/external/openssh/ |
loginrec.h | 69 char username[LINFO_NAMESIZE]; /* login username */ member in struct:logininfo 89 struct logininfo *login_alloc_entry(pid_t pid, const char *username, 94 int login_init_entry(struct logininfo *li, pid_t pid, const char *username,
|
/external/selinux/libselinux/src/ |
seusers.c | 178 char *username = NULL; local 195 rc = process_seusers(buffer, &username, &seuser, &level, 205 if (!strcmp(username, name)) 208 if (username[0] == '%' && 210 check_group(&username[1], name, gid)) { 215 !strcmp(username, "__default__")) { 223 free(username); 224 username = NULL; 232 free(username); 260 /* Fall back to the Linux username and no level. * [all...] |
/external/webrtc/webrtc/base/ |
autodetectproxy.h | 44 void set_auth_info(bool use_auth, const std::string& username, 47 proxy_.username = username;
|
/tools/test/connectivity/acts/framework/acts/controllers/utils_lib/ssh/ |
settings.py | 45 username: The name of the user to log in as. 58 username, 65 self.username = username
|
/external/autotest/client/site_tests/login_RemoteOwnership/ |
login_RemoteOwnership.py | 50 self.username = (''.join(random.sample(string.ascii_lowercase,6)) + 53 self._cryptohome_proxy.remove(self.username) 54 self._cryptohome_proxy.mount(self.username, password, create=True) 58 if not self._sm.StartSession(self.username, ''): 79 self._cryptohome_proxy.remove(self.username)
|
/external/autotest/client/site_tests/security_ProfilePermissions/ |
security_ProfilePermissions.py | 51 username = (cr.username if self._logged_in 61 user_mountpt = cryptohome.user_path(username) 115 if cryptohome.is_permanent_vault_mounted(username): 118 mountpath = cryptohome.get_mounted_vault_path(username)
|
/external/chromium-trace/catapult/telemetry/telemetry/internal/backends/chrome/ |
cros_test_case.py | 22 self._username = options.browser_options.username 28 gaia_login=False, username=None, password=None, 49 if username is not None: 50 browser_options.username = username
|
/external/toybox/toys/pending/ |
userdel.c | 25 static void update_groupfiles(char *filename, char* username) 29 int ulen = strlen(username); 53 sprintf(toybuf, "%s:",username); 58 if (p && *++p && (n = strstr(p, username))) { 71 } while (*n && (n=strstr(n, username)));
|
/external/autotest/client/common_lib/cros/ |
chrome.py | 20 def NormalizeEmail(username): 21 """Remove dots from username. Add @gmail.com if necessary. 25 @param username: username/email to be scrubbed. 27 parts = re.split('@', username) 60 username=None, password=None, gaia_id=None, 84 @param username: Log in using this username instead of the default. 133 self.username = b_options.username if username is None else usernam [all...] |
/packages/apps/Email/tests/src/com/android/email/ |
AccountTestCase.java | 54 protected android.accounts.Account makeAccountManagerAccount(String username) { 55 return new android.accounts.Account(username, TEST_ACCOUNT_TYPE); 58 protected void createAccountManagerAccount(String username) { 59 final android.accounts.Account account = makeAccountManagerAccount(username); 63 protected Account setupProviderAndAccountManagerAccount(String username) { 64 // Note that setupAccount creates the email address username@android.com, so that's what 66 createAccountManagerAccount(username + TEST_ACCOUNT_SUFFIX); 67 return ProviderTestUtils.setupAccount(username, true, getMockContext());
|
/developers/samples/android/input/autofill/AutofillFramework/kotlinApp/Application/src/main/java/com/example/android/autofillframework/app/ |
StandardAutoCompleteSignInActivity.kt | 73 val username = usernameField.text.toString() 75 val valid = isValidCredentials(username, password) 89 fun isValidCredentials(username: String?, password: String?): Boolean { 90 return username != null && password != null && username == password
|
/external/webrtc/webrtc/p2p/base/ |
stunport.h | 35 const std::string& username, 39 UDPPort* port = new UDPPort(thread, factory, network, socket, username, 54 const std::string& username, 59 new UDPPort(thread, factory, network, ip, min_port, max_port, username, 116 const std::string& username, 125 const std::string& username, 236 const std::string& username, 242 username, password, servers, 264 const std::string& username, 274 username, [all...] |
/packages/experimental/FillService/src/foo/bar/fill/ |
FillService.java | 79 ViewNode username = findUsername(structure); local 82 if (username != null && password != null) { 105 .setAuthentication(new AutofillId[]{username.getAutofillId(), 132 .setValue(username.getAutofillId(), 138 .setValue(username.getAutofillId(), 145 .setValue(username.getAutofillId(), 152 .setValue(username.getAutofillId(), 159 .setValue(username.getAutofillId(), 168 new AutofillId[] {username.getAutofillId(), 183 ViewNode username = findUsername(structure) local [all...] |
AuthActivity.java | 27 ViewNode username = FillService.findUsername(structure); local 42 .setValue(username.getAutofillId(), 48 .setValue(username.getAutofillId(), 60 .setValue(username.getAutofillId(),
|
/bionic/tests/ |
grp_pwd_test.cpp | 43 static void check_passwd(const passwd* pwd, const char* username, uid_t uid, uid_type_t uid_type) { 45 ASSERT_STREQ(username, pwd->pw_name); 61 static void check_getpwuid(const char* username, uid_t uid, uid_type_t uid_type) { 66 check_passwd(pwd, username, uid, uid_type); 69 static void check_getpwnam(const char* username, uid_t uid, uid_type_t uid_type) { 71 passwd* pwd = getpwnam(username); 74 check_passwd(pwd, username, uid, uid_type); 77 static void check_getpwuid_r(const char* username, uid_t uid, uid_type_t uid_type) { 88 check_passwd(pwd, username, uid, uid_type); 91 static void check_getpwnam_r(const char* username, uid_t uid, uid_type_t uid_type) [all...] |
/external/autotest/client/site_tests/enterprise_PowerManagement/ |
enterprise_PowerManagement.py | 34 # Username and password for the fake dm server can be anything 36 self.username = 'fake-user@managedchrome.com' 81 }""" % (json.dumps(screen_lock_policy), self.username) 111 }""" % (json.dumps(idle_settings_policy), self.username) 129 username=self.username, 146 lambda: not cryptohome.is_vault_mounted(user=self.username,
|
/external/libmicrohttpd/src/testcurl/ |
test_digestauth.c | 80 char *username; local 85 username = MHD_digest_auth_get_username(connection); 86 if ( (username == NULL) || 87 (0 != strcmp (username, "testuser")) ) 100 username, 103 free(username);
|
test_digestauth_with_arguments.c | 79 char *username; local 84 username = MHD_digest_auth_get_username(connection); 85 if ( (username == NULL) || 86 (0 != strcmp (username, "testuser")) ) 99 username, 102 free(username);
|
/external/syslinux/bios/com32/cmenu/ |
test.c | 50 char username[12]; // Name of user currently using the system variable 194 (isallowed(username,"editcmd") || isallowed(username,"root"))) { 225 csprint("Enter Username: ",0x07); 226 getstring(login, sizeof username); 236 strcpy(username,login); 238 strcat(logoutstr,username); 242 else strcpy(username,GUEST_USER); 246 strcpy(username,GUEST_USER); 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowe [all...] |
/external/syslinux/efi32/com32/cmenu/ |
test.c | 50 char username[12]; // Name of user currently using the system variable 194 (isallowed(username,"editcmd") || isallowed(username,"root"))) { 225 csprint("Enter Username: ",0x07); 226 getstring(login, sizeof username); 236 strcpy(username,login); 238 strcat(logoutstr,username); 242 else strcpy(username,GUEST_USER); 246 strcpy(username,GUEST_USER); 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowe [all...] |
/external/syslinux/efi64/com32/cmenu/ |
test.c | 50 char username[12]; // Name of user currently using the system variable 194 (isallowed(username,"editcmd") || isallowed(username,"root"))) { 225 csprint("Enter Username: ",0x07); 226 getstring(login, sizeof username); 236 strcpy(username,login); 238 strcat(logoutstr,username); 242 else strcpy(username,GUEST_USER); 246 strcpy(username,GUEST_USER); 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowe [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 41 const char *username, int max_chal, 69 char *permanent; /* Permanent username */ 70 char *reauth_id; /* Fast re-authentication username */ 85 int eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, 90 const char *username, const u8 *auts,
|
/external/autotest/client/site_tests/login_OwnershipTaken/ |
login_OwnershipTaken.py | 32 def _validate_policy(self, retrieved_policy, username): 47 ownership.assert_username(poldata, username) 52 ownership.assert_users_on_whitelist(polval, (username,)) 66 self._validate_policy(retrieved_policy, cr.username)
|
/external/autotest/server/hosts/ |
gce_host.py | 59 @param username: user name to add. 72 def add_ssh_key(self, username, ssh_key): 75 @param username: user name to add. 78 self._modify_ssh_keys(['%s:%s' % (username, ssh_key)], []) 81 def del_ssh_key(self, username, ssh_key): 84 @param username: user name to delete. 87 self._modify_ssh_keys([], ['%s:%s' % (username, ssh_key)])
|
/external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/ |
UserAccountTest.groovy | 32 private static final USERNAME = "user123" 40 def acct = new UserAccount(USERNAME, PASSWORD, HOME_DIR) 41 assert acct.username == USERNAME 60 userAccount.username = USERNAME 71 shouldFailWithMessageContaining('username') { userAccount.isValidPassword(PASSWORD) } 73 userAccount.username = '' 74 shouldFailWithMessageContaining('username') { userAccount.isValidPassword(PASSWORD) } 79 customUserAccount.username = USERNAM [all...] |