/external/chromium/net/ftp/ |
ftp_transaction.h | 47 const string16& password,
|
/external/chromium/third_party/libjingle/source/talk/base/ |
proxyinfo.h | 52 CryptString password; member in struct:talk_base::ProxyInfo
|
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_2.c | 21 @param password The input password (or key) 22 @param password_len The length of the password (octets) 31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len, 42 LTC_ARGCHK(password != NULL); 78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { 95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {
|
pkcs_5_1.c | 20 @param password The password (or key) 21 @param password_len The length of the password (octet) 29 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len, 39 LTC_ARGCHK(password != NULL); 62 /* hash initial password + salt */ 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) {
|
/external/webkit/Source/JavaScriptCore/wtf/url/api/ |
ParsedURL.h | 44 String password() const;
|
/external/webkit/Source/JavaScriptCore/wtf/url/src/ |
URLSegments.h | 45 Password, 82 // Password: 5 5 95 URLComponent password; member in class:WTF::URLSegments
|
URLSegments.cpp | 64 if (password.isValid()) { 65 if (type <= Password) 66 return password.begin(); 67 current = password.end() + 1; // Advance over the '@' at the end.
|
/external/webkit/Source/WebCore/html/ |
PasswordInputType.cpp | 47 return InputTypeNames::password(); 52 // Should never save/restore password fields. 58 // Should never save/restore password fields. 64 // Input methods are disabled for the password field because otherwise 65 // anyone can access the underlying password and display it in clear text.
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_md5.c | 40 const u8 *pos, *challenge, *password; local 44 password = eap_get_config_password(sm, &password_len); 45 if (password == NULL) { 46 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
mschapv2.h | 25 const u8 *password, size_t password_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_md5.c | 40 const u8 *pos, *challenge, *password; local 44 password = eap_get_config_password(sm, &password_len); 45 if (password == NULL) { 46 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); 95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
|
mschapv2.h | 25 const u8 *password, size_t password_len,
|
/libcore/luni/src/main/java/javax/net/ssl/ |
KeyManagerFactorySpi.java | 39 * Initializes this instance with the specified key store and password. 43 * @param password 44 * the key store password. 52 protected abstract void engineInit(KeyStore ks, char[] password) throws KeyStoreException,
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
TrustedCertificateKeyStoreSpi.java | 35 @Override public Key engineGetKey(String alias, char[] password) { 58 String alias, Key key, char[] password, Certificate[] chain) { 104 @Override public void engineStore(OutputStream stream, char[] password) { 108 @Override public void engineLoad(InputStream stream, char[] password) {
|
/packages/experimental/AndroidVendorSecurityTool/src/com/google/android/googleapps/ |
IGoogleLoginService.aidl | 43 * will prompt the user for username/password and ultimately 75 * have a password for the specified account. 109 * enter their username and password, but the 156 * username+password at all, or there was some failure during 179 * need to prompt the user for username/password. 182 * to prompt the user for username/password, that 200 * over the network fails because the password is 201 * invalid (or because the password is blank). 253 * On calling, data should contain username, password, (optional) 279 * data, using the password in data. If successful, save th [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
authenticator.h | 22 // On password change detected, will call 32 // Given a |username| and |password|, this method attempts to authenticate 39 const std::string& password, 43 // Given a |username| and |password|, this method attempts to 48 const std::string& password) = 0; 65 // If a password logs the user in online, but cannot be used to 66 // mount his cryptohome, we expect that a password change has 69 // forward to use his new password. |old_password| is the password 85 const std::string& password, [all...] |
mock_login_status_consumer.h | 23 const std::string& password, 45 const std::string& password, 53 const std::string& password,
|
mock_authenticator.h | 38 const std::string& password, 41 if (expected_username_ == username && expected_password_ == password) { 56 const std::string& password) { 57 return AuthenticateToLogin(NULL /* not used */, username, password, 91 const std::string& password, 115 const std::string& password, 120 EXPECT_EQ(expected_password_, password);
|
/external/chromium/chrome/browser/printing/cloud_print/ |
cloud_print_setup_message_handler.cc | 30 std::string username, password, captcha, access_code; local 44 !result->GetString("pass", &password) || 53 flow_->OnUserSubmittedAuth(username, password, captcha, access_code);
|
/external/chromium/chrome/browser/sync/ |
signin_manager.h | 25 // A listener might use this to make note of a username / password 31 password(in_password) {} 33 std::string password; member in struct:GoogleServiceSigninSuccessDetails 58 const std::string& password,
|
/libcore/luni/src/test/java/libcore/java/security/cert/ |
PKIXParametersTest.java | 30 char[] password = "password".toCharArray(); local 37 ks.setKeyEntry("key", pke.getPrivateKey(), password, pke.getCertificateChain()); 44 keyOnly.setKeyEntry("key", pke.getPrivateKey(), password, pke.getCertificateChain());
|
/external/wpa_supplicant/ |
eap_leap.c | 72 const u8 *pos, *challenge, *identity, *password; local 79 password = eap_get_config_password(sm, &password_len); 80 if (identity == NULL || password == NULL) 126 nt_challenge_response(challenge, password, password_len, rpos); 198 const u8 *pos, *password; local 205 password = eap_get_config_password(sm, &password_len); 206 if (password == NULL) 242 nt_password_hash(password, password_len, pw_hash); 279 const u8 *password; local 281 password = eap_get_config_password(sm, &password_len) 334 const u8 *addr[5], *password; local [all...] |
/external/webkit/Tools/Scripts/webkitpy/tool/steps/ |
commit.py | 53 password = None 62 commit_text = scm.commit_with_message(self._commit_message, git_commit=self._options.git_commit, username=username, password=password, force_squash=force_squash, changed_files=self._changed_files(state)) 78 password = self._tool.user.prompt_password("%s password for %s: " % (e.server_host, username), repeat=5) 79 if not password: 80 raise ScriptError("You need to specify the password for %s on %s to perform the commit." % (username, e.server_host))
|
/frameworks/base/obex/javax/obex/ |
ObexSession.java | 74 * and password to use. 132 * If no password is provided then we not resent the request 138 byte[] password = result.getPassword(); 139 if (password == null) { 163 byte[] digest = new byte[challenge.length + password.length + 1]; 165 // Insert colon between challenge and password 167 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); 194 // get the correct password from the application
|
/external/wpa_supplicant/tests/ |
test_ms_funcs.c | 22 u8 *password = "clientPass"; local 72 nt_password_hash(password, strlen(password), buf); 80 password, strlen(password), 93 generate_authenticator_response(password, strlen(password),
|