Searched refs:username (Results 201 - 225 of 606) sorted by relevance

1234567891011>>

/external/smack/src/org/jivesoftware/smack/packet/
H A DRegistration.java121 public void setUsername(String username){ argument
122 attributes.put("username", username);
/external/chromium_org/chrome/browser/chromeos/policy/
H A Dblocking_login_browsertest.cc79 const char* username; member in struct:chromeos::BlockingLoginTestParam
162 void EnrollDevice(const std::string& username) { argument
166 username, policy::DEVICE_MODE_ENTERPRISE, "100200300",
173 void Login(const std::string& username) { argument
185 login_display->ShowSigninScreenForCreds(username, "password");
325 Login(GetParam().username);
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Dp2ptransport.cc48 // Limits for GICE and ICE username sizes.
163 const std::string& username,
166 if (username.size() > kMaxGiceUsernameSize)
167 return BadParse("candidate username is too long", error);
168 if (!rtc::Base64::IsBase64Encoded(username))
169 return BadParse("candidate username has non-base64 encoded characters",
172 if (username.size() > kMaxIceUsernameSize)
173 return BadParse("candidate username is too long", error);
225 if (!VerifyUsernameFormat(proto, candidate->username(), error))
251 elem->SetAttr(QN_USERNAME, candidate.username());
162 VerifyUsernameFormat(TransportProtocol proto, const std::string& username, ParseError* error) argument
[all...]
H A Dturnport.h57 const std::string& username, // ice username.
63 username, password, server_address,
72 const std::string& username, // ice username.
78 username, password, server_address, credentials,
145 const std::string& username,
156 const std::string& username,
232 std::string hash_; // Digest of username:realm:password
53 Create(rtc::Thread* thread, rtc::PacketSocketFactory* factory, rtc::Network* network, rtc::AsyncPacketSocket* socket, const std::string& username, const std::string& password, const ProtocolAddress& server_address, const RelayCredentials& credentials, int server_priority) argument
67 Create(rtc::Thread* thread, rtc::PacketSocketFactory* factory, rtc::Network* network, const rtc::IPAddress& ip, int min_port, int max_port, const std::string& username, const std::string& password, const ProtocolAddress& server_address, const RelayCredentials& credentials, int server_priority) argument
H A Dcandidate.h53 const std::string& username, const std::string& password,
57 priority_(priority), username_(username), password_(password),
100 const std::string & username() const { return username_; } function in class:cricket::Candidate
101 void set_username(const std::string & username) { username_ = username; } argument
51 Candidate(const std::string& id, int component, const std::string& protocol, const rtc::SocketAddress& address, uint32 priority, const std::string& username, const std::string& password, const std::string& type, const std::string& network_name, uint32 generation, const std::string& foundation) argument
H A Drelayserver.cc275 // The initial packet should have a username (which identifies the binding).
279 LOG(LS_WARNING) << "Dropping packet: no username";
285 std::string username(username_attr->bytes(), length);
289 BindingMap::iterator biter = bindings_.find(username);
291 LOG(LS_WARNING) << "Dropping packet: no binding with username";
314 rtc::AsyncPacketSocket* socket, std::string* username,
323 // The initial packet should have a username (which identifies the binding).
331 // Record the username if requested.
332 if (username)
333 username
312 HandleStun( const char* bytes, size_t size, const rtc::SocketAddress& remote_addr, rtc::AsyncPacketSocket* socket, std::string* username, StunMessage* msg) argument
346 std::string username; local
406 std::string username; local
670 RelayServerBinding( RelayServer* server, const std::string& username, const std::string& password, uint32 lifetime) argument
[all...]
/external/chromium_org/chrome/browser/chromeos/login/users/avatar/
H A Duser_image_manager_browsertest.cc131 // Logs in |username|.
132 void LogIn(const std::string& username) { argument
133 user_manager::UserManager::Get()->UserLoggedIn(username, username, false);
137 void SetOldUserImageInfo(const std::string& username, argument
140 RegisterUser(username);
146 images_pref->SetWithoutPathExpansion(username, image_properties);
151 const std::string& username,
156 images_pref->GetDictionaryWithoutPathExpansion(username, &image_properties);
166 // Verifies that there is no image info for |username| i
150 ExpectUserImageInfo(const base::DictionaryValue* images_pref, const std::string& username, int image_index, const base::FilePath& image_path) argument
168 ExpectNoUserImageInfo(const base::DictionaryValue* images_pref, const std::string& username) argument
178 ExpectOldUserImageInfo(const std::string& username, int image_index, const base::FilePath& image_path) argument
189 ExpectNewUserImageInfo(const std::string& username, int image_index, const base::FilePath& image_path) argument
199 SaveUserImagePNG(const std::string& username, int resource_id) argument
215 GetUserImagePath(const std::string& username, const std::string& extension) argument
225 CompleteProfileMetadataDownload( const std::string& username, net::TestURLFetcherFactory* url_fetcher_factory) argument
[all...]
/external/chromium_org/url/third_party/mozilla/
H A Durl_parse.cc72 Component* username,
74 // Find the first colon in the user section, which separates the username and
81 // Found separator: <username>:<password>
82 *username = Component(user.begin, colon_offset);
86 // No separator, treat everything as the username
87 *username = user;
145 Component* username,
151 username->reset();
167 username, password);
172 username
70 ParseUserInfo(const CHAR* spec, const Component& user, Component* username, Component* password) argument
143 DoParseAuthority(const CHAR* spec, const Component& auth, Component* username, Component* password, Component* hostname, Component* port_num) argument
850 ParseAuthority(const char* spec, const Component& auth, Component* username, Component* password, Component* hostname, Component* port_num) argument
859 ParseAuthority(const base::char16* spec, const Component& auth, Component* username, Component* password, Component* hostname, Component* port_num) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dms_funcs.c76 * @username: 0-to-256-char UserName (IN)
77 * @username_len: Length of username
82 const u8 *username, size_t username_len,
93 addr[2] = username;
162 * @username: 0-to-256-char UserName (IN)
163 * @username_len: Length of username
170 const u8 *username, size_t username_len,
177 if (challenge_hash(peer_challenge, auth_challenge, username,
191 * @username: 0-to-256-char UserName (IN)
192 * @username_len: Length of username
81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument
169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dms_funcs.c76 * @username: 0-to-256-char UserName (IN)
77 * @username_len: Length of username
82 const u8 *username, size_t username_len,
93 addr[2] = username;
162 * @username: 0-to-256-char UserName (IN)
163 * @username_len: Length of username
170 const u8 *username, size_t username_len,
177 if (challenge_hash(peer_challenge, auth_challenge, username,
191 * @username: 0-to-256-char UserName (IN)
192 * @username_len: Length of username
81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument
169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dms_funcs.c76 * @username: 0-to-256-char UserName (IN)
77 * @username_len: Length of username
82 const u8 *username, size_t username_len,
93 addr[2] = username;
162 * @username: 0-to-256-char UserName (IN)
163 * @username_len: Length of username
170 const u8 *username, size_t username_len,
177 if (challenge_hash(peer_challenge, auth_challenge, username,
191 * @username: 0-to-256-char UserName (IN)
192 * @username_len: Length of username
81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument
169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
[all...]
/external/chromium_org/chromeos/dbus/
H A Dsession_manager_client.cc32 // Returns a location for |file| that is specific to the given |username|.
35 base::FilePath GetUserFilePath(const std::string& username, const char* file) { argument
40 CryptohomeClient::GetStubSanitizedUsername(username);
188 const std::string& username,
192 username,
197 const std::string& username) OVERRIDE {
202 writer.AppendString(username);
239 const std::string& username,
243 username,
259 virtual void SetFlagsForUser(const std::string& username,
338 CallRetrievePolicyByUsername(const std::string& method_name, const std::string& username, const RetrievePolicyCallback& callback) argument
355 CallStorePolicyByUsername(const std::string& method_name, const std::string& username, const std::string& policy_blob, const StorePolicyCallback& callback) argument
[all...]
/external/smack/src/org/jivesoftware/smack/
H A DSASLAuthentication.java.orig207 * The server may assign a full JID with a username or resource different than the requested
210 * @param username the username that is authenticating with the server.
216 public String authenticate(String username, String resource, CallbackHandler cbh)
237 currentMechanism.authenticate(username, connection.getHost(), cbh);
289 * The server may assign a full JID with a username or resource different than the requested
292 * @param username the username that is authenticating with the server.
298 public String authenticate(String username, String password, String resource)
319 currentMechanism.authenticate(username, connectio
[all...]
H A DConnectionConfiguration.java88 private String username; field in class:ConnectionConfiguration
95 // Holds the proxy information (such as proxyhost, proxyport, username, password etc)
728 * Returns the username to use when trying to reconnect to the server.
730 * @return the username to use when trying to reconnect to the server.
733 return this.username;
771 void setLoginInfo(String username, String password, String resource) { argument
772 this.username = username;
/external/chromium_org/chrome/browser/ui/login/
H A Dlogin_prompt.cc138 void LoginHandler::SetAuth(const base::string16& username, argument
161 password_form_.username_value = username;
177 NotifyAuthSupplied(username, password);
184 base::Bind(&LoginHandler::SetAuthDeferred, this, username, password));
244 SetAuth(supplied_details->username(), supplied_details->password());
326 void LoginHandler::NotifyAuthSupplied(const base::string16& username, argument
339 AuthSuppliedLoginNotificationDetails details(this, username, password);
375 void LoginHandler::SetAuthDeferred(const base::string16& username, argument
380 request_->SetAuth(net::AuthCredentials(username, password));
/external/chromium_org/url/
H A Durl_canon_internal.cc319 DoOverrideComponent(repl_source.username, repl_parsed.username,
320 &source->username, &parsed->username);
355 repl_source.username, repl_parsed.username,
356 utf8_buffer, &parsed->username);
380 if (repl_source.username) source->username = utf8_buffer->data();
/external/ppp/pppd/plugins/
H A Dwinbind.c250 unsigned int run_ntlm_auth(const char *username, argument
331 if (username) {
332 char *b64_username = base64_encode(username);
526 char *username; local
534 /* remove domain from "domain\username" */
535 if ((username = strrchr(user, '\\')) != NULL)
536 ++username;
538 username = user;
542 /* remove domain from "domain\username" */
583 if (run_ntlm_auth(username,
[all...]
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/signin/
H A DOAuth2TokenService.java85 private static Account getAccountOrNullFromUsername(Context context, String username) { argument
86 if (username == null) {
92 Account account = accountManagerHelper.getAccountFromName(username);
94 Log.e(TAG, "Account not found for provided username.");
125 * @param username The native username (full address).
131 Context context, String username, String scope, final long nativeCallback) {
132 Account account = getAccountOrNullFromUsername(context, username);
130 getOAuth2AuthToken( Context context, String username, String scope, final long nativeCallback) argument
/external/chromium_org/chrome/browser/chromeos/login/users/
H A Dfake_user_manager.h64 virtual void SaveUserDisplayName(const std::string& username,
89 const std::string& username,
94 const std::string& username) const OVERRIDE;
95 virtual void SaveUserDisplayEmail(const std::string& username,
98 const std::string& username) const OVERRIDE;
/external/chromium_org/chrome/browser/profiles/
H A Dgaia_info_update_service.cc152 void GAIAInfoUpdateService::OnUsernameChanged(const std::string& username) { argument
159 if (username.empty()) {
208 const std::string& username,
210 OnUsernameChanged(username);
214 const std::string& username) {
206 GoogleSigninSucceeded( const std::string& account_id, const std::string& username, const std::string& password) argument
213 GoogleSignedOut(const std::string& account_id, const std::string& username) argument
/external/chromium_org/chrome/browser/resources/chromeos/login/
H A Dlogin_common.js258 * @param {string} username Login username.
261 Oobe.loginForTesting = function(username, password) {
263 chrome.send('skipToLoginForTesting', [username]);
264 chrome.send('completeLogin', [username, password, false]);
277 * @param {string} username Login username.
280 Oobe.authenticateForTesting = function(username, password) {
282 chrome.send('authenticateUser', [username, password]);
/external/chromium_org/components/user_manager/
H A Duser.cc87 explicit SupervisedUser(const std::string& username);
192 User* User::CreateSupervisedUser(const std::string& username) { argument
193 return new SupervisedUser(username);
285 SupervisedUser::SupervisedUser(const std::string& username) : User(username) { argument
/external/chromium_org/third_party/tlslite/tlslite/
H A Dmathtls.py79 def makeX(salt, username, password):
80 if len(username)>=256:
81 raise ValueError("username too long")
84 innerHashResult = SHA1(username + bytearray(b":") + password)
89 def makeVerifier(username, password, bits):
93 x = makeX(salt, username, password)
/external/chromium_org/third_party/webrtc/base/
H A Dautodetectproxy.cc111 char username[kSavedStringLimit]; local
112 SaveStringToStack(username, proxy().username, sizeof username);
121 << autodetect << " " << bypass_list << " " << username; local
/external/smack/src/org/jivesoftware/smack/sasl/
H A DSASLMechanism.java75 * @param username the username of the user being authenticated.
81 public void authenticate(String username, String host, String password) throws IOException, XMPPException { argument
85 //Set the authenticationID as the username, since they must be the same in this case.
86 this.authenticationId = username;
92 sc = Sasl.createSaslClient(mechanisms, username, "xmpp", host, props, this);
100 * @param username the username of the user being authenticated.
106 public void authenticate(String username, String host, CallbackHandler cbh) throws IOException, XMPPException { argument
109 sc = Sasl.createSaslClient(mechanisms, username, "xmp
[all...]

Completed in 3019 milliseconds

1234567891011>>