/external/webrtc/talk/app/webrtc/ |
H A D | peerconnection_unittest.cc | 1857 const std::string& username, 1862 server.username = username; 1991 // Test parsing ICE username contained in URL. 1995 EXPECT_EQ("user", turn_servers_[0].credentials.username); 1999 EXPECT_FALSE(ParseUrl("turn:username@")); 2004 // Test that username and password from IceServer is copied into the resulting 2007 EXPECT_TRUE(ParseUrl("turn:hostname", "username", "password")); 2009 EXPECT_EQ("username", turn_servers_[0].credentials.username); 1856 ParseUrl(const std::string& url, const std::string& username, const std::string& password) argument [all...] |
H A D | webrtcsdp.cc | 807 // o=<username> <sess-id> <sess-version> <nettype> <addrtype> 1079 std::string username; local 1090 username = fields[++i]; 1100 address, priority, username, password, candidate_type, 1775 if (include_ufrag && !it->username().empty()) { 1776 os << " " << kAttributeCandidateUfrag << " " << it->username(); 1824 // o=<username> <sess-id> <sess-version> <nettype> <addrtype> 2689 ASSERT((*it).username().empty() || 2690 (*it).username() == transport->ice_ufrag);
|
/external/webrtc/webrtc/base/ |
H A D | httpcommon.cc | 748 const std::string& username, const CryptString& password, 767 if (username.empty()) 773 //std::string decoded = username + ":" + password; 774 size_t len = username.size() + password.GetLength() + 2; 776 size_t pos = strcpyn(sensitive, len, username.data(), username.size()); 793 if (username.empty()) 817 //std::string A1 = username + ":" + realm + ":" + password; 818 size_t len = username.size() + realm.size() + password.GetLength() + 3; 820 size_t pos = strcpyn(sensitive, len, username 744 HttpAuthenticate( const char * challenge, size_t len, const SocketAddress& server, const std::string& method, const std::string& uri, const std::string& username, const CryptString& password, HttpAuthContext *& context, std::string& response, std::string& auth_method) argument [all...] |
/external/webrtc/webrtc/p2p/base/ |
H A D | port.cc | 355 LOG_J(LS_ERROR, this) << "Received STUN request without username/M-I " 362 // If the username is bad or unknown, fail with a 401 Unauthorized. 367 LOG_J(LS_ERROR, this) << "Received STUN request with bad local username " 438 // The packet must include a username that either begins or ends with our 449 const std::string username = username_attr->GetString(); local 450 size_t colon_pos = username.find(":"); 455 *local_ufrag = username.substr(0, colon_pos); 456 *remote_ufrag = username.substr(colon_pos + 1, username.size()); 474 // If |remote_ufrag| is same as port local username fragmen 681 std::string username; variable [all...] |
H A D | turnport.cc | 186 const std::string& username, 196 username, 218 const std::string& username, 231 username, 274 if (credentials_.username.empty() || 888 STUN_ATTR_USERNAME, credentials_.username))); 902 VERIFY(ComputeStunCredentialHash(credentials_.username, realm_, 182 TurnPort(rtc::Thread* thread, rtc::PacketSocketFactory* factory, rtc::Network* network, rtc::AsyncPacketSocket* socket, const std::string& username, const std::string& password, const ProtocolAddress& server_address, const RelayCredentials& credentials, int server_priority, const std::string& origin) argument 212 TurnPort(rtc::Thread* thread, rtc::PacketSocketFactory* factory, rtc::Network* network, const rtc::IPAddress& ip, uint16_t min_port, uint16_t max_port, const std::string& username, const std::string& password, const ProtocolAddress& server_address, const RelayCredentials& credentials, int server_priority, const std::string& origin) argument
|
H A D | port_unittest.cc | 711 const std::string& username) { 714 new StunByteStringAttribute(STUN_ATTR_USERNAME, username)); 718 const std::string& username, 721 addr.ipaddr(), 0, 0, username, password); 726 const std::string& username, 730 TestPort* port = CreateTestPort(addr, username, password); 1299 // verifies Message Integrity attribute in STUN messages and username in STUN 1300 // binding request will have colon (":") between remote and local username. 1313 // loopback test when protocol is RFC5245. For success IceTiebreaker, username 1768 std::string username; local 710 CreateStunMessageWithUsername(int type, const std::string& username) argument 717 CreateTestPort(const rtc::SocketAddress& addr, const std::string& username, const std::string& password) argument 725 CreateTestPort(const rtc::SocketAddress& addr, const std::string& username, const std::string& password, cricket::IceRole role, int tiebreaker) argument 1818 std::string username; local 1887 std::string username; local 1928 std::string username; local 1997 std::string username; local [all...] |
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_server.c | 81 char *username; /* from User-Name attribute */ member in struct:radius_session 393 "(timestamp,session,nas_ip,username,note)" 398 sess->username, buf); 478 os_free(sess->username); 612 pos = os_strstr(sess->username, "@test-"); 663 sess->username = os_malloc(user_len * 4 + 1); 664 if (sess->username == NULL) { 668 printf_encode(sess->username, user_len * 4 + 1, user, user_len); 874 res = data->get_eap_user(data->conf_ctx, (u8 *) sess->username, 875 os_strlen(sess->username), [all...] |
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | http_curl.c | 1310 const char *ca_fname, const char *username, 1322 "username=%s%s", address, ca_fname, username, extra); 1362 if (username) { 1364 curl_easy_setopt(curl, CURLOPT_USERNAME, username); 1373 const char *ca_fname, const char *username, 1382 clone_str(&ctx->svc_username, username); 1398 ctx->curl = setup_curl_post(ctx, ctx->svc_address, ca_fname, username, 1408 const char *ca_fname, const char *username, 1412 if (post_init_client(ctx, address, ca_fname, username, passwor 1309 setup_curl_post(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1372 post_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1407 soap_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1430 char *username = NULL; local 1641 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_server.c | 81 char *username; /* from User-Name attribute */ member in struct:radius_session 393 "(timestamp,session,nas_ip,username,note)" 398 sess->username, buf); 478 os_free(sess->username); 612 pos = os_strstr(sess->username, "@test-"); 663 sess->username = os_malloc(user_len * 4 + 1); 664 if (sess->username == NULL) { 668 printf_encode(sess->username, user_len * 4 + 1, user, user_len); 874 res = data->get_eap_user(data->conf_ctx, (u8 *) sess->username, 875 os_strlen(sess->username), [all...] |
/external/wpa_supplicant_8/src/utils/ |
H A D | http_curl.c | 1310 const char *ca_fname, const char *username, 1322 "username=%s%s", address, ca_fname, username, extra); 1362 if (username) { 1364 curl_easy_setopt(curl, CURLOPT_USERNAME, username); 1373 const char *ca_fname, const char *username, 1382 clone_str(&ctx->svc_username, username); 1398 ctx->curl = setup_curl_post(ctx, ctx->svc_address, ca_fname, username, 1408 const char *ca_fname, const char *username, 1412 if (post_init_client(ctx, address, ca_fname, username, passwor 1309 setup_curl_post(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1372 post_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1407 soap_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1430 char *username = NULL; local 1641 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | config.h | 99 * username - Username for Interworking network selection 101 char *username; member in struct:wpa_cred
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_server.c | 81 char *username; /* from User-Name attribute */ member in struct:radius_session 393 "(timestamp,session,nas_ip,username,note)" 398 sess->username, buf); 478 os_free(sess->username); 612 pos = os_strstr(sess->username, "@test-"); 663 sess->username = os_malloc(user_len * 4 + 1); 664 if (sess->username == NULL) { 668 printf_encode(sess->username, user_len * 4 + 1, user, user_len); 874 res = data->get_eap_user(data->conf_ctx, (u8 *) sess->username, 875 os_strlen(sess->username), [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | http_curl.c | 1310 const char *ca_fname, const char *username, 1322 "username=%s%s", address, ca_fname, username, extra); 1362 if (username) { 1364 curl_easy_setopt(curl, CURLOPT_USERNAME, username); 1373 const char *ca_fname, const char *username, 1382 clone_str(&ctx->svc_username, username); 1398 ctx->curl = setup_curl_post(ctx, ctx->svc_address, ca_fname, username, 1408 const char *ca_fname, const char *username, 1412 if (post_init_client(ctx, address, ca_fname, username, passwor 1309 setup_curl_post(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1372 post_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1407 soap_init_client(struct http_ctx *ctx, const char *address, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key) argument 1430 char *username = NULL; local 1641 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument [all...] |
/external/openssh/ |
H A D | channels.c | 1058 char username[256]; local 1112 strlcpy(username, p, sizeof(username));
|
/external/webrtc/talk/app/webrtc/java/jni/ |
H A D | peerconnection_jni.cc | 1512 GetFieldID(jni, j_ice_server_class, "username", "Ljava/lang/String;"); 1517 jstring username = reinterpret_cast<jstring>( local 1523 server.username = JavaToStdString(jni, username);
|
/external/dnsmasq/src/ |
H A D | dnsmasq.h | 614 char *username, *groupname, *scriptuser; member in struct:daemon
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/ |
H A D | ant-starteam.jar | ... String projectName private String folderName private String viewName private String username private String password private String targetFolder private boolean force private ... |
H A D | ant-jsch.jar | ... getVerbose () public void setUsername (java.lang.String) String username
public void setPassword (java.lang.String) String password ... |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.ecf.provider.filetransfer.httpclient_4.0.0.v20100529-0735.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.ecf.provider.filetransfer_3.1.0.v20100529-0735.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.ecf_3.1.0.v20100529-0735.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/curl/lib/ |
H A D | urldata.h | 366 char *username; /* TLS username (for, e.g., SRP) */ member in struct:ssl_config_data 1423 STRING_USERNAME, /* <username>, if used */ 1426 STRING_PROXYUSERNAME, /* Proxy <username>, if used */ 1450 STRING_TLSAUTH_USERNAME, /* TLS auth <username> */
|
/external/libvncserver/webclients/java-applet/ssl/ |
H A D | SignedUltraViewerSSL.jar | ... .awt.Label promptuser java.awt.TextField username boolean mslogon public void " href="/8.0.0_r4 ... |
H A D | UltraViewerSSL.jar | ... .awt.Label promptuser java.awt.TextField username boolean mslogon public void " href="/8.0.0_r4 ... |
/external/slf4j/log4j-over-slf4j/compatibility/lib/ |
H A D | logback-classic-0.9.8-SNAPSHOT.jar | META-INF/ META-INF/MANIFEST.MF ch/ ch/qos/ ch/qos/logback/ ch/qos/logback/classic/ ... |