Searched defs:username (Results 151 - 175 of 228) sorted by relevance

12345678910

/external/openssh/
H A Dmonitor_wrap.c243 mm_getpwnamallow(const char *username) argument
253 buffer_put_cstring(&m, username);
H A Dmonitor.c787 char *username; local
797 username = buffer_get_string(m, NULL);
799 pwent = getpwnamallow(username);
801 authctxt->user = xstrdup(username);
802 setproctitle("%s [priv]", pwent ? username : "unknown");
803 free(username);
/external/tcpdump/
H A Dtcpdump.c738 droproot(const char *username, const char *chroot_dir) argument
742 if (chroot_dir && !username) {
747 pw = getpwnam(username);
762 fprintf(stderr, "dropped privs to %s\n", username);
768 username,
775 fprintf(stderr, "dropped privs to %s\n", username);
781 username);
1018 char *username = NULL; local
1434 username = strdup(optarg);
1519 if (!username)
[all...]
/external/webrtc/talk/app/webrtc/java/src/org/webrtc/
H A DPeerConnection.java94 public final String username; field in class:PeerConnection.IceServer
102 public IceServer(String uri, String username, String password) { argument
104 this.username = username;
109 return uri + "[" + username + ":" + password + "]";
/external/webrtc/talk/app/webrtc/
H A Dpeerconnectioninterface.h204 std::string username; member in struct:webrtc::PeerConnectionInterface::IceServer
/external/webrtc/webrtc/p2p/base/
H A Dp2ptransportchannel.cc359 if (candidate.username() == ice_ufrag && candidate.password().empty()) {
508 std::string username = it->username(); local
510 if (it->username() != username) {
520 if (it->username() == remote_username) {
680 << candidate.username()
687 // ICE candidates don't need to have username and password set, but
689 // port.cc) uses the remote candidates's username. So, we set it
692 if (candidate.username()
[all...]
H A Drelayport.cc187 const std::string& username,
196 username,
181 RelayPort(rtc::Thread* thread, rtc::PacketSocketFactory* factory, rtc::Network* network, const rtc::IPAddress& ip, uint16_t min_port, uint16_t max_port, const std::string& username, const std::string& password) argument
H A Dstun.cc893 bool ComputeStunCredentialHash(const std::string& username, argument
899 // key = MD5(username ":" realm ":" SASLprep(password))
900 std::string input = username;
H A Dturnserver.cc263 // Check that the username matches the previous username used.
266 allocation->username()) {
286 std::string username = username_attr->GetString(); local
287 return (auth_hook_ != NULL && auth_hook_->GetKey(username, realm_, key));
312 // Fail if there is M-I but no username, nonce, or realm.
326 // Fail if bad username or M-I.
/external/webrtc/webrtc/p2p/client/
H A Dbasicportallocator.cc247 username(),
885 udp_socket_.get(), session_->username(), session_->password(),
891 session_->username(), session_->password(),
927 session_->username(), session_->password(),
957 session_->username(), session_->password(),
1002 config_->username, config_->password);
1047 session_->username(), session_->password(),
1060 session_->username(),
1125 const std::string& username,
1127 : stun_address(stun_address), username(usernam
1123 PortConfiguration( const rtc::SocketAddress& stun_address, const std::string& username, const std::string& password) argument
1132 PortConfiguration(const ServerAddresses& stun_servers, const std::string& username, const std::string& password) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_module_tests.c1919 char *username = "User"; local
1965 (u8 *) username, os_strlen(username),
1982 (u8 *) username,
1983 os_strlen(username),
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_ttls.c696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
729 username = sm->identity;
732 if (username[i] == '\\') {
734 username += i + 1;
762 username, username_len);
770 username, username_len,
775 username, username_len,
787 username, username_len, challenge2) == 0) {
789 username, username_len,
803 username, username_le
[all...]
H A Deap_sim_db.c32 char *permanent; /* permanent username */
33 char *pseudonym; /* pseudonym username */
905 * @username: Permanent username (prefix | IMSI)
926 const char *username, int max_chal,
936 if (username == NULL || username[0] != EAP_SIM_PERMANENT_PREFIX ||
937 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) {
938 wpa_printf(MSG_DEBUG, "EAP-SIM DB: unexpected username '
925 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument
1393 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
[all...]
/external/wpa_supplicant_8/hs20/client/
H A Doma_dm_client.c935 const char *username, const char *password,
953 ext_hdr, ctx->ca_fname, username, password,
932 oma_dm_send_recv(struct hs20_osu_client *ctx, const char *url, xml_node_t *syncml, const char *ext_hdr, const char *username, const char *password, const char *client_cert, const char *client_key) argument
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_module_tests.c1919 char *username = "User"; local
1965 (u8 *) username, os_strlen(username),
1982 (u8 *) username,
1983 os_strlen(username),
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_ttls.c696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
729 username = sm->identity;
732 if (username[i] == '\\') {
734 username += i + 1;
762 username, username_len);
770 username, username_len,
775 username, username_len,
787 username, username_len, challenge2) == 0) {
789 username, username_len,
803 username, username_le
[all...]
H A Deap_sim_db.c32 char *permanent; /* permanent username */
33 char *pseudonym; /* pseudonym username */
905 * @username: Permanent username (prefix | IMSI)
926 const char *username, int max_chal,
936 if (username == NULL || username[0] != EAP_SIM_PERMANENT_PREFIX ||
937 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) {
938 wpa_printf(MSG_DEBUG, "EAP-SIM DB: unexpected username '
925 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument
1393 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_module_tests.c1919 char *username = "User"; local
1965 (u8 *) username, os_strlen(username),
1982 (u8 *) username,
1983 os_strlen(username),
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_ttls.c696 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, local
729 username = sm->identity;
732 if (username[i] == '\\') {
734 username += i + 1;
762 username, username_len);
770 username, username_len,
775 username, username_len,
787 username, username_len, challenge2) == 0) {
789 username, username_len,
803 username, username_le
[all...]
H A Deap_sim_db.c32 char *permanent; /* permanent username */
33 char *pseudonym; /* pseudonym username */
905 * @username: Permanent username (prefix | IMSI)
926 const char *username, int max_chal,
936 if (username == NULL || username[0] != EAP_SIM_PERMANENT_PREFIX ||
937 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) {
938 wpa_printf(MSG_DEBUG, "EAP-SIM DB: unexpected username '
925 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument
1393 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
1489 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
[all...]
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/
H A Dant-weblogic.jar ... args public void setUsername (java.lang.String) String username public void setPassword (java.lang.String) String password ...
/external/libvncserver/libvncclient/
H A Drfbproto.c680 if (cred->userCredential.username) free(cred->userCredential.username);
704 ulen = (cred->userCredential.username ? strlen(cred->userCredential.username) : 0);
716 if (!WriteToRFBServer(client, cred->userCredential.username, ulen))
771 uint8_t username[256], password[64]; local
795 memset(username, 0, sizeof(username));
796 strncpy((char *)username, cred->userCredential.username, sizeo
[all...]
/external/selinux/libselinux/src/android/
H A Dandroid.c733 const char *username = NULL; local
778 username = pwd->pw_name;
781 username = "_app";
784 username = "_isolated";
808 if (strncasecmp(username, cur->user.str, cur->user.len-1))
811 if (strcasecmp(username, cur->user.str))
/external/selinux/libsepol/src/
H A Dservices.c2089 char *username,
2109 username);
2088 sepol_get_user_sids(sepol_security_id_t fromsid, char *username, sepol_security_id_t ** sids, uint32_t * nel) argument
/external/strace/
H A Dstrace.c136 static char *username = NULL; variable
205 -p pid... / [-D] [-E var=val]... [-u username] PROG [ARGS]\n\
207 -p pid... / [-D] [-E var=val]... [-u username] PROG [ARGS]\n\
259 -u username run command as username handling setuid and/or setgid\n\
1191 if (username != NULL) {
1196 if (initgroups(username, run_gid) < 0) {
1716 username = xstrdup(optarg);
1798 if (username != NULL) {
1804 pent = getpwnam(username);
[all...]

Completed in 490 milliseconds

12345678910