/external/wpa_supplicant_8/hs20/server/ |
H A D | hs20_spp_server.c | 68 char *user, *realm, *post, *str; local 74 user = getenv("HS20USER"); 75 if (user && strlen(user) == 0) 76 user = NULL; 102 resp = hs20_spp_server_process(ctx, spp, user, realm, dmacc); 104 if (resp == NULL && user == NULL) {
|
/external/wpa_supplicant_8/hs20/server/www/ |
H A D | users.php | 66 if ($cmd == 'subrem-add-user' && $id > 0) { 67 $db->exec("UPDATE users SET remediation='user' WHERE rowid=$id"); 167 echo " [<a href=\"users.php?cmd=subrem-add-user&id=" . 168 $row['rowid'] . "\">add:user</a>]"; 175 } else if ($rem == "user") { 239 $user = $row['identity']; variable 254 echo "<th>user<th>realm"; 269 $res = $db->query("SELECT rowid,* FROM eventlog WHERE (user='$user' OR user [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | eap_user_db.c | 2 * hostapd / EAP user database 23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) argument 32 os_memset(&user->methods, 0, sizeof(user->methods)); 39 user->methods[num_methods].method = 41 &user->methods[num_methods].vendor); 42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && 43 user->methods[num_methods].method == EAP_TYPE_NONE) { 45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; 49 user 81 struct hostapd_eap_user *user = ctx; local 103 struct hostapd_eap_user *user = ctx; local 137 struct hostapd_eap_user *user = NULL; local 220 struct hostapd_eap_user *user = conf->eap_user; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | eap_user_db.c | 2 * hostapd / EAP user database 23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) argument 32 os_memset(&user->methods, 0, sizeof(user->methods)); 39 user->methods[num_methods].method = 41 &user->methods[num_methods].vendor); 42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && 43 user->methods[num_methods].method == EAP_TYPE_NONE) { 45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; 49 user 81 struct hostapd_eap_user *user = ctx; local 103 struct hostapd_eap_user *user = ctx; local 137 struct hostapd_eap_user *user = NULL; local 220 struct hostapd_eap_user *user = conf->eap_user; local [all...] |
/external/chromium_org/chrome/browser/chromeos/file_system_provider/ |
H A D | mount_path_util.cc | 17 #include "components/user_manager/user.h" 53 user_manager::User* const user = member in class:chromeos::file_system_provider::util::user_manager 59 const std::string username_suffix = user ? user->username_hash() : "";
|
/external/chromium_org/chrome/browser/chromeos/login/users/avatar/ |
H A D | user_image_sync_observer.cc | 18 #include "components/user_manager/user.h" 27 // A dictionary containing info about user image. 42 UserImageSyncObserver::UserImageSyncObserver(const user_manager::User* user) argument 43 : user_(user), 51 if (Profile* profile = ProfileHelper::Get()->GetProfileByUser(user)) {
|
/external/chromium_org/chrome/browser/chromeos/login/users/ |
H A D | multi_profile_user_controller.cc | 20 #include "components/user_manager/user.h" 96 const user_manager::User* user = user_manager->GetPrimaryUser(); local 97 if (!user) 101 if (policy::PolicyCertServiceFactory::UsedPolicyCertificates(user->email())) { 102 // Check directly in local_state before checking if the primary user has 108 Profile* profile = ProfileHelper::Get()->GetProfileByUser(user); 120 // No user is allowed if the primary user policy forbids it. 140 // Always allow if there is no primary user or user bein [all...] |
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | device_cloud_policy_invalidator.cc | 36 #include "components/user_manager/user.h" 126 // The DeviceCloudPolicyInvalidator should be created before any user 130 // Subscribe to notification about new user profiles becoming available. 155 user_manager::User* user = local 157 if (!user || 159 GetUserAffiliation(user->email()) != USER_AFFILIATION_MANAGED) { 160 // If the Profile belongs to a user who is not affiliated with the domain 164 // Create a state observer for the user's invalidation service. 224 // logged-in user is found, create a |CloudPolicyInvalidator| backed by
|
H A D | user_network_configuration_updater.cc | 17 #include "components/user_manager/user.h" 32 const user_manager::User& user, 38 user, 58 const user_manager::User& user, 66 user_(&user), 29 CreateForUserPolicy( Profile* profile, bool allow_trusted_certs_from_policy, const user_manager::User& user, PolicyService* policy_service, chromeos::ManagedNetworkConfigurationHandler* network_config_handler) argument 55 UserNetworkConfigurationUpdater( Profile* profile, bool allow_trusted_certs_from_policy, const user_manager::User& user, PolicyService* policy_service, chromeos::ManagedNetworkConfigurationHandler* network_config_handler) argument
|
/external/chromium_org/chrome/browser/extensions/api/autotest_private/ |
H A D | autotest_private_api.cc | 28 #include "components/user_manager/user.h" 114 const user_manager::User* user = user_manager->GetLoggedInUser(); local 115 result->SetString("email", user->email()); 116 result->SetString("displayEmail", user->display_email()); 119 switch (user->image_index()) { 129 user_image = base::IntToString(user->image_index());
|
/external/chromium_org/chrome/browser/supervised_user/chromeos/ |
H A D | manager_password_service.cc | 19 #include "components/user_manager/user.h" 69 const user_manager::User* user = supervised_user_manager->FindBySyncId(su_id); local 70 // No user on device. 71 if (user == NULL) 89 if (!auth->NeedPasswordChange(user->email(), dict) && 90 !auth->HasIncompleteKey(user->email())) { 98 user->email(), 217 // 2) Remove old supervised user key. 258 VLOG(1) << "Removed old supervised user key for "
|
/external/chromium_org/chrome/browser/ui/webui/options/chromeos/ |
H A D | cros_language_options_handler.cc | 190 user_manager::User* user = ProfileHelper::Get()->GetUserByProfile(profile); local 191 if (user && 192 user->email() == user_manager->GetPrimaryUser()->email() && 193 user->GetType() != user_manager::USER_TYPE_PUBLIC_ACCOUNT) {
|
/external/chromium_org/chrome_elf/ |
H A D | breakpad.cc | 77 TOKEN_USER* user = reinterpret_cast<TOKEN_USER*>(user_bytes); local 80 if (::GetTokenInformation(token, TokenUser, user, size, &size) && 81 user->User.Sid && 82 ::ConvertSidToStringSid(user->User.Sid, &sid_string)) { 159 // 32-bit user: \\.\pipe\GoogleCrashServices\<user SID> 161 // 64-bit user: \\.\pipe\GoogleCrashServices\<user SID>-x64 175 // user has not given consent.
|
/external/chromium_org/chromeos/ |
H A D | cert_loader_unittest.cc | 93 // Finishes initialization for the |user| and returns a user's NSS database 96 crypto::ScopedTestNSSChromeOSUser* user, 98 ASSERT_TRUE(user->constructed_successfully()); 100 user->FinishInit(); 104 user->username_hash(), 109 crypto::GetPublicSlotForChromeOSUser(user->username_hash()), 124 // Add a certificate to the user's db. 163 // The user is primary as the one whose certificates CertLoader handles, it 95 FinishUserInitAndGetDatabase( crypto::ScopedTestNSSChromeOSUser* user, scoped_ptr<net::NSSCertDatabaseChromeOS>* database) argument
|
/external/chromium_org/cloud_print/gcp20/prototype/ |
H A D | printer_state.h | 43 std::string user; member in struct:PrinterState
|
/external/chromium_org/net/disk_cache/blockfile/ |
H A D | disk_format_base.h | 42 // EntryStore blocks, RankingsNode blocks or user-data blocks). 60 int32 user[5]; member in struct:disk_cache::BlockFileHeader
|
/external/chromium_org/sandbox/win/src/ |
H A D | restricted_token.cc | 124 // Modify the default dacl on the token to contain Restricted and the user. 270 Sid user = reinterpret_cast<SID*>(token_user->User.Sid); local 271 sids_for_deny_only_.push_back(user); 417 Sid user = reinterpret_cast<SID*>(token_user->User.Sid); local 418 sids_to_restrict_.push_back(user); 430 // Add the current user to the list.
|
H A D | restricted_token_unittest.cc | 57 // Check if both token have the same owner and user. 468 ATL::CSid user; local 469 restricted_token.GetUser(&user); 471 CheckRestrictingSid(restricted_token, user, 1); 493 ATL::CSid user; local 494 restricted_token.GetUser(&user); 496 CheckRestrictingSid(restricted_token, user, 1); 574 // Verify that the user is in the restricting sid list. 575 ATL::CSid user; local 576 restricted_token.GetUser(&user); [all...] |
/external/chromium_org/third_party/freetype/include/freetype/ |
H A D | ftsystem.h | 158 * user :: 159 * A generic typeless pointer for user data. 173 void* user; member in struct:FT_MemoryRec_
|
/external/chromium_org/third_party/freetype/src/base/ |
H A D | ftbbox.c | 53 /* in `user->last'; no further computations are necessary since we */ 60 /* user :: A pointer to the current walk context. */ 67 TBBox_Rec* user ) 69 user->last = *to; 155 /* user :: The address of the current walk context. */ 167 TBBox_Rec* user ) 172 if ( CHECK_X( control, user->bbox ) ) 173 BBox_Conic_Check( user->last.x, 176 &user->bbox.xMin, 177 &user 627 TBBox_Rec user; local [all...] |
/external/chromium_org/third_party/freetype/src/raster/ |
H A D | ftmisc.h | 74 void* user; member in struct:FT_MemoryRec_
|
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/util/ |
H A D | u_keymap.c | 68 const void *key, void *data, void *user) 135 * \param user user-provided pointer passed through to the delete callback 138 util_delete_keymap(struct keymap *map, void *user) argument 140 util_keymap_remove_all(map, user); 189 const void *data, void *user) 204 map->delete_func(map, item->key, item->value, user); 254 * \param user passed to the delete callback as the last param. 257 util_keymap_remove(struct keymap *map, const void *key, void *user) argument 277 map->delete_func(map, item->key, item->value, user); 67 default_delete_func(const struct keymap *map, const void *key, void *data, void *user) argument 188 util_keymap_insert(struct keymap *map, const void *key, const void *data, void *user) argument 292 util_keymap_remove_all(struct keymap *map, void *user) argument [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/nv50/ |
H A D | nv50_stateobj.h | 44 boolean user; /* should only be TRUE if u.data is valid and non-NULL */ member in struct:nv50_constbuf
|
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/nvc0/ |
H A D | nvc0_stateobj.h | 42 boolean user; /* should only be TRUE if u.data is valid and non-NULL */ member in struct:nvc0_constbuf
|
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/r300/compiler/ |
H A D | r300_fragprog.c | 58 void r300FragmentProgramDump(struct radeon_compiler *c, void *user) argument
|