/external/chromium/chrome/browser/chromeos/cros/ |
mock_cryptohome_library.h | 79 MOCK_METHOD1(TpmGetPassword, bool(std::string* password));
|
/external/chromium/chrome/browser/chromeos/login/ |
new_user_view.cc | 207 // username and password fields. 444 void NewUserView::SetPassword(const std::string& password) { 445 password_field_->SetText(UTF8ToUTF16(password)); 458 // todo(cmasone) Need to sanitize memory used to store password. 459 std::string password = UTF16ToUTF8(password_field_->text()); local 466 delegate_->OnLogin(username, password);
|
/external/chromium/chrome/browser/ |
keychain_mock_mac.h | 100 const char* password; member in struct:MockKeychain::KeychainTestData 118 // Returns the value of the password set when |AddGenericPassword()| was 122 // Returns the number of allocations - deallocations for password data. 141 // Sets the password data and length for the item-th test item. 143 // Sets the password for the item-th test item. As with SetTestDataString, 185 // Tracks the allocations and frees of password data in |FindGenericPassword| 189 // Records the password being set when |AddGenericPassword()| gets called.
|
/external/chromium/chrome/browser/net/ |
url_fixer_upper.cc | 62 parts->password = 63 UTF8ComponentToUTF16Component(text_utf8, parts_utf8.password); 230 // password. FixupURL itself will append the '@' for us. 239 // We don't fix up the password at the moment. 444 OffsetComponent(offset, &parts->password); 492 FixupPassword(trimmed, parts.password, &url);
|
/external/chromium/chrome/browser/sync/engine/ |
apply_updates_command_unittest.cc | 217 // Decryptable password updates should be applied. 237 specifics.MutableExtension(sync_pb::password)->mutable_encrypted()); 253 // Undecryptable password updates should not be applied. 255 specifics.MutableExtension(sync_pb::password); 271 // Only decryptable password updates should be applied. 287 specifics.MutableExtension(sync_pb::password)->mutable_encrypted()); 302 specifics.MutableExtension(sync_pb::password)->mutable_encrypted()); 313 << "The decryptable password update should be applied"; 315 << "The undecryptable password update shouldn't be applied";
|
/external/chromium/googleurl/src/ |
url_parse_file.cc | 146 parsed->password.reset();
|
/external/chromium/net/ftp/ |
ftp_network_transaction.h | 42 const string16& password,
|
/external/chromium/net/http/ |
http_auth_cache_unittest.cc | 67 const string16 kPassword(ASCIIToUTF16("password")); 89 ASCIIToUTF16("realm1-password"), "/foo/bar/index.html"); 97 ASCIIToUTF16("realm2-password"), "/foo2/index.html"); 106 ASCIIToUTF16("realm3-basic-password"), ""); 115 ASCIIToUTF16("realm3-digest-password"), "/baz/index.html"); 124 ASCIIToUTF16("realm4-basic-password"), "/"); 148 EXPECT_EQ(ASCIIToUTF16("realm3-basic-password"), entry->password()); 159 EXPECT_EQ(ASCIIToUTF16("realm3-digest-password"), entry->password()); [all...] |
http_auth_handler_mock.cc | 95 const string16* password,
|
http_network_transaction.h | 50 const string16& password,
|
http_transaction_unittest.h | 169 const string16& password,
|
/external/grub/stage2/ |
stage2.c | 319 if (! auth && password) 323 password to unlock the next set of features."); 570 if (! auth && password) 574 /* Do password check here! */ 576 char *pptr = password; 583 /* Wipe out the previously entered password */ 585 get_cmdline (" Password: ", entered, 31, '*', 0); 590 /* Make sure that PASSWORD is NUL-terminated. */ 593 if (! check_password (entered, password, password_type))
|
/external/markdown/markdown/ |
inlinepatterns.py | 257 `username:password@host:port`.
|
/external/openssh/ |
auth.h | 126 int auth_krb5_password(Authctxt *authctxt, const char *password); 200 #define SKEY_PROMPT "\nS/Key Password: "
|
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9/ |
crypto-aes.js | 158 * Use AES to encrypt 'plaintext' with 'password' using 'nBits' key, in 'Counter' mode of operation 164 function AESEncryptCtr(plaintext, password, nBits) { 167 // for this example script, generate the key by applying Cipher to 1st 16/24/32 chars of password; 168 // for real-world applications, a more secure approach would be to hash the password e.g. with SHA-1 171 for (var i=0; i<nBytes; i++) pwBytes[i] = password.charCodeAt(i) & 0xff; 224 * Use AES to decrypt 'ciphertext' with 'password' using 'nBits' key, in Counter mode of operation 230 function AESDecryptCtr(ciphertext, password, nBits) { 235 for (var i=0; i<nBytes; i++) pwBytes[i] = password.charCodeAt(i) & 0xff; 419 var password = "O Romeo, Romeo! wherefore art thou Romeo?"; 421 var cipherText = AESEncryptCtr(plainText, password, 256) [all...] |
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9.1/ |
crypto-aes.js | 158 * Use AES to encrypt 'plaintext' with 'password' using 'nBits' key, in 'Counter' mode of operation 164 function AESEncryptCtr(plaintext, password, nBits) { 167 // for this example script, generate the key by applying Cipher to 1st 16/24/32 chars of password; 168 // for real-world applications, a more secure approach would be to hash the password e.g. with SHA-1 171 for (var i=0; i<nBytes; i++) pwBytes[i] = password.charCodeAt(i) & 0xff; 224 * Use AES to decrypt 'ciphertext' with 'password' using 'nBits' key, in Counter mode of operation 230 function AESDecryptCtr(ciphertext, password, nBits) { 235 for (var i=0; i<nBytes; i++) pwBytes[i] = password.charCodeAt(i) & 0xff; 419 var password = "O Romeo, Romeo! wherefore art thou Romeo?"; 421 var cipherText = AESEncryptCtr(plainText, password, 256) [all...] |
/external/webkit/Source/WebCore/html/ |
InputType.h | 270 const AtomicString& password();
|
/external/webkit/Source/WebKit/android/jni/ |
WebCoreFrameBridge.h | 142 bool getUsernamePasswordFromDom(WebCore::Frame* frame, WTF::String& username, WTF::String& password);
|
/external/webkit/Source/WebKit2/Shared/ |
WebCoreArgumentCoders.h | 171 encoder->encode(CoreIPC::In(credential.user(), credential.password(), static_cast<uint32_t>(credential.persistence()))); 177 String password; local 179 if (!decoder->decode(CoreIPC::Out(user, password, persistence))) 182 credential = WebCore::Credential(user, password, static_cast<WebCore::CredentialPersistence>(persistence));
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gpsk.c | 86 const u8 *identity, *password; local 89 password = eap_get_config_password(sm, &password_len); 90 if (password == NULL) { 91 wpa_printf(MSG_INFO, "EAP-GPSK: No key (password) configured"); 116 os_memcpy(data->psk, password, password_len);
|
eap_pax.c | 57 const u8 *identity, *password; local 61 password = eap_get_config_password(sm, &password_len); 62 if (!identity || !password) { 63 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " 86 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 81 const u8 *identity, *password; local 84 password = eap_get_config_password(sm, &password_len); 85 if (password == NULL) { 86 wpa_printf(MSG_INFO, "EAP-GPSK: No key (password) configured"); 111 os_memcpy(data->psk, password, password_len);
|
eap_pax.c | 50 const u8 *identity, *password; local 54 password = eap_get_config_password(sm, &password_len); 55 if (!identity || !password) { 56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " 79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config.h | 81 * password - Password for Interworking network selection 83 char *password; member in struct:wpa_cred 86 * ext_password - Whether password is a name for external storage 136 * private_key_passwd - Password for private key file 703 * wps_nfc_dev_pw_id - NFC Device Password ID for password token 708 * wps_nfc_dh_pubkey - NFC DH Public Key for password token 713 * wps_nfc_dh_pubkey - NFC DH Private Key for password token 718 * wps_nfc_dh_pubkey - NFC Device Password for password toke [all...] |
/frameworks/base/libs/storage/ |
IMountService.cpp | 512 int32_t decryptStorage(const String16& password) 516 data.writeString16(password); 529 int32_t encryptStorage(const String16& password) 533 data.writeString16(password);
|