/external/chromium/crypto/ |
symmetric_key.h | 42 // Derives a key from the supplied password and salt using PBKDF2, suitable 44 // used to derive the key from the password. The caller is responsible for 47 const std::string& password,
|
/external/chromium/net/base/ |
cert_database_nss.cc | 159 const string16& password) { 162 password); 171 const string16& password, 173 return psm::nsPKCS12Blob_Export(output, certs, password);
|
/external/chromium/net/ftp/ |
ftp_auth_cache_unittest.cc | 20 const string16 kPassword(ASCIIToUTF16("password")); 46 EXPECT_EQ(kPassword1, entry1->password); 54 EXPECT_EQ(kPassword2, entry2->password); 65 EXPECT_EQ(kPassword3, entry3->password); 112 EXPECT_EQ(kOtherword, entry2->password);
|
/external/chromium/net/http/ |
http_auth_controller.h | 64 const string16& password); 103 // username:password. Returns true if an identity was found. 107 // URLRequestHttpJob can prompt for a username/password. 135 // |identity_| holds the (username/password) that should be used by 147 // True if we've used the username/password embedded in the URL. This
|
http_auth_handler_mock.h | 90 const string16* password,
|
/external/webkit/Source/WebCore/platform/network/curl/ |
ResourceHandleManager.h | 70 const String& password = "");
|
/external/webkit/Source/WebKit/mac/Panels/ |
WebAuthenticationPanel.h | 38 IBOutlet id password; variable
|
/external/wpa_supplicant/ |
eap_mschapv2.c | 54 /* Change-Password Data field */ 183 const u8 *password, size_t password_len, 195 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-MSCHAPV2: password", 196 password, password_len); 199 password, password_len, nt_response); 204 generate_authenticator_response(password, password_len, 212 nt_password_hash(password, password_len, password_hash); 231 const u8 *username, *identity, *password; local 236 password = eap_get_config_password(sm, &password_len); 237 if (identity == NULL || password == NULL 571 const u8 *username, *password, *new_password; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_config.h | 53 * password - Password string for EAP 55 * This field can include either the plaintext password (default 57 * presentation of the password) if flags field has 68 u8 *password; member in struct:eap_peer_config 71 * password_len - Length of password field 150 * private_key_passwd - Password for private key file 263 * private_key2_passwd - Password for private key file 502 * otp - One-time-password 524 * pending_req_password - Whether there is a pending password reques [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 53 * password - Password string for EAP 55 * This field can include either the plaintext password (default 57 * presentation of the password) if flags field has 68 u8 *password; member in struct:eap_peer_config 71 * password_len - Length of password field 159 * private_key_passwd - Password for private key file 272 * private_key2_passwd - Password for private key file 511 * otp - One-time-password 533 * pending_req_password - Whether there is a pending password reques [all...] |
/frameworks/base/core/java/android/accounts/ |
IAccountManager.aidl | 36 boolean addAccount(in Account account, String password, in Bundle extras); 41 void setPassword(in Account account, String password);
|
/libcore/luni/src/main/java/java/security/ |
KeyStoreSpi.java | 40 * Returns the key with the given alias, using the password to recover the 45 * @param password 46 * the password used to recover the key. 54 public abstract Key engineGetKey(String alias, char[] password) 88 * Associates the given alias with the key, password and certificate chain. 96 * @param password 97 * the password. 108 char[] password, Certificate[] chain) throws KeyStoreException; 219 * specified password. 223 * @param password [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyStore.java | 63 public Key engineGetKey(String alias, char[] password) 92 public void engineSetKeyEntry(String alias, Key key, char[] password, 178 public void engineStore(OutputStream stream, char[] password) 201 public void engineLoad(InputStream stream, char[] password)
|
/packages/apps/Email/src/com/android/email/mail/transport/ |
SmtpSender.java | 240 * is logged (if debug logging is enabled) so do not use this function for user ID or password. 297 // S: 334 Password: 301 private void saslAuthLogin(String username, String password) throws MessagingException, 309 Base64.encodeToString(password.getBytes(), Base64.NO_WRAP), 310 "/password redacted/"); 320 private void saslAuthPlain(String username, String password) throws MessagingException, 322 byte[] data = ("\000" + username + "\000" + password).getBytes();
|
/external/chromium/googleurl/src/ |
gurl_unittest.cc | 80 EXPECT_EQ("pass", url.password()); 96 EXPECT_EQ("", url.password()); 114 EXPECT_EQ("pass", url2.password()); 129 EXPECT_EQ("", invalid2.password()); 146 EXPECT_EQ("", url.password()); 236 const char* password; member in struct:ReplaceCase 258 SetupReplacement(&GURL::Replacements::SetPassword, &repl, cur.password);
|
url_canon.h | 305 // User info: username/password. If present, this will add the delimiters so 306 // the output will be "<username>:<password>@" or "<username>@". Empty 307 // username/password pairs, or empty passwords, will get converted to 310 // The components for the username and password refer to ranges in the 318 const url_parse::Component& password, 325 const url_parse::Component& password, 593 password(NULL), 606 password(default_value), 616 const CHAR* password; member in struct:url_canon::URLComponentSource 659 // Password [all...] |
/packages/apps/CertInstaller/src/com/android/certinstaller/ |
CertInstaller.java | 284 void extractPkcs12InBackground(final String password) { 290 return mCredentials.extractPkcs12(password); 330 String password = mView.getText(R.id.credential_password); 331 if (TextUtils.isEmpty(password)) { 335 mNextAction = new Pkcs12ExtractAction(password); 438 Pkcs12ExtractAction(String password) { 439 mPassword = password;
|
/external/chromium/chrome/browser/automation/ |
testing_automation_provider_chromeos.cc | 165 std::string username, password; local 167 !args->GetString("password", &password)) { 177 controller->Login(username, password); 392 std::string service_path, password, identity, certpath; local 394 !args->GetString("password", &password) || 408 if (!password.empty()) 409 wifi->SetPassphrase(password); 430 std::string ssid, security, password, identity, certpath local [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
existing_user_controller.cc | 157 const std::string& password) { 158 if (username.empty() || password.empty()) 182 login_performer_->Login(username, password); 306 const std::string& password, 319 // correct password/display error message. 328 password, 398 // which disables the requirement for the old owner password, 399 // allowing us to recover from a lost owner password/homedir.
|
login_performer.cc | 111 const std::string& password, 125 // 1. ScreenLock active (pending correct new password input) 133 password, 191 DVLOG(1) << "Password change detected - locking screen."; 237 const std::string& password) { 239 password_ = password; 249 password)); 358 // Offline auth OK, so it might be the case of changed password. 422 // Password change detected.
|
/external/chromium/chrome/browser/ui/webui/options/ |
sync_setup_handler.cc | 41 std::string* password, 50 !result->GetString("pass", password) || 377 std::string username, password, captcha, access_code; 378 if (!GetAuthData(json, &username, &password, &captcha, &access_code)) { 386 flow_->OnUserSubmittedAuth(username, password, captcha, access_code);
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
AccessPointParserHelper.java | 48 * security, eap, phase2, identity, password, anonymousidentity, cacert, usercert, 61 * <password>abcdefgh</password> 107 boolean password = false; 136 if (tagName.equalsIgnoreCase("password")) { 137 password = true; 227 if (password) { 247 config.password.setValue(passwordStr); 251 password = false;
|
/frameworks/base/telephony/java/com/android/internal/telephony/sip/ |
SipCommandInterface.java | 188 String apn, String user, String password, String authType, 255 public void queryFacilityLock(String facility, String password, 260 public void queryFacilityLockForApp(String facility, String password, 266 String password, int serviceClass, Message response) { 271 String password, int serviceClass, String appId, Message response) {
|
/packages/apps/Browser/src/com/android/browser/ |
PageDialogsHandler.java | 92 public void onOk(String host, String realm, String username, String password) { 93 setHttpAuthUsernamePassword(host, realm, username, password); 94 handler.proceed(username, password); 109 * Set HTTP authentication password. 111 * @param host The host for the password 112 * @param realm The realm for the password 113 * @param username The username for the password. If it is null, it means 114 * password can't be saved. 115 * @param password The password [all...] |
/external/qemu/ |
monitor.c | 163 readline_start(mon->rs, "Password: ", 1, readline_func, opaque); 167 monitor_printf(mon, "terminal does not support password prompting\n"); 471 static void change_vnc_password_cb(Monitor *mon, const char *password, 474 if (vnc_display_password(NULL, password) < 0) 475 monitor_printf(mon, "could not set VNC server password\n"); 483 strcmp(target, "password") == 0) { 485 char password[9]; local 486 strncpy(password, arg, sizeof(password)); 487 password[sizeof(password) - 1] = '\0' [all...] |