HomeSort by relevance Sort by last modified time
    Searched refs:user (Results 601 - 625 of 979) sorted by null

<<21222324252627282930>>

  /external/dbus/dbus/
dbus-sysdeps-util-unix.c 295 * Verify that after the fork we can successfully change to this user.
297 * @param user the username given in the daemon configuration
301 _dbus_verify_daemon_user (const char *user)
305 _dbus_string_init_const (&u, user);
314 * Changes the user and group the bus is running as.
316 * @param user the user to become
321 _dbus_change_to_daemon_user (const char *user,
328 _dbus_string_init_const (&u, user);
333 "User '%s' does not appear to exist?"
    [all...]
  /external/ipsec-tools/src/racoon/
admin.c 331 char user[LOGINLEN+1]; local
340 memcpy(user, (char *)(com + 1), len);
341 user[len] = 0;
343 found = purgeph1bylogin(user);
345 "deleted %d SA for user \"%s\"\n", found, user);
  /external/iptables/libiptc/
libip6tc.c 5 * Chains go INPUT, FORWARD, OUTPUT then user chains.
6 * Each user chain starts with an ERROR node.
7 * Every chain ends with an unconditional jump: a RETURN for user chains,
187 printf("Target name: `%s' [%u]\n", t->u.user.name, t->u.target_size);
188 if (strcmp(t->u.user.name, IP6T_STANDARD_TARGET) == 0) {
199 } else if (strcmp(t->u.user.name, IP6T_ERROR_TARGET) == 0)
268 unsigned int user_offset; /* Offset of first user chain */
379 /* User chain == end of last builtin + policy entry */
403 assert(strcmp(t->target.u.user.name, STANDARD_TARGET)==0);
434 ->u.user.name
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sake.c 316 /* TODO: update identity and select new user data */
356 if (sm->user == NULL || sm->user->password == NULL ||
357 sm->user->password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
364 eap_sake_derive_keys(sm->user->password,
365 sm->user->password + EAP_SAKE_ROOT_SECRET_LEN,
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sake.c 317 /* TODO: update identity and select new user data */
357 if (sm->user == NULL || sm->user->password == NULL ||
358 sm->user->password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
365 eap_sake_derive_keys(sm->user->password,
366 sm->user->password + EAP_SAKE_ROOT_SECRET_LEN,
  /libcore/luni/src/test/java/org/apache/harmony/xnet/provider/jsse/
TrustedCertificateStoreTest.java 570 boolean user = TrustedCertificateStore.isUser(alias);
571 if (system || user) {
573 assertEquals(user, store.userAliases().contains(alias));
585 private static String alias(boolean user, X509Certificate x, int index) {
586 String prefix = user ? "user:" : "system:";
  /system/core/toolbox/
top.c 415 struct passwd *user; local
442 printf("User %ld%%, System %ld%%, IOW %ld%%, IRQ %ld%%\n",
448 printf("User %ld + Nice %ld + Sys %ld + Idle %ld + IOW %ld + IRQ %ld + SIRQ %ld = %ld\n",
468 user = getpwuid(proc->uid);
470 if (user && user->pw_name) {
471 user_str = user->pw_name;
  /external/webkit/Source/WebCore/platform/network/cf/
ResourceHandleCFNet.cpp 127 static String encodeBasicAuthorization(const String& user, const String& password)
129 return base64Encode((user + ":" + password).utf8());
425 String authHeader = "Basic " + encodeBasicAuthorization(d->m_initialCredential.user(), d->m_initialCredential.password());
482 d->m_user = url.user();
516 RetainPtr<CFStringRef> user(AdoptCF, d->m_user.createCFString());
519 CFURLCredentialCreate(kCFAllocatorDefault, user.get(), pass.get(), 0, kCFURLCredentialPersistenceNone));
529 // FIXME: Per the specification, the user shouldn't be asked for credentials if there were incorrect ones provided explicitly.
579 Credential webCredential(credential.user(), credential.password(), CredentialPersistenceNone);
    [all...]
  /frameworks/base/core/jni/
android_bluetooth_common.cpp 111 void *user; member in struct:android::__anon14499
127 // The user may not deref the message object.
128 req->user_cb(msg, req->user, req->nat);
145 void *user,
178 pending->user = user;
202 void *user,
215 reply, user, nat,
  /external/bison/data/
glr.cc 26 # fact, glr.c can replace yacc.c without the user noticing any
46 # user must initialize the first positions (in particular the
206 # Let glr.c believe that the user arguments include the parser itself.
239 /* Copy the first part of user declarations. */
  /external/qemu/android/
looper-generic.c 234 glooper_io_init(Looper* looper, LoopIo* user, int fd, LoopIoFunc callback, void* opaque)
251 user->impl = io;
252 user->clazz = (LoopIoClass*) &gloopio_class;
  /external/qemu/android/skin/
composer.c 251 p->surface.done( p->surface.user );
307 plate->surface.draw( plate->surface.user, r, apos, viewport, 1 );
316 plate->surface.draw( plate->surface.user, r, apos, viewport, 0);
  /external/wpa_supplicant_8/src/ap/
ieee802_1x.c 487 printf("Could not add User-Name\n");
    [all...]
  /ndk/sources/host-tools/make-3.81/
misc.c 639 /* Keep track of the user and group IDs for user- and make- access. */
642 static enum { make, user } current_access;
657 fprintf (stderr, _("%s: user %lu (real %lu), group %lu (real %lu)\n"),
687 user data (i.e., to stat files, or to spawn a child process). */
696 if (current_access == user)
699 /* We are in "make access" mode. This means that the effective user and
701 We now want to set the effective user and group IDs to the real IDs,
716 /* System V has only the setuid/setgid calls to set user/group IDs.
755 current_access = user;
631 static enum { make, user } current_access; enumerator in enum:__anon16988
    [all...]
  /bionic/libc/kernel/common/linux/mtd/
mtd.h 15 #error This is a kernel header. Perhaps include mtd-user.h instead?
  /development/ndk/platforms/android-3/include/linux/mtd/
mtd.h 15 #error This is a kernel header. Perhaps include mtd-user.h instead?
  /device/samsung/crespo/libcamera/
SecCameraHWInterface.h 38 void *user);
  /external/chromium/chrome/browser/ui/webui/
new_tab_page_sync_handler.cc 138 // from the user's perspective are:
166 // User clicked the 'Start now' link to begin syncing.
183 std::string user; local
207 // The only time we set the URL is when the user is synced and we need to
209 // set that URL, HandleSyncLinkClicked won't be called when the user
  /external/chromium/net/http/
http_auth_sspi_win.h 143 // are both NULL, the credentials for the currently logged in user are used
151 // to act as the user, such as an IIS server retrieiving data from a
178 // If |combined| is of form "FOO\bar", |domain| will contain "FOO" and |user|
180 // If |combined| is of form "bar", |domain| will be empty and |user| will
182 // |domain| and |user| must be non-NULL.
185 string16* user);
  /external/iproute2/tc/
m_ipt.c 374 set_revision(target->t->u.user.name, target->revision);
378 strcpy(target->t->u.user.name, target->name);
572 m = get_target_name(t->u.user.name);
584 t->u.user.name);
  /external/kernel-headers/original/asm-arm/
memory.h 34 * TASK_SIZE - the maximum size of a user space task.
42 * The maximum size of a 26-bit user space task.
61 #error Top of user space clashes with start of module space
79 * The limitation of user task size can grow up to the end of free ram region.
  /external/libpcap/
savefile.c     [all...]
  /external/oprofile/module/x86/
op_model_athlon.c 75 CTRL_SET_USR(low, sysctl.ctr[i].user);
op_model_ppro.c 71 CTRL_SET_USR(low, sysctl.ctr[i].user);
  /external/ppp/pppd/
pppd.h 138 #define OPT_PRIVFIX 0x2000000 /* user can't override if set by root */
230 extern GIDSET_TYPE groups[NGROUPS_MAX]; /* groups the user is in */
291 extern char user[MAXNAMELEN];/* Our name for authenticating ourselves */
304 extern bool holdoff_specified; /* true if user gave a holdoff value */
677 int options_from_user __P((void)); /* Parse options from user's .ppprc */
703 extern int (*pap_auth_hook) __P((char *user, char *passwd, char **msgp,
707 extern int (*pap_passwd_hook) __P((char *user, char *passwd));
714 extern int (*chap_passwd_hook) __P((char *user, char *passwd));
760 * System dependent definitions for user-level 4.3BSD UNIX implementation.
    [all...]

Completed in 492 milliseconds

<<21222324252627282930>>