HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 76 - 100 of 683) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/chromium/net/ftp/
ftp_transaction.h 47 const string16& password,
  /external/chromium/third_party/libjingle/source/talk/base/
proxyinfo.h 52 CryptString password; member in struct:talk_base::ProxyInfo
  /external/dropbear/libtomcrypt/src/misc/pkcs5/
pkcs_5_2.c 21 @param password The input password (or key)
22 @param password_len The length of the password (octets)
31 int pkcs_5_alg2(const unsigned char *password, unsigned long password_len,
42 LTC_ARGCHK(password != NULL);
78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) {
95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {
pkcs_5_1.c 20 @param password The password (or key)
21 @param password_len The length of the password (octet)
29 int pkcs_5_alg1(const unsigned char *password, unsigned long password_len,
39 LTC_ARGCHK(password != NULL);
62 /* hash initial password + salt */
66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) {
  /external/webkit/Source/JavaScriptCore/wtf/url/api/
ParsedURL.h 44 String password() const;
  /external/webkit/Source/JavaScriptCore/wtf/url/src/
URLSegments.h 45 Password,
82 // Password: 5 5
95 URLComponent password; member in class:WTF::URLSegments
URLSegments.cpp 64 if (password.isValid()) {
65 if (type <= Password)
66 return password.begin();
67 current = password.end() + 1; // Advance over the '@' at the end.
  /external/webkit/Source/WebCore/html/
PasswordInputType.cpp 47 return InputTypeNames::password();
52 // Should never save/restore password fields.
58 // Should never save/restore password fields.
64 // Input methods are disabled for the password field because otherwise
65 // anyone can access the underlying password and display it in clear text.
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_md5.c 40 const u8 *pos, *challenge, *password; local
44 password = eap_get_config_password(sm, &password_len);
45 if (password == NULL) {
46 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
mschapv2.h 25 const u8 *password, size_t password_len,
  /external/wpa_supplicant_8/src/eap_peer/
eap_md5.c 40 const u8 *pos, *challenge, *password; local
44 password = eap_get_config_password(sm, &password_len);
45 if (password == NULL) {
46 wpa_printf(MSG_INFO, "EAP-MD5: Password not configured");
95 chap_md5(id, password, password_len, challenge, challenge_len, rpos);
mschapv2.h 25 const u8 *password, size_t password_len,
  /libcore/luni/src/main/java/javax/net/ssl/
KeyManagerFactorySpi.java 39 * Initializes this instance with the specified key store and password.
43 * @param password
44 * the key store password.
52 protected abstract void engineInit(KeyStore ks, char[] password) throws KeyStoreException,
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
TrustedCertificateKeyStoreSpi.java 35 @Override public Key engineGetKey(String alias, char[] password) {
58 String alias, Key key, char[] password, Certificate[] chain) {
104 @Override public void engineStore(OutputStream stream, char[] password) {
108 @Override public void engineLoad(InputStream stream, char[] password) {
  /packages/experimental/AndroidVendorSecurityTool/src/com/google/android/googleapps/
IGoogleLoginService.aidl 43 * will prompt the user for username/password and ultimately
75 * have a password for the specified account.
109 * enter their username and password, but the
156 * username+password at all, or there was some failure during
179 * need to prompt the user for username/password.
182 * to prompt the user for username/password, that
200 * over the network fails because the password is
201 * invalid (or because the password is blank).
253 * On calling, data should contain username, password, (optional)
279 * data, using the password in data. If successful, save th
    [all...]
  /external/chromium/chrome/browser/chromeos/login/
authenticator.h 22 // On password change detected, will call
32 // Given a |username| and |password|, this method attempts to authenticate
39 const std::string& password,
43 // Given a |username| and |password|, this method attempts to
48 const std::string& password) = 0;
65 // If a password logs the user in online, but cannot be used to
66 // mount his cryptohome, we expect that a password change has
69 // forward to use his new password. |old_password| is the password
85 const std::string& password,
    [all...]
mock_login_status_consumer.h 23 const std::string& password,
45 const std::string& password,
53 const std::string& password,
mock_authenticator.h 38 const std::string& password,
41 if (expected_username_ == username && expected_password_ == password) {
56 const std::string& password) {
57 return AuthenticateToLogin(NULL /* not used */, username, password,
91 const std::string& password,
115 const std::string& password,
120 EXPECT_EQ(expected_password_, password);
  /external/chromium/chrome/browser/printing/cloud_print/
cloud_print_setup_message_handler.cc 30 std::string username, password, captcha, access_code; local
44 !result->GetString("pass", &password) ||
53 flow_->OnUserSubmittedAuth(username, password, captcha, access_code);
  /external/chromium/chrome/browser/sync/
signin_manager.h 25 // A listener might use this to make note of a username / password
31 password(in_password) {}
33 std::string password; member in struct:GoogleServiceSigninSuccessDetails
58 const std::string& password,
  /libcore/luni/src/test/java/libcore/java/security/cert/
PKIXParametersTest.java 30 char[] password = "password".toCharArray(); local
37 ks.setKeyEntry("key", pke.getPrivateKey(), password, pke.getCertificateChain());
44 keyOnly.setKeyEntry("key", pke.getPrivateKey(), password, pke.getCertificateChain());
  /external/wpa_supplicant/
eap_leap.c 72 const u8 *pos, *challenge, *identity, *password; local
79 password = eap_get_config_password(sm, &password_len);
80 if (identity == NULL || password == NULL)
126 nt_challenge_response(challenge, password, password_len, rpos);
198 const u8 *pos, *password; local
205 password = eap_get_config_password(sm, &password_len);
206 if (password == NULL)
242 nt_password_hash(password, password_len, pw_hash);
279 const u8 *password; local
281 password = eap_get_config_password(sm, &password_len)
334 const u8 *addr[5], *password; local
    [all...]
  /external/webkit/Tools/Scripts/webkitpy/tool/steps/
commit.py 53 password = None
62 commit_text = scm.commit_with_message(self._commit_message, git_commit=self._options.git_commit, username=username, password=password, force_squash=force_squash, changed_files=self._changed_files(state))
78 password = self._tool.user.prompt_password("%s password for %s: " % (e.server_host, username), repeat=5)
79 if not password:
80 raise ScriptError("You need to specify the password for %s on %s to perform the commit." % (username, e.server_host))
  /frameworks/base/obex/javax/obex/
ObexSession.java 74 * and password to use.
132 * If no password is provided then we not resent the request
138 byte[] password = result.getPassword();
139 if (password == null) {
163 byte[] digest = new byte[challenge.length + password.length + 1];
165 // Insert colon between challenge and password
167 System.arraycopy(password, 0, digest, challenge.length + 1, password.length);
194 // get the correct password from the application
  /external/wpa_supplicant/tests/
test_ms_funcs.c 22 u8 *password = "clientPass"; local
72 nt_password_hash(password, strlen(password), buf);
80 password, strlen(password),
93 generate_authenticator_response(password, strlen(password),

Completed in 639 milliseconds

1 2 34 5 6 7 8 91011>>