HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 351 - 375 of 792) sorted by null

<<11121314151617181920>>

  /frameworks/base/policy/src/com/android/internal/policy/impl/keyguard/
KeyguardAccountView.java 49 * When the user forgets their password a bunch of times, we fall back on their
50 * account's login/password to unlock the phone (and reset their lock pattern).
67 * Shown while making asynchronous check of password.
92 mPassword = (EditText) findViewById(R.id.password);
169 // clear out forgotten password
264 final String password = mPassword.getText().toString(); local
272 options.putString(AccountManager.KEY_PASSWORD, password);
  /frameworks/base/policy/src/com/android/internal/policy/impl/keyguard_obsolete/
AccountUnlockScreen.java 51 * When the user forgets their password a bunch of times, we fall back on their
52 * account's login/password to unlock the phone (and reset their lock pattern).
75 * Shown while making asynchronous check of password.
106 mPassword = (EditText) findViewById(R.id.password);
178 // clear out forgotten password
271 final String password = mPassword.getText().toString(); local
279 options.putString(AccountManager.KEY_PASSWORD, password);
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStoreSpiTest.java 99 @Override public void engineSetKeyEntry(String alias, Key key, char[] password,
200 public void engineLoad(InputStream stream, char[] password) {
202 assertNull(password);
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/
SSLSocketFactory.java 106 * For simplicity use the same password for the key as that of the keystore
248 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password)
255 kmfactory.init(keystore, password != null ? password.toCharArray(): null);
  /external/chromium/crypto/
nss_util.cc 104 // If we get asked for a password for the TPM, then return the
105 // well known password we use, as long as the TPM slot has been
119 std::string password = delegate->RequestPassword(PK11_GetTokenName(slot), local
124 char* result = PORT_Strdup(password.c_str());
125 password.replace(0, password.size(), password.size(), 0);
128 DLOG(ERROR) << "PK11 password requested with NULL arg";
405 // If we haven't initialized the password for the NSS databases,
406 // initialize an empty-string password so that we don't need t
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sake.c 76 const u8 *identity, *password; local
79 password = eap_get_config_password(sm, &password_len);
80 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
102 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN);
104 password + EAP_SAKE_ROOT_SECRET_LEN,
eap_ttls.c 645 const u8 *identity, *password; local
652 password = eap_get_config_password2(sm, &password_len, &pwhash);
653 if (identity == NULL || password == NULL)
694 mschapv2_derive_response(identity, identity_len, password,
730 const u8 *identity, *password; local
737 password = eap_get_config_password2(sm, &password_len, &pwhash);
738 if (identity == NULL || password == NULL)
777 challenge_response(challenge, password, pos); /* NT-Response */
778 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash",
779 password, 16)
820 const u8 *identity, *password; local
880 const u8 *identity, *password; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_mschapv2.c 378 sm->user->password,
383 sm->user->password,
399 pw_hash = sm->user->password;
401 nt_password_hash(sm->user->password,
484 if (sm->user == NULL || sm->user->password == NULL) {
485 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Password not configured");
  /external/wpa_supplicant_8/src/eap_peer/
eap_sake.c 71 const u8 *identity, *password; local
74 password = eap_get_config_password(sm, &password_len);
75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) {
97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN);
99 password + EAP_SAKE_ROOT_SECRET_LEN,
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 374 sm->user->password,
380 sm->user->password,
400 pw_hash = sm->user->password;
402 if (nt_password_hash(sm->user->password,
488 if (sm->user == NULL || sm->user->password == NULL) {
489 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Password not configured");
  /frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/gsm/
UsimDataDownloadCommands.java 436 public void queryFacilityLock(String facility, String password, int serviceClass,
441 public void queryFacilityLockForApp(String facility, String password, int serviceClass,
446 public void setFacilityLock(String facility, boolean lockState, String password,
451 public void setFacilityLockForApp(String facility, boolean lockState, String password,
581 String password, String authType, String protocol, Message result) {
  /packages/apps/Email/src/com/android/email/mail/store/
ImapConnection.java 83 ImapConnection(ImapStore store, String username, String password) {
84 setStore(store, username, password);
87 void setStore(ImapStore store, String username, String password) {
88 if (username != null && password != null) {
92 // apply the quoting here around the built-up password
94 + ImapUtility.imapQuoted(password);
  /external/chromium/googleurl/src/
url_parse_unittest.cc 79 const char* password; member in struct:__anon4319::URLParseCase
180 {"http://u:p@h:8/p?q#r", Parsed::PASSWORD, true, 9},
181 {"http://u:p@h:8/p?q#r", Parsed::PASSWORD, false, 9},
199 // This case is a little weird. It will report that the password would
203 {"http://u@h/", Parsed::PASSWORD, true, 9},
211 {"file:///c:/foo", Parsed::PASSWORD, true, 7},
287 // ... "]" in the password field isn't allowed, but we tolerate it here...
340 EXPECT_TRUE(ComponentMatches(url, cases[i].password, parsed.password));
377 ExpectInvalidComponent(parsed.password);
    [all...]
  /external/webkit/Tools/Scripts/webkitpy/common/checkout/
scm.py 295 def commit_with_message(self, message, username=None, password=None, git_commit=None, force_squash=False, changed_files=None):
563 def commit_with_message(self, message, username=None, password=None, git_commit=None, force_squash=False, changed_files=None):
    [all...]
  /external/chromium/net/socket_stream/
socket_stream.cc 203 const string16& username, const string16& password) {
215 // Update the username/password.
219 auth_identity_.password = password;
612 auth_identity_.password = entry->password();
627 &auth_identity_.password,
955 auth_identity_.password);
979 auth_identity_.password = entry->password();
    [all...]
  /frameworks/base/core/java/android/webkit/
BrowserFrame.java 792 * and password, give the user the option of saving them. Will either do
799 * @param password The password entered by the user (sniffed from the DOM).
802 byte[] postData, String username, String password) {
805 || password == null || password.isEmpty()) {
806 return; // No password to save.
821 // Check to see if the username & password appear in
826 postString.contains(URLEncoder.encode(password))) {
831 // save password
    [all...]
  /packages/apps/Settings/src/com/android/settings/wifi/
WifiConfigController.java 275 /* show submit button if password, ip and proxy settings are valid */
333 String password = mPasswordView.getText().toString(); local
336 password.matches("[0-9A-Fa-f]*")) {
337 config.wepKeys[0] = password;
339 config.wepKeys[0] = '"' + password + '"';
347 String password = mPasswordView.getText().toString(); local
348 if (password.matches("[0-9A-Fa-f]{64}")) {
349 config.preSharedKey = password;
351 config.preSharedKey = '"' + password + '"';
380 config.password.setValue(mPasswordView.getText().toString())
    [all...]
  /external/webkit/Source/WebCore/platform/network/cf/
SocketStreamHandleCFNet.cpp 352 static bool getStoredCONNECTProxyCredentials(const ProtectionSpace& protectionSpace, String& login, String& password)
354 // Try system credential storage first, matching HTTP behavior (CFNetwork only asks the client for password if it couldn't find it in Keychain).
363 password = storedCredential.password();
400 String password; local
401 if (!m_sentStoredCredentials && getStoredCONNECTProxyCredentials(protectionSpace, login, password)) {
404 RetainPtr<CFStringRef> passwordCF(AdoptCF, password.createCFString());
  /external/webkit/Source/WebCore/platform/network/mac/
AuthenticationMac.mm 270 password:coreCredential.password()
359 return Credential([macCredential user], [macCredential password], persistence);
  /external/webkit/Source/WebKit/mac/Plugins/
npapi.mm 204 NPError NPN_GetAuthenticationInfo(NPP instance, const char* protocol, const char* host, int32_t port, const char* scheme, const char *realm, char** username, uint32_t* ulen, char** password, uint32_t* plen)
212 password:password passwordLength:plen];
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
KeyStoreTest.java 239 char[] password = new char[] {'a', 'b', 'c'}; local
240 KeyStore.PasswordProtection pp = new KeyStore.PasswordProtection(password);
241 assertNotSame(pp.getPassword(), password); local
  /external/chromium/chrome/browser/net/
url_fixer_upper_unittest.cc 37 const url_parse::Component password; member in struct:segment_case
49 url_parse::Component(), // password
59 url_parse::Component(), // password
69 url_parse::Component(), // password
79 url_parse::Component(), // password
89 url_parse::Component(10, 7), // password
99 url_parse::Component(), // password
109 url_parse::Component(), // password
120 url_parse::Component(), // password
130 url_parse::Component(), // password
    [all...]
  /external/chromium/third_party/libjingle/source/talk/p2p/base/
port.h 98 // authenticated with this username and password.
99 // Fills in the username fragment and password. These will be initially set
107 const std::string& password() const { return password_; } function in class:cricket::Port
108 void set_password(const std::string& password) { password_ = password; }
  /external/webkit/Tools/DumpRenderTree/win/
ResourceLoadDelegate.cpp 303 const char* password = gLayoutTestController->authenticationPassword().c_str(); local
305 printf("%S - didReceiveAuthenticationChallenge - Responding with %s:%s\n", descriptionSuitableForTestResult(identifier).c_str(), user, password);
310 credential->initWithUser(_bstr_t(user), _bstr_t(password), WebURLCredentialPersistenceForSession);
  /libcore/luni/src/main/java/libcore/net/url/
FtpURLConnection.java 89 private String password = ""; field in class:FtpURLConnection
114 password = parse.substring(split + 1);
386 write("PASS " + password + "\r\n");

Completed in 1576 milliseconds

<<11121314151617181920>>