/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pwd.c | 26 u8 *password; member in struct:eap_pwd_data 87 if (sm->user == NULL || sm->user->password == NULL || 89 wpa_printf(MSG_INFO, "EAP-PWD (server): Password is not " 107 data->password = os_malloc(sm->user->password_len); 108 if (data->password == NULL) { 109 wpa_printf(MSG_INFO, "EAP-PWD: Memory allocation password " 116 os_memcpy(data->password, sm->user->password, data->password_len); 122 bin_clear_free(data->password, data->password_len); 150 bin_clear_free(data->password, data->password_len) 591 const u8 *password; local [all...] |
eap_server_ttls.c | 261 u8 *password = dpos; local 264 password[password_len - 1] == '\0') { 268 "User-Password (PAP)", 269 password, password_len); 270 parse->user_password = password; 282 "EAP-TTLS: CHAP-Password (CHAP)", 533 if (!sm->user || !sm->user->password || sm->user->password_hash || 536 "password configured"); 542 os_memcmp_const(sm->user->password, user_password, 544 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password"); [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyStoreTest.java | 235 char[] password = new char[] {'a', 'b', 'c'}; local 236 KeyStore.PasswordProtection pp = new KeyStore.PasswordProtection(password); 237 assertNotSame(pp.getPassword(), password); local
|
/libcore/ojluni/src/main/java/java/security/ |
KeyStore.java | 113 * // get user password and file input stream 114 * char[] password = getPassword(); 119 * ks.load(fis, password); 135 * new KeyStore.PasswordProtection(password); 152 * ks.store(fos, password); 160 * Note that although the same password may be used to 278 * A password-based implementation of <code>ProtectionParameter</code>. 285 private final char[] password; field in class:KeyStore.PasswordProtection 289 * Creates a password parameter. 291 * <p> The specified <code>password</code> is cloned before it is store [all...] |
/libcore/ojluni/src/main/java/sun/net/www/protocol/ftp/ |
FtpURLConnection.java | 95 String password; field in class:FtpURLConnection 186 if (userInfo != null) { // get the user and password 190 password = null; 193 password = ParseUtil.decode(userInfo.substring(delimiter)); 290 password = java.security.AccessController.doPrivileged( 313 ftp.login(user, password.toCharArray()); 317 throw new sun.net.ftp.FtpLoginException("Invalid username/password");
|
/packages/apps/Email/src/com/android/email/activity/setup/ |
AccountSetupCredentialsFragment.java | 59 public static final String EXTRA_PASSWORD = "password"; 97 * @param passwordFailed true if the password attempt previously failed 339 final String password = results.getString(AccountSetupCredentialsFragment.EXTRA_PASSWORD); local 340 if (!TextUtils.isEmpty(password)) { 341 hostAuth.mPassword = password;
|
/packages/apps/Settings/src/com/android/settings/ |
CredentialStorage.java | 61 * from the old style separate keystore password to a new key guard 62 * based password, as well as to deal with setting up the key guard if 74 * OR user had key guard and pre-ICS keystore password which was then reset 79 * Notes: assume old password, need to use it to unlock. 101 // This is the minimum acceptable password quality. If the current password quality is 183 * keystore password. This can be used in UNINITIALIZED to set the 184 * keystore password or UNLOCKED to change the password (as is the 185 * case after unlocking with an old-style password) 466 String password = data.getStringExtra(ChooseLockSettingsHelper.EXTRA_KEY_PASSWORD); local [all...] |
/packages/apps/Settings/tests/app/src/com/android/settings/vpn2/ |
VpnTests.java | 72 * <password></password> 127 Log.d(TAG, "password for the certificate file is: " + vpnInfo.getPassword()); 166 Log.v(TAG, "password: " + profile.password); 334 * @param password password to extract certificate file 336 private void installCertificatesFromFile(VpnProfile profile, String fileName, String password) 338 if (profile == null || fileName == null || password == null) { 339 throw new Exception ("vpn profile, certificate file name and password can not be null") 394 String password = curVpnInfo.getPassword(); local 412 String password = curVpnInfo.getPassword(); local [all...] |
/packages/services/Telephony/src/com/android/phone/settings/fdn/ |
FdnSetting.java | 113 String password = mButtonEnableFDN.getText(); local 114 if (validatePin (password, false)) { 120 mPhone.getIccCard().setIccFdnEnabled(!isEnabled, password, onComplete);
|
/packages/services/Telephony/src/com/android/phone/vvm/omtp/imap/ |
ImapHelper.java | 92 String password = VisualVoicemailSettingsUtil.getVisualVoicemailCredentials(context, local 110 context, this, username, password, port, serverName, auth, network);
|
/system/extras/verity/ |
Utils.java | 148 char[] password = System.console().readPassword("Password for the private key file: "); local 151 Key key = skFactory.generateSecret(new PBEKeySpec(password)); 152 Arrays.fill(password, '\0'); 160 System.err.println("Password may be bad.");
|
/system/tpm/trunks/ |
tpm_utility_test.cc | 619 std::string password("password"); 649 std::string password; local 693 std::string password; local 704 std::string password; local 736 std::string password; local 764 std::string password("password"); 794 std::string password; local 817 std::string password; local 836 std::string password; local 849 std::string password; local 868 std::string password; local 887 std::string password; local 906 std::string password; local 920 std::string password; local 950 std::string password; local 1305 std::string password; local 1320 std::string password; local 1336 std::string password; local 1352 std::string password; local [all...] |
/prebuilts/tools/common/m2/repository/com/sun/istack/istack-commons-tools/2.21/ |
istack-commons-tools-2.21.jar | |
/external/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 312 /* pass_to_pass_raw performs a password conversion (possibly a no-op) 666 uint8_t *password; member in struct:pkcs12_context 793 if (!pbe_crypt(algor, ctx->password, ctx->password_len, 844 pki = PKCS8_decrypt_pbe(encrypted, ctx->password, ctx->password_len); 902 CBS *ber_in, const char *password) { 978 if (!ascii_to_ucs2(password, strlen(password), &ctx.password, 1020 if (!pkcs12_key_gen_raw(ctx.password, ctx.password_len, CBS_data(&salt), 1045 OPENSSL_free(ctx.password); [all...] |
/external/curl/lib/vtls/ |
darwinssl.c | 941 CFStringRef password = cPassword ? CFStringCreateWithCString(NULL, local 952 const void *cValues[] = {password} [all...] |
/external/libchrome/crypto/ |
nss_util.cc | 132 std::string password = delegate->RequestPassword(PK11_GetTokenName(slot), local 137 char* result = PORT_Strdup(password.c_str()); 138 password.replace(0, password.size(), password.size(), 0); 141 DLOG(ERROR) << "PK11 password requested with NULL arg"; 759 // If we haven't initialized the password for the NSS databases, 760 // initialize an empty-string password so that we don't need to [all...] |
/external/libvncserver/rfb/ |
rfbclient.h | 135 char *password; member in struct:_rfbCredential::__anon16958 321 /** To support security types that requires user input (except VNC password
|
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
HttpUrl.java | 92 * <h4>Username and Password</h4> 93 * Username and password are either present, or the empty string {@code ""} if absent. This class 275 /** Decoded password. */ 276 private final String password; field in class:HttpUrl 307 this.password = percentDecode(builder.encodedPassword, false); 377 /** Returns the password, or an empty string if none is set. */ 379 if (password.isEmpty()) return ""; 385 /** Returns the decoded password, or an empty string if none is present. */ 386 public String password() { method in class:HttpUrl 387 return password; 747 public Builder password(String password) { method in class:HttpUrl.Builder [all...] |
/external/pdfium/core/src/fpdfapi/fpdf_parser/ |
fpdf_parser_encrypt.cpp | 18 const uint8_t* password, 27 passcode[i] = i < pass_size ? password[i] : defpasscode[i - pass_size]; 91 CFX_ByteString password = m_pParser->GetPassword(); local 92 if (CheckPassword(password, password.GetLength(), TRUE, m_EncryptKey, 94 if (password.IsEmpty()) { 95 if (!CheckPassword(password, password.GetLength(), FALSE, m_EncryptKey, 103 return CheckPassword(password, password.GetLength(), FALSE, m_EncryptKey [all...] |
/external/webrtc/talk/app/webrtc/java/src/org/webrtc/ |
PeerConnection.java | 95 public final String password; field in class:PeerConnection.IceServer 102 public IceServer(String uri, String username, String password) { 105 this.password = password; 109 return uri + "[" + username + ":" + password + "]";
|
/external/webrtc/talk/app/webrtc/ |
peerconnectioninterface.h | 205 std::string password; member in struct:webrtc::PeerConnectionInterface::IceServer
|
/external/webrtc/webrtc/base/ |
proxydetect.cc | 1006 // However, at the present time this does not support username or password. 1121 std::string password; local [all...] |
/external/webrtc/webrtc/p2p/base/ |
port.h | 123 const std::string& password); 132 const std::string& password); 177 // ICE requires a single username/password per content/media line. So the 192 const std::string& password() const { return password_; } function in class:cricket::Port 373 // authenticated with this username_fragment and password. 374 // PortAllocatorSession will provide these username_fragment and password. 563 // Update the ICE password of the remote candidate if |ice_ufrag| matches
|
/external/wpa_supplicant_8/hs20/server/ |
spp_server.c | 66 "operation,password,redirect_uri) " 92 sql = sqlite3_mprintf("UPDATE sessions SET password=%Q WHERE id=%Q AND " 99 debug_print(ctx, 1, "Failed to update session password: %s", 479 cmd = sqlite3_mprintf("UPDATE users SET password=%Q, " 528 add_text_node(ctx, node, "Password", b64); 595 debug_print(ctx, 1, "Update password to '%s'", new_pw); 740 "password update on success notification"); 742 debug_print(ctx, 1, "Request DB password update on success " 1285 char password[11]; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 1076 "password", 1121 "password", 1642 char *password = "clientPass"; local [all...] |