/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_ms_funcs.c | 22 u8 *password = "clientPass"; local 72 nt_password_hash(password, strlen(password), buf); 80 password, strlen(password), 93 generate_authenticator_response(password, strlen(password),
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_leap.c | 71 const u8 *pos, *challenge, *identity, *password; local 79 password = eap_get_config_password2(sm, &password_len, &pwhash); 80 if (identity == NULL || password == NULL) 125 challenge_response(challenge, password, rpos); 127 nt_challenge_response(challenge, password, password_len, rpos); 194 const u8 *pos, *password; local 202 password = eap_get_config_password2(sm, &password_len, &pwhash); 203 if (password == NULL) 237 if (hash_nt_password_hash(password, pw_hash_hash)) { 242 if (nt_password_hash(password, password_len, pw_hash) | 282 const u8 *password; local 340 const u8 *addr[5], *password; local [all...] |
/frameworks/base/keystore/tests/src/android/security/ |
KeyStoreTest.java | 74 assertTrue(mKeyStore.password(TEST_PASSWD)); 80 mKeyStore.password(TEST_PASSWD); 90 mKeyStore.password(TEST_PASSWD); 98 mKeyStore.password(TEST_I18N_KEY); 105 mKeyStore.password(TEST_PASSWD); 117 mKeyStore.password(TEST_PASSWD); 129 mKeyStore.password(TEST_PASSWD); 142 mKeyStore.password(TEST_PASSWD); 150 mKeyStore.password(TEST_PASSWD); 160 mKeyStore.password(TEST_PASSWD) [all...] |
/external/chromium/chrome/common/net/gaia/ |
gaia_authenticator.cc | 62 const string& password, 68 params.password = password; 76 const string& password, 82 MakeParams(user_name, password, captcha_token, captcha_value); 124 results->password = params.password; 162 post_body += "&Passwd=" + EscapeUrlEncodedData(params.password); 367 const string& password) { 369 auth_results_.password = password [all...] |
/libcore/luni/src/main/java/java/security/ |
KeyStore.java | 230 * Returns the key with the given alias, using the password to recover the 235 * @param password 236 * the password used to recover the key. 246 public final Key getKey(String alias, char[] password) 252 return implSpi.engineGetKey(alias, password); 307 * Associates the given alias with the key, password and certificate chain. 315 * @param password 316 * the password. 327 public final void setKeyEntry(String alias, Key key, char[] password, 337 implSpi.engineSetKeyEntry(alias, key, password, chain) 1107 private char[] password; field in class:KeyStore.PasswordProtection [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
cryptstring.h | 89 // Used for constructing strings where a password is involved and we 111 void Append(const CryptString * password) { 112 size_t len = password->GetLength(); 114 password->CopyTo(storage_ + length_, true); 173 std::string& password() { return password_; } function in class:talk_base::InsecureCryptStringImpl 174 const std::string& password() const { return password_; } function in class:talk_base::InsecureCryptStringImpl 185 copy->password() = password_;
|
/external/dropbear/ |
svr-authpam.c | 26 /* Validates a user password using PAM */ 101 if (!(strcmp(compare_message, "password:") == 0)) { 102 /* We don't recognise the prompt as asking for a password, 161 /* Process a password auth request, sending success or failure messages as 162 * appropriate. To the client it looks like it's doing normal password auth (as 164 * fairly standard (ie just "what's your username, what's your password, OK"). 179 unsigned char * password = NULL; local 185 /* check if client wants to change password */ 193 password = buf_getstring(ses.payload, &passwordlen); 199 userData.passwd = password; [all...] |
/external/webkit/LayoutTests/fast/dom/HTMLFormElement/script-tests/ |
elements-not-in-document.js | 21 i.type = 'password'; 29 shouldBe("i.getAttribute('type')", "'password'"); 30 shouldBe("i.type", "'password'");
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
MobileApple80211.c | 105 CFStringRef password) = NULL; 108 CFStringRef password) 110 return __Apple80211Associate(handle, bss, password); 116 CFStringRef password, 121 CFStringRef password, CFDictionaryRef *info) 123 return __Apple80211AssociateAndCopyInfo(handle, bss, password, info);
|
/external/wpa_supplicant_8/src/drivers/ |
MobileApple80211.c | 105 CFStringRef password) = NULL; 108 CFStringRef password) 110 return __Apple80211Associate(handle, bss, password); 116 CFStringRef password, 121 CFStringRef password, CFDictionaryRef *info) 123 return __Apple80211AssociateAndCopyInfo(handle, bss, password, info);
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
SecretKeyFactoryTest.java | 29 private static final char[] PASSWORD = "google".toCharArray(); 50 // PBEKeySpecs password only constructor 64 KeySpec ks = new PBEKeySpec(PASSWORD); 85 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS); 105 KeySpec ks = new PBEKeySpec(PASSWORD, SALT, ITERATIONS, KEY_LENGTH); 110 test_PBKDF2(PASSWORD, SALT, ITERATIONS, KEY_LENGTH, 125 char[] password = "password".toCharArray(); local 136 test_PBKDF2(password, salt, iterations, keyLength, expected); 145 char[] password = ("All n-entities must communicate with other local [all...] |
/external/apache-harmony/sql/src/test/java/org/apache/harmony/sql/tests/java/sql/ |
TestHelper_Driver4.java | 72 static String passwordProperty = "password"; 82 * Check for user and password, except for datasource = 83 * data1 which is set up not to require a user/password 93 String password = (String) info.get(passwordProperty); local 94 if (user == null || password == null) { 96 "Userid and/or password not supplied"); 99 || !password.equals(validpassword)) { 101 "Userid and/or password not valid");
|
/external/chromium/chrome/browser/ui/webui/chromeos/login/ |
login_ui.cc | 87 std::string password; local 91 args->GetString(1, &password); 92 delegate_->Login(username, password);
|
/external/chromium/crypto/ |
symmetric_key_openssl.cc | 44 const std::string& password, 56 int rv = PKCS5_PBKDF2_HMAC_SHA1(password.data(), password.length(),
|
/external/chromium/net/http/ |
http_auth_cache.h | 24 // - the last identity used (username/password) 69 // |password| - login information for the realm. 78 const string16& password, 82 // if one exists AND if the cached identity matches (|username|, |password|). 87 // |password| - condition to match. 93 const string16& password); 139 // The login password. 140 const string16 password() const { function in class:net::HttpAuthCache::Entry
|
http_auth_handler.cc | 66 const string16* password, 72 DCHECK((username == NULL) == (password == NULL)); 78 int rv = GenerateAuthTokenImpl(username, password, request,
|
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
relayport.h | 59 const std::string& username, const std::string& password, 62 username, password, magic_cookie); 89 const std::string& username, const std::string& password,
|
/external/webkit/Source/WebKit/gtk/webkit/ |
webkitsoupauthdialog.c | 106 char *password; member in struct:_WebKitAuthData 113 g_free(authData->password); 120 /* Anything but 401 and 5xx means the password was accepted */ 122 soup_auth_save_password(authData->auth, authData->username, authData->password); 139 authData->password = g_strdup(gtk_entry_get_text(GTK_ENTRY(authData->passwordEntry))); 141 soup_auth_authenticate(authData->auth, authData->username, authData->password); 195 static void show_auth_dialog(WebKitAuthData* authData, const char* login, const char* password) 261 description = g_strdup_printf(_("A username and password are being requested by the site %s"), uri->host); 306 authData->passwordEntry = table_add_entry(table, hasRealm ? 2 : 1, _("Password:"), 307 password, NULL) 335 const char *login, *password; local [all...] |
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
KeyManagerFactoryImpl.java | 43 //password 48 * password) 51 public void engineInit(KeyStore ks, char[] password) 56 if (password != null) { 57 pwd = password.clone();
|
/packages/apps/KeyChain/support/src/com/android/keychain/tests/support/ |
KeyChainServiceTestSupport.java | 38 @Override public boolean keystorePassword(String password) { 40 return mKeyStore.password(password);
|
/external/chromium/chrome/browser/chromeos/login/ |
account_creation_view.h | 23 // Notify about new user name and password. This notification is sent before 27 const std::string& password) = 0;
|
parallel_authenticator.h | 81 // Given a |username| and |password|, this method attempts to authenticate to 110 const std::string& password, 114 // Given a |username| and |password|, this method attempts to 119 const std::string& password); 141 const std::string& password, 163 // Given that we're attempting to auth the user again, with a new password, 216 // Stores a hash of |password|, salted with the ascii of |system_salt_|. 217 std::string HashPassword(const std::string& password); 257 // When the user has changed her password, but gives us the old one, we will
|
/external/chromium/chrome/browser/sync/glue/ |
password_model_associator.h | 42 // * Algorithm to associate password model and sync model. 61 // Delete all password nodes. 84 // Returns the sync id for the given password name, or sync_api::kInvalidId 85 // if the password name is not associated to any sync id. 88 // Associates the given password name with the given sync id. 102 static std::string MakeTag(const webkit_glue::PasswordForm& password); 103 static std::string MakeTag(const sync_pb::PasswordSpecificsData& password); 110 static void CopyPassword(const sync_pb::PasswordSpecificsData& password, 113 static bool MergePasswords(const sync_pb::PasswordSpecificsData& password,
|
/external/chromium/chrome/browser/ui/ |
crypto_module_password_dialog_nss.cc | 39 void GotPassword(const char* password); 94 void SlotUnlocker::GotPassword(const char* password) { 99 if (!password) { 100 // User cancelled entering password. Oh well. 108 password); 110 // Incorrect password. Try again. 119 // Correct password (SECSuccess) or too many attempts/other failure
|
/external/chromium/chrome/browser/ui/views/ |
login_view.h | 29 // Access the data in the username/password text fields. 35 const std::wstring& password) OVERRIDE;
|