/external/curl/docs/cmdline-opts/ |
location-trusted.d | 6 Like --location, but will allow sending the name + password to all hosts that
|
socks5-gssapi.d | 7 GSS-API support). Use --socks5-basic to force username/password authentication
|
/external/lzma/CPP/7zip/UI/Common/ |
ArchiveOpenCallback.h | 22 virtual HRESULT Open_CryptoGetTextPassword(BSTR *password) x; \
23 /* virtual HRESULT Open_GetPasswordIfAny(bool &passwordIsDefined, UString &password) x; */ \
63 STDMETHOD(CryptoGetTextPassword)(BSTR *password);
|
/external/nos/host/generic/nugget/include/ |
app_nugget.h | 85 * password exists, headers can only be marked valid by providing that 86 * password. 90 * An unassigned password is defined to be all 0xff, with a don't-care digest. 91 * Anything else must have a valid digest over all password bytes. The password 97 uint32_t digest; /* first 4 bytes of sha1 of password (little endian) */ 98 uint8_t password[NUGGET_UPDATE_PASSWORD_LEN]; member in struct:nugget_app_password 107 struct nugget_app_password password; member in struct:nugget_app_enable_update 112 * Mark the specified image header(s) as valid, if the provided password 131 * Change the update password [all...] |
/external/pdfium/testing/ |
xfa_js_embedder_test.cpp | 46 const char* password, 48 if (!EmbedderTest::OpenDocumentWithOptions(filename, password,
|
/external/tensorflow/tensorflow/tools/ci_build/builds/ |
with_the_same_user | 42 --disabled-password --home "${CI_BUILD_HOME}" --quiet "${CI_BUILD_USER}"
|
/external/wpa_supplicant_8/src/utils/ |
http-utils.h | 40 const char *password, const char *client_cert, 54 const char *username, const char *password,
|
/frameworks/base/services/core/java/com/android/server/locksettings/recoverablekeystore/ |
KeyStoreProxyImpl.java | 49 public Key getKey(String alias, char[] password) 51 return mKeyStore.getKey(alias, password);
|
/hardware/qcom/gps/msm8960/loc_api/libloc_api_50001/ |
loc_eng_agps.h | 279 inline virtual void setWifiInfo(char* ssid, char* password) 280 { ssid[0] = 0; password[0] = 0; } 358 char * ssid, char * password, loc_if_req_sender_id_e_type sender_id) : 361 mPassword(NULL == password ? NULL : new char[SSID_BUF_SIZE]), 367 strlcpy(mPassword, password, SSID_BUF_SIZE); 375 inline virtual void setWifiInfo(char* ssid, char* password) 382 strlcpy(password, mPassword, SSID_BUF_SIZE); 384 password[0] = '\0';
|
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
MyKeyManagerFactorySpi.java | 38 protected void engineInit(KeyStore ks, char[] password) 41 if (password == null) { 42 throw new KeyStoreException("Incorrect password");
|
/packages/apps/Car/Settings/src/com/android/car/settings/security/ |
CheckLockWorker.java | 31 * credential (pattern/pin/password). 93 * Checks lock PIN/password asynchronously. To receive callback when check is completed, 96 public final void checkPinPassword(int userId, String password) { 98 LOG.w("Check pin/password request issued while one is still running"); 102 LockPatternChecker.checkPassword(mLockPatternUtils, password, userId, this); 110 * @param matched Whether the entered password matches the stored record.
|
/packages/apps/Email/provider_src/com/android/email/mail/store/ |
ServiceStore.java | 82 public Bundle autoDiscover(Context context, String username, String password) { 84 return getService().autoDiscover(username, password);
|
/packages/apps/Settings/src/com/android/settings/password/ |
PasswordRequirementAdapter.java | 17 package com.android.settings.password; 26 import com.android.settings.password.PasswordRequirementAdapter.PasswordRequirementViewHolder; 29 * Used in {@link ChooseLockPassword} to show password requirements.
|
/packages/apps/Settings/tests/robotests/src/com/android/settings/password/ |
ConfirmCredentialTest.java | 17 package com.android.settings.password; 24 import com.android.settings.password.ConfirmDeviceCredentialBaseFragment.LastTryDialog;
|
/system/tpm/trunks/ |
password_authorization_delegate.cc | 28 const std::string& password) { 29 password_ = Make_TPM2B_DIGEST(password);
|
trunks_factory_impl.cc | 83 TrunksFactoryImpl::GetPasswordAuthorization(const std::string& password) const { 84 return base::MakeUnique<PasswordAuthorizationDelegate>(password);
|
/system/vold/binder/android/os/ |
IVold.aidl | 64 void fdeCheckPassword(@utf8InCpp String password); 67 void fdeEnable(int passwordType, @utf8InCpp String password, int encryptionFlags); 68 void fdeChangePassword(int passwordType, @utf8InCpp String password); 69 void fdeVerifyPassword(@utf8InCpp String password);
|
/developers/build/prebuilts/gradle/AutofillFramework/Application/src/main/java/com/example/android/autofill/app/ |
StandardAutoCompleteSignInActivity.java | 99 String password = mPasswordField.getText().toString(); local 100 boolean valid = isValidCredentials(username, password); 114 public boolean isValidCredentials(String username, String password) { 115 return username != null && password != null && username.equals(password);
|
/developers/samples/android/input/autofill/AutofillFramework/Application/src/main/java/com/example/android/autofill/app/commoncases/ |
StandardAutoCompleteSignInActivity.java | 101 String password = mPasswordField.getText().toString(); local 102 boolean valid = isValidCredentials(username, password); 116 public boolean isValidCredentials(String username, String password) { 117 return username != null && password != null && username.equals(password);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
PKCS12ParametersGenerator.java | 107 if ((password != null) && (password.length != 0)) 109 P = new byte[v * ((password.length + v - 1) / v)]; 113 P[i] = password[i % password.length]; 165 * Generate a key parameter derived from the password, salt, and iteration 183 * the password, salt, and iteration count we are currently initialised 205 * Generate a key parameter for use with a MAC derived from the password,
|
/external/curl/src/ |
tool_getpass.c | 223 char *password, /* buffer to store password in */ 224 size_t buflen) /* size of buffer to store password in */ 235 nread = read(fd, password, buflen); 237 password[--nread] = '\0'; /* zero terminate where enter is stored */ 239 password[0] = '\0'; /* got nothing */ 250 return password; /* return pointer to buffer */
|
/external/okhttp/samples/guide/src/main/java/com/squareup/okhttp/recipes/ |
CustomTrust.java | 168 char[] password = "password".toCharArray(); // Any password will work. local 169 KeyStore keyStore = newEmptyKeyStore(password); 179 keyManagerFactory.init(keyStore, password); 192 private KeyStore newEmptyKeyStore(char[] password) throws GeneralSecurityException { 196 keyStore.load(in, password);
|
/external/okhttp/samples/static-server/src/main/java/com/squareup/okhttp/sample/ |
SampleServer.java | 105 System.out.println("Usage: SampleServer <keystore> <password> <root file> <port>"); 110 String password = args[1]; local 114 SSLContext sslContext = sslContext(keystoreFile, password); 119 private static SSLContext sslContext(String keystoreFile, String password) 124 keystore.load(in, password.toCharArray()); 130 keyManagerFactory.init(keystore, password.toCharArray());
|
/external/syslinux/com32/cmenu/libmenu/ |
tui.c | 25 // password <> 0 implies not echoed on screen 29 void getuserinput(char *stra, unsigned int size, unsigned int password, 47 if (password != 0) 48 showoldvalue = 0; // Password's never displayed 66 if (password == 0) // Not a password, print initial value 191 if (password == 0) { 200 if (password == 0)
|
/external/webrtc/webrtc/base/ |
cryptstring.h | 69 // Used for constructing strings where a password is involved and we 91 void Append(const CryptString * password) { 92 size_t len = password->GetLength(); 94 password->CopyTo(storage_ + length_, true); 153 std::string& password() { return password_; } function in class:rtc::InsecureCryptStringImpl 154 const std::string& password() const { return password_; } function in class:rtc::InsecureCryptStringImpl
|