HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 326 - 350 of 683) sorted by null

<<11121314151617181920>>

  /external/chromium/chrome/browser/ui/gtk/
crypto_module_password_dialog.cc 64 void GotPassword(const char* password) {
65 if (password)
66 password_ = password;
  /frameworks/base/core/java/android/webkit/
BrowserFrame.java 815 String password) {
849 mainResource, userGesture, postDataIdentifier, username, password);
    [all...]
LoadListener.java 136 String username, String password) {
141 username, password);
151 String username, String password) {
170 mPassword = password;
648 // password supplied in the URL, if present.
    [all...]
  /frameworks/base/policy/src/com/android/internal/policy/impl/
AccountUnlockScreen.java 51 * When the user forgets their password a bunch of times, we fall back on their
52 * account's login/password to unlock the phone (and reset their lock pattern).
75 * Shown while making asynchronous check of password.
106 mPassword = (EditText) findViewById(R.id.password);
178 // clear out forgotten password
271 final String password = mPassword.getText().toString(); local
279 options.putString(AccountManager.KEY_PASSWORD, password);
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/
SSLSocketFactory.java 106 * For simplicity use the same password for the key as that of the keystore
248 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password)
255 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
  /external/chromium/crypto/
nss_util.cc 104 // If we get asked for a password for the TPM, then return the
105 // well known password we use, as long as the TPM slot has been
119 std::string password = delegate->RequestPassword(PK11_GetTokenName(slot), local
124 char* result = PORT_Strdup(password.c_str());
125 password.replace(0, password.size(), password.size(), 0);
128 DLOG(ERROR) << "PK11 password requested with NULL arg";
405 // If we haven't initialized the password for the NSS databases,
406 // initialize an empty-string password so that we don't need t
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sake.c 76 const u8 *identity, *password; local
79 password = eap_get_config_password(sm, &password_len);
80 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
102 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN);
104 password + EAP_SAKE_ROOT_SECRET_LEN,
eap_ttls.c 645 const u8 *identity, *password; local
652 password = eap_get_config_password2(sm, &password_len, &pwhash);
653 if (identity == NULL || password == NULL)
694 mschapv2_derive_response(identity, identity_len, password,
730 const u8 *identity, *password; local
737 password = eap_get_config_password2(sm, &password_len, &pwhash);
738 if (identity == NULL || password == NULL)
777 challenge_response(challenge, password, pos); /* NT-Response */
778 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash",
779 password, 16)
820 const u8 *identity, *password; local
880 const u8 *identity, *password; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_mschapv2.c 378 sm->user->password,
383 sm->user->password,
399 pw_hash = sm->user->password;
401 nt_password_hash(sm->user->password,
484 if (sm->user == NULL || sm->user->password == NULL) {
485 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Password not configured");
  /external/wpa_supplicant_8/src/eap_peer/
eap_sake.c 77 const u8 *identity, *password; local
80 password = eap_get_config_password(sm, &password_len);
81 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
103 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN);
105 password + EAP_SAKE_ROOT_SECRET_LEN,
eap_ttls.c 645 const u8 *identity, *password; local
652 password = eap_get_config_password2(sm, &password_len, &pwhash);
653 if (identity == NULL || password == NULL)
694 if (mschapv2_derive_response(identity, identity_len, password,
735 const u8 *identity, *password; local
742 password = eap_get_config_password2(sm, &password_len, &pwhash);
743 if (identity == NULL || password == NULL)
782 challenge_response(challenge, password, pos); /* NT-Response */
783 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash",
784 password, 16)
825 const u8 *identity, *password; local
885 const u8 *identity, *password; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 380 sm->user->password,
386 sm->user->password,
406 pw_hash = sm->user->password;
408 nt_password_hash(sm->user->password,
491 if (sm->user == NULL || sm->user->password == NULL) {
492 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Password not configured");
  /packages/apps/Email/src/com/android/email/mail/store/
ImapConnection.java 83 ImapConnection(ImapStore store, String username, String password) {
84 setStore(store, username, password);
87 void setStore(ImapStore store, String username, String password) {
88 if (username != null && password != null) {
92 // apply the quoting here around the built-up password
94 + ImapUtility.imapQuoted(password);
  /external/chromium/googleurl/src/
url_parse_unittest.cc 79 const char* password; member in struct:__anon3436::URLParseCase
180 {"http://u:p@h:8/p?q#r", Parsed::PASSWORD, true, 9},
181 {"http://u:p@h:8/p?q#r", Parsed::PASSWORD, false, 9},
199 // This case is a little weird. It will report that the password would
203 {"http://u@h/", Parsed::PASSWORD, true, 9},
211 {"file:///c:/foo", Parsed::PASSWORD, true, 7},
287 // ... "]" in the password field isn't allowed, but we tolerate it here...
340 EXPECT_TRUE(ComponentMatches(url, cases[i].password, parsed.password));
377 ExpectInvalidComponent(parsed.password);
    [all...]
  /external/webkit/Tools/Scripts/webkitpy/common/checkout/
scm.py 295 def commit_with_message(self, message, username=None, password=None, git_commit=None, force_squash=False, changed_files=None):
563 def commit_with_message(self, message, username=None, password=None, git_commit=None, force_squash=False, changed_files=None):
    [all...]
  /external/chromium/net/socket_stream/
socket_stream.cc 203 const string16& username, const string16& password) {
215 // Update the username/password.
219 auth_identity_.password = password;
612 auth_identity_.password = entry->password();
627 &auth_identity_.password,
955 auth_identity_.password);
979 auth_identity_.password = entry->password();
    [all...]
  /packages/apps/Settings/src/com/android/settings/wifi/
WifiConfigController.java 273 /* show submit button if password, ip and proxy settings are valid */
281 /* Check password invalidity for manual network set up alone */
332 String password = mPasswordView.getText().toString(); local
335 password.matches("[0-9A-Fa-f]*")) {
336 config.wepKeys[0] = password;
338 config.wepKeys[0] = '"' + password + '"';
346 String password = mPasswordView.getText().toString(); local
347 if (password.matches("[0-9A-Fa-f]{64}")) {
348 config.preSharedKey = password;
350 config.preSharedKey = '"' + password + '"'
    [all...]
  /external/webkit/Source/WebCore/platform/network/cf/
SocketStreamHandleCFNet.cpp 352 static bool getStoredCONNECTProxyCredentials(const ProtectionSpace& protectionSpace, String& login, String& password)
354 // Try system credential storage first, matching HTTP behavior (CFNetwork only asks the client for password if it couldn't find it in Keychain).
363 password = storedCredential.password();
400 String password; local
401 if (!m_sentStoredCredentials && getStoredCONNECTProxyCredentials(protectionSpace, login, password)) {
404 RetainPtr<CFStringRef> passwordCF(AdoptCF, password.createCFString());
  /external/webkit/Source/WebCore/platform/network/mac/
AuthenticationMac.mm 270 password:coreCredential.password()
359 return Credential([macCredential user], [macCredential password], persistence);
  /external/webkit/Source/WebKit/mac/Plugins/
npapi.mm 204 NPError NPN_GetAuthenticationInfo(NPP instance, const char* protocol, const char* host, int32_t port, const char* scheme, const char *realm, char** username, uint32_t* ulen, char** password, uint32_t* plen)
212 password:password passwordLength:plen];
  /frameworks/support/v4/java/android/support/v4/view/accessibility/
AccessibilityNodeInfoCompat.java 68 public void setPassword(Object info, boolean password);
247 public void setPassword(Object info, boolean password) {
479 public void setPassword(Object info, boolean password) {
480 AccessibilityNodeInfoCompatIcs.setPassword(info, password);
987 * Gets whether this node is a password.
989 * @return True if the node is a password.
996 * Sets whether this node is a password.
1003 * @param password True if the node is a password.
1006 public void setPassword(boolean password) {
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
KeyStoreTest.java 239 char[] password = new char[] {'a', 'b', 'c'}; local
240 KeyStore.PasswordProtection pp = new KeyStore.PasswordProtection(password);
241 assertNotSame(pp.getPassword(), password); local
  /external/chromium/chrome/browser/net/
url_fixer_upper_unittest.cc 37 const url_parse::Component password; member in struct:segment_case
49 url_parse::Component(), // password
59 url_parse::Component(), // password
69 url_parse::Component(), // password
79 url_parse::Component(), // password
89 url_parse::Component(10, 7), // password
99 url_parse::Component(), // password
109 url_parse::Component(), // password
120 url_parse::Component(), // password
130 url_parse::Component(), // password
    [all...]
  /external/chromium/third_party/libjingle/source/talk/p2p/base/
port.h 98 // authenticated with this username and password.
99 // Fills in the username fragment and password. These will be initially set
107 const std::string& password() const { return password_; } function in class:cricket::Port
108 void set_password(const std::string& password) { password_ = password; }
  /external/webkit/Tools/DumpRenderTree/win/
ResourceLoadDelegate.cpp 303 const char* password = gLayoutTestController->authenticationPassword().c_str(); local
305 printf("%S - didReceiveAuthenticationChallenge - Responding with %s:%s\n", descriptionSuitableForTestResult(identifier).c_str(), user, password);
310 credential->initWithUser(_bstr_t(user), _bstr_t(password), WebURLCredentialPersistenceForSession);

Completed in 1618 milliseconds

<<11121314151617181920>>