Searched defs:user (Results 76 - 100 of 268) sorted by relevance

1234567891011

/external/chromium/chrome/browser/policy/
H A Ddevice_policy_cache_unittest.cc18 // Test registration user name.
61 const std::string& user,
68 signed_response.set_username(user);
79 const std::string& user,
92 signed_response.set_username(user);
203 // Set new policy information. This should fail due to invalid user.
227 // Set new policy information. This should fail due to invalid user.
60 CreateRefreshRatePolicy(em::PolicyFetchResponse* policy, const std::string& user, int refresh_rate) argument
78 CreateProxyPolicy(em::PolicyFetchResponse* policy, const std::string& user, const std::string& proxy_mode, const std::string& proxy_server, const std::string& proxy_pac_url, const std::string& proxy_bypass_list) argument
/external/chromium/chrome/browser/remoting/
H A Dsetup_flow_login_step.cc51 if (!result->GetString("user", &username) ||
68 void SetupFlowLoginStep::OnUserSubmittedAuth(const std::string& user, argument
72 flow()->context()->login = user;
85 authenticator_->StartClientLogin(user, remoting_password,
126 args.SetString("user", "");
/external/chromium/chrome/browser/ui/webui/
H A Dnew_tab_page_sync_handler.cc138 // from the user's perspective are:
183 std::string user; local
207 // The only time we set the URL is when the user is synced and we need to
209 // set that URL, HandleSyncLinkClicked won't be called when the user
/external/freetype/include/freetype/
H A Dftsystem.h158 * user ::
159 * A generic typeless pointer for user data.
173 void* user; member in struct:FT_MemoryRec_
/external/freetype/src/base/
H A Dftbbox.c51 /* in `user->last'; no further computations are necessary since we */
58 /* user :: A pointer to the current walk context. */
65 TBBox_Rec* user )
67 user->last = *to;
153 /* user :: The address of the current walk context. */
165 TBBox_Rec* user )
170 if ( CHECK_X( control, user->bbox ) )
171 BBox_Conic_Check( user->last.x,
174 &user->bbox.xMin,
175 &user
640 TBBox_Rec user; local
[all...]
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/auth/
H A DAuthenticationManager.java124 public String[] getRemainingMethods(String user) throws IOException argument
126 initialize(user);
140 private boolean initialize(String user) throws IOException argument
152 PacketUserauthRequestNone urn = new PacketUserauthRequestNone("ssh-connection", user);
180 public boolean authenticatePublicKey(String user, char[] PEMPrivateKey, String password, SecureRandom rnd) argument
185 initialize(user);
204 tw.writeString(user);
217 PacketUserauthRequestPublicKey ua = new PacketUserauthRequestPublicKey("ssh-connection", user,
233 tw.writeString(user);
247 PacketUserauthRequestPublicKey ua = new PacketUserauthRequestPublicKey("ssh-connection", user,
285 authenticateNone(String user) argument
299 authenticatePassword(String user, String pass) argument
340 authenticateInteractive(String user, String[] submethods, InteractiveCallback cb) argument
[all...]
/external/iproute2/ip/
H A Diptuntap.c40 fprintf(stderr, " [ mode { tun | tap } ] [ user USER ] [ group GROUP ]\n");
134 } else if (uid && matches(*argv, "user") == 0) {
136 unsigned long user; local
139 if (**argv && ((user = strtol(*argv, &end, 10)), !*end))
140 *uid = user;
144 fprintf(stderr, "invalid user \"%s\"\n", *argv);
296 printf(" user %ld", owner);
/external/ipsec-tools/src/racoon/
H A Dadmin.c310 char user[LOGINLEN+1]; local
319 memcpy(user, (char *)(com + 1), len);
320 user[len] = 0;
322 found = purgeph1bylogin(user);
324 "deleted %d SA for user \"%s\"\n", found, user);
/external/kernel-headers/original/linux/
H A Dsignal.h19 struct user_struct *user; member in struct:sigqueue
/external/libpcap/
H A Dpcap-nit.c99 pcap_read_nit(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument
183 (*callback)(user, &h, cp);
H A Dpcap-septel.c73 static int septel_read(pcap_t *p, int cnt, pcap_handler callback, u_char *user) { argument
83 * LOCAL 0xdd * upe - Example user part task */
174 /* Call the user supplied callback function */
175 callback(user, &pcap_header, dp);
H A Dpcap-snoop.c62 pcap_read_snoop(pcap_t *p, int cnt, pcap_handler callback, u_char *user) argument
132 (*callback)(user, &h, cp);
/external/libsepol/src/
H A Dcontext.c47 if (!c->user || c->user > p->p_users.nprim)
65 usrdatum = p->user_val_to_struct[c->user - 1];
70 /* user may not be associated with role */
99 strlen(policydb->p_user_val_to_name[context->user - 1]) + 1;
115 * Copy the user name, role name and type name into the context.
119 policydb->p_user_val_to_name[context->user - 1],
124 strlen(policydb->p_user_val_to_name[context->user - 1]) + 1 +
155 char *user = strdup(sepol_context_get_user(record)); local
161 if (!user || !rol
[all...]
H A Duser_record.c9 /* This user's name */
12 /* This user's mls level (only required for mls) */
15 /* This user's mls range (only required for mls) */
26 /* This user's name */
39 "could not create selinux user key");
60 const sepol_user_t * user,
64 if (sepol_user_key_create(handle, user->name, key_ptr) < 0) {
65 ERR(handle, "could not extract key from user %s", user->name);
77 int sepol_user_compare(const sepol_user_t * user, cons argument
83 sepol_user_compare2(const sepol_user_t * user, const sepol_user_t * user2) argument
90 sepol_user_get_name(const sepol_user_t * user) argument
96 sepol_user_set_name(sepol_handle_t * handle, sepol_user_t * user, const char *name) argument
170 sepol_user_add_role(sepol_handle_t * handle, sepol_user_t * user, const char *role) argument
260 sepol_user_get_roles(sepol_handle_t * handle, const sepol_user_t * user, const char ***roles_arr, unsigned int *num_roles) argument
305 sepol_user_t *user = (sepol_user_t *) malloc(sizeof(sepol_user_t)); local
362 sepol_user_free(sepol_user_t * user) argument
[all...]
H A Dusers.c103 const sepol_user_key_t * key, const sepol_user_t * user)
108 /* For user data */
129 cmls_level = sepol_user_get_mlslevel(user);
130 cmls_range = sepol_user_get_mlsrange(user);
133 if (sepol_user_get_roles(handle, user, &roles, &num_roles) < 0)
136 /* Now, see if a user exists */
164 ERR(handle, "undefined role %s for user %s",
185 "default level was defined for user %s", cname);
205 "range was defined for user %s", cname);
222 "was found for user
101 sepol_user_modify(sepol_handle_t * handle, sepol_policydb_t * p, const sepol_user_key_t * key, const sepol_user_t * user) argument
345 sepol_user_iterate(sepol_handle_t * handle, const sepol_policydb_t * p, int (*fn) (const sepol_user_t * user, void *fn_arg), void *arg) argument
353 sepol_user_t *user = NULL; local
[all...]
/external/nist-sip/java/gov/nist/javax/sip/address/
H A DAuthority.java112 * Get password from the user info.
123 * Get the user name if it exists.
124 * @return String user or null if not set.
127 return userInfo != null ? userInfo.user : null;
170 * Set the user name of the userInfo member.
171 * @param user String to set
173 public void setUser(String user) { argument
176 this.userInfo.setUser(user);
215 /** Remove the user Infor.
/external/openssh/
H A Dauth.h53 int valid; /* user exists and is allowed to login */
58 char *user; /* username sent by the client */ member in struct:Authctxt
80 * case 'valid' is set to 0, but 'user' points to the username requested by
165 struct passwd * getpwnamallow(const char *user);
H A Dauth1.c54 static char *client_user = NULL; /* Used to fill in remote user for PAM */
122 * Read user password. It is in plain text, but was
172 * Get client user name. Note that we just have to
174 * claim to be any user.
238 * read packets, try to authenticate the user and
250 authctxt->valid ? "" : "invalid user ", authctxt->user);
254 /* If the user has no password, accept authentication immediately. */
321 fatal("INTERNAL ERROR: authenticated invalid user %s",
322 authctxt->user);
396 char *user, *style = NULL; local
[all...]
H A Dauth2.c194 /* now we can handle user-auth requests */
218 char *user, *service, *method, *style = NULL; local
224 user = packet_get_cstring(NULL);
227 debug("userauth-request for user %s service %s method %s", user, service, method);
230 if ((style = strchr(user, ':')) != NULL)
235 authctxt->pw = PRIVSEP(getpwnamallow(user));
236 authctxt->user = xstrdup(user);
239 debug2("input_userauth_request: setting up authctxt for %s", user);
[all...]
H A Dgss-serv.c171 * we flag the user as also having been authenticated
291 /* As user - called on fatal/exit */
303 /* As user */
316 /* As user */
332 ssh_gssapi_userok(char *user) argument
342 if ((*gssapi_client.mech->userok)(&gssapi_client, user))
H A Dmatch.c211 * match user, user@host_or_ip, user@host_or_ip_list against pattern
214 match_user(const char *user, const char *host, const char *ipaddr, argument
221 return match_pattern(user, pattern);
227 if ((ret = match_pattern(user, pat)) == 1)
H A Dsftp-common.c194 char *user, *group; local
200 user = user_from_uid(st->st_uid, 0);
203 user = ubuf;
219 ulen = MAX(strlen(user), 8);
224 (u_int)st->st_nlink, ulen, user, glen, group,
228 (u_int)st->st_nlink, ulen, user, glen, group,
/external/oprofile/module/
H A Doprofile.h65 int user; member in struct:oprof_counter
/external/qemu/android/skin/
H A Dcomposer.h40 typedef void (*SkinPlateDrawFunc)( void* user, SkinRegion* region, SkinPos* apos, SkinViewport* viewport, int opaque );
41 typedef void (*SkinPlateDoneFunc)( void* user );
45 void* user; member in struct:SkinPlateSurface
75 void* user,
/external/smack/src/org/jivesoftware/smackx/workgroup/agent/
H A DAgentRoster.java170 * address can be in any valid format (e.g. "domain/resource", "user@domain"
171 * or "user@domain/resource").
193 * @param user a fully qualified xmpp JID. The address could be in any valid format (e.g.
194 * "domain/resource", "user@domain" or "user@domain/resource").
198 public Presence getPresence(String user) { argument
199 String key = getPresenceMapKey(user);
203 presence.setFrom(user);
226 presence.setFrom(user);
237 * can contain any valid address format such us "domain/resource", "user
246 getPresenceMapKey(String user) argument
[all...]

Completed in 1132 milliseconds

1234567891011