Searched refs:password (Results 176 - 200 of 636) sorted by relevance

1234567891011>>

/external/chromium/chrome/browser/password_manager/
H A Dencryptor_linux.cc32 // Generates a newly allocated SymmetricKey object based a hard-coded password.
37 // password. We need to improve this password situation by moving a secure
38 // password into a system-level key store.
40 std::string password = "peanuts"; local
43 // Create an encryption key from our password and salt.
46 password,
74 // This currently "obfuscates" by encrypting with hard-coded password.
75 // We need to improve this password situation by moving a secure password
[all...]
/external/chromium/chrome/browser/sync/
H A Dprofile_sync_service_harness.h34 const std::string& password,
45 void SetCredentials(const std::string& username, const std::string& password);
H A Dsignin_manager.cc48 const std::string& password,
59 password_.assign(password);
65 password,
149 // We don't sign-out if the password was valid and we're just dealing with
151 // an invalid access code (again, because the password was valid).
47 StartSignIn(const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument
/external/chromium/chrome/browser/sync/util/
H A Duser_settings.h36 const std::string& password);
38 const std::string& password);
/external/chromium/net/base/
H A Dcert_database.h119 const string16& password);
124 int ExportToPKCS12(const CertificateList& certs, const string16& password,
/external/chromium/net/http/
H A Dhttp_auth_handler_basic.cc72 const string16* password,
76 // TODO(eroman): is this the right encoding of username/password?
78 if (!base::Base64Encode(UTF16ToUTF8(*username) + ":" + UTF16ToUTF8(*password),
70 GenerateAuthTokenImpl( const string16* username, const string16* password, const HttpRequestInfo*, CompletionCallback*, std::string* auth_token) argument
H A Dhttp_auth_handler_digest.cc37 // | ?, md5 | user:realm:password |
39 // | md5-sess | MD5(user:realm:password):nonce:cnonce |
140 const string16* password,
155 *password,
319 const string16& password,
325 UTF16ToUTF8(password));
345 const string16& password,
362 password, cnonce, nc);
138 GenerateAuthTokenImpl( const string16* username, const string16* password, const HttpRequestInfo* request, CompletionCallback* callback, std::string* auth_token) argument
315 AssembleResponseDigest( const std::string& method, const std::string& path, const string16& username, const string16& password, const std::string& cnonce, const std::string& nc) const argument
341 AssembleCredentials( const std::string& method, const std::string& path, const string16& username, const string16& password, const std::string& cnonce, int nonce_count) const argument
H A Dhttp_auth_handler_negotiate.cc186 // GSSAPI does not provide a way to enter username/password to
205 const string16* password,
210 DCHECK((username == NULL) == (password == NULL));
216 *password == password_));
223 password_ = *password;
312 string16* password = has_username_and_password_ ? &password_ : NULL; local
314 return auth_system_.GenerateAuthToken(username, password, spn_, auth_token_);
203 GenerateAuthTokenImpl( const string16* username, const string16* password, const HttpRequestInfo* request, CompletionCallback* callback, std::string* auth_token) argument
H A Dhttp_auth_cache.cc116 const string16& password,
142 entry->password_ = password;
203 const string16& password) {
207 if (username == it->username() && password == it->password()) {
111 Add(const GURL& origin, const std::string& realm, HttpAuth::Scheme scheme, const std::string& auth_challenge, const string16& username, const string16& password, const std::string& path) argument
199 Remove(const GURL& origin, const std::string& realm, HttpAuth::Scheme scheme, const string16& username, const string16& password) argument
/external/chromium/chrome/browser/resources/options/chromeos/
H A Dinternet_options_page.css33 .network-password {
38 .network-password > input, .network-password > select {
211 #detailsInternetPage:not([password]) .password-details {
/external/webkit/Source/JavaScriptCore/wtf/url/src/
H A DURLParser.h64 static void parseAuthority(const CHAR* spec, const URLComponent& auth, URLComponent& username, URLComponent& password, URLComponent& host, URLComponent& port) argument
69 password.reset();
77 // someone might include it in a password unescaped.
84 parseUserInfo(spec, URLComponent(auth.begin(), i - auth.begin()), username, password);
89 password.reset();
124 // First split into two main parts, the authority (username, password,
142 parseAuthority(spec, authority, parsed.username, parsed.password, parsed.host, parsed.port);
240 parsed.password.reset();
286 parsed.password.reset();
507 static void parseUserInfo(const CHAR* spec, const URLComponent& user, URLComponent& username, URLComponent& password) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dms_funcs.c54 * @password: 0-to-256-unicode-char Password (IN; ASCII)
55 * @password_len: Length of password
58 void nt_password_hash(const u8 *password, size_t password_len, argument
67 /* Convert password into unicode */
69 buf[2 * i] = password[i];
116 * @password: 0-to-256-unicode-char Password (IN; ASCII)
117 * @password_len: Length of password
122 const u8 *password, size_t password_len,
130 nt_password_hash(password, password_len, password_hash);
214 * @password
120 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
224 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
246 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
360 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dms_funcs.c104 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
105 * @password_len: Length of password
109 int nt_password_hash(const u8 *password, size_t password_len, argument
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
163 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
164 * @password_len: Length of password
170 const u8 *password, size_t password_len,
179 if (nt_password_hash(password, password_len, password_hash))
273 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
274 * @password_len: Length of password
168 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
429 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dms_funcs.c104 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
105 * @password_len: Length of password
109 int nt_password_hash(const u8 *password, size_t password_len, argument
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
163 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
164 * @password_len: Length of password
170 const u8 *password, size_t password_len,
179 if (nt_password_hash(password, password_len, password_hash))
273 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
274 * @password_len: Length of password
168 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
429 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dms_funcs.c104 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
105 * @password_len: Length of password
109 int nt_password_hash(const u8 *password, size_t password_len, argument
116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0)
163 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
164 * @password_len: Length of password
170 const u8 *password, size_t password_len,
179 if (nt_password_hash(password, password_len, password_hash))
273 * @password: 0-to-256-unicode-char Password (IN; UTF-8)
274 * @password_len: Length of password
168 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
429 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_ttls.c231 u8 *password = dpos; local
234 password[password_len - 1] == '\0') {
239 password, password_len);
240 parse->user_password = password;
503 if (!sm->user || !sm->user->password || sm->user->password_hash ||
506 "password configured");
512 os_memcmp(sm->user->password, user_password, user_password_len) !=
514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password");
519 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password");
528 const u8 *password,
524 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_ttls.c231 u8 *password = dpos; local
234 password[password_len - 1] == '\0') {
239 password, password_len);
240 parse->user_password = password;
503 if (!sm->user || !sm->user->password || sm->user->password_hash ||
506 "password configured");
512 os_memcmp(sm->user->password, user_password, user_password_len) !=
514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password");
519 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password");
528 const u8 *password,
524 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_ttls.c231 u8 *password = dpos; local
234 password[password_len - 1] == '\0') {
239 password, password_len);
240 parse->user_password = password;
503 if (!sm->user || !sm->user->password || sm->user->password_hash ||
506 "password configured");
512 os_memcmp(sm->user->password, user_password, user_password_len) !=
514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password");
519 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password");
528 const u8 *password,
524 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument
[all...]
/external/chromium/chrome/browser/ui/login/
H A Dlogin_prompt.cc128 const string16& password) {
134 // Tell the password manager the credentials were submitted / accepted.
137 password_form_.password_value = password;
147 NotifyAuthSupplied(username, password);
155 this, &LoginHandler::SetAuthDeferred, username, password));
240 SetAuth(supplied_details->username(), supplied_details->password());
297 const string16& password) {
307 AuthSuppliedLoginNotificationDetails details(this, username, password);
349 const string16& password) {
353 request_->SetAuth(username, password);
127 SetAuth(const string16& username, const string16& password) argument
296 NotifyAuthSupplied(const string16& username, const string16& password) argument
348 SetAuthDeferred(const string16& username, const string16& password) argument
[all...]
/external/chromium/googleurl/src/
H A Durl_canon_internal.cc316 DoOverrideComponent(repl_source.password, repl_parsed.password,
317 &source->password, &parsed->password);
353 repl_source.password, repl_parsed.password,
354 utf8_buffer, &parsed->password);
376 if (repl_source.password) source->password = utf8_buffer->data();
/external/openssh/
H A Dauth1.c65 SSH_CMSG_AUTH_PASSWORD, "password",
118 char *password; local
122 * Read user password. It is in plain text, but was
126 password = packet_get_string(&dlen);
129 /* Try authentication with the password. */
131 authenticated = PRIVSEP(auth_password(authctxt, password));
134 /* no password authentication in android */
138 memset(password, 0, dlen);
139 xfree(password);
252 /* no password authenticatio
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dauthsrv.c72 if (eap_user->password) {
73 user->password = os_malloc(eap_user->password_len);
74 if (user->password == NULL)
76 os_memcpy(user->password, eap_user->password,
/external/wpa_supplicant_8/src/ap/
H A Dauthsrv.c72 if (eap_user->password) {
73 user->password = os_malloc(eap_user->password_len);
74 if (user->password == NULL)
76 os_memcpy(user->password, eap_user->password,
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dauthsrv.c72 if (eap_user->password) {
73 user->password = os_malloc(eap_user->password_len);
74 if (user->password == NULL)
76 os_memcpy(user->password, eap_user->password,
/external/chromium/chrome/browser/chromeos/login/
H A Dparallel_authenticator.cc70 const std::string& password,
76 password,
77 HashPassword(password),
99 const std::string& password) {
102 HashPassword(password)));
141 current_state_->password,
248 const std::string& password,
253 password,
254 HashPassword(password),
323 // the same path they get when their password i
67 AuthenticateToLogin( Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument
98 AuthenticateToUnlock(const std::string& username, const std::string& password) argument
246 RetryAuth(Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument
572 HashPassword(const std::string& password) argument
[all...]

Completed in 459 milliseconds

1234567891011>>