/frameworks/base/include/storage/ |
IMountService.h | 69 virtual int32_t decryptStorage(const String16& password) = 0; 70 virtual int32_t encryptStorage(const String16& password) = 0;
|
/libcore/luni/src/main/java/javax/net/ssl/ |
KeyManagerFactory.java | 181 * Initializes this instance with the specified key store and password. 185 * @param password 186 * the password for the specified key store or {@code null} if no 195 public final void init(KeyStore ks, char[] password) throws KeyStoreException, 197 spiImpl.engineInit(ks, password);
|
/external/chromium/net/http/ |
http_auth_handler_digest.cc | 37 // | ?, md5 | user:realm:password | 39 // | md5-sess | MD5(user:realm:password):nonce:cnonce | 140 const string16* password, 155 *password, 319 const string16& password, 325 UTF16ToUTF8(password)); 345 const string16& password, 362 password, cnonce, nc);
|
http_auth_handler_negotiate.cc | 186 // GSSAPI does not provide a way to enter username/password to 205 const string16* password, 210 DCHECK((username == NULL) == (password == NULL)); 216 *password == password_)); 223 password_ = *password; 312 string16* password = has_username_and_password_ ? &password_ : NULL; local 314 return auth_system_.GenerateAuthToken(username, password, spn_, auth_token_);
|
http_auth_cache.cc | 116 const string16& password, 142 entry->password_ = password; 203 const string16& password) { 207 if (username == it->username() && password == it->password()) {
|
/external/chromium/chrome/browser/resources/options/chromeos/ |
internet_options_page.css | 33 .network-password { 38 .network-password > input, .network-password > select { 211 #detailsInternetPage:not([password]) .password-details {
|
/external/webkit/Source/JavaScriptCore/wtf/url/src/ |
URLParser.h | 64 static void parseAuthority(const CHAR* spec, const URLComponent& auth, URLComponent& username, URLComponent& password, URLComponent& host, URLComponent& port) 69 password.reset(); 77 // someone might include it in a password unescaped. 84 parseUserInfo(spec, URLComponent(auth.begin(), i - auth.begin()), username, password); 89 password.reset(); 124 // First split into two main parts, the authority (username, password, 142 parseAuthority(spec, authority, parsed.username, parsed.password, parsed.host, parsed.port); 240 parsed.password.reset(); 286 parsed.password.reset(); 507 static void parseUserInfo(const CHAR* spec, const URLComponent& user, URLComponent& username, URLComponent& password) [all...] |
/external/wpa_supplicant/ |
ms_funcs.c | 54 * @password: 0-to-256-unicode-char Password (IN; ASCII) 55 * @password_len: Length of password 58 void nt_password_hash(const u8 *password, size_t password_len, 67 /* Convert password into unicode */ 69 buf[2 * i] = password[i]; 116 * @password: 0-to-256-unicode-char Password (IN; ASCII) 117 * @password_len: Length of password 122 const u8 *password, size_t password_len [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
ms_funcs.c | 54 * @password: 0-to-256-unicode-char Password (IN; ASCII) 55 * @password_len: Length of password 58 void nt_password_hash(const u8 *password, size_t password_len, 67 /* Convert password into unicode */ 69 buf[2 * i] = password[i]; 116 * @password: 0-to-256-unicode-char Password (IN; ASCII) 117 * @password_len: Length of password 122 const u8 *password, size_t password_len [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.c | 56 * @password: 0-to-256-unicode-char Password (IN; ASCII) 57 * @password_len: Length of password 61 int nt_password_hash(const u8 *password, size_t password_len, 70 /* Convert password into unicode */ 72 buf[2 * i] = password[i]; 120 * @password: 0-to-256-unicode-char Password (IN; ASCII) 121 * @password_len: Length of password 127 const u8 *password, size_t password_len [all...] |
/external/chromium/chrome/browser/ui/login/ |
login_prompt.cc | 128 const string16& password) { 134 // Tell the password manager the credentials were submitted / accepted. 137 password_form_.password_value = password; 147 NotifyAuthSupplied(username, password); 155 this, &LoginHandler::SetAuthDeferred, username, password)); 240 SetAuth(supplied_details->username(), supplied_details->password()); 297 const string16& password) { 307 AuthSuppliedLoginNotificationDetails details(this, username, password); 349 const string16& password) { 353 request_->SetAuth(username, password); [all...] |
/external/chromium/googleurl/src/ |
url_canon_internal.cc | 316 DoOverrideComponent(repl_source.password, repl_parsed.password, 317 &source->password, &parsed->password); 353 repl_source.password, repl_parsed.password, 354 utf8_buffer, &parsed->password); 376 if (repl_source.password) source->password = utf8_buffer->data();
|
gurl.h | 201 // and port from a URL. Equivalent to clearing any username and password, 204 // invalid GURL. If the URL has neither username nor password, this 247 std::string password() const { function in class:GURL 248 return ComponentString(parsed_.password); 280 return parsed_.password.len >= 0;
|
/external/wpa_supplicant_8/src/ap/ |
authsrv.c | 81 if (eap_user->password) { 82 user->password = os_malloc(eap_user->password_len); 83 if (user->password == NULL) 85 os_memcpy(user->password, eap_user->password,
|
/packages/apps/Settings/src/com/android/settings/ |
CryptKeeperSettings.java | 45 // This is the minimum acceptable password quality. If the current password quality is 85 * is no keyguard available, we prompt the user to set a password. 91 // TODO replace (or follow) this dialog with an explicit launch into password UI 161 // 1. Confirm that we have a sufficient PIN/Password to continue 166 // 2. Ask the user to confirm the current PIN/Password 185 String password = data.getStringExtra(ChooseLockSettingsHelper.EXTRA_KEY_PASSWORD); local 186 if (!TextUtils.isEmpty(password)) { 187 showFinalConfirmation(password); 192 private void showFinalConfirmation(String password) { [all...] |
/packages/apps/Settings/src/com/android/settings/wifi/ |
WifiApDialog.java | 100 String password = mPassword.getText().toString(); local 101 config.preSharedKey = password; 109 String password = mPassword.getText().toString(); local 110 config.preSharedKey = password; 131 mPassword = (EditText) mView.findViewById(R.id.password);
|
/development/samples/SampleSyncAdapter/src/com/example/android/samplesync/authenticator/ |
Authenticator.java | 38 * their username and password. But for our subsequent calls off to the service 40 * sending the password over the wire. getAuthToken() will be called when 44 * we don't, but we do have a username and password, then we'll attempt to talk 46 * a username/password), then we need to prompt the user - so we create an 100 // Extract the username and password from the Account Manager, and ask 103 final String password = am.getPassword(account); local 104 if (password != null) { 105 final String authToken = NetworkUtilities.authenticate(account.name, password); 115 // If we get here, then we couldn't access the user's password - so we
|
/external/chromium/chrome/browser/chromeos/login/ |
parallel_authenticator.cc | 70 const std::string& password, 76 password, 77 HashPassword(password), 99 const std::string& password) { 102 HashPassword(password))); 141 current_state_->password, 248 const std::string& password, 253 password, 254 HashPassword(password), 323 // the same path they get when their password is rejected is cleane [all...] |
account_screen.cc | 163 const std::string& password) { 164 delegate()->GetObserver(this)->OnSetUserNamePassword(username, password); 172 // password.
|
new_user_view.h | 29 // View that is used for new user login. It asks for username and password, 42 // User provided |username|, |password| and initiated login. 44 const std::string& password) = 0; 75 // Returns bounds of password field in screen coordinates. 88 void SetPassword(const std::string& password);
|
screen_locker.h | 74 const std::string& password, 87 // Authenticates the user with given |password| and authenticator. 88 void Authenticate(const string16& password); 176 // A view that accepts password. 229 // password. True when chrome is in BWSI or auto login mode.
|
/external/chromium/chrome/browser/sync/ |
signin_manager.cc | 48 const std::string& password, 59 password_.assign(password); 65 password, 149 // We don't sign-out if the password was valid and we're just dealing with 151 // an invalid access code (again, because the password was valid).
|
/external/webkit/Tools/Scripts/webkitpy/common/net/ |
credentials_unittest.py | 65 "desc"<blob>="Web form password" 78 password: "SECRETSAUCE" 109 expected_stderr = "Reading Keychain for example.com account and password. Click \"Allow\" to continue...\n" 112 security_args = ["/usr/bin/security", "find-internet-password", "-g", "-s", "example.com"] 128 username, password = credentials._credentials_from_environment() 130 self.assertEquals(password, "bar")
|
/libcore/luni/src/main/java/java/sql/ |
DriverManager.java | 152 * "password"} should be passed, with appropriate settings for 153 * the user ID and its corresponding password to get access to 192 * @param password 193 * a password for the user ID to login to the database. 200 public static Connection getConnection(String url, String user, String password) 206 if (password != null) { 207 theProperties.setProperty("password", password);
|
/external/webkit/Source/WebKit/win/Interfaces/ |
IWebURLAuthenticationChallenge.idl | 206 -(id)initWithUser:(NSString *)user password:(NSString *)password persistence:(NSURLCredentialPersistence)persistence 208 HRESULT initWithUser([in] BSTR user, [in] BSTR password, [in] WebURLCredentialPersistence persistence); 211 -(NSString *)password 213 HRESULT password([out, retval] BSTR* password);
|