/external/chromium/chrome/browser/ui/gtk/ |
crypto_module_password_dialog.cc | 64 void GotPassword(const char* password) { 65 if (password) 66 password_ = password;
|
/frameworks/base/core/java/android/webkit/ |
BrowserFrame.java | 815 String password) { 849 mainResource, userGesture, postDataIdentifier, username, password); [all...] |
LoadListener.java | 136 String username, String password) { 141 username, password); 151 String username, String password) { 170 mPassword = password; 648 // password supplied in the URL, if present. [all...] |
/frameworks/base/policy/src/com/android/internal/policy/impl/ |
AccountUnlockScreen.java | 51 * When the user forgets their password a bunch of times, we fall back on their 52 * account's login/password to unlock the phone (and reset their lock pattern). 75 * Shown while making asynchronous check of password. 106 mPassword = (EditText) findViewById(R.id.password); 178 // clear out forgotten password 271 final String password = mPassword.getText().toString(); local 279 options.putString(AccountManager.KEY_PASSWORD, password);
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLSocketFactory.java | 106 * For simplicity use the same password for the key as that of the keystore 248 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) 255 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
|
/external/chromium/crypto/ |
nss_util.cc | 104 // If we get asked for a password for the TPM, then return the 105 // well known password we use, as long as the TPM slot has been 119 std::string password = delegate->RequestPassword(PK11_GetTokenName(slot), local 124 char* result = PORT_Strdup(password.c_str()); 125 password.replace(0, password.size(), password.size(), 0); 128 DLOG(ERROR) << "PK11 password requested with NULL arg"; 405 // If we haven't initialized the password for the NSS databases, 406 // initialize an empty-string password so that we don't need t [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 76 const u8 *identity, *password; local 79 password = eap_get_config_password(sm, &password_len); 80 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 102 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); 104 password + EAP_SAKE_ROOT_SECRET_LEN,
|
eap_ttls.c | 645 const u8 *identity, *password; local 652 password = eap_get_config_password2(sm, &password_len, &pwhash); 653 if (identity == NULL || password == NULL) 694 mschapv2_derive_response(identity, identity_len, password, 730 const u8 *identity, *password; local 737 password = eap_get_config_password2(sm, &password_len, &pwhash); 738 if (identity == NULL || password == NULL) 777 challenge_response(challenge, password, pos); /* NT-Response */ 778 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash", 779 password, 16) 820 const u8 *identity, *password; local 880 const u8 *identity, *password; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_mschapv2.c | 378 sm->user->password, 383 sm->user->password, 399 pw_hash = sm->user->password; 401 nt_password_hash(sm->user->password, 484 if (sm->user == NULL || sm->user->password == NULL) { 485 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Password not configured");
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 77 const u8 *identity, *password; local 80 password = eap_get_config_password(sm, &password_len); 81 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 103 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); 105 password + EAP_SAKE_ROOT_SECRET_LEN,
|
eap_ttls.c | 645 const u8 *identity, *password; local 652 password = eap_get_config_password2(sm, &password_len, &pwhash); 653 if (identity == NULL || password == NULL) 694 if (mschapv2_derive_response(identity, identity_len, password, 735 const u8 *identity, *password; local 742 password = eap_get_config_password2(sm, &password_len, &pwhash); 743 if (identity == NULL || password == NULL) 782 challenge_response(challenge, password, pos); /* NT-Response */ 783 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash", 784 password, 16) 825 const u8 *identity, *password; local 885 const u8 *identity, *password; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 380 sm->user->password, 386 sm->user->password, 406 pw_hash = sm->user->password; 408 nt_password_hash(sm->user->password, 491 if (sm->user == NULL || sm->user->password == NULL) { 492 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Password not configured");
|
/packages/apps/Email/src/com/android/email/mail/store/ |
ImapConnection.java | 83 ImapConnection(ImapStore store, String username, String password) { 84 setStore(store, username, password); 87 void setStore(ImapStore store, String username, String password) { 88 if (username != null && password != null) { 92 // apply the quoting here around the built-up password 94 + ImapUtility.imapQuoted(password);
|
/external/chromium/googleurl/src/ |
url_parse_unittest.cc | 79 const char* password; member in struct:__anon3436::URLParseCase 180 {"http://u:p@h:8/p?q#r", Parsed::PASSWORD, true, 9}, 181 {"http://u:p@h:8/p?q#r", Parsed::PASSWORD, false, 9}, 199 // This case is a little weird. It will report that the password would 203 {"http://u@h/", Parsed::PASSWORD, true, 9}, 211 {"file:///c:/foo", Parsed::PASSWORD, true, 7}, 287 // ... "]" in the password field isn't allowed, but we tolerate it here... 340 EXPECT_TRUE(ComponentMatches(url, cases[i].password, parsed.password)); 377 ExpectInvalidComponent(parsed.password); [all...] |
/external/webkit/Tools/Scripts/webkitpy/common/checkout/ |
scm.py | 295 def commit_with_message(self, message, username=None, password=None, git_commit=None, force_squash=False, changed_files=None): 563 def commit_with_message(self, message, username=None, password=None, git_commit=None, force_squash=False, changed_files=None): [all...] |
/external/chromium/net/socket_stream/ |
socket_stream.cc | 203 const string16& username, const string16& password) { 215 // Update the username/password. 219 auth_identity_.password = password; 612 auth_identity_.password = entry->password(); 627 &auth_identity_.password, 955 auth_identity_.password); 979 auth_identity_.password = entry->password(); [all...] |
/packages/apps/Settings/src/com/android/settings/wifi/ |
WifiConfigController.java | 273 /* show submit button if password, ip and proxy settings are valid */ 281 /* Check password invalidity for manual network set up alone */ 332 String password = mPasswordView.getText().toString(); local 335 password.matches("[0-9A-Fa-f]*")) { 336 config.wepKeys[0] = password; 338 config.wepKeys[0] = '"' + password + '"'; 346 String password = mPasswordView.getText().toString(); local 347 if (password.matches("[0-9A-Fa-f]{64}")) { 348 config.preSharedKey = password; 350 config.preSharedKey = '"' + password + '"' [all...] |
/external/webkit/Source/WebCore/platform/network/cf/ |
SocketStreamHandleCFNet.cpp | 352 static bool getStoredCONNECTProxyCredentials(const ProtectionSpace& protectionSpace, String& login, String& password) 354 // Try system credential storage first, matching HTTP behavior (CFNetwork only asks the client for password if it couldn't find it in Keychain). 363 password = storedCredential.password(); 400 String password; local 401 if (!m_sentStoredCredentials && getStoredCONNECTProxyCredentials(protectionSpace, login, password)) { 404 RetainPtr<CFStringRef> passwordCF(AdoptCF, password.createCFString());
|
/external/webkit/Source/WebCore/platform/network/mac/ |
AuthenticationMac.mm | 270 password:coreCredential.password() 359 return Credential([macCredential user], [macCredential password], persistence);
|
/external/webkit/Source/WebKit/mac/Plugins/ |
npapi.mm | 204 NPError NPN_GetAuthenticationInfo(NPP instance, const char* protocol, const char* host, int32_t port, const char* scheme, const char *realm, char** username, uint32_t* ulen, char** password, uint32_t* plen) 212 password:password passwordLength:plen];
|
/frameworks/support/v4/java/android/support/v4/view/accessibility/ |
AccessibilityNodeInfoCompat.java | 68 public void setPassword(Object info, boolean password); 247 public void setPassword(Object info, boolean password) { 479 public void setPassword(Object info, boolean password) { 480 AccessibilityNodeInfoCompatIcs.setPassword(info, password); 987 * Gets whether this node is a password. 989 * @return True if the node is a password. 996 * Sets whether this node is a password. 1003 * @param password True if the node is a password. 1006 public void setPassword(boolean password) { [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStoreTest.java | 239 char[] password = new char[] {'a', 'b', 'c'}; local 240 KeyStore.PasswordProtection pp = new KeyStore.PasswordProtection(password); 241 assertNotSame(pp.getPassword(), password); local
|
/external/chromium/chrome/browser/net/ |
url_fixer_upper_unittest.cc | 37 const url_parse::Component password; member in struct:segment_case 49 url_parse::Component(), // password 59 url_parse::Component(), // password 69 url_parse::Component(), // password 79 url_parse::Component(), // password 89 url_parse::Component(10, 7), // password 99 url_parse::Component(), // password 109 url_parse::Component(), // password 120 url_parse::Component(), // password 130 url_parse::Component(), // password [all...] |
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
port.h | 98 // authenticated with this username and password. 99 // Fills in the username fragment and password. These will be initially set 107 const std::string& password() const { return password_; } function in class:cricket::Port 108 void set_password(const std::string& password) { password_ = password; }
|
/external/webkit/Tools/DumpRenderTree/win/ |
ResourceLoadDelegate.cpp | 303 const char* password = gLayoutTestController->authenticationPassword().c_str(); local 305 printf("%S - didReceiveAuthenticationChallenge - Responding with %s:%s\n", descriptionSuitableForTestResult(identifier).c_str(), user, password); 310 credential->initWithUser(_bstr_t(user), _bstr_t(password), WebURLCredentialPersistenceForSession);
|