HomeSort by relevance Sort by last modified time
    Searched full:username (Results 451 - 475 of 1761) sorted by null

<<11121314151617181920>>

  /packages/apps/BasicSmsReceiver/res/values-zh-rTW/
strings.xml 20 <string name="sms_message_from_format" msgid="7163240046237558485">"?? <xliff:g id="USERNAME">%1$s</xliff:g> ???"</string>
  /packages/apps/BasicSmsReceiver/res/values-zu/
strings.xml 20 <string name="sms_message_from_format" msgid="7163240046237558485">"Umlayezo ovela ku-<xliff:g id="USERNAME">%1$s</xliff:g>"</string>
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
lmshare.h 130 NET_API_STATUS WINAPI NetSessionEnum(LMSTR servername,LMSTR UncClientName,LMSTR username,DWORD level,LPBYTE *bufptr,DWORD prefmaxlen,LPDWORD entriesread,LPDWORD totalentries,LPDWORD resume_handle);
131 NET_API_STATUS WINAPI NetSessionDel(LMSTR servername,LMSTR UncClientName,LMSTR username);
132 NET_API_STATUS WINAPI NetSessionGetInfo(LMSTR servername,LMSTR UncClientName,LMSTR username,DWORD level,LPBYTE *bufptr);
207 NET_API_STATUS WINAPI NetFileEnum(LMSTR servername,LMSTR basepath,LMSTR username,DWORD level,LPBYTE *bufptr,DWORD prefmaxlen,LPDWORD entriesread,LPDWORD totalentries,PDWORD_PTR resume_handle);
wincred.h 146 LPSTR UserName;
161 LPWSTR UserName;
212 LPWSTR UserName;
315 CREDUIAPI DWORD WINAPI CredUIParseUserNameW(CONST WCHAR *UserName,WCHAR *user,ULONG userBufferSize,WCHAR *domain,ULONG domainBufferSize);
316 CREDUIAPI DWORD WINAPI CredUIParseUserNameA(CONST CHAR *userName,CHAR *user,ULONG userBufferSize,CHAR *domain,ULONG domainBufferSize);
317 CREDUIAPI DWORD WINAPI CredUICmdLinePromptForCredentialsW(PCWSTR pszTargetName,PCtxtHandle pContext,DWORD dwAuthError,PWSTR UserName,ULONG ulUserBufferSize,PWSTR pszPassword,ULONG ulPasswordBufferSize,PBOOL pfSave,DWORD dwFlags);
318 CREDUIAPI DWORD WINAPI CredUICmdLinePromptForCredentialsA(PCSTR pszTargetName,PCtxtHandle pContext,DWORD dwAuthError,PSTR UserName,ULONG ulUserBufferSize,PSTR pszPassword,ULONG ulPasswordBufferSize,PBOOL pfSave,DWORD dwFlags);
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/distutils/command/
upload.py 32 self.username = ''
46 self.username = config['username']
134 auth = "Basic " + standard_b64encode(self.username + ":" +
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/distutils/command/
upload.py 32 self.username = ''
46 self.username = config['username']
134 auth = "Basic " + standard_b64encode(self.username + ":" +
  /external/chromium_org/sync/tools/testserver/
xmppserver_test.py 116 def DoHandshake(self, resource_prefix, resource, username,
128 username_domain = '%s@%s' % (username, auth_domain)
130 username_domain = username
155 self.assertEqual(self.jid.username, username)
165 def DoHandshakeUnauthenticated(self, resource_prefix, resource, username,
178 auth_string = base64.b64encode('\0%s\0bar' % username)
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
port.cc 74 // GICE(ICEPROTO_GOOGLE) requires different username for RTP and RTCP.
75 // This function generates a different username by +1 on the last character of
76 // the given username (|rtp_ufrag|).
387 // Check for the presence of USERNAME and MESSAGE-INTEGRITY (if ICE) first.
392 LOG_J(LS_ERROR, this) << "Received STUN request without username/M-I "
399 // If the username is bad or unknown, fail with a 401 Unauthorized.
406 LOG_J(LS_ERROR, this) << "Received STUN request with bad local username "
416 // Based on the STUN username, we can determine what's the remote protocol.
449 // NOTE: Username should not be used in verifying response messages.
486 // The packet must include a username that either begins or ends with ou
780 std::string username; local
    [all...]
candidate.h 53 const std::string& username, const std::string& password,
57 priority_(priority), username_(username), password_(password),
100 const std::string & username() const { return username_; } function in class:cricket::Candidate
101 void set_username(const std::string & username) { username_ = username; }
  /external/lldb/test/pexpect-2.4/examples/
topip.py 14 ./topip.py [-s server_hostname] [-u username] [-p password] {-a from_addr,to_addr} {-n N} {-v} {--ipv6}
17 -u : username to user for login.
131 # If localhost then don't ask for username/password.
134 username = options['-u']
136 username = raw_input('username: ')
182 p.login(hostname, username, password)