/third_party/node/deps/openssl/config/archs/darwin64-x86_64-cc/asm_avx2/include/openssl/ |
H A D | srp.h | 132 /* to simulate a user */ 190 char *SRP_create_verifier_ex(const char *user, const char *pass, char **salt, 194 char *SRP_create_verifier(const char *user, const char *pass, char **salt, 197 int SRP_create_verifier_BN_ex(const char *user, const char *pass, BIGNUM **salt, 202 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, 254 BIGNUM *SRP_Calc_x_ex(const BIGNUM *s, const char *user, const char *pass, 257 BIGNUM *SRP_Calc_x(const BIGNUM *s, const char *user, const char *pass); 274 /* This method ignores the configured seed and fails for an unknown user. */
|
/third_party/node/deps/openssl/config/archs/linux-aarch64/asm_avx2/include/openssl/ |
H A D | srp.h | 132 /* to simulate a user */ 190 char *SRP_create_verifier_ex(const char *user, const char *pass, char **salt, 194 char *SRP_create_verifier(const char *user, const char *pass, char **salt, 197 int SRP_create_verifier_BN_ex(const char *user, const char *pass, BIGNUM **salt, 202 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, 254 BIGNUM *SRP_Calc_x_ex(const BIGNUM *s, const char *user, const char *pass, 257 BIGNUM *SRP_Calc_x(const BIGNUM *s, const char *user, const char *pass); 274 /* This method ignores the configured seed and fails for an unknown user. */
|
/third_party/node/deps/openssl/config/archs/darwin64-arm64-cc/no-asm/include/openssl/ |
H A D | srp.h | 132 /* to simulate a user */ 190 char *SRP_create_verifier_ex(const char *user, const char *pass, char **salt, 194 char *SRP_create_verifier(const char *user, const char *pass, char **salt, 197 int SRP_create_verifier_BN_ex(const char *user, const char *pass, BIGNUM **salt, 202 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, 254 BIGNUM *SRP_Calc_x_ex(const BIGNUM *s, const char *user, const char *pass, 257 BIGNUM *SRP_Calc_x(const BIGNUM *s, const char *user, const char *pass); 274 /* This method ignores the configured seed and fails for an unknown user. */
|
/third_party/node/deps/openssl/config/archs/darwin64-x86_64-cc/asm/include/openssl/ |
H A D | srp.h | 132 /* to simulate a user */ 190 char *SRP_create_verifier_ex(const char *user, const char *pass, char **salt, 194 char *SRP_create_verifier(const char *user, const char *pass, char **salt, 197 int SRP_create_verifier_BN_ex(const char *user, const char *pass, BIGNUM **salt, 202 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, 254 BIGNUM *SRP_Calc_x_ex(const BIGNUM *s, const char *user, const char *pass, 257 BIGNUM *SRP_Calc_x(const BIGNUM *s, const char *user, const char *pass); 274 /* This method ignores the configured seed and fails for an unknown user. */
|
/third_party/python/Lib/distutils/command/ |
H A D | install.py | 156 user_options.append(('user', None, 157 "install in user site-package '%s'" % USER_SITE)) 158 boolean_options.append('user') 170 self.user = 0 172 # These select only the installation base; it's up to the user to 180 # supplied by the user, they are filled in using the installation 211 # a user option, it's just there so the bdist_* commands can turn 221 # are not user options, because if the user told the install 240 # array of user inpu [all...] |
/third_party/openssl/crypto/srp/ |
H A D | srp_lib.c | 144 BIGNUM *SRP_Calc_x_ex(const BIGNUM *s, const char *user, const char *pass, in SRP_Calc_x_ex() argument 153 if ((s == NULL) || (user == NULL) || (pass == NULL)) in SRP_Calc_x_ex() 167 || !EVP_DigestUpdate(ctxt, user, strlen(user)) in SRP_Calc_x_ex() 191 BIGNUM *SRP_Calc_x(const BIGNUM *s, const char *user, const char *pass) in SRP_Calc_x() argument 193 return SRP_Calc_x_ex(s, user, pass, NULL, NULL); in SRP_Calc_x()
|
/kernel/linux/linux-5.10/net/ipv4/netfilter/ |
H A D | ip_tables.c | 165 /* Head of user chain: ERROR target with chainname */ in get_chainname_rulenum() 398 (strcmp(t->target.u.user.name, in mark_source_chains() 428 if (strcmp(t->target.u.user.name, in mark_source_chains() 482 match = xt_request_find_match(NFPROTO_IPV4, m->u.user.name, in find_check_match() 483 m->u.user.revision); in find_check_match() 545 target = xt_request_find_target(NFPROTO_IPV4, t->u.user.name, in find_check_entry() 546 t->u.user.revision); in find_check_entry() 580 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) in check_underflow() 658 /* Checks and translates the user-supplied table segment (held in 695 if (strcmp(ipt_get_target(iter)->u.user in translate_table() 947 get_info(struct net *net, void __user *user, const int *len) get_info() argument 1651 do_ipt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) do_ipt_get_ctl() argument [all...] |
/kernel/linux/linux-5.10/net/ipv6/netfilter/ |
H A D | ip6_tables.c | 190 /* Head of user chain: ERROR target with chainname */ in get_chainname_rulenum() 417 (strcmp(t->target.u.user.name, in mark_source_chains() 447 if (strcmp(t->target.u.user.name, in mark_source_chains() 500 match = xt_request_find_match(NFPROTO_IPV6, m->u.user.name, in find_check_match() 501 m->u.user.revision); in find_check_match() 565 target = xt_request_find_target(NFPROTO_IPV6, t->u.user.name, in find_check_entry() 566 t->u.user.revision); in find_check_entry() 599 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) in check_underflow() 676 /* Checks and translates the user-supplied table segment (held in 713 if (strcmp(ip6t_get_target(iter)->u.user in translate_table() 964 get_info(struct net *net, void __user *user, const int *len) get_info() argument 1661 do_ip6t_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) do_ip6t_get_ctl() argument [all...] |
/kernel/linux/linux-6.6/net/ipv4/netfilter/ |
H A D | ip_tables.c | 163 /* Head of user chain: ERROR target with chainname */ in get_chainname_rulenum() 397 (strcmp(t->target.u.user.name, in mark_source_chains() 427 if (strcmp(t->target.u.user.name, in mark_source_chains() 481 match = xt_request_find_match(NFPROTO_IPV4, m->u.user.name, in find_check_match() 482 m->u.user.revision); in find_check_match() 544 target = xt_request_find_target(NFPROTO_IPV4, t->u.user.name, in find_check_entry() 545 t->u.user.revision); in find_check_entry() 579 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) in check_underflow() 657 /* Checks and translates the user-supplied table segment (held in 694 if (strcmp(ipt_get_target(iter)->u.user in translate_table() 946 get_info(struct net *net, void __user *user, const int *len) get_info() argument 1642 do_ipt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) do_ipt_get_ctl() argument [all...] |
/kernel/linux/linux-6.6/net/ipv6/netfilter/ |
H A D | ip6_tables.c | 188 /* Head of user chain: ERROR target with chainname */ in get_chainname_rulenum() 415 (strcmp(t->target.u.user.name, in mark_source_chains() 445 if (strcmp(t->target.u.user.name, in mark_source_chains() 498 match = xt_request_find_match(NFPROTO_IPV6, m->u.user.name, in find_check_match() 499 m->u.user.revision); in find_check_match() 563 target = xt_request_find_target(NFPROTO_IPV6, t->u.user.name, in find_check_entry() 564 t->u.user.revision); in find_check_entry() 597 if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) in check_underflow() 674 /* Checks and translates the user-supplied table segment (held in 711 if (strcmp(ip6t_get_target(iter)->u.user in translate_table() 962 get_info(struct net *net, void __user *user, const int *len) get_info() argument 1651 do_ip6t_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) do_ip6t_get_ctl() argument [all...] |
/third_party/python/Lib/test/ |
H A D | test_urllib2.py | 98 reason: code that previously saw all (urllib2 user)-provided headers in 548 def add_password(self, realm, uri, user, password): 551 self.user = user 557 return self.user, self.password 735 def connect_ftp(self, user, passwd, host, port, dirs, 737 self.user, self.passwd = user, passwd 748 for url, host, port, user, passwd, type_, dirs, filename, mimetype in [ 772 self.assertEqual(h.user, use [all...] |
/kernel/linux/linux-5.10/net/netrom/ |
H A D | af_netrom.c | 252 * This is called from user mode and the timers. Thus it protects itself 570 ax25_uid_assoc *user; in nr_bind() local 596 * Only the super user can set an arbitrary user callsign. in nr_bind() 609 user = ax25_findbyuid(current_euid()); in nr_bind() 610 if (user) { in nr_bind() 611 nr->user_addr = user->call; in nr_bind() 612 ax25_uid_put(user); in nr_bind() 642 ax25_uid_assoc *user; in nr_connect() local 688 user in nr_connect() 876 ax25_address *src, *dest, *user; nr_rx_frame() local [all...] |
/kernel/linux/linux-5.10/fs/ |
H A D | pipe.c | 35 * New pipe buffers will be restricted to this size while the user is exceeding 50 * The max size that a non-root user is allowed to grow the pipe. Can 55 /* Maximum allocatable pages per user. Hard limit is unset by default, soft 754 unsigned long account_pipe_buffers(struct user_struct *user, in account_pipe_buffers() argument 757 return atomic_long_add_return(new - old, &user->pipe_bufs); in account_pipe_buffers() 783 struct user_struct *user = get_current_user(); in alloc_pipe_info() local 794 user_bufs = account_pipe_buffers(user, 0, pipe_bufs); in alloc_pipe_info() 797 user_bufs = account_pipe_buffers(user, pipe_bufs, PIPE_MIN_DEF_BUFFERS); in alloc_pipe_info() 814 pipe->user = user; in alloc_pipe_info() [all...] |
/kernel/linux/linux-6.6/fs/ |
H A D | pipe.c | 36 * New pipe buffers will be restricted to this size while the user is exceeding 51 * The max size that a non-root user is allowed to grow the pipe. Can 56 /* Maximum allocatable pages per user. Hard limit is unset by default, soft 756 unsigned long account_pipe_buffers(struct user_struct *user, in account_pipe_buffers() argument 759 return atomic_long_add_return(new - old, &user->pipe_bufs); in account_pipe_buffers() 785 struct user_struct *user = get_current_user(); in alloc_pipe_info() local 796 user_bufs = account_pipe_buffers(user, 0, pipe_bufs); in alloc_pipe_info() 799 user_bufs = account_pipe_buffers(user, pipe_bufs, PIPE_MIN_DEF_BUFFERS); in alloc_pipe_info() 816 pipe->user = user; in alloc_pipe_info() [all...] |
/kernel/linux/linux-6.6/net/netrom/ |
H A D | af_netrom.c | 252 * This is called from user mode and the timers. Thus it protects itself 570 ax25_uid_assoc *user; in nr_bind() local 596 * Only the super user can set an arbitrary user callsign. in nr_bind() 609 user = ax25_findbyuid(current_euid()); in nr_bind() 610 if (user) { in nr_bind() 611 nr->user_addr = user->call; in nr_bind() 612 ax25_uid_put(user); in nr_bind() 642 ax25_uid_assoc *user; in nr_connect() local 688 user in nr_connect() 876 ax25_address *src, *dest, *user; nr_rx_frame() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_peap.c | 176 if (sm->user && sm->user->force_version >= 0) { in eap_peap_init() 177 data->force_version = sm->user->force_version; in eap_peap_init() 900 next_type = sm->user->methods[0].method; in eap_peap_process_phase2_soh() 903 sm->user->methods[0].vendor, next_type); in eap_peap_process_phase2_soh() 904 eap_peap_phase2_init(sm, data, sm->user->methods[0].vendor, next_type); in eap_peap_process_phase2_soh() 945 if (sm->user && sm->user_eap_method_index < EAP_MAX_METHODS && in eap_peap_process_phase2_response() 946 (sm->user->methods[sm->user_eap_method_index].vendor != in eap_peap_process_phase2_response() 948 sm->user->methods[sm->user_eap_method_index].method != in eap_peap_process_phase2_response() 950 next_vendor = sm->user in eap_peap_process_phase2_response() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | ap_config.c | 234 conf->fragm_threshold = -2; /* user driver default: 2346 */ in hostapd_config_defaults() 643 void hostapd_config_free_eap_user(struct hostapd_eap_user *user) in hostapd_config_free_eap_user() argument 645 hostapd_config_free_radius_attr(user->accept_attr); in hostapd_config_free_eap_user() 646 os_free(user->identity); in hostapd_config_free_eap_user() 647 bin_clear_free(user->password, user->password_len); in hostapd_config_free_eap_user() 648 bin_clear_free(user->salt, user->salt_len); in hostapd_config_free_eap_user() 649 os_free(user); in hostapd_config_free_eap_user() 653 void hostapd_config_free_eap_users(struct hostapd_eap_user *user) in hostapd_config_free_eap_users() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_peap.c | 176 if (sm->user && sm->user->force_version >= 0) { in eap_peap_init() 177 data->force_version = sm->user->force_version; in eap_peap_init() 931 next_type = sm->user->methods[0].method; in eap_peap_process_phase2_soh() 934 sm->user->methods[0].vendor, next_type); in eap_peap_process_phase2_soh() 935 eap_peap_phase2_init(sm, data, sm->user->methods[0].vendor, next_type); in eap_peap_process_phase2_soh() 976 if (sm->user && sm->user_eap_method_index < EAP_MAX_METHODS && in eap_peap_process_phase2_response() 977 (sm->user->methods[sm->user_eap_method_index].vendor != in eap_peap_process_phase2_response() 979 sm->user->methods[sm->user_eap_method_index].method != in eap_peap_process_phase2_response() 981 next_vendor = sm->user in eap_peap_process_phase2_response() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | ap_config.c | 212 conf->fragm_threshold = -2; /* user driver default: 2346 */ in hostapd_config_defaults() 562 void hostapd_config_free_eap_user(struct hostapd_eap_user *user) in hostapd_config_free_eap_user() argument 564 hostapd_config_free_radius_attr(user->accept_attr); in hostapd_config_free_eap_user() 565 os_free(user->identity); in hostapd_config_free_eap_user() 566 bin_clear_free(user->password, user->password_len); in hostapd_config_free_eap_user() 567 bin_clear_free(user->salt, user->salt_len); in hostapd_config_free_eap_user() 568 os_free(user); in hostapd_config_free_eap_user() 572 void hostapd_config_free_eap_users(struct hostapd_eap_user *user) in hostapd_config_free_eap_users() argument [all...] |
/kernel/linux/linux-5.10/arch/um/os-Linux/drivers/ |
H A D | ethertap_kern.c | 26 epri = (struct ethertap_data *) pri->user; in etap_init() 88 .user = ðertap_user_info,
|
H A D | tuntap_kern.c | 25 tpri = (struct tuntap_data *) pri->user; in tuntap_init() 74 .user = &tuntap_user_info,
|
/kernel/linux/linux-6.6/arch/um/os-Linux/drivers/ |
H A D | ethertap_kern.c | 26 epri = (struct ethertap_data *) pri->user; in etap_init() 88 .user = ðertap_user_info,
|
H A D | tuntap_kern.c | 25 tpri = (struct tuntap_data *) pri->user; in tuntap_init() 74 .user = &tuntap_user_info,
|
/kernel/linux/linux-5.10/include/net/ |
H A D | af_unix.h | 11 void unix_inflight(struct user_struct *user, struct file *fp); 12 void unix_notinflight(struct user_struct *user, struct file *fp);
|
/kernel/linux/linux-5.10/include/uapi/linux/ |
H A D | atmsap.h | 35 #define ATM_L2_USER 0x10 /* user-specified */ 54 #define ATM_L3_USER 0x10 /* user-specified */ 65 #define ATM_HL_USER 0x02 /* user-specific */ 112 unsigned char user; /* user-specified l2 information */ member 123 unsigned char user; /* user specified l3 information */ member
|