/external/openssh/openbsd-compat/ |
bsd-getpeereid.c | 30 struct ucred cred; local 31 socklen_t len = sizeof(cred); 33 if (getsockopt(s, SOL_SOCKET, SO_PEERCRED, &cred, &len) < 0) 35 *euid = cred.uid; 36 *gid = cred.gid;
|
/cts/tests/tests/net/src/android/net/cts/ |
CredentialsTest.java | 27 Credentials cred = new Credentials(0, 0, 0); local 28 assertEquals(0, cred.getGid()); 29 assertEquals(0, cred.getPid()); 30 assertEquals(0, cred.getUid()); 33 cred = new Credentials(Integer.MAX_VALUE, Integer.MAX_VALUE, Integer.MAX_VALUE); 34 assertEquals(Integer.MAX_VALUE, cred.getGid()); 35 assertEquals(Integer.MAX_VALUE, cred.getPid()); 36 assertEquals(Integer.MAX_VALUE, cred.getUid()); 39 cred = new Credentials(Integer.MIN_VALUE, Integer.MIN_VALUE, Integer.MIN_VALUE); 40 assertEquals(Integer.MIN_VALUE, cred.getGid()) [all...] |
/external/apache-harmony/auth/src/test/java/common/javax/security/auth/x500/ |
X500PrivateCredentialTest.java | 157 X500PrivateCredential cred= new X500PrivateCredential(cert, key); local 158 X509Certificate c= cred.getCertificate(); 163 X500PrivateCredential cred= new X500PrivateCredential(cert, key); local 164 PrivateKey k= cred.getPrivateKey(); 169 X500PrivateCredential cred= new X500PrivateCredential(cert, key); local 170 cred.destroy(); 171 assertTrue(cred.isDestroyed()); 175 X500PrivateCredential cred= new X500PrivateCredential(cert, key); local 176 cred.destroy(); 177 String al= cred.getAlias() 182 X500PrivateCredential cred= new X500PrivateCredential(cert, key, "ALIAS"); local [all...] |
/system/core/libcutils/ |
uevent.c | 75 struct ucred *cred = (struct ucred *)CMSG_DATA(cmsg); local 76 *user = cred->uid; 77 if (cred->uid != 0) {
|
/external/chromium/chrome/browser/ |
crash_handler_host_linux.cc | 208 const struct ucred *cred = local 210 crashing_pid = cred->pid;
|
/external/chromium_org/components/breakpad/browser/ |
crash_handler_host_linux.cc | 246 const struct ucred *cred = local 248 crashing_pid = cred->pid;
|
/external/ipsec-tools/src/racoon/ |
gssapi.c | 191 gss_buffer_t cred = &cred_token; local 232 maj_stat = gss_export_name(&min_stat, canon_princ, cred); 249 cred->length, cred->value); 252 maj_stat = gss_release_buffer(&min_stat, cred); 254 gssapi_error(min_stat, LOCATION, "release cred buffer\n"); 259 gssapi_error(min_stat, LOCATION, "acquire cred\n");
|
/external/jpeg/ |
jdmerge.c | 255 register int y, cred, cgreen, cblue; local 277 cred = Crrtab[cr]; 282 outptr[RGB_RED] = range_limit[y + cred]; 287 outptr[RGB_RED] = range_limit[y + cred]; 296 cred = Crrtab[cr]; 300 outptr[RGB_RED] = range_limit[y + cred]; 314 register int y, cred, cgreen, cblue; local 338 cred = Crrtab[cr]; 343 r = range_limit[y + cred]; 348 r = range_limit[y + cred]; 378 register int y, cred, cgreen, cblue; local 452 register int y, cred, cgreen, cblue; local 528 register int y, cred, cgreen, cblue; local 613 register int y, cred, cgreen, cblue; local [all...] |
/external/qemu/distrib/jpeg-6b/ |
jdmerge.c | 255 register int y, cred, cgreen, cblue; local 277 cred = Crrtab[cr]; 282 outptr[RGB_RED] = range_limit[y + cred]; 287 outptr[RGB_RED] = range_limit[y + cred]; 296 cred = Crrtab[cr]; 300 outptr[RGB_RED] = range_limit[y + cred]; 314 register int y, cred, cgreen, cblue; local 338 cred = Crrtab[cr]; 343 r = range_limit[y + cred]; 348 r = range_limit[y + cred]; 378 register int y, cred, cgreen, cblue; local 452 register int y, cred, cgreen, cblue; local 528 register int y, cred, cgreen, cblue; local 613 register int y, cred, cgreen, cblue; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_internal.c | 160 struct tlsv1_credentials *cred; local 165 cred = tlsv1_cred_alloc(); 166 if (cred == NULL) 169 if (tlsv1_set_ca_cert(cred, params->ca_cert, 174 tlsv1_cred_free(cred); 178 if (tlsv1_set_cert(cred, params->client_cert, 183 tlsv1_cred_free(cred); 187 if (tlsv1_set_private_key(cred, params->private_key, 192 tlsv1_cred_free(cred); 196 if (tlsv1_set_dhparams(cred, params->dh_file, params->dh_blob 223 struct tlsv1_credentials *cred; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_i.h | 61 struct tlsv1_credentials *cred; member in struct:tlsv1_client
|
tlsv1_cred.c | 20 struct tlsv1_credentials *cred; local 21 cred = os_zalloc(sizeof(*cred)); 22 return cred; 26 void tlsv1_cred_free(struct tlsv1_credentials *cred) 28 if (cred == NULL) 31 x509_certificate_chain_free(cred->trusted_certs); 32 x509_certificate_chain_free(cred->cert); 33 crypto_private_key_free(cred->key); 34 os_free(cred->dh_p) [all...] |
tlsv1_server_i.h | 43 struct tlsv1_credentials *cred; member in struct:tlsv1_server
|
/external/wpa_supplicant_8/src/wps/ |
wps_common.c | 378 struct wps_credential cred; local 383 os_memset(&cred, 0, sizeof(cred)); 384 os_memcpy(cred.ssid, wps->ssid, wps->ssid_len); 385 cred.ssid_len = wps->ssid_len; 386 cred.auth_type = WPS_AUTH_WPAPSK | WPS_AUTH_WPA2PSK; 387 cred.encr_type = WPS_ENCR_TKIP | WPS_ENCR_AES; 388 os_memcpy(cred.key, data.new_psk, data.new_psk_len); 389 cred.key_len = data.new_psk_len; 396 wps->cred_cb(wps->cb_ctx, &cred); [all...] |
wps_enrollee.c | 637 static int wps_process_cred_e(struct wps_data *wps, const u8 *cred, 645 os_memset(&wps->cred, 0, sizeof(wps->cred)); 646 wpabuf_set(&msg, cred, cred_len); 648 wps_process_cred(&attr, &wps->cred)) 651 if (os_memcmp(wps->cred.mac_addr, wps->wps->dev.mac_addr, ETH_ALEN) != 655 ")", MAC2STR(wps->cred.mac_addr), 674 if (!(wps->cred.encr_type & 676 if (wps->cred.encr_type & WPS_ENCR_WEP) { 684 "invalid encr_type 0x%x", wps->cred.encr_type) 741 struct wps_credential cred; local [all...] |
wps_er.h | 30 struct wps_credential *cred; member in struct:wps_er_sta
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpc/ |
key_prot.h | 159 unixcred cred; member in union:getcredres::__anon37924
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpcsvc/ |
key_prot.h | 109 unixcred cred; member in union:getcredres::__anon37937
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/rpc/ |
key_prot.h | 159 unixcred cred; member in union:getcredres::__anon39515
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/ |
key_prot.h | 109 unixcred cred; member in union:getcredres::__anon39528
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/rpc/ |
key_prot.h | 159 unixcred cred; member in union:getcredres::__anon41029
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/rpcsvc/ |
key_prot.h | 109 unixcred cred; member in union:getcredres::__anon41042
|
/external/chromium/third_party/libjingle/source/talk/base/ |
schanneladapter.cc | 99 CredHandle cred; member in struct:talk_base::SChannelAdapter::SSLImpl 153 &sc_cred, NULL, NULL, &impl_->cred, NULL); 163 ret = QueryCredentialsAttributes(&impl_->cred, 173 ret = QueryCredentialsAttributes(&impl_->cred, 194 ret = InitializeSecurityContextA(&impl_->cred, NULL, 222 ret = InitializeSecurityContextA(&impl_->cred, &impl_->ctx, 396 FreeCredentialsHandle(&impl_->cred);
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
schanneladapter.cc | 99 CredHandle cred; member in struct:talk_base::SChannelAdapter::SSLImpl 153 &sc_cred, NULL, NULL, &impl_->cred, NULL); 163 ret = QueryCredentialsAttributes(&impl_->cred, 173 ret = QueryCredentialsAttributes(&impl_->cred, 194 ret = InitializeSecurityContextA(&impl_->cred, NULL, 222 ret = InitializeSecurityContextA(&impl_->cred, &impl_->ctx, 393 FreeCredentialsHandle(&impl_->cred);
|
/external/iproute2/misc/ |
ifstat.c | 539 struct ucred cred; local 540 socklen_t olen = sizeof(cred); 542 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, (void*)&cred, &olen) || 543 olen < sizeof(cred)) 545 if (cred.uid == getuid() || cred.uid == 0)
|