov/nist/javax/sip/address/ |
H A D | Authority.java | 112 * Get password from the user info. 123 * Get the user name if it exists. 124 * @return String user or null if not set. 127 return userInfo != null ? userInfo.user : null; 170 * Set the user name of the userInfo member. 171 * @param user String to set 173 public void setUser(String user) { argument 176 this.userInfo.setUser(user); 215 /** Remove the user Infor.
|
/external/openssh/ |
H A D | auth.h | 53 int valid; /* user exists and is allowed to login */ 58 char *user; /* username sent by the client */ member in struct:Authctxt 80 * case 'valid' is set to 0, but 'user' points to the username requested by 165 struct passwd * getpwnamallow(const char *user);
|
H A D | auth1.c | 54 static char *client_user = NULL; /* Used to fill in remote user for PAM */ 122 * Read user password. It is in plain text, but was 172 * Get client user name. Note that we just have to 174 * claim to be any user. 238 * read packets, try to authenticate the user and 250 authctxt->valid ? "" : "invalid user ", authctxt->user); 254 /* If the user has no password, accept authentication immediately. */ 321 fatal("INTERNAL ERROR: authenticated invalid user %s", 322 authctxt->user); 396 char *user, *style = NULL; local [all...] |
H A D | auth2.c | 194 /* now we can handle user-auth requests */ 218 char *user, *service, *method, *style = NULL; local 224 user = packet_get_cstring(NULL); 227 debug("userauth-request for user %s service %s method %s", user, service, method); 230 if ((style = strchr(user, ':')) != NULL) 235 authctxt->pw = PRIVSEP(getpwnamallow(user)); 236 authctxt->user = xstrdup(user); 239 debug2("input_userauth_request: setting up authctxt for %s", user); [all...] |
H A D | gss-serv.c | 171 * we flag the user as also having been authenticated 291 /* As user - called on fatal/exit */ 303 /* As user */ 316 /* As user */ 332 ssh_gssapi_userok(char *user) argument 342 if ((*gssapi_client.mech->userok)(&gssapi_client, user))
|
H A D | match.c | 211 * match user, user@host_or_ip, user@host_or_ip_list against pattern 214 match_user(const char *user, const char *host, const char *ipaddr, argument 221 return match_pattern(user, pattern); 227 if ((ret = match_pattern(user, pat)) == 1)
|
H A D | sftp-common.c | 194 char *user, *group; local 200 user = user_from_uid(st->st_uid, 0); 203 user = ubuf; 219 ulen = MAX(strlen(user), 8); 224 (u_int)st->st_nlink, ulen, user, glen, group, 228 (u_int)st->st_nlink, ulen, user, glen, group,
|
/external/oprofile/module/ |
H A D | oprofile.h | 65 int user; member in struct:oprof_counter
|
/external/qemu/android/skin/ |
H A D | composer.h | 40 typedef void (*SkinPlateDrawFunc)( void* user, SkinRegion* region, SkinPos* apos, SkinViewport* viewport, int opaque ); 41 typedef void (*SkinPlateDoneFunc)( void* user ); 45 void* user; member in struct:SkinPlateSurface 75 void* user,
|
/external/smack/src/org/jivesoftware/smackx/workgroup/agent/ |
H A D | AgentRoster.java | 170 * address can be in any valid format (e.g. "domain/resource", "user@domain"
171 * or "user@domain/resource").
193 * @param user a fully qualified xmpp JID. The address could be in any valid format (e.g.
194 * "domain/resource", "user@domain" or "user@domain/resource").
198 public Presence getPresence(String user) {
argument 199 String key = getPresenceMapKey(user);
203 presence.setFrom(user);
226 presence.setFrom(user);
237 * can contain any valid address format such us "domain/resource", "user 246 getPresenceMapKey(String user) argument [all...] |