/external/chromium_org/chrome/browser/chromeos/settings/ |
device_settings_provider_unittest.cc | 145 InitOwner(device_policy_.policy_data().username(), true); 173 InitOwner(device_policy_.policy_data().username(), true);
|
/external/chromium_org/chrome/browser/importer/ |
firefox_importer_browsertest.cc | 43 const char* username; member in struct:__anon8760::PasswordInfo 156 EXPECT_EQ(base::ASCIIToUTF16(p.username), form.username_value);
|
/external/chromium_org/chrome/browser/signin/ |
signin_manager_unittest.cc | 79 const std::string& username, 85 const std::string& username) OVERRIDE {
|
/external/chromium_org/components/policy/core/common/cloud/ |
user_cloud_policy_store.cc | 191 void UserCloudPolicyStore::SetSigninUsername(const std::string& username) { 192 signin_username_ = username; 351 // username field in the policy contains). UserPolicySigninServerBase will 352 // verify that the username matches the signed in user once profile 356 // Validate the username if the user is signed in. The signin_username_ can 360 DVLOG(1) << "Validating username: " << signin_username_;
|
/external/chromium_org/components/test/data/password_manager/ |
environment.py | 150 if not websitetest.username: 153 ".//*[@name='%s']/username" % websitetest.name)) 155 websitetest.username = username_tag.text
|
/external/chromium_org/net/http/ |
http_auth_handler_digest.cc | 326 std::string ha1 = base::MD5String(base::UTF16ToUTF8(credentials.username()) + 354 std::string authorization = (std::string("Digest username=") + 356 base::UTF16ToUTF8(credentials.username())));
|
http_auth_handler_digest_unittest.cc | 390 const char* username; member in struct:net::__anon13896 396 { // MD5 with username/password 405 "foo", "bar", // username/password 410 "Digest username=\"foo\", realm=\"DRealm1\", " 417 { // MD5 with username but empty password. username has space in it. 426 "foo bar", "", // Username/password 431 "Digest username=\"foo bar\", realm=\"DRealm1\", " 438 { // MD5 with no username. 447 "", "pass", // Username/passwor [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
tcpport.cc | 39 int min_port, int max_port, const std::string& username, 42 username, password),
|
p2ptransportchannel.cc | 424 std::string username = it->username(); local 426 if (it->username() != username) { 437 if (it->username() == remote_username) { 458 // Don't know about this username, the request is bogus 640 // ICE candidates don't need to have username and password set, but 642 // port.cc) uses the remote candidates's username. So, we set it 644 if (remote_candidate.username().empty()) { [all...] |
turnport_unittest.cc | 185 void CreateTurnPort(const std::string& username, 188 CreateTurnPort(kLocalAddr1, username, password, server_address); 191 const std::string& username, 194 cricket::RelayCredentials credentials(username, password); 208 void CreateSharedTurnPort(const std::string& username, 221 cricket::RelayCredentials credentials(username, password);
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/client/ |
portallocator_unittest.cc | 301 EXPECT_TRUE(allocator().relays()[0].credentials.username.empty()); 738 EXPECT_EQ(kIceUfrag0, candidates_[0].username()); 739 EXPECT_EQ(kIceUfrag0, candidates_[1].username()); 740 EXPECT_EQ(kIceUfrag0, candidates_[2].username()); [all...] |
/external/chromium_org/remoting/host/ |
remoting_me2me_host.cc | 71 #include "remoting/host/username.h" 843 if (!config->GetString(kXmppLoginConfigPath, &xmpp_server_config_.username) || 869 host_owner_ = xmpp_server_config_.username; 978 std::string username = GetUsername(); local [all...] |
/external/chromium_org/remoting/webapp/ |
xmpp_login_handler.js | 19 * @param {string} username Username. 33 username, 42 this.username_ = username;
|
/external/chromium_org/sync/internal_api/ |
sync_manager_impl.cc | 284 const std::string& username = args->credentials.email; local 285 DVLOG(1) << "Username: " << username; 286 if (!OpenDirectory(username)) { 434 bool SyncManagerImpl::OpenDirectory(const std::string& username) { 443 open_result = directory()->Open(username, this, transaction_observer); 445 LOG(ERROR) << "Could not open share for:" << username; [all...] |
/external/chromium_org/chrome/browser/extensions/api/web_request/ |
web_request_api_unittest.cc | 1305 base::string16 username = base::ASCIIToUTF16("foo"); local 2160 base::string16 username = base::ASCIIToUTF16("foo"); local [all...] |
/external/libselinux/src/ |
android.c | 523 const char *username = NULL; local 537 username = android_ids[n].name; 541 if (!username) 544 username = "_app"; 547 username = "_isolated"; 562 if (strncasecmp(username, cur->user.str, cur->user.len-1)) 565 if (strcasecmp(username, cur->user.str)) [all...] |
/external/chromium_org/chrome/browser/ui/webui/options/ |
browser_options_handler.cc | 522 std::string username = profile->GetProfileName(); local 523 if (username.empty()) { 527 username = user->email(); 529 if (!username.empty()) 530 username = gaia::SanitizeEmail(gaia::CanonicalizeEmail(username)); 532 values->SetString("username", username); [all...] |
/external/chromium_org/chrome/browser/chromeos/options/ |
vpn_config_view.cc | 291 // Username is always required. 626 // Username label and input. 714 std::string provider_type, server_hostname, username, group_name; local 732 shill::kL2tpIpsecUserProperty, &username); 741 shill::kOpenVPNUserProperty, &username); 760 if (username_textfield_ && !username.empty()) 761 username_textfield_->SetText(base::UTF8ToUTF16(username)); [all...] |
/external/chromium_org/chrome/browser/ui/sync/ |
one_click_signin_helper_unittest.cc | 76 MOCK_CONST_METHOD1(IsAllowedUsername, bool(const std::string& username)); 228 // Sets up the sign-in manager for tests. If |username| is 231 void SetUpSigninManager(const std::string& username); 283 void OneClickSigninHelperTest::SetUpSigninManager(const std::string& username) { 291 if (!username.empty()) { 293 signin_manager_->SetAuthenticatedUsername(username); [all...] |
/external/chromium_org/google_apis/gaia/ |
gaia_auth_fetcher.cc | 246 const std::string& username, 253 std::string encoded_username = net::EscapeUrlEncodedData(username, true); 484 const std::string& username, 495 DVLOG(1) << "Starting new ClientLogin fetch for:" << username; 498 request_body_ = MakeClientLoginBody(username, [all...] |
/external/chromium_org/net/ftp/ |
ftp_network_transaction.cc | 254 base::string16 username; local 256 GetIdentityFromURL(request_->url, &username, &password); 257 credentials_.Set(username, password); 709 credentials_.username() == base::ASCIIToUTF16("anonymous")) { 756 std::string command = "USER " + base::UTF16ToUTF8(credentials_.username()); [all...] |
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/ |
peerconnection.cc | 105 // turn-host = username@IP-literal / IPv4address / reg-name 226 server.username = rtc::s_url_decode(tokens[0]); 255 if (server.username.empty()) { 260 server.username = rtc::s_url_decode(turn_tokens[0]); 268 server.username, 659 cricket::RelayCredentials credentials(turns[i].username,
|
/external/chromium_org/chrome/browser/chromeos/login/ |
existing_user_controller_browsertest.cc | 449 void SetAutoLoginPolicy(const std::string& username, int delay) { 462 proto.device_local_accounts().auto_login_id() != username) { 480 proto.mutable_device_local_accounts()->set_auto_login_id(username);
|
/external/chromium_org/chrome/browser/ui/webui/chromeos/login/ |
gaia_screen_handler.cc | 496 void GaiaScreenHandler::ShowSigninScreenForCreds(const std::string& username, 498 VLOG(2) << "ShowSigninScreenForCreds for user " << username 501 test_user_ = username;
|
/external/chromium_org/chromeos/network/ |
network_connection_handler.cc | 55 std::string username; local 57 shill::kOpenVPNUserProperty, &username); 58 if (username.empty()) { 59 NET_LOG_EVENT("OpenVPN: No username", service_path); 491 // VPN may require a username, and/or passphrase to be set. (Check after
|