/external/syslinux/com32/cmenu/ |
complex.c | 53 char username[12]; // Name of user currently using the system variable 80 (isallowed(username, "editcmd") || isallowed(username, "root"))) { 112 csprint("Enter Username: ", 0x07); 113 getstring(login, sizeof username); 122 strcpy(username, login); 125 strcpy(username, GUEST_USER); 128 strcpy(username, GUEST_USER); 132 if (strcmp(username, GUEST_USER) == 0) { 159 cprint(ms->fillchar, ms->fillattr, sizeof username); [all...] |
/external/libcups/cups/ |
md5passwd.c | 25 * 'httpMD5()' - Compute the MD5 sum of the username:group:password. 29 httpMD5(const char *username, /* I - User name */ 43 snprintf(line, sizeof(line), "%s:%s:%s", username, realm, passwd); 57 * 'httpMD5Final()' - Combine the MD5 sum of the username, group, and password 85 * Then combine A1 (MD5 of username, realm, and password) with the nonce
|
/external/wpa_supplicant_8/src/utils/ |
http-utils.h | 39 const char *ca_fname, const char *username, 54 const char *username, const char *password,
|
/packages/apps/Email/provider_src/com/android/email/mail/store/ |
ServiceStore.java | 82 public Bundle autoDiscover(Context context, String username, String password) { 84 return getService().autoDiscover(username, password);
|
/developers/build/prebuilts/gradle/AutofillFramework/Application/src/main/java/com/example/android/autofillframework/app/ |
StandardAutoCompleteSignInActivity.java | 99 String username = mUsernameAutoCompleteField.getText().toString(); local 101 boolean valid = isValidCredentials(username, password); 115 public boolean isValidCredentials(String username, String password) { 116 return username != null && password != null && username.equals(password);
|
/developers/samples/android/input/autofill/AutofillFramework/Application/src/main/java/com/example/android/autofillframework/app/ |
StandardAutoCompleteSignInActivity.java | 99 String username = mUsernameAutoCompleteField.getText().toString(); local 101 boolean valid = isValidCredentials(username, password); 115 public boolean isValidCredentials(String username, String password) { 116 return username != null && password != null && username.equals(password);
|
/external/openssh/ |
logintest.c | 77 li->username, li->hostname, li->exit, 91 char username[32]; local 101 strlcpy(username, pw->pw_name, sizeof(username)); 108 li1 = login_alloc_entry((int)getpid(), username, NULL, ttyname(0));
|
loginrec.c | 307 * If we don't have a 'real' lastlog, we need the username to 316 if (strlcpy(li->username, pw->pw_name, sizeof(li->username)) >= 317 sizeof(li->username)) { 318 error("%s: username too long (%lu > max %lu)", __func__, 320 (unsigned long)sizeof(li->username) - 1); 341 logininfo *login_alloc_entry(pid_t pid, const char *username, 347 login_init_entry(newli, pid, username, hostname, line); 369 login_init_entry(struct logininfo *li, pid_t pid, const char *username, 382 if (username) { [all...] |
/external/toybox/toys/posix/ |
id.c | 85 static void do_id(char *username) 95 // check if a username is given 96 if (username) { 97 pw = xgetpwnam(username); 131 ngroups = username ? getgrouplist(username, gid, groups, &i)
|
/external/webrtc/webrtc/p2p/client/ |
fakeportallocator.h | 35 const std::string& username, 40 max_port, username, password, origin, 65 const std::string& username, 75 username, 105 network_.GetBestIP(), 0, 0, username(),
|
/external/autotest/database/ |
database_connection.py | 11 'username' : 'user', 37 def connect(self, host=None, username=None, password=None, db_name=None): 71 def connect(self, host=None, username=None, password=None, db_name=None): 77 host=host, user=username, passwd=password, db=db_name, 94 def connect(self, host=None, username=None, password=None, db_name=None): 124 def connect(self, host=None, username=None, password=None, db_name=None): 161 _DATABASE_ATTRIBUTES = ('db_type', 'host', 'username', 'password', 210 def _read_options(self, db_type=None, host=None, username=None, 220 @param username: user name for database connection, default to None. 225 use_afe_setting = not bool(db_type or host or username or password [all...] |
/prebuilts/tools/common/m2/repository/io/netty/netty-handler-proxy/4.1.6.Final/ |
netty-handler-proxy-4.1.6.Final.jar | |
/external/mdnsresponder/mDNSWindows/ControlPanel/ |
RegistrationPage.cpp | 204 CString username; local 213 username = outUsername; 214 m_usernameControl.SetWindowText( username ); 292 CString username; local 305 m_usernameControl.GetWindowText( username ); 308 if ( username.GetLength() && password.GetLength() ) 310 StringObjectToUTF8String( username, usernameUTF8, sizeof( usernameUTF8 ) );
|
/external/webrtc/webrtc/p2p/base/ |
portallocator.h | 79 // TODO(deadbeef): Rename to TurnCredentials (and username to ufrag). 82 RelayCredentials(const std::string& username, const std::string& password) 83 : username(username), password(password) {} 85 std::string username; member in struct:cricket::RelayCredentials 96 const std::string& username, 100 : type(RELAY_TURN), credentials(username, password) { 151 const std::string& username() const { return ice_ufrag_; } function in class:cricket::PortAllocatorSession
|
relayport.h | 44 const std::string& username, 47 username, password); 82 const std::string& username,
|
testturnserver.h | 104 // For this test server, succeed if the password is the same as the username. 106 virtual bool GetKey(const std::string& username, const std::string& realm, 108 return ComputeStunCredentialHash(username, realm, username, key);
|
/development/samples/SampleSyncAdapter/samplesyncadapter_server/ |
web_services.py | 58 Process a request to authenticate a client. We assume that the username 67 self.username = self.request.get('username') 70 logging.info('Authenticatng username: ' + self.username) 72 if ((self.username != None) and 73 (self.username.startswith(BaseWebServiceHandler.ACCT_USER_NAME)) and 88 The request should include username/password parameters that correspond 95 self.username = self.request.get('username') [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_aka.c | 53 char permanent[20]; /* Permanent username */ 92 const char *username) 95 username[0] != EAP_AKA_PRIME_REAUTH_ID_PREFIX) 98 username[0] != EAP_AKA_REAUTH_ID_PREFIX) 101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username); 103 username); 134 char *username; local 138 username = sim_get_username(sm->identity, sm->identity_len); 139 if (username == NULL 717 char *username; local [all...] |
/packages/apps/Email/src/com/android/email/mail/transport/ |
SmtpSender.java | 286 // S: 334 Username: 292 private void saslAuthLogin(String username, String password) throws MessagingException, 297 Base64.encodeToString(username.getBytes(), Base64.NO_WRAP), 298 "/username redacted/"); 311 private void saslAuthPlain(String username, String password) throws MessagingException, 313 byte[] data = ("\000" + username + "\000" + password).getBytes(); 326 private void saslAuthOAuth(String username) throws MessagingException, 331 saslAuthOAuth(username, accessToken); 334 saslAuthOAuth(username, accessToken); 338 private void saslAuthOAuth(final String username, final String accessToken) throws IOException [all...] |
/external/autotest/frontend/client/src/autotest/afe/ |
HostTableDecorator.java | 30 private JSONValue username; field in class:HostTableDecorator.AclAccessibleFilter 34 username = new JSONString(StaticDataRepository.getRepository().getCurrentUserLogin()); 39 return username;
|
/external/devlib/devlib/utils/ |
ssh.py | 49 def ssh_get_shell(host, username, password=None, keyfile=None, port=None, timeout=10, telnet=False, original_prompt=None): 62 conn.login(host, username, ssh_key=keyfile, port=port, login_timeout=timeout) 64 conn.login(host, username, password, port=port, login_timeout=timeout) 87 def login(self, server, username, password='', login_timeout=10, 90 if username is not None: 91 args += ['-l', username] 155 username, 166 self.username = username 172 logger.debug('Logging in {}@{}'.format(username, host) [all...] |
/external/syslinux/bios/com32/cmenu/ |
test2.c | 50 char username[12]; // Name of user currently using the system variable 194 (isallowed(username,"editcmd") || isallowed(username,"root"))) { 225 csprint("Enter Username: ",0x07); 226 getstring(login, sizeof username); 236 strcpy(username,login); 238 strcat(logoutstr,username); 242 else strcpy(username,GUEST_USER); 246 strcpy(username,GUEST_USER); 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowe [all...] |
/external/syslinux/efi32/com32/cmenu/ |
test2.c | 50 char username[12]; // Name of user currently using the system variable 194 (isallowed(username,"editcmd") || isallowed(username,"root"))) { 225 csprint("Enter Username: ",0x07); 226 getstring(login, sizeof username); 236 strcpy(username,login); 238 strcat(logoutstr,username); 242 else strcpy(username,GUEST_USER); 246 strcpy(username,GUEST_USER); 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowe [all...] |
/external/syslinux/efi64/com32/cmenu/ |
test2.c | 50 char username[12]; // Name of user currently using the system variable 194 (isallowed(username,"editcmd") || isallowed(username,"root"))) { 225 csprint("Enter Username: ",0x07); 226 getstring(login, sizeof username); 236 strcpy(username,login); 238 strcat(logoutstr,username); 242 else strcpy(username,GUEST_USER); 246 strcpy(username,GUEST_USER); 265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowe [all...] |
/system/tpm/attestation/server/ |
attestation_service.cc | 125 if (!CreateKey(request.username(), request.key_label(), request.key_type(), 132 if (!CreateCertificateRequest(request.username(), key, 146 if (!FinishCertificateRequest(certificate_reply, request.username(), 175 if (!FindKeyByLabel(request.username(), request.key_label(), &key)) { 356 if (!CreateKey(request.username(), request.key_label(), request.key_type(), 388 if (!FindKeyByLabel(request.username(), request.key_label(), &key)) { 414 if (!FindKeyByLabel(request.username(), request.key_label(), &key)) { 443 if (!FindKeyByLabel(request.username(), request.key_label(), &key)) { 447 if (!key_store_->Register(request.username(), request.key_label(), 454 !key_store_->RegisterCertificate(request.username(), [all...] |