/external/smack/src/org/jivesoftware/smack/packet/ |
H A D | Registration.java | 121 public void setUsername(String username){ argument 122 attributes.put("username", username);
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | blocking_login_browsertest.cc | 79 const char* username; member in struct:chromeos::BlockingLoginTestParam 162 void EnrollDevice(const std::string& username) { argument 166 username, policy::DEVICE_MODE_ENTERPRISE, "100200300", 173 void Login(const std::string& username) { argument 185 login_display->ShowSigninScreenForCreds(username, "password"); 325 Login(GetParam().username);
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | p2ptransport.cc | 48 // Limits for GICE and ICE username sizes. 163 const std::string& username, 166 if (username.size() > kMaxGiceUsernameSize) 167 return BadParse("candidate username is too long", error); 168 if (!rtc::Base64::IsBase64Encoded(username)) 169 return BadParse("candidate username has non-base64 encoded characters", 172 if (username.size() > kMaxIceUsernameSize) 173 return BadParse("candidate username is too long", error); 225 if (!VerifyUsernameFormat(proto, candidate->username(), error)) 251 elem->SetAttr(QN_USERNAME, candidate.username()); 162 VerifyUsernameFormat(TransportProtocol proto, const std::string& username, ParseError* error) argument [all...] |
H A D | turnport.h | 57 const std::string& username, // ice username. 63 username, password, server_address, 72 const std::string& username, // ice username. 78 username, password, server_address, credentials, 145 const std::string& username, 156 const std::string& username, 232 std::string hash_; // Digest of username:realm:password 53 Create(rtc::Thread* thread, rtc::PacketSocketFactory* factory, rtc::Network* network, rtc::AsyncPacketSocket* socket, const std::string& username, const std::string& password, const ProtocolAddress& server_address, const RelayCredentials& credentials, int server_priority) argument 67 Create(rtc::Thread* thread, rtc::PacketSocketFactory* factory, rtc::Network* network, const rtc::IPAddress& ip, int min_port, int max_port, const std::string& username, const std::string& password, const ProtocolAddress& server_address, const RelayCredentials& credentials, int server_priority) argument
|
H A D | candidate.h | 53 const std::string& username, const std::string& password, 57 priority_(priority), username_(username), password_(password), 100 const std::string & username() const { return username_; } function in class:cricket::Candidate 101 void set_username(const std::string & username) { username_ = username; } argument 51 Candidate(const std::string& id, int component, const std::string& protocol, const rtc::SocketAddress& address, uint32 priority, const std::string& username, const std::string& password, const std::string& type, const std::string& network_name, uint32 generation, const std::string& foundation) argument
|
H A D | relayserver.cc | 275 // The initial packet should have a username (which identifies the binding). 279 LOG(LS_WARNING) << "Dropping packet: no username"; 285 std::string username(username_attr->bytes(), length); 289 BindingMap::iterator biter = bindings_.find(username); 291 LOG(LS_WARNING) << "Dropping packet: no binding with username"; 314 rtc::AsyncPacketSocket* socket, std::string* username, 323 // The initial packet should have a username (which identifies the binding). 331 // Record the username if requested. 332 if (username) 333 username 312 HandleStun( const char* bytes, size_t size, const rtc::SocketAddress& remote_addr, rtc::AsyncPacketSocket* socket, std::string* username, StunMessage* msg) argument 346 std::string username; local 406 std::string username; local 670 RelayServerBinding( RelayServer* server, const std::string& username, const std::string& password, uint32 lifetime) argument [all...] |
/external/chromium_org/chrome/browser/chromeos/login/users/avatar/ |
H A D | user_image_manager_browsertest.cc | 131 // Logs in |username|. 132 void LogIn(const std::string& username) { argument 133 user_manager::UserManager::Get()->UserLoggedIn(username, username, false); 137 void SetOldUserImageInfo(const std::string& username, argument 140 RegisterUser(username); 146 images_pref->SetWithoutPathExpansion(username, image_properties); 151 const std::string& username, 156 images_pref->GetDictionaryWithoutPathExpansion(username, &image_properties); 166 // Verifies that there is no image info for |username| i 150 ExpectUserImageInfo(const base::DictionaryValue* images_pref, const std::string& username, int image_index, const base::FilePath& image_path) argument 168 ExpectNoUserImageInfo(const base::DictionaryValue* images_pref, const std::string& username) argument 178 ExpectOldUserImageInfo(const std::string& username, int image_index, const base::FilePath& image_path) argument 189 ExpectNewUserImageInfo(const std::string& username, int image_index, const base::FilePath& image_path) argument 199 SaveUserImagePNG(const std::string& username, int resource_id) argument 215 GetUserImagePath(const std::string& username, const std::string& extension) argument 225 CompleteProfileMetadataDownload( const std::string& username, net::TestURLFetcherFactory* url_fetcher_factory) argument [all...] |
/external/chromium_org/url/third_party/mozilla/ |
H A D | url_parse.cc | 72 Component* username, 74 // Find the first colon in the user section, which separates the username and 81 // Found separator: <username>:<password> 82 *username = Component(user.begin, colon_offset); 86 // No separator, treat everything as the username 87 *username = user; 145 Component* username, 151 username->reset(); 167 username, password); 172 username 70 ParseUserInfo(const CHAR* spec, const Component& user, Component* username, Component* password) argument 143 DoParseAuthority(const CHAR* spec, const Component& auth, Component* username, Component* password, Component* hostname, Component* port_num) argument 850 ParseAuthority(const char* spec, const Component& auth, Component* username, Component* password, Component* hostname, Component* port_num) argument 859 ParseAuthority(const base::char16* spec, const Component& auth, Component* username, Component* password, Component* hostname, Component* port_num) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.c | 76 * @username: 0-to-256-char UserName (IN) 77 * @username_len: Length of username 82 const u8 *username, size_t username_len, 93 addr[2] = username; 162 * @username: 0-to-256-char UserName (IN) 163 * @username_len: Length of username 170 const u8 *username, size_t username_len, 177 if (challenge_hash(peer_challenge, auth_challenge, username, 191 * @username: 0-to-256-char UserName (IN) 192 * @username_len: Length of username 81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument 169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.c | 76 * @username: 0-to-256-char UserName (IN) 77 * @username_len: Length of username 82 const u8 *username, size_t username_len, 93 addr[2] = username; 162 * @username: 0-to-256-char UserName (IN) 163 * @username_len: Length of username 170 const u8 *username, size_t username_len, 177 if (challenge_hash(peer_challenge, auth_challenge, username, 191 * @username: 0-to-256-char UserName (IN) 192 * @username_len: Length of username 81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument 169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 76 * @username: 0-to-256-char UserName (IN) 77 * @username_len: Length of username 82 const u8 *username, size_t username_len, 93 addr[2] = username; 162 * @username: 0-to-256-char UserName (IN) 163 * @username_len: Length of username 170 const u8 *username, size_t username_len, 177 if (challenge_hash(peer_challenge, auth_challenge, username, 191 * @username: 0-to-256-char UserName (IN) 192 * @username_len: Length of username 81 challenge_hash(const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, u8 *challenge) argument 169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument [all...] |
/external/chromium_org/chromeos/dbus/ |
H A D | session_manager_client.cc | 32 // Returns a location for |file| that is specific to the given |username|. 35 base::FilePath GetUserFilePath(const std::string& username, const char* file) { argument 40 CryptohomeClient::GetStubSanitizedUsername(username); 188 const std::string& username, 192 username, 197 const std::string& username) OVERRIDE { 202 writer.AppendString(username); 239 const std::string& username, 243 username, 259 virtual void SetFlagsForUser(const std::string& username, 338 CallRetrievePolicyByUsername(const std::string& method_name, const std::string& username, const RetrievePolicyCallback& callback) argument 355 CallStorePolicyByUsername(const std::string& method_name, const std::string& username, const std::string& policy_blob, const StorePolicyCallback& callback) argument [all...] |
/external/smack/src/org/jivesoftware/smack/ |
H A D | SASLAuthentication.java.orig | 207 * The server may assign a full JID with a username or resource different than the requested
210 * @param username the username that is authenticating with the server.
216 public String authenticate(String username, String resource, CallbackHandler cbh)
237 currentMechanism.authenticate(username, connection.getHost(), cbh);
289 * The server may assign a full JID with a username or resource different than the requested
292 * @param username the username that is authenticating with the server.
298 public String authenticate(String username, String password, String resource)
319 currentMechanism.authenticate(username, connectio [all...] |
H A D | ConnectionConfiguration.java | 88 private String username; field in class:ConnectionConfiguration 95 // Holds the proxy information (such as proxyhost, proxyport, username, password etc) 728 * Returns the username to use when trying to reconnect to the server. 730 * @return the username to use when trying to reconnect to the server. 733 return this.username; 771 void setLoginInfo(String username, String password, String resource) { argument 772 this.username = username;
|
/external/chromium_org/chrome/browser/ui/login/ |
H A D | login_prompt.cc | 138 void LoginHandler::SetAuth(const base::string16& username, argument 161 password_form_.username_value = username; 177 NotifyAuthSupplied(username, password); 184 base::Bind(&LoginHandler::SetAuthDeferred, this, username, password)); 244 SetAuth(supplied_details->username(), supplied_details->password()); 326 void LoginHandler::NotifyAuthSupplied(const base::string16& username, argument 339 AuthSuppliedLoginNotificationDetails details(this, username, password); 375 void LoginHandler::SetAuthDeferred(const base::string16& username, argument 380 request_->SetAuth(net::AuthCredentials(username, password));
|
/external/chromium_org/url/ |
H A D | url_canon_internal.cc | 319 DoOverrideComponent(repl_source.username, repl_parsed.username, 320 &source->username, &parsed->username); 355 repl_source.username, repl_parsed.username, 356 utf8_buffer, &parsed->username); 380 if (repl_source.username) source->username = utf8_buffer->data();
|
/external/ppp/pppd/plugins/ |
H A D | winbind.c | 250 unsigned int run_ntlm_auth(const char *username, argument 331 if (username) { 332 char *b64_username = base64_encode(username); 526 char *username; local 534 /* remove domain from "domain\username" */ 535 if ((username = strrchr(user, '\\')) != NULL) 536 ++username; 538 username = user; 542 /* remove domain from "domain\username" */ 583 if (run_ntlm_auth(username, [all...] |
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/signin/ |
H A D | OAuth2TokenService.java | 85 private static Account getAccountOrNullFromUsername(Context context, String username) { argument 86 if (username == null) { 92 Account account = accountManagerHelper.getAccountFromName(username); 94 Log.e(TAG, "Account not found for provided username."); 125 * @param username The native username (full address). 131 Context context, String username, String scope, final long nativeCallback) { 132 Account account = getAccountOrNullFromUsername(context, username); 130 getOAuth2AuthToken( Context context, String username, String scope, final long nativeCallback) argument
|
/external/chromium_org/chrome/browser/chromeos/login/users/ |
H A D | fake_user_manager.h | 64 virtual void SaveUserDisplayName(const std::string& username, 89 const std::string& username, 94 const std::string& username) const OVERRIDE; 95 virtual void SaveUserDisplayEmail(const std::string& username, 98 const std::string& username) const OVERRIDE;
|
/external/chromium_org/chrome/browser/profiles/ |
H A D | gaia_info_update_service.cc | 152 void GAIAInfoUpdateService::OnUsernameChanged(const std::string& username) { argument 159 if (username.empty()) { 208 const std::string& username, 210 OnUsernameChanged(username); 214 const std::string& username) { 206 GoogleSigninSucceeded( const std::string& account_id, const std::string& username, const std::string& password) argument 213 GoogleSignedOut(const std::string& account_id, const std::string& username) argument
|
/external/chromium_org/chrome/browser/resources/chromeos/login/ |
H A D | login_common.js | 258 * @param {string} username Login username. 261 Oobe.loginForTesting = function(username, password) { 263 chrome.send('skipToLoginForTesting', [username]); 264 chrome.send('completeLogin', [username, password, false]); 277 * @param {string} username Login username. 280 Oobe.authenticateForTesting = function(username, password) { 282 chrome.send('authenticateUser', [username, password]);
|
/external/chromium_org/components/user_manager/ |
H A D | user.cc | 87 explicit SupervisedUser(const std::string& username); 192 User* User::CreateSupervisedUser(const std::string& username) { argument 193 return new SupervisedUser(username); 285 SupervisedUser::SupervisedUser(const std::string& username) : User(username) { argument
|
/external/chromium_org/third_party/tlslite/tlslite/ |
H A D | mathtls.py | 79 def makeX(salt, username, password): 80 if len(username)>=256: 81 raise ValueError("username too long") 84 innerHashResult = SHA1(username + bytearray(b":") + password) 89 def makeVerifier(username, password, bits): 93 x = makeX(salt, username, password)
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | autodetectproxy.cc | 111 char username[kSavedStringLimit]; local 112 SaveStringToStack(username, proxy().username, sizeof username); 121 << autodetect << " " << bypass_list << " " << username; local
|
/external/smack/src/org/jivesoftware/smack/sasl/ |
H A D | SASLMechanism.java | 75 * @param username the username of the user being authenticated.
81 public void authenticate(String username, String host, String password) throws IOException, XMPPException {
argument 85 //Set the authenticationID as the username, since they must be the same in this case.
86 this.authenticationId = username;
92 sc = Sasl.createSaslClient(mechanisms, username, "xmpp", host, props, this);
100 * @param username the username of the user being authenticated.
106 public void authenticate(String username, String host, CallbackHandler cbh) throws IOException, XMPPException {
argument 109 sc = Sasl.createSaslClient(mechanisms, username, "xmp [all...] |