/external/wpa_supplicant_8/src/eap_peer/ |
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 65 password, password_len); 68 password, nt_response) || 70 password, peer_challenge, auth_challenge, 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 96 if (hash_nt_password_hash(password, password_hash_has 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.c | 37 const u8 *password, size_t password_len, 64 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", 65 password, password_len); 68 password, nt_response) || 70 password, peer_challenge, auth_challenge, 75 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", 76 password, password_len); 79 password, password_len, 81 generate_authenticator_response(password, password_len, 96 if (hash_nt_password_hash(password, password_hash_has 36 mschapv2_derive_response(const u8 *identity, size_t identity_len, const u8 *password, size_t password_len, int pwhash, const u8 *auth_challenge, const u8 *peer_challenge, u8 *nt_response, u8 *auth_response, u8 *master_key) argument [all...] |
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/module/ |
H A D | LoginModuleUtilsTest.java | 39 char[] password = LoginModuleUtils.getPassword(in); 40 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); 44 password = LoginModuleUtils.getPassword(in); 45 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); 49 password = LoginModuleUtils.getPassword(in); 50 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); 54 password = LoginModuleUtils.getPassword(in); 55 assertTrue(Arrays.equals(PASSWORD_AS_CHARS, password)); 59 password = LoginModuleUtils.getPassword(in); 61 assertTrue(Arrays.equals(expectedString.toCharArray(), password)); [all...] |
/external/chromium/chrome/browser/password_manager/ |
H A D | encryptor_password_mac_unittest.cc | 11 // Test that if we have an existing password in the Keychain and we are 16 EncryptorPassword password(keychain); 17 EXPECT_FALSE(password.GetEncryptorPassword().empty()); 22 // Test that if we do not have an existing password in the Keychain then it 27 EncryptorPassword password(keychain); 28 EXPECT_FALSE(password.GetEncryptorPassword().empty()); 33 // Test that if get denied access by the user then we return an empty password. 38 EncryptorPassword password(keychain); 39 EXPECT_TRUE(password.GetEncryptorPassword().empty()); 45 // password, an [all...] |
H A D | ie7_password.h | 21 // Encrypted data containing the username, password and some more undocumented 31 // Parses a data structure to find the password and the username. 34 std::wstring* password); 36 // Decrypts the username and password for a given data vector using the url as 40 std::wstring* username, std::wstring* password);
|
/external/webkit/Source/WebKit2/UIProcess/API/C/ |
H A D | WKCredential.cpp | 40 WKCredentialRef WKCredentialCreate(WKStringRef username, WKStringRef password, WKCredentialPersistence persistence) argument 42 RefPtr<WebCredential> credential = WebCredential::create(toImpl(username), toImpl(password), toCredentialPersistence(persistence));
|
H A D | WKCredential.h | 38 WK_EXPORT WKCredentialRef WKCredentialCreate(WKStringRef username, WKStringRef password, WKCredentialPersistence);
|
/external/grub/util/ |
H A D | grub-md5-crypt | 3 # Encrypt a password in MD5 format 35 Encrypt a password in MD5 format. 67 # Prompt to enter a password. 69 read -r password 73 echo -n "Retype password: " 80 if test "x$password" = x; then 81 echo "Empty password is not permitted." 85 if test "x$password" != "x$password2"; then 94 $password
|
H A D | grub-md5-crypt.in | 3 # Encrypt a password in MD5 format 35 Encrypt a password in MD5 format. 67 # Prompt to enter a password. 69 read -r password 73 echo -n "Retype password: " 80 if test "x$password" = x; then 81 echo "Empty password is not permitted." 85 if test "x$password" != "x$password2"; then 94 $password
|
/external/dropbear/ |
H A D | cli-authpasswd.c | 44 /* returns a statically allocated password from a helper app, or NULL 118 char* password = NULL; local 124 snprintf(prompt, sizeof(prompt), "%s@%s's password: ", 128 password = gui_getpass(prompt); 131 password = getpass_or_cancel(prompt); 146 buf_putstring(ses.writepayload, password, strlen(password)); 149 m_burn(password, strlen(password));
|
/external/webkit/Source/WebCore/platform/network/ |
H A D | Credential.cpp | 44 Credential::Credential(const String& user, const String& password, CredentialPersistence persistence) argument 46 , m_password(password.length() ? password : "") 56 , m_password(original.password()) 81 const String& Credential::password() const function in class:WebCore::Credential 155 if (a.password() != b.password())
|
/external/openssh/openbsd-compat/ |
H A D | port-uw.c | 53 sys_auth_passwd(Authctxt *authctxt, const char *password) argument 59 /* Just use the supplied fake password if authctxt is invalid */ 62 /* Check for users with no password. */ 63 if (strcmp(pw_password, "") == 0 && strcmp(password, "") == 0) 66 /* Encrypt the candidate password using the proper salt. */ 75 result = ((strcmp(bigcrypt(password, salt), pw_password) == 0) 76 || (strcmp(osr5bigcrypt(password, salt), pw_password) == 0)); 80 result = (strcmp(xcrypt(password, salt), pw_password) == 0); 108 * fgetpwent() only reads from password file, so we know for certain
|
/external/chromium/chrome/browser/chromeos/login/ |
H A D | screen_locker_tester.h | 32 // Injects MockAuthenticate that uses given |user| and |password|. 34 const std::string& password); 36 // Sets the password text. 37 void SetPassword(const std::string& password); 39 // Gets the password text. 42 // Emulates entring a password. 43 void EnterPassword(const std::string& password);
|
H A D | screen_locker_tester.cc | 35 const std::string& user, const std::string& password) { 38 new MockAuthenticator(ScreenLocker::screen_locker_, user, password)); 41 void ScreenLockerTester::SetPassword(const std::string& password) { argument 44 pass->SetText(ASCIIToUTF16(password.c_str())); 53 void ScreenLockerTester::EnterPassword(const std::string& password) { argument 54 SetPassword(password); 34 InjectMockAuthenticator( const std::string& user, const std::string& password) argument
|
/external/webkit/Source/WebKit/win/ |
H A D | WebURLCredential.h | 52 /* [in] */ BSTR password, 55 virtual HRESULT STDMETHODCALLTYPE password( 56 /* [out, retval] */ BSTR* password);
|
H A D | WebURLCredential.cpp | 107 /* [in] */ BSTR password, 125 m_credential = Credential(String(user, SysStringLen(user)), String(password, SysStringLen(password)), corePersistence); 129 HRESULT STDMETHODCALLTYPE WebURLCredential::password( argument 130 /* [out, retval] */ BSTR* password) 132 BString str = m_credential.password(); 133 *password = str.release(); 105 initWithUser( BSTR user, BSTR password, WebURLCredentialPersistence persistence) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | JDKPKCS12StoreParameter.java | 34 public void setPassword(char[] password) argument 36 this.protectionParameter = new KeyStore.PasswordProtection(password);
|
/external/openssh/ |
H A D | auth-passwd.c | 7 * the password is valid for the user. 77 * Tries to authenticate the user using password. Returns true if 81 auth_password(Authctxt *authctxt, const char *password) argument 93 if (*password == '\0' && options.permit_empty_passwd == 0) 98 int ret = auth_krb5_password(authctxt, password); 106 HANDLE hToken = cygwin_logon_user(pw, password); 116 return (sshpam_auth_passwd(authctxt, password) && ok); 125 result = sys_auth_passwd(authctxt, password); 144 pwwarntime = login_getcaptime(lc, "password-warn", TWO_WEEKS, 153 "Your password wil 167 sys_auth_passwd(Authctxt *authctxt, const char *password) argument 192 sys_auth_passwd(Authctxt *authctxt, const char *password) argument [all...] |
/external/apache-http/src/org/apache/http/impl/auth/ |
H A D | NTLMEngine.java | 62 * @param password Password 71 String password, 69 generateType3Msg( String username, String password, String domain, String workstation, String challenge) argument
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/generators/ |
H A D | OpenSSLPBEParametersGenerator.java | 36 * @param password password to use. 40 byte[] password, 43 super.init(password, salt, 1); 47 * the derived key function, the ith hash of the password and the salt. 58 digest.update(password, 0, password.length); 83 * Generate a key parameter derived from the password, salt, and iteration 102 * the password, salt, and iteration count we are currently initialised 123 * Generate a key parameter for use with a MAC derived from the password, 39 init( byte[] password, byte[] salt) argument [all...] |
/external/chromium/chrome/browser/ui/login/ |
H A D | login_model.h | 15 // Called by the model when a username,password pair has been identified 18 const std::wstring& password) = 0;
|
/external/openssh/contrib/aix/ |
H A D | pam.conf | 15 sshd password required /usr/lib/security/pam_aix 16 OTHER password required /usr/lib/security/pam_aix
|
/external/apache-http/src/org/apache/http/auth/ |
H A D | NTCredentials.java | 52 private final String password; field in class:NTCredentials 58 * The constructor with the fully qualified username and password combined 61 * @param usernamePassword the domain/username:password formed string 66 throw new IllegalArgumentException("Username:password string may not be null"); 72 this.password = usernamePassword.substring(atColon + 1); 75 this.password = null; 94 * @param password The password. 101 final String password, 109 this.password 99 NTCredentials( final String userName, final String password, final String workstation, final String domain) argument [all...] |
/external/webkit/Tools/Scripts/webkitpy/tool/steps/ |
H A D | commit.py | 53 password = None 62 commit_text = scm.commit_with_message(self._commit_message, git_commit=self._options.git_commit, username=username, password=password, force_squash=force_squash, changed_files=self._changed_files(state)) 78 password = self._tool.user.prompt_password("%s password for %s: " % (e.server_host, username), repeat=5) 79 if not password: 80 raise ScriptError("You need to specify the password for %s on %s to perform the commit." % (username, e.server_host))
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.h | 20 const u8 *password, size_t password_len, 27 void generate_authenticator_response(const u8 *password, size_t password_len, 37 void nt_challenge_response(const u8 *challenge, const u8 *password, 42 void nt_password_hash(const u8 *password, size_t password_len, 51 const u8 *password, size_t password_len,
|