Searched refs:password (Results 1 - 25 of 240) sorted by relevance

12345678910

/external/bouncycastle/src/main/java/org/bouncycastle/crypto/
H A DPBEParametersGenerator.java10 protected byte[] password; field in class:PBEParametersGenerator
24 * @param password the password converted into bytes (see below).
25 * @param salt the salt to be mixed with the password.
30 byte[] password,
34 this.password = password;
40 * return the password byte array.
42 * @return the password byte array.
46 return password;
29 init( byte[] password, byte[] salt, int iterationCount) argument
103 PKCS5PasswordToBytes( char[] password) argument
123 PKCS5PasswordToUTF8Bytes( char[] password) argument
136 PKCS12PasswordToBytes( char[] password) argument
[all...]
/external/nist-sip/java/gov/nist/javax/sip/address/
H A DUserInfo.java51 /** password field
53 protected String password; field in class:UserInfo
89 if (this.password != null && other.password == null)
92 if (other.password != null && this.password == null)
95 if (this.password == other.password)
98 return (this.password.equals(other.password));
[all...]
/external/webkit/WebKitTools/BuildSlaveSupport/build.webkit.org-config/webkit/
H A Dauth.py4 def createBuildSlave((name, password)):
5 return BuildSlave(name, password, max_builds=1)
9 return [("slave-name", "password")]
/external/chromium/net/ftp/
H A Dftp_auth_cache.h30 const std::wstring& password)
33 password(password) {
38 std::wstring password; member in struct:net::FtpAuthCache::Entry
48 // |password|). If there is already an entry for |origin|, it will be
51 const std::wstring& password);
54 // |username| and |password|.
56 const std::wstring& password);
29 Entry(const GURL& origin, const std::wstring& username, const std::wstring& password) argument
H A Dftp_auth_cache.cc24 const std::wstring& password) {
31 entry->password = password;
33 entries_.push_front(Entry(origin, username, password));
42 const std::wstring& password) {
45 it->password == password) {
23 Add(const GURL& origin, const std::wstring& username, const std::wstring& password) argument
41 Remove(const GURL& origin, const std::wstring& username, const std::wstring& password) argument
/external/webkit/WebKit/chromium/src/
H A DWebPasswordFormData.cpp52 // Helper to determine which password is the main one, and which is
53 // an old password (e.g on a "make new password" form), if any.
55 HTMLInputElement** password,
59 ASSERT(password);
63 // Single password, easy.
64 *password = fields->passwords[0];
68 // Treat two identical passwords as a single password.
69 *password = fields->passwords[0];
71 // Assume first is old password, secon
54 locateSpecificPasswords(PasswordFormFields* fields, HTMLInputElement** password, HTMLInputElement** oldPassword) argument
112 assemblePasswordFormResult(const KURL& fullOrigin, const KURL& fullAction, HTMLFormControlElement* submit, HTMLInputElement* userName, HTMLInputElement* oldPassword, HTMLInputElement* password, WebPasswordFormData* result) argument
[all...]
/external/wpa_supplicant/examples/
H A Dieee8021x.conf11 password="password"
/external/wpa_supplicant_6/wpa_supplicant/examples/
H A Dieee8021x.conf11 password="password"
/external/dropbear/
H A Dsvr-authpasswd.c25 /* Validates a user password */
35 /* Process a password auth request, sending success or failure messages as
43 char * testcrypt = NULL; /* crypt generated from the user's password sent */
44 unsigned char * password; local
51 /* get the shadow password if possible */
63 /* check for empty password - need to do this again here
64 * since the shadow password may differ to that tested
67 dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected",
73 /* check if client wants to change password */
81 password
[all...]
H A Dcli-authpasswd.c44 /* returns a statically allocated password from a helper app, or NULL
118 char* password = NULL; local
124 snprintf(prompt, sizeof(prompt), "%s@%s's password: ",
128 password = gui_getpass(prompt);
131 password = getpass_or_cancel(prompt);
146 buf_putstring(ses.writepayload, password, strlen(password));
149 m_burn(password, strlen(password));
/external/apache-http/src/org/apache/http/auth/
H A DUsernamePasswordCredentials.java38 * Username and password {@link Credentials}
51 private final String password; field in class:UsernamePasswordCredentials
54 * The constructor with the username and password combined string argument.
56 * @param usernamePassword the username:password formed string
62 throw new IllegalArgumentException("Username:password string may not be null");
67 this.password = usernamePassword.substring(atColon + 1);
70 this.password = null;
76 * The constructor with the username and password arguments.
79 * @param password the password
81 UsernamePasswordCredentials(String userName, String password) argument
[all...]
H A DNTCredentials.java52 private final String password; field in class:NTCredentials
58 * The constructor with the fully qualified username and password combined
61 * @param usernamePassword the domain/username:password formed string
66 throw new IllegalArgumentException("Username:password string may not be null");
72 this.password = usernamePassword.substring(atColon + 1);
75 this.password = null;
94 * @param password The password.
101 final String password,
109 this.password
99 NTCredentials( final String userName, final String password, final String workstation, final String domain) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_otp.c39 const u8 *pos, *password; local
51 password = eap_get_config_otp(sm, &password_len);
52 if (password)
55 password = eap_get_config_password(sm, &password_len);
59 if (password == NULL) {
76 wpabuf_put_data(resp, password, password_len);
78 password, password_len);
81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
H A Dmschapv2.c43 const u8 *password, size_t password_len,
70 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
71 password, password_len);
74 password, nt_response);
76 password, peer_challenge, auth_challenge,
79 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
80 password, password_len);
83 password, password_len, nt_response);
84 generate_authenticator_response(password, password_len,
96 hash_nt_password_hash(password, password_hash_has
42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument
[all...]
/external/grub/util/
H A Dgrub-md5-crypt3 # Encrypt a password in MD5 format
35 Encrypt a password in MD5 format.
67 # Prompt to enter a password.
69 read -r password
73 echo -n "Retype password: "
80 if test "x$password" = x; then
81 echo "Empty password is not permitted."
85 if test "x$password" != "x$password2"; then
94 $password
H A Dgrub-md5-crypt.in3 # Encrypt a password in MD5 format
35 Encrypt a password in MD5 format.
67 # Prompt to enter a password.
69 read -r password
73 echo -n "Retype password: "
80 if test "x$password" = x; then
81 echo "Empty password is not permitted."
85 if test "x$password" != "x$password2"; then
94 $password
/external/webkit/WebCore/platform/network/
H A DCredential.cpp44 Credential::Credential(const String& user, const String& password, CredentialPersistence persistence) argument
46 , m_password(password.length() ? password : "")
56 , m_password(original.password())
81 const String& Credential::password() const function in class:WebCore::Credential
155 if (a.password() != b.password())
/external/wpa_supplicant/
H A Deap_otp.c42 const u8 *pos, *password; local
57 password = eap_get_config_otp(sm, &password_len);
58 if (password)
61 password = eap_get_config_password(sm, &password_len);
65 if (password == NULL) {
83 os_memcpy(rpos, password, password_len);
85 password, password_len);
88 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
H A Dms_funcs.h20 const u8 *password, size_t password_len,
27 void generate_authenticator_response(const u8 *password, size_t password_len,
37 void nt_challenge_response(const u8 *challenge, const u8 *password,
42 void nt_password_hash(const u8 *password, size_t password_len,
/external/webkit/WebKitTools/Scripts/webkitpy/
H A Dcredentials.py53 self._read_git_config("password")]
75 password = self._keychain_value_with_label("^password: ",
77 return [username, password]
82 "find-internet-password",
90 log("Reading Keychain for %s account and password. "
113 password = None
117 (username, password) = self._credentials_from_git()
124 if not username or not password:
125 (username, password)
[all...]
/external/apache-http/src/org/apache/http/impl/auth/
H A DNTLMEngine.java62 * @param password Password
71 String password,
69 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/generators/
H A DOpenSSLPBEParametersGenerator.java32 * @param password password to use.
36 byte[] password,
39 super.init(password, salt, 1);
43 * the derived key function, the ith hash of the password and the salt.
54 digest.update(password, 0, password.length);
79 * Generate a key parameter derived from the password, salt, and iteration
98 * the password, salt, and iteration count we are currently initialised
119 * Generate a key parameter for use with a MAC derived from the password,
35 init( byte[] password, byte[] salt) argument
[all...]
/external/webkit/WebKit/win/
H A DWebURLCredential.cpp109 /* [in] */ BSTR password,
127 m_credential = Credential(String(user, SysStringLen(user)), String(password, SysStringLen(password)), corePersistence);
131 HRESULT STDMETHODCALLTYPE WebURLCredential::password( argument
132 /* [out, retval] */ BSTR* password)
134 BString str = m_credential.password();
135 *password = str.release();
107 initWithUser( BSTR user, BSTR password, WebURLCredentialPersistence persistence) argument
/external/bouncycastle/src/main/java/org/bouncycastle/openssl/
H A DPEMUtilities.java21 char[] password,
62 sKey = getKey(password, alg, 24, iv, des2);
67 sKey = getKey(password, alg, 8, iv);
72 sKey = getKey(password, alg, 16, iv);
86 sKey = getKey(password, alg, keyBits / 8, iv);
123 sKey = getKey(password, "AES", keyBits / 8, salt);
149 throw new EncryptionException("exception using cipher - please check password and data.", e);
154 char[] password,
159 return getKey(password, algorithm, keyLength, salt, false);
163 char[] password,
17 crypt( boolean encrypt, String provider, byte[] bytes, char[] password, String dekAlgName, byte[] iv) argument
153 getKey( char[] password, String algorithm, int keyLength, byte[] salt) argument
162 getKey( char[] password, String algorithm, int keyLength, byte[] salt, boolean des2) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dms_funcs.h20 const u8 *password, size_t password_len,
27 void generate_authenticator_response(const u8 *password, size_t password_len,
37 void nt_challenge_response(const u8 *challenge, const u8 *password,
42 void nt_password_hash(const u8 *password, size_t password_len,
51 const u8 *password, size_t password_len,

Completed in 440 milliseconds

12345678910