HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 276 - 300 of 792) sorted by null

<<11121314151617181920>>

  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/packets/
PacketUserauthRequestPublicKey.java 21 String password; field in class:PacketUserauthRequestPublicKey
  /external/webkit/Source/WebCore/platform/network/curl/
ResourceHandleManager.h 70 const String& password = "");
  /external/webkit/Source/WebKit/mac/Panels/
WebAuthenticationPanel.h 38 IBOutlet id password; variable
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_config.h 53 * password - Password string for EAP
55 * This field can include either the plaintext password (default
57 * presentation of the password) if flags field has
68 u8 *password; member in struct:eap_peer_config
71 * password_len - Length of password field
150 * private_key_passwd - Password for private key file
263 * private_key2_passwd - Password for private key file
502 * otp - One-time-password
524 * pending_req_password - Whether there is a pending password reques
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_config.h 50 * password - Password string for EAP
52 * This field can include either the plaintext password (default
54 * presentation of the password) if flags field has
65 u8 *password; member in struct:eap_peer_config
68 * password_len - Length of password field
156 * private_key_passwd - Password for private key file
269 * private_key2_passwd - Password for private key file
508 * otp - One-time-password
530 * pending_req_password - Whether there is a pending password reques
    [all...]
eap_ttls.c 407 const u8 *identity, *password; local
414 password = eap_get_config_password2(sm, &password_len, &pwhash);
415 if (identity == NULL || password == NULL)
462 if (mschapv2_derive_response(identity, identity_len, password,
506 const u8 *identity, *password; local
513 password = eap_get_config_password2(sm, &password_len, &pwhash);
514 if (identity == NULL || password == NULL)
553 challenge_response(challenge, password, pos); /* NT-Response */
554 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash",
555 password, 16)
589 const u8 *identity, *password; local
642 const u8 *identity, *password; local
    [all...]
  /frameworks/base/core/java/android/accounts/
IAccountManager.aidl 37 boolean addAccount(in Account account, String password, in Bundle extras);
42 void setPassword(in Account account, String password);
  /libcore/luni/src/main/java/java/security/
KeyStoreSpi.java 40 * Returns the key with the given alias, using the password to recover the
45 * @param password
46 * the password used to recover the key.
54 public abstract Key engineGetKey(String alias, char[] password)
88 * Associates the given alias with the key, password and certificate chain.
96 * @param password
97 * the password.
108 char[] password, Certificate[] chain) throws KeyStoreException;
219 * specified password.
223 * @param password
    [all...]
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
MyKeyStore.java 63 public Key engineGetKey(String alias, char[] password)
92 public void engineSetKeyEntry(String alias, Key key, char[] password,
178 public void engineStore(OutputStream stream, char[] password)
201 public void engineLoad(InputStream stream, char[] password)
  /packages/apps/Email/src/com/android/email/mail/transport/
SmtpSender.java 240 * is logged (if debug logging is enabled) so do not use this function for user ID or password.
297 // S: 334 Password:
301 private void saslAuthLogin(String username, String password) throws MessagingException,
309 Base64.encodeToString(password.getBytes(), Base64.NO_WRAP),
310 "/password redacted/");
320 private void saslAuthPlain(String username, String password) throws MessagingException,
322 byte[] data = ("\000" + username + "\000" + password).getBytes();
  /tools/motodev/src/plugins/certmanager/src/com/motorolamobility/studio/android/certmanager/core/
KeyStoreManager.java 265 * Create a new keystore given a file, a store type and a password.
267 public static IKeyStore createKeyStore(File keyStoreFile, String keyStoreType, char[] password)
273 KeyStore keyStore = KeyStoreUtils.createKeystore(keyStoreFile, keyStoreType, password);
278 StudioLogger.error("Invalid password when creating a keystore: " + e.getMessage());
284 * Create a new keystore given a file and a password.
287 public static IKeyStore createKeyStore(File keyStoreFile, char[] password)
293 KeyStore keyStore = KeyStoreUtils.createKeystore(keyStoreFile, password);
298 StudioLogger.error("Invalid password when creating a keystore: " + e.getMessage());
  /external/chromium/googleurl/src/
gurl_unittest.cc 80 EXPECT_EQ("pass", url.password());
96 EXPECT_EQ("", url.password());
114 EXPECT_EQ("pass", url2.password());
129 EXPECT_EQ("", invalid2.password());
146 EXPECT_EQ("", url.password());
236 const char* password; member in struct:ReplaceCase
258 SetupReplacement(&GURL::Replacements::SetPassword, &repl, cur.password);
url_canon.h 305 // User info: username/password. If present, this will add the delimiters so
306 // the output will be "<username>:<password>@" or "<username>@". Empty
307 // username/password pairs, or empty passwords, will get converted to
310 // The components for the username and password refer to ranges in the
318 const url_parse::Component& password,
325 const url_parse::Component& password,
593 password(NULL),
606 password(default_value),
616 const CHAR* password; member in struct:url_canon::URLComponentSource
659 // Password
    [all...]
  /frameworks/base/keystore/java/android/security/
AndroidKeyStore.java 75 public Key engineGetKey(String alias, char[] password) throws NoSuchAlgorithmException,
195 public void engineSetKeyEntry(String alias, Key key, char[] password, Certificate[] chain)
197 if ((password != null) && (password.length > 0)) {
498 public void engineStore(OutputStream stream, char[] password) throws IOException,
504 public void engineLoad(InputStream stream, char[] password) throws IOException,
510 if (password != null) {
511 throw new IllegalArgumentException("password not supported");
  /external/chromium/chrome/browser/automation/
testing_automation_provider_chromeos.cc 165 std::string username, password; local
167 !args->GetString("password", &password)) {
177 controller->Login(username, password);
392 std::string service_path, password, identity, certpath; local
394 !args->GetString("password", &password) ||
408 if (!password.empty())
409 wifi->SetPassphrase(password);
430 std::string ssid, security, password, identity, certpath local
    [all...]
  /external/chromium/chrome/browser/chromeos/login/
existing_user_controller.cc 157 const std::string& password) {
158 if (username.empty() || password.empty())
182 login_performer_->Login(username, password);
306 const std::string& password,
319 // correct password/display error message.
328 password,
398 // which disables the requirement for the old owner password,
399 // allowing us to recover from a lost owner password/homedir.
login_performer.cc 111 const std::string& password,
125 // 1. ScreenLock active (pending correct new password input)
133 password,
191 DVLOG(1) << "Password change detected - locking screen.";
237 const std::string& password) {
239 password_ = password;
249 password));
358 // Offline auth OK, so it might be the case of changed password.
422 // Password change detected.
  /external/chromium/chrome/browser/ui/webui/options/
sync_setup_handler.cc 41 std::string* password,
50 !result->GetString("pass", password) ||
377 std::string username, password, captcha, access_code;
378 if (!GetAuthData(json, &username, &password, &captcha, &access_code)) {
386 flow_->OnUserSubmittedAuth(username, password, captcha, access_code);
  /frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/
AccessPointParserHelper.java 48 * security, eap, phase2, identity, password, anonymousidentity, cacert, usercert,
61 * <password>abcdefgh</password>
107 boolean password = false;
136 if (tagName.equalsIgnoreCase("password")) {
137 password = true;
229 if (password) {
249 config.password.setValue(passwordStr);
253 password = false;
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/sip/
SipCommandInterface.java 191 String apn, String user, String password, String authType,
264 public void queryFacilityLock(String facility, String password,
269 public void queryFacilityLockForApp(String facility, String password,
275 String password, int serviceClass, Message response) {
280 String password, int serviceClass, String appId, Message response) {
  /packages/apps/Browser/src/com/android/browser/
PageDialogsHandler.java 93 public void onOk(String host, String realm, String username, String password) {
94 setHttpAuthUsernamePassword(host, realm, username, password);
95 handler.proceed(username, password);
110 * Set HTTP authentication password.
112 * @param host The host for the password
113 * @param realm The realm for the password
114 * @param username The username for the password. If it is null, it means
115 * password can't be saved.
116 * @param password The password
    [all...]
  /external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/
Connection.java 162 * @param password
164 * must specify the password. Otherwise, this argument will be
175 public synchronized boolean authenticateWithDSA(String user, String pem, String password) throws IOException
195 authenticated = am.authenticatePublicKey(user, pem.toCharArray(), password, getOrCreateSecureRND());
280 * sends username and password to the server.
292 * Often, password authentication is disabled, but users are not aware of it.
294 * even though "keyboard-interactive" *feels* like password authentication
298 * @param password
302 public synchronized boolean authenticateWithPassword(String user, String password) throws IOException
319 if (password == null
    [all...]
  /external/openssl/apps/
srp.c 215 char password[1024]; local
221 cb_tmp.password = passin;
223 if (password_callback(password, 1024, 0, &cb_tmp) >0)
226 BIO_printf(bio, "Pass %s\n", password);
228 if (!(gNid=SRP_create_verifier(user, password, &srp_usersalt, &verifier, N, g)))
246 char password[1024]; local
251 cb_tmp.password = passout;
253 if (password_callback(password,1024,1,&cb_tmp) >0)
256 if (!(gNid =SRP_create_verifier(user, password, &salt, srp_verifier, N, g)))
652 VERBOSE BIO_printf(bio_err,"Verifying password for user \"%s\"\n",user)
    [all...]
  /external/qemu/
monitor.c 163 readline_start(mon->rs, "Password: ", 1, readline_func, opaque);
167 monitor_printf(mon, "terminal does not support password prompting\n");
471 static void change_vnc_password_cb(Monitor *mon, const char *password,
474 if (vnc_display_password(NULL, password) < 0)
475 monitor_printf(mon, "could not set VNC server password\n");
483 strcmp(target, "password") == 0) {
485 char password[9]; local
486 strncpy(password, arg, sizeof(password));
487 password[sizeof(password) - 1] = '\0'
    [all...]
  /packages/apps/Email/src/com/android/email/activity/setup/
AccountSetupBasics.java 65 * Prompts the user for the email address and password. Also prompts for "Use this account as
80 * gmail account "test_account" with a password of "test_password".
276 String password = SetupData.getPassword(); local
278 mPasswordView.setText(password);
398 // Warn (but don't prevent) if password has leading/trailing spaces
438 String password = mPasswordView.getText().toString(); local
446 recvAuth.setLogin(mProvider.incomingUsername, password);
450 sendAuth.setLogin(mProvider.outgoingUsername, password);
552 String password = mPasswordView.getText().toString(); local
559 // Password: debu
    [all...]

Completed in 868 milliseconds

<<11121314151617181920>>