/external/webrtc/talk/app/webrtc/ |
peerconnectionfactory_unittest.cc | 136 EXPECT_EQ(turn_servers[i].credentials.password, 137 raw_port_allocator_->turn_servers()[i].credentials.password); 178 ice_server.password = kTurnPassword; 181 ice_server.password = kTurnPassword; 211 ice_server.password = kTurnPassword; 240 ice_server.password = kTurnPassword; 261 ice_server.password = kTurnPassword; 280 ice_server.password = kTurnPassword; 283 ice_server.password = kTurnPassword; 286 ice_server.password = kTurnPassword [all...] |
/external/autotest/site_utils/ |
cleanup_tko_db.py | 58 password = CONFIG.get_config_value( 60 default=CONFIG.get_config_value('AUTOTEST_WEB', 'password')) 72 utils.run_sql_cmd(server, user, password, CLEANUP_TKO_CMD,
|
/external/curl/docs/cmdline-opts/ |
negotiate.d | 13 and password from the --user option aren't actually used.
|
/external/libmicrohttpd/src/examples/ |
digest_auth_example.c | 45 const char *password = "testpass"; local 64 password,
|
/external/wpa_supplicant_8/hs20/server/www/ |
spp.php | 53 $row = $db->query("SELECT password FROM users " . 60 $pw = $row['password']; 66 error_log("spp.php - Authentication failed - empty password");
|
/frameworks/base/core/java/android/os/storage/ |
IStorageManager.aidl | 80 int decryptStorage(in String password) = 26; 84 int encryptStorage(int type, in String password) = 27; 86 * Changes the encryption password. 88 int changeEncryptionPassword(int type, in String password) = 28; 104 * Verify the encryption password against the stored volume. This method 107 int verifyEncryptionPassword(in String password) = 32; 117 * Determines the type of the encryption password 122 * Get password from vold 123 * @return password or empty string 127 * Securely clear password from vol [all...] |
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
IccCard.java | 161 * @param password needed to change the ICC pin state, aka. Pin1 168 String password, Message onComplete) { 177 * @param password needed to change the ICC fdn enable, aka Pin2 184 String password, Message onComplete) { 189 * Change the ICC password used in ICC pin lock 192 * @param oldPassword is the old password 193 * @param newPassword is the new password 205 * Change the ICC password used in ICC fdn enable 208 * @param oldPassword is the old password 209 * @param newPassword is the new password [all...] |
/hardware/qcom/gps/loc_api/libloc_api_50001/ |
loc_eng_agps.h | 280 inline virtual void setWifiInfo(char* ssid, char* password) 281 { ssid[0] = 0; password[0] = 0; } 365 char * ssid, char * password, loc_if_req_sender_id_e_type sender_id) : 368 mPassword(NULL == password ? NULL : new char[SSID_BUF_SIZE]), 374 strlcpy(mPassword, password, SSID_BUF_SIZE); 385 inline virtual void setWifiInfo(char* ssid, char* password) 392 strlcpy(password, mPassword, SSID_BUF_SIZE); 394 password[0] = '\0';
|
/hardware/qcom/gps/msm8084/loc_api/libloc_api_50001/ |
loc_eng_agps.h | 280 inline virtual void setWifiInfo(char* ssid, char* password) 281 { ssid[0] = 0; password[0] = 0; } 366 char * ssid, char * password, loc_if_req_sender_id_e_type sender_id) : 369 mPassword(NULL == password ? NULL : new char[SSID_BUF_SIZE]), 375 strlcpy(mPassword, password, SSID_BUF_SIZE); 386 inline virtual void setWifiInfo(char* ssid, char* password) 393 strlcpy(password, mPassword, SSID_BUF_SIZE); 395 password[0] = '\0';
|
/hardware/qcom/gps/msm8909/loc_api/libloc_api_50001/ |
loc_eng_agps.h | 280 inline virtual void setWifiInfo(char* ssid, char* password) 281 { ssid[0] = 0; password[0] = 0; } 365 char * ssid, char * password, loc_if_req_sender_id_e_type sender_id) : 368 mPassword(NULL == password ? NULL : new char[SSID_BUF_SIZE]), 374 strlcpy(mPassword, password, SSID_BUF_SIZE); 385 inline virtual void setWifiInfo(char* ssid, char* password) 392 strlcpy(password, mPassword, SSID_BUF_SIZE); 394 password[0] = '\0';
|
/hardware/qcom/gps/msm8994/loc_api/libloc_api_50001/ |
loc_eng_agps.h | 280 inline virtual void setWifiInfo(char* ssid, char* password) 281 { ssid[0] = 0; password[0] = 0; } 365 char * ssid, char * password, loc_if_req_sender_id_e_type sender_id) : 368 mPassword(NULL == password ? NULL : new char[SSID_BUF_SIZE]), 374 strlcpy(mPassword, password, SSID_BUF_SIZE); 385 inline virtual void setWifiInfo(char* ssid, char* password) 392 strlcpy(password, mPassword, SSID_BUF_SIZE); 394 password[0] = '\0';
|
/hardware/qcom/gps/msm8996/loc_api/libloc_api_50001/ |
loc_eng_agps.h | 280 inline virtual void setWifiInfo(char* ssid, char* password) 281 { ssid[0] = 0; password[0] = 0; } 365 char * ssid, char * password, loc_if_req_sender_id_e_type sender_id) : 368 mPassword(NULL == password ? NULL : new char[SSID_BUF_SIZE]), 374 strlcpy(mPassword, password, SSID_BUF_SIZE); 385 inline virtual void setWifiInfo(char* ssid, char* password) 392 strlcpy(password, mPassword, SSID_BUF_SIZE); 394 password[0] = '\0';
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
MacTest.java | 103 // pbeKeySpec = new PBEKeySpec(password); 132 char[] password = "password".toCharArray(); local 140 PBEKeySpec pbeKeySpec = new PBEKeySpec(password,
|
/libcore/ojluni/src/main/java/javax/net/ssl/ |
KeyManagerFactory.java | 255 * The KeyStore is generally password-protected. 262 * @param password the password for recovering keys in the KeyStore 267 * (e.g. the given password is wrong). 269 public final void init(KeyStore ks, char[] password) throws 272 factorySpi.engineInit(ks, password); 281 * and password may be needed by a provider. Users of that
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/service/ |
IEmailService.aidl | 56 Bundle autoDiscover(String userName, String password);
|
/packages/apps/KeyChain/support/src/com/android/keychain/tests/support/ |
KeyChainServiceTestSupport.java | 38 @Override public boolean keystoreSetPassword(String password) { 40 return mKeyStore.onUserPasswordChanged(password);
|
/packages/experimental/FillService/src/foo/bar/fill/ |
FillService.java | 91 // ViewNode password = findPassword(structure); 94 ViewNode password = null; local 98 password = inputs.get(1); 101 Log.i(LOG_TAG, "found username+username:" + (username != null && password != null)); 103 if (username != null && password != null) { 127 password.getAutofillId()}, sender, presentation) 155 .setValue(password.getAutofillId(), 161 // .setValue(password.getAutofillId(), 168 // .setValue(password.getAutofillId(), 175 // .setValue(password.getAutofillId() 207 ViewNode password = findPassword(structure); local [all...] |
/external/autotest/client/common_lib/cros/ |
authpolicy.py | 87 password, 96 @param password: Password corresponding to user_principal_name. 120 with self.PasswordFd(password) as password_fd: 127 def authenticate_user(self, user_principal_name, account_id, password): 134 @param password: Password corresponding to user_principal_name. 150 with self.PasswordFd(password) as password_fd: 248 Writes password into a file descriptor. 253 @param password: Plaintext password string [all...] |
/frameworks/base/core/java/com/android/internal/net/ |
VpnProfile.java | 53 public String password = ""; // 4 field in class:VpnProfile 78 password = in.readString(); 99 out.writeString(password); 133 profile.password = values[4]; 145 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty(); 158 builder.append('\0').append(saveLogin ? password : "");
|
/packages/apps/Car/Settings/src/com/android/car/settings/wifi/ |
AddWifiFragment.java | 189 String password = mWifiPasswordInput.getInput(); local 190 wifiConfig.wepKeys[0] = isHexString(password) ? password 191 : "\"" + password + "\""; 216 private boolean isHexString(String password) { 217 return HEX_PATTERN.matcher(password).matches();
|
/packages/apps/Settings/tests/robotests/src/com/android/settings/password/ |
SetNewPasswordControllerTest.java | 17 package com.android.settings.password; 20 import static com.android.settings.password.ChooseLockGeneric.ChooseLockGenericFragment 22 import static com.android.settings.password.ChooseLockGeneric.ChooseLockGenericFragment 24 import static com.android.settings.password.ChooseLockSettingsHelper.EXTRA_KEY_CHALLENGE; 25 import static com.android.settings.password.ChooseLockSettingsHelper.EXTRA_KEY_FOR_FINGERPRINT; 26 import static com.android.settings.password.ChooseLockSettingsHelper.EXTRA_KEY_HAS_CHALLENGE; 88 // WHEN the controller dispatches a set new password intent. 103 // WHEN the controller dispatches a set new password intent. 122 // WHEN the controller dispatches a set new password intent. 141 // WHEN the controller dispatches a set new password intent [all...] |
/external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/ |
UserAccountTest.groovy | 33 private static final PASSWORD = "password123" 40 def acct = new UserAccount(USERNAME, PASSWORD, HOME_DIR) 42 assert acct.password == PASSWORD 61 userAccount.password = PASSWORD 62 assert userAccount.isValidPassword(PASSWORD) 70 userAccount.password = PASSWORD 71 shouldFailWithMessageContaining('username') { userAccount.isValidPassword(PASSWORD) } [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.c | 104 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 105 * @password_len: Length of password 109 int nt_password_hash(const u8 *password, size_t password_len, 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) 166 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 167 * @password_len: Length of password 173 const u8 *password, size_t password_len, 181 nt_password_hash(password, password_len, password_hash) | [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
pem_decrypt_test.go | 23 der, err := DecryptPEMBlock(block, data.password) 48 password := []byte("kremvax1") 49 block, err := EncryptPEMBlock(rand.Reader, "RSA PRIVATE KEY", plainDER, password, data.kind) 63 der, err := DecryptPEMBlock(block, password) 76 password []byte 82 password: []byte("asdf"), 107 password: []byte("asdf"), 132 password: []byte("asdf"), 157 password: []byte("asdf"), 182 password: []byte("asdf") [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
pem_decrypt_test.go | 23 der, err := DecryptPEMBlock(block, data.password) 48 password := []byte("kremvax1") 49 block, err := EncryptPEMBlock(rand.Reader, "RSA PRIVATE KEY", plainDER, password, data.kind) 63 der, err := DecryptPEMBlock(block, password) 76 password []byte 82 password: []byte("asdf"), 107 password: []byte("asdf"), 132 password: []byte("asdf"), 157 password: []byte("asdf"), 182 password: []byte("asdf") [all...] |