/external/webkit/Source/WebCore/bindings/js/ |
JSXMLHttpRequestCustom.cpp | 95 String password = valueToStringWithNullCheck(exec, exec->argument(4)); local 96 impl()->open(method, url, async, user, password, ec);
|
/external/webkit/Source/WebCore/plugins/ |
npapi.cpp | 191 NPError NPN_GetAuthenticationInfo(NPP instance, const char* protocol, const char* host, int32_t port, const char* scheme, const char* realm, char** username, uint32_t* ulen, char** password, uint32_t* plen) 193 return pluginViewForInstance(instance)->getAuthenticationInfo(protocol, host, port, scheme, realm, username, ulen, password, plen);
|
/external/webkit/Source/WebCore/xml/ |
XMLHttpRequest.idl | 70 [Custom] void open(in DOMString method, in DOMString url, in boolean async, in DOMString user, in DOMString password)
|
/external/webkit/Source/WebKit/mac/Plugins/ |
WebNetscapePluginView.h | 182 password:(char**)password passwordLength:(uint32_t*)passwordLength;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gtc.c | 63 msg = data->prefix ? "CHALLENGE=Password" : "Password"; 115 /* "RESPONSE=<user>\0<password>" */ 129 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in " 170 "EAP-GTC: Response password", 175 if (sm->user == NULL || sm->user->password == NULL || 177 wpa_printf(MSG_INFO, "EAP-GTC: Plaintext password not " 184 os_memcmp(pos, sm->user->password, rlen) != 0) {
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gtc.c | 57 msg = data->prefix ? "CHALLENGE=Password" : "Password"; 109 /* "RESPONSE=<user>\0<password>" */ 123 wpa_printf(MSG_DEBUG, "EAP-GTC: No password in " 164 "EAP-GTC: Response password", 169 if (sm->user == NULL || sm->user->password == NULL || 171 wpa_printf(MSG_INFO, "EAP-GTC: Plaintext password not " 178 os_memcmp(pos, sm->user->password, rlen) != 0) {
|
eap_server_pwd.c | 25 u8 *password; member in struct:eap_pwd_data 84 if (sm->user == NULL || sm->user->password == NULL || 86 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " 104 data->password = os_malloc(sm->user->password_len); 105 if (data->password == NULL) { 106 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " 113 os_memcpy(data->password, sm->user->password, data->password_len); 118 os_free(data->password); 145 os_free(data->password); [all...] |
/external/zlib/src/contrib/minizip/ |
unzip.h | 338 const char* password)); 341 password is a crypting password 362 const char* password));
|
/frameworks/base/core/java/android/webkit/ |
WebViewProvider.java | 80 public void savePassword(String host, String username, String password); 83 String username, String password);
|
/frameworks/base/voip/java/android/net/sip/ |
SipProfile.java | 180 * Sets the password of the SIP account 182 * @param password password of the SIP account 185 public Builder setPassword(String password) { 186 mUri.setUserPassword(password); 280 // remove password from URI 410 * Gets the password. 412 * @return the password
|
/frameworks/support/v4/ics/android/support/v4/view/accessibility/ |
AccessibilityNodeInfoCompatIcs.java | 196 public static void setPassword(Object info, boolean password) { 197 ((AccessibilityNodeInfo) info).setPassword(password);
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/service/ |
EmailServiceProxy.java | 234 * password. The result is returned in a Bundle which MUST include an error code and MAY (on 239 * @param password the user's password 243 public Bundle autoDiscover(final String userName, final String password) 249 mReturn = mService.autoDiscover(userName, password);
|
/external/webkit/Tools/DumpRenderTree/mac/ |
LayoutTestControllerMac.mm | [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
CommandsInterface.java | 562 * if the password is incorrect 578 * if the password is incorrect 592 * if the password is incorrect 608 * if the password is incorrect 624 * if the password is incorrect 642 * if the password is incorrect 658 * if the password is incorrect 676 * if the password is incorrect [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStore4Test.java | 44 keyStore.load(null, "PASSWORD".toCharArray()); 235 keyStore.getKey("unknownalias", "PASSWORD".toCharArray()); 283 char[] password = "PASSWORD".toCharArray(); local 286 keyStore.store(os, password); 359 return new KeyStore.PasswordProtection("PASSWORD".toCharArray()); 451 char[] password = "PASSWORD".toCharArray(); local 453 keyStore.load(is, password); 466 keyStore.load(new ByteArrayInputStream("".getBytes()), password); [all...] |
/external/chromium/chrome/browser/ui/webui/options/chromeos/ |
internet_options_handler.cc | 415 std::string password; local 420 !args->GetString(3, &password)) { 431 apn, network->apn().network_id, username, password)); 697 dictionary->SetString("apn_password", apn.password); 703 dictionary->SetString("last_good_apn_password", last_good_apn.password); 759 std::string password; local 763 !args->GetString(1, &password)) { 797 std::string password; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
config.c | 288 wpa_printf(MSG_DEBUG, "PSK: External password '%s'", 1153 wpa_printf(MSG_DEBUG, "Unset configuration string 'password'"); 1154 os_free(ssid->eap.password); 1155 ssid->eap.password = NULL; 1165 os_free(ssid->eap.password); 1166 ssid->eap.password = (u8 *) name; 1181 "password.", line); 1187 os_free(ssid->eap.password); 1188 ssid->eap.password = (u8 *) tmp; 1199 wpa_printf(MSG_ERROR, "Line %d: Invalid password hash length [all...] |
/external/chromium/chrome/browser/password_manager/ |
password_store_mac.cc | 328 // practice, other browsers seem to use a "" or " " password (and a special 554 std::string password = UTF16ToUTF8(form.password_value); local 565 password.size(), password.c_str(), &new_item); 577 bool changed = SetKeychainItemPassword(existing_item, password); 708 const SecKeychainItemRef& keychain_item, const std::string& password) { 710 password.size(), 711 password.c_str()); 788 // If the password isn't in either the DB or the keychain, then it must have [all...] |
/external/quake/quake/src/QW/server/ |
sv_main.c | 45 cvar_t rcon_password = {"rcon_password", ""}; // password for remote server commands 46 cvar_t password = {"password", ""}; // password for entering the game variable 47 cvar_t spectator_password = {"spectator_password", ""}; // password for entering as a sepctator 552 // check for password or spectator_password 560 Con_Printf ("%s:spectator password failed\n", NET_AdrToString (net_from)); 561 Netchan_OutOfBandPrint (net_from, "%c\nrequires a spectator password\n\n", A2C_PRINT); 570 s = Info_ValueForKey (userinfo, "password"); 571 if (password.string[0] && [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
login_utils.cc | 115 const std::string& password, 209 const std::string& password, 231 password_ = password; 343 // TODO(altimofeev): Need to sanitize memory used to store password.
|
/external/chromium/crypto/ |
symmetric_key_win.cc | 247 // password P and the concatenation of the salt S and the block index i: 356 const std::string& password, 390 // Convert the user password into a key suitable to be fed into the PRF 394 const_cast<BYTE*>(reinterpret_cast<const BYTE*>(password.data())); 396 password.size(), &password_as_key)) 433 // to the password P, the salt S, the iteration count c, and the block
|
/external/webkit/Tools/DumpRenderTree/ |
LayoutTestController.h | 259 void setAuthenticationPassword(std::string password) { m_authenticationPassword = password; } 317 void authenticateSession(JSStringRef url, JSStringRef username, JSStringRef password);
|
/packages/apps/Email/src/com/android/email/activity/setup/ |
AccountSetupOutgoingFragment.java | 260 String password = sendAuth.mPassword; local 261 if (password != null) { 262 mPasswordView.setText(password); 299 // Warn (but don't prevent) if password has leading/trailing spaces
|
/packages/apps/Settings/src/com/android/settings/vpn2/ |
VpnDialog.java | 89 mPassword = (TextView) mView.findViewById(R.id.password); 108 mPassword.setText(mProfile.password); 164 // Not editing, just show username and password. 342 profile.password = mPassword.getText().toString();
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyStore2Test.java | 481 // test with null password 663 public Key engineGetKey(String alias, char[] password) 679 public void engineLoad(InputStream stream, char[] password) 692 public void engineSetKeyEntry(String alias, Key key, char[] password, 709 public void engineStore(OutputStream stream, char[] password)
|