/frameworks/base/policy/src/com/android/internal/policy/impl/keyguard/ |
KeyguardAccountView.java | 49 * When the user forgets their password a bunch of times, we fall back on their 50 * account's login/password to unlock the phone (and reset their lock pattern). 67 * Shown while making asynchronous check of password. 92 mPassword = (EditText) findViewById(R.id.password); 169 // clear out forgotten password 264 final String password = mPassword.getText().toString(); local 272 options.putString(AccountManager.KEY_PASSWORD, password);
|
/frameworks/base/policy/src/com/android/internal/policy/impl/keyguard_obsolete/ |
AccountUnlockScreen.java | 51 * When the user forgets their password a bunch of times, we fall back on their 52 * account's login/password to unlock the phone (and reset their lock pattern). 75 * Shown while making asynchronous check of password. 106 mPassword = (EditText) findViewById(R.id.password); 178 // clear out forgotten password 271 final String password = mPassword.getText().toString(); local 279 options.putString(AccountManager.KEY_PASSWORD, password);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStoreSpiTest.java | 99 @Override public void engineSetKeyEntry(String alias, Key key, char[] password, 200 public void engineLoad(InputStream stream, char[] password) { 202 assertNull(password);
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
SSLSocketFactory.java | 106 * For simplicity use the same password for the key as that of the keystore 248 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) 255 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
|
/external/chromium/crypto/ |
nss_util.cc | 104 // If we get asked for a password for the TPM, then return the 105 // well known password we use, as long as the TPM slot has been 119 std::string password = delegate->RequestPassword(PK11_GetTokenName(slot), local 124 char* result = PORT_Strdup(password.c_str()); 125 password.replace(0, password.size(), password.size(), 0); 128 DLOG(ERROR) << "PK11 password requested with NULL arg"; 405 // If we haven't initialized the password for the NSS databases, 406 // initialize an empty-string password so that we don't need t [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 76 const u8 *identity, *password; local 79 password = eap_get_config_password(sm, &password_len); 80 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 102 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); 104 password + EAP_SAKE_ROOT_SECRET_LEN,
|
eap_ttls.c | 645 const u8 *identity, *password; local 652 password = eap_get_config_password2(sm, &password_len, &pwhash); 653 if (identity == NULL || password == NULL) 694 mschapv2_derive_response(identity, identity_len, password, 730 const u8 *identity, *password; local 737 password = eap_get_config_password2(sm, &password_len, &pwhash); 738 if (identity == NULL || password == NULL) 777 challenge_response(challenge, password, pos); /* NT-Response */ 778 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash", 779 password, 16) 820 const u8 *identity, *password; local 880 const u8 *identity, *password; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_mschapv2.c | 378 sm->user->password, 383 sm->user->password, 399 pw_hash = sm->user->password; 401 nt_password_hash(sm->user->password, 484 if (sm->user == NULL || sm->user->password == NULL) { 485 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Password not configured");
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 71 const u8 *identity, *password; local 74 password = eap_get_config_password(sm, &password_len); 75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); 99 password + EAP_SAKE_ROOT_SECRET_LEN,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 374 sm->user->password, 380 sm->user->password, 400 pw_hash = sm->user->password; 402 if (nt_password_hash(sm->user->password, 488 if (sm->user == NULL || sm->user->password == NULL) { 489 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Password not configured");
|
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/gsm/ |
UsimDataDownloadCommands.java | 436 public void queryFacilityLock(String facility, String password, int serviceClass, 441 public void queryFacilityLockForApp(String facility, String password, int serviceClass, 446 public void setFacilityLock(String facility, boolean lockState, String password, 451 public void setFacilityLockForApp(String facility, boolean lockState, String password, 581 String password, String authType, String protocol, Message result) {
|
/packages/apps/Email/src/com/android/email/mail/store/ |
ImapConnection.java | 83 ImapConnection(ImapStore store, String username, String password) { 84 setStore(store, username, password); 87 void setStore(ImapStore store, String username, String password) { 88 if (username != null && password != null) { 92 // apply the quoting here around the built-up password 94 + ImapUtility.imapQuoted(password);
|
/external/chromium/googleurl/src/ |
url_parse_unittest.cc | 79 const char* password; member in struct:__anon4319::URLParseCase 180 {"http://u:p@h:8/p?q#r", Parsed::PASSWORD, true, 9}, 181 {"http://u:p@h:8/p?q#r", Parsed::PASSWORD, false, 9}, 199 // This case is a little weird. It will report that the password would 203 {"http://u@h/", Parsed::PASSWORD, true, 9}, 211 {"file:///c:/foo", Parsed::PASSWORD, true, 7}, 287 // ... "]" in the password field isn't allowed, but we tolerate it here... 340 EXPECT_TRUE(ComponentMatches(url, cases[i].password, parsed.password)); 377 ExpectInvalidComponent(parsed.password); [all...] |
/external/webkit/Tools/Scripts/webkitpy/common/checkout/ |
scm.py | 295 def commit_with_message(self, message, username=None, password=None, git_commit=None, force_squash=False, changed_files=None): 563 def commit_with_message(self, message, username=None, password=None, git_commit=None, force_squash=False, changed_files=None): [all...] |
/external/chromium/net/socket_stream/ |
socket_stream.cc | 203 const string16& username, const string16& password) { 215 // Update the username/password. 219 auth_identity_.password = password; 612 auth_identity_.password = entry->password(); 627 &auth_identity_.password, 955 auth_identity_.password); 979 auth_identity_.password = entry->password(); [all...] |
/frameworks/base/core/java/android/webkit/ |
BrowserFrame.java | 792 * and password, give the user the option of saving them. Will either do 799 * @param password The password entered by the user (sniffed from the DOM). 802 byte[] postData, String username, String password) { 805 || password == null || password.isEmpty()) { 806 return; // No password to save. 821 // Check to see if the username & password appear in 826 postString.contains(URLEncoder.encode(password))) { 831 // save password [all...] |
/packages/apps/Settings/src/com/android/settings/wifi/ |
WifiConfigController.java | 275 /* show submit button if password, ip and proxy settings are valid */ 333 String password = mPasswordView.getText().toString(); local 336 password.matches("[0-9A-Fa-f]*")) { 337 config.wepKeys[0] = password; 339 config.wepKeys[0] = '"' + password + '"'; 347 String password = mPasswordView.getText().toString(); local 348 if (password.matches("[0-9A-Fa-f]{64}")) { 349 config.preSharedKey = password; 351 config.preSharedKey = '"' + password + '"'; 380 config.password.setValue(mPasswordView.getText().toString()) [all...] |
/external/webkit/Source/WebCore/platform/network/cf/ |
SocketStreamHandleCFNet.cpp | 352 static bool getStoredCONNECTProxyCredentials(const ProtectionSpace& protectionSpace, String& login, String& password) 354 // Try system credential storage first, matching HTTP behavior (CFNetwork only asks the client for password if it couldn't find it in Keychain). 363 password = storedCredential.password(); 400 String password; local 401 if (!m_sentStoredCredentials && getStoredCONNECTProxyCredentials(protectionSpace, login, password)) { 404 RetainPtr<CFStringRef> passwordCF(AdoptCF, password.createCFString());
|
/external/webkit/Source/WebCore/platform/network/mac/ |
AuthenticationMac.mm | 270 password:coreCredential.password() 359 return Credential([macCredential user], [macCredential password], persistence);
|
/external/webkit/Source/WebKit/mac/Plugins/ |
npapi.mm | 204 NPError NPN_GetAuthenticationInfo(NPP instance, const char* protocol, const char* host, int32_t port, const char* scheme, const char *realm, char** username, uint32_t* ulen, char** password, uint32_t* plen) 212 password:password passwordLength:plen];
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStoreTest.java | 239 char[] password = new char[] {'a', 'b', 'c'}; local 240 KeyStore.PasswordProtection pp = new KeyStore.PasswordProtection(password); 241 assertNotSame(pp.getPassword(), password); local
|
/external/chromium/chrome/browser/net/ |
url_fixer_upper_unittest.cc | 37 const url_parse::Component password; member in struct:segment_case 49 url_parse::Component(), // password 59 url_parse::Component(), // password 69 url_parse::Component(), // password 79 url_parse::Component(), // password 89 url_parse::Component(10, 7), // password 99 url_parse::Component(), // password 109 url_parse::Component(), // password 120 url_parse::Component(), // password 130 url_parse::Component(), // password [all...] |
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
port.h | 98 // authenticated with this username and password. 99 // Fills in the username fragment and password. These will be initially set 107 const std::string& password() const { return password_; } function in class:cricket::Port 108 void set_password(const std::string& password) { password_ = password; }
|
/external/webkit/Tools/DumpRenderTree/win/ |
ResourceLoadDelegate.cpp | 303 const char* password = gLayoutTestController->authenticationPassword().c_str(); local 305 printf("%S - didReceiveAuthenticationChallenge - Responding with %s:%s\n", descriptionSuitableForTestResult(identifier).c_str(), user, password); 310 credential->initWithUser(_bstr_t(user), _bstr_t(password), WebURLCredentialPersistenceForSession);
|
/libcore/luni/src/main/java/libcore/net/url/ |
FtpURLConnection.java | 89 private String password = ""; field in class:FtpURLConnection 114 password = parse.substring(split + 1); 386 write("PASS " + password + "\r\n");
|