/third_party/selinux/libsepol/tests/ |
H A D | test-expander-users.c | 32 static void check_user_roles(policydb_t * p, const char *user_name, const char **role_names, int num_roles) in check_user_roles() argument 41 user = (user_datum_t *) hashtab_search(p->p_users.table, user_name); in check_user_roles() 43 printf("%s not found\n", user_name); in check_user_roles() 61 printf("role %s associated with user %s %d times\n", role_names[j], user_name, found[j]); in check_user_roles()
|
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_mail_client.c | 86 " user_name=%%s default: \"" DFL_USER_NAME "\"\n" \ 129 const char *user_name; /* username to use for authentication */ member 389 opt.user_name = DFL_USER_NAME; in main() 424 } else if (strcmp(p, "user_name") == 0) { in main() 425 opt.user_name = q; in main() 687 mbedtls_printf(" > Write username to server: %s", opt.user_name); in main() 690 ret = mbedtls_base64_encode(base, sizeof(base), &n, (const unsigned char *) opt.user_name, in main() 691 strlen(opt.user_name)); in main()
|
/third_party/node/deps/openssl/openssl/crypto/property/ |
H A D | property_parse.c | 62 int user_name = 0; in parse_name() local 78 user_name = 1; in parse_name() 91 *idx = ossl_property_name(ctx, name, user_name && create); in parse_name()
|
/third_party/openssl/crypto/property/ |
H A D | property_parse.c | 62 int user_name = 0; in parse_name() local 78 user_name = 1; in parse_name() 91 *idx = ossl_property_name(ctx, name, user_name && create); in parse_name()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
H A D | radius_das.h | 31 const u8 *user_name; member
|
H A D | radius_das.c | 125 attrs.user_name = buf; in radius_das_disconnect() 290 attrs.user_name = buf; in radius_das_coa()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
H A D | radius_das.h | 31 const u8 *user_name; member
|
H A D | radius_das.c | 125 attrs.user_name = buf; in radius_das_disconnect() 290 attrs.user_name = buf; in radius_das_coa()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_ttls.c | 161 u8 *user_name; member 256 parse->user_name = dpos; in eap_ttls_avp_parse() 1044 if (parse.user_name) { in eap_ttls_process_phase2() 1049 parse.user_name, in eap_ttls_process_phase2() 1056 sm->identity = os_memdup(parse.user_name, parse.user_name_len); in eap_ttls_process_phase2() 1062 if (eap_user_get(sm, parse.user_name, parse.user_name_len, 1) in eap_ttls_process_phase2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_ttls.c | 161 u8 *user_name; member 256 parse->user_name = dpos; in eap_ttls_avp_parse() 1052 if (parse.user_name) { in eap_ttls_process_phase2() 1057 parse.user_name, in eap_ttls_process_phase2() 1064 sm->identity = os_memdup(parse.user_name, parse.user_name_len); in eap_ttls_process_phase2() 1070 if (eap_user_get(sm, parse.user_name, parse.user_name_len, 1) in eap_ttls_process_phase2()
|
/third_party/pulseaudio/src/modules/ |
H A D | module-tunnel.c | 271 char *user_name; member 1082 if (!u->server_fqdn || !u->user_name || !u->device_description) in update_description() 1085 d = pa_sprintf_malloc("%s on %s@%s", u->device_description, u->user_name, u->server_fqdn); in update_description() 1089 pa_proplist_sets(u->sink->proplist, "tunnel.remote.user", u->user_name); in update_description() 1094 pa_proplist_sets(u->source->proplist, "tunnel.remote.user", u->user_name); in update_description() 1124 const char *server_name, *server_version, *user_name, *host_name, *default_sink_name, *default_source_name; in server_info_cb() local 1140 pa_tagstruct_gets(t, &user_name) < 0 || in server_info_cb() 1160 pa_xfree(u->user_name); in server_info_cb() 1161 u->user_name = pa_xstrdup(user_name); in server_info_cb() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | pmksa_cache_auth.c | 588 if (attr->user_name) { in das_attr_match() 591 os_memcmp(attr->user_name, entry->identity, in das_attr_match()
|
H A D | hostapd.c | 926 if (attr->user_name) { in hostapd_das_find_sta() 940 os_memcmp(identity, attr->user_name, identity_len) in hostapd_das_find_sta()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | pmksa_cache_auth.c | 582 if (attr->user_name) { in das_attr_match() 585 os_memcmp(attr->user_name, entry->identity, in das_attr_match()
|
H A D | hostapd.c | 887 if (attr->user_name) { in hostapd_das_find_sta() 901 os_memcmp(identity, attr->user_name, identity_len) in hostapd_das_find_sta()
|
/third_party/pulseaudio/src/pulse/ |
H A D | introspect.h | 443 const char *user_name; /**< User name of the daemon process */ member
|
H A D | introspect.c | 103 pa_tagstruct_gets(t, &i.user_name) < 0 || in context_get_server_info_callback()
|
/third_party/pulseaudio/src/utils/ |
H A D | pactl.c | 271 pa_json_encoder_add_member_string(encoder, "user_name", i->user_name); in get_server_info_callback() 310 i->user_name, in get_server_info_callback()
|
/third_party/python/Modules/ |
H A D | posixmodule.c | 7996 wchar_t user_name[UNLEN + 1]; in os_getlogin_impl() local 7997 DWORD num_chars = Py_ARRAY_LENGTH(user_name); in os_getlogin_impl() 7999 if (GetUserNameW(user_name, &num_chars)) { in os_getlogin_impl() 8001 result = PyUnicode_FromWideChar(user_name, num_chars - 1); in os_getlogin_impl()
|
/third_party/python/Lib/test/ |
H A D | test_os.py | 3318 user_name = os.getlogin() 3319 self.assertNotEqual(len(user_name), 0)
|