HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 51 - 75 of 683) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/generators/
OpenSSLPBEParametersGenerator.java 32 * @param password password to use.
36 byte[] password,
39 super.init(password, salt, 1);
43 * the derived key function, the ith hash of the password and the salt.
54 digest.update(password, 0, password.length);
79 * Generate a key parameter derived from the password, salt, and iteration
98 * the password, salt, and iteration count we are currently initialised
119 * Generate a key parameter for use with a MAC derived from the password,
    [all...]
  /external/webkit/Source/WebKit2/UIProcess/API/C/
WKCredential.h 38 WK_EXPORT WKCredentialRef WKCredentialCreate(WKStringRef username, WKStringRef password, WKCredentialPersistence);
  /external/wpa_supplicant/
ms_funcs.h 20 const u8 *password, size_t password_len,
27 void generate_authenticator_response(const u8 *password, size_t password_len,
37 void nt_challenge_response(const u8 *challenge, const u8 *password,
42 void nt_password_hash(const u8 *password, size_t password_len,
eap_gtc.c 57 const u8 *pos, *password, *identity; local
86 password = eap_get_config_otp(sm, &password_len);
87 if (password)
90 password = eap_get_config_password(sm, &password_len);
94 if (password == NULL) {
95 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured");
124 os_memcpy(rpos, password, password_len);
129 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
  /external/apache-http/src/org/apache/http/auth/
NTCredentials.java 51 /** Password */
52 private final String password; field in class:NTCredentials
58 * The constructor with the fully qualified username and password combined
61 * @param usernamePassword the domain/username:password formed string
66 throw new IllegalArgumentException("Username:password string may not be null");
72 this.password = usernamePassword.substring(atColon + 1);
75 this.password = null;
94 * @param password The password.
101 final String password,
    [all...]
  /external/webkit/Source/WebKit/win/
WebURLCredential.cpp 107 /* [in] */ BSTR password,
125 m_credential = Credential(String(user, SysStringLen(user)), String(password, SysStringLen(password)), corePersistence);
129 HRESULT STDMETHODCALLTYPE WebURLCredential::password( function in class:WebURLCredential
130 /* [out, retval] */ BSTR* password)
132 BString str = m_credential.password();
133 *password = str.release();
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
ms_funcs.h 20 const u8 *password, size_t password_len,
27 void generate_authenticator_response(const u8 *password, size_t password_len,
37 void nt_challenge_response(const u8 *challenge, const u8 *password,
42 void nt_password_hash(const u8 *password, size_t password_len,
51 const u8 *password, size_t password_len,
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_supplicant.conf.orig 9 # NOTE! This file may contain password information and should probably be made
20 # wpa_cli or wpa_gui, or a password is changed). This is required for
360 # password: Password string for EAP. This field can include either the
361 # plaintext password (using ASCII or hex string) or a NtPasswordHash
362 # (16-byte MD4 hash of password) in hash:<32 hex digits> format.
363 # NtPasswordHash can only be used when the password is for MSCHAPv2 or
406 # private_key_passwd: Password for private key file (if left out, this will be
455 # EAP-WSC (WPS) uses following options: pin=<Device Password> or
469 # private_key2_passwd: Password for private key fil
    [all...]
  /external/wpa_supplicant_8/src/crypto/
ms_funcs.h 20 const u8 *password, size_t password_len,
27 int generate_authenticator_response(const u8 *password, size_t password_len,
37 int nt_challenge_response(const u8 *challenge, const u8 *password,
42 int nt_password_hash(const u8 *password, size_t password_len,
51 const u8 *password, size_t password_len,
  /external/wpa_supplicant_8/wpa_supplicant/
wpa_supplicant.conf.orig 9 # NOTE! This file may contain password information and should probably be made
20 # wpa_cli or wpa_gui, or a password is changed). This is required for
402 # password: Password string for EAP. This field can include either the
403 # plaintext password (using ASCII or hex string) or a NtPasswordHash
404 # (16-byte MD4 hash of password) in hash:<32 hex digits> format.
405 # NtPasswordHash can only be used when the password is for MSCHAPv2 or
458 # private_key_passwd: Password for private key file (if left out, this will be
507 # EAP-WSC (WPS) uses following options: pin=<Device Password> or
521 # private_key2_passwd: Password for private key fil
    [all...]
  /frameworks/base/core/java/android/webkit/
HttpAuthHandlerImpl.java 87 String password = msg.getData().getString("password"); local
89 loader.handleAuthResponse(username, password);
106 * @param password The password to use for authentication
110 private boolean handleResponseForSynchronousRequest(String username, String password) {
117 mPassword = password;
137 * @param password The password to use for authentication
139 public void proceed(String username, String password) {
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/openssl/
PEMUtilities.java 81 static SecretKey generateSecretKeyForPKCS5Scheme2(String algorithm, char[] password, byte[] salt, int iterationCount)
86 PBEParametersGenerator.PKCS5PasswordToBytes(password),
97 char[] password,
112 return crypt(encrypt, prov, bytes, password, dekAlgName, iv);
119 char[] password,
159 sKey = getKey(password, alg, 24, iv, des2);
164 sKey = getKey(password, alg, 8, iv);
169 sKey = getKey(password, alg, 16, iv);
183 sKey = getKey(password, alg, keyBits / 8, iv);
220 sKey = getKey(password, "AES", keyBits / 8, salt)
    [all...]
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
TestKeyStoreSpi.java 108 public Key engineGetKey(String alias, char[] password)
112 if (password == null) {
146 public void engineLoad(InputStream stream, char[] password)
154 if (password == null) {
156 } else if (password.length == 0) {
175 char[] password = ((PasswordProtection) pParam).getPassword(); local
176 if (password == null) {
197 public void engineSetKeyEntry(String alias, Key key, char[] password,
227 public void engineStore(OutputStream stream, char[] password)
233 if (password == null)
249 char[] password = ((PasswordProtection) pParam).getPassword(); local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_leap.c 70 const u8 *pos, *challenge, *identity, *password; local
78 password = eap_get_config_password2(sm, &password_len, &pwhash);
79 if (identity == NULL || password == NULL)
124 challenge_response(challenge, password, rpos);
126 nt_challenge_response(challenge, password, password_len, rpos);
193 const u8 *pos, *password; local
201 password = eap_get_config_password2(sm, &password_len, &pwhash);
202 if (password == NULL)
236 hash_nt_password_hash(password, pw_hash_hash);
238 nt_password_hash(password, password_len, pw_hash)
275 const u8 *password; local
333 const u8 *addr[5], *password; local
    [all...]
eap_gtc.c 56 const u8 *pos, *password, *identity; local
83 password = eap_get_config_otp(sm, &password_len);
84 if (password)
87 password = eap_get_config_password(sm, &password_len);
91 if (password == NULL) {
92 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured");
119 wpabuf_put_data(resp, password, password_len);
125 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
  /external/chromium/chrome/browser/ui/login/
login_prompt.h 59 void SetAuth(const string16& username, const string16& password);
103 const string16& password);
114 const string16& password);
138 // when later notifying the password manager if the credentials were accepted
143 // Points to the password manager owned by the TabContents requesting auth.
183 const string16& password)
186 password_(password) {}
188 const string16& password() const { return password_; } function in class:AuthSuppliedLoginNotificationDetails
194 // The password that was used for the authentication.
200 // Prompts the user for their username and password. This is designed t
    [all...]
login_prompt_mac.h 30 - (void)autofillLogin:(NSString*)login password:(NSString*)password;
  /external/wpa_supplicant_8/src/eap_peer/
eap_gtc.c 56 const u8 *pos, *password, *identity; local
83 password = eap_get_config_otp(sm, &password_len);
84 if (password)
87 password = eap_get_config_password(sm, &password_len);
91 if (password == NULL) {
92 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured");
119 wpabuf_put_data(resp, password, password_len);
125 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
  /external/apache-harmony/x-net/src/test/java/javax/net/ssl/
MyKeyManagerFactorySpi.java 39 protected void engineInit(KeyStore ks, char[] password)
42 if (password == null) {
43 throw new KeyStoreException("Incorrect password");
  /external/chromium/chrome/browser/chromeos/login/
test_attempt_state.cc 15 const std::string& password,
21 password,
screen_observer.h 46 // Notify about new user names and password. It is used to autologin
49 const std::string& password) = 0;
  /external/chromium/third_party/libjingle/source/talk/xmpp/
plainsaslhandler.h 38 PlainSaslHandler(const Jid & jid, const talk_base::CryptString & password,
39 bool allow_plain) : jid_(jid), password_(password),
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
MobileApple80211.h 30 CFStringRef password);
32 CFStringRef password,
  /external/wpa_supplicant_8/src/drivers/
MobileApple80211.h 30 CFStringRef password);
32 CFStringRef password,
  /external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/
MyKeyStoreSpi.java 45 public Key engineGetKey(String alias, char[] password)
62 public void engineSetKeyEntry(String alias, Key key, char[] password,
109 public void engineStore(OutputStream stream, char[] password)
121 public void engineLoad(InputStream stream, char[] password)

Completed in 1328 milliseconds

1 23 4 5 6 7 8 91011>>