/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_ikev2.c | 67 const u8 *identity, *password; local 93 password = eap_get_config_password(sm, &password_len); 94 if (password) { 98 os_memcpy(data->ikev2.shared_secret, password, password_len);
|
eap_psk.c | 40 const u8 *identity, *password; local 43 password = eap_get_config_password(sm, &password_len); 44 if (!password || password_len != 16) { 53 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ikev2.c | 67 const u8 *identity, *password; local 93 password = eap_get_config_password(sm, &password_len); 94 if (password) { 98 os_memcpy(data->ikev2.shared_secret, password, password_len);
|
eap_psk.c | 41 const u8 *identity, *password; local 44 password = eap_get_config_password(sm, &password_len); 45 if (!password || password_len != 16) { 54 if (eap_psk_key_setup(password, data->ak, data->kdk)) {
|
eap_pwd.c | 30 u8 *password; member in struct:eap_pwd_data 81 const u8 *identity, *password; local 84 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 86 wpa_printf(MSG_INFO, "EAP-PWD: No password configured!"); 117 if ((data->password = os_malloc(password_len)) == NULL) { 124 os_memcpy(data->password, password, password_len); 146 os_free(data->password); 226 data->password, data->password_len [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pwd.c | 30 u8 *password; member in struct:eap_pwd_data 83 if (sm->user == NULL || sm->user->password == NULL || 85 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " 103 data->password = os_malloc(sm->user->password_len); 104 if (data->password == NULL) { 105 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " 112 os_memcpy(data->password, sm->user->password, data->password_len); 117 os_free(data->password); 140 os_free(data->password); [all...] |
/packages/apps/Email/src/com/android/email/service/ |
EmailServiceUtils.java | 92 public Bundle autoDiscover(String userName, String password) throws RemoteException {
|
/sdk/eclipse/plugins/com.android.ide.eclipse.adt/src/com/android/ide/eclipse/adt/internal/wizards/export/ |
ExportWizard.java | 92 // verify the characters are valid for password. 403 void setKeystorePassword(String password) { 404 mKeystorePassword = password; 444 void setKeyPassword(String password) { 445 mKeyPassword = password;
|
/development/samples/SampleSyncAdapter/src/com/example/android/samplesync/client/ |
NetworkUtilities.java | 64 /** POST parameter name for the user's password */ 65 public static final String PARAM_PASSWORD = "password"; 98 * username and password. 101 * @param password The server account password 104 public static String authenticate(String username, String password) { 109 params.add(new BasicNameValuePair(PARAM_PASSWORD, password));
|
/external/chromium/chrome/browser/ |
accessibility_events.cc | 149 bool password) 152 password_(password),
|
/external/chromium/chrome/browser/chromeos/login/ |
enterprise_enrollment_screen.cc | 40 const std::string& password, 50 auth_fetcher_->StartClientLogin(user, password,
|
/external/chromium/chrome/browser/importer/ |
importer_unittest.cc | 219 // Importer should obtain this password form only. 353 // Sets up dummy password data. 453 std::wstring password; local 456 &password)); 458 EXPECT_EQ(L"abcdefghijkl", password); 461 &password)); 463 EXPECT_EQ(L"abcdefg", password); 498 const wchar_t* password; member in struct:PasswordList 593 EXPECT_EQ(WideToUTF16(p.password), form.password_value); 798 EXPECT_EQ(WideToUTF16(p.password), form.password_value) [all...] |
/external/chromium/chrome/browser/printing/cloud_print/ |
cloud_print_setup_flow.cc | 234 const std::string& password, 251 authenticator_->StartClientLogin(user, password,
|
/external/chromium/chrome/browser/sync/util/ |
cryptographer.cc | 14 // a username, and a password) by calling Permute on this string. Since the 114 params.password)) { 115 NOTREACHED(); // Invalid username or password. 124 if (!nigori->Permute(Nigori::Password, kNigoriKeyName, &name)) { 153 params.password)) {
|
/external/chromium/chrome/common/ |
common_param_traits_unittest.cc | 44 EXPECT_EQ(input.password(), output.password());
|
/external/chromium/net/http/ |
http_cache_transaction.h | 106 const string16& password, 264 const string16& password);
|
http_stream_factory_impl_request.cc | 188 const string16& password) { 190 return bound_job_->RestartTunnelWithProxyAuth(username, password);
|
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
p2ptransport.cc | 183 if (candidate.password().size() > 0) 184 elem->SetAttr(QN_PASSWORD, candidate.password());
|
relayserver.h | 48 // All connections created with the same username/password are bound together. 200 const std::string& password, uint32 lifetime); 206 const std::string& password() { return password_; } function in class:cricket::RelayServerBinding
|
/external/chromium/third_party/libjingle/source/talk/p2p/client/ |
httpportallocator.cc | 215 std::string password = map["password"]; local 225 password,
|
/external/openssl/crypto/des/ |
FILES0 | 25 rpw.c - Source for libdes.a testing password reading routines.
|
/external/ppp/pppd/ |
srp-entry.c | 186 (char *)pwval.pebuf.password.data, pwval.pebuf.password.len),
|
/external/webkit/Source/WebCore/bindings/js/ |
JSXMLHttpRequestCustom.cpp | 95 String password = valueToStringWithNullCheck(exec, exec->argument(4)); local 96 impl()->open(method, url, async, user, password, ec);
|
/external/webkit/Source/WebCore/plugins/ |
npapi.cpp | 191 NPError NPN_GetAuthenticationInfo(NPP instance, const char* protocol, const char* host, int32_t port, const char* scheme, const char* realm, char** username, uint32_t* ulen, char** password, uint32_t* plen) 193 return pluginViewForInstance(instance)->getAuthenticationInfo(protocol, host, port, scheme, realm, username, ulen, password, plen);
|
/external/webkit/Source/WebCore/xml/ |
XMLHttpRequest.idl | 70 [Custom] void open(in DOMString method, in DOMString url, in boolean async, in DOMString user, in DOMString password)
|