/external/dbus/dbus/ |
dbus-sysdeps-util-unix.c | 295 * Verify that after the fork we can successfully change to this user. 297 * @param user the username given in the daemon configuration 301 _dbus_verify_daemon_user (const char *user) 305 _dbus_string_init_const (&u, user); 314 * Changes the user and group the bus is running as. 316 * @param user the user to become 321 _dbus_change_to_daemon_user (const char *user, 328 _dbus_string_init_const (&u, user); 333 "User '%s' does not appear to exist?" [all...] |
/external/ipsec-tools/src/racoon/ |
admin.c | 331 char user[LOGINLEN+1]; local 340 memcpy(user, (char *)(com + 1), len); 341 user[len] = 0; 343 found = purgeph1bylogin(user); 345 "deleted %d SA for user \"%s\"\n", found, user);
|
/external/iptables/libiptc/ |
libip6tc.c | 5 * Chains go INPUT, FORWARD, OUTPUT then user chains. 6 * Each user chain starts with an ERROR node. 7 * Every chain ends with an unconditional jump: a RETURN for user chains, 187 printf("Target name: `%s' [%u]\n", t->u.user.name, t->u.target_size); 188 if (strcmp(t->u.user.name, IP6T_STANDARD_TARGET) == 0) { 199 } else if (strcmp(t->u.user.name, IP6T_ERROR_TARGET) == 0) 268 unsigned int user_offset; /* Offset of first user chain */ 379 /* User chain == end of last builtin + policy entry */ 403 assert(strcmp(t->target.u.user.name, STANDARD_TARGET)==0); 434 ->u.user.name [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sake.c | 316 /* TODO: update identity and select new user data */ 356 if (sm->user == NULL || sm->user->password == NULL || 357 sm->user->password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 364 eap_sake_derive_keys(sm->user->password, 365 sm->user->password + EAP_SAKE_ROOT_SECRET_LEN,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 317 /* TODO: update identity and select new user data */ 357 if (sm->user == NULL || sm->user->password == NULL || 358 sm->user->password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 365 eap_sake_derive_keys(sm->user->password, 366 sm->user->password + EAP_SAKE_ROOT_SECRET_LEN,
|
/libcore/luni/src/test/java/org/apache/harmony/xnet/provider/jsse/ |
TrustedCertificateStoreTest.java | 570 boolean user = TrustedCertificateStore.isUser(alias); 571 if (system || user) { 573 assertEquals(user, store.userAliases().contains(alias)); 585 private static String alias(boolean user, X509Certificate x, int index) { 586 String prefix = user ? "user:" : "system:";
|
/system/core/toolbox/ |
top.c | 415 struct passwd *user; local 442 printf("User %ld%%, System %ld%%, IOW %ld%%, IRQ %ld%%\n", 448 printf("User %ld + Nice %ld + Sys %ld + Idle %ld + IOW %ld + IRQ %ld + SIRQ %ld = %ld\n", 468 user = getpwuid(proc->uid); 470 if (user && user->pw_name) { 471 user_str = user->pw_name;
|
/external/webkit/Source/WebCore/platform/network/cf/ |
ResourceHandleCFNet.cpp | 127 static String encodeBasicAuthorization(const String& user, const String& password) 129 return base64Encode((user + ":" + password).utf8()); 425 String authHeader = "Basic " + encodeBasicAuthorization(d->m_initialCredential.user(), d->m_initialCredential.password()); 482 d->m_user = url.user(); 516 RetainPtr<CFStringRef> user(AdoptCF, d->m_user.createCFString()); 519 CFURLCredentialCreate(kCFAllocatorDefault, user.get(), pass.get(), 0, kCFURLCredentialPersistenceNone)); 529 // FIXME: Per the specification, the user shouldn't be asked for credentials if there were incorrect ones provided explicitly. 579 Credential webCredential(credential.user(), credential.password(), CredentialPersistenceNone); [all...] |
/frameworks/base/core/jni/ |
android_bluetooth_common.cpp | 111 void *user; member in struct:android::__anon14499 127 // The user may not deref the message object. 128 req->user_cb(msg, req->user, req->nat); 145 void *user, 178 pending->user = user; 202 void *user, 215 reply, user, nat,
|
/external/bison/data/ |
glr.cc | 26 # fact, glr.c can replace yacc.c without the user noticing any 46 # user must initialize the first positions (in particular the 206 # Let glr.c believe that the user arguments include the parser itself. 239 /* Copy the first part of user declarations. */
|
/external/qemu/android/ |
looper-generic.c | 234 glooper_io_init(Looper* looper, LoopIo* user, int fd, LoopIoFunc callback, void* opaque) 251 user->impl = io; 252 user->clazz = (LoopIoClass*) &gloopio_class;
|
/external/qemu/android/skin/ |
composer.c | 251 p->surface.done( p->surface.user ); 307 plate->surface.draw( plate->surface.user, r, apos, viewport, 1 ); 316 plate->surface.draw( plate->surface.user, r, apos, viewport, 0);
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | 487 printf("Could not add User-Name\n"); [all...] |
/ndk/sources/host-tools/make-3.81/ |
misc.c | 639 /* Keep track of the user and group IDs for user- and make- access. */ 642 static enum { make, user } current_access; 657 fprintf (stderr, _("%s: user %lu (real %lu), group %lu (real %lu)\n"), 687 user data (i.e., to stat files, or to spawn a child process). */ 696 if (current_access == user) 699 /* We are in "make access" mode. This means that the effective user and 701 We now want to set the effective user and group IDs to the real IDs, 716 /* System V has only the setuid/setgid calls to set user/group IDs. 755 current_access = user; 631 static enum { make, user } current_access; enumerator in enum:__anon16988 [all...] |
/bionic/libc/kernel/common/linux/mtd/ |
mtd.h | 15 #error This is a kernel header. Perhaps include mtd-user.h instead?
|
/development/ndk/platforms/android-3/include/linux/mtd/ |
mtd.h | 15 #error This is a kernel header. Perhaps include mtd-user.h instead?
|
/device/samsung/crespo/libcamera/ |
SecCameraHWInterface.h | 38 void *user);
|
/external/chromium/chrome/browser/ui/webui/ |
new_tab_page_sync_handler.cc | 138 // from the user's perspective are: 166 // User clicked the 'Start now' link to begin syncing. 183 std::string user; local 207 // The only time we set the URL is when the user is synced and we need to 209 // set that URL, HandleSyncLinkClicked won't be called when the user
|
/external/chromium/net/http/ |
http_auth_sspi_win.h | 143 // are both NULL, the credentials for the currently logged in user are used 151 // to act as the user, such as an IIS server retrieiving data from a 178 // If |combined| is of form "FOO\bar", |domain| will contain "FOO" and |user| 180 // If |combined| is of form "bar", |domain| will be empty and |user| will 182 // |domain| and |user| must be non-NULL. 185 string16* user);
|
/external/iproute2/tc/ |
m_ipt.c | 374 set_revision(target->t->u.user.name, target->revision); 378 strcpy(target->t->u.user.name, target->name); 572 m = get_target_name(t->u.user.name); 584 t->u.user.name);
|
/external/kernel-headers/original/asm-arm/ |
memory.h | 34 * TASK_SIZE - the maximum size of a user space task. 42 * The maximum size of a 26-bit user space task. 61 #error Top of user space clashes with start of module space 79 * The limitation of user task size can grow up to the end of free ram region.
|
/external/libpcap/ |
savefile.c | [all...] |
/external/oprofile/module/x86/ |
op_model_athlon.c | 75 CTRL_SET_USR(low, sysctl.ctr[i].user);
|
op_model_ppro.c | 71 CTRL_SET_USR(low, sysctl.ctr[i].user);
|
/external/ppp/pppd/ |
pppd.h | 138 #define OPT_PRIVFIX 0x2000000 /* user can't override if set by root */ 230 extern GIDSET_TYPE groups[NGROUPS_MAX]; /* groups the user is in */ 291 extern char user[MAXNAMELEN];/* Our name for authenticating ourselves */ 304 extern bool holdoff_specified; /* true if user gave a holdoff value */ 677 int options_from_user __P((void)); /* Parse options from user's .ppprc */ 703 extern int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp, 707 extern int (*pap_passwd_hook) __P((char *user, char *passwd)); 714 extern int (*chap_passwd_hook) __P((char *user, char *passwd)); 760 * System dependent definitions for user-level 4.3BSD UNIX implementation. [all...] |