/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | port_unittest.cc | 562 const std::string& username) { 565 new StunByteStringAttribute(STUN_ATTR_USERNAME, username)); 569 const std::string& username, 572 addr.ipaddr(), 0, 0, username, password); 577 const std::string& username, 582 TestPort* port = CreateTestPort(addr, username, password); 1079 // verifies Message Integrity attribute in STUN messages and username in STUN 1080 // binding request will have colon (":") between remote and local username. 1096 // loopback test when protocol is RFC5245. For success IceTiebreaker, username 1374 ASSERT_TRUE(username_attr != NULL); // GICE has a username i 561 CreateStunMessageWithUsername(int type, const std::string& username) argument 568 CreateTestPort(const rtc::SocketAddress& addr, const std::string& username, const std::string& password) argument 576 CreateTestPort(const rtc::SocketAddress& addr, const std::string& username, const std::string& password, cricket::IceProtocolType type, cricket::IceRole role, int tiebreaker) argument 1592 std::string username; local 1659 std::string username; local 1712 std::string username; local 1739 std::string username; local 1763 std::string username; local 1785 std::string username; local 1844 std::string username; local 1914 std::string username; local 1956 std::string username; local 2026 std::string username; local [all...] |
/external/chromium_org/url/ |
H A D | gurl_unittest.cc | 82 EXPECT_EQ("user", url.username()); 106 EXPECT_EQ("", url.username()); 124 EXPECT_EQ("user", url2.username()); 139 EXPECT_EQ("", invalid2.username()); 158 EXPECT_EQ("user", url2.username()); 174 EXPECT_EQ("", invalid2.username()); 199 EXPECT_EQ("", url2.username()); 211 EXPECT_EQ("user", inner->username()); 269 EXPECT_EQ("", url.username()); 386 const char* username; member in struct:url::ReplaceCase [all...] |
/external/chromium_org/third_party/webrtc/base/ |
H A D | httpcommon.cc | 740 const std::string& username, const CryptString& password, 759 if (username.empty()) 765 //std::string decoded = username + ":" + password; 766 size_t len = username.size() + password.GetLength() + 2; 768 size_t pos = strcpyn(sensitive, len, username.data(), username.size()); 785 if (username.empty()) 809 //std::string A1 = username + ":" + realm + ":" + password; 810 size_t len = username.size() + realm.size() + password.GetLength() + 3; 812 size_t pos = strcpyn(sensitive, len, username 736 HttpAuthenticate( const char * challenge, size_t len, const SocketAddress& server, const std::string& method, const std::string& uri, const std::string& username, const CryptString& password, HttpAuthContext *& context, std::string& response, std::string& auth_method) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_sim.c | 40 char permanent[20]; /* Permanent username */ 421 char *username; local 453 username = sim_get_username(sm->identity, sm->identity_len); 454 if (username == NULL) 457 if (username[0] == EAP_SIM_REAUTH_ID_PREFIX) { 458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'", 459 username); 461 sm->eap_sim_db_priv, username); 462 os_free(username); 478 if (username[ [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_sim.c | 40 char permanent[20]; /* Permanent username */ 421 char *username; local 453 username = sim_get_username(sm->identity, sm->identity_len); 454 if (username == NULL) 457 if (username[0] == EAP_SIM_REAUTH_ID_PREFIX) { 458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'", 459 username); 461 sm->eap_sim_db_priv, username); 462 os_free(username); 478 if (username[ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_sim.c | 40 char permanent[20]; /* Permanent username */ 421 char *username; local 453 username = sim_get_username(sm->identity, sm->identity_len); 454 if (username == NULL) 457 if (username[0] == EAP_SIM_REAUTH_ID_PREFIX) { 458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'", 459 username); 461 sm->eap_sim_db_priv, username); 462 os_free(username); 478 if (username[ [all...] |
/external/chromium_org/ui/login/account_picker/ |
H A D | user_pod_row.js | 837 this.imageElement.src = 'chrome://userimage/' + this.user.username + 838 '?id=' + UserPod.userImageSalt_[this.user.username]; 1067 UserPod.userImageSalt_[this.user.username] = new Date().getTime(); 1093 chrome.send('attemptUnlock', [this.user.username]); 1099 [this.user.username, this.passwordElement.value]); 1176 [user.isDesktopUser ? user.profilePath : user.username]); 1236 chrome.send('removeUser', [this.user.username]); 1529 [this.user.username, locale, keyboardLayout]); 1537 id = this.user.username + '-keyboard'; 1541 var id = this.user.username [all...] |
/external/chromium_org/chrome/browser/chromeos/login/ |
H A D | login_utils.h | 50 // Checks if the given username is whitelisted and allowed to sign-in to 53 static bool IsWhitelisted(const std::string& username, bool* wildcard_match);
|
/external/chromium_org/chrome/browser/chromeos/login/users/ |
H A D | fake_user_manager.cc | 169 const std::string& username, 174 if ((*it)->email() == username) { 240 const std::string& username) const { 245 const std::string& username) const { 168 SaveUserDisplayName( const std::string& username, const base::string16& display_name) argument
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | user_cloud_policy_manager_chromeos.cc | 57 void OnWildcardCheckCompleted(const std::string& username, argument 67 user_manager::UserManager::Get()->RemoveUserFromList(username); 169 const std::string& username) { 171 wildcard_username_ = username; 168 EnableWildcardLoginCheck( const std::string& username) argument
|
/external/chromium_org/chrome/browser/extensions/token_cache/ |
H A D | token_cache_service.cc | 74 const std::string& username) { 73 GoogleSignedOut(const std::string& account_id, const std::string& username) argument
|
/external/chromium_org/chrome/browser/ui/app_list/search/common/ |
H A D | webservice_search_provider.cc | 80 // think that a username + password is a host + port (and we don't want to 83 if (!query_as_url.username().empty() ||
|
/external/chromium_org/chrome/browser/ui/ |
H A D | browser_dialogs.h | 98 const std::string& username,
|
/external/chromium_org/chrome/common/extensions/docs/server2/ |
H A D | github_file_system.py | 30 username, 35 fetch = fetcher.FetchAsync(ZIP_KEY, username=username, password=password) 82 password_data = password_store.GetMulti(('username', 'password')).Get() 83 self._username, self._password = (password_data.get('username'), 86 password_store.SetMulti({'username': USERNAME, 'password': PASSWORD}) 176 username=USERNAME,
|
/external/chromium_org/components/autofill/content/renderer/ |
H A D | password_autofill_agent.h | 41 // Fills the username and password fields of this form with the given values. 44 const blink::WebString& username, 47 // Previews the username and password fields of this form with the given 50 const blink::WebString& username, 53 // Clears the preview for the username and password fields, restoring both to 57 // Shows an Autofill popup with username suggestions for |element|. If 95 // The user manually edited the password more recently than the username was 167 // |fill_data|. Will use the data corresponding to the preferred username, 169 // attempts to fill the password matching the already filled username, if 184 const blink::WebInputElement& username, [all...] |
/external/chromium_org/components/invalidation/ |
H A D | p2p_invalidation_service.h | 55 void UpdateCredentials(const std::string& username,
|
/external/chromium_org/components/password_manager/core/browser/ |
H A D | password_manager_client.h | 43 // Returns true if |username| and |origin| correspond to the account which is 46 const std::string& username, const std::string& origin) const = 0;
|
/external/chromium_org/components/policy/core/browser/ |
H A D | browser_policy_connector.cc | 217 bool BrowserPolicyConnector::IsNonEnterpriseUser(const std::string& username) { argument 218 if (username.empty() || username.find('@') == std::string::npos) { 219 // An empty username means incognito user in case of ChromiumOS and 226 gaia::ExtractDomainName(gaia::CanonicalizeEmail(username)));
|
H A D | browser_policy_connector.h | 93 // false if the username is empty. 94 static bool IsNonEnterpriseUser(const std::string& username);
|
/external/chromium_org/components/policy/core/common/cloud/ |
H A D | user_cloud_policy_manager.h | 54 void SetSigninUsername(const std::string& username);
|
H A D | user_cloud_policy_store.h | 45 // Sets the username from signin for validation of the policy. 46 void SetSigninUsername(const std::string& username);
|
/external/chromium_org/components/signin/core/browser/ |
H A D | signin_client.h | 82 const std::string& username, 81 GoogleSigninSucceeded(const std::string& account_id, const std::string& username, const std::string& password) argument
|
/external/chromium_org/content/renderer/p2p/ |
H A D | port_allocator.cc | 183 "?username=" + net::EscapeUrlEncodedData(username(), true) + 197 WebString::fromUTF8(relay_config.username)); 224 if (key == "username") { 225 if (value != username()) { 263 cricket::RelayCredentials credentials(config.relays[i].username,
|
/external/chromium_org/jingle/notifier/base/ |
H A D | gaia_token_pre_xmpp_auth.h | 21 GaiaTokenPreXmppAuth(const std::string& username, const std::string& token,
|
/external/chromium_org/net/ftp/ |
H A D | ftp_auth_cache_unittest.cc | 26 const base::string16 kUsername(ASCIIToUTF16("username")); 47 EXPECT_EQ(kUsername1, entry1->credentials.username()); 55 EXPECT_EQ(kUsername2, entry2->credentials.username()); 66 EXPECT_EQ(kUsername3, entry3->credentials.username()); 113 EXPECT_EQ(kOthername, entry2->credentials.username());
|