/external/webkit/Tools/Scripts/webkitpy/common/net/ |
credentials_unittest.py | 65 "desc"<blob>="Web form password" 78 password: "SECRETSAUCE" 109 expected_stderr = "Reading Keychain for example.com account and password. Click \"Allow\" to continue...\n" 112 security_args = ["/usr/bin/security", "find-internet-password", "-g", "-s", "example.com"] 128 username, password = credentials._credentials_from_environment() 130 self.assertEquals(password, "bar")
|
/libcore/luni/src/main/java/java/sql/ |
DriverManager.java | 152 * "password"} should be passed, with appropriate settings for 153 * the user ID and its corresponding password to get access to 192 * @param password 193 * a password for the user ID to login to the database. 200 public static Connection getConnection(String url, String user, String password) 206 if (password != null) { 207 theProperties.setProperty("password", password);
|
/external/openssh/ |
sshconnect2.c | 351 {"password", 868 char *password; local 878 snprintf(prompt, sizeof(prompt), "%.30s@%.128s's password: ", 880 password = read_passphrase(prompt, 0); 886 packet_put_cstring(password); 887 memset(password, 0, strlen(password)); 888 xfree(password); 906 char *info, *lang, *password = NULL, *retype = NULL; local 929 "Enter %.30s@%.128s's old password: " 987 char prompt[256], *password, *crypted; local [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/ |
PEMDecoder.java | 74 private static byte[] generateKeyFromPasswordSaltWithMD5(byte[] password, byte[] salt, int keyLen) 87 md5.update(password, 0, password.length); 113 throw new PEMDecryptException("Decrypted PEM has wrong padding, did you specify the correct password?"); 118 throw new PEMDecryptException("Decrypted PEM has wrong padding, did you specify the correct password?"); 319 public static Object decode(char[] pem, String password) throws IOException 325 if (password == null) 326 throw new IOException("PEM is encrypted, but no password was specified"); 328 decryptPEM(ps, StringEncoder.GetBytes(password));
|
/external/webkit/Source/WebKit/win/Interfaces/ |
IWebURLAuthenticationChallenge.idl | 206 -(id)initWithUser:(NSString *)user password:(NSString *)password persistence:(NSURLCredentialPersistence)persistence 208 HRESULT initWithUser([in] BSTR user, [in] BSTR password, [in] WebURLCredentialPersistence persistence); 211 -(NSString *)password 213 HRESULT password([out, retval] BSTR* password);
|
/cts/tests/tests/webkit/src/android/webkit/cts/ |
HttpAuthHandlerTest.java | 108 MyWebViewClient(boolean proceed, String user, String password) { 112 mPassword = password;
|
/external/chromium/chrome/browser/chromeos/login/ |
account_screen.cc | 163 const std::string& password) { 164 delegate()->GetObserver(this)->OnSetUserNamePassword(username, password); 172 // password.
|
new_user_view.h | 29 // View that is used for new user login. It asks for username and password, 42 // User provided |username|, |password| and initiated login. 44 const std::string& password) = 0; 75 // Returns bounds of password field in screen coordinates. 88 void SetPassword(const std::string& password);
|
screen_locker.h | 74 const std::string& password, 87 // Authenticates the user with given |password| and authenticator. 88 void Authenticate(const string16& password); 176 // A view that accepts password. 229 // password. True when chrome is in BWSI or auto login mode.
|
user_controller.h | 42 const string16& password) = 0; 120 const std::string& password) OVERRIDE; 202 // Input controls which are used for username and password.
|
login_display.h | 45 // Sign in using |username| and |password| specified. 48 const std::string& password) = 0;
|
/external/chromium/chrome/browser/ui/views/ |
login_view.cc | 53 // Add the column set for the user name and password fields and labels. 106 const std::wstring& password) { 109 password_field_->SetText(password);
|
/external/chromium/net/url_request/ |
url_request_http_job.h | 64 const string16& password); 83 const string16& password);
|
/external/chromium/third_party/libjingle/source/talk/base/ |
basicpacketsocketfactory.cc | 113 socket, proxy_info.address, proxy_info.username, proxy_info.password); 117 proxy_info.username, proxy_info.password);
|
sslsocketfactory.cc | 145 proxy.username, proxy.password); 150 proxy.username, proxy.password);
|
/frameworks/base/telephony/tests/telephonytests/src/com/android/internal/telephony/ |
ApnSettingTest.java | 36 assertEquals(a1.password, a2.password); 102 "mmsc", "mmsproxy", "mmsport", "user", "password", 0,
|
/frameworks/base/tools/layoutlib/bridge/src/android/webkit/ |
WebView.java | 82 public void savePassword(String host, String username, String password) { 86 String username, String password) {
|
/libcore/luni/src/test/java/tests/support/ |
Support_SQL.java | 86 String password) throws SQLException { 88 return DriverManager.getConnection(url, login, password);
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/service/ |
IEmailService.aidl | 48 Bundle autoDiscover(String userName, String password);
|
/packages/apps/Email/tests/src/com/android/email/activity/setup/ |
AccountSetupIncomingTests.java | 61 Intent i = getTestIntent("imap://user:password@server.com:999"); 70 Intent i = getTestIntent("imap://user:password@server.com:999"); 81 Intent i = getTestIntent("imap://:password@server.com:999"); 88 * No password is not OK - not enabled 103 Intent i = getTestIntent("imap://user:password@server.com"); 143 // Clear the password - should disable 154 * Check password field for a given password. Should be called in UI thread. Confirms that 155 * the password has not been trimmed. 157 * @param password the password to test wit [all...] |
AccountSetupOutgoingTests.java | 61 Intent i = getTestIntent("smtp://user:password@server.com:999"); 78 Intent i = getTestIntent("smtp://:password@server.com:999"); 85 * No password is not OK - not enabled 100 Intent i = getTestIntent("smtp://user:password@server.com"); 140 // Clear the password - should disable 151 * Check password field for a given password. Should be called in UI thread. Confirms that 152 * the password has not been trimmed. 154 * @param password the password to test wit [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_ttls.c | 249 u8 *password = dpos; local 252 password[password_len - 1] == '\0') { 256 "User-Password (PAP)", 257 password, password_len); 258 parse->user_password = password; 270 "EAP-TTLS: CHAP-Password (CHAP)", 652 if (!sm->user || !sm->user->password || sm->user->password_hash || 655 "password configured"); 661 os_memcmp(sm->user->password, user_password, user_password_len) != 663 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password"); [all...] |
/external/chromium/net/http/ |
http_auth_handler_ntlm_portable.cc | 255 // LM_Hash computes the LM hash of the given password. 257 // param password 258 // unicode password. 264 static void LM_Hash(const string16& password, uint8* hash) { 267 // Convert password to OEM character set. We'll just use the native 269 std::string passbuf = base::SysWideToNativeMB(UTF16ToWide(password)); 278 // Use password keys to hash LM magic string twice. 283 // NTLM_Hash computes the NTLM hash of the given password. 285 // param password 286 // null-terminated unicode password [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JDKPKCS12KeyStore.java | 457 char[] password) 506 char[] password, 566 char[] password, 573 PBEKeySpec pbeSpec = new PBEKeySpec(password); 607 char[] password) 610 PBEKeySpec pbeSpec = new PBEKeySpec(password); 638 char[] password, 645 PBEKeySpec pbeSpec = new PBEKeySpec(password); 670 char[] password) 678 if (password == null 1126 char[] password; local 1142 doStore(bcParam.getOutputStream(), password, bcParam.isUseDEREncoding()); local [all...] |
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
MyKeyStore.java | 62 public Key engineGetKey(String alias, char[] password) 91 public void engineSetKeyEntry(String alias, Key key, char[] password, 177 public void engineStore(OutputStream stream, char[] password) 200 public void engineLoad(InputStream stream, char[] password)
|