HomeSort by relevance Sort by last modified time
    Searched defs:password (Results 226 - 250 of 803) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/webrtc/webrtc/p2p/base/
port.h 123 const std::string& password);
132 const std::string& password);
177 // ICE requires a single username/password per content/media line. So the
192 const std::string& password() const { return password_; } function in class:cricket::Port
373 // authenticated with this username_fragment and password.
374 // PortAllocatorSession will provide these username_fragment and password.
563 // Update the ICE password of the remote candidate if |ice_ufrag| matches
  /external/wpa_supplicant_8/hs20/server/
spp_server.c 66 "operation,password,redirect_uri) "
92 sql = sqlite3_mprintf("UPDATE sessions SET password=%Q WHERE id=%Q AND "
99 debug_print(ctx, 1, "Failed to update session password: %s",
479 cmd = sqlite3_mprintf("UPDATE users SET password=%Q, "
528 add_text_node(ctx, node, "Password", b64);
595 debug_print(ctx, 1, "Update password to '%s'", new_pw);
740 "password update on success notification");
742 debug_print(ctx, 1, "Request DB password update on success "
1285 char password[11]; local
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_module_tests.c 1081 "password",
2049 char *password = "clientPass"; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_ttls.c 486 const u8 *identity, *password;
493 password = eap_get_config_password2(sm, &password_len, &pwhash);
494 if (identity == NULL || password == NULL)
541 if (mschapv2_derive_response(identity, identity_len, password,
580 const u8 *identity, *password;
587 password = eap_get_config_password2(sm, &password_len, &pwhash);
588 if (identity == NULL || password == NULL)
628 if (challenge_response(challenge, password, pos)) {
630 "EAP-TTLS/MSCHAP: Failed derive password hash");
636 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash"
680 const u8 *identity, *password; local
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
sme.c 90 const char *password; local
105 password = ssid->sae_password;
106 if (!password)
107 password = ssid->passphrase;
108 if (!password) {
109 wpa_printf(MSG_DEBUG, "SAE: No password available");
119 (u8 *) password, os_strlen(password),
    [all...]
config.h 106 * password - Password for Interworking network selection
108 char *password; member in struct:wpa_cred
111 * ext_password - Whether password is a name for external storage
161 * private_key_passwd - Password for private key file
953 * wps_nfc_pw_from_config - NFC Device Password was read from config
955 * This parameter can be determined whether the NFC Device Password was
962 * wps_nfc_dev_pw_id - NFC Device Password ID for password token
967 * wps_nfc_dh_pubkey - NFC DH Public Key for password toke
    [all...]
  /frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/
KeySyncTaskTest.java 282 String password = TrustedRootCertificates.INSECURE_PASSWORD_PREFIX + ""; // The shortest local
290 /*credential=*/ password,
312 verify(mMockScrypt).scrypt(eq(password.getBytes()), any(),
612 String password = "password"; local
619 password,
636 verify(mMockScrypt).scrypt(eq(password.getBytes()), any(),
666 // Password with only digits is changed to pin.
    [all...]
  /libcore/support/src/test/java/libcore/java/security/
TestKeyStore.java 476 // JKS does not allow null password
478 storePassword = "password".toCharArray();
481 keyPassword = "password".toCharArray();
832 PasswordProtection password = new PasswordProtection(keyPassword); local
    [all...]
  /packages/apps/Dialer/java/com/android/dialer/voicemail/settings/
VoicemailChangePinActivity.java 210 String password = activity.getCurrentPasswordInput(); local
211 if (password.length() == 0) {
215 CharSequence error = activity.validatePassword(password);
473 * @param password the raw password the user typed in
474 * @return error message to show to user or null if password is OK
476 private CharSequence validatePassword(String password) {
483 if (password.length() < pinMinLength) {
  /packages/apps/Dialer/java/com/android/voicemail/impl/imap/
ImapHelper.java 118 String password = prefs.getString(OmtpConstants.IMAP_PASSWORD, null); local
129 imapStore = new ImapStore(context, this, username, password, port, serverName, auth, network);
  /packages/apps/Settings/src/com/android/settings/password/
ConfirmDeviceCredentialBaseFragment.java 18 package com.android.settings.password;
59 * Base fragment to be shared for PIN/Pattern/Password confirmation fragments.
  /packages/services/Telephony/src/com/android/phone/
GsmUmtsCallBarringOptions.java 100 // Password change complete event
142 String password = null; local
144 password = mButtonDisableAll.getText();
145 // Validate the length of password first, before submitting it to the
147 if (!validatePassword(password)) {
157 mPhone.setCallBarring(CommandsInterface.CB_FACILITY_BA_ALL, false, password, onComplete, 0);
162 * Attempt to change the password for call barring settings.
172 // 1. Enter old password
173 // 2. Enter new password
174 // 3. Re-Enter new password
    [all...]
  /prebuilts/tools/common/m2/repository/javax/annotation/javax.annotation-api/1.2/
javax.annotation-api-1.2.jar 
  /prebuilts/tools/common/m2/repository/org/sonatype/plexus/plexus-cipher/1.4/
plexus-cipher-1.4.jar 
  /prebuilts/tools/common/m2/repository/org/apache/maven/wagon/wagon-provider-api/1.0-alpha-6/
wagon-provider-api-1.0-alpha-6.jar 
  /build/make/tools/signapk/src/com/android/signapk/
SignApk.java 191 * If a console doesn't exist, reads the password from stdin
192 * If a console exists, reads the password from console and returns it as a string.
200 System.out.print("Enter password for " + keyFile + " (password will not be hidden): ");
209 if ((pwd = console.readPassword("[%s]", "Enter password for " + keyFile)) != null) {
236 char[] password = readPassword(keyFile).toCharArray(); local
239 Key key = skFactory.generateSecret(new PBEKeySpec(password));
247 System.err.println("signapk: Password for " + keyFile + " may be bad.");
    [all...]
  /cts/tests/autofillservice/src/android/autofillservice/cts/
LoginActivityTest.java 199 // NOTE: must be on password, as saveOnlyTest() will trigger on username
231 // Trigger autofill on password - should call service
242 // Tap password again - should be ignored
254 // Trigger autofill by manually requesting password - should call service
344 // Dynamically set password to make sure it's sanitized.
369 assertWithMessage("Password node is focused").that(
384 final View password = mActivity.getPassword(); local
408 // Move to password
411 callback.assertUiShownEvent(password);
424 callback.assertUiHiddenEvent(password);
728 final View password = mActivity.getPassword(); local
967 final ViewNode password = findNodeByResourceId(saveRequest.structure, ID_PASSWORD); local
1326 final ViewNode password = findNodeByResourceId(saveRequest.structure, ID_PASSWORD); local
1453 final ViewNode password = findNodeByResourceId(saveRequest.structure, ID_PASSWORD); local
1500 final ViewNode password = findNodeByResourceId(saveRequest.structure, ID_PASSWORD); local
1547 final ViewNode password = findNodeByResourceId(saveRequest.structure, ID_PASSWORD); local
1627 final ViewNode password = findNodeByResourceId(saveRequest.structure, ID_PASSWORD); local
1875 final ViewNode password = findNodeByResourceId(fillRequest.structure, ID_PASSWORD); local
2169 final String password = "pass-" + i; local
2225 final String password = "pass-" + i; local
2524 final ViewNode password = findNodeByResourceId(request.structure, ID_PASSWORD); local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/
PKCS12KeyStoreSpi.java 507 char[] password)
556 char[] password,
613 char[] password,
629 PKCS12Key key = new PKCS12Key(password, wrongPKCS12Zero);
639 Cipher cipher = createCipher(Cipher.UNWRAP_MODE, password, algId);
657 char[] password)
660 PBEKeySpec pbeSpec = new PBEKeySpec(password);
687 char[] password,
698 PBEKeySpec pbeSpec = new PBEKeySpec(password);
705 PKCS12Key key = new PKCS12Key(password, wrongPKCS12Zero)
1252 char[] password; local
1268 doStore(bcParam.getOutputStream(), password, bcParam.isForDEREncoding()); local
    [all...]
  /external/curl/lib/vtls/
darwinssl.c 1129 CFStringRef password = cPassword ? CFStringCreateWithCString(NULL, local
    [all...]
  /external/freetype/include/freetype/
t1tables.h 172 FT_Long password; member in struct:PS_PrivateRec_
    [all...]
  /external/jcommander/src/main/java/com/beust/jcommander/
JCommander.java 699 if (pd.getParameter().password()) {
701 // Password option, use the Console to retrieve the password
703 char[] password = readPassword(pd.getDescription(), pd.getParameter().echoInput()); local
704 pd.addValue(new String(password));
    [all...]
  /external/libcups/cups/
ppd-cache.c 69 *password; /* Password string */ local
89 if (pc->password && (password = cupsGetOption("job-password", num_options, options)) != NULL && ippGetOperation(request) != IPP_OP_VALIDATE_JOB)
91 ipp_attribute_t *attr = NULL; /* job-password attribute */
93 if ((keyword = cupsGetOption("job-password-encryption", num_options, options)) == NULL)
99 * Add plain-text job-password...
102 attr = ippAddOctetString(request, IPP_TAG_OPERATION, "job-password", password, (int)strlen(password))
    [all...]
  /external/libvncserver/libvncclient/
rfbproto.c 653 rfbClientLog("Reading password failed\n");
662 /* Lose the password from memory */
681 if (cred->userCredential.password) free(cred->userCredential.password);
706 plen = (cred->userCredential.password ? strlen(cred->userCredential.password) : 0);
724 if (!WriteToRFBServer(client, cred->userCredential.password, plen))
771 uint8_t username[256], password[64]; local
786 rfbClientLog("WARNING! MSLogon security type has very low password encryption! "\
797 memset(password, 0, sizeof(password))
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_11.c 364 const char *password; local
366 password = hapd->conf->sae_password;
367 if (!password)
368 password = hapd->conf->ssid.wpa_passphrase;
369 if (!password) {
370 wpa_printf(MSG_DEBUG, "SAE: No password available");
376 (u8 *) password, os_strlen(password),
    [all...]
  /external/wpa_supplicant_8/src/utils/
http_curl.c 1449 char *password = NULL; local
    [all...]

Completed in 845 milliseconds

1 2 3 4 5 6 7 8 91011>>