/external/webkit/Tools/Scripts/webkitpy/tool/steps/ |
commit.py | 53 password = None 62 commit_text = scm.commit_with_message(self._commit_message, git_commit=self._options.git_commit, username=username, password=password, force_squash=force_squash, changed_files=self._changed_files(state)) 78 password = self._tool.user.prompt_password("%s password for %s: " % (e.server_host, username), repeat=5) 79 if not password: 80 raise ScriptError("You need to specify the password for %s on %s to perform the commit." % (username, e.server_host))
|
/frameworks/base/obex/javax/obex/ |
ObexSession.java | 74 * and password to use. 132 * If no password is provided then we not resent the request 138 byte[] password = result.getPassword(); 139 if (password == null) { 163 byte[] digest = new byte[challenge.length + password.length + 1]; 165 // Insert colon between challenge and password 167 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); 194 // get the correct password from the application
|
/tools/motodev/src/plugins/certmanager/src/com/motorolamobility/studio/android/certmanager/command/ |
ImportKeyStoreEntriesHandler.java | 60 String password;
local 66 password = passwordProvider.getKeyStorePassword(true);
67 if (password != null)
72 password.toCharArray(), sourceKeyStore.getKeyStore(),
76 targetKeyStore.forceReload(password.toCharArray(), true);
|
/external/chromium/chrome/browser/chromeos/login/ |
mock_authenticator.h | 38 const std::string& password, 41 if (expected_username_ == username && expected_password_ == password) { 56 const std::string& password) { 57 return AuthenticateToLogin(NULL /* not used */, username, password, 91 const std::string& password, 115 const std::string& password, 120 EXPECT_EQ(expected_password_, password);
|
account_creation_view.h | 23 // Notify about new user name and password. This notification is sent before 27 const std::string& password) = 0;
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_ms_funcs.c | 22 u8 *password = "clientPass"; local 72 nt_password_hash(password, strlen(password), buf); 80 password, strlen(password), 93 generate_authenticator_response(password, strlen(password),
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 73 password = eap_get_config_password2(sm, &password_len, &pwhash); 74 if (identity == NULL || password == NULL) 119 challenge_response(challenge, password, rpos); 121 nt_challenge_response(challenge, password, password_len, rpos); 188 const u8 *pos, *password; local 196 password = eap_get_config_password2(sm, &password_len, &pwhash); 197 if (password == NULL) 231 if (hash_nt_password_hash(password, pw_hash_hash)) { 236 if (nt_password_hash(password, password_len, pw_hash) | 276 const u8 *password; local 334 const u8 *addr[5], *password; local [all...] |
/external/chromium/chrome/common/net/gaia/ |
gaia_authenticator.cc | 62 const string& password, 68 params.password = password; 76 const string& password, 82 MakeParams(user_name, password, captcha_token, captcha_value); 124 results->password = params.password; 162 post_body += "&Passwd=" + EscapeUrlEncodedData(params.password); 367 const string& password) { 369 auth_results_.password = password [all...] |
/frameworks/base/keystore/java/android/security/ |
KeyStore.java | 132 private boolean password(byte[] password) { method in class:KeyStore 133 execute('p', password); 137 public boolean password(String password) { method in class:KeyStore 138 return password(getPasswordBytes(password)); 146 private boolean unlock(byte[] password) { 147 execute('u', password); 151 public boolean unlock(String password) { [all...] |
/libcore/luni/src/main/java/java/security/ |
KeyStore.java | 230 * Returns the key with the given alias, using the password to recover the 235 * @param password 236 * the password used to recover the key. 246 public final Key getKey(String alias, char[] password) 252 return implSpi.engineGetKey(alias, password); 307 * Associates the given alias with the key, password and certificate chain. 315 * @param password 316 * the password. 327 public final void setKeyEntry(String alias, Key key, char[] password, 337 implSpi.engineSetKeyEntry(alias, key, password, chain) 1107 private char[] password; field in class:KeyStore.PasswordProtection [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
cryptstring.h | 89 // Used for constructing strings where a password is involved and we 111 void Append(const CryptString * password) { 112 size_t len = password->GetLength(); 114 password->CopyTo(storage_ + length_, true); 173 std::string& password() { return password_; } function in class:talk_base::InsecureCryptStringImpl 174 const std::string& password() const { return password_; } function in class:talk_base::InsecureCryptStringImpl 185 copy->password() = password_;
|
/external/dropbear/ |
svr-authpam.c | 26 /* Validates a user password using PAM */ 101 if (!(strcmp(compare_message, "password:") == 0)) { 102 /* We don't recognise the prompt as asking for a password, 161 /* Process a password auth request, sending success or failure messages as 162 * appropriate. To the client it looks like it's doing normal password auth (as 164 * fairly standard (ie just "what's your username, what's your password, OK"). 179 unsigned char * password = NULL; local 185 /* check if client wants to change password */ 193 password = buf_getstring(ses.payload, &passwordlen); 199 userData.passwd = password; [all...] |
/external/webkit/LayoutTests/fast/dom/HTMLFormElement/script-tests/ |
elements-not-in-document.js | 21 i.type = 'password'; 29 shouldBe("i.getAttribute('type')", "'password'"); 30 shouldBe("i.type", "'password'");
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
MobileApple80211.c | 105 CFStringRef password) = NULL; 108 CFStringRef password) 110 return __Apple80211Associate(handle, bss, password); 116 CFStringRef password, 121 CFStringRef password, CFDictionaryRef *info) 123 return __Apple80211AssociateAndCopyInfo(handle, bss, password, info);
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
SecretKeyFactoryTest.java | 29 private static final char[] PASSWORD = "google".toCharArray(); 50 // PBEKeySpecs password only constructor 64 KeySpec ks = new PBEKeySpec(PASSWORD); 85 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS); 105 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS, KEY_LENGTH); 110 test_PBKDF2(PASSWORD, SALT, ITERATIONS, KEY_LENGTH, 125 char[] password = "password".toCharArray(); local 136 test_PBKDF2(password, salt, iterations, keyLength, expected); 145 char[] password = ("All n-entities must communicate with other local [all...] |
/external/apache-harmony/sql/src/test/java/org/apache/harmony/sql/tests/java/sql/ |
TestHelper_Driver4.java | 72 static String passwordProperty = "password"; 82 * Check for user and password, except for datasource = 83 * data1 which is set up not to require a user/password 93 String password = (String) info.get(passwordProperty); local 94 if (user == null || password == null) { 96 "Userid and/or password not supplied"); 99 || !password.equals(validpassword)) { 101 "Userid and/or password not valid");
|
/external/chromium/chrome/browser/ui/webui/chromeos/login/ |
login_ui.cc | 87 std::string password; local 91 args->GetString(1, &password); 92 delegate_->Login(username, password);
|
/external/chromium/crypto/ |
symmetric_key_openssl.cc | 44 const std::string& password, 56 int rv = PKCS5_PBKDF2_HMAC_SHA1(password.data(), password.length(),
|
/external/chromium/net/http/ |
http_auth_cache.h | 24 // - the last identity used (username/password) 69 // |password| - login information for the realm. 78 const string16& password, 82 // if one exists AND if the cached identity matches (|username|, |password|). 87 // |password| - condition to match. 93 const string16& password); 139 // The login password. 140 const string16 password() const { function in class:net::HttpAuthCache::Entry
|
http_auth_handler.cc | 66 const string16* password, 72 DCHECK((username == NULL) == (password == NULL)); 78 int rv = GenerateAuthTokenImpl(username, password, request,
|
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
relayport.h | 59 const std::string& username, const std::string& password, 62 username, password, magic_cookie); 89 const std::string& username, const std::string& password,
|
/external/webkit/Source/WebKit/gtk/webkit/ |
webkitsoupauthdialog.c | 106 char *password; member in struct:_WebKitAuthData 113 g_free(authData->password); 120 /* Anything but 401 and 5xx means the password was accepted */ 122 soup_auth_save_password(authData->auth, authData->username, authData->password); 139 authData->password = g_strdup(gtk_entry_get_text(GTK_ENTRY(authData->passwordEntry))); 141 soup_auth_authenticate(authData->auth, authData->username, authData->password); 195 static void show_auth_dialog(WebKitAuthData* authData, const char* login, const char* password) 261 description = g_strdup_printf(_("A username and password are being requested by the site %s"), uri->host); 306 authData->passwordEntry = table_add_entry(table, hasRealm ? 2 : 1, _("Password:"), 307 password, NULL) 335 const char *login, *password; local [all...] |
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
KeyManagerFactoryImpl.java | 43 //password 48 * password) 51 public void engineInit(KeyStore ks, char[] password) 56 if (password != null) { 57 pwd = password.clone();
|
/packages/apps/KeyChain/support/src/com/android/keychain/tests/support/ |
KeyChainServiceTestSupport.java | 38 @Override public boolean keystorePassword(String password) { 40 return mKeyStore.password(password);
|
/tools/motodev/src/plugins/certmanager/src/com/motorolamobility/studio/android/certmanager/core/ |
PasswordProvider.java | 49 * If needed a dialog will be shown, asking user to type the password. 112 //Creates the password text 113 paswordText = new Text(mainComposite, SWT.BORDER | SWT.PASSWORD); 117 //Creates the save password checkbox 166 * Retrieves the KeyStore password. 167 * @param promptPassword whether the password entry dialog will be shown or not 168 * @param useSavedPassword whether to use the keyStore saved password 169 * @return the password string or null if user canceled the dialog 179 * Retrieves the KeyStore password. 180 * This method will always attempt to retrieve the saved password 216 String password = null; local 242 String password = null; local [all...] |