/external/qemu/ |
vnc-android.c | 2190 int password = 0; local [all...] |
vnc.c | 2186 int password = 0; local [all...] |
/external/wpa_supplicant_8/hostapd/ |
config_file.c | 215 /* Lines: "user" METHOD,METHOD2 "password" (password optional) */ 375 wpa_printf(MSG_ERROR, "Invalid EAP password " 381 user->password = os_malloc(pos - start); 382 if (user->password == NULL) { 384 "memory for EAP password"); 387 os_memcpy(user->password, start, pos - start); 398 wpa_printf(MSG_ERROR, "Invalid password hash " 402 user->password = os_malloc(16); 403 if (user->password == NULL) [all...] |
/external/chromium/net/base/ |
net_util.cc | 829 AdjustComponent(delta, &(parsed->password)); [all...] |
/external/webkit/Source/WebKit/android/jni/ |
WebCoreFrameBridge.cpp | 1158 WTF::String password; local 2011 WTF::String password; local 2126 std::string password = jstringToStdString(env, jPassword); local [all...] |
/external/wpa_supplicant/ |
eap_ttls.c | 706 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: MSCHAPV2 password", 707 config->password, config->password_len); 710 config->password, config->password_len, 713 generate_authenticator_response(config->password, config->password_len, 722 nt_password_hash(config->password, config->password_len, 803 config->password, config->password_len, 805 wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password", 806 config->password, config->password_len); 856 /* User-Password; in RADIUS, this is encrypted, but EAP-TTLS encrypts 858 * However, the password is padded to obfuscate its length. * [all...] |
/frameworks/base/voip/java/com/android/server/sip/ |
SipService.java | 465 String password = localProfile.getPassword(); local 467 mSipGroup = createSipSessionGroup(mLocalIp, p, password); 494 SipProfile localProfile, String password) throws SipException { 496 return new SipSessionGroup(localIp, localProfile, password, 502 return createSipSessionGroup(null, localProfile, password); [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/openssl/ |
PEMReader.java | 90 * Create a new PEMReader with a password finder 93 * @param pFinder the password finder 103 * Create a new PEMReader with a password finder 106 * @param pFinder the password finder 118 * Create a new PEMReader with a password finder and differing providers for secret and public key 122 * @param pFinder the password finder 218 throw new PasswordException("No password finder specified, but a password is required"); 221 char[] password = pFinder.getPassword(); local 223 if (password == null [all...] |
/external/ipsec-tools/ |
setup.c | 381 char *username, char *password, char *phase1_up, char *script_arg) 385 xauth->pass = strtovchar(password); 463 " <username> <password> <phase1-up> <script-arg>\n" 465 " <username> <password> <phase1-up> <script-arg>\n" 467 " <username> <password> <phase1-up> <script-arg>\n" 635 int privsep_xauth_login_system(char *user, char *password)
|
/external/webkit/Source/WebCore/platform/network/curl/ |
ResourceHandleManager.cpp | 424 const String& password) 432 if (username.length() || password.length()) 433 userPass = username + ":" + password + "@"; 729 // curl CURLOPT_USERPWD expects username:password
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_pax.c | 379 if (sm->user->password == NULL || 381 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PAX: invalid password in " 387 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN); 464 if (sm->user == NULL || sm->user->password == NULL) { 465 wpa_printf(MSG_INFO, "EAP-PAX: Plaintext password not "
|
eap_psk.c | 282 if (sm->user->password == NULL || 284 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: invalid password in " 290 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { 421 if (sm->user == NULL || sm->user->password == NULL) { 422 wpa_printf(MSG_INFO, "EAP-PSK: Plaintext password not "
|
eap_sake.c | 356 if (sm->user == NULL || sm->user->password == NULL || 358 wpa_printf(MSG_INFO, "EAP-SAKE: Plaintext password with " 364 eap_sake_derive_keys(sm->user->password, 365 sm->user->password + EAP_SAKE_ROOT_SECRET_LEN,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 380 if (sm->user->password == NULL || 382 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PAX: invalid password in " 388 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN); 465 if (sm->user == NULL || sm->user->password == NULL) { 466 wpa_printf(MSG_INFO, "EAP-PAX: Plaintext password not "
|
eap_server_psk.c | 283 if (sm->user->password == NULL || 285 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: invalid password in " 291 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { 422 if (sm->user == NULL || sm->user->password == NULL) { 423 wpa_printf(MSG_INFO, "EAP-PSK: Plaintext password not "
|
eap_server_sake.c | 357 if (sm->user == NULL || sm->user->password == NULL || 359 wpa_printf(MSG_INFO, "EAP-SAKE: Plaintext password with " 365 eap_sake_derive_keys(sm->user->password, 366 sm->user->password + EAP_SAKE_ROOT_SECRET_LEN,
|
/frameworks/base/services/java/com/android/server/ |
MountService.java | [all...] |
/packages/apps/Email/src/com/android/email/activity/setup/ |
AccountSetupIncomingFragment.java | 323 String password = recvAuth.mPassword; local 324 if (password != null) { 325 mPasswordView.setText(password); 383 // Warn (but don't prevent) if password has leading/trailing spaces 426 // Set the username and password for the outgoing settings to the username and 427 // password the user just set for incoming. Use the verified host address to try and
|
/external/chromium/chrome/browser/chromeos/login/ |
user_controller.cc | 304 const std::string& password) { 311 delegate_->Login(this, UTF8ToUTF16(password));
|
wizard_accessibility_handler.cc | 259 if (textbox_info->password()) { 301 if (textbox_info->password()) {
|
/external/chromium/chrome/browser/sync/ |
sync_setup_flow.cc | 34 // Helper function to disable password sync. 228 const std::string& password, 231 service_->OnUserSubmittedAuth(username, password, captcha, access_code);
|
/external/chromium/chrome/browser/ui/login/ |
login_prompt_browsertest.cc | 42 const std::wstring password) 43 : username_(username), password_(password) {} 332 // Testing for recovery from an incorrect password for the case where 374 // The request should be retried after the incorrect password is
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-python/httplib2/ |
__init__.py | 402 def _wsse_username_token(cnonce, iso_now, password): 403 return base64.b64encode(_sha("%s%s%s" % (cnonce, iso_now, password)).digest()).strip() 677 def add(self, name, password, domain=""): 678 self.credentials.append((domain.lower(), name, password)) 684 for (cdomain, name, password) in self.credentials: 686 yield (name, password) 690 name/password are mapped to key/cert.""" 807 # Name/password [all...] |
/external/chromium/googleurl/src/ |
gurl.cc | 142 DCHECK(test_url.parsed_.password == parsed_.password);
|
/external/chromium/net/url_request/ |
url_request.cc | 350 // Ensure that we do not send username and password fields in the referrer. 537 void URLRequest::SetAuth(const string16& username, const string16& password) { 541 job_->SetAuth(username, password);
|