/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 43 const u8 *password, size_t password_len, 70 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 71 password, password_len); 74 password, nt_response); 76 password, peer_challenge, auth_challenge, 79 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 80 password, password_len); 83 password, password_len, nt_response); 84 generate_authenticator_response(password, password_len, 96 if (hash_nt_password_hash(password, password_hash_hash) [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
screen_locker_tester.h | 32 // Injects MockAuthenticate that uses given |user| and |password|. 34 const std::string& password); 36 // Sets the password text. 37 void SetPassword(const std::string& password); 39 // Gets the password text. 42 // Emulates entring a password. 43 void EnterPassword(const std::string& password);
|
screen_locker_tester.cc | 35 const std::string& user, const std::string& password) { 38 new MockAuthenticator(ScreenLocker::screen_locker_, user, password)); 41 void ScreenLockerTester::SetPassword(const std::string& password) { 44 pass->SetText(ASCIIToUTF16(password.c_str())); 53 void ScreenLockerTester::EnterPassword(const std::string& password) { 54 SetPassword(password);
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/module/ |
LoginModuleUtilsTest.java | 39 char[] password = LoginModuleUtils.getPassword(in); local 40 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); 44 password = LoginModuleUtils.getPassword(in); 45 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); 49 password = LoginModuleUtils.getPassword(in); 50 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); 54 password = LoginModuleUtils.getPassword(in); 55 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); 59 password = LoginModuleUtils.getPassword(in); 61 assertTrue(Arrays.equals(expectedString.toCharArray(), password)); local 67 char[] password = PASSWORD_AS_STRING.toCharArray(); local [all...] |
/external/chromium/chrome/browser/ui/login/ |
login_model.h | 15 // Called by the model when a username,password pair has been identified 18 const std::wstring& password) = 0;
|
/frameworks/base/core/java/android/webkit/ |
HttpAuthHandler.java | 51 public void proceed(String username, String password) {
|
/external/chromium/chrome/browser/password_manager/ |
encryptor_password_mac_unittest.cc | 11 // Test that if we have an existing password in the Keychain and we are 16 EncryptorPassword password(keychain); 17 EXPECT_FALSE(password.GetEncryptorPassword().empty()); 22 // Test that if we do not have an existing password in the Keychain then it 27 EncryptorPassword password(keychain); 28 EXPECT_FALSE(password.GetEncryptorPassword().empty()); 33 // Test that if get denied access by the user then we return an empty password. 38 EncryptorPassword password(keychain); 39 EXPECT_TRUE(password.GetEncryptorPassword().empty()); 45 // password, and we should not try to add one [all...] |
ie7_password.h | 21 // Encrypted data containing the username, password and some more undocumented 31 // Parses a data structure to find the password and the username. 34 std::wstring* password); 36 // Decrypts the username and password for a given data vector using the url as 40 std::wstring* username, std::wstring* password);
|
/external/webkit/Source/WebKit2/UIProcess/API/C/ |
WKCredential.cpp | 40 WKCredentialRef WKCredentialCreate(WKStringRef username, WKStringRef password, WKCredentialPersistence persistence) 42 RefPtr<WebCredential> credential = WebCredential::create(toImpl(username), toImpl(password), toCredentialPersistence(persistence));
|
/external/webkit/Tools/Scripts/webkitpy/common/net/ |
credentials.py | 65 Git.read_git_config(self.git_prefix + "password")) 86 password = self._keychain_value_with_label("^password: ", 88 return [username, password] 93 "find-internet-password", 101 log("Reading Keychain for %s account and password. " 127 return (self._read_environ("username"), self._read_environ("password")) 129 def _offer_to_store_credentials_in_keyring(self, username, password): 132 if not User().confirm("Store password in system keyring?", User.DEFAULT_NO): 134 self._keyring.set_password(self.host, username, password) [all...] |
/external/grub/util/ |
grub-md5-crypt | 3 # Encrypt a password in MD5 format 35 Encrypt a password in MD5 format. 67 # Prompt to enter a password. 68 echo -n "Password: " 69 read -r password 73 echo -n "Retype password: " 80 if test "x$password" = x; then 81 echo "Empty password is not permitted." 85 if test "x$password" != "x$password2"; then 94 $password [all...] |
grub-md5-crypt.in | 3 # Encrypt a password in MD5 format 35 Encrypt a password in MD5 format. 67 # Prompt to enter a password. 68 echo -n "Password: " 69 read -r password 73 echo -n "Retype password: " 80 if test "x$password" = x; then 81 echo "Empty password is not permitted." 85 if test "x$password" != "x$password2"; then 94 $password [all...] |
/external/dropbear/ |
cli-authpasswd.c | 44 /* returns a statically allocated password from a helper app, or NULL 118 char* password = NULL; local 124 snprintf(prompt, sizeof(prompt), "%s@%s's password: ", 128 password = gui_getpass(prompt); 131 password = getpass_or_cancel(prompt); 146 buf_putstring(ses.writepayload, password, strlen(password)); 149 m_burn(password, strlen(password));
|
/external/webkit/Source/WebCore/platform/network/ |
Credential.cpp | 44 Credential::Credential(const String& user, const String& password, CredentialPersistence persistence) 46 , m_password(password.length() ? password : "") 56 , m_password(original.password()) 81 const String& Credential::password() const function in class:WebCore::Credential 155 if (a.password() != b.password())
|
/external/wpa_supplicant/ |
eap_otp.c | 42 const u8 *pos, *password; local 57 password = eap_get_config_otp(sm, &password_len); 58 if (password) 61 password = eap_get_config_password(sm, &password_len); 65 if (password == NULL) { 66 wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); 83 os_memcpy(rpos, password, password_len); 85 password, password_len); 88 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
/external/chromium/third_party/libjingle/source/talk/base/ |
autodetectproxy.h | 59 const CryptString& password) { 62 proxy_.password = password;
|
/external/webkit/Source/WebKit/win/ |
WebURLCredential.h | 52 /* [in] */ BSTR password, 55 virtual HRESULT STDMETHODCALLTYPE password( 56 /* [out, retval] */ BSTR* password);
|
/libcore/support/src/test/java/org/apache/harmony/xnet/tests/support/ |
KeyManagerFactorySpiImpl.java | 16 public void engineInit(KeyStore ks, char[] password) 20 if (ks == null && password == null) { 28 if (password == null) {
|
/development/tools/ |
make_key | 49 read -p "Enter password for '$1' (blank for none; password will be visible): " \ 50 password 57 if [ "${password}" == "" ]; then 58 echo "creating ${1}.pk8 with no password" 61 echo "creating ${1}.pk8 with password [${password}]" 62 echo $password | openssl pkcs8 -in ${one} -topk8 -outform DER -out $1.pk8 \
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JDKPKCS12StoreParameter.java | 34 public void setPassword(char[] password) 36 this.protectionParameter = new KeyStore.PasswordProtection(password);
|
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
saslplainmechanism.h | 39 SaslPlainMechanism(const buzz::Jid user_jid, const talk_base::CryptString & password) : 40 user_jid_(user_jid), password_(password) {}
|
/external/webkit/Source/WebKit2/UIProcess/Authentication/ |
WebCredential.h | 47 static PassRefPtr<WebCredential> create(WebString* username, WebString* password, WebCore::CredentialPersistence persistence) 49 return adoptRef(new WebCredential(WebCore::Credential(username->string(), password->string(), persistence)));
|
/packages/apps/KeyChain/support/src/com/android/keychain/tests/support/ |
IKeyChainServiceTestSupport.aidl | 34 boolean keystorePassword(String password);
|
/frameworks/base/keystore/java/android/security/ |
KeyStore.java | 130 private boolean password(byte[] password) { method in class:KeyStore 131 execute('p', password); 135 public boolean password(String password) { method in class:KeyStore 136 return password(getBytes(password)); 144 private boolean unlock(byte[] password) { 145 execute('u', password); 149 public boolean unlock(String password) { [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
NTLMEngine.java | 62 * @param password Password 71 String password,
|