HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 276 - 300 of 1553) sorted by null

<<11121314151617181920>>

  /external/webrtc/talk/app/webrtc/
peerconnectionfactory_unittest.cc 136 EXPECT_EQ(turn_servers[i].credentials.password,
137 raw_port_allocator_->turn_servers()[i].credentials.password);
178 ice_server.password = kTurnPassword;
181 ice_server.password = kTurnPassword;
211 ice_server.password = kTurnPassword;
240 ice_server.password = kTurnPassword;
261 ice_server.password = kTurnPassword;
280 ice_server.password = kTurnPassword;
283 ice_server.password = kTurnPassword;
286 ice_server.password = kTurnPassword
    [all...]
  /external/autotest/site_utils/
cleanup_tko_db.py 58 password = CONFIG.get_config_value(
60 default=CONFIG.get_config_value('AUTOTEST_WEB', 'password'))
72 utils.run_sql_cmd(server, user, password, CLEANUP_TKO_CMD,
  /external/curl/docs/cmdline-opts/
negotiate.d 13 and password from the --user option aren't actually used.
  /external/libmicrohttpd/src/examples/
digest_auth_example.c 45 const char *password = "testpass"; local
64 password,
  /external/wpa_supplicant_8/hs20/server/www/
spp.php 53 $row = $db->query("SELECT password FROM users " .
60 $pw = $row['password'];
66 error_log("spp.php - Authentication failed - empty password");
  /frameworks/base/core/java/android/os/storage/
IStorageManager.aidl 80 int decryptStorage(in String password) = 26;
84 int encryptStorage(int type, in String password) = 27;
86 * Changes the encryption password.
88 int changeEncryptionPassword(int type, in String password) = 28;
104 * Verify the encryption password against the stored volume. This method
107 int verifyEncryptionPassword(in String password) = 32;
117 * Determines the type of the encryption password
122 * Get password from vold
123 * @return password or empty string
127 * Securely clear password from vol
    [all...]
  /frameworks/opt/telephony/src/java/com/android/internal/telephony/
IccCard.java 161 * @param password needed to change the ICC pin state, aka. Pin1
168 String password, Message onComplete) {
177 * @param password needed to change the ICC fdn enable, aka Pin2
184 String password, Message onComplete) {
189 * Change the ICC password used in ICC pin lock
192 * @param oldPassword is the old password
193 * @param newPassword is the new password
205 * Change the ICC password used in ICC fdn enable
208 * @param oldPassword is the old password
209 * @param newPassword is the new password
    [all...]
  /hardware/qcom/gps/loc_api/libloc_api_50001/
loc_eng_agps.h 280 inline virtual void setWifiInfo(char* ssid, char* password)
281 { ssid[0] = 0; password[0] = 0; }
365 char * ssid, char * password, loc_if_req_sender_id_e_type sender_id) :
368 mPassword(NULL == password ? NULL : new char[SSID_BUF_SIZE]),
374 strlcpy(mPassword, password, SSID_BUF_SIZE);
385 inline virtual void setWifiInfo(char* ssid, char* password)
392 strlcpy(password, mPassword, SSID_BUF_SIZE);
394 password[0] = '\0';
  /hardware/qcom/gps/msm8084/loc_api/libloc_api_50001/
loc_eng_agps.h 280 inline virtual void setWifiInfo(char* ssid, char* password)
281 { ssid[0] = 0; password[0] = 0; }
366 char * ssid, char * password, loc_if_req_sender_id_e_type sender_id) :
369 mPassword(NULL == password ? NULL : new char[SSID_BUF_SIZE]),
375 strlcpy(mPassword, password, SSID_BUF_SIZE);
386 inline virtual void setWifiInfo(char* ssid, char* password)
393 strlcpy(password, mPassword, SSID_BUF_SIZE);
395 password[0] = '\0';
  /hardware/qcom/gps/msm8909/loc_api/libloc_api_50001/
loc_eng_agps.h 280 inline virtual void setWifiInfo(char* ssid, char* password)
281 { ssid[0] = 0; password[0] = 0; }
365 char * ssid, char * password, loc_if_req_sender_id_e_type sender_id) :
368 mPassword(NULL == password ? NULL : new char[SSID_BUF_SIZE]),
374 strlcpy(mPassword, password, SSID_BUF_SIZE);
385 inline virtual void setWifiInfo(char* ssid, char* password)
392 strlcpy(password, mPassword, SSID_BUF_SIZE);
394 password[0] = '\0';
  /hardware/qcom/gps/msm8994/loc_api/libloc_api_50001/
loc_eng_agps.h 280 inline virtual void setWifiInfo(char* ssid, char* password)
281 { ssid[0] = 0; password[0] = 0; }
365 char * ssid, char * password, loc_if_req_sender_id_e_type sender_id) :
368 mPassword(NULL == password ? NULL : new char[SSID_BUF_SIZE]),
374 strlcpy(mPassword, password, SSID_BUF_SIZE);
385 inline virtual void setWifiInfo(char* ssid, char* password)
392 strlcpy(password, mPassword, SSID_BUF_SIZE);
394 password[0] = '\0';
  /hardware/qcom/gps/msm8996/loc_api/libloc_api_50001/
loc_eng_agps.h 280 inline virtual void setWifiInfo(char* ssid, char* password)
281 { ssid[0] = 0; password[0] = 0; }
365 char * ssid, char * password, loc_if_req_sender_id_e_type sender_id) :
368 mPassword(NULL == password ? NULL : new char[SSID_BUF_SIZE]),
374 strlcpy(mPassword, password, SSID_BUF_SIZE);
385 inline virtual void setWifiInfo(char* ssid, char* password)
392 strlcpy(password, mPassword, SSID_BUF_SIZE);
394 password[0] = '\0';
  /libcore/luni/src/test/java/libcore/javax/crypto/
MacTest.java 103 // pbeKeySpec = new PBEKeySpec(password);
132 char[] password = "password".toCharArray(); local
140 PBEKeySpec pbeKeySpec = new PBEKeySpec(password,
  /libcore/ojluni/src/main/java/javax/net/ssl/
KeyManagerFactory.java 255 * The KeyStore is generally password-protected.
262 * @param password the password for recovering keys in the KeyStore
267 * (e.g. the given password is wrong).
269 public final void init(KeyStore ks, char[] password) throws
272 factorySpi.engineInit(ks, password);
281 * and password may be needed by a provider. Users of that
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/service/
IEmailService.aidl 56 Bundle autoDiscover(String userName, String password);
  /packages/apps/KeyChain/support/src/com/android/keychain/tests/support/
KeyChainServiceTestSupport.java 38 @Override public boolean keystoreSetPassword(String password) {
40 return mKeyStore.onUserPasswordChanged(password);
  /packages/experimental/FillService/src/foo/bar/fill/
FillService.java 91 // ViewNode password = findPassword(structure);
94 ViewNode password = null; local
98 password = inputs.get(1);
101 Log.i(LOG_TAG, "found username+username:" + (username != null && password != null));
103 if (username != null && password != null) {
127 password.getAutofillId()}, sender, presentation)
155 .setValue(password.getAutofillId(),
161 // .setValue(password.getAutofillId(),
168 // .setValue(password.getAutofillId(),
175 // .setValue(password.getAutofillId()
207 ViewNode password = findPassword(structure); local
    [all...]
  /external/autotest/client/common_lib/cros/
authpolicy.py 87 password,
96 @param password: Password corresponding to user_principal_name.
120 with self.PasswordFd(password) as password_fd:
127 def authenticate_user(self, user_principal_name, account_id, password):
134 @param password: Password corresponding to user_principal_name.
150 with self.PasswordFd(password) as password_fd:
248 Writes password into a file descriptor.
253 @param password: Plaintext password string
    [all...]
  /frameworks/base/core/java/com/android/internal/net/
VpnProfile.java 53 public String password = ""; // 4 field in class:VpnProfile
78 password = in.readString();
99 out.writeString(password);
133 profile.password = values[4];
145 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty();
158 builder.append('\0').append(saveLogin ? password : "");
  /packages/apps/Car/Settings/src/com/android/car/settings/wifi/
AddWifiFragment.java 189 String password = mWifiPasswordInput.getInput(); local
190 wifiConfig.wepKeys[0] = isHexString(password) ? password
191 : "\"" + password + "\"";
216 private boolean isHexString(String password) {
217 return HEX_PATTERN.matcher(password).matches();
  /packages/apps/Settings/tests/robotests/src/com/android/settings/password/
SetNewPasswordControllerTest.java 17 package com.android.settings.password;
20 import static com.android.settings.password.ChooseLockGeneric.ChooseLockGenericFragment
22 import static com.android.settings.password.ChooseLockGeneric.ChooseLockGenericFragment
24 import static com.android.settings.password.ChooseLockSettingsHelper.EXTRA_KEY_CHALLENGE;
25 import static com.android.settings.password.ChooseLockSettingsHelper.EXTRA_KEY_FOR_FINGERPRINT;
26 import static com.android.settings.password.ChooseLockSettingsHelper.EXTRA_KEY_HAS_CHALLENGE;
88 // WHEN the controller dispatches a set new password intent.
103 // WHEN the controller dispatches a set new password intent.
122 // WHEN the controller dispatches a set new password intent.
141 // WHEN the controller dispatches a set new password intent
    [all...]
  /external/mockftpserver/MockFtpServer/src/test/groovy/org/mockftpserver/fake/
UserAccountTest.groovy 33 private static final PASSWORD = "password123"
40 def acct = new UserAccount(USERNAME, PASSWORD, HOME_DIR)
42 assert acct.password == PASSWORD
61 userAccount.password = PASSWORD
62 assert userAccount.isValidPassword(PASSWORD)
70 userAccount.password = PASSWORD
71 shouldFailWithMessageContaining('username') { userAccount.isValidPassword(PASSWORD) }
    [all...]
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.c 104 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
105 * @password_len: Length of password
109 int nt_password_hash(const u8 *password, size_t password_len,
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
166 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
167 * @password_len: Length of password
173 const u8 *password, size_t password_len,
181 nt_password_hash(password, password_len, password_hash) |
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/x509/
pem_decrypt_test.go 23 der, err := DecryptPEMBlock(block, data.password)
48 password := []byte("kremvax1")
49 block, err := EncryptPEMBlock(rand.Reader, "RSA PRIVATE KEY", plainDER, password, data.kind)
63 der, err := DecryptPEMBlock(block, password)
76 password []byte
82 password: []byte("asdf"),
107 password: []byte("asdf"),
132 password: []byte("asdf"),
157 password: []byte("asdf"),
182 password: []byte("asdf")
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
pem_decrypt_test.go 23 der, err := DecryptPEMBlock(block, data.password)
48 password := []byte("kremvax1")
49 block, err := EncryptPEMBlock(rand.Reader, "RSA PRIVATE KEY", plainDER, password, data.kind)
63 der, err := DecryptPEMBlock(block, password)
76 password []byte
82 password: []byte("asdf"),
107 password: []byte("asdf"),
132 password: []byte("asdf"),
157 password: []byte("asdf"),
182 password: []byte("asdf")
    [all...]

Completed in 884 milliseconds

<<11121314151617181920>>