HomeSort by relevance Sort by last modified time
    Searched refs:username (Results 101 - 125 of 590) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/syslinux/com32/cmenu/
complex.c 53 char username[12]; // Name of user currently using the system variable
80 (isallowed(username, "editcmd") || isallowed(username, "root"))) {
112 csprint("Enter Username: ", 0x07);
113 getstring(login, sizeof username);
122 strcpy(username, login);
125 strcpy(username, GUEST_USER);
128 strcpy(username, GUEST_USER);
132 if (strcmp(username, GUEST_USER) == 0) {
159 cprint(ms->fillchar, ms->fillattr, sizeof username);
    [all...]
  /external/libcups/cups/
md5passwd.c 25 * 'httpMD5()' - Compute the MD5 sum of the username:group:password.
29 httpMD5(const char *username, /* I - User name */
43 snprintf(line, sizeof(line), "%s:%s:%s", username, realm, passwd);
57 * 'httpMD5Final()' - Combine the MD5 sum of the username, group, and password
85 * Then combine A1 (MD5 of username, realm, and password) with the nonce
  /external/wpa_supplicant_8/src/utils/
http-utils.h 39 const char *ca_fname, const char *username,
54 const char *username, const char *password,
  /packages/apps/Email/provider_src/com/android/email/mail/store/
ServiceStore.java 82 public Bundle autoDiscover(Context context, String username, String password) {
84 return getService().autoDiscover(username, password);
  /developers/build/prebuilts/gradle/AutofillFramework/Application/src/main/java/com/example/android/autofillframework/app/
StandardAutoCompleteSignInActivity.java 99 String username = mUsernameAutoCompleteField.getText().toString(); local
101 boolean valid = isValidCredentials(username, password);
115 public boolean isValidCredentials(String username, String password) {
116 return username != null && password != null && username.equals(password);
  /developers/samples/android/input/autofill/AutofillFramework/Application/src/main/java/com/example/android/autofillframework/app/
StandardAutoCompleteSignInActivity.java 99 String username = mUsernameAutoCompleteField.getText().toString(); local
101 boolean valid = isValidCredentials(username, password);
115 public boolean isValidCredentials(String username, String password) {
116 return username != null && password != null && username.equals(password);
  /external/openssh/
logintest.c 77 li->username, li->hostname, li->exit,
91 char username[32]; local
101 strlcpy(username, pw->pw_name, sizeof(username));
108 li1 = login_alloc_entry((int)getpid(), username, NULL, ttyname(0));
loginrec.c 307 * If we don't have a 'real' lastlog, we need the username to
316 if (strlcpy(li->username, pw->pw_name, sizeof(li->username)) >=
317 sizeof(li->username)) {
318 error("%s: username too long (%lu > max %lu)", __func__,
320 (unsigned long)sizeof(li->username) - 1);
341 logininfo *login_alloc_entry(pid_t pid, const char *username,
347 login_init_entry(newli, pid, username, hostname, line);
369 login_init_entry(struct logininfo *li, pid_t pid, const char *username,
382 if (username) {
    [all...]
  /external/toybox/toys/posix/
id.c 85 static void do_id(char *username)
95 // check if a username is given
96 if (username) {
97 pw = xgetpwnam(username);
131 ngroups = username ? getgrouplist(username, gid, groups, &i)
  /external/webrtc/webrtc/p2p/client/
fakeportallocator.h 35 const std::string& username,
40 max_port, username, password, origin,
65 const std::string& username,
75 username,
105 network_.GetBestIP(), 0, 0, username(),
  /external/autotest/database/
database_connection.py 11 'username' : 'user',
37 def connect(self, host=None, username=None, password=None, db_name=None):
71 def connect(self, host=None, username=None, password=None, db_name=None):
77 host=host, user=username, passwd=password, db=db_name,
94 def connect(self, host=None, username=None, password=None, db_name=None):
124 def connect(self, host=None, username=None, password=None, db_name=None):
161 _DATABASE_ATTRIBUTES = ('db_type', 'host', 'username', 'password',
210 def _read_options(self, db_type=None, host=None, username=None,
220 @param username: user name for database connection, default to None.
225 use_afe_setting = not bool(db_type or host or username or password
    [all...]
  /prebuilts/tools/common/m2/repository/io/netty/netty-handler-proxy/4.1.6.Final/
netty-handler-proxy-4.1.6.Final.jar 
  /external/mdnsresponder/mDNSWindows/ControlPanel/
RegistrationPage.cpp 204 CString username; local
213 username = outUsername;
214 m_usernameControl.SetWindowText( username );
292 CString username; local
305 m_usernameControl.GetWindowText( username );
308 if ( username.GetLength() && password.GetLength() )
310 StringObjectToUTF8String( username, usernameUTF8, sizeof( usernameUTF8 ) );
  /external/webrtc/webrtc/p2p/base/
portallocator.h 79 // TODO(deadbeef): Rename to TurnCredentials (and username to ufrag).
82 RelayCredentials(const std::string& username, const std::string& password)
83 : username(username), password(password) {}
85 std::string username; member in struct:cricket::RelayCredentials
96 const std::string& username,
100 : type(RELAY_TURN), credentials(username, password) {
151 const std::string& username() const { return ice_ufrag_; } function in class:cricket::PortAllocatorSession
relayport.h 44 const std::string& username,
47 username, password);
82 const std::string& username,
testturnserver.h 104 // For this test server, succeed if the password is the same as the username.
106 virtual bool GetKey(const std::string& username, const std::string& realm,
108 return ComputeStunCredentialHash(username, realm, username, key);
  /development/samples/SampleSyncAdapter/samplesyncadapter_server/
web_services.py 58 Process a request to authenticate a client. We assume that the username
67 self.username = self.request.get('username')
70 logging.info('Authenticatng username: ' + self.username)
72 if ((self.username != None) and
73 (self.username.startswith(BaseWebServiceHandler.ACCT_USER_NAME)) and
88 The request should include username/password parameters that correspond
95 self.username = self.request.get('username')
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_aka.c 53 char permanent[20]; /* Permanent username */
92 const char *username)
95 username[0] != EAP_AKA_PRIME_REAUTH_ID_PREFIX)
98 username[0] != EAP_AKA_REAUTH_ID_PREFIX)
101 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username);
103 username);
134 char *username; local
138 username = sim_get_username(sm->identity, sm->identity_len);
139 if (username == NULL
717 char *username; local
    [all...]
  /packages/apps/Email/src/com/android/email/mail/transport/
SmtpSender.java 286 // S: 334 Username:
292 private void saslAuthLogin(String username, String password) throws MessagingException,
297 Base64.encodeToString(username.getBytes(), Base64.NO_WRAP),
298 "/username redacted/");
311 private void saslAuthPlain(String username, String password) throws MessagingException,
313 byte[] data = ("\000" + username + "\000" + password).getBytes();
326 private void saslAuthOAuth(String username) throws MessagingException,
331 saslAuthOAuth(username, accessToken);
334 saslAuthOAuth(username, accessToken);
338 private void saslAuthOAuth(final String username, final String accessToken) throws IOException
    [all...]
  /external/autotest/frontend/client/src/autotest/afe/
HostTableDecorator.java 30 private JSONValue username; field in class:HostTableDecorator.AclAccessibleFilter
34 username = new JSONString(StaticDataRepository.getRepository().getCurrentUserLogin());
39 return username;
  /external/devlib/devlib/utils/
ssh.py 49 def ssh_get_shell(host, username, password=None, keyfile=None, port=None, timeout=10, telnet=False, original_prompt=None):
62 conn.login(host, username, ssh_key=keyfile, port=port, login_timeout=timeout)
64 conn.login(host, username, password, port=port, login_timeout=timeout)
87 def login(self, server, username, password='', login_timeout=10,
90 if username is not None:
91 args += ['-l', username]
155 username,
166 self.username = username
172 logger.debug('Logging in {}@{}'.format(username, host)
    [all...]
  /external/syslinux/bios/com32/cmenu/
test2.c 50 char username[12]; // Name of user currently using the system variable
194 (isallowed(username,"editcmd") || isallowed(username,"root"))) {
225 csprint("Enter Username: ",0x07);
226 getstring(login, sizeof username);
236 strcpy(username,login);
238 strcat(logoutstr,username);
242 else strcpy(username,GUEST_USER);
246 strcpy(username,GUEST_USER);
265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowe
    [all...]
  /external/syslinux/efi32/com32/cmenu/
test2.c 50 char username[12]; // Name of user currently using the system variable
194 (isallowed(username,"editcmd") || isallowed(username,"root"))) {
225 csprint("Enter Username: ",0x07);
226 getstring(login, sizeof username);
236 strcpy(username,login);
238 strcat(logoutstr,username);
242 else strcpy(username,GUEST_USER);
246 strcpy(username,GUEST_USER);
265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowe
    [all...]
  /external/syslinux/efi64/com32/cmenu/
test2.c 50 char username[12]; // Name of user currently using the system variable
194 (isallowed(username,"editcmd") || isallowed(username,"root"))) {
225 csprint("Enter Username: ",0x07);
226 getstring(login, sizeof username);
236 strcpy(username,login);
238 strcat(logoutstr,username);
242 else strcpy(username,GUEST_USER);
246 strcpy(username,GUEST_USER);
265 if (isallowed(username,"root") || isallowed(username,perms)) // If allowe
    [all...]
  /system/tpm/attestation/server/
attestation_service.cc 125 if (!CreateKey(request.username(), request.key_label(), request.key_type(),
132 if (!CreateCertificateRequest(request.username(), key,
146 if (!FinishCertificateRequest(certificate_reply, request.username(),
175 if (!FindKeyByLabel(request.username(), request.key_label(), &key)) {
356 if (!CreateKey(request.username(), request.key_label(), request.key_type(),
388 if (!FindKeyByLabel(request.username(), request.key_label(), &key)) {
414 if (!FindKeyByLabel(request.username(), request.key_label(), &key)) {
443 if (!FindKeyByLabel(request.username(), request.key_label(), &key)) {
447 if (!key_store_->Register(request.username(), request.key_label(),
454 !key_store_->RegisterCertificate(request.username(),
    [all...]

Completed in 732 milliseconds

1 2 3 45 6 7 8 91011>>