/external/openssh/ |
H A D | monitor_wrap.c | 243 mm_getpwnamallow(const char *username) argument 253 buffer_put_cstring(&m, username);
|
H A D | monitor.c | 787 char *username; local 797 username = buffer_get_string(m, NULL); 799 pwent = getpwnamallow(username); 801 authctxt->user = xstrdup(username); 802 setproctitle("%s [priv]", pwent ? username : "unknown"); 803 free(username);
|
/external/tcpdump/ |
H A D | tcpdump.c | 738 droproot(const char *username, const char *chroot_dir) argument 742 if (chroot_dir && !username) { 747 pw = getpwnam(username); 762 fprintf(stderr, "dropped privs to %s\n", username); 768 username, 775 fprintf(stderr, "dropped privs to %s\n", username); 781 username); 1018 char *username = NULL; local 1434 username = strdup(optarg); 1519 if (!username) [all...] |
/external/webrtc/talk/app/webrtc/java/src/org/webrtc/ |
H A D | PeerConnection.java | 94 public final String username; field in class:PeerConnection.IceServer 102 public IceServer(String uri, String username, String password) { argument 104 this.username = username; 109 return uri + "[" + username + ":" + password + "]";
|
/external/webrtc/talk/app/webrtc/ |
H A D | peerconnectioninterface.h | 204 std::string username; member in struct:webrtc::PeerConnectionInterface::IceServer
|
/external/webrtc/webrtc/p2p/base/ |
H A D | p2ptransportchannel.cc | 359 if (candidate.username() == ice_ufrag && candidate.password().empty()) { 508 std::string username = it->username(); local 510 if (it->username() != username) { 520 if (it->username() == remote_username) { 680 << candidate.username() 687 // ICE candidates don't need to have username and password set, but 689 // port.cc) uses the remote candidates's username. So, we set it 692 if (candidate.username() [all...] |
H A D | relayport.cc | 187 const std::string& username, 196 username, 181 RelayPort(rtc::Thread* thread, rtc::PacketSocketFactory* factory, rtc::Network* network, const rtc::IPAddress& ip, uint16_t min_port, uint16_t max_port, const std::string& username, const std::string& password) argument
|
H A D | stun.cc | 893 bool ComputeStunCredentialHash(const std::string& username, argument 899 // key = MD5(username ":" realm ":" SASLprep(password)) 900 std::string input = username;
|
H A D | turnserver.cc | 263 // Check that the username matches the previous username used. 266 allocation->username()) { 286 std::string username = username_attr->GetString(); local 287 return (auth_hook_ != NULL && auth_hook_->GetKey(username, realm_, key)); 312 // Fail if there is M-I but no username, nonce, or realm. 326 // Fail if bad username or M-I.
|
/external/webrtc/webrtc/p2p/client/ |
H A D | basicportallocator.cc | 247 username(), 885 udp_socket_.get(), session_->username(), session_->password(), 891 session_->username(), session_->password(), 927 session_->username(), session_->password(), 957 session_->username(), session_->password(), 1002 config_->username, config_->password); 1047 session_->username(), session_->password(), 1060 session_->username(), 1125 const std::string& username, 1127 : stun_address(stun_address), username(usernam 1123 PortConfiguration( const rtc::SocketAddress& stun_address, const std::string& username, const std::string& password) argument 1132 PortConfiguration(const ServerAddresses& stun_servers, const std::string& username, const std::string& password) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_module_tests.c | 1919 char *username = "User"; local 1965 (u8 *) username, os_strlen(username), 1982 (u8 *) username, 1983 os_strlen(username),
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ttls.c | 696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 729 username = sm->identity; 732 if (username[i] == '\\') { 734 username += i + 1; 762 username, username_len); 770 username, username_len, 775 username, username_len, 787 username, username_len, challenge2) == 0) { 789 username, username_len, 803 username, username_le [all...] |
H A D | eap_sim_db.c | 32 char *permanent; /* permanent username */ 33 char *pseudonym; /* pseudonym username */ 905 * @username: Permanent username (prefix | IMSI) 926 const char *username, int max_chal, 936 if (username == NULL || username[0] != EAP_SIM_PERMANENT_PREFIX || 937 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) { 938 wpa_printf(MSG_DEBUG, "EAP-SIM DB: unexpected username ' 925 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 1393 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument [all...] |
/external/wpa_supplicant_8/hs20/client/ |
H A D | oma_dm_client.c | 935 const char *username, const char *password, 953 ext_hdr, ctx->ca_fname, username, password, 932 oma_dm_send_recv(struct hs20_osu_client *ctx, const char *url, xml_node_t *syncml, const char *ext_hdr, const char *username, const char *password, const char *client_cert, const char *client_key) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_module_tests.c | 1919 char *username = "User"; local 1965 (u8 *) username, os_strlen(username), 1982 (u8 *) username, 1983 os_strlen(username),
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ttls.c | 696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 729 username = sm->identity; 732 if (username[i] == '\\') { 734 username += i + 1; 762 username, username_len); 770 username, username_len, 775 username, username_len, 787 username, username_len, challenge2) == 0) { 789 username, username_len, 803 username, username_le [all...] |
H A D | eap_sim_db.c | 32 char *permanent; /* permanent username */ 33 char *pseudonym; /* pseudonym username */ 905 * @username: Permanent username (prefix | IMSI) 926 const char *username, int max_chal, 936 if (username == NULL || username[0] != EAP_SIM_PERMANENT_PREFIX || 937 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) { 938 wpa_printf(MSG_DEBUG, "EAP-SIM DB: unexpected username ' 925 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 1393 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_module_tests.c | 1919 char *username = "User"; local 1965 (u8 *) username, os_strlen(username), 1982 (u8 *) username, 1983 os_strlen(username),
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local 729 username = sm->identity; 732 if (username[i] == '\\') { 734 username += i + 1; 762 username, username_len); 770 username, username_len, 775 username, username_len, 787 username, username_len, challenge2) == 0) { 789 username, username_len, 803 username, username_le [all...] |
H A D | eap_sim_db.c | 32 char *permanent; /* permanent username */ 33 char *pseudonym; /* pseudonym username */ 905 * @username: Permanent username (prefix | IMSI) 926 const char *username, int max_chal, 936 if (username == NULL || username[0] != EAP_SIM_PERMANENT_PREFIX || 937 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) { 938 wpa_printf(MSG_DEBUG, "EAP-SIM DB: unexpected username ' 925 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 1393 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
H A D | ant-weblogic.jar | ... args
public void setUsername (java.lang.String) String username
public void setPassword (java.lang.String) String password ... |
/external/libvncserver/libvncclient/ |
H A D | rfbproto.c | 680 if (cred->userCredential.username) free(cred->userCredential.username); 704 ulen = (cred->userCredential.username ? strlen(cred->userCredential.username) : 0); 716 if (!WriteToRFBServer(client, cred->userCredential.username, ulen)) 771 uint8_t username[256], password[64]; local 795 memset(username, 0, sizeof(username)); 796 strncpy((char *)username, cred->userCredential.username, sizeo [all...] |
/external/selinux/libselinux/src/android/ |
H A D | android.c | 733 const char *username = NULL; local 778 username = pwd->pw_name; 781 username = "_app"; 784 username = "_isolated"; 808 if (strncasecmp(username, cur->user.str, cur->user.len-1)) 811 if (strcasecmp(username, cur->user.str))
|
/external/selinux/libsepol/src/ |
H A D | services.c | 2089 char *username, 2109 username); 2088 sepol_get_user_sids(sepol_security_id_t fromsid, char *username, sepol_security_id_t ** sids, uint32_t * nel) argument
|
/external/strace/ |
H A D | strace.c | 136 static char *username = NULL; variable 205 -p pid... / [-D] [-E var=val]... [-u username] PROG [ARGS]\n\ 207 -p pid... / [-D] [-E var=val]... [-u username] PROG [ARGS]\n\ 259 -u username run command as username handling setuid and/or setgid\n\ 1191 if (username != NULL) { 1196 if (initgroups(username, run_gid) < 0) { 1716 username = xstrdup(optarg); 1798 if (username != NULL) { 1804 pent = getpwnam(username); [all...] |