/third_party/libwebsockets/lib/jose/ |
H A D | private-lib-jose.h | 48 void *user);
|
/third_party/libwebsockets/lib/abstract/ |
H A D | private-lib-abstract.h | 33 void *user; member
|
/third_party/jerryscript/tests/debugger/ |
H A D | do_variables.js | 38 var user = {
|
/third_party/nghttp2/src/ |
H A D | shrpx.h | 48 inline int initgroups(const char *user, gid_t group) { return 0; } in initgroups() argument
|
/third_party/rust/crates/clap/tests/derive_ui/ |
H A D | flatten_and_methods.rs | 14 user: String,
|
/kernel/linux/linux-6.6/arch/riscv/kernel/ |
H A D | traps.c | 254 bool user = user_mode(regs); in probe_single_step_handler() local 256 return user ? uprobe_single_step_handler(regs) : kprobe_single_step_handler(regs); in probe_single_step_handler() 261 bool user = user_mode(regs); in probe_breakpoint_handler() local 263 return user ? uprobe_breakpoint_handler(regs) : kprobe_breakpoint_handler(regs); in probe_breakpoint_handler()
|
/kernel/linux/linux-6.6/drivers/gpu/drm/nouveau/nvkm/falcon/ |
H A D | fw.c | 52 if (nvkm_printk_ok(falcon->owner, falcon->user, NV_DBG_TRACE)) { in nvkm_falcon_fw_patch() 74 nvkm_falcon_fw_boot(struct nvkm_falcon_fw *fw, struct nvkm_subdev *user, in nvkm_falcon_fw_boot() argument 80 ret = nvkm_falcon_get(falcon, user); in nvkm_falcon_fw_boot() 115 nvkm_falcon_put(falcon, user); in nvkm_falcon_fw_boot()
|
/third_party/libwebsockets/lib/event-libs/libev/ |
H A D | libev.c | 137 elops_listen_init_ev(struct lws_dll2 *d, void *user) in elops_listen_init_ev() argument 140 struct lws_context *context = (struct lws_context *)user; in elops_listen_init_ev() 241 elops_listen_destroy_ev(struct lws_dll2 *d, void *user) in elops_listen_destroy_ev() argument 244 struct lws_context *context = (struct lws_context *)user; in elops_listen_destroy_ev()
|
/third_party/ntfs-3g/libfuse-lite/ |
H A D | fusermount.c | 113 perror("dropping user privilege failed"); in drop_privs() 300 const char *user = get_user_name(); in get_mnt_opts() local 301 if (user == NULL) in get_mnt_opts() 304 if (add_option(mnt_optsp, "user=", strlen(user)) == -1) in get_mnt_opts() 306 strcat(*mnt_optsp, user); in get_mnt_opts() 508 fprintf(stderr, "%s: mountpoint %s not owned by user\n", in check_perm() 515 fprintf(stderr, "%s: user has no write access to mountpoint %s\n", in check_perm()
|
/third_party/ninja/src/ |
H A D | build_log.cc | 131 bool BuildLog::OpenForWrite(const string& path, const BuildLogUser& user,
in OpenForWrite() argument 134 if (!Recompact(path, user, err))
in OpenForWrite() 392 bool BuildLog::Recompact(const string& path, const BuildLogUser& user,
in Recompact() argument 412 if (user.IsPathDead(i->first)) {
in Recompact()
|
/third_party/libwebsockets/lib/secure-streams/ |
H A D | private-lib-secure-streams.h | 191 uint8_t txn_resp_set:1; /**< user code set one */ 228 /* the user object allocation is immediately after the ss object allocation */ 447 lws_ss_destroy_dll(struct lws_dll2 *d, void *user); 450 lws_sspc_destroy_dll(struct lws_dll2 *d, void *user); 544 lws_ss_cancel_notify_dll(struct lws_dll2 *d, void *user); 547 lws_sspc_cancel_notify_dll(struct lws_dll2 *d, void *user);
|
/third_party/mesa3d/src/gallium/auxiliary/draw/ |
H A D | draw_pt_fetch_shade_pipeline.c | 273 draw->pt.user.vs_constants, in fetch_pipeline_generic() 274 draw->pt.user.vs_constants_size, in fetch_pipeline_generic() 289 draw->pt.user.gs_constants, in fetch_pipeline_generic() 290 draw->pt.user.gs_constants_size, in fetch_pipeline_generic()
|
/third_party/python/Tools/msi/ |
H A D | uploadrelease.bat | 21 if "%1" EQU "--user" (set USER=%~2) && shift && shift && goto CheckOpts
99 echo uploadrelease.bat --host HOST --user USERNAME [--target TARGET] [--dry-run] [-h]
102 echo --user (-u) Specify the user on the host (required)
|
/third_party/skia/third_party/externals/microhttpd/src/microhttpd/ |
H A D | digestauth.c | 364 char user[MAX_USERNAME_LENGTH]; in MHD_digest_auth_get_username() local 374 if (0 == (len = lookup_sub_value (user, in MHD_digest_auth_get_username() 375 sizeof (user), in MHD_digest_auth_get_username() 379 return strdup (user); in MHD_digest_auth_get_username() 790 * @param opaque string to user for opaque value
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-subzero/lib/Support/ |
H A D | Timer.cpp | 124 std::chrono::nanoseconds user, sys; in getCurrentTime() local 128 sys::Process::GetTimeUsage(now, user, sys); in getCurrentTime() 130 sys::Process::GetTimeUsage(now, user, sys); in getCurrentTime() 135 Result.UserTime = Seconds(user).count(); in getCurrentTime() 387 printJSONValue(OS, R, ".user", T.getUserTime()); in printJSONValues()
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Support/ |
H A D | Timer.cpp | 122 std::chrono::nanoseconds user, sys; in getCurrentTime() local 126 sys::Process::GetTimeUsage(now, user, sys); in getCurrentTime() 128 sys::Process::GetTimeUsage(now, user, sys); in getCurrentTime() 133 Result.UserTime = Seconds(user).count(); in getCurrentTime() 422 printJSONValue(OS, R, ".user", T.getUserTime()); in printJSONValues()
|
/third_party/skia/third_party/externals/tint/src/transform/ |
H A D | module_scope_var_to_entry_point_param.cc | 270 for (auto* user : var->Users()) { in Process() 271 if (user->Stmt()->Function()->Declaration() == func_ast) { in Process() 278 user->Declaration()->As<ast::IdentifierExpression>(); in Process() 286 ctx.Replace(user->Declaration(), expr); in Process()
|
/third_party/spirv-tools/source/opt/ |
H A D | liveness.cpp | 309 def_use_mgr->ForEachUser(var_id, [this, &var](Instruction* user) { in ComputeLiveness() 310 auto op = user->opcode(); in ComputeLiveness() 312 op == spv::Op::OpDecorate || user->IsNonSemanticInstruction()) { in ComputeLiveness() 315 MarkRefLive(user, &var); in ComputeLiveness()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_ikev2.c | 38 "to user identity from EAP-Identity"); in eap_ikev2_get_shared_secret() 43 if (eap_user_get(sm, IDr, IDr_len, 0) < 0 || sm->user == NULL || in eap_ikev2_get_shared_secret() 44 sm->user->password == NULL) { in eap_ikev2_get_shared_secret() 45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found"); in eap_ikev2_get_shared_secret() 49 *secret_len = sm->user->password_len; in eap_ikev2_get_shared_secret() 50 return sm->user->password; in eap_ikev2_get_shared_secret()
|
H A D | eap_server_tls.c | 209 char user[128]; in eap_tls_buildReq() local 212 user_len = os_snprintf(user, sizeof(user), "cert-%s", in eap_tls_buildReq() 214 if (eap_user_get(sm, (const u8 *) user, user_len, in eap_tls_buildReq() 217 "EAP-TLS: No user entry found based on the serial number of the client certificate "); in eap_tls_buildReq() 220 "EAP-TLS: Updated user entry based on the serial number of the client certificate "); in eap_tls_buildReq() 343 /* TODO: Cache serial number with session and update EAP user in eap_tls_process()
|
H A D | eap_server_wsc.c | 116 if (sm->user == NULL || sm->user->password == NULL) { in eap_wsc_init() 127 cfg.pin = sm->user->password; in eap_wsc_init() 128 cfg.pin_len = sm->user->password_len; in eap_wsc_init()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_ikev2.c | 38 "to user identity from EAP-Identity"); in eap_ikev2_get_shared_secret() 43 if (eap_user_get(sm, IDr, IDr_len, 0) < 0 || sm->user == NULL || in eap_ikev2_get_shared_secret() 44 sm->user->password == NULL) { in eap_ikev2_get_shared_secret() 45 wpa_printf(MSG_DEBUG, "EAP-IKEV2: No user entry found"); in eap_ikev2_get_shared_secret() 49 *secret_len = sm->user->password_len; in eap_ikev2_get_shared_secret() 50 return sm->user->password; in eap_ikev2_get_shared_secret()
|
H A D | eap_server_tls.c | 210 char user[128]; in eap_tls_buildReq() local 213 user_len = os_snprintf(user, sizeof(user), "cert-%s", in eap_tls_buildReq() 215 if (eap_user_get(sm, (const u8 *) user, user_len, in eap_tls_buildReq() 218 "EAP-TLS: No user entry found based on the serial number of the client certificate "); in eap_tls_buildReq() 221 "EAP-TLS: Updated user entry based on the serial number of the client certificate "); in eap_tls_buildReq() 311 /* TODO: Cache serial number with session and update EAP user in eap_tls_process()
|
H A D | eap_server_wsc.c | 116 if (sm->user == NULL || sm->user->password == NULL) { in eap_wsc_init() 127 cfg.pin = sm->user->password; in eap_wsc_init() 128 cfg.pin_len = sm->user->password_len; in eap_wsc_init()
|
/kernel/linux/linux-5.10/net/bridge/netfilter/ |
H A D | ebtables.c | 32 * For reading or updating the counters, the user context needs to 506 * if i == NF_BR_NUMHOOKS it must be a user defined chain in ebt_check_entry_size_and_hooks() 522 if (i == NF_BR_NUMHOOKS) /* it's a user defined chain */ in ebt_check_entry_size_and_hooks() 862 udc_cnt = 0; /* will hold the nr. of user defined chains (udc) */ in translate_table() 976 /* the user wants counters back in do_replace_finish() 1029 /* so, a user can change the chains while having messed up her counter in do_replace_finish() 1038 net_warn_ratelimited("ebtables: counters copy to user failed while replacing table\n"); in do_replace_finish() 1402 void __user *user, unsigned int num_counters, in copy_counters_to_user() 1423 if (copy_to_user(user, counterstmp, in copy_counters_to_user() 1431 static int copy_everything_to_user(struct ebt_table *t, void __user *user, in copy_everything_to_user() argument 1400 copy_counters_to_user(struct ebt_table *t, const struct ebt_counter *oldcounters, void __user *user, unsigned int num_counters, unsigned int nentries) copy_counters_to_user() argument 1737 compat_copy_everything_to_user(struct ebt_table *t, void __user *user, int *len, int cmd) compat_copy_everything_to_user() argument 2258 compat_do_ebt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) compat_do_ebt_get_ctl() argument 2331 do_ebt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) do_ebt_get_ctl() argument [all...] |