/third_party/selinux/libsepol/tests/ |
D | test-expander-users.c | 32 static void check_user_roles(policydb_t * p, const char *user_name, const char **role_names, int nu… in check_user_roles() argument 41 user = (user_datum_t *) hashtab_search(p->p_users.table, user_name); in check_user_roles() 43 printf("%s not found\n", user_name); in check_user_roles() 61 printf("role %s associated with user %s %d times\n", role_names[j], user_name, found[j]); in check_user_roles()
|
/third_party/glib/gio/ |
D | glocalvfs.c | 165 char *user_name; in g_local_vfs_parse_name() local 167 user_name = g_strndup (user_start, user_end - user_start); in g_local_vfs_parse_name() 168 passwd_file_entry = g_unix_get_passwd_entry (user_name, NULL); in g_local_vfs_parse_name() 169 g_free (user_name); in g_local_vfs_parse_name()
|
D | glocalfileinfo.c | 109 char *user_name; member 1160 g_free (data->user_name); in uid_data_free() 1196 data->user_name = convert_pwd_string_to_utf8 (pwbufp->pw_name); in lookup_uid_data() 1214 if (data->user_name != NULL) in lookup_uid_data() 1215 data->real_name = g_strdup (data->user_name); in lookup_uid_data() 1220 if (data->user_name == NULL) in lookup_uid_data() 1221 data->user_name = g_strdup_printf ("%d", (int)uid); in lookup_uid_data() 1236 res = g_strdup (data->user_name); in get_username_from_uid() 1458 gchar **user_name, in win32_get_file_user_info() argument 1486 if (!user_name) in win32_get_file_user_info() [all …]
|
D | gunixmounts.c | 2903 const gchar *user_name; in g_unix_mount_guess_should_display() local 2931 user_name = g_get_user_name (); in g_unix_mount_guess_should_display() 2932 user_name_len = strlen (user_name); in g_unix_mount_guess_should_display() 2934 strncmp (mount_path + strlen ("/run/media/"), user_name, user_name_len) == 0 && in g_unix_mount_guess_should_display()
|
/third_party/curl/lib/vauth/ |
D | krb5_sspi.c | 271 char *user_name; in Curl_auth_create_gssapi_security_message() local 355 user_name = curlx_convert_tchar_to_UTF8(names.sUserName); in Curl_auth_create_gssapi_security_message() 356 if(!user_name) { in Curl_auth_create_gssapi_security_message() 363 messagelen = sizeof(outdata) + strlen(user_name) + 1; in Curl_auth_create_gssapi_security_message() 367 curlx_unicodefree(user_name); in Curl_auth_create_gssapi_security_message() 379 strcpy((char *) message + sizeof(outdata), user_name); in Curl_auth_create_gssapi_security_message() 380 curlx_unicodefree(user_name); in Curl_auth_create_gssapi_security_message()
|
/third_party/mbedtls/programs/ssl/ |
D | ssl_mail_client.c | 152 const char *user_name; /* username to use for authentication */ member 420 opt.user_name = DFL_USER_NAME; in main() 459 opt.user_name = q; in main() 735 mbedtls_printf( " > Write username to server: %s", opt.user_name ); in main() 738 … ret = mbedtls_base64_encode( base, sizeof( base ), &n, (const unsigned char *) opt.user_name, in main() 739 strlen( opt.user_name ) ); in main()
|
/third_party/glib/glib/ |
D | glib-unix.c | 455 g_unix_get_passwd_entry (const gchar *user_name, in g_unix_get_passwd_entry() argument 468 g_return_val_if_fail (user_name != NULL, NULL); in g_unix_get_passwd_entry() 497 retval = getpwnam_r (user_name, &buffer->pwd, buffer->string_buffer, in g_unix_get_passwd_entry()
|
D | glib-unix.h | 118 struct passwd *g_unix_get_passwd_entry (const gchar *user_name,
|
D | gutils.c | 531 gchar *user_name; member 681 e.user_name = g_strdup (pw->pw_name); in g_get_user_database_entry() 714 e.user_name = g_utf16_to_utf8 (buffer, -1, NULL, NULL, NULL); in g_get_user_database_entry() 715 e.real_name = g_strdup (e.user_name); in g_get_user_database_entry() 720 if (!e.user_name) in g_get_user_database_entry() 721 e.user_name = g_strdup ("somebody"); in g_get_user_database_entry() 748 return entry->user_name; in g_get_user_name()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/radius/ |
D | radius_das.h | 31 const u8 *user_name; member
|
D | radius_das.c | 125 attrs.user_name = buf; in radius_das_disconnect() 290 attrs.user_name = buf; in radius_das_coa()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/radius/ |
D | radius_das.h | 31 const u8 *user_name; member
|
D | radius_das.c | 125 attrs.user_name = buf; in radius_das_disconnect() 290 attrs.user_name = buf; in radius_das_coa()
|
/third_party/pulseaudio/src/modules/ |
D | module-tunnel.c | 231 char *user_name; member 928 if (!u->server_fqdn || !u->user_name || !u->device_description) in update_description() 931 d = pa_sprintf_malloc("%s on %s@%s", u->device_description, u->user_name, u->server_fqdn); in update_description() 935 pa_proplist_sets(u->sink->proplist, "tunnel.remote.user", u->user_name); in update_description() 940 pa_proplist_sets(u->source->proplist, "tunnel.remote.user", u->user_name); in update_description() 970 …const char *server_name, *server_version, *user_name, *host_name, *default_sink_name, *default_sou… in server_info_cb() local 986 pa_tagstruct_gets(t, &user_name) < 0 || in server_info_cb() 1006 pa_xfree(u->user_name); in server_info_cb() 1007 u->user_name = pa_xstrdup(user_name); in server_info_cb() 2348 pa_xfree(u->user_name); in pa__done()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_ttls.c | 161 u8 *user_name; member 256 parse->user_name = dpos; in eap_ttls_avp_parse() 1044 if (parse.user_name) { in eap_ttls_process_phase2() 1049 parse.user_name, in eap_ttls_process_phase2() 1056 sm->identity = os_memdup(parse.user_name, parse.user_name_len); in eap_ttls_process_phase2() 1062 if (eap_user_get(sm, parse.user_name, parse.user_name_len, 1) in eap_ttls_process_phase2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_ttls.c | 161 u8 *user_name; member 256 parse->user_name = dpos; in eap_ttls_avp_parse() 1052 if (parse.user_name) { in eap_ttls_process_phase2() 1057 parse.user_name, in eap_ttls_process_phase2() 1064 sm->identity = os_memdup(parse.user_name, parse.user_name_len); in eap_ttls_process_phase2() 1070 if (eap_user_get(sm, parse.user_name, parse.user_name_len, 1) in eap_ttls_process_phase2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | pmksa_cache_auth.c | 582 if (attr->user_name) { in das_attr_match() 585 os_memcmp(attr->user_name, entry->identity, in das_attr_match()
|
D | hostapd.c | 887 if (attr->user_name) { in hostapd_das_find_sta() 901 os_memcmp(identity, attr->user_name, identity_len) in hostapd_das_find_sta()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | pmksa_cache_auth.c | 588 if (attr->user_name) { in das_attr_match() 591 os_memcmp(attr->user_name, entry->identity, in das_attr_match()
|
D | hostapd.c | 915 if (attr->user_name) { in hostapd_das_find_sta() 929 os_memcmp(identity, attr->user_name, identity_len) in hostapd_das_find_sta()
|
/third_party/selinux/secilc/docs/ |
D | cil_user_statements.md | 411 (selinuxuser user_name user_id userrange_id) 427 <td align="left"><p><code>user_name</code></p></td>
|
/third_party/pulseaudio/src/pulse/ |
D | introspect.h | 437 const char *user_name; /**< User name of the daemon process */ member
|
/third_party/libxml2/ |
D | trio.c | 685 char user_name[MAX_USER_NAME]; member 1818 parameters[pos].user_name[0] = NIL; 1857 trio_copy_max(parameters[pos].user_name, 3357 if (parameters[i].user_name[0] == NIL) 3367 def = TrioFindNamespace(parameters[i].user_name, NULL);
|
/third_party/pulseaudio/src/utils/ |
D | pactl.c | 221 i->user_name, in get_server_info_callback()
|
/third_party/python/Modules/ |
D | posixmodule.c | 7847 wchar_t user_name[UNLEN + 1]; in os_getlogin_impl() local 7848 DWORD num_chars = Py_ARRAY_LENGTH(user_name); in os_getlogin_impl() 7850 if (GetUserNameW(user_name, &num_chars)) { in os_getlogin_impl() 7852 result = PyUnicode_FromWideChar(user_name, num_chars - 1); in os_getlogin_impl()
|