HomeSort by relevance Sort by last modified time
    Searched refs:password (Results 451 - 475 of 792) sorted by null

<<11121314151617181920>>

  /external/chromium/chrome/browser/chromeos/cros/
mock_cryptohome_library.h 79 MOCK_METHOD1(TpmGetPassword, bool(std::string* password));
  /external/chromium/chrome/browser/chromeos/login/
new_user_view.cc 207 // username and password fields.
444 void NewUserView::SetPassword(const std::string& password) {
445 password_field_->SetText(UTF8ToUTF16(password));
458 // todo(cmasone) Need to sanitize memory used to store password.
459 std::string password = UTF16ToUTF8(password_field_->text()); local
466 delegate_->OnLogin(username, password);
  /external/chromium/chrome/browser/
keychain_mock_mac.h 100 const char* password; member in struct:MockKeychain::KeychainTestData
118 // Returns the value of the password set when |AddGenericPassword()| was
122 // Returns the number of allocations - deallocations for password data.
141 // Sets the password data and length for the item-th test item.
143 // Sets the password for the item-th test item. As with SetTestDataString,
185 // Tracks the allocations and frees of password data in |FindGenericPassword|
189 // Records the password being set when |AddGenericPassword()| gets called.
  /external/chromium/chrome/browser/net/
url_fixer_upper.cc 62 parts->password =
63 UTF8ComponentToUTF16Component(text_utf8, parts_utf8.password);
230 // password. FixupURL itself will append the '@' for us.
239 // We don't fix up the password at the moment.
444 OffsetComponent(offset, &parts->password);
492 FixupPassword(trimmed, parts.password, &url);
  /external/chromium/chrome/browser/sync/engine/
apply_updates_command_unittest.cc 217 // Decryptable password updates should be applied.
237 specifics.MutableExtension(sync_pb::password)->mutable_encrypted());
253 // Undecryptable password updates should not be applied.
255 specifics.MutableExtension(sync_pb::password);
271 // Only decryptable password updates should be applied.
287 specifics.MutableExtension(sync_pb::password)->mutable_encrypted());
302 specifics.MutableExtension(sync_pb::password)->mutable_encrypted());
313 << "The decryptable password update should be applied";
315 << "The undecryptable password update shouldn't be applied";
  /external/chromium/googleurl/src/
url_parse_file.cc 146 parsed->password.reset();
  /external/chromium/net/ftp/
ftp_network_transaction.h 42 const string16& password,
  /external/chromium/net/http/
http_auth_cache_unittest.cc 67 const string16 kPassword(ASCIIToUTF16("password"));
89 ASCIIToUTF16("realm1-password"), "/foo/bar/index.html");
97 ASCIIToUTF16("realm2-password"), "/foo2/index.html");
106 ASCIIToUTF16("realm3-basic-password"), "");
115 ASCIIToUTF16("realm3-digest-password"), "/baz/index.html");
124 ASCIIToUTF16("realm4-basic-password"), "/");
148 EXPECT_EQ(ASCIIToUTF16("realm3-basic-password"), entry->password());
159 EXPECT_EQ(ASCIIToUTF16("realm3-digest-password"), entry->password());
    [all...]
http_auth_handler_mock.cc 95 const string16* password,
http_network_transaction.h 50 const string16& password,
http_transaction_unittest.h 169 const string16& password,
  /external/grub/stage2/
stage2.c 319 if (! auth && password)
323 password to unlock the next set of features.");
570 if (! auth && password)
574 /* Do password check here! */
576 char *pptr = password;
583 /* Wipe out the previously entered password */
585 get_cmdline (" Password: ", entered, 31, '*', 0);
590 /* Make sure that PASSWORD is NUL-terminated. */
593 if (! check_password (entered, password, password_type))
  /external/markdown/markdown/
inlinepatterns.py 257 `username:password@host:port`.
  /external/openssh/
auth.h 126 int auth_krb5_password(Authctxt *authctxt, const char *password);
200 #define SKEY_PROMPT "\nS/Key Password: "
  /external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9/
crypto-aes.js 158 * Use AES to encrypt 'plaintext' with 'password' using 'nBits' key, in 'Counter' mode of operation
164 function AESEncryptCtr(plaintext, password, nBits) {
167 // for this example script, generate the key by applying Cipher to 1st 16/24/32 chars of password;
168 // for real-world applications, a more secure approach would be to hash the password e.g. with SHA-1
171 for (var i=0; i<nBytes; i++) pwBytes[i] = password.charCodeAt(i) & 0xff;
224 * Use AES to decrypt 'ciphertext' with 'password' using 'nBits' key, in Counter mode of operation
230 function AESDecryptCtr(ciphertext, password, nBits) {
235 for (var i=0; i<nBytes; i++) pwBytes[i] = password.charCodeAt(i) & 0xff;
419 var password = "O Romeo, Romeo! wherefore art thou Romeo?";
421 var cipherText = AESEncryptCtr(plainText, password, 256)
    [all...]
  /external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9.1/
crypto-aes.js 158 * Use AES to encrypt 'plaintext' with 'password' using 'nBits' key, in 'Counter' mode of operation
164 function AESEncryptCtr(plaintext, password, nBits) {
167 // for this example script, generate the key by applying Cipher to 1st 16/24/32 chars of password;
168 // for real-world applications, a more secure approach would be to hash the password e.g. with SHA-1
171 for (var i=0; i<nBytes; i++) pwBytes[i] = password.charCodeAt(i) & 0xff;
224 * Use AES to decrypt 'ciphertext' with 'password' using 'nBits' key, in Counter mode of operation
230 function AESDecryptCtr(ciphertext, password, nBits) {
235 for (var i=0; i<nBytes; i++) pwBytes[i] = password.charCodeAt(i) & 0xff;
419 var password = "O Romeo, Romeo! wherefore art thou Romeo?";
421 var cipherText = AESEncryptCtr(plainText, password, 256)
    [all...]
  /external/webkit/Source/WebCore/html/
InputType.h 270 const AtomicString& password();
  /external/webkit/Source/WebKit/android/jni/
WebCoreFrameBridge.h 142 bool getUsernamePasswordFromDom(WebCore::Frame* frame, WTF::String& username, WTF::String& password);
  /external/webkit/Source/WebKit2/Shared/
WebCoreArgumentCoders.h 171 encoder->encode(CoreIPC::In(credential.user(), credential.password(), static_cast<uint32_t>(credential.persistence())));
177 String password; local
179 if (!decoder->decode(CoreIPC::Out(user, password, persistence)))
182 credential = WebCore::Credential(user, password, static_cast<WebCore::CredentialPersistence>(persistence));
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_gpsk.c 86 const u8 *identity, *password; local
89 password = eap_get_config_password(sm, &password_len);
90 if (password == NULL) {
91 wpa_printf(MSG_INFO, "EAP-GPSK: No key (password) configured");
116 os_memcpy(data->psk, password, password_len);
eap_pax.c 57 const u8 *identity, *password; local
61 password = eap_get_config_password(sm, &password_len);
62 if (!identity || !password) {
63 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) "
86 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
  /external/wpa_supplicant_8/src/eap_peer/
eap_gpsk.c 81 const u8 *identity, *password; local
84 password = eap_get_config_password(sm, &password_len);
85 if (password == NULL) {
86 wpa_printf(MSG_INFO, "EAP-GPSK: No key (password) configured");
111 os_memcpy(data->psk, password, password_len);
eap_pax.c 50 const u8 *identity, *password; local
54 password = eap_get_config_password(sm, &password_len);
55 if (!identity || !password) {
56 wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) "
79 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
  /external/wpa_supplicant_8/wpa_supplicant/
config.h 81 * password - Password for Interworking network selection
83 char *password; member in struct:wpa_cred
86 * ext_password - Whether password is a name for external storage
136 * private_key_passwd - Password for private key file
703 * wps_nfc_dev_pw_id - NFC Device Password ID for password token
708 * wps_nfc_dh_pubkey - NFC DH Public Key for password token
713 * wps_nfc_dh_pubkey - NFC DH Private Key for password token
718 * wps_nfc_dh_pubkey - NFC Device Password for password toke
    [all...]
  /frameworks/base/libs/storage/
IMountService.cpp 512 int32_t decryptStorage(const String16& password)
516 data.writeString16(password);
529 int32_t encryptStorage(const String16& password)
533 data.writeString16(password);

Completed in 3138 milliseconds

<<11121314151617181920>>