/external/python/cpython2/Lib/distutils/command/ |
upload.py | 32 self.username = '' 46 self.username = config['username'] 134 auth = "Basic " + standard_b64encode(self.username + ":" +
|
/external/selinux/libselinux/include/selinux/ |
selinux.h | 252 const char *username, 255 const char *username, 638 /* Get the SELinux username and level to use for a given Linux username. 645 /* Get the SELinux username and level to use for a given Linux username and service. 650 extern int getseuser(const char *username, const char *service,
|
/external/toolchain-utils/automation/common/ |
command.py | 188 def RemoteCopyFrom(from_machine, from_path, to_path, username=None): 192 if not username: 195 login = '%s@%s' % (username, from_machine)
|
command_executer.py | 35 username=None, 52 if username: 53 login = '%s@%s' % (username, machine)
|
/external/webrtc/webrtc/p2p/base/ |
relayserver.h | 31 // All connections created with the same username/password are bound together. 103 std::string* username, StunMessage* msg); 185 const std::string& username, 192 const std::string& username() { return username_; } function in class:cricket::RelayServerBinding
|
port.cc | 351 // Check for the presence of USERNAME and MESSAGE-INTEGRITY (if ICE) first. 355 LOG_J(LS_ERROR, this) << "Received STUN request without username/M-I " 362 // If the username is bad or unknown, fail with a 401 Unauthorized. 367 LOG_J(LS_ERROR, this) << "Received STUN request with bad local username " 401 // NOTE: Username should not be used in verifying response messages. 438 // The packet must include a username that either begins or ends with our 449 const std::string username = username_attr->GetString(); local 450 size_t colon_pos = username.find(":"); 455 *local_ufrag = username.substr(0, colon_pos); 456 *remote_ufrag = username.substr(colon_pos + 1, username.size()) 681 std::string username; variable [all...] |
port_unittest.cc | 711 const std::string& username) { 714 new StunByteStringAttribute(STUN_ATTR_USERNAME, username)); 718 const std::string& username, 721 addr.ipaddr(), 0, 0, username, password); 726 const std::string& username, 730 TestPort* port = CreateTestPort(addr, username, password); 1768 std::string username; local 1818 std::string username; local 1887 std::string username; local 1928 std::string username; local 1997 std::string username; local [all...] |
/external/webrtc/webrtc/p2p/client/ |
basicportallocator.h | 207 std::string username; member in struct:cricket::PortConfiguration 215 const std::string& username, 219 const std::string& username,
|
/frameworks/opt/net/voip/src/java/android/net/sip/ |
SipProfile.java | 135 * @param username username of the SIP account 141 public Builder(String username, String serverDomain) 143 if ((username == null) || (serverDomain == null)) { 145 "username and serverDomain cannot be null"); 147 mUri = mAddressFactory.createSipURI(username, serverDomain); 158 * Sets the username used for authentication. 160 * @param name authentication username of the profile 390 * Gets the username. 392 * @return the username [all...] |
/prebuilts/gdb/darwin-x86/lib/python2.7/distutils/command/ |
upload.py | 32 self.username = '' 46 self.username = config['username'] 134 auth = "Basic " + standard_b64encode(self.username + ":" +
|
/prebuilts/gdb/linux-x86/lib/python2.7/distutils/command/ |
upload.py | 32 self.username = '' 46 self.username = config['username'] 134 auth = "Basic " + standard_b64encode(self.username + ":" +
|
/prebuilts/ndk/r11/sources/cxx-stl/llvm-libc++/libcxx/test/libcxx/test/ |
executor.py | 146 def __init__(self, host, username=None): 149 self.user_prefix = username + '@' if username else ''
|
/prebuilts/ndk/r13/sources/cxx-stl/llvm-libc++/test/libcxx/test/ |
executor.py | 155 def __init__(self, host, username=None): 158 self.user_prefix = username + '@' if username else ''
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/distutils/command/ |
upload.py | 32 self.username = '' 46 self.username = config['username'] 134 auth = "Basic " + standard_b64encode(self.username + ":" +
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/distutils/command/ |
upload.py | 32 self.username = '' 46 self.username = config['username'] 134 auth = "Basic " + standard_b64encode(self.username + ":" +
|
/external/curl/tests/ |
sshserver.pl | 91 my $username = $ENV{USER}; # default user 112 $username = $ARGV[1]; 198 # Validate username 200 if(!$username) { 203 elsif($username eq 'root') { 496 push @cfgarr, "DenyUsers !$username"; 497 push @cfgarr, "AllowUsers $username"; 863 push @cfgarr, "User $username"; [all...] |
/external/openssh/ |
auth2-pubkey.c | 644 char *tmp, *username = NULL, *command = NULL, **av = NULL; local 664 username = percent_expand(options.authorized_principals_command_user, 666 pw = getpwnam(username); 669 username, strerror(errno)); 752 free(username); 828 * their username in the certificate principals list. 902 * against the username. 975 char *username = NULL, *key_fp = NULL, *keytext = NULL; local 993 username = percent_expand(options.authorized_keys_command_user, 995 pw = getpwnam(username); [all...] |
/prebuilts/go/darwin-x86/src/net/http/ |
request_test.go | 554 username, password string 559 username, password string 563 username, password string 574 r.SetBasicAuth(tt.username, tt.password) 575 username, password, ok := r.BasicAuth() 576 if ok != tt.ok || username != tt.username || password != tt.password { 577 t.Errorf("BasicAuth() = %#v, want %#v", getBasicAuthTest{username, password, ok}, 578 getBasicAuthTest{tt.username, tt.password, tt.ok}) 583 username, password, ok := r.BasicAuth( [all...] |
/prebuilts/go/darwin-x86/src/os/user/ |
lookup_unix.go | 52 func lookupUser(username string) (*User, error) { 55 nameC := C.CString(username) 73 return nil, fmt.Errorf("user: lookup username %s: %v", username, err) 76 return nil, UnknownUserError(username) 119 Username: C.GoString(pwd.pw_name),
|
/prebuilts/go/linux-x86/src/net/http/ |
request_test.go | 554 username, password string 559 username, password string 563 username, password string 574 r.SetBasicAuth(tt.username, tt.password) 575 username, password, ok := r.BasicAuth() 576 if ok != tt.ok || username != tt.username || password != tt.password { 577 t.Errorf("BasicAuth() = %#v, want %#v", getBasicAuthTest{username, password, ok}, 578 getBasicAuthTest{tt.username, tt.password, tt.ok}) 583 username, password, ok := r.BasicAuth( [all...] |
/prebuilts/go/linux-x86/src/os/user/ |
lookup_unix.go | 52 func lookupUser(username string) (*User, error) { 55 nameC := C.CString(username) 73 return nil, fmt.Errorf("user: lookup username %s: %v", username, err) 76 return nil, UnknownUserError(username) 119 Username: C.GoString(pwd.pw_name),
|
/prebuilts/tools/common/m2/repository/com/amazonaws/aws-java-sdk-cognitoidp/1.11.18/ |
aws-java-sdk-cognitoidp-1.11.18.jar | |
/external/autotest/scheduler/ |
drone_manager_unittest.py | 172 1, username=self._USERNAME, drone_hostnames_allowed=None) 189 1, username=self._USERNAME, drone_hostnames_allowed=None) 208 1, username=self._USERNAME, drone_hostnames_allowed=None) 219 1, username=self._USERNAME, 232 7, username=self._USERNAME, 244 1, username=self._USERNAME,
|
/external/libmicrohttpd/src/microhttpd/ |
digestauth.c | 45 * Maximum length of a username for digest authentication. 91 * @param username A `char *' pointer to the username value 100 const char *username, 111 MD5Update (&md5, username, strlen (username)); 353 * Get the username from the authorization header sent by the client 356 * @return NULL if no username could be found, a pointer 357 * to the username if found 377 "username"))) [all...] |
/system/tpm/attestation/client/ |
dbus_proxy_test.cc | 60 EXPECT_EQ("user", request_proto.username()); 103 EXPECT_EQ("username", request_proto.username()); 135 request.set_username("username"); 271 EXPECT_EQ("user", request_proto.username()); 313 EXPECT_EQ("user", request_proto.username()); 351 EXPECT_EQ("user", request_proto.username()); 389 EXPECT_EQ("user", request_proto.username());
|