/external/chromium/chrome/browser/password_manager/ |
H A D | encryptor_linux.cc | 32 // Generates a newly allocated SymmetricKey object based a hard-coded password. 37 // password. We need to improve this password situation by moving a secure 38 // password into a system-level key store. 40 std::string password = "peanuts"; local 43 // Create an encryption key from our password and salt. 46 password, 74 // This currently "obfuscates" by encrypting with hard-coded password. 75 // We need to improve this password situation by moving a secure password [all...] |
/external/chromium/chrome/browser/sync/ |
H A D | profile_sync_service_harness.h | 34 const std::string& password, 45 void SetCredentials(const std::string& username, const std::string& password);
|
H A D | signin_manager.cc | 48 const std::string& password, 59 password_.assign(password); 65 password, 149 // We don't sign-out if the password was valid and we're just dealing with 151 // an invalid access code (again, because the password was valid). 47 StartSignIn(const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument
|
/external/chromium/chrome/browser/sync/util/ |
H A D | user_settings.h | 36 const std::string& password); 38 const std::string& password);
|
/external/chromium/net/base/ |
H A D | cert_database.h | 119 const string16& password); 124 int ExportToPKCS12(const CertificateList& certs, const string16& password,
|
/external/chromium/net/http/ |
H A D | http_auth_handler_basic.cc | 72 const string16* password, 76 // TODO(eroman): is this the right encoding of username/password? 78 if (!base::Base64Encode(UTF16ToUTF8(*username) + ":" + UTF16ToUTF8(*password), 70 GenerateAuthTokenImpl( const string16* username, const string16* password, const HttpRequestInfo*, CompletionCallback*, std::string* auth_token) argument
|
H A D | http_auth_handler_digest.cc | 37 // | ?, md5 | user:realm:password | 39 // | md5-sess | MD5(user:realm:password):nonce:cnonce | 140 const string16* password, 155 *password, 319 const string16& password, 325 UTF16ToUTF8(password)); 345 const string16& password, 362 password, cnonce, nc); 138 GenerateAuthTokenImpl( const string16* username, const string16* password, const HttpRequestInfo* request, CompletionCallback* callback, std::string* auth_token) argument 315 AssembleResponseDigest( const std::string& method, const std::string& path, const string16& username, const string16& password, const std::string& cnonce, const std::string& nc) const argument 341 AssembleCredentials( const std::string& method, const std::string& path, const string16& username, const string16& password, const std::string& cnonce, int nonce_count) const argument
|
H A D | http_auth_handler_negotiate.cc | 186 // GSSAPI does not provide a way to enter username/password to 205 const string16* password, 210 DCHECK((username == NULL) == (password == NULL)); 216 *password == password_)); 223 password_ = *password; 312 string16* password = has_username_and_password_ ? &password_ : NULL; local 314 return auth_system_.GenerateAuthToken(username, password, spn_, auth_token_); 203 GenerateAuthTokenImpl( const string16* username, const string16* password, const HttpRequestInfo* request, CompletionCallback* callback, std::string* auth_token) argument
|
H A D | http_auth_cache.cc | 116 const string16& password, 142 entry->password_ = password; 203 const string16& password) { 207 if (username == it->username() && password == it->password()) { 111 Add(const GURL& origin, const std::string& realm, HttpAuth::Scheme scheme, const std::string& auth_challenge, const string16& username, const string16& password, const std::string& path) argument 199 Remove(const GURL& origin, const std::string& realm, HttpAuth::Scheme scheme, const string16& username, const string16& password) argument
|
/external/chromium/chrome/browser/resources/options/chromeos/ |
H A D | internet_options_page.css | 33 .network-password { 38 .network-password > input, .network-password > select { 211 #detailsInternetPage:not([password]) .password-details {
|
/external/webkit/Source/JavaScriptCore/wtf/url/src/ |
H A D | URLParser.h | 64 static void parseAuthority(const CHAR* spec, const URLComponent& auth, URLComponent& username, URLComponent& password, URLComponent& host, URLComponent& port) argument 69 password.reset(); 77 // someone might include it in a password unescaped. 84 parseUserInfo(spec, URLComponent(auth.begin(), i - auth.begin()), username, password); 89 password.reset(); 124 // First split into two main parts, the authority (username, password, 142 parseAuthority(spec, authority, parsed.username, parsed.password, parsed.host, parsed.port); 240 parsed.password.reset(); 286 parsed.password.reset(); 507 static void parseUserInfo(const CHAR* spec, const URLComponent& user, URLComponent& username, URLComponent& password) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 54 * @password: 0-to-256-unicode-char Password (IN; ASCII) 55 * @password_len: Length of password 58 void nt_password_hash(const u8 *password, size_t password_len, argument 67 /* Convert password into unicode */ 69 buf[2 * i] = password[i]; 116 * @password: 0-to-256-unicode-char Password (IN; ASCII) 117 * @password_len: Length of password 122 const u8 *password, size_t password_len, 130 nt_password_hash(password, password_len, password_hash); 214 * @password 120 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 224 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 246 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument 360 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.c | 104 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 105 * @password_len: Length of password 109 int nt_password_hash(const u8 *password, size_t password_len, argument 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) 163 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 164 * @password_len: Length of password 170 const u8 *password, size_t password_len, 179 if (nt_password_hash(password, password_len, password_hash)) 273 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 274 * @password_len: Length of password 168 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument 429 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.c | 104 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 105 * @password_len: Length of password 109 int nt_password_hash(const u8 *password, size_t password_len, argument 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) 163 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 164 * @password_len: Length of password 170 const u8 *password, size_t password_len, 179 if (nt_password_hash(password, password_len, password_hash)) 273 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 274 * @password_len: Length of password 168 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument 429 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 104 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 105 * @password_len: Length of password 109 int nt_password_hash(const u8 *password, size_t password_len, argument 116 if (utf8_to_ucs2(password, password_len, buf, max_len, &len) < 0) 163 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 164 * @password_len: Length of password 170 const u8 *password, size_t password_len, 179 if (nt_password_hash(password, password_len, password_hash)) 273 * @password: 0-to-256-unicode-char Password (IN; UTF-8) 274 * @password_len: Length of password 168 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument 429 encrypt_pw_block_with_password_hash( const u8 *password, size_t password_len, const u8 *password_hash, u8 *pw_block) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ttls.c | 231 u8 *password = dpos; local 234 password[password_len - 1] == '\0') { 239 password, password_len); 240 parse->user_password = password; 503 if (!sm->user || !sm->user->password || sm->user->password_hash || 506 "password configured"); 512 os_memcmp(sm->user->password, user_password, user_password_len) != 514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password"); 519 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password"); 528 const u8 *password, 524 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ttls.c | 231 u8 *password = dpos; local 234 password[password_len - 1] == '\0') { 239 password, password_len); 240 parse->user_password = password; 503 if (!sm->user || !sm->user->password || sm->user->password_hash || 506 "password configured"); 512 os_memcmp(sm->user->password, user_password, user_password_len) != 514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password"); 519 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password"); 528 const u8 *password, 524 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 231 u8 *password = dpos; local 234 password[password_len - 1] == '\0') { 239 password, password_len); 240 parse->user_password = password; 503 if (!sm->user || !sm->user->password || sm->user->password_hash || 506 "password configured"); 512 os_memcmp(sm->user->password, user_password, user_password_len) != 514 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password"); 519 wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password"); 528 const u8 *password, 524 eap_ttls_process_phase2_chap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *challenge, size_t challenge_len, const u8 *password, size_t password_len) argument [all...] |
/external/chromium/chrome/browser/ui/login/ |
H A D | login_prompt.cc | 128 const string16& password) { 134 // Tell the password manager the credentials were submitted / accepted. 137 password_form_.password_value = password; 147 NotifyAuthSupplied(username, password); 155 this, &LoginHandler::SetAuthDeferred, username, password)); 240 SetAuth(supplied_details->username(), supplied_details->password()); 297 const string16& password) { 307 AuthSuppliedLoginNotificationDetails details(this, username, password); 349 const string16& password) { 353 request_->SetAuth(username, password); 127 SetAuth(const string16& username, const string16& password) argument 296 NotifyAuthSupplied(const string16& username, const string16& password) argument 348 SetAuthDeferred(const string16& username, const string16& password) argument [all...] |
/external/chromium/googleurl/src/ |
H A D | url_canon_internal.cc | 316 DoOverrideComponent(repl_source.password, repl_parsed.password, 317 &source->password, &parsed->password); 353 repl_source.password, repl_parsed.password, 354 utf8_buffer, &parsed->password); 376 if (repl_source.password) source->password = utf8_buffer->data();
|
/external/openssh/ |
H A D | auth1.c | 65 SSH_CMSG_AUTH_PASSWORD, "password", 118 char *password; local 122 * Read user password. It is in plain text, but was 126 password = packet_get_string(&dlen); 129 /* Try authentication with the password. */ 131 authenticated = PRIVSEP(auth_password(authctxt, password)); 134 /* no password authentication in android */ 138 memset(password, 0, dlen); 139 xfree(password); 252 /* no password authenticatio [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | authsrv.c | 72 if (eap_user->password) { 73 user->password = os_malloc(eap_user->password_len); 74 if (user->password == NULL) 76 os_memcpy(user->password, eap_user->password,
|
/external/wpa_supplicant_8/src/ap/ |
H A D | authsrv.c | 72 if (eap_user->password) { 73 user->password = os_malloc(eap_user->password_len); 74 if (user->password == NULL) 76 os_memcpy(user->password, eap_user->password,
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | authsrv.c | 72 if (eap_user->password) { 73 user->password = os_malloc(eap_user->password_len); 74 if (user->password == NULL) 76 os_memcpy(user->password, eap_user->password,
|
/external/chromium/chrome/browser/chromeos/login/ |
H A D | parallel_authenticator.cc | 70 const std::string& password, 76 password, 77 HashPassword(password), 99 const std::string& password) { 102 HashPassword(password))); 141 current_state_->password, 248 const std::string& password, 253 password, 254 HashPassword(password), 323 // the same path they get when their password i 67 AuthenticateToLogin( Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument 98 AuthenticateToUnlock(const std::string& username, const std::string& password) argument 246 RetryAuth(Profile* profile, const std::string& username, const std::string& password, const std::string& login_token, const std::string& login_captcha) argument 572 HashPassword(const std::string& password) argument [all...] |