Home
last modified time | relevance | path

Searched refs:user_name (Results 1 - 20 of 20) sorted by relevance

/third_party/selinux/libsepol/tests/
H A Dtest-expander-users.c32 static void check_user_roles(policydb_t * p, const char *user_name, const char **role_names, int num_roles) in check_user_roles() argument
41 user = (user_datum_t *) hashtab_search(p->p_users.table, user_name); in check_user_roles()
43 printf("%s not found\n", user_name); in check_user_roles()
61 printf("role %s associated with user %s %d times\n", role_names[j], user_name, found[j]); in check_user_roles()
/third_party/mbedtls/programs/ssl/
H A Dssl_mail_client.c86 " user_name=%%s default: \"" DFL_USER_NAME "\"\n" \
129 const char *user_name; /* username to use for authentication */ member
389 opt.user_name = DFL_USER_NAME; in main()
424 } else if (strcmp(p, "user_name") == 0) { in main()
425 opt.user_name = q; in main()
687 mbedtls_printf(" > Write username to server: %s", opt.user_name); in main()
690 ret = mbedtls_base64_encode(base, sizeof(base), &n, (const unsigned char *) opt.user_name, in main()
691 strlen(opt.user_name)); in main()
/third_party/node/deps/openssl/openssl/crypto/property/
H A Dproperty_parse.c62 int user_name = 0; in parse_name() local
78 user_name = 1; in parse_name()
91 *idx = ossl_property_name(ctx, name, user_name && create); in parse_name()
/third_party/openssl/crypto/property/
H A Dproperty_parse.c62 int user_name = 0; in parse_name() local
78 user_name = 1; in parse_name()
91 *idx = ossl_property_name(ctx, name, user_name && create); in parse_name()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/
H A Dradius_das.h31 const u8 *user_name; member
H A Dradius_das.c125 attrs.user_name = buf; in radius_das_disconnect()
290 attrs.user_name = buf; in radius_das_coa()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/
H A Dradius_das.h31 const u8 *user_name; member
H A Dradius_das.c125 attrs.user_name = buf; in radius_das_disconnect()
290 attrs.user_name = buf; in radius_das_coa()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_ttls.c161 u8 *user_name; member
256 parse->user_name = dpos; in eap_ttls_avp_parse()
1044 if (parse.user_name) { in eap_ttls_process_phase2()
1049 parse.user_name, in eap_ttls_process_phase2()
1056 sm->identity = os_memdup(parse.user_name, parse.user_name_len); in eap_ttls_process_phase2()
1062 if (eap_user_get(sm, parse.user_name, parse.user_name_len, 1) in eap_ttls_process_phase2()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_ttls.c161 u8 *user_name; member
256 parse->user_name = dpos; in eap_ttls_avp_parse()
1052 if (parse.user_name) { in eap_ttls_process_phase2()
1057 parse.user_name, in eap_ttls_process_phase2()
1064 sm->identity = os_memdup(parse.user_name, parse.user_name_len); in eap_ttls_process_phase2()
1070 if (eap_user_get(sm, parse.user_name, parse.user_name_len, 1) in eap_ttls_process_phase2()
/third_party/pulseaudio/src/modules/
H A Dmodule-tunnel.c271 char *user_name; member
1082 if (!u->server_fqdn || !u->user_name || !u->device_description) in update_description()
1085 d = pa_sprintf_malloc("%s on %s@%s", u->device_description, u->user_name, u->server_fqdn); in update_description()
1089 pa_proplist_sets(u->sink->proplist, "tunnel.remote.user", u->user_name); in update_description()
1094 pa_proplist_sets(u->source->proplist, "tunnel.remote.user", u->user_name); in update_description()
1124 const char *server_name, *server_version, *user_name, *host_name, *default_sink_name, *default_source_name; in server_info_cb() local
1140 pa_tagstruct_gets(t, &user_name) < 0 || in server_info_cb()
1160 pa_xfree(u->user_name); in server_info_cb()
1161 u->user_name = pa_xstrdup(user_name); in server_info_cb()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dpmksa_cache_auth.c588 if (attr->user_name) { in das_attr_match()
591 os_memcmp(attr->user_name, entry->identity, in das_attr_match()
H A Dhostapd.c926 if (attr->user_name) { in hostapd_das_find_sta()
940 os_memcmp(identity, attr->user_name, identity_len) in hostapd_das_find_sta()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dpmksa_cache_auth.c582 if (attr->user_name) { in das_attr_match()
585 os_memcmp(attr->user_name, entry->identity, in das_attr_match()
H A Dhostapd.c887 if (attr->user_name) { in hostapd_das_find_sta()
901 os_memcmp(identity, attr->user_name, identity_len) in hostapd_das_find_sta()
/third_party/pulseaudio/src/pulse/
H A Dintrospect.h443 const char *user_name; /**< User name of the daemon process */ member
H A Dintrospect.c103 pa_tagstruct_gets(t, &i.user_name) < 0 || in context_get_server_info_callback()
/third_party/pulseaudio/src/utils/
H A Dpactl.c271 pa_json_encoder_add_member_string(encoder, "user_name", i->user_name); in get_server_info_callback()
310 i->user_name, in get_server_info_callback()
/third_party/python/Modules/
H A Dposixmodule.c7996 wchar_t user_name[UNLEN + 1]; in os_getlogin_impl() local
7997 DWORD num_chars = Py_ARRAY_LENGTH(user_name); in os_getlogin_impl()
7999 if (GetUserNameW(user_name, &num_chars)) { in os_getlogin_impl()
8001 result = PyUnicode_FromWideChar(user_name, num_chars - 1); in os_getlogin_impl()
/third_party/python/Lib/test/
H A Dtest_os.py3318 user_name = os.getlogin()
3319 self.assertNotEqual(len(user_name), 0)

Completed in 51 milliseconds