/external/bouncycastle/src/main/java/org/bouncycastle/crypto/ |
H A D | PBEParametersGenerator.java | 10 protected byte[] password; field in class:PBEParametersGenerator 24 * @param password the password converted into bytes (see below). 25 * @param salt the salt to be mixed with the password. 30 byte[] password, 34 this.password = password; 40 * return the password byte array. 42 * @return the password byte array. 46 return password; 29 init( byte[] password, byte[] salt, int iterationCount) argument 103 PKCS5PasswordToBytes( char[] password) argument 123 PKCS5PasswordToUTF8Bytes( char[] password) argument 136 PKCS12PasswordToBytes( char[] password) argument [all...] |
/external/nist-sip/java/gov/nist/javax/sip/address/ |
H A D | UserInfo.java | 51 /** password field 53 protected String password; field in class:UserInfo 89 if (this.password != null && other.password == null) 92 if (other.password != null && this.password == null) 95 if (this.password == other.password) 98 return (this.password.equals(other.password)); [all...] |
/external/webkit/WebKitTools/BuildSlaveSupport/build.webkit.org-config/webkit/ |
H A D | auth.py | 4 def createBuildSlave((name, password)): 5 return BuildSlave(name, password, max_builds=1) 9 return [("slave-name", "password")]
|
/external/chromium/net/ftp/ |
H A D | ftp_auth_cache.h | 30 const std::wstring& password) 33 password(password) { 38 std::wstring password; member in struct:net::FtpAuthCache::Entry 48 // |password|). If there is already an entry for |origin|, it will be 51 const std::wstring& password); 54 // |username| and |password|. 56 const std::wstring& password); 29 Entry(const GURL& origin, const std::wstring& username, const std::wstring& password) argument
|
H A D | ftp_auth_cache.cc | 24 const std::wstring& password) { 31 entry->password = password; 33 entries_.push_front(Entry(origin, username, password)); 42 const std::wstring& password) { 45 it->password == password) { 23 Add(const GURL& origin, const std::wstring& username, const std::wstring& password) argument 41 Remove(const GURL& origin, const std::wstring& username, const std::wstring& password) argument
|
/external/webkit/WebKit/chromium/src/ |
H A D | WebPasswordFormData.cpp | 52 // Helper to determine which password is the main one, and which is 53 // an old password (e.g on a "make new password" form), if any. 55 HTMLInputElement** password, 59 ASSERT(password); 63 // Single password, easy. 64 *password = fields->passwords[0]; 68 // Treat two identical passwords as a single password. 69 *password = fields->passwords[0]; 71 // Assume first is old password, secon 54 locateSpecificPasswords(PasswordFormFields* fields, HTMLInputElement** password, HTMLInputElement** oldPassword) argument 112 assemblePasswordFormResult(const KURL& fullOrigin, const KURL& fullAction, HTMLFormControlElement* submit, HTMLInputElement* userName, HTMLInputElement* oldPassword, HTMLInputElement* password, WebPasswordFormData* result) argument [all...] |
/external/wpa_supplicant/examples/ |
H A D | ieee8021x.conf | 11 password="password"
|
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
H A D | ieee8021x.conf | 11 password="password"
|
/external/dropbear/ |
H A D | svr-authpasswd.c | 25 /* Validates a user password */ 35 /* Process a password auth request, sending success or failure messages as 43 char * testcrypt = NULL; /* crypt generated from the user's password sent */ 44 unsigned char * password; local 51 /* get the shadow password if possible */ 63 /* check for empty password - need to do this again here 64 * since the shadow password may differ to that tested 67 dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected", 73 /* check if client wants to change password */ 81 password [all...] |
H A D | cli-authpasswd.c | 44 /* returns a statically allocated password from a helper app, or NULL 118 char* password = NULL; local 124 snprintf(prompt, sizeof(prompt), "%s@%s's password: ", 128 password = gui_getpass(prompt); 131 password = getpass_or_cancel(prompt); 146 buf_putstring(ses.writepayload, password, strlen(password)); 149 m_burn(password, strlen(password));
|
/external/apache-http/src/org/apache/http/auth/ |
H A D | UsernamePasswordCredentials.java | 38 * Username and password {@link Credentials} 51 private final String password; field in class:UsernamePasswordCredentials 54 * The constructor with the username and password combined string argument. 56 * @param usernamePassword the username:password formed string 62 throw new IllegalArgumentException("Username:password string may not be null"); 67 this.password = usernamePassword.substring(atColon + 1); 70 this.password = null; 76 * The constructor with the username and password arguments. 79 * @param password the password 81 UsernamePasswordCredentials(String userName, String password) argument [all...] |
H A D | NTCredentials.java | 52 private final String password; field in class:NTCredentials 58 * The constructor with the fully qualified username and password combined 61 * @param usernamePassword the domain/username:password formed string 66 throw new IllegalArgumentException("Username:password string may not be null"); 72 this.password = usernamePassword.substring(atColon + 1); 75 this.password = null; 94 * @param password The password. 101 final String password, 109 this.password 99 NTCredentials( final String userName, final String password, final String workstation, final String domain) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_otp.c | 39 const u8 *pos, *password; local 51 password = eap_get_config_otp(sm, &password_len); 52 if (password) 55 password = eap_get_config_password(sm, &password_len); 59 if (password == NULL) { 76 wpabuf_put_data(resp, password, password_len); 78 password, password_len); 81 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
H A D | mschapv2.c | 43 const u8 *password, size_t password_len, 70 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 71 password, password_len); 74 password, nt_response); 76 password, peer_challenge, auth_challenge, 79 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 80 password, password_len); 83 password, password_len, nt_response); 84 generate_authenticator_response(password, password_len, 96 hash_nt_password_hash(password, password_hash_has 42 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument [all...] |
/external/grub/util/ |
H A D | grub-md5-crypt | 3 # Encrypt a password in MD5 format 35 Encrypt a password in MD5 format. 67 # Prompt to enter a password. 69 read -r password 73 echo -n "Retype password: " 80 if test "x$password" = x; then 81 echo "Empty password is not permitted." 85 if test "x$password" != "x$password2"; then 94 $password
|
H A D | grub-md5-crypt.in | 3 # Encrypt a password in MD5 format 35 Encrypt a password in MD5 format. 67 # Prompt to enter a password. 69 read -r password 73 echo -n "Retype password: " 80 if test "x$password" = x; then 81 echo "Empty password is not permitted." 85 if test "x$password" != "x$password2"; then 94 $password
|
/external/webkit/WebCore/platform/network/ |
H A D | Credential.cpp | 44 Credential::Credential(const String& user, const String& password, CredentialPersistence persistence) argument 46 , m_password(password.length() ? password : "") 56 , m_password(original.password()) 81 const String& Credential::password() const function in class:WebCore::Credential 155 if (a.password() != b.password())
|
/external/wpa_supplicant/ |
H A D | eap_otp.c | 42 const u8 *pos, *password; local 57 password = eap_get_config_otp(sm, &password_len); 58 if (password) 61 password = eap_get_config_password(sm, &password_len); 65 if (password == NULL) { 83 os_memcpy(rpos, password, password_len); 85 password, password_len); 88 wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password");
|
H A D | ms_funcs.h | 20 const u8 *password, size_t password_len, 27 void generate_authenticator_response(const u8 *password, size_t password_len, 37 void nt_challenge_response(const u8 *challenge, const u8 *password, 42 void nt_password_hash(const u8 *password, size_t password_len,
|
/external/webkit/WebKitTools/Scripts/webkitpy/ |
H A D | credentials.py | 53 self._read_git_config("password")] 75 password = self._keychain_value_with_label("^password: ", 77 return [username, password] 82 "find-internet-password", 90 log("Reading Keychain for %s account and password. " 113 password = None 117 (username, password) = self._credentials_from_git() 124 if not username or not password: 125 (username, password) [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
H A D | NTLMEngine.java | 62 * @param password Password 71 String password, 69 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | OpenSSLPBEParametersGenerator.java | 32 * @param password password to use. 36 byte[] password, 39 super.init(password, salt, 1); 43 * the derived key function, the ith hash of the password and the salt. 54 digest.update(password, 0, password.length); 79 * Generate a key parameter derived from the password, salt, and iteration 98 * the password, salt, and iteration count we are currently initialised 119 * Generate a key parameter for use with a MAC derived from the password, 35 init( byte[] password, byte[] salt) argument [all...] |
/external/webkit/WebKit/win/ |
H A D | WebURLCredential.cpp | 109 /* [in] */ BSTR password, 127 m_credential = Credential(String(user, SysStringLen(user)), String(password, SysStringLen(password)), corePersistence); 131 HRESULT STDMETHODCALLTYPE WebURLCredential::password( argument 132 /* [out, retval] */ BSTR* password) 134 BString str = m_credential.password(); 135 *password = str.release(); 107 initWithUser( BSTR user, BSTR password, WebURLCredentialPersistence persistence) argument
|
/external/bouncycastle/src/main/java/org/bouncycastle/openssl/ |
H A D | PEMUtilities.java | 21 char[] password, 62 sKey = getKey(password, alg, 24, iv, des2); 67 sKey = getKey(password, alg, 8, iv); 72 sKey = getKey(password, alg, 16, iv); 86 sKey = getKey(password, alg, keyBits / 8, iv); 123 sKey = getKey(password, "AES", keyBits / 8, salt); 149 throw new EncryptionException("exception using cipher - please check password and data.", e); 154 char[] password, 159 return getKey(password, algorithm, keyLength, salt, false); 163 char[] password, 17 crypt( boolean encrypt, String provider, byte[] bytes, char[] password, String dekAlgName, byte[] iv) argument 153 getKey( char[] password, String algorithm, int keyLength, byte[] salt) argument 162 getKey( char[] password, String algorithm, int keyLength, byte[] salt, boolean des2) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.h | 20 const u8 *password, size_t password_len, 27 void generate_authenticator_response(const u8 *password, size_t password_len, 37 void nt_challenge_response(const u8 *challenge, const u8 *password, 42 void nt_password_hash(const u8 *password, size_t password_len, 51 const u8 *password, size_t password_len,
|