/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/packets/ |
PacketUserauthRequestPublicKey.java | 21 String password; field in class:PacketUserauthRequestPublicKey
|
/external/webkit/Source/WebCore/platform/network/curl/ |
ResourceHandleManager.h | 70 const String& password = "");
|
/external/webkit/Source/WebKit/mac/Panels/ |
WebAuthenticationPanel.h | 38 IBOutlet id password; variable
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_config.h | 53 * password - Password string for EAP 55 * This field can include either the plaintext password (default 57 * presentation of the password) if flags field has 68 u8 *password; member in struct:eap_peer_config 71 * password_len - Length of password field 150 * private_key_passwd - Password for private key file 263 * private_key2_passwd - Password for private key file 502 * otp - One-time-password 524 * pending_req_password - Whether there is a pending password reques [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_config.h | 50 * password - Password string for EAP 52 * This field can include either the plaintext password (default 54 * presentation of the password) if flags field has 65 u8 *password; member in struct:eap_peer_config 68 * password_len - Length of password field 156 * private_key_passwd - Password for private key file 269 * private_key2_passwd - Password for private key file 508 * otp - One-time-password 530 * pending_req_password - Whether there is a pending password reques [all...] |
eap_ttls.c | 407 const u8 *identity, *password; local 414 password = eap_get_config_password2(sm, &password_len, &pwhash); 415 if (identity == NULL || password == NULL) 462 if (mschapv2_derive_response(identity, identity_len, password, 506 const u8 *identity, *password; local 513 password = eap_get_config_password2(sm, &password_len, &pwhash); 514 if (identity == NULL || password == NULL) 553 challenge_response(challenge, password, pos); /* NT-Response */ 554 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash", 555 password, 16) 589 const u8 *identity, *password; local 642 const u8 *identity, *password; local [all...] |
/frameworks/base/core/java/android/accounts/ |
IAccountManager.aidl | 37 boolean addAccount(in Account account, String password, in Bundle extras); 42 void setPassword(in Account account, String password);
|
/libcore/luni/src/main/java/java/security/ |
KeyStoreSpi.java | 40 * Returns the key with the given alias, using the password to recover the 45 * @param password 46 * the password used to recover the key. 54 public abstract Key engineGetKey(String alias, char[] password) 88 * Associates the given alias with the key, password and certificate chain. 96 * @param password 97 * the password. 108 char[] password, Certificate[] chain) throws KeyStoreException; 219 * specified password. 223 * @param password [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
MyKeyStore.java | 63 public Key engineGetKey(String alias, char[] password) 92 public void engineSetKeyEntry(String alias, Key key, char[] password, 178 public void engineStore(OutputStream stream, char[] password) 201 public void engineLoad(InputStream stream, char[] password)
|
/packages/apps/Email/src/com/android/email/mail/transport/ |
SmtpSender.java | 240 * is logged (if debug logging is enabled) so do not use this function for user ID or password. 297 // S: 334 Password: 301 private void saslAuthLogin(String username, String password) throws MessagingException, 309 Base64.encodeToString(password.getBytes(), Base64.NO_WRAP), 310 "/password redacted/"); 320 private void saslAuthPlain(String username, String password) throws MessagingException, 322 byte[] data = ("\000" + username + "\000" + password).getBytes();
|
/tools/motodev/src/plugins/certmanager/src/com/motorolamobility/studio/android/certmanager/core/ |
KeyStoreManager.java | 265 * Create a new keystore given a file, a store type and a password.
267 public static IKeyStore createKeyStore(File keyStoreFile, String keyStoreType, char[] password)
273 KeyStore keyStore = KeyStoreUtils.createKeystore(keyStoreFile, keyStoreType, password);
278 StudioLogger.error("Invalid password when creating a keystore: " + e.getMessage());
284 * Create a new keystore given a file and a password.
287 public static IKeyStore createKeyStore(File keyStoreFile, char[] password)
293 KeyStore keyStore = KeyStoreUtils.createKeystore(keyStoreFile, password);
298 StudioLogger.error("Invalid password when creating a keystore: " + e.getMessage());
|
/external/chromium/googleurl/src/ |
gurl_unittest.cc | 80 EXPECT_EQ("pass", url.password()); 96 EXPECT_EQ("", url.password()); 114 EXPECT_EQ("pass", url2.password()); 129 EXPECT_EQ("", invalid2.password()); 146 EXPECT_EQ("", url.password()); 236 const char* password; member in struct:ReplaceCase 258 SetupReplacement(&GURL::Replacements::SetPassword, &repl, cur.password);
|
url_canon.h | 305 // User info: username/password. If present, this will add the delimiters so 306 // the output will be "<username>:<password>@" or "<username>@". Empty 307 // username/password pairs, or empty passwords, will get converted to 310 // The components for the username and password refer to ranges in the 318 const url_parse::Component& password, 325 const url_parse::Component& password, 593 password(NULL), 606 password(default_value), 616 const CHAR* password; member in struct:url_canon::URLComponentSource 659 // Password [all...] |
/frameworks/base/keystore/java/android/security/ |
AndroidKeyStore.java | 75 public Key engineGetKey(String alias, char[] password) throws NoSuchAlgorithmException, 195 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain) 197 if ((password != null) && (password.length > 0)) { 498 public void engineStore(OutputStream stream, char[] password) throws IOException, 504 public void engineLoad(InputStream stream, char[] password) throws IOException, 510 if (password != null) { 511 throw new IllegalArgumentException("password not supported");
|
/external/chromium/chrome/browser/automation/ |
testing_automation_provider_chromeos.cc | 165 std::string username, password; local 167 !args->GetString("password", &password)) { 177 controller->Login(username, password); 392 std::string service_path, password, identity, certpath; local 394 !args->GetString("password", &password) || 408 if (!password.empty()) 409 wifi->SetPassphrase(password); 430 std::string ssid, security, password, identity, certpath local [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
existing_user_controller.cc | 157 const std::string& password) { 158 if (username.empty() || password.empty()) 182 login_performer_->Login(username, password); 306 const std::string& password, 319 // correct password/display error message. 328 password, 398 // which disables the requirement for the old owner password, 399 // allowing us to recover from a lost owner password/homedir.
|
login_performer.cc | 111 const std::string& password, 125 // 1. ScreenLock active (pending correct new password input) 133 password, 191 DVLOG(1) << "Password change detected - locking screen."; 237 const std::string& password) { 239 password_ = password; 249 password)); 358 // Offline auth OK, so it might be the case of changed password. 422 // Password change detected.
|
/external/chromium/chrome/browser/ui/webui/options/ |
sync_setup_handler.cc | 41 std::string* password, 50 !result->GetString("pass", password) || 377 std::string username, password, captcha, access_code; 378 if (!GetAuthData(json, &username, &password, &captcha, &access_code)) { 386 flow_->OnUserSubmittedAuth(username, password, captcha, access_code);
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
AccessPointParserHelper.java | 48 * security, eap, phase2, identity, password, anonymousidentity, cacert, usercert, 61 * <password>abcdefgh</password> 107 boolean password = false; 136 if (tagName.equalsIgnoreCase("password")) { 137 password = true; 229 if (password) { 249 config.password.setValue(passwordStr); 253 password = false;
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/sip/ |
SipCommandInterface.java | 191 String apn, String user, String password, String authType, 264 public void queryFacilityLock(String facility, String password, 269 public void queryFacilityLockForApp(String facility, String password, 275 String password, int serviceClass, Message response) { 280 String password, int serviceClass, String appId, Message response) {
|
/packages/apps/Browser/src/com/android/browser/ |
PageDialogsHandler.java | 93 public void onOk(String host, String realm, String username, String password) { 94 setHttpAuthUsernamePassword(host, realm, username, password); 95 handler.proceed(username, password); 110 * Set HTTP authentication password. 112 * @param host The host for the password 113 * @param realm The realm for the password 114 * @param username The username for the password. If it is null, it means 115 * password can't be saved. 116 * @param password The password [all...] |
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/ |
Connection.java | 162 * @param password 164 * must specify the password. Otherwise, this argument will be 175 public synchronized boolean authenticateWithDSA(String user, String pem, String password) throws IOException 195 authenticated = am.authenticatePublicKey(user, pem.toCharArray(), password, getOrCreateSecureRND()); 280 * sends username and password to the server. 292 * Often, password authentication is disabled, but users are not aware of it. 294 * even though "keyboard-interactive" *feels* like password authentication 298 * @param password 302 public synchronized boolean authenticateWithPassword(String user, String password) throws IOException 319 if (password == null [all...] |
/external/openssl/apps/ |
srp.c | 215 char password[1024]; local 221 cb_tmp.password = passin; 223 if (password_callback(password, 1024, 0, &cb_tmp) >0) 226 BIO_printf(bio, "Pass %s\n", password); 228 if (!(gNid=SRP_create_verifier(user, password, &srp_usersalt, &verifier, N, g))) 246 char password[1024]; local 251 cb_tmp.password = passout; 253 if (password_callback(password,1024,1,&cb_tmp) >0) 256 if (!(gNid =SRP_create_verifier(user, password, &salt, srp_verifier, N, g))) 652 VERBOSE BIO_printf(bio_err,"Verifying password for user \"%s\"\n",user) [all...] |
/external/qemu/ |
monitor.c | 163 readline_start(mon->rs, "Password: ", 1, readline_func, opaque); 167 monitor_printf(mon, "terminal does not support password prompting\n"); 471 static void change_vnc_password_cb(Monitor *mon, const char *password, 474 if (vnc_display_password(NULL, password) < 0) 475 monitor_printf(mon, "could not set VNC server password\n"); 483 strcmp(target, "password") == 0) { 485 char password[9]; local 486 strncpy(password, arg, sizeof(password)); 487 password[sizeof(password) - 1] = '\0' [all...] |
/packages/apps/Email/src/com/android/email/activity/setup/ |
AccountSetupBasics.java | 65 * Prompts the user for the email address and password. Also prompts for "Use this account as 80 * gmail account "test_account" with a password of "test_password". 276 String password = SetupData.getPassword(); local 278 mPasswordView.setText(password); 398 // Warn (but don't prevent) if password has leading/trailing spaces 438 String password = mPasswordView.getText().toString(); local 446 recvAuth.setLogin(mProvider.incomingUsername, password); 450 sendAuth.setLogin(mProvider.outgoingUsername, password); 552 String password = mPasswordView.getText().toString(); local 559 // Password: debu [all...] |