HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 176 - 200 of 792) sorted by null

1 2 3 4 5 6 78 91011>>

  /external/chromium/chrome/browser/autofill/crypto/
rc4_decryptor.h 21 explicit RC4Decryptor(wchar_t const* password) {
22 PrepareKey(reinterpret_cast<const uint8 *>(password),
23 wcslen(password) * sizeof(wchar_t));
  /external/chromium/chrome/browser/chromeos/login/
auth_attempt_state.cc 17 const std::string& password,
23 password(password),
account_screen.h 39 const std::string& password);
dom_login_display.h 67 const std::string& password) OVERRIDE;
enterprise_enrollment_view.h 54 const std::string& password,
login_utils.h 53 const std::string& password,
test_attempt_state.h 20 const std::string& password,
  /external/chromium/crypto/
symmetric_key_nss.cc 40 const std::string& password,
51 const_cast<char *>(password.data()));
52 password_item.len = password.size();
  /external/chromium/googleurl/src/
url_parse.h 114 PASSWORD,
152 // PASSWORD: 5 5
169 // Username. Specified in URLs with an @ sign before the host. See |password|
172 // Password. The length will be -1 if unspecified, 0 if specified but empty.
173 // Not all URLs with a username have a password, as in "http://me@host/".
174 // The password is separated form the username with a colon, as in
176 Component password; member in struct:url_parse::Parsed
273 Component* password,
279 Component* password,
url_parse.cc 71 Component* password) {
73 // password.
79 // Found separator: <username>:<password>
81 *password = MakeRange(user.begin + colon_offset + 1,
86 *password = Component();
144 Component* password,
150 password->reset();
165 username, password);
171 password->reset();
291 // First split into two main parts, the authority (username, password, host
    [all...]
  /external/chromium/net/http/
http_auth_handler_digest.h 87 const string16* password,
151 const string16& password,
159 const string16& password,
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
org.eclipse.core.runtime.compatibility.auth_3.2.200.v20100517.jar 
  /external/webkit/Source/WebKit/mac/Panels/
WebAuthenticationPanel.m 156 message = [NSString stringWithFormat:UI_STRING_INTERNAL("The user name or password you entered for the %@ proxy server %@ was incorrect. Make sure you?re entering them correctly, and then try again.",
161 message = [NSString stringWithFormat:UI_STRING_INTERNAL("The user name or password you entered for area ?%@? on %@ was incorrect. Make sure you?re entering them correctly, and then try again.",
164 message = [NSString stringWithFormat:UI_STRING_INTERNAL("The user name or password you entered for this area on %@ was incorrect. Make sure you?re entering them correctly, and then try again.",
203 // Use this scary-sounding phrase only when using basic auth with non-https servers. In this case the password
206 UI_STRING_INTERNAL("Your password will be sent unencrypted.",
212 [panel setInitialFirstResponder:password];
215 [password setStringValue:@""];
229 credential = [[NSURLCredential alloc] initWithUser:[username stringValue] password:[password stringValue] persistence:([remember state] == NSOnState) ? NSURLCredentialPersistencePermanent : NSURLCredentialPersistenceForSession];
258 credential = [[NSURLCredential alloc] initWithUser:[username stringValue] password:[password stringValue] persistence:([remember state] == NSOnState) ? NSURLCredentialPersistencePer (…)
    [all...]
  /libcore/luni/src/main/java/java/io/
Console.java 132 * Reads a password from the console. The password will not be echoed to the display.
134 * @return a character array containing the password, or null at EOF.
140 String password = readLine(); local
142 return (password == null) ? null : password.toCharArray();
159 * Reads a password from the console. The password will not be echoed to the display.
167 * @return a character array containing the password, or null at EOF.
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/
JDKKeyStore.java 129 char[] password,
152 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount);
206 char[] password)
209 if (password == null || password.length == 0)
230 Cipher cipher = makePBECipher(KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount);
249 cipher = makePBECipher("Broken" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount);
270 cipher = makePBECipher("Old" + KEY_CIPHER, Cipher.DECRYPT_MODE, password, salt, iterationCount);
289 Cipher out = makePBECipher(KEY_CIPHER, Cipher.ENCRYPT_MODE, password, salt, iterationCount);
458 char[] password,
    [all...]
  /external/chromium/chrome/browser/password_manager/
ie7_password.cc 17 // Structures that IE7/IE8 use to store a username/password.
31 // the username, and one for the password.
39 FILETIME time_stamp; // Timestamp when the password got added.
48 // is the username, the second one if the password.
57 std::wstring* password) {
66 if (information->header.item_count != 2) // Username and Password
81 *password = reinterpret_cast<const wchar_t*>(offset_to_data +
112 std::wstring* username, std::wstring* password) {
134 GetUserPassFromData(decrypted_data, username, password);
  /external/chromium/chrome/browser/remoting/
setup_flow_login_step.h 39 const std::string& password,
  /external/chromium/net/socket_stream/
socket_stream_job.h 61 const string16& password);
  /external/chromium/net/url_request/
url_request_ftp_job.h 56 const string16& password);
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/org.apache.ant_1.7.1.v20090120-1145/lib/
ant-javamail.jar 
ant-swing.jar 
  /external/webkit/Source/WebCore/platform/network/cf/
AuthenticationCF.cpp 113 CFStringRef password = coreCredential.password().createCFString(); local
114 CFURLCredentialRef result = CFURLCredentialCreate(0, user, password, 0, persistence);
116 CFRelease(password);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_mschapv2.c 52 /* Change-Password Data field */
162 const u8 *identity, *password; local
168 password = eap_get_config_password2(sm, &password_len, &pwhash);
169 if (identity == NULL || password == NULL)
212 mschapv2_derive_response(identity, identity_len, password,
304 "EAP-MSCHAPV2: Password changed successfully");
306 os_free(config->password);
308 config->password = os_malloc(16);
310 if (config->password) {
313 config->password);
502 const u8 *username, *password, *new_password; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_mschapv2.c 47 /* Change-Password Data field */
157 const u8 *identity, *password; local
163 password = eap_get_config_password2(sm, &password_len, &pwhash);
164 if (identity == NULL || password == NULL)
207 if (mschapv2_derive_response(identity, identity_len, password,
304 "EAP-MSCHAPV2: Password changed successfully");
306 os_free(config->password);
310 config->password = os_malloc(16);
312 if (config->password) {
315 config->password);
504 const u8 *username, *password, *new_password; local
    [all...]
  /external/zlib/src/contrib/minizip/
zip.h 230 const char* password,
247 const char* password,
255 password : crypting password (NULL for no crypting)
273 const char* password,
294 const char* password,

Completed in 1600 milliseconds

1 2 3 4 5 6 78 91011>>