/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
ApnSetting.java | 34 public final String password; field in class:ApnSetting 57 String user, String password, int authType, String[] types, 69 this.password = password; 88 * <mmsport>, <user>, <password>, <authtype>, <mcc>,<mnc>, 93 * <mmsport>, <user>, <password>, <authtype>, <mcc>, <mnc>, 97 * and password and thus cannot be read by this method.
|
/packages/apps/Browser/src/com/android/browser/ |
HttpAuthenticationDialog.java | 92 String password = getPassword(); local 100 if (password != null) { 101 mPasswordView.setText(password); 157 void onOk(String host, String realm, String username, String password);
|
/external/chromium/chrome/browser/chromeos/login/ |
google_authenticator.cc | 104 const std::string& password, 109 password_.assign(password); 115 // Not clearing the password, because we may need to pass it to the 124 const std::string& password, 129 // TODO(cmasone): Figure out how to parallelize fetch, username/password 132 ascii_hash_.assign(HashPassword(password)); 139 PrepareClientLoginAttempt(password, login_token, login_captcha); 145 const std::string& password) { 148 ascii_hash_.assign(HashPassword(password)); 370 // User seems to have given us the wrong old password.. [all...] |
existing_user_controller.h | 66 const std::string& password) OVERRIDE; 84 const std::string& password,
|
login_performer.h | 32 // (1) User password has changed. Ask user for the new password. 33 // (2) User password has changed and/or CAPTCHA input is required. 39 // (1) Ask for new user password. 40 // (2) Ask for new user password and/or CAPTCHA. 45 // CAPTCHA dialog, password input. 48 // In case of failure password/captcha 52 // 1. ScreenLock active (pending correct new password input) 80 const std::string& password, 96 // Performs login with the |username| and |password| specified [all...] |
/tools/motodev/src/plugins/certmanager/src/com/motorolamobility/studio/android/certmanager/ui/wizards/ |
SignExternalPackagePage.java | 158 String password = null; local 161 // retrieve the saved password 162 password = pP.getKeyStorePassword(false); 169 if (password == null) 171 // password is not saved 174 // get the password from the wizard 175 password = this.keystorePassword.getText(); 180 // the password was saved 183 keystore.isPasswordValid(password); 189 // the saved password is invalid, get the password from the wizar [all...] |
/external/chromium/chrome/browser/password_manager/ |
encryptor_linux.cc | 32 // Generates a newly allocated SymmetricKey object based a hard-coded password. 37 // password. We need to improve this password situation by moving a secure 38 // password into a system-level key store. 40 std::string password = "peanuts"; local 43 // Create an encryption key from our password and salt. 46 password, 74 // This currently "obfuscates" by encrypting with hard-coded password. 75 // We need to improve this password situation by moving a secure password [all...] |
/external/chromium/chrome/browser/sync/ |
profile_sync_service_harness.h | 34 const std::string& password, 45 void SetCredentials(const std::string& username, const std::string& password);
|
/external/chromium/chrome/browser/sync/util/ |
user_settings.h | 36 const std::string& password); 38 const std::string& password);
|
/external/chromium/net/base/ |
cert_database.h | 119 const string16& password); 124 int ExportToPKCS12(const CertificateList& certs, const string16& password,
|
/external/chromium/net/http/ |
http_auth_handler_basic.cc | 72 const string16* password, 76 // TODO(eroman): is this the right encoding of username/password? 78 if (!base::Base64Encode(UTF16ToUTF8(*username) + ":" + UTF16ToUTF8(*password),
|
http_auth_handler_digest.cc | 37 // | ?, md5 | user:realm:password | 39 // | md5-sess | MD5(user:realm:password):nonce:cnonce | 140 const string16* password, 155 *password, 319 const string16& password, 325 UTF16ToUTF8(password)); 345 const string16& password, 362 password, cnonce, nc);
|
http_auth_handler_negotiate.cc | 186 // GSSAPI does not provide a way to enter username/password to 205 const string16* password, 210 DCHECK((username == NULL) == (password == NULL)); 216 *password == password_)); 223 password_ = *password; 312 string16* password = has_username_and_password_ ? &password_ : NULL; local 314 return auth_system_.GenerateAuthToken(username, password, spn_, auth_token_);
|
http_auth_cache.cc | 116 const string16& password, 142 entry->password_ = password; 203 const string16& password) { 207 if (username == it->username() && password == it->password()) {
|
/external/webkit/Tools/Scripts/webkitpy/tool/bot/ |
sheriffircbot.py | 36 def __init__(self, password, message_queue, wakeup_event): 37 self._password = password
|
/libcore/luni/src/main/java/javax/net/ssl/ |
KeyManagerFactory.java | 181 * Initializes this instance with the specified key store and password. 185 * @param password 186 * the password for the specified key store or {@code null} if no 195 public final void init(KeyStore ks, char[] password) throws KeyStoreException, 197 spiImpl.engineInit(ks, password);
|
/tools/motodev/src/plugins/certmanager/src/com/motorolamobility/studio/android/certmanager/ui/model/ |
KeyStoreRootNode.java | 71 PasswordProvider password = new PasswordProvider(keysToreFile);
local 75 password.deleteKeyStoreSavedPasswordNode();
|
/frameworks/base/core/java/com/android/internal/net/ |
VpnProfile.java | 54 public String password = ""; // 4 field in class:VpnProfile 79 password = in.readString(); 100 out.writeString(password); 134 profile.password = values[4]; 146 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty(); 159 builder.append('\0').append(saveLogin ? password : "");
|
/external/chromium/chrome/browser/resources/options/chromeos/ |
internet_options_page.css | 33 .network-password { 38 .network-password > input, .network-password > select { 211 #detailsInternetPage:not([password]) .password-details {
|
/external/webkit/Source/JavaScriptCore/wtf/url/src/ |
URLParser.h | 64 static void parseAuthority(const CHAR* spec, const URLComponent& auth, URLComponent& username, URLComponent& password, URLComponent& host, URLComponent& port) 69 password.reset(); 77 // someone might include it in a password unescaped. 84 parseUserInfo(spec, URLComponent(auth.begin(), i - auth.begin()), username, password); 89 password.reset(); 124 // First split into two main parts, the authority (username, password, 142 parseAuthority(spec, authority, parsed.username, parsed.password, parsed.host, parsed.port); 240 parsed.password.reset(); 286 parsed.password.reset(); 507 static void parseUserInfo(const CHAR* spec, const URLComponent& user, URLComponent& username, URLComponent& password) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
ms_funcs.c | 54 * @password: 0-to-256-unicode-char Password (IN; ASCII) 55 * @password_len: Length of password 58 void nt_password_hash(const u8 *password, size_t password_len, 67 /* Convert password into unicode */ 69 buf[2 * i] = password[i]; 116 * @password: 0-to-256-unicode-char Password (IN; ASCII) 117 * @password_len: Length of password 122 const u8 *password, size_t password_len [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.c | 104 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 105 * @password_len: Length of password 109 int nt_password_hash(const u8 *password, size_t password_len, 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) 163 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 164 * @password_len: Length of password 170 const u8 *password, size_t password_len, 179 if (nt_password_hash(password, password_len, password_hash) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_ttls.c | 231 u8 *password = dpos; local 234 password[password_len - 1] == '\0') { 238 "User-Password (PAP)", 239 password, password_len); 240 parse->user_password = password; 252 "EAP-TTLS: CHAP-Password (CHAP)", 503 if (!sm->user || !sm->user->password || sm->user->password_hash || 506 "password configured"); 512 os_memcmp(sm->user->password, user_password, user_password_len) != 514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password"); [all...] |
/external/chromium/chrome/browser/ui/login/ |
login_prompt.cc | 128 const string16& password) { 134 // Tell the password manager the credentials were submitted / accepted. 137 password_form_.password_value = password; 147 NotifyAuthSupplied(username, password); 155 this, &LoginHandler::SetAuthDeferred, username, password)); 240 SetAuth(supplied_details->username(), supplied_details->password()); 297 const string16& password) { 307 AuthSuppliedLoginNotificationDetails details(this, username, password); 349 const string16& password) { 353 request_->SetAuth(username, password); [all...] |
/external/chromium/googleurl/src/ |
url_canon_internal.cc | 316 DoOverrideComponent(repl_source.password, repl_parsed.password, 317 &source->password, &parsed->password); 353 repl_source.password, repl_parsed.password, 354 utf8_buffer, &parsed->password); 376 if (repl_source.password) source->password = utf8_buffer->data();
|