HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 101 - 125 of 683) sorted by null

1 2 3 45 6 7 8 91011>>

  /external/wpa_supplicant_6/wpa_supplicant/tests/
test_ms_funcs.c 22 u8 *password = "clientPass"; local
72 nt_password_hash(password, strlen(password), buf);
80 password, strlen(password),
93 generate_authenticator_response(password, strlen(password),
  /external/wpa_supplicant_8/src/eap_peer/
eap_leap.c 71 const u8 *pos, *challenge, *identity, *password; local
79 password = eap_get_config_password2(sm, &password_len, &pwhash);
80 if (identity == NULL || password == NULL)
125 challenge_response(challenge, password, rpos);
127 nt_challenge_response(challenge, password, password_len, rpos);
194 const u8 *pos, *password; local
202 password = eap_get_config_password2(sm, &password_len, &pwhash);
203 if (password == NULL)
237 if (hash_nt_password_hash(password, pw_hash_hash)) {
242 if (nt_password_hash(password, password_len, pw_hash) |
282 const u8 *password; local
340 const u8 *addr[5], *password; local
    [all...]
  /frameworks/base/keystore/tests/src/android/security/
KeyStoreTest.java 74 assertTrue(mKeyStore.password(TEST_PASSWD));
80 mKeyStore.password(TEST_PASSWD);
90 mKeyStore.password(TEST_PASSWD);
98 mKeyStore.password(TEST_I18N_KEY);
105 mKeyStore.password(TEST_PASSWD);
117 mKeyStore.password(TEST_PASSWD);
129 mKeyStore.password(TEST_PASSWD);
142 mKeyStore.password(TEST_PASSWD);
150 mKeyStore.password(TEST_PASSWD);
160 mKeyStore.password(TEST_PASSWD)
    [all...]
  /external/chromium/chrome/common/net/gaia/
gaia_authenticator.cc 62 const string& password,
68 params.password = password;
76 const string& password,
82 MakeParams(user_name, password, captcha_token, captcha_value);
124 results->password = params.password;
162 post_body += "&Passwd=" + EscapeUrlEncodedData(params.password);
367 const string& password) {
369 auth_results_.password = password
    [all...]
  /libcore/luni/src/main/java/java/security/
KeyStore.java 230 * Returns the key with the given alias, using the password to recover the
235 * @param password
236 * the password used to recover the key.
246 public final Key getKey(String alias, char[] password)
252 return implSpi.engineGetKey(alias, password);
307 * Associates the given alias with the key, password and certificate chain.
315 * @param password
316 * the password.
327 public final void setKeyEntry(String alias, Key key, char[] password,
337 implSpi.engineSetKeyEntry(alias, key, password, chain)
1107 private char[] password; field in class:KeyStore.PasswordProtection
    [all...]
  /external/chromium/third_party/libjingle/source/talk/base/
cryptstring.h 89 // Used for constructing strings where a password is involved and we
111 void Append(const CryptString * password) {
112 size_t len = password->GetLength();
114 password->CopyTo(storage_ + length_, true);
173 std::string& password() { return password_; } function in class:talk_base::InsecureCryptStringImpl
174 const std::string& password() const { return password_; } function in class:talk_base::InsecureCryptStringImpl
185 copy->password() = password_;
  /external/dropbear/
svr-authpam.c 26 /* Validates a user password using PAM */
101 if (!(strcmp(compare_message, "password:") == 0)) {
102 /* We don't recognise the prompt as asking for a password,
161 /* Process a password auth request, sending success or failure messages as
162 * appropriate. To the client it looks like it's doing normal password auth (as
164 * fairly standard (ie just "what's your username, what's your password, OK").
179 unsigned char * password = NULL; local
185 /* check if client wants to change password */
193 password = buf_getstring(ses.payload, &passwordlen);
199 userData.passwd = password;
    [all...]
  /external/webkit/LayoutTests/fast/dom/HTMLFormElement/script-tests/
elements-not-in-document.js 21 i.type = 'password';
29 shouldBe("i.getAttribute('type')", "'password'");
30 shouldBe("i.type", "'password'");
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
MobileApple80211.c 105 CFStringRef password) = NULL;
108 CFStringRef password)
110 return __Apple80211Associate(handle, bss, password);
116 CFStringRef password,
121 CFStringRef password, CFDictionaryRef *info)
123 return __Apple80211AssociateAndCopyInfo(handle, bss, password, info);
  /external/wpa_supplicant_8/src/drivers/
MobileApple80211.c 105 CFStringRef password) = NULL;
108 CFStringRef password)
110 return __Apple80211Associate(handle, bss, password);
116 CFStringRef password,
121 CFStringRef password, CFDictionaryRef *info)
123 return __Apple80211AssociateAndCopyInfo(handle, bss, password, info);
  /libcore/luni/src/test/java/libcore/javax/crypto/
SecretKeyFactoryTest.java 29 private static final char[] PASSWORD = "google".toCharArray();
50 // PBEKeySpecs password only constructor
64 KeySpec ks = new PBEKeySpec(PASSWORD);
85 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS);
105 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS, KEY_LENGTH);
110 test_PBKDF2(PASSWORD, SALT, ITERATIONS, KEY_LENGTH,
125 char[] password = "password".toCharArray(); local
136 test_PBKDF2(password, salt, iterations, keyLength, expected);
145 char[] password = ("All n-entities must communicate with other local
    [all...]
  /external/apache-harmony/sql/src/test/java/org/apache/harmony/sql/tests/java/sql/
TestHelper_Driver4.java 72 static String passwordProperty = "password";
82 * Check for user and password, except for datasource =
83 * data1 which is set up not to require a user/password
93 String password = (String) info.get(passwordProperty); local
94 if (user == null || password == null) {
96 "Userid and/or password not supplied");
99 || !password.equals(validpassword)) {
101 "Userid and/or password not valid");
  /external/chromium/chrome/browser/ui/webui/chromeos/login/
login_ui.cc 87 std::string password; local
91 args->GetString(1, &password);
92 delegate_->Login(username, password);
  /external/chromium/crypto/
symmetric_key_openssl.cc 44 const std::string& password,
56 int rv = PKCS5_PBKDF2_HMAC_SHA1(password.data(), password.length(),
  /external/chromium/net/http/
http_auth_cache.h 24 // - the last identity used (username/password)
69 // |password| - login information for the realm.
78 const string16& password,
82 // if one exists AND if the cached identity matches (|username|, |password|).
87 // |password| - condition to match.
93 const string16& password);
139 // The login password.
140 const string16 password() const { function in class:net::HttpAuthCache::Entry
http_auth_handler.cc 66 const string16* password,
72 DCHECK((username == NULL) == (password == NULL));
78 int rv = GenerateAuthTokenImpl(username, password, request,
  /external/chromium/third_party/libjingle/source/talk/p2p/base/
relayport.h 59 const std::string& username, const std::string& password,
62 username, password, magic_cookie);
89 const std::string& username, const std::string& password,
  /external/webkit/Source/WebKit/gtk/webkit/
webkitsoupauthdialog.c 106 char *password; member in struct:_WebKitAuthData
113 g_free(authData->password);
120 /* Anything but 401 and 5xx means the password was accepted */
122 soup_auth_save_password(authData->auth, authData->username, authData->password);
139 authData->password = g_strdup(gtk_entry_get_text(GTK_ENTRY(authData->passwordEntry)));
141 soup_auth_authenticate(authData->auth, authData->username, authData->password);
195 static void show_auth_dialog(WebKitAuthData* authData, const char* login, const char* password)
261 description = g_strdup_printf(_("A username and password are being requested by the site %s"), uri->host);
306 authData->passwordEntry = table_add_entry(table, hasRealm ? 2 : 1, _("Password:"),
307 password, NULL)
335 const char *login, *password; local
    [all...]
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
KeyManagerFactoryImpl.java 43 //password
48 * password)
51 public void engineInit(KeyStore ks, char[] password)
56 if (password != null) {
57 pwd = password.clone();
  /packages/apps/KeyChain/support/src/com/android/keychain/tests/support/
KeyChainServiceTestSupport.java 38 @Override public boolean keystorePassword(String password) {
40 return mKeyStore.password(password);
  /external/chromium/chrome/browser/chromeos/login/
account_creation_view.h 23 // Notify about new user name and password. This notification is sent before
27 const std::string& password) = 0;
parallel_authenticator.h 81 // Given a |username| and |password|, this method attempts to authenticate to
110 const std::string& password,
114 // Given a |username| and |password|, this method attempts to
119 const std::string& password);
141 const std::string& password,
163 // Given that we're attempting to auth the user again, with a new password,
216 // Stores a hash of |password|, salted with the ascii of |system_salt_|.
217 std::string HashPassword(const std::string& password);
257 // When the user has changed her password, but gives us the old one, we will
  /external/chromium/chrome/browser/sync/glue/
password_model_associator.h 42 // * Algorithm to associate password model and sync model.
61 // Delete all password nodes.
84 // Returns the sync id for the given password name, or sync_api::kInvalidId
85 // if the password name is not associated to any sync id.
88 // Associates the given password name with the given sync id.
102 static std::string MakeTag(const webkit_glue::PasswordForm& password);
103 static std::string MakeTag(const sync_pb::PasswordSpecificsData& password);
110 static void CopyPassword(const sync_pb::PasswordSpecificsData& password,
113 static bool MergePasswords(const sync_pb::PasswordSpecificsData& password,
  /external/chromium/chrome/browser/ui/
crypto_module_password_dialog_nss.cc 39 void GotPassword(const char* password);
94 void SlotUnlocker::GotPassword(const char* password) {
99 if (!password) {
100 // User cancelled entering password. Oh well.
108 password);
110 // Incorrect password. Try again.
119 // Correct password (SECSuccess) or too many attempts/other failure
  /external/chromium/chrome/browser/ui/views/
login_view.h 29 // Access the data in the username/password text fields.
35 const std::wstring& password) OVERRIDE;

Completed in 692 milliseconds

1 2 3 45 6 7 8 91011>>