/external/dropbear/ |
svr-authpasswd.c | 25 /* Validates a user password */ 35 /* Process a password auth request, sending success or failure messages as 43 char * testcrypt = NULL; /* crypt generated from the user's password sent */ 44 unsigned char * password; local 51 /* get the shadow password if possible */ 63 /* check for empty password - need to do this again here 64 * since the shadow password may differ to that tested 67 dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected", 73 /* check if client wants to change password */ 81 password = buf_getstring(ses.payload, &passwordlen) [all...] |
cli-authpasswd.c | 44 /* returns a statically allocated password from a helper app, or NULL 118 char* password = NULL; local 124 snprintf(prompt, sizeof(prompt), "%s@%s's password: ", 128 password = gui_getpass(prompt); 131 password = getpass_or_cancel(prompt); 146 buf_putstring(ses.writepayload, password, strlen(password)); 149 m_burn(password, strlen(password));
|
/external/wpa_supplicant_8/hostapd/ |
nt_password_hash.c | 2 * hostapd - Plaintext password to NtPasswordHash 25 char *password, buf[64], *pos; local 28 password = argv[1]; 31 printf("Failed to read password\n"); 43 password = buf; 46 if (nt_password_hash((u8 *) password, strlen(password), password_hash))
|
/libcore/luni/src/main/java/java/net/ |
PasswordAuthentication.java | 22 * password which is used by the {@code Authenticator} class. 30 private char[] password; field in class:PasswordAuthentication 33 * Creates an instance of a password authentication with a specified 34 * username and password. 38 * @param password 39 * the associated password to store. 41 public PasswordAuthentication(String userName, char[] password) { 43 this.password = password.clone(); 47 * Gets a clone of the password stored by this instance. The user i [all...] |
/external/chromium/net/ftp/ |
ftp_auth_cache.h | 31 const string16& password); 36 string16 password; member in struct:net::FtpAuthCache::Entry 46 // |password|). If there is already an entry for |origin|, it will be 49 const string16& password); 52 // |username| and |password|. 54 const string16& password);
|
/external/apache-http/src/org/apache/http/auth/ |
UsernamePasswordCredentials.java | 38 * Username and password {@link Credentials} 51 private final String password; field in class:UsernamePasswordCredentials 54 * The constructor with the username and password combined string argument. 56 * @param usernamePassword the username:password formed string 62 throw new IllegalArgumentException("Username:password string may not be null"); 67 this.password = usernamePassword.substring(atColon + 1); 70 this.password = null; 76 * The constructor with the username and password arguments. 79 * @param password the password [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/ |
PBEParametersGenerator.java | 6 * super class for all Password Based Encryption (PBE) parameter generator classes. 10 protected byte[] password; field in class:PBEParametersGenerator 24 * @param password the password converted into bytes (see below). 25 * @param salt the salt to be mixed with the password. 30 byte[] password, 34 this.password = password; 40 * return the password byte array. 42 * @return the password byte array [all...] |
/external/chromium/chrome/browser/password_manager/ |
encryptor_linux.cc | 32 // Generates a newly allocated SymmetricKey object based a hard-coded password. 37 // password. We need to improve this password situation by moving a secure 38 // password into a system-level key store. 40 std::string password = "peanuts"; local 43 // Create an encryption key from our password and salt. 46 password, 74 // This currently "obfuscates" by encrypting with hard-coded password. 75 // We need to improve this password situation by moving a secure password [all...] |
/external/chromium/chrome/browser/printing/cloud_print/ |
cloud_print_setup_message_handler.cc | 30 std::string username, password, captcha, access_code; local 44 !result->GetString("pass", &password) || 53 flow_->OnUserSubmittedAuth(username, password, captcha, access_code);
|
/external/chromium/chrome/browser/sync/ |
signin_manager.h | 25 // A listener might use this to make note of a username / password 31 password(in_password) {} 33 std::string password; member in struct:GoogleServiceSigninSuccessDetails 58 const std::string& password,
|
/external/chromium/chrome/browser/sync/util/ |
cryptographer.h | 26 std::string password; member in struct:browser_sync::KeyParams
|
/external/chromium/crypto/ |
symmetric_key_unittest.cc | 53 crypto::SymmetricKey::HMAC_SHA1, "password", "somesalt", 1024, 160)); 70 const char* password; member in struct:PBKDF2TestVector 95 test_data.password, test_data.salt, 112 "password", 120 "password", 128 "password", 138 "password", 150 "password", 158 "password", 166 "password", [all...] |
/external/chromium/net/http/ |
http_auth_handler_basic_unittest.cc | 21 const char* password; member in struct:net::__anon3593 27 // Empty password 29 // Empty username and empty password. 40 string16 password(ASCIIToUTF16(tests[i].password)); 43 int rv = basic->GenerateAuthToken(&username, &password, &request_info,
|
http_auth_handler_unittest.cc | 24 string16 password = ASCIIToUTF16("pass"); local 47 mock_handler.GenerateAuthToken(&username, &password, &request,
|
/external/chromium/third_party/libjingle/source/talk/base/ |
proxyinfo.h | 52 CryptString password; member in struct:talk_base::ProxyInfo
|
/external/webkit/Source/JavaScriptCore/wtf/url/api/ |
ParsedURL.cpp | 53 String ParsedURL::password() const function in class:WTF::ParsedURL 55 return segment(m_segments.password);
|
/external/webkit/Source/WebCore/platform/network/ |
Credential.cpp | 44 Credential::Credential(const String& user, const String& password, CredentialPersistence persistence) 46 , m_password(password.length() ? password : "") 56 , m_password(original.password()) 81 const String& Credential::password() const function in class:WebCore::Credential 155 if (a.password() != b.password())
|
/external/webkit/Source/WebCore/platform/network/cf/ |
AuthenticationCF.cpp | 113 CFStringRef password = coreCredential.password().createCFString(); local 114 CFURLCredentialRef result = CFURLCredentialCreate(0, user, password, 0, persistence); 116 CFRelease(password);
|
/external/webkit/Source/WebKit/mac/Panels/ |
WebAuthenticationPanel.h | 38 IBOutlet id password; variable
|
/external/wpa_supplicant/ |
eap_otp.c | 42 const u8 *pos, *password; local 57 password = eap_get_config_otp(sm, &password_len); 58 if (password) 61 password = eap_get_config_password(sm, &password_len); 65 if (password == NULL) { 66 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 83 os_memcpy(rpos, password, password_len); 85 password, password_len); 88 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
/external/wpa_supplicant/tests/ |
test_ms_funcs.c | 22 u8 *password = "clientPass"; local 72 nt_password_hash(password, strlen(password), buf); 80 password, strlen(password), 93 generate_authenticator_response(password, strlen(password),
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_md5.c | 40 const u8 *pos, *challenge, *password; local 44 password = eap_get_config_password(sm, &password_len); 45 if (password == NULL) { 46 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
eap_otp.c | 39 const u8 *pos, *password; local 51 password = eap_get_config_otp(sm, &password_len); 52 if (password) 55 password = eap_get_config_password(sm, &password_len); 59 if (password == NULL) { 60 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 76 wpabuf_put_data(resp, password, password_len); 78 password, password_len); 81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_ms_funcs.c | 22 u8 *password = "clientPass"; local 72 nt_password_hash(password, strlen(password), buf); 80 password, strlen(password), 93 generate_authenticator_response(password, strlen(password),
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_md5.c | 40 const u8 *pos, *challenge, *password; local 44 password = eap_get_config_password(sm, &password_len); 45 if (password == NULL) { 46 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|