/external/webrtc/webrtc/p2p/base/ |
port.h | 123 const std::string& password); 132 const std::string& password); 177 // ICE requires a single username/password per content/media line. So the 192 const std::string& password() const { return password_; } function in class:cricket::Port 373 // authenticated with this username_fragment and password. 374 // PortAllocatorSession will provide these username_fragment and password. 563 // Update the ICE password of the remote candidate if |ice_ufrag| matches
|
/external/wpa_supplicant_8/hs20/server/ |
spp_server.c | 66 "operation,password,redirect_uri) " 92 sql = sqlite3_mprintf("UPDATE sessions SET password=%Q WHERE id=%Q AND " 99 debug_print(ctx, 1, "Failed to update session password: %s", 479 cmd = sqlite3_mprintf("UPDATE users SET password=%Q, " 528 add_text_node(ctx, node, "Password", b64); 595 debug_print(ctx, 1, "Update password to '%s'", new_pw); 740 "password update on success notification"); 742 debug_print(ctx, 1, "Request DB password update on success " 1285 char password[11]; local [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_module_tests.c | 1081 "password", 2049 char *password = "clientPass"; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ttls.c | 486 const u8 *identity, *password; 493 password = eap_get_config_password2(sm, &password_len, &pwhash); 494 if (identity == NULL || password == NULL) 541 if (mschapv2_derive_response(identity, identity_len, password, 580 const u8 *identity, *password; 587 password = eap_get_config_password2(sm, &password_len, &pwhash); 588 if (identity == NULL || password == NULL) 628 if (challenge_response(challenge, password, pos)) { 630 "EAP-TTLS/MSCHAP: Failed derive password hash"); 636 wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: MSCHAP password hash" 680 const u8 *identity, *password; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
sme.c | 90 const char *password; local 105 password = ssid->sae_password; 106 if (!password) 107 password = ssid->passphrase; 108 if (!password) { 109 wpa_printf(MSG_DEBUG, "SAE: No password available"); 119 (u8 *) password, os_strlen(password), [all...] |
config.h | 106 * password - Password for Interworking network selection 108 char *password; member in struct:wpa_cred 111 * ext_password - Whether password is a name for external storage 161 * private_key_passwd - Password for private key file 953 * wps_nfc_pw_from_config - NFC Device Password was read from config 955 * This parameter can be determined whether the NFC Device Password was 962 * wps_nfc_dev_pw_id - NFC Device Password ID for password token 967 * wps_nfc_dh_pubkey - NFC DH Public Key for password toke [all...] |
/frameworks/base/services/tests/servicestests/src/com/android/server/locksettings/recoverablekeystore/ |
KeySyncTaskTest.java | 282 String password = TrustedRootCertificates.INSECURE_PASSWORD_PREFIX + ""; // The shortest local 290 /*credential=*/ password, 312 verify(mMockScrypt).scrypt(eq(password.getBytes()), any(), 612 String password = "password"; local 619 password, 636 verify(mMockScrypt).scrypt(eq(password.getBytes()), any(), 666 // Password with only digits is changed to pin. [all...] |
/libcore/support/src/test/java/libcore/java/security/ |
TestKeyStore.java | 476 // JKS does not allow null password 478 storePassword = "password".toCharArray(); 481 keyPassword = "password".toCharArray(); 832 PasswordProtection password = new PasswordProtection(keyPassword); local [all...] |
/packages/apps/Dialer/java/com/android/dialer/voicemail/settings/ |
VoicemailChangePinActivity.java | 210 String password = activity.getCurrentPasswordInput(); local 211 if (password.length() == 0) { 215 CharSequence error = activity.validatePassword(password); 473 * @param password the raw password the user typed in 474 * @return error message to show to user or null if password is OK 476 private CharSequence validatePassword(String password) { 483 if (password.length() < pinMinLength) {
|
/packages/apps/Dialer/java/com/android/voicemail/impl/imap/ |
ImapHelper.java | 118 String password = prefs.getString(OmtpConstants.IMAP_PASSWORD, null); local 129 imapStore = new ImapStore(context, this, username, password, port, serverName, auth, network);
|
/packages/apps/Settings/src/com/android/settings/password/ |
ConfirmDeviceCredentialBaseFragment.java | 18 package com.android.settings.password; 59 * Base fragment to be shared for PIN/Pattern/Password confirmation fragments.
|
/packages/services/Telephony/src/com/android/phone/ |
GsmUmtsCallBarringOptions.java | 100 // Password change complete event 142 String password = null; local 144 password = mButtonDisableAll.getText(); 145 // Validate the length of password first, before submitting it to the 147 if (!validatePassword(password)) { 157 mPhone.setCallBarring(CommandsInterface.CB_FACILITY_BA_ALL, false, password, onComplete, 0); 162 * Attempt to change the password for call barring settings. 172 // 1. Enter old password 173 // 2. Enter new password 174 // 3. Re-Enter new password [all...] |
/prebuilts/tools/common/m2/repository/javax/annotation/javax.annotation-api/1.2/ |
javax.annotation-api-1.2.jar | |
/prebuilts/tools/common/m2/repository/org/sonatype/plexus/plexus-cipher/1.4/ |
plexus-cipher-1.4.jar | |
/prebuilts/tools/common/m2/repository/org/apache/maven/wagon/wagon-provider-api/1.0-alpha-6/ |
wagon-provider-api-1.0-alpha-6.jar | |
/build/make/tools/signapk/src/com/android/signapk/ |
SignApk.java | 191 * If a console doesn't exist, reads the password from stdin 192 * If a console exists, reads the password from console and returns it as a string. 200 System.out.print("Enter password for " + keyFile + " (password will not be hidden): "); 209 if ((pwd = console.readPassword("[%s]", "Enter password for " + keyFile)) != null) { 236 char[] password = readPassword(keyFile).toCharArray(); local 239 Key key = skFactory.generateSecret(new PBEKeySpec(password)); 247 System.err.println("signapk: Password for " + keyFile + " may be bad."); [all...] |
/cts/tests/autofillservice/src/android/autofillservice/cts/ |
LoginActivityTest.java | 199 // NOTE: must be on password, as saveOnlyTest() will trigger on username 231 // Trigger autofill on password - should call service 242 // Tap password again - should be ignored 254 // Trigger autofill by manually requesting password - should call service 344 // Dynamically set password to make sure it's sanitized. 369 assertWithMessage("Password node is focused").that( 384 final View password = mActivity.getPassword(); local 408 // Move to password 411 callback.assertUiShownEvent(password); 424 callback.assertUiHiddenEvent(password); 728 final View password = mActivity.getPassword(); local 967 final ViewNode password = findNodeByResourceId(saveRequest.structure, ID_PASSWORD); local 1326 final ViewNode password = findNodeByResourceId(saveRequest.structure, ID_PASSWORD); local 1453 final ViewNode password = findNodeByResourceId(saveRequest.structure, ID_PASSWORD); local 1500 final ViewNode password = findNodeByResourceId(saveRequest.structure, ID_PASSWORD); local 1547 final ViewNode password = findNodeByResourceId(saveRequest.structure, ID_PASSWORD); local 1627 final ViewNode password = findNodeByResourceId(saveRequest.structure, ID_PASSWORD); local 1875 final ViewNode password = findNodeByResourceId(fillRequest.structure, ID_PASSWORD); local 2169 final String password = "pass-" + i; local 2225 final String password = "pass-" + i; local 2524 final ViewNode password = findNodeByResourceId(request.structure, ID_PASSWORD); local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
PKCS12KeyStoreSpi.java | 507 char[] password) 556 char[] password, 613 char[] password, 629 PKCS12Key key = new PKCS12Key(password, wrongPKCS12Zero); 639 Cipher cipher = createCipher(Cipher.UNWRAP_MODE, password, algId); 657 char[] password) 660 PBEKeySpec pbeSpec = new PBEKeySpec(password); 687 char[] password, 698 PBEKeySpec pbeSpec = new PBEKeySpec(password); 705 PKCS12Key key = new PKCS12Key(password, wrongPKCS12Zero) 1252 char[] password; local 1268 doStore(bcParam.getOutputStream(), password, bcParam.isForDEREncoding()); local [all...] |
/external/curl/lib/vtls/ |
darwinssl.c | 1129 CFStringRef password = cPassword ? CFStringCreateWithCString(NULL, local [all...] |
/external/freetype/include/freetype/ |
t1tables.h | 172 FT_Long password; member in struct:PS_PrivateRec_ [all...] |
/external/jcommander/src/main/java/com/beust/jcommander/ |
JCommander.java | 699 if (pd.getParameter().password()) { 701 // Password option, use the Console to retrieve the password 703 char[] password = readPassword(pd.getDescription(), pd.getParameter().echoInput()); local 704 pd.addValue(new String(password)); [all...] |
/external/libcups/cups/ |
ppd-cache.c | 69 *password; /* Password string */ local 89 if (pc->password && (password = cupsGetOption("job-password", num_options, options)) != NULL && ippGetOperation(request) != IPP_OP_VALIDATE_JOB) 91 ipp_attribute_t *attr = NULL; /* job-password attribute */ 93 if ((keyword = cupsGetOption("job-password-encryption", num_options, options)) == NULL) 99 * Add plain-text job-password... 102 attr = ippAddOctetString(request, IPP_TAG_OPERATION, "job-password", password, (int)strlen(password)) [all...] |
/external/libvncserver/libvncclient/ |
rfbproto.c | 653 rfbClientLog("Reading password failed\n"); 662 /* Lose the password from memory */ 681 if (cred->userCredential.password) free(cred->userCredential.password); 706 plen = (cred->userCredential.password ? strlen(cred->userCredential.password) : 0); 724 if (!WriteToRFBServer(client, cred->userCredential.password, plen)) 771 uint8_t username[256], password[64]; local 786 rfbClientLog("WARNING! MSLogon security type has very low password encryption! "\ 797 memset(password, 0, sizeof(password)) [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 364 const char *password; local 366 password = hapd->conf->sae_password; 367 if (!password) 368 password = hapd->conf->ssid.wpa_passphrase; 369 if (!password) { 370 wpa_printf(MSG_DEBUG, "SAE: No password available"); 376 (u8 *) password, os_strlen(password), [all...] |
/external/wpa_supplicant_8/src/utils/ |
http_curl.c | 1449 char *password = NULL; local [all...] |