HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 476 - 500 of 683) sorted by null

<<11121314151617181920>>

  /external/qemu/
vnc-android.c 2190 int password = 0; local
    [all...]
vnc.c 2186 int password = 0; local
    [all...]
  /external/wpa_supplicant_8/hostapd/
config_file.c 215 /* Lines: "user" METHOD,METHOD2 "password" (password optional) */
375 wpa_printf(MSG_ERROR, "Invalid EAP password "
381 user->password = os_malloc(pos - start);
382 if (user->password == NULL) {
384 "memory for EAP password");
387 os_memcpy(user->password, start, pos - start);
398 wpa_printf(MSG_ERROR, "Invalid password hash "
402 user->password = os_malloc(16);
403 if (user->password == NULL)
    [all...]
  /external/chromium/net/base/
net_util.cc 829 AdjustComponent(delta, &(parsed->password));
    [all...]
  /external/webkit/Source/WebKit/android/jni/
WebCoreFrameBridge.cpp 1158 WTF::String password; local
2011 WTF::String password; local
2126 std::string password = jstringToStdString(env, jPassword); local
    [all...]
  /external/wpa_supplicant/
eap_ttls.c 706 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: MSCHAPV2 password",
707 config->password, config->password_len);
710 config->password, config->password_len,
713 generate_authenticator_response(config->password, config->password_len,
722 nt_password_hash(config->password, config->password_len,
803 config->password, config->password_len,
805 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password",
806 config->password, config->password_len);
856 /* User-Password; in RADIUS, this is encrypted, but EAP-TTLS encrypts
858 * However, the password is padded to obfuscate its length. *
    [all...]
  /frameworks/base/voip/java/com/android/server/sip/
SipService.java 465 String password = localProfile.getPassword(); local
467 mSipGroup = createSipSessionGroup(mLocalIp, p, password);
494 SipProfile localProfile, String password) throws SipException {
496 return new SipSessionGroup(localIp, localProfile, password,
502 return createSipSessionGroup(null, localProfile, password);
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/openssl/
PEMReader.java 90 * Create a new PEMReader with a password finder
93 * @param pFinder the password finder
103 * Create a new PEMReader with a password finder
106 * @param pFinder the password finder
118 * Create a new PEMReader with a password finder and differing providers for secret and public key
122 * @param pFinder the password finder
218 throw new PasswordException("No password finder specified, but a password is required");
221 char[] password = pFinder.getPassword(); local
223 if (password == null
    [all...]
  /external/ipsec-tools/
setup.c 381 char *username, char *password, char *phase1_up, char *script_arg)
385 xauth->pass = strtovchar(password);
463 " <username> <password> <phase1-up> <script-arg>\n"
465 " <username> <password> <phase1-up> <script-arg>\n"
467 " <username> <password> <phase1-up> <script-arg>\n"
635 int privsep_xauth_login_system(char *user, char *password)
  /external/webkit/Source/WebCore/platform/network/curl/
ResourceHandleManager.cpp 424 const String& password)
432 if (username.length() || password.length())
433 userPass = username + ":" + password + "@";
729 // curl CURLOPT_USERPWD expects username:password
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_pax.c 379 if (sm->user->password == NULL ||
381 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PAX: invalid password in "
387 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN);
464 if (sm->user == NULL || sm->user->password == NULL) {
465 wpa_printf(MSG_INFO, "EAP-PAX: Plaintext password not "
eap_psk.c 282 if (sm->user->password == NULL ||
284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: invalid password in "
290 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) {
421 if (sm->user == NULL || sm->user->password == NULL) {
422 wpa_printf(MSG_INFO, "EAP-PSK: Plaintext password not "
eap_sake.c 356 if (sm->user == NULL || sm->user->password == NULL ||
358 wpa_printf(MSG_INFO, "EAP-SAKE: Plaintext password with "
364 eap_sake_derive_keys(sm->user->password,
365 sm->user->password + EAP_SAKE_ROOT_SECRET_LEN,
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 380 if (sm->user->password == NULL ||
382 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PAX: invalid password in "
388 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN);
465 if (sm->user == NULL || sm->user->password == NULL) {
466 wpa_printf(MSG_INFO, "EAP-PAX: Plaintext password not "
eap_server_psk.c 283 if (sm->user->password == NULL ||
285 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: invalid password in "
291 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) {
422 if (sm->user == NULL || sm->user->password == NULL) {
423 wpa_printf(MSG_INFO, "EAP-PSK: Plaintext password not "
eap_server_sake.c 357 if (sm->user == NULL || sm->user->password == NULL ||
359 wpa_printf(MSG_INFO, "EAP-SAKE: Plaintext password with "
365 eap_sake_derive_keys(sm->user->password,
366 sm->user->password + EAP_SAKE_ROOT_SECRET_LEN,
  /frameworks/base/services/java/com/android/server/
MountService.java     [all...]
  /packages/apps/Email/src/com/android/email/activity/setup/
AccountSetupIncomingFragment.java 323 String password = recvAuth.mPassword; local
324 if (password != null) {
325 mPasswordView.setText(password);
383 // Warn (but don't prevent) if password has leading/trailing spaces
426 // Set the username and password for the outgoing settings to the username and
427 // password the user just set for incoming. Use the verified host address to try and
  /external/chromium/chrome/browser/chromeos/login/
user_controller.cc 304 const std::string& password) {
311 delegate_->Login(this, UTF8ToUTF16(password));
wizard_accessibility_handler.cc 259 if (textbox_info->password()) {
301 if (textbox_info->password()) {
  /external/chromium/chrome/browser/sync/
sync_setup_flow.cc 34 // Helper function to disable password sync.
228 const std::string& password,
231 service_->OnUserSubmittedAuth(username, password, captcha, access_code);
  /external/chromium/chrome/browser/ui/login/
login_prompt_browsertest.cc 42 const std::wstring password)
43 : username_(username), password_(password) {}
332 // Testing for recovery from an incorrect password for the case where
374 // The request should be retried after the incorrect password is
  /external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/httplib2/
__init__.py 402 def _wsse_username_token(cnonce, iso_now, password):
403 return base64.b64encode(_sha("%s%s%s" % (cnonce, iso_now, password)).digest()).strip()
677 def add(self, name, password, domain=""):
678 self.credentials.append((domain.lower(), name, password))
684 for (cdomain, name, password) in self.credentials:
686 yield (name, password)
690 name/password are mapped to key/cert."""
807 # Name/password
    [all...]
  /external/chromium/googleurl/src/
gurl.cc 142 DCHECK(test_url.parsed_.password == parsed_.password);
  /external/chromium/net/url_request/
url_request.cc 350 // Ensure that we do not send username and password fields in the referrer.
537 void URLRequest::SetAuth(const string16& username, const string16& password) {
541 job_->SetAuth(username, password);

Completed in 3439 milliseconds

<<11121314151617181920>>