HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 226 - 250 of 752) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/webkit/Tools/Scripts/webkitpy/common/net/
credentials_unittest.py 65 "desc"<blob>="Web form password"
78 password: "SECRETSAUCE"
109 expected_stderr = "Reading Keychain for example.com account and password. Click \"Allow\" to continue...\n"
112 security_args = ["/usr/bin/security", "find-internet-password", "-g", "-s", "example.com"]
128 username, password = credentials._credentials_from_environment()
130 self.assertEquals(password, "bar")
  /libcore/luni/src/main/java/java/sql/
DriverManager.java 152 * "password"} should be passed, with appropriate settings for
153 * the user ID and its corresponding password to get access to
192 * @param password
193 * a password for the user ID to login to the database.
200 public static Connection getConnection(String url, String user, String password)
206 if (password != null) {
207 theProperties.setProperty("password", password);
  /external/openssh/
sshconnect2.c 351 {"password",
868 char *password; local
878 snprintf(prompt, sizeof(prompt), "%.30s@%.128s's password: ",
880 password = read_passphrase(prompt, 0);
886 packet_put_cstring(password);
887 memset(password, 0, strlen(password));
888 xfree(password);
906 char *info, *lang, *password = NULL, *retype = NULL; local
929 "Enter %.30s@%.128s's old password: "
987 char prompt[256], *password, *crypted; local
    [all...]
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/
PEMDecoder.java 74 private static byte[] generateKeyFromPasswordSaltWithMD5(byte[] password, byte[] salt, int keyLen)
87 md5.update(password, 0, password.length);
113 throw new PEMDecryptException("Decrypted PEM has wrong padding, did you specify the correct password?");
118 throw new PEMDecryptException("Decrypted PEM has wrong padding, did you specify the correct password?");
319 public static Object decode(char[] pem, String password) throws IOException
325 if (password == null)
326 throw new IOException("PEM is encrypted, but no password was specified");
328 decryptPEM(ps, StringEncoder.GetBytes(password));
  /external/webkit/Source/WebKit/win/Interfaces/
IWebURLAuthenticationChallenge.idl 206 -(id)initWithUser:(NSString *)user password:(NSString *)password persistence:(NSURLCredentialPersistence)persistence
208 HRESULT initWithUser([in] BSTR user, [in] BSTR password, [in] WebURLCredentialPersistence persistence);
211 -(NSString *)password
213 HRESULT password([out, retval] BSTR* password);
  /cts/tests/tests/webkit/src/android/webkit/cts/
HttpAuthHandlerTest.java 108 MyWebViewClient(boolean proceed, String user, String password) {
112 mPassword = password;
  /external/chromium/chrome/browser/chromeos/login/
account_screen.cc 163 const std::string& password) {
164 delegate()->GetObserver(this)->OnSetUserNamePassword(username, password);
172 // password.
new_user_view.h 29 // View that is used for new user login. It asks for username and password,
42 // User provided |username|, |password| and initiated login.
44 const std::string& password) = 0;
75 // Returns bounds of password field in screen coordinates.
88 void SetPassword(const std::string& password);
screen_locker.h 74 const std::string& password,
87 // Authenticates the user with given |password| and authenticator.
88 void Authenticate(const string16& password);
176 // A view that accepts password.
229 // password. True when chrome is in BWSI or auto login mode.
user_controller.h 42 const string16& password) = 0;
120 const std::string& password) OVERRIDE;
202 // Input controls which are used for username and password.
login_display.h 45 // Sign in using |username| and |password| specified.
48 const std::string& password) = 0;
  /external/chromium/chrome/browser/ui/views/
login_view.cc 53 // Add the column set for the user name and password fields and labels.
106 const std::wstring& password) {
109 password_field_->SetText(password);
  /external/chromium/net/url_request/
url_request_http_job.h 64 const string16& password);
83 const string16& password);
  /external/chromium/third_party/libjingle/source/talk/base/
basicpacketsocketfactory.cc 113 socket, proxy_info.address, proxy_info.username, proxy_info.password);
117 proxy_info.username, proxy_info.password);
sslsocketfactory.cc 145 proxy.username, proxy.password);
150 proxy.username, proxy.password);
  /frameworks/base/telephony/tests/telephonytests/src/com/android/internal/telephony/
ApnSettingTest.java 36 assertEquals(a1.password, a2.password);
102 "mmsc", "mmsproxy", "mmsport", "user", "password", 0,
  /frameworks/base/tools/layoutlib/bridge/src/android/webkit/
WebView.java 82 public void savePassword(String host, String username, String password) {
86 String username, String password) {
  /libcore/luni/src/test/java/tests/support/
Support_SQL.java 86 String password) throws SQLException {
88 return DriverManager.getConnection(url, login, password);
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/service/
IEmailService.aidl 48 Bundle autoDiscover(String userName, String password);
  /packages/apps/Email/tests/src/com/android/email/activity/setup/
AccountSetupIncomingTests.java 61 Intent i = getTestIntent("imap://user:password@server.com:999");
70 Intent i = getTestIntent("imap://user:password@server.com:999");
81 Intent i = getTestIntent("imap://:password@server.com:999");
88 * No password is not OK - not enabled
103 Intent i = getTestIntent("imap://user:password@server.com");
143 // Clear the password - should disable
154 * Check password field for a given password. Should be called in UI thread. Confirms that
155 * the password has not been trimmed.
157 * @param password the password to test wit
    [all...]
AccountSetupOutgoingTests.java 61 Intent i = getTestIntent("smtp://user:password@server.com:999");
78 Intent i = getTestIntent("smtp://:password@server.com:999");
85 * No password is not OK - not enabled
100 Intent i = getTestIntent("smtp://user:password@server.com");
140 // Clear the password - should disable
151 * Check password field for a given password. Should be called in UI thread. Confirms that
152 * the password has not been trimmed.
154 * @param password the password to test wit
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_ttls.c 249 u8 *password = dpos; local
252 password[password_len - 1] == '\0') {
256 "User-Password (PAP)",
257 password, password_len);
258 parse->user_password = password;
270 "EAP-TTLS: CHAP-Password (CHAP)",
652 if (!sm->user || !sm->user->password || sm->user->password_hash ||
655 "password configured");
661 os_memcmp(sm->user->password, user_password, user_password_len) !=
663 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password");
    [all...]
  /external/chromium/net/http/
http_auth_handler_ntlm_portable.cc 255 // LM_Hash computes the LM hash of the given password.
257 // param password
258 // unicode password.
264 static void LM_Hash(const string16& password, uint8* hash) {
267 // Convert password to OEM character set. We'll just use the native
269 std::string passbuf = base::SysWideToNativeMB(UTF16ToWide(password));
278 // Use password keys to hash LM magic string twice.
283 // NTLM_Hash computes the NTLM hash of the given password.
285 // param password
286 // null-terminated unicode password
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/
JDKPKCS12KeyStore.java 457 char[] password)
506 char[] password,
566 char[] password,
573 PBEKeySpec pbeSpec = new PBEKeySpec(password);
607 char[] password)
610 PBEKeySpec pbeSpec = new PBEKeySpec(password);
638 char[] password,
645 PBEKeySpec pbeSpec = new PBEKeySpec(password);
670 char[] password)
678 if (password == null
1126 char[] password; local
1142 doStore(bcParam.getOutputStream(), password, bcParam.isUseDEREncoding()); local
    [all...]
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/
MyKeyStore.java 62 public Key engineGetKey(String alias, char[] password)
91 public void engineSetKeyEntry(String alias, Key key, char[] password,
177 public void engineStore(OutputStream stream, char[] password)
200 public void engineLoad(InputStream stream, char[] password)

Completed in 2090 milliseconds

1 2 3 4 5 6 7 8 91011>>