/external/bouncycastle/src/main/java/org/bouncycastle/crypto/generators/ |
OpenSSLPBEParametersGenerator.java | 32 * @param password password to use. 36 byte[] password, 39 super.init(password, salt, 1); 43 * the derived key function, the ith hash of the password and the salt. 54 digest.update(password, 0, password.length); 79 * Generate a key parameter derived from the password, salt, and iteration 98 * the password, salt, and iteration count we are currently initialised 119 * Generate a key parameter for use with a MAC derived from the password, [all...] |
/external/webkit/Source/WebKit2/UIProcess/API/C/ |
WKCredential.h | 38 WK_EXPORT WKCredentialRef WKCredentialCreate(WKStringRef username, WKStringRef password, WKCredentialPersistence);
|
/external/wpa_supplicant/ |
ms_funcs.h | 20 const u8 *password, size_t password_len, 27 void generate_authenticator_response(const u8 *password, size_t password_len, 37 void nt_challenge_response(const u8 *challenge, const u8 *password, 42 void nt_password_hash(const u8 *password, size_t password_len,
|
eap_gtc.c | 57 const u8 *pos, *password, *identity; local 86 password = eap_get_config_otp(sm, &password_len); 87 if (password) 90 password = eap_get_config_password(sm, &password_len); 94 if (password == NULL) { 95 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured"); 124 os_memcpy(rpos, password, password_len); 129 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
/external/apache-http/src/org/apache/http/auth/ |
NTCredentials.java | 51 /** Password */ 52 private final String password; field in class:NTCredentials 58 * The constructor with the fully qualified username and password combined 61 * @param usernamePassword the domain/username:password formed string 66 throw new IllegalArgumentException("Username:password string may not be null"); 72 this.password = usernamePassword.substring(atColon + 1); 75 this.password = null; 94 * @param password The password. 101 final String password, [all...] |
/external/webkit/Source/WebKit/win/ |
WebURLCredential.cpp | 107 /* [in] */ BSTR password, 125 m_credential = Credential(String(user, SysStringLen(user)), String(password, SysStringLen(password)), corePersistence); 129 HRESULT STDMETHODCALLTYPE WebURLCredential::password( function in class:WebURLCredential 130 /* [out, retval] */ BSTR* password) 132 BString str = m_credential.password(); 133 *password = str.release();
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
ms_funcs.h | 20 const u8 *password, size_t password_len, 27 void generate_authenticator_response(const u8 *password, size_t password_len, 37 void nt_challenge_response(const u8 *challenge, const u8 *password, 42 void nt_password_hash(const u8 *password, size_t password_len, 51 const u8 *password, size_t password_len,
|
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_supplicant.conf.orig | 9 # NOTE! This file may contain password information and should probably be made 20 # wpa_cli or wpa_gui, or a password is changed). This is required for 360 # password: Password string for EAP. This field can include either the 361 # plaintext password (using ASCII or hex string) or a NtPasswordHash 362 # (16-byte MD4 hash of password) in hash:<32 hex digits> format. 363 # NtPasswordHash can only be used when the password is for MSCHAPv2 or 406 # private_key_passwd: Password for private key file (if left out, this will be 455 # EAP-WSC (WPS) uses following options: pin=<Device Password> or 469 # private_key2_passwd: Password for private key fil [all...] |
/external/wpa_supplicant_8/src/crypto/ |
ms_funcs.h | 20 const u8 *password, size_t password_len, 27 int generate_authenticator_response(const u8 *password, size_t password_len, 37 int nt_challenge_response(const u8 *challenge, const u8 *password, 42 int nt_password_hash(const u8 *password, size_t password_len, 51 const u8 *password, size_t password_len,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpa_supplicant.conf.orig | 9 # NOTE! This file may contain password information and should probably be made 20 # wpa_cli or wpa_gui, or a password is changed). This is required for 402 # password: Password string for EAP. This field can include either the 403 # plaintext password (using ASCII or hex string) or a NtPasswordHash 404 # (16-byte MD4 hash of password) in hash:<32 hex digits> format. 405 # NtPasswordHash can only be used when the password is for MSCHAPv2 or 458 # private_key_passwd: Password for private key file (if left out, this will be 507 # EAP-WSC (WPS) uses following options: pin=<Device Password> or 521 # private_key2_passwd: Password for private key fil [all...] |
/frameworks/base/core/java/android/webkit/ |
HttpAuthHandlerImpl.java | 87 String password = msg.getData().getString("password"); local 89 loader.handleAuthResponse(username, password); 106 * @param password The password to use for authentication 110 private boolean handleResponseForSynchronousRequest(String username, String password) { 117 mPassword = password; 137 * @param password The password to use for authentication 139 public void proceed(String username, String password) { [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/openssl/ |
PEMUtilities.java | 81 static SecretKey generateSecretKeyForPKCS5Scheme2(String algorithm, char[] password, byte[] salt, int iterationCount) 86 PBEParametersGenerator.PKCS5PasswordToBytes(password), 97 char[] password, 112 return crypt(encrypt, prov, bytes, password, dekAlgName, iv); 119 char[] password, 159 sKey = getKey(password, alg, 24, iv, des2); 164 sKey = getKey(password, alg, 8, iv); 169 sKey = getKey(password, alg, 16, iv); 183 sKey = getKey(password, alg, keyBits / 8, iv); 220 sKey = getKey(password, "AES", keyBits / 8, salt) [all...] |
/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
TestKeyStoreSpi.java | 108 public Key engineGetKey(String alias, char[] password) 112 if (password == null) { 146 public void engineLoad(InputStream stream, char[] password) 154 if (password == null) { 156 } else if (password.length == 0) { 175 char[] password = ((PasswordProtection) pParam).getPassword(); local 176 if (password == null) { 197 public void engineSetKeyEntry(String alias, Key key, char[] password, 227 public void engineStore(OutputStream stream, char[] password) 233 if (password == null) 249 char[] password = ((PasswordProtection) pParam).getPassword(); local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_leap.c | 70 const u8 *pos, *challenge, *identity, *password; local 78 password = eap_get_config_password2(sm, &password_len, &pwhash); 79 if (identity == NULL || password == NULL) 124 challenge_response(challenge, password, rpos); 126 nt_challenge_response(challenge, password, password_len, rpos); 193 const u8 *pos, *password; local 201 password = eap_get_config_password2(sm, &password_len, &pwhash); 202 if (password == NULL) 236 hash_nt_password_hash(password, pw_hash_hash); 238 nt_password_hash(password, password_len, pw_hash) 275 const u8 *password; local 333 const u8 *addr[5], *password; local [all...] |
eap_gtc.c | 56 const u8 *pos, *password, *identity; local 83 password = eap_get_config_otp(sm, &password_len); 84 if (password) 87 password = eap_get_config_password(sm, &password_len); 91 if (password == NULL) { 92 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured"); 119 wpabuf_put_data(resp, password, password_len); 125 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
/external/chromium/chrome/browser/ui/login/ |
login_prompt.h | 59 void SetAuth(const string16& username, const string16& password); 103 const string16& password); 114 const string16& password); 138 // when later notifying the password manager if the credentials were accepted 143 // Points to the password manager owned by the TabContents requesting auth. 183 const string16& password) 186 password_(password) {} 188 const string16& password() const { return password_; } function in class:AuthSuppliedLoginNotificationDetails 194 // The password that was used for the authentication. 200 // Prompts the user for their username and password. This is designed t [all...] |
login_prompt_mac.h | 30 - (void)autofillLogin:(NSString*)login password:(NSString*)password;
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gtc.c | 56 const u8 *pos, *password, *identity; local 83 password = eap_get_config_otp(sm, &password_len); 84 if (password) 87 password = eap_get_config_password(sm, &password_len); 91 if (password == NULL) { 92 wpa_printf(MSG_INFO, "EAP-GTC: Password not configured"); 119 wpabuf_put_data(resp, password, password_len); 125 wpa_printf(MSG_DEBUG, "EAP-GTC: Forgetting used password");
|
/external/apache-harmony/x-net/src/test/java/javax/net/ssl/ |
MyKeyManagerFactorySpi.java | 39 protected void engineInit(KeyStore ks, char[] password) 42 if (password == null) { 43 throw new KeyStoreException("Incorrect password");
|
/external/chromium/chrome/browser/chromeos/login/ |
test_attempt_state.cc | 15 const std::string& password, 21 password,
|
screen_observer.h | 46 // Notify about new user names and password. It is used to autologin 49 const std::string& password) = 0;
|
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
plainsaslhandler.h | 38 PlainSaslHandler(const Jid & jid, const talk_base::CryptString & password, 39 bool allow_plain) : jid_(jid), password_(password),
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
MobileApple80211.h | 30 CFStringRef password); 32 CFStringRef password,
|
/external/wpa_supplicant_8/src/drivers/ |
MobileApple80211.h | 30 CFStringRef password); 32 CFStringRef password,
|
/external/apache-harmony/security/src/test/support/common/java/org/apache/harmony/security/tests/support/ |
MyKeyStoreSpi.java | 45 public Key engineGetKey(String alias, char[] password) 62 public void engineSetKeyEntry(String alias, Key key, char[] password, 109 public void engineStore(OutputStream stream, char[] password) 121 public void engineLoad(InputStream stream, char[] password)
|