Searched refs:username (Results 251 - 275 of 606) sorted by relevance

<<11121314151617181920>>

/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Dport_unittest.cc562 const std::string& username) {
565 new StunByteStringAttribute(STUN_ATTR_USERNAME, username));
569 const std::string& username,
572 addr.ipaddr(), 0, 0, username, password);
577 const std::string& username,
582 TestPort* port = CreateTestPort(addr, username, password);
1079 // verifies Message Integrity attribute in STUN messages and username in STUN
1080 // binding request will have colon (":") between remote and local username.
1096 // loopback test when protocol is RFC5245. For success IceTiebreaker, username
1374 ASSERT_TRUE(username_attr != NULL); // GICE has a username i
561 CreateStunMessageWithUsername(int type, const std::string& username) argument
568 CreateTestPort(const rtc::SocketAddress& addr, const std::string& username, const std::string& password) argument
576 CreateTestPort(const rtc::SocketAddress& addr, const std::string& username, const std::string& password, cricket::IceProtocolType type, cricket::IceRole role, int tiebreaker) argument
1592 std::string username; local
1659 std::string username; local
1712 std::string username; local
1739 std::string username; local
1763 std::string username; local
1785 std::string username; local
1844 std::string username; local
1914 std::string username; local
1956 std::string username; local
2026 std::string username; local
[all...]
/external/chromium_org/url/
H A Dgurl_unittest.cc82 EXPECT_EQ("user", url.username());
106 EXPECT_EQ("", url.username());
124 EXPECT_EQ("user", url2.username());
139 EXPECT_EQ("", invalid2.username());
158 EXPECT_EQ("user", url2.username());
174 EXPECT_EQ("", invalid2.username());
199 EXPECT_EQ("", url2.username());
211 EXPECT_EQ("user", inner->username());
269 EXPECT_EQ("", url.username());
386 const char* username; member in struct:url::ReplaceCase
[all...]
/external/chromium_org/third_party/webrtc/base/
H A Dhttpcommon.cc740 const std::string& username, const CryptString& password,
759 if (username.empty())
765 //std::string decoded = username + ":" + password;
766 size_t len = username.size() + password.GetLength() + 2;
768 size_t pos = strcpyn(sensitive, len, username.data(), username.size());
785 if (username.empty())
809 //std::string A1 = username + ":" + realm + ":" + password;
810 size_t len = username.size() + realm.size() + password.GetLength() + 3;
812 size_t pos = strcpyn(sensitive, len, username
736 HttpAuthenticate( const char * challenge, size_t len, const SocketAddress& server, const std::string& method, const std::string& uri, const std::string& username, const CryptString& password, HttpAuthContext *& context, std::string& response, std::string& auth_method) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_sim.c40 char permanent[20]; /* Permanent username */
421 char *username; local
453 username = sim_get_username(sm->identity, sm->identity_len);
454 if (username == NULL)
457 if (username[0] == EAP_SIM_REAUTH_ID_PREFIX) {
458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'",
459 username);
461 sm->eap_sim_db_priv, username);
462 os_free(username);
478 if (username[
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_sim.c40 char permanent[20]; /* Permanent username */
421 char *username; local
453 username = sim_get_username(sm->identity, sm->identity_len);
454 if (username == NULL)
457 if (username[0] == EAP_SIM_REAUTH_ID_PREFIX) {
458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'",
459 username);
461 sm->eap_sim_db_priv, username);
462 os_free(username);
478 if (username[
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_sim.c40 char permanent[20]; /* Permanent username */
421 char *username; local
453 username = sim_get_username(sm->identity, sm->identity_len);
454 if (username == NULL)
457 if (username[0] == EAP_SIM_REAUTH_ID_PREFIX) {
458 wpa_printf(MSG_DEBUG, "EAP-SIM: Reauth username '%s'",
459 username);
461 sm->eap_sim_db_priv, username);
462 os_free(username);
478 if (username[
[all...]
/external/chromium_org/ui/login/account_picker/
H A Duser_pod_row.js837 this.imageElement.src = 'chrome://userimage/' + this.user.username +
838 '?id=' + UserPod.userImageSalt_[this.user.username];
1067 UserPod.userImageSalt_[this.user.username] = new Date().getTime();
1093 chrome.send('attemptUnlock', [this.user.username]);
1099 [this.user.username, this.passwordElement.value]);
1176 [user.isDesktopUser ? user.profilePath : user.username]);
1236 chrome.send('removeUser', [this.user.username]);
1529 [this.user.username, locale, keyboardLayout]);
1537 id = this.user.username + '-keyboard';
1541 var id = this.user.username
[all...]
/external/chromium_org/chrome/browser/chromeos/login/
H A Dlogin_utils.h50 // Checks if the given username is whitelisted and allowed to sign-in to
53 static bool IsWhitelisted(const std::string& username, bool* wildcard_match);
/external/chromium_org/chrome/browser/chromeos/login/users/
H A Dfake_user_manager.cc169 const std::string& username,
174 if ((*it)->email() == username) {
240 const std::string& username) const {
245 const std::string& username) const {
168 SaveUserDisplayName( const std::string& username, const base::string16& display_name) argument
/external/chromium_org/chrome/browser/chromeos/policy/
H A Duser_cloud_policy_manager_chromeos.cc57 void OnWildcardCheckCompleted(const std::string& username, argument
67 user_manager::UserManager::Get()->RemoveUserFromList(username);
169 const std::string& username) {
171 wildcard_username_ = username;
168 EnableWildcardLoginCheck( const std::string& username) argument
/external/chromium_org/chrome/browser/extensions/token_cache/
H A Dtoken_cache_service.cc74 const std::string& username) {
73 GoogleSignedOut(const std::string& account_id, const std::string& username) argument
/external/chromium_org/chrome/browser/ui/app_list/search/common/
H A Dwebservice_search_provider.cc80 // think that a username + password is a host + port (and we don't want to
83 if (!query_as_url.username().empty() ||
/external/chromium_org/chrome/browser/ui/
H A Dbrowser_dialogs.h98 const std::string& username,
/external/chromium_org/chrome/common/extensions/docs/server2/
H A Dgithub_file_system.py30 username,
35 fetch = fetcher.FetchAsync(ZIP_KEY, username=username, password=password)
82 password_data = password_store.GetMulti(('username', 'password')).Get()
83 self._username, self._password = (password_data.get('username'),
86 password_store.SetMulti({'username': USERNAME, 'password': PASSWORD})
176 username=USERNAME,
/external/chromium_org/components/autofill/content/renderer/
H A Dpassword_autofill_agent.h41 // Fills the username and password fields of this form with the given values.
44 const blink::WebString& username,
47 // Previews the username and password fields of this form with the given
50 const blink::WebString& username,
53 // Clears the preview for the username and password fields, restoring both to
57 // Shows an Autofill popup with username suggestions for |element|. If
95 // The user manually edited the password more recently than the username was
167 // |fill_data|. Will use the data corresponding to the preferred username,
169 // attempts to fill the password matching the already filled username, if
184 const blink::WebInputElement& username,
[all...]
/external/chromium_org/components/invalidation/
H A Dp2p_invalidation_service.h55 void UpdateCredentials(const std::string& username,
/external/chromium_org/components/password_manager/core/browser/
H A Dpassword_manager_client.h43 // Returns true if |username| and |origin| correspond to the account which is
46 const std::string& username, const std::string& origin) const = 0;
/external/chromium_org/components/policy/core/browser/
H A Dbrowser_policy_connector.cc217 bool BrowserPolicyConnector::IsNonEnterpriseUser(const std::string& username) { argument
218 if (username.empty() || username.find('@') == std::string::npos) {
219 // An empty username means incognito user in case of ChromiumOS and
226 gaia::ExtractDomainName(gaia::CanonicalizeEmail(username)));
H A Dbrowser_policy_connector.h93 // false if the username is empty.
94 static bool IsNonEnterpriseUser(const std::string& username);
/external/chromium_org/components/policy/core/common/cloud/
H A Duser_cloud_policy_manager.h54 void SetSigninUsername(const std::string& username);
H A Duser_cloud_policy_store.h45 // Sets the username from signin for validation of the policy.
46 void SetSigninUsername(const std::string& username);
/external/chromium_org/components/signin/core/browser/
H A Dsignin_client.h82 const std::string& username,
81 GoogleSigninSucceeded(const std::string& account_id, const std::string& username, const std::string& password) argument
/external/chromium_org/content/renderer/p2p/
H A Dport_allocator.cc183 "?username=" + net::EscapeUrlEncodedData(username(), true) +
197 WebString::fromUTF8(relay_config.username));
224 if (key == "username") {
225 if (value != username()) {
263 cricket::RelayCredentials credentials(config.relays[i].username,
/external/chromium_org/jingle/notifier/base/
H A Dgaia_token_pre_xmpp_auth.h21 GaiaTokenPreXmppAuth(const std::string& username, const std::string& token,
/external/chromium_org/net/ftp/
H A Dftp_auth_cache_unittest.cc26 const base::string16 kUsername(ASCIIToUTF16("username"));
47 EXPECT_EQ(kUsername1, entry1->credentials.username());
55 EXPECT_EQ(kUsername2, entry2->credentials.username());
66 EXPECT_EQ(kUsername3, entry3->credentials.username());
113 EXPECT_EQ(kOthername, entry2->credentials.username());

Completed in 5343 milliseconds

<<11121314151617181920>>