/base/account/os_account/services/accountmgr/src/ |
H A D | account_info_report.cpp | 26 std::string TransformIntoJson(const std::string &user, int32_t id, ReportEvent event, int32_t result) in TransformIntoJson() argument 33 {"userName", user}, in TransformIntoJson() 47 void AccountInfoReport::ReportSecurityInfo(const std::string &user, int32_t id, ReportEvent event, int32_t result) in ReportSecurityInfo() argument 51 std::string userName = user; in ReportSecurityInfo() 52 if (user.empty()) { in ReportSecurityInfo()
|
/third_party/ltp/testcases/kernel/security/integrity/ima/tests/ |
H A D | ima_measurements.sh | 70 local user="nobody" 71 local dir="$PWD/user" 74 # Default policy does not measure user files 75 tst_res TINFO "verify not measuring user files" 78 if ! id $user >/dev/null 2>/dev/null; then 79 tst_res TCONF "missing system user $user (wrong installation)" 84 chown $user $dir 87 sudo -n -u $user sh -c "echo $(cat /proc/uptime) user fil [all...] |
/third_party/curl/tests/libtest/ |
H A D | lib506.c | 49 struct userdata *user = (struct userdata *)useptr; in my_lock() local 80 printf("lock: %-6s [%s]: %d\n", what, user->text, user->counter); in my_lock() 81 user->counter++; in my_lock() 88 struct userdata *user = (struct userdata *)useptr; in my_unlock() local 116 printf("unlock: %-6s [%s]: %d\n", what, user->text, user->counter); in my_unlock() 117 user->counter++; in my_unlock() 188 struct userdata user; in test() local 190 user in test() [all...] |
/third_party/skia/third_party/externals/freetype/builds/amiga/src/base/ |
H A D | ftsystem.c | 145 return AllocVecPooled( memory->user, size ); in ft_alloc() 147 return Alloc_VecPooled( memory->user, size ); in ft_alloc() 181 new_block = AllocVecPooled ( memory->user, new_size ); in ft_realloc() 183 new_block = Alloc_VecPooled ( memory->user, new_size ); in ft_realloc() 190 FreeVecPooled ( memory->user, block ); in ft_realloc() 192 Free_VecPooled ( memory->user, block ); in ft_realloc() 217 FreeVecPooled( memory->user, block ); in ft_free() 219 Free_VecPooled( memory->user, block ); in ft_free() 488 memory->user = CreatePool( MEMF_SHARED, 16384, 16384 ); in FT_BASE_DEF() 490 memory->user in FT_BASE_DEF() [all...] |
/kernel/linux/linux-5.10/arch/loongarch/kernel/ |
H A D | access-helper.h | 5 static inline int __get_inst(u32 *i, u32 *p, bool user) in __get_inst() argument 7 return user ? get_user(*i, (u32 __user *)p) : get_kernel_nofault(*i, p); in __get_inst() 10 static inline int __get_addr(unsigned long *a, unsigned long *p, bool user) in __get_addr() argument 12 return user ? get_user(*a, (unsigned long __user *)p) : get_kernel_nofault(*a, p); in __get_addr()
|
/kernel/linux/linux-6.6/arch/loongarch/kernel/ |
H A D | access-helper.h | 5 static inline int __get_inst(u32 *i, u32 *p, bool user) in __get_inst() argument 7 return user ? get_user(*i, (u32 __user *)p) : get_kernel_nofault(*i, p); in __get_inst() 10 static inline int __get_addr(unsigned long *a, unsigned long *p, bool user) in __get_addr() argument 12 return user ? get_user(*a, (unsigned long __user *)p) : get_kernel_nofault(*a, p); in __get_addr()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server.c | 147 * eap_user_get - Fetch user information from the database 149 * @identity: Identity (User-Name) of the user 151 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user 154 * This function is used to fetch user information for EAP. The user will be 155 * selected based on the specified identity. sm->user and 156 * sm->user_eap_method_index are updated for the new user when a matching user 157 * is found. sm->user ca 162 struct eap_user *user; eap_user_get() local 1814 eap_user_free(struct eap_user *user) eap_user_free() argument 2101 char hex_challenge[30], hex_response[90], user[100]; eap_server_mschap_rx_callback() local [all...] |
H A D | eap_server_mschapv2.c | 289 const u8 *username, *user; in eap_mschapv2_process_response() local 352 user = name; in eap_mschapv2_process_response() 355 if (user[i] == '\\') { in eap_mschapv2_process_response() 357 user += i + 1; in eap_mschapv2_process_response() 376 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response() 377 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names"); in eap_mschapv2_process_response() 378 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user " in eap_mschapv2_process_response() 380 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user " in eap_mschapv2_process_response() 381 "name", user, user_len); in eap_mschapv2_process_response() 389 if (sm->user in eap_mschapv2_process_response() [all...] |
H A D | eap_server_ttls.c | 532 if (!sm->user || !sm->user->password || sm->user->password_hash || in eap_ttls_process_phase2_pap() 533 !(sm->user->ttls_auth & EAP_TTLS_AUTH_PAP)) { in eap_ttls_process_phase2_pap() 534 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: No plaintext user " in eap_ttls_process_phase2_pap() 540 if (sm->user->password_len != user_password_len || in eap_ttls_process_phase2_pap() 541 os_memcmp_const(sm->user->password, user_password, in eap_ttls_process_phase2_pap() 543 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password"); in eap_ttls_process_phase2_pap() 548 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password"); in eap_ttls_process_phase2_pap() 574 if (!sm->user || !s in eap_ttls_process_phase2_chap() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server.c | 146 * eap_user_get - Fetch user information from the database 148 * @identity: Identity (User-Name) of the user 150 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user 153 * This function is used to fetch user information for EAP. The user will be 154 * selected based on the specified identity. sm->user and 155 * sm->user_eap_method_index are updated for the new user when a matching user 156 * is found. sm->user ca 161 struct eap_user *user; eap_user_get() local 1832 eap_user_free(struct eap_user *user) eap_user_free() argument 2078 char hex_challenge[30], hex_response[90], user[100]; eap_server_mschap_rx_callback() local [all...] |
H A D | eap_server_ttls.c | 533 if (!sm->user || !sm->user->password || sm->user->password_hash || in eap_ttls_process_phase2_pap() 534 !(sm->user->ttls_auth & EAP_TTLS_AUTH_PAP)) { in eap_ttls_process_phase2_pap() 535 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: No plaintext user " in eap_ttls_process_phase2_pap() 541 if (sm->user->password_len != user_password_len || in eap_ttls_process_phase2_pap() 542 os_memcmp_const(sm->user->password, user_password, in eap_ttls_process_phase2_pap() 544 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password"); in eap_ttls_process_phase2_pap() 549 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password"); in eap_ttls_process_phase2_pap() 575 if (!sm->user || !s in eap_ttls_process_phase2_chap() [all...] |
H A D | eap_server_mschapv2.c | 289 const u8 *username, *user; in eap_mschapv2_process_response() local 352 user = name; in eap_mschapv2_process_response() 355 if (user[i] == '\\') { in eap_mschapv2_process_response() 357 user += i + 1; in eap_mschapv2_process_response() 376 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response() 377 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names"); in eap_mschapv2_process_response() 378 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user " in eap_mschapv2_process_response() 380 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user " in eap_mschapv2_process_response() 381 "name", user, user_len); in eap_mschapv2_process_response() 389 if (sm->user in eap_mschapv2_process_response() [all...] |
/kernel/liteos_a/syscall/ |
H A D | process_syscall.c | 117 /* user mode process with privilege of CAP_SCHED_SETPRIORITY can change the priority */ in OsUserTaskSchedulerSet() 644 User *user = OsCurrUserGet(); in SysSetUserID() local 648 user->userID = kuid; in SysSetUserID() 649 user->effUserID = kuid; in SysSetUserID() 686 User *user = OsCurrUserGet(); in SysSetUserID() local 688 user->userID = uid; in SysSetUserID() 689 user->effUserID = uid; in SysSetUserID() 690 /* add process to a user */ in SysSetUserID() 691 } else if (user->userID != uid) { in SysSetUserID() 696 /* add process to a user */ in SysSetUserID() 801 User *user = OsCurrUserGet(); SysSetGroupID() local 843 User *user = NULL; SysSetGroupID() local [all...] |
/kernel/linux/linux-5.10/net/xdp/ |
H A D | xdp_umem.c | 2 /* XDP user-space packet buffer 36 if (umem->user) { in xdp_umem_unaccount_pages() 37 atomic_long_sub(umem->npgs, &umem->user->locked_vm); in xdp_umem_unaccount_pages() 38 free_uid(umem->user); in xdp_umem_unaccount_pages() 139 umem->user = get_uid(current_user()); in xdp_umem_account_pages() 142 old_npgs = atomic_long_read(&umem->user->locked_vm); in xdp_umem_account_pages() 145 free_uid(umem->user); in xdp_umem_account_pages() 146 umem->user = NULL; in xdp_umem_account_pages() 149 } while (atomic_long_cmpxchg(&umem->user->locked_vm, old_npgs, in xdp_umem_account_pages() 211 umem->user in xdp_umem_reg() [all...] |
/kernel/linux/linux-6.6/drivers/gpu/drm/nouveau/dispnv50/ |
H A D | curs507a.c | 38 if (NVIF_TV32(&wndw->wimm.base.user, NV507A, FREE, COUNT, >=, 4)) in curs507a_space() 49 struct nvif_object *user = &wndw->wimm.base.user; in curs507a_update() local 52 NVIF_WR32(user, NV507A, UPDATE, in curs507a_update() 61 struct nvif_object *user = &wndw->wimm.base.user; in curs507a_point() local 64 NVIF_WR32(user, NV507A, SET_CURSOR_HOT_SPOT_POINT_OUT, in curs507a_point() 187 &args, sizeof(args), &wndw->wimm.base.user); in curs507a_new_() 193 nvif_object_map(&wndw->wimm.base.user, NULL, 0); in curs507a_new_()
|
/kernel/linux/linux-6.6/net/xdp/ |
H A D | xdp_umem.c | 2 /* XDP user-space packet buffer 34 if (umem->user) { in xdp_umem_unaccount_pages() 35 atomic_long_sub(umem->npgs, &umem->user->locked_vm); in xdp_umem_unaccount_pages() 36 free_uid(umem->user); in xdp_umem_unaccount_pages() 136 umem->user = get_uid(current_user()); in xdp_umem_account_pages() 139 old_npgs = atomic_long_read(&umem->user->locked_vm); in xdp_umem_account_pages() 142 free_uid(umem->user); in xdp_umem_account_pages() 143 umem->user = NULL; in xdp_umem_account_pages() 146 } while (atomic_long_cmpxchg(&umem->user->locked_vm, old_npgs, in xdp_umem_account_pages() 208 umem->user in xdp_umem_reg() [all...] |
/kernel/linux/linux-5.10/drivers/gpu/drm/nouveau/nvkm/engine/disp/ |
H A D | channv50.c | 89 mthd->name, chan->chid.user); in nv50_disp_chan_mthd() 146 notify->index = chan->chid.user; in nv50_disp_chan_uevent_ctor() 164 return 0x640000 + (chan->chid.user * 0x1000); in nv50_disp_chan_user() 171 const u32 mask = 0x00010001 << chan->chid.user; in nv50_disp_chan_intr() 172 const u32 data = en ? 0x00010000 << chan->chid.user : 0x00000000; in nv50_disp_chan_intr() 181 u64 size, base = chan->func->user(chan, &size); in nv50_disp_chan_rd32() 191 u64 size, base = chan->func->user(chan, &size); in nv50_disp_chan_wr32() 220 *addr = base + chan->func->user(chan, size); in nv50_disp_chan_map() 319 if (chan->chid.user >= 0) in nv50_disp_chan_dtor() 320 disp->chan[chan->chid.user] in nv50_disp_chan_dtor() 338 nv50_disp_chan_new_(const struct nv50_disp_chan_func *func, const struct nv50_disp_chan_mthd *mthd, struct nv50_disp *disp, int ctrl, int user, int head, const struct nvkm_oclass *oclass, struct nvkm_object **pobject) nv50_disp_chan_new_() argument [all...] |
/third_party/typescript/tests/baselines/reference/ |
H A D | checkJsxChildrenProperty9.js | 6 let k2 = <div> <h2> Hello </h2> {(user: any) => <h2>{user.name}</h2>}</div>; 15 var k2 = <div> <h2> Hello </h2> {function (user) { return <h2>{user.name}</h2>; }}</div>;
|
/base/security/dlp_permission_service/services/dlp_permission/sa/test/unittest/src/ |
H A D | permission_policy_test.cpp | 43 void NewUserSample(AuthUserInfo& user) in NewUserSample() argument 45 user.authAccount = "allowAccountA"; in NewUserSample() 46 user.authPerm = FULL_CONTROL; in NewUserSample() 47 user.permExpiryTime = GetCurrentTimeSec() + EXPIRY_TEN_MINUTE; in NewUserSample() 48 user.authAccountType = CLOUD_ACCOUNT; in NewUserSample() 61 AuthUserInfo user; in InitNormalPolicy() local 62 NewUserSample(user); in InitNormalPolicy() 63 policy->authUsers_.emplace_back(user); in InitNormalPolicy() 216 // 1. test user account in HWTEST_F() 217 // auth user accoun in HWTEST_F() 249 AuthUserInfo user; HWTEST_F() local [all...] |
/base/sensors/sensor_lite/services/src/ |
H A D | sensor_service_impl.c | 141 int32_t ActivateSensorImpl(int32_t sensorId, const SensorUser *user)
in ActivateSensorImpl() argument 150 if (user == NULL) {
in ActivateSensorImpl() 151 HILOG_ERROR(HILOG_MODULE_APP, "[SERVICE:%s]: %s user is NULL",
in ActivateSensorImpl() 171 int32_t DeactivateSensorImpl(int32_t sensorId, const SensorUser *user)
in DeactivateSensorImpl() argument 180 if (user == NULL) {
in DeactivateSensorImpl() 181 HILOG_ERROR(HILOG_MODULE_APP, "[SERVICE:%s]: %s user is NULL",
in DeactivateSensorImpl() 201 int32_t SetBatchImpl(int32_t sensorId, const SensorUser *user, int64_t samplingInterval, int64_t reportInterval)
in SetBatchImpl() argument 219 int32_t SubscribeSensorImpl(int32_t sensorId, const SensorUser *user)
in SubscribeSensorImpl() argument 228 if (user == NULL) {
in SubscribeSensorImpl() 229 HILOG_ERROR(HILOG_MODULE_APP, "[SERVICE:%s]: %s user i in SubscribeSensorImpl() 249 UnsubscribeSensorImpl(int32_t sensorId, const SensorUser *user) UnsubscribeSensorImpl() argument 279 SetModeImpl(int32_t sensorId, const SensorUser *user, int32_t mode) SetModeImpl() argument 291 SetOptionImpl(int32_t sensorId, const SensorUser *user, int32_t option) SetOptionImpl() argument [all...] |
/third_party/skia/third_party/externals/spirv-tools/source/opt/ |
H A D | def_use_manager.cpp | 140 WhileEachUser(def, [&f](Instruction* user) { in ForEachUser() 141 f(user); in ForEachUser() 161 Instruction* user = iter->second; in WhileEachUse() local 162 for (uint32_t idx = 0; idx != user->NumOperands(); ++idx) { in WhileEachUse() 163 const Operand& op = user->GetOperand(idx); in WhileEachUse() 166 if (!f(user, idx)) return false; in WhileEachUse() 182 WhileEachUse(def, [&f](Instruction* user, uint32_t index) { in ForEachUse() 183 f(user, index); in ForEachUse() 218 ForEachUser(def, [&annos](Instruction* user) { in GetAnnotations() 219 if (IsAnnotationInst(user in GetAnnotations() [all...] |
/third_party/skia/third_party/externals/swiftshader/third_party/SPIRV-Tools/source/opt/ |
H A D | def_use_manager.cpp | 140 WhileEachUser(def, [&f](Instruction* user) { in ForEachUser() 141 f(user); in ForEachUser() 161 Instruction* user = iter->second; in WhileEachUse() local 162 for (uint32_t idx = 0; idx != user->NumOperands(); ++idx) { in WhileEachUse() 163 const Operand& op = user->GetOperand(idx); in WhileEachUse() 166 if (!f(user, idx)) return false; in WhileEachUse() 182 WhileEachUse(def, [&f](Instruction* user, uint32_t index) { in ForEachUse() 183 f(user, index); in ForEachUse() 218 ForEachUser(def, [&annos](Instruction* user) { in GetAnnotations() 219 if (IsAnnotationInst(user in GetAnnotations() [all...] |
/third_party/selinux/libsepol/src/ |
H A D | users.c | 106 const sepol_user_key_t * key, const sepol_user_t * user) in sepol_user_modify() 111 /* For user data */ in sepol_user_modify() 132 cmls_level = sepol_user_get_mlslevel(user); in sepol_user_modify() 133 cmls_range = sepol_user_get_mlsrange(user); in sepol_user_modify() 136 if (sepol_user_get_roles(handle, user, &roles, &num_roles) < 0) in sepol_user_modify() 139 /* Now, see if a user exists */ in sepol_user_modify() 165 ERR(handle, "undefined role %s for user %s", in sepol_user_modify() 183 "default level was defined for user %s", cname); in sepol_user_modify() 203 "range was defined for user %s", cname); in sepol_user_modify() 220 "was found for user in sepol_user_modify() 104 sepol_user_modify(sepol_handle_t * handle, sepol_policydb_t * p, const sepol_user_key_t * key, const sepol_user_t * user) sepol_user_modify() argument 341 sepol_user_iterate(sepol_handle_t * handle, const sepol_policydb_t * p, int (*fn) (const sepol_user_t * user, void *fn_arg), void *arg) sepol_user_iterate() argument 349 sepol_user_t *user = NULL; sepol_user_iterate() local [all...] |
/third_party/spirv-tools/source/opt/ |
H A D | spread_volatile_semantics.cpp | 214 &function_ids](Instruction* user) { 215 BasicBlock* block = context()->get_instr_block(user); 222 if (user->opcode() == spv::Op::OpAccessChain || 223 user->opcode() == spv::Op::OpInBoundsAccessChain || 224 user->opcode() == spv::Op::OpPtrAccessChain || 225 user->opcode() == spv::Op::OpInBoundsPtrAccessChain || 226 user->opcode() == spv::Op::OpCopyObject) { 227 if (ptr_id == user->GetSingleWordInOperand(0)) 228 worklist.push_back(user->result_id()); 232 if (user [all...] |
/third_party/python/Tools/c-analyzer/c_common/ |
H A D | fsutil.py | 310 def is_readable(file, *, user=None, check=False): 320 return _check_mode(st, mode, S_IRANY, user) 323 def is_writable(file, *, user=None, check=False): 333 return _check_mode(st, mode, S_IWANY, user) 336 def is_executable(file, *, user=None, check=False): 346 return _check_mode(st, mode, S_IXANY, user) 389 def _get_user_info(user): 392 if user is None: 399 if isinstance(user, int): 400 uid = user [all...] |