HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 251 - 275 of 683) sorted by null

<<11121314151617181920>>

  /external/chromium/crypto/
symmetric_key.h 42 // Derives a key from the supplied password and salt using PBKDF2, suitable
44 // used to derive the key from the password. The caller is responsible for
47 const std::string& password,
  /external/chromium/net/base/
cert_database_nss.cc 159 const string16& password) {
162 password);
171 const string16& password,
173 return psm::nsPKCS12Blob_Export(output, certs, password);
  /external/chromium/net/ftp/
ftp_auth_cache_unittest.cc 20 const string16 kPassword(ASCIIToUTF16("password"));
46 EXPECT_EQ(kPassword1, entry1->password);
54 EXPECT_EQ(kPassword2, entry2->password);
65 EXPECT_EQ(kPassword3, entry3->password);
112 EXPECT_EQ(kOtherword, entry2->password);
  /external/chromium/net/http/
http_auth_controller.h 64 const string16& password);
103 // username:password. Returns true if an identity was found.
107 // URLRequestHttpJob can prompt for a username/password.
135 // |identity_| holds the (username/password) that should be used by
147 // True if we've used the username/password embedded in the URL. This
http_auth_handler_mock.h 90 const string16* password,
  /external/webkit/Source/WebCore/platform/network/curl/
ResourceHandleManager.h 70 const String& password = "");
  /external/webkit/Source/WebKit/mac/Panels/
WebAuthenticationPanel.h 38 IBOutlet id password; variable
  /external/wpa_supplicant/
eap_mschapv2.c 54 /* Change-Password Data field */
183 const u8 *password, size_t password_len,
195 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-MSCHAPV2: password",
196 password, password_len);
199 password, password_len, nt_response);
204 generate_authenticator_response(password, password_len,
212 nt_password_hash(password, password_len, password_hash);
231 const u8 *username, *identity, *password; local
236 password = eap_get_config_password(sm, &password_len);
237 if (identity == NULL || password == NULL
571 const u8 *username, *password, *new_password; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_config.h 53 * password - Password string for EAP
55 * This field can include either the plaintext password (default
57 * presentation of the password) if flags field has
68 u8 *password; member in struct:eap_peer_config
71 * password_len - Length of password field
150 * private_key_passwd - Password for private key file
263 * private_key2_passwd - Password for private key file
502 * otp - One-time-password
524 * pending_req_password - Whether there is a pending password reques
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 53 * password - Password string for EAP
55 * This field can include either the plaintext password (default
57 * presentation of the password) if flags field has
68 u8 *password; member in struct:eap_peer_config
71 * password_len - Length of password field
159 * private_key_passwd - Password for private key file
272 * private_key2_passwd - Password for private key file
511 * otp - One-time-password
533 * pending_req_password - Whether there is a pending password reques
    [all...]
  /frameworks/base/core/java/android/accounts/
IAccountManager.aidl 36 boolean addAccount(in Account account, String password, in Bundle extras);
41 void setPassword(in Account account, String password);
  /libcore/luni/src/main/java/java/security/
KeyStoreSpi.java 40 * Returns the key with the given alias, using the password to recover the
45 * @param password
46 * the password used to recover the key.
54 public abstract Key engineGetKey(String alias, char[] password)
88 * Associates the given alias with the key, password and certificate chain.
96 * @param password
97 * the password.
108 char[] password, Certificate[] chain) throws KeyStoreException;
219 * specified password.
223 * @param password
    [all...]
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
MyKeyStore.java 63 public Key engineGetKey(String alias, char[] password)
92 public void engineSetKeyEntry(String alias, Key key, char[] password,
178 public void engineStore(OutputStream stream, char[] password)
201 public void engineLoad(InputStream stream, char[] password)
  /packages/apps/Email/src/com/android/email/mail/transport/
SmtpSender.java 240 * is logged (if debug logging is enabled) so do not use this function for user ID or password.
297 // S: 334 Password:
301 private void saslAuthLogin(String username, String password) throws MessagingException,
309 Base64.encodeToString(password.getBytes(), Base64.NO_WRAP),
310 "/password redacted/");
320 private void saslAuthPlain(String username, String password) throws MessagingException,
322 byte[] data = ("\000" + username + "\000" + password).getBytes();
  /external/chromium/googleurl/src/
gurl_unittest.cc 80 EXPECT_EQ("pass", url.password());
96 EXPECT_EQ("", url.password());
114 EXPECT_EQ("pass", url2.password());
129 EXPECT_EQ("", invalid2.password());
146 EXPECT_EQ("", url.password());
236 const char* password; member in struct:ReplaceCase
258 SetupReplacement(&GURL::Replacements::SetPassword, &repl, cur.password);
url_canon.h 305 // User info: username/password. If present, this will add the delimiters so
306 // the output will be "<username>:<password>@" or "<username>@". Empty
307 // username/password pairs, or empty passwords, will get converted to
310 // The components for the username and password refer to ranges in the
318 const url_parse::Component& password,
325 const url_parse::Component& password,
593 password(NULL),
606 password(default_value),
616 const CHAR* password; member in struct:url_canon::URLComponentSource
659 // Password
    [all...]
  /packages/apps/CertInstaller/src/com/android/certinstaller/
CertInstaller.java 284 void extractPkcs12InBackground(final String password) {
290 return mCredentials.extractPkcs12(password);
330 String password = mView.getText(R.id.credential_password);
331 if (TextUtils.isEmpty(password)) {
335 mNextAction = new Pkcs12ExtractAction(password);
438 Pkcs12ExtractAction(String password) {
439 mPassword = password;
  /external/chromium/chrome/browser/automation/
testing_automation_provider_chromeos.cc 165 std::string username, password; local
167 !args->GetString("password", &password)) {
177 controller->Login(username, password);
392 std::string service_path, password, identity, certpath; local
394 !args->GetString("password", &password) ||
408 if (!password.empty())
409 wifi->SetPassphrase(password);
430 std::string ssid, security, password, identity, certpath local
    [all...]
  /external/chromium/chrome/browser/chromeos/login/
existing_user_controller.cc 157 const std::string& password) {
158 if (username.empty() || password.empty())
182 login_performer_->Login(username, password);
306 const std::string& password,
319 // correct password/display error message.
328 password,
398 // which disables the requirement for the old owner password,
399 // allowing us to recover from a lost owner password/homedir.
login_performer.cc 111 const std::string& password,
125 // 1. ScreenLock active (pending correct new password input)
133 password,
191 DVLOG(1) << "Password change detected - locking screen.";
237 const std::string& password) {
239 password_ = password;
249 password));
358 // Offline auth OK, so it might be the case of changed password.
422 // Password change detected.
  /external/chromium/chrome/browser/ui/webui/options/
sync_setup_handler.cc 41 std::string* password,
50 !result->GetString("pass", password) ||
377 std::string username, password, captcha, access_code;
378 if (!GetAuthData(json, &username, &password, &captcha, &access_code)) {
386 flow_->OnUserSubmittedAuth(username, password, captcha, access_code);
  /frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/
AccessPointParserHelper.java 48 * security, eap, phase2, identity, password, anonymousidentity, cacert, usercert,
61 * <password>abcdefgh</password>
107 boolean password = false;
136 if (tagName.equalsIgnoreCase("password")) {
137 password = true;
227 if (password) {
247 config.password.setValue(passwordStr);
251 password = false;
  /frameworks/base/telephony/java/com/android/internal/telephony/sip/
SipCommandInterface.java 188 String apn, String user, String password, String authType,
255 public void queryFacilityLock(String facility, String password,
260 public void queryFacilityLockForApp(String facility, String password,
266 String password, int serviceClass, Message response) {
271 String password, int serviceClass, String appId, Message response) {
  /packages/apps/Browser/src/com/android/browser/
PageDialogsHandler.java 92 public void onOk(String host, String realm, String username, String password) {
93 setHttpAuthUsernamePassword(host, realm, username, password);
94 handler.proceed(username, password);
109 * Set HTTP authentication password.
111 * @param host The host for the password
112 * @param realm The realm for the password
113 * @param username The username for the password. If it is null, it means
114 * password can't be saved.
115 * @param password The password
    [all...]
  /external/qemu/
monitor.c 163 readline_start(mon->rs, "Password: ", 1, readline_func, opaque);
167 monitor_printf(mon, "terminal does not support password prompting\n");
471 static void change_vnc_password_cb(Monitor *mon, const char *password,
474 if (vnc_display_password(NULL, password) < 0)
475 monitor_printf(mon, "could not set VNC server password\n");
483 strcmp(target, "password") == 0) {
485 char password[9]; local
486 strncpy(password, arg, sizeof(password));
487 password[sizeof(password) - 1] = '\0'
    [all...]

Completed in 1294 milliseconds

<<11121314151617181920>>